Describe the MS08-067 vulnerability.

Instructions

For this assessment, complete the Assessing and Securing Systems on a Wide Area Network (WAN) lab. As you complete the lab, be sure to: (Already completed please see attachment)

Perform all screen captures as the lab instructs, and paste them into a Word document. (Already completed please see attachment)

In the same Word document, address the following:

Explain why the type of scan done in the lab is important for an organization.

Describe the MS08-067 vulnerability.

Why is it important to take steps to mitigate this vulnerability?

Explain how performing the steps of the scan helped to identify the vulnerability.

What ethical hacking technique did you use to perform the scan?

Explain why assessing and securing systems on a wide area network (WAN) is important for an organization.

The length of your assessment will vary depending on how you paste your screen captures. Be sure that you have fully addressed all the bullet points. Support your work with references to at least two current professional resources.

Requirements

Include a title page and references page.

Writing should be clear and well-organized, with no technical writing errors.

Cite at least two professional sources to support your work.

Follow current APA style and format for references.

Use Times New Roman, 12 points, double-spaced.

Describe the MS08-067 vulnerability.
Scroll to top