71.9k views
1 vote
SIMULATION

You are a security analyst tasked with interpreting an Nmap scan output from Company 's privileged network. The company's hardening guidelines indicate the following:

✑ There should be one primary server or service per device.
✑ Only default ports should be used.
Non-secure protocols should be disabled.

INSTRUCTIONS -Using the Nmap output, identify the devices on the network and their roles, and any open ports that should be closed. For each device found, add a device entry to the Devices Discovered list, with the following information:✑ The IP address of the device✑ The primary server or service of the device✑ The protocol(s) that should be disabled based on the hardening guidelinesTo select multiple protocols, use CTRL+CLICK.If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

1 Answer

5 votes

Final answer:

To interpret the Nmap scan output, analyze the devices on the network and their roles. Identify any open ports that should be closed based on the hardening guidelines.

Step-by-step explanation:

When analyzing the Nmap scan output from Company's privileged network, the goal is to identify the devices on the network, their roles, and any open ports that should be closed based on the hardening guidelines. To accomplish this, you would need to review the Nmap output and look for the IP addresses of the devices. For each device, you should note the primary server or service and identify any protocols that should be disabled.

User David Wihl
by
7.8k points