Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

Its a 2 part task.We can setup a team sharing session so you can access the labs. first request :Lab (web link) and access the files and lab environment necessary to run both Nmap and Wireshark on the...

1 answer below »
Its a 2 part task.
We can setup a team sharing session so you can access the labs. first request :Lab (web link) and access the files and lab environment necessary to run both Nmap and Wireshark on the network associated with this task. You will need to save the output of both Nmap and Wireshark to include in your submission



A. Describe the network topology you found when running Nmap. Include screenshots as evidence of running Nmap.




B. Summarize the vulnerabilities on the network and their potential implications based on your Nmap results.




C. Describe the anomalies you found when running Wireshark, on the network capture file, and include evidence of the range of packets associated witheachanomaly.




D. Summarize the potential implications of not addressingeach
of the anomalies found when running Wireshark.




E. Recommend solutions for eliminating or minimizingallidentified vulnerabilities or anomalies from Wireshark and Nmap. Use current, industry-respected, reliable research and sources to support your recommendations foreachvulnerability or anomaly.




F. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.




G. Demonstrate professional communication in the content and presentation of your submission.


Part 2: wil provide the SCENARIO and has 7 questions to go along with it.



Answered 5 days After Feb 14, 2023

Solution

Shubham answered on Feb 18 2023
14 Votes
Question A
Star topology was found while running Nmap. Star topology is the type of the network topology in which all devices on a network are connected to a central hub or switch. The central hub or switch acts as a communication point for all devices on the network. This topology is commonly used in WAN and LAN where a large number of devices need to be connected to a central location.
In a star topology, all devices on the network communicate through the central hub or switch. When a device on the network sends a message, the message is sent to the central hub or switch, which then sends the message to the destination device (He, 2021). This means that all devices on the network are independent of each other and do not need to be directly connected to each other. This can make it easier to manage and troubleshoot the network, as well as add or remove devices from the network.
Question B
As all the devices in a star topology are connected and if the switch or hub fails then the network may get compromised, the entire network can be disrupted. Attackers may target the central hub or switch as a single point of failure, which can lead to a denial of service (DoS) attack or complete network failure. In a star topology, all the communication between the devices on the network goes through the central hub or switch, which means that attackers can easily eavesdrop on the network traffic by compromising the hub or switch. This can lead to sensitive information being exposed or intercepted. If the central hub or switch is not properly secured, attackers can potentially gain unauthorized access to the network, which can lead to data theft,
manipulation or destruction. If one device in the star topology network becomes infected with malware, the central hub or switch can act as a conduit for the malware to spread to other devices on the network. This can lead to a widespread infection, causing serious damage to the network.
Question C
Single point of failure: As all devices on the network are dependent on the central hub or switch, if the hub or switch fails, the entire network can be disrupted.
Increased cabling: Since each device in a star topology is connected to the central hub or switch,...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here