100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU C844 – Emerging Technologies in Cybersecurity • Task 1 Solutions & Network Analysis (Updated 2025/2026) • Instant Download • Full Nmap Topology & Vulnerability Summary

Rating
3.0
(1)
Sold
1
Pages
6
Grade
A+
Uploaded on
29-03-2024
Written in
2023/2024

This document provides a complete explanation of WGU C844 Task 1, covering network topology identification, Nmap host discovery, and analysis of vulnerabilities within a scanned subnet. It includes clear descriptions of the discovered STAR topology, host behaviors, OS fingerprinting, open services, and associated security risks. The content summarizes key findings such as outdated Linux kernel versions, insecure FTP services, and implications of exposed ports. Fully aligned with the Task 1 requirements and structured for fast review and exam preparation.

Show more Read less
Institution
Course









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Course

Document information

Uploaded on
March 29, 2024
Number of pages
6
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

6/21/23, 11:08 WGU C844 Task 1 Emerging Technologies in Cyber
AM Security




A. Describe the network topology that you found when running Nmap.

6 hosts were found using nmap -sn 10.168.27.0/24. The hosts are in a STAR topology as shown in the
screenshot below. A star topology means that all hosts are connected to a central device, usually a
switch. This makes it easier to add and take away new hosts with no disruption to the network. The
switch also provides a central management point for all devices. The major drawback to a star topology
is the switch or central device everything connects to is a single point of failure for all devices
connected to it.




A larger screenshot of the above image.




about:bla 1/6
nk

, 6/21/23, 11:08 WGU C844 Task 1 Emerging Technologies in Cyber
AM Security




B. Summarize the vulnerabilities on the network and their potential implications based on
NMAP results.
On 10.168.27.14, 10.168.27.20 and 10.168.27.132 I found that these devices are running on Linux kernel
2.6.32. This version has vulnerabilities such as CVE-2019-17351 which can be used to perform a denial
of service (DoSti attack. (Vulnerability Details: Cve-2019-17351ti




On 10.168.27.15 I found that FileZilla FTP is running on port 21. FTP is an insecure protocol that sends
data in clear text across the network making it an easy target for gaining usernames and passwords.




about:bla 2/6
nk
$7.99
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached


Also available in package deal

Reviews from verified buyers

Showing all reviews
1 year ago

1 year ago

Thank you for your purchase and positive review! Wishing you all the best in your exams.

3.0

1 reviews

5
0
4
0
3
1
2
0
1
0
Trustworthy reviews on Stuvia

All reviews are made by real Stuvia users after verified purchases.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
NurseAdvocate chamberlain College of Nursing
Follow You need to be logged in order to follow users or courses
Sold
403
Member since
1 year
Number of followers
70
Documents
11032
Last sold
2 days ago
NURSE ADVOCATE

I have solutions for following subjects: Nursing, Business, Accounting, statistics, chemistry, Biology and all other subjects. Nursing Being my main profession line, I have essential guides that are Almost A+ graded, I am a very friendly person: If you would not agreed with my solutions I am ready for refund

4.6

226 reviews

5
186
4
13
3
11
2
4
1
12

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions