subject

Jane has an intent to penetrate the network in an organization. She has used passive reconnaissance to gather extensive information on the company. She finds out the model numbers of routers and other devices by reading discussions between system administrators in forums. She also has a list of all the IT staff and their phone numbers. She also has the services running on ports on some machines she ran a network scanner on. Required:
a. What reasonable steps should the company have taken to prevent Jane from finding this information?
b. What steps should the company take to prevent or reduce the efficacy of port scans?

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 21.06.2019 17:30
How are natural numbers, whole numbers, integers, and rational numbers related
Answers: 3
question
Computers and Technology, 22.06.2019 02:50
Which of the following had the greatest influence on opening the internet to the generly public
Answers: 1
question
Computers and Technology, 22.06.2019 11:10
Look at the far left lane in the picture. explain what the red car is doing and what it needs to do to travel safely.
Answers: 2
question
Computers and Technology, 22.06.2019 15:00
The three logical operators used to write compound conditions are "and," "or," and "not." a: true b: false
Answers: 2
You know the right answer?
Jane has an intent to penetrate the network in an organization. She has used passive reconnaissance...
Questions
question
Mathematics, 25.04.2020 21:18
question
Mathematics, 25.04.2020 21:18
question
Mathematics, 25.04.2020 21:18
question
Mathematics, 25.04.2020 21:18
Questions on the website: 13722360