Question: It is important to know and understand the security posture of the devices attached to the network, as these might often be a step in

It is important to know and understand the security posture of the devices attached to the network, as these might often be a step in a more sophisticated and multilevel attack of the infrastructure. An important step in the risk management process is to determine what vulnerabilities exist on these devices. Choose a vulnerability assessment tool and perform a vulnerability assessment against your target(s) in your environment, and report the findings. The information should include:

A description about the tool used to perform the scan.

A list of identified hosts (Obfuscate any specific IP addresses).

The list of serious (on a scale of 1-5 (1 being the highest) report the 1 and 2 issues)

Describe or list any false positive information.

Discuss potential safeguards and remediation actions that could be implemented for each finding to reduce the risk.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!