{"id":31661,"date":"2024-08-30T01:38:41","date_gmt":"2024-08-30T01:38:41","guid":{"rendered":"https:\/\/www.writemyessays.app\/blog\/questions\/grp1-grp1-task-1-nmap-and-wireshark-emerging-technologies-in-cybersecurity-c844-prfa-grp1\/"},"modified":"2024-08-30T01:38:41","modified_gmt":"2024-08-30T01:38:41","slug":"grp1-grp1-task-1-nmap-and-wireshark-emerging-technologies-in-cybersecurity-c844-prfa-grp1","status":"publish","type":"questions","link":"https:\/\/www.writemyessays.app\/blog\/questions\/grp1-grp1-task-1-nmap-and-wireshark-emerging-technologies-in-cybersecurity-c844-prfa-grp1\/","title":{"rendered":"GRP1 \u2014 GRP1 Task 1: Nmap and Wireshark Emerging Technologies in Cybersecurity \u2014 C844  PRFA \u2014 GRP1"},"content":{"rendered":"<div style=\"margin-top: 20px; font-size: 14px; cursor: auto; color: inherit;\">\n<header style=\"margin-bottom: 20px; padding: 7px 15px; cursor: auto; color: inherit;\">\n<div style=\"margin-left: auto; margin-right: auto; padding-left: 20px; padding-right: 20px; cursor: auto; color: inherit;\">\n<div style=\"margin-left: 10px; margin-right: 30px; cursor: auto; color: inherit;\">\n<h1 style=\"margin-bottom: 10px; font-size: 22px; line-height: 30px; cursor: auto;\"><span style=\"cursor: auto; color: inherit;\">GRP1 \u2014 GRP1 Task 1: Nmap and Wireshark<\/span><\/h1>\n<div style=\"margin-right: 30px; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\">\n<p style=\"margin-bottom: 5px; font-weight: bold; font-size: 12px; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">Emerging Technologies in Cybersecurity \u2014 C844<\/span><\/p>\n<p style=\"font-weight: bold; font-size: 12px; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">PRFA \u2014 GRP1<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/header>\n<div style=\"margin-bottom: 10px; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\">\n<nav style=\"cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\">\n<div style=\"margin-left: auto; margin-right: auto; padding-left: 20px; padding-right: 20px; cursor: auto; color: inherit;\">Task OverviewSubmissionsEvaluation Report<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/nav>\n<\/div>\n<\/div>\n<\/div>\n<div style=\"margin-left: auto; margin-right: auto; padding-left: 20px; padding-right: 20px; font-size: 14px; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\">\n<div style=\"margin-bottom: 15px; cursor: auto; color: inherit;\">\n<div style=\"padding-right: 5px; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\"><\/div>\n<\/div>\n<\/div>\n<div style=\"cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\">\n<section style=\"margin-bottom: 30px; cursor: auto; color: inherit;\">\n<div style=\"margin-bottom: 20px; font-size: 22px; line-height: 1.1; cursor: auto; color: inherit;\"><a style=\"cursor: auto;\"><\/a><\/p>\n<div style=\"cursor: auto; color: inherit;\">Competencies<\/div>\n<hr style=\"cursor: auto; color: inherit;\"><\/div>\n<div style=\"margin-left: 30px; margin-right: 30px; cursor: auto; color: inherit;\">\n<p style=\"cursor: auto; color: inherit;\"><span style=\"font-weight: 700; cursor: auto; color: inherit;\">4042.5.3<\/span><span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span>:<span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><span style=\"margin-left: 5px; font-weight: 700; cursor: auto; color: inherit;\">Mapping and Monitoring&nbsp;<\/span><\/p>\n<p style=\"margin-bottom: 10px; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">The graduate executes network mapping and monitoring procedures using industry-standard software for identifying vulnerabilities and threats.<\/span><\/p>\n<\/div>\n<\/section>\n<section style=\"margin-bottom: 30px; cursor: auto; color: inherit;\">\n<div style=\"margin-bottom: 20px; font-size: 22px; line-height: 1.1; cursor: auto; color: inherit;\"><a style=\"cursor: auto;\"><\/a><\/p>\n<div style=\"cursor: auto; color: inherit;\">Introduction<\/div>\n<hr style=\"cursor: auto; color: inherit;\"><\/div>\n<div style=\"margin-left: 30px; margin-right: 30px; cursor: auto; color: inherit;\">\n<p style=\"cursor: auto; color: inherit;\">In the changing field of cybersecurity, you will need to continually identify new threats to your network as evidenced in the network itself and the traffic on that network. You will need to know how to run network mapping and monitoring software to find vulnerabilities and anomalies that could impact the security of your network in order to recommend sound solutions.<br style=\"cursor: auto; color: inherit;\"><br style=\"cursor: auto; color: inherit;\">For this task, you will use the virtual world at the \u201cPerformance Assessment Lab\u201d web link and access the files and lab environment necessary to run both Nmap and Wireshark on the network associated with this task. You will need to save the output of both Nmap and Wireshark to include in your submission. You will then recommend solutions to address any issues you find.<\/p>\n<\/div>\n<\/section>\n<section style=\"margin-bottom: 30px; cursor: auto; color: inherit;\">\n<div style=\"margin-bottom: 20px; font-size: 22px; line-height: 1.1; cursor: auto; color: inherit;\"><a style=\"cursor: auto;\"><\/a><\/p>\n<div style=\"cursor: auto; color: inherit;\">Requirements<\/div>\n<hr style=\"cursor: auto; color: inherit;\"><\/div>\n<div style=\"margin-left: 30px; margin-right: 30px; cursor: auto; color: inherit;\">\n<p style=\"cursor: auto; color: inherit;\"><em style=\"cursor: auto; color: inherit;\">Your submission must be your original work. No more than a combined total of 30% of the submission and no more than a 10% match to any one individual source can be directly quoted or closely paraphrased from sources, even if cited correctly. An originality report is provided when you submit your task that can be used as a guide.<\/em><\/p>\n<p style=\"cursor: auto; color: inherit;\"><br style=\"cursor: auto; color: inherit;\"><\/p>\n<p style=\"cursor: auto; color: inherit;\"><em style=\"cursor: auto; color: inherit;\">You must use the rubric to direct the creation of your submission because it provides detailed criteria that will be used to evaluate your work. Each requirement below may be evaluated by more than one rubric aspect. The rubric aspect titles may contain hyperlinks to relevant portions of the course.<\/em><\/p>\n<p style=\"cursor: auto; color: inherit;\"><br style=\"cursor: auto; color: inherit;\"><\/p>\n<p style=\"margin: 0in 0in 0pt 0.25in; cursor: auto; color: inherit;\">A. &nbsp;Describe the network topology you found when running Nmap. Include screenshots as evidence of running Nmap.<br style=\"cursor: auto; color: inherit;\"><br style=\"cursor: auto; color: inherit;\"><\/p>\n<p style=\"margin: 0in 0in 0pt 0.25in; cursor: auto; color: inherit;\">B. &nbsp;Summarize the vulnerabilities on the network and their potential implications based on your Nmap results.<br style=\"cursor: auto; color: inherit;\"><br style=\"cursor: auto; color: inherit;\"><\/p>\n<p style=\"margin: 0in 0in 0pt 0.25in; cursor: auto; color: inherit;\">C. &nbsp;Describe the anomalies you found when running Wireshark, on the network capture file, and include evidence of the range of packets associated with<span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><em style=\"cursor: auto; color: inherit;\">each&nbsp;<\/em><span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span>anomaly.<br style=\"cursor: auto; color: inherit;\"><br style=\"cursor: auto; color: inherit;\"><\/p>\n<p style=\"margin: 0in 0in 0pt 0.25in; cursor: auto; color: inherit;\">D. &nbsp;Summarize the potential implications of not addressing<span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><em style=\"cursor: auto; color: inherit;\">each<\/em>&nbsp; of the anomalies found when running Wireshark.<br style=\"cursor: auto; color: inherit;\"><br style=\"cursor: auto; color: inherit;\"><\/p>\n<p style=\"margin: 0in 0in 0pt 0.25in; cursor: auto; color: inherit;\">E. &nbsp;Recommend solutions for eliminating or minimizing<span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><em style=\"cursor: auto; color: inherit;\">all<\/em><span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span>identified vulnerabilities or anomalies from Wireshark and Nmap. Use current, industry-respected, reliable research and sources to support your recommendations for<span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><em style=\"cursor: auto; color: inherit;\">each<\/em><span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span>vulnerability or anomaly.<br style=\"cursor: auto; color: inherit;\"><br style=\"cursor: auto; color: inherit;\"><\/p>\n<p style=\"margin: 0in 0in 0pt 0.25in; cursor: auto; color: inherit;\">F. &nbsp;Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.<br style=\"cursor: auto; color: inherit;\"><br style=\"cursor: auto; color: inherit;\"><\/p>\n<p style=\"margin: 0in 0in 0pt 0.25in; cursor: auto; color: inherit;\">G. &nbsp;Demonstrate professional communication in the content and presentation of your submission.<\/p>\n<\/div>\n<div style=\"margin-left: 10px; margin-top: 20px; margin-bottom: 20px; font-weight: 700; font-size: 16px; line-height: 1.1; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\">File Restrictions<\/div>\n<\/div>\n<div style=\"margin-left: 20px; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">File name may contain only letters, numbers, spaces, and these symbols: ! &#8211; _ . * &#8216; ( )<\/span><br style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">File size limit: 200 MB<\/span><br style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">File types allowed: doc, docx, rtf, xls, xlsx, ppt, pptx, odt, pdf, csv, txt, qt, mov, mpg, avi, mp3, wav, mp4, wma, flv, asf, mpeg, wmv, m4v, svg, tif, tiff, jpeg, jpg, gif, png, zip, rar, tar, 7z<\/span><\/div>\n<\/section>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>GRP1 \u2014 GRP1 Task 1: Nmap and Wireshark Emerging Technologies in Cybersecurity \u2014 C844 PRFA \u2014 GRP1 Task OverviewSubmissionsEvaluation Report Competencies 4042.5.3&nbsp;:&nbsp;Mapping and Monitoring&nbsp; The graduate executes network mapping and monitoring procedures using industry-standard software for identifying vulnerabilities and threats. Introduction In the changing field of cybersecurity, you will need to continually identify new threats [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","meta":[],"disciplines":[17],"paper_types":[],"tagged":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions\/31661"}],"collection":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions"}],"about":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/types\/questions"}],"author":[{"embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/comments?post=31661"}],"version-history":[{"count":0,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions\/31661\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/media?parent=31661"}],"wp:term":[{"taxonomy":"disciplines","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/disciplines?post=31661"},{"taxonomy":"paper_types","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/paper_types?post=31661"},{"taxonomy":"tagged","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/tagged?post=31661"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}