{CYBER SECURITY}
Emerging Technologies in Cyber Security (Western Governors University)
, Getting Started Task 1 Template
Use the template outline below to capture the rubric requirements and key points and to serve as your
task report. After you have captured the appropriate data, massage each section into the required
number of paragraphs and ensure you have captured all the required points highlighted.
A. Network Topology
The network topology of 10.168.27.0/24 seems to be Star Topology and evidence of this is in the
screenshots below. The network includes the following host addresses:
10.168.27.1 – 0 Open Ports // Unknown Mac Address // Unknown OS type
10.168.27.10 – 8 Open Ports // MAC Address :00:0C:29:D5:64:FA // OS Microsoft Windows Server 2012
or Windows Server 2012 R2
10.168.27.14 – 1 Open Port // MAC Address 00:0C:29:9C:3C:F9 // OS Linux 2.6.32
10.168.27.15 – 10 Open Ports // MAC Address 00:15:5D:01:80:07 // OS Microsoft Windows Server R2 or
Windows 8.1
10.168.27.20 – 1 Open Port // MAC Address 00:0C:29:46:DD:E7 // OS Linux 2.6.32
10.168.27.132 – 1 Open Port // MAC Address 00:0C:29:34:8E:61 // OS Linux 2.6.32
, Screenshots of running nmap.