A. Describe the network topology you found when running Nmap. Include screenshots as evidence of running Nmap.
B. Summarize the vulnerabilities on the network and their potential implications based on your Nmap results.
C. Describe the anomalies you found when running Wireshark, on the network capture file, and include evidence of the range of packets associated witheachanomaly.
D. Summarize the potential implications of not addressingeach
of the anomalies found when running Wireshark.
E. Recommend solutions for eliminating or minimizingallidentified vulnerabilities or anomalies from Wireshark and Nmap. Use current, industry-respected, reliable research and sources to support your recommendations foreachvulnerability or anomaly.
F. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.
G. Demonstrate professional communication in the content and presentation of your submission.
Part 2: wil provide the SCENARIO and has 7 questions to go along with it.