port scanning and/or enumeration techniques (attacks

Connections to Ben & Jerry’s Case part 2
August 29, 2020
Nursing care of a patient with altered urinary and renal function
August 29, 2020

port scanning and/or enumeration techniques (attacks

port scanning and/or enumeration techniques (attacks

Discuss/describe the port scanning and/or enumeration techniques (attacks)  not covered in Module 2.  How can the attacks you have described be detected and prevented?
Enhance and elaborate on the port scanning and/or enumeration techniques (attacks) covered in Module 2.  Share any additional thoughts you may have on them and explain how they can be detected and/or prevented.

QUESTION # 2
Discuss/describe one or more LAN based attacks (also known as layer 2 attacks or lower layer attacks) which are not covered in the Module 3, or share any additional thoughts you may have    on LAN based attacks covered in Module 3.
Discuss the security measures or methods used to prevent or mitigate the LAN based attacks you presented in Question A.