(MIS 589 Week 6 iLab)
Deliverables:
Important: A report template is … beginning on the next page, and you must use it to submit your assignment. Before submitting your assignment, delete the pages containing the instruction and rubric.
Your submitted assignment should begin with the title page and only contain your report. Don’t forget to place your name, your professor’s name, and the date on the title page.
Specific Questions from iLab
Guidelines: Answer each of the following questions using the sequence and data from the iLab instructions. Answer all questions in full graduate-level sentences.
- What was the purpose of TigerVNC?
- What was the purpose of Kali Linux?
- What did the following command do when typed in Kali Linux’s terminal window?
- What did the following command do when typed in Kali Linux’s terminal window?
- What was the difference between nmap and zenmap?
General Questions about Network Footprinting
Guidelines: Answer each of the following questions using knowledge gained from the iLab, readings from the textbook, and individual research on the Web. Answer all questions in full graduate-level sentences and paragraphs.
- What is accomplished by network footprinting?
- What are the countermeasures a network security architect can set in motion to diminish the threat from network footprinting?
- What is the difference between network footprinting and network reconnaissance?
- In the context of network security, explain what is meant by after reconnaissance comes penetration.
- What is a denial of service (DOS) attack?
Conclusion
Guidelines: Minimum of two paragraphs that describe the following:
- What you accomplished in the assignment or iLab
- What you learned from performing it
- How it relates to course material
- How you feel it will benefit you in your academic and professional career