2 citation in APA format. Acceptable sources include the textbook, websites.
Textbook or articles
Â·Â Â Â Â Â Â Â Â Â Good examples (pertinent conceptual or personal examples are acceptable)
Â·Â Â Â Â Â Â Â Â Â Thoughtful analysis (considering assumptions, analyzing implications, comparing/contrasting concepts)
Install an application-based security scanner on the same personal workstation as the firewall from Discussion Board Forum 5. Run a full port scan on the computer while the application firewall from Discussion Board Forum 5 is running. Take note of the ports that are open. Turn off the firewall or open all ports and run the security scan a second time. Take note of the ports that are open. In a paragraph, research and discuss 2 of the most dangerous ports to vulnerabilities that were open while the firewall was running. In a second paragraph, research and discuss 2 of the most dangerous ports that were open while the firewall was turned off.