is3220lab5
DESCRIPTION
Lab 5 for IS3220TRANSCRIPT
![Page 1: IS3220lab5](https://reader035.vdocuments.us/reader035/viewer/2022072106/563db8f3550346aa9a9884d4/html5/thumbnails/1.jpg)
Damon Baker (15622970) June 24, 2015IS3220 [email protected]
Lab #5 - Penetration Testing a pfSense Firewall
1. What does an effective penetration test consist of? network scanning, port scanning, vulnerability analysis, and exploitation.
2. Which is not part of the Attacker Kill Chain? d. System Hardening
3. Time and dollar budgets permitting, it is beneficial to run more than one vulnerability scan because different vulnerability scanners may get different results. True or False? true
4. It is important to rerun a vulnerability scan after patching programs or closing vulnerabilities because in closing some you may have opened others. True or False? true
5. Domain Name Service runs on port . 53
6. Network 1, including the host connection for the firewall, is a part of the CIDR /24 subnetwork.