SlideShare a Scribd company logo
1 of 2
Task 1:
Complete the activities described below.
Activity 1 (500 words)
Qualys provides a cloud-based security and compliance
solution. The Qualys Cloud Platform and its integrated apps
help businesses simplify security operations and lower the cost
of compliance by delivering critical security intelligence on
demand and automating the full spectrum of auditing,
compliance, and protection for IT systems and web applications.
Nessus Agents are lightweight, low-footprint programs that you
install locally on hosts to supplement traditional network-based
scanning or to provide visibility into gaps that are missed by
traditional scanning. Nessus Agents collect vulnerability,
compliance, and system data, and report that information back
to a manager for analysis. With Nessus Agents, you extend scan
flexibility and coverage. You can scan hosts without using
credentials, as well as offline assets and endpoints that
intermittently connect to the internet. You can also run large-
scale concurrent agent scans with little network impact.
Task 1.1
· Please download the QUALYS and NESSUS trial versions and
install both the tools on your system (PC/Laptop). You can get
online guides video tutorials and instructions on how to use
these tools and to familiarize yourself with the menus.
Tasks 1.2:
· Scan any two devices such as servers, workstations, or any
other network devices
· Scan any two web websites or portals
Task 1.3:
· Discuss how both reports are similar and different, which one
is a better tool? Please take screenshots of scanners and submit
your report on Moodle.

More Related Content

More from alehosickg3

War and Peace Please respond to the followingBased on the lect.docx
War and Peace Please respond to the followingBased on the lect.docxWar and Peace Please respond to the followingBased on the lect.docx
War and Peace Please respond to the followingBased on the lect.docx
alehosickg3
 
Vulnerable Population Summary and Proposed ProgramThe first of you.docx
Vulnerable Population Summary and Proposed ProgramThe first of you.docxVulnerable Population Summary and Proposed ProgramThe first of you.docx
Vulnerable Population Summary and Proposed ProgramThe first of you.docx
alehosickg3
 
Voices of DemocracyThe documents created at the inception of Ameri.docx
Voices of DemocracyThe documents created at the inception of Ameri.docxVoices of DemocracyThe documents created at the inception of Ameri.docx
Voices of DemocracyThe documents created at the inception of Ameri.docx
alehosickg3
 
Visual Representation and Analysis of DataStateTotal.docx
Visual Representation and Analysis of DataStateTotal.docxVisual Representation and Analysis of DataStateTotal.docx
Visual Representation and Analysis of DataStateTotal.docx
alehosickg3
 
Visit a website you access frequently (excluding social networki.docx
Visit a website you access frequently (excluding social networki.docxVisit a website you access frequently (excluding social networki.docx
Visit a website you access frequently (excluding social networki.docx
alehosickg3
 
View the following Films on Demand videosDrug Control in Centra.docx
View the following Films on Demand videosDrug Control in Centra.docxView the following Films on Demand videosDrug Control in Centra.docx
View the following Films on Demand videosDrug Control in Centra.docx
alehosickg3
 
Views on Diversity  January 13, 2016. Your response should be at.docx
Views on Diversity  January 13, 2016. Your response should be at.docxViews on Diversity  January 13, 2016. Your response should be at.docx
Views on Diversity  January 13, 2016. Your response should be at.docx
alehosickg3
 
Vignette of AnnieAnnie is a 47-year-old Chinese-American woman w.docx
Vignette of AnnieAnnie is a 47-year-old Chinese-American woman w.docxVignette of AnnieAnnie is a 47-year-old Chinese-American woman w.docx
Vignette of AnnieAnnie is a 47-year-old Chinese-American woman w.docx
alehosickg3
 

More from alehosickg3 (20)

WarehousingCompanies use cross-docking to improve the performanc.docx
WarehousingCompanies use cross-docking to improve the performanc.docxWarehousingCompanies use cross-docking to improve the performanc.docx
WarehousingCompanies use cross-docking to improve the performanc.docx
 
War and Peace Please respond to the followingBased on the lect.docx
War and Peace Please respond to the followingBased on the lect.docxWar and Peace Please respond to the followingBased on the lect.docx
War and Peace Please respond to the followingBased on the lect.docx
 
Wang, Woo, Choon, Quek, Yang, and Liu (2012) found that using Facebo.docx
Wang, Woo, Choon, Quek, Yang, and Liu (2012) found that using Facebo.docxWang, Woo, Choon, Quek, Yang, and Liu (2012) found that using Facebo.docx
Wang, Woo, Choon, Quek, Yang, and Liu (2012) found that using Facebo.docx
 
W4 Assignment DeterrenceIntroduction to CriminologyCrime and C.docx
W4 Assignment DeterrenceIntroduction to CriminologyCrime and C.docxW4 Assignment DeterrenceIntroduction to CriminologyCrime and C.docx
W4 Assignment DeterrenceIntroduction to CriminologyCrime and C.docx
 
Vulnerable Population Summary and Proposed ProgramThe first of you.docx
Vulnerable Population Summary and Proposed ProgramThe first of you.docxVulnerable Population Summary and Proposed ProgramThe first of you.docx
Vulnerable Population Summary and Proposed ProgramThe first of you.docx
 
Voices of DemocracyThe documents created at the inception of Ameri.docx
Voices of DemocracyThe documents created at the inception of Ameri.docxVoices of DemocracyThe documents created at the inception of Ameri.docx
Voices of DemocracyThe documents created at the inception of Ameri.docx
 
Vital statistics collected by federal, state, & local governments ar.docx
Vital statistics collected by federal, state, & local governments ar.docxVital statistics collected by federal, state, & local governments ar.docx
Vital statistics collected by federal, state, & local governments ar.docx
 
Visual Representation and Analysis of DataStateTotal.docx
Visual Representation and Analysis of DataStateTotal.docxVisual Representation and Analysis of DataStateTotal.docx
Visual Representation and Analysis of DataStateTotal.docx
 
Vladimir Putin was recently reelected to another term as President o.docx
Vladimir Putin was recently reelected to another term as President o.docxVladimir Putin was recently reelected to another term as President o.docx
Vladimir Putin was recently reelected to another term as President o.docx
 
Vissing (2011) explains culture as an organized system of living an.docx
Vissing (2011) explains culture as an organized system of living an.docxVissing (2011) explains culture as an organized system of living an.docx
Vissing (2011) explains culture as an organized system of living an.docx
 
Visit the Endeavour Space Shuttle (I Already went there) at the .docx
Visit the Endeavour Space Shuttle (I Already went there) at the .docxVisit the Endeavour Space Shuttle (I Already went there) at the .docx
Visit the Endeavour Space Shuttle (I Already went there) at the .docx
 
Visit the Endeavour Space Shuttle (any day) at the Science Cente.docx
Visit the Endeavour Space Shuttle (any day) at the Science Cente.docxVisit the Endeavour Space Shuttle (any day) at the Science Cente.docx
Visit the Endeavour Space Shuttle (any day) at the Science Cente.docx
 
Visit Oracle.com. Click the Solutions tab to open the menu; then cli.docx
Visit Oracle.com. Click the Solutions tab to open the menu; then cli.docxVisit Oracle.com. Click the Solutions tab to open the menu; then cli.docx
Visit Oracle.com. Click the Solutions tab to open the menu; then cli.docx
 
Virtually all aspects of development are clearly influenced by both .docx
Virtually all aspects of development are clearly influenced by both .docxVirtually all aspects of development are clearly influenced by both .docx
Virtually all aspects of development are clearly influenced by both .docx
 
Visit a website you access frequently (excluding social networki.docx
Visit a website you access frequently (excluding social networki.docxVisit a website you access frequently (excluding social networki.docx
Visit a website you access frequently (excluding social networki.docx
 
Virtual Private NetworksThe successful operation of a VPN depends .docx
Virtual Private NetworksThe successful operation of a VPN depends .docxVirtual Private NetworksThe successful operation of a VPN depends .docx
Virtual Private NetworksThe successful operation of a VPN depends .docx
 
View the following Films on Demand videosDrug Control in Centra.docx
View the following Films on Demand videosDrug Control in Centra.docxView the following Films on Demand videosDrug Control in Centra.docx
View the following Films on Demand videosDrug Control in Centra.docx
 
Views on Diversity  January 13, 2016. Your response should be at.docx
Views on Diversity  January 13, 2016. Your response should be at.docxViews on Diversity  January 13, 2016. Your response should be at.docx
Views on Diversity  January 13, 2016. Your response should be at.docx
 
Vignette of AnnieAnnie is a 47-year-old Chinese-American woman w.docx
Vignette of AnnieAnnie is a 47-year-old Chinese-American woman w.docxVignette of AnnieAnnie is a 47-year-old Chinese-American woman w.docx
Vignette of AnnieAnnie is a 47-year-old Chinese-American woman w.docx
 
View the movieCrash, starring Sandra Bullock, Don Cheadle and .docx
View the movieCrash, starring Sandra Bullock, Don Cheadle and .docxView the movieCrash, starring Sandra Bullock, Don Cheadle and .docx
View the movieCrash, starring Sandra Bullock, Don Cheadle and .docx
 

Task 1 Complete the activities described below.Activity 1

  • 1. Task 1: Complete the activities described below. Activity 1 (500 words) Qualys provides a cloud-based security and compliance solution. The Qualys Cloud Platform and its integrated apps help businesses simplify security operations and lower the cost of compliance by delivering critical security intelligence on demand and automating the full spectrum of auditing, compliance, and protection for IT systems and web applications. Nessus Agents are lightweight, low-footprint programs that you install locally on hosts to supplement traditional network-based scanning or to provide visibility into gaps that are missed by traditional scanning. Nessus Agents collect vulnerability, compliance, and system data, and report that information back to a manager for analysis. With Nessus Agents, you extend scan flexibility and coverage. You can scan hosts without using credentials, as well as offline assets and endpoints that intermittently connect to the internet. You can also run large- scale concurrent agent scans with little network impact. Task 1.1 · Please download the QUALYS and NESSUS trial versions and install both the tools on your system (PC/Laptop). You can get online guides video tutorials and instructions on how to use these tools and to familiarize yourself with the menus. Tasks 1.2: · Scan any two devices such as servers, workstations, or any
  • 2. other network devices · Scan any two web websites or portals Task 1.3: · Discuss how both reports are similar and different, which one is a better tool? Please take screenshots of scanners and submit your report on Moodle.