Question Description
Can you help me understand this Cyber Security question?
1. Explore common network scanning and analysis tools (10 points)
2. Perform network reconnaissance and probing on the machines in the Virtual Security Cloud Lab (VSCL) (10 points)
3. Use Zenmap to perform an Intense scan on an entire subnetwork (172.30.0.0/24) (10 points)
4. Create a Fisheye Bubble chart to explain the relationships between devices on a network (10 points)
5. Explain how attackers use common network scanning and analysis tools to compromise networks