questions

    April 24, 2024

1- Complete Project 6.1, p. 180. • Select a local organization and conduct a passive reconnaissance on it. (Search local job boards, the organization’s own website, user groups/bulletin boards, social networking sites) • Gather as much information about the target network as you can. • Write up a report explaining the passive reconnaissance of the organization. Project 6.1: Passive Reconnaissance Select a local organization and conduct passive reconnaissance on it. This should include searching job boards, the organization’s own website, user groups/bulletin boards, social networking sites, www.archive.org and more. Gather as much information about the target network as you can. Project 6.2: Port Scanners Use your favorite search engine to locate at least two other port scanners besides Nmap. Download and install them and then try them on your own machine or a designated lab computer. Compare and contrast these tools to Nmap. Are they easier to use? More informative? 2- Complete the Case Study on page 180. • Review the case study carefully. • Based on this scenario, answer these questions: What reasonable steps could the company taken to prevent Jane from finding out router models and other company hardware? What steps should the company take to prevent or least reduce the efficacy of port scans? (Discuss methods to protect the system) Jane is a hacker intent on breaking into the XYZ Corporation. She uses a variety of passive reconnaissance techniques and gathers extensive information about the company. Jane finds out from network administrator questions/comments in user groups the model of routers being used in the company. She finds a complete list of the IT staff and their phone numbers from a personnel directory on the company website. She also finds out what services are running by using a port scan. Based on this scenario, consider the following questions: What reasonable steps could the company have taken to prevent Jane from finding out router models and other company hardware? What steps should the company take to prevent or at least reduce the efficacy of port scans?

Trust your assignments to an essay writing service with the fastest delivery time and fully original content.

Verified