Lab- Assessment Worksheet Performing a Vulnerability Assessment
Overview
In this lab, you used Nmap commands within the Zenmap application to scan the virtual network and identify the devices on the network and the operating systems and services running on them. You also used OpenVAS to conduct a vulnerability assessment and record the high risk vulnerabilities identified by the tool. Finally, you used the information you gathered from the report to discover mitigations for those risks and make mitigation recommendations based on your findings.
Lab Assessment Questions & Answers
1. What is Zenmap typically used for? How is it related to Nmap? Describe a scenario in which you would use this type of application.
2. Which application can be used to perform a vulnerability assessment scan in the reconnaissance phase of the ethical hacking process?
3. What must you obtain before you begin the ethical hacking process or penetration test on a live production network, even before performing the reconnaissance step?
4. What is a CVE listing? Who hosts and sponsors the CVE database listing Web site?
5. Can Zenmap detect which operating systems are present on IP servers and workstations? Which option includes that scan?
6. How can you limit the breadth and scope of a vulnerability scan?
7. Once a vulnerability has been identified by OpenVAS, where would you check for more information regarding the identified vulnerability, exploits, and any risk mitigation solution?
8. What is the major difference between Zenmap and OpenVAS?
9. Why do you need to run both tools like Zenmap and OpenVAS to complete the reconnaissance phase of the ethical hacking process?