This study source was downloaded by 100000859819779 from CourseHero.com on 02-16-2023 14:40:29 GMT -06:00https://www.coursehero.com/file/68255015/Performing-Secuirty-Assesmentdocx/ Catalina GudinoITT-30702/16/2020Ingrid GaviriaPerforming a Security AssessmentDuring this assignment I will be using Kali Linux virtual machine (VM) environment as your security assessment platform. During this it is very important to verify that all virtual machines created for this assignment is running and can be detected by Nmap program.Verifying that the host are up, ports that are currently open, along with versions of services that are running will allow you to detect the vulnerabilities that are on the Linux machine. 1This study source was downloaded by 100000859819779 from CourseHero.com on 02-16-2023 14:40:29 GMT -06:00https://www.coursehero.com/file/68255015/Performing-Secuirty-Assesmentdocx/ While using different scripts to verify the different types of vulnerabilities there can be recommendations. One that I was able to depict was a web application firewall, when performinga penetration test, the reconnaissance phase must include the detection and identification of a WAF, intrusion detection system (IDS), or intrusion prevention system (IPS). This is required in order to take the necessary measures to prevent being blocked or banned.The script to run and verify this would be nmap -p 80,443 -script I also believe that reviewing web page's source code allows us to understand