• MIS 589 Week 6 | iLab Report
Report Structure

Introduction

1.   What was the purpose of TigerVNC?

2.   What was the purpose of Kali Linux?

3.   What did the following command do when typed in Kali Linux’s terminal window?

4.   What did the following command do when typed in Kali Linux’s terminal window?

5.   What was the difference between nmap and zenmap?

6.   What is accomplished by network footprinting?

7.   What are the countermeasures a network security architect can set in motion to diminish the threat from network footprinting?

8.   What is the difference between network footprinting and network reconnaissance?

9.   In the context of network security, explain what is meant by after reconnaissance comes penetration.

10.  What is a denial of service (DOS) attack?

Conclusion

Reference

MIS 589 Week 6 | iLab Report

  • Institution(s): Devry
  • Year Published: 2021
  • Digital Download: Instant
  • $15.00


Related Products

Tags: MIS 589 Week 6 iLab Report, MIS589 Week6 iLab Report.