3.
What must you obtain before you begin the ethical hacking process or penetration test on a live production network, even before performing the reconnaissance step?
You likely should get permission of the organization. simply going in and running a bunch of network scans and penetration tests, then proceeding to announce that you're a good guy, is most likely not appreciated.
4.
What is a CVE listing? Who hosts and who sponsors the CVE database listing web site?
CVE is common vulnerability and exploits. hosts the CVE, sponsored by the DHS and the NCSD.
.
5.
Can Zenmap detect which operating systems are present on IP servers and workstations? Which option includes that scan?
Zenmap can detect operating systems with the -O option, however using the SV argument may provide more accurate details based on the services.
6.
How can you limit the breadth and scope of a vulnerability scan?
Try excluding certain hosts with the -exclude argument in the nmap command line. In our case, we exempted the local host.