Plan a system assessment

Where would this IDS be a good fit? Should you place it on a network or on a specific host? Explain your answer. Understand system security scanning Fingerprint an operating system and TCP/IP stack Identify system vulnerabilities Use discovery tools Plan a system assessment What is system security scanning? a. The process of methodically detecting all systems in a particular subnet b. The process of methodically assessing a system to find any known vulnerability c. Periodically scanning vulnerabilities databases for new or updated threats d. Examining each file stored on a file system for virus signatures

Don't use plagiarized sources. Get Your Custom Essay on
Plan a system assessment
Just from $13/Page
Order Essay
Place Order
Grab A 14% Discount on This Paper
Pages (550 words)
Approximate price: -
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)