Cybersecurity
Cybersecurity
b) You are prompted that your connection is not private. Click Advanced and Proceed to localhost.
PUBLIC
For Public Use
c) At the Welcome to Nessus screen, select Continue.
PUBLIC
For Public Use
d) To get an activation code, supply your First name, Last name & Email. Click Email.
e) Enter the activation code received from your email, click Continue.
f) Create a user account, supply a password then click Submit.
g) Nessus will automatically download plugins. The process will take a few minutes.
h) On the Welcome to Nessus Essentials window, click Close.
i) Select anywhere on the line graph to see the details about each vulnerability. Note that each
vulnerability includes references and suggested remedies.
PUBLIC
For Public Use
4. Take a screenshot of your scan result – Host tab.
PUBLIC
For Public Use
5. Take a screenshot of your scan result – Vulnerabilities tab.
6. When you fix the major vulnerabilities in a system, how can you ensure that
they are repaired?
PUBLIC
For Public Use
7. Why would you not always be able to fix a vulnerability that Nessus marks as
critical?
Fixing a vulnerability marked as critical by Nessus might face challenges due to
various reasons. Some vulnerabilities might be deeply embedded in the system
architecture, making it difficult to patch without causing disruptions or
compatibility issues with existing software. Resource constraints, such as time,
budget, or technical expertise, could hinder a swift resolution. Certain
vulnerabilities might be linked to third-party applications or dependencies
beyond immediate control, requiring coordination with external entities for a
comprehensive fix. In some cases, applying patches might not be feasible if the
system is outdated or unsupported. There's the risk of false positives, where
Nessus identifies a vulnerability that doesn't actually pose a significant threat.
Balancing the urgency of fixing critical vulnerabilities with these practical
considerations is key to navigating the complexities of system security
effectively.
PUBLIC
For Public Use
9. How can a vulnerability scan like this be useful to a penetration tester?
PUBLIC
For Public Use