340 DB6

340 DB6
no plagiarism
2 citation in APA format. Acceptable sources include the textbook, websites.
Textbook or articles

·         Good examples (pertinent conceptual or personal examples are acceptable)

·         Thoughtful analysis (considering assumptions, analyzing implications, comparing/contrasting concepts)

Install an application-based security scanner on the same personal workstation as the firewall from Discussion Board Forum 5. Run a full port scan on the computer while the application firewall from Discussion Board Forum 5 is running. Take note of the ports that are open. Turn off the firewall or open all ports and run the security scan a second time. Take note of the ports that are open. In a paragraph, research and discuss 2 of the most dangerous ports to vulnerabilities that were open while the firewall was running. In a second paragraph, research and discuss 2 of the most dangerous ports that were open while the firewall was turned off.

find the cost of your paper