System Administration

Question 1

Analyze the results of the Zenmap scan. Your report must answer the following questions:

What are the first five open ports as identified by the Zenmap scan?

Include the port number

Include the service name

nclude a brief description of how each is used

2. The Nessus scan identified two critical vulnerabilities, identified as ID 32314 and ID 33850.

Research the vulnerabilities against the Common Vulnerabilities and Exposure (CVE) database.

Include the name and a brief description of each vulnerability.

3. Determine what can be done to protect the system and defend the campus network against attempts to gather data, and to resolve vulnerabilities. Also determine which ports and services likely need to remain open.

4. Write a report targeted at IT management and systems administration staff explaining the vulnerabilities and protection mechanisms that the College should adopt, which will be applied to all similar systems at the college.

Question 2

In this discussion, you will work with your classmates to understand enterprise cryptography. Use the Internet to research current information about enterprise cryptography. In a 4–6-paragraph posting, address the following questions:

  • What is enterprise cryptography?
  • How is it implemented? Are there vendors that offer solutions?
  • What are the advantages and disadvantages of implementing enterprise cryptography?
  • In what case would you recommend the implementation of enterprise cryptography?

Do you need help with this assignment or any other? We got you! Place your order and leave the rest to our experts.

Quality Guaranteed

Any Deadline

No Plagiarism