1.
Explain in your own words what type of information can be obtained by using network scanning techniques and why it is an important intelligence gathering process. Between 250-300 words.
2.
Select one network scanning software tool (there is a list in your required reading slides) and explain in detail how it works and how detects network vulnerabilities. Provide the site where you obtained your information and include that in your assignment write-up. Between 250-300 words.
Attached the document.
3.
Explain in your own words what some of the challenges are with the Change Management Process for IT security.
Post must be between 250-300 words