WGU C844 Task 1 With Complete Solutions
C844 Task 1
A. Network Topology
We can see from the above screen shot that the network we have scanned with Zenmap is a star
topology. The topology can be described as follows:
10.168.27.1 -
State- Up
Open ports- 0
Closed ports- 0
Scanned ports- 100
10.168.27.10 -
State- Up
Open ports- 8
Filtered ports- 92
Scanned ports- 100
OS- Microsoft Windows Server 2012 or Windows Server 2012 R2
10.168.27.14 -
State- Up
Open ports- 1
Closed ports- 99
Scanned ports- 100
®™ WGU C844 Task 1 With Complete Solutions
, OS- Linux 2.6.32
10.168.27.15 -
State- Up
Open ports-
10
Filtered ports- 90
Scanned ports- 100
OS- Microsoft Windows Server 2008 or Windows 8.1
10.168.27.20
State- Up
Open ports- 1
Closed ports- 99
Scanned ports- 100
OS- Linux 2.6.32
10.168.27.13
State- Up
Open ports- 1
Closed ports- 99
Scanned ports- 100
OS- Linux 2.6.32
B Summary of Vulnerabilities and Implications
First vulnerability
The first vulnerability found is on 10.168.27.10. When scanning that IP address, we are advised by
Zenmap that this IP address is connected to a workstation that is running on Microsoft Windows
Server 2012 or Windows Server 2012 R2. That particular version of Windows Server has an end-of-life
date of 10-23-23. As today's date is 02-10-24, we can conclude that Microsoft no longer supports this
operating system, and therefore will receive no more vulnerability patches.
The potential implication is that a malicious actor can take advantage of the lack of support from the
vendor by exploiting bugs that will no longer be patched. Whether it be a zero-day or a known bug, a
C844 Task 1
A. Network Topology
We can see from the above screen shot that the network we have scanned with Zenmap is a star
topology. The topology can be described as follows:
10.168.27.1 -
State- Up
Open ports- 0
Closed ports- 0
Scanned ports- 100
10.168.27.10 -
State- Up
Open ports- 8
Filtered ports- 92
Scanned ports- 100
OS- Microsoft Windows Server 2012 or Windows Server 2012 R2
10.168.27.14 -
State- Up
Open ports- 1
Closed ports- 99
Scanned ports- 100
®™ WGU C844 Task 1 With Complete Solutions
, OS- Linux 2.6.32
10.168.27.15 -
State- Up
Open ports-
10
Filtered ports- 90
Scanned ports- 100
OS- Microsoft Windows Server 2008 or Windows 8.1
10.168.27.20
State- Up
Open ports- 1
Closed ports- 99
Scanned ports- 100
OS- Linux 2.6.32
10.168.27.13
State- Up
Open ports- 1
Closed ports- 99
Scanned ports- 100
OS- Linux 2.6.32
B Summary of Vulnerabilities and Implications
First vulnerability
The first vulnerability found is on 10.168.27.10. When scanning that IP address, we are advised by
Zenmap that this IP address is connected to a workstation that is running on Microsoft Windows
Server 2012 or Windows Server 2012 R2. That particular version of Windows Server has an end-of-life
date of 10-23-23. As today's date is 02-10-24, we can conclude that Microsoft no longer supports this
operating system, and therefore will receive no more vulnerability patches.
The potential implication is that a malicious actor can take advantage of the lack of support from the
vendor by exploiting bugs that will no longer be patched. Whether it be a zero-day or a known bug, a