VM Scanner Background Report: Threat Management and Vulnerability Assessment


Provide an introduction that includes what you intend to cover in the background paper. Ensure you are specific and define your purpose clearly.

Part 1: Nessus Vulnerability Report Analysis

In this section, analyze and interpret the results of the report in order to give your boss a clear picture of the Mercury USA’s potential vulnerabilities.

As you analyze the report, address the following points:

  • Is it appropriate to distribute the report as is, or do you need to interpret the report, attach meaning before sending to management? Explain why or why not.
  • What is your overall impression of the tool’s output? Is it easy to interpret, well-organized, include enough detail, too much detail?
  • Does the tool provide enough reporting detail for you as the analyst to focus on the relevant vulnerabilities for Mercury USA?
  • Name the three most important vulnerabilities in this system for Mercury USA. Why are they the most critical?
  • How does the report provide enough information to address and remediate the three most important vulnerabilities?
Judy has asked you to provide a screenshot to help her understand what the Nessus report looks like. Screenshot Instructions Open lab 14.2.30, “Conducting Vulnerability Scans” lab within the uCertify Pearson CompTIA Cybersecurity Analyst (CySA+) content. After Step 20, click the Report button dropdown and choose HTML. In the “Generate HTML Report” dialog, click the Generate Report button. Open the report from the browser’s download bar at the bottom of the screen. Click the Show Details button. Take a full window screenshot that includes the date/time of the report and the date/time area of the VM’s taskbar. Refer to the example below. Title: Screenshot Example - Description: A screenshot of a Nessus report with the words "general scan" and the date/time area of the report highlighted Note: This portion of the background paper also helps determine that your submission is unique. Thus, you must include the specific screenshot as seen below or your project will not be accepted.

<insert screenshot here>

Part 2: The Business Case

Keep these issues in mind as you address the two questions below: Think back to the video from Mercury USA’s CEO. What were his main areas of concern?What is the industry/function of the organization? What kinds of data might be important to the organization?  

What is your assessment of the Mercury USA’s overall current security posture? What information in the vulnerability scans supports your assessment?

Based on the vulnerabilities present in the reports and the information available about them, what threats might an adversary or black hat hacker try to use against the organization to exfiltrate data or hold it for ransom?

Part 3: Nessus Purchase Recommendation

State your case for your recommendation of the Nessus commercial vulnerability scanner. Be sure to address the following questions:

  • Do you think the overall presentation and scoring features are adequate for technical professionals? 
  • How can this tool help Mercury USA comply with regulatory and standards requirements?
  • What is the cost to license the tool? Does the usability, support, and efficacy of the tool warrant the cost?
  • Do you think the Nessus report is understandable/suitable for management? Explain why or why not.
  • Would you recommend that Mercury USA purchase the tool? Provide your rationale for this recommendation.


Provide a conclusion of at least a paragraph summarizing your analysis of the Nessus vulnerability report, your purchase recommendation, and why your purchase recommendation is beneficial for employees, management, and the organization.


Use in-text citations in the body of your memorandum as appropriate. Add all sources you used here. This example citation uses IEEE style. Use a style of your choice or ask your instructor for clarification. When using the associated course content, ensure you cite to the chapter level. An example IEEE citation is provided below for your reference.

[1] “Chapter 5: Implementing an Information Security Vulnerability Management Process”, Pearson CompTIA Cybersecurity Analyst (CySA+), 2020. [Online]. Available: https://www.ucertify.com/. [Accessed: 28- Apr- 2020].

Research Paper 101
Calculate your paper price
Pages (550 words)
Approximate price: -

Reasons to trust Research Paper 101

On Time Delivery

We pride ourselves in meeting the deadlines of our customers. We take your order, assign a writer but allow some more time for ourselves to edit the paper before delivering to you. You are guaranteed a flawless paper on a timely manner...

24x7 Customer Live Support

Our team at Research Paper 101 is committed to handling your paper according to the specfications and are available 24*7 for communication. Whenever you need a quick help, you can talk to our writers via the system messaging or contact support via live chat and we will deliver your message instantly.

Experienced Subject Experts

Online Experts from Research Paper 101 are qualified both academically and in their experiences. Many are Masters and Phd holders and therefore, are qualified to handle complex assignments that require critical thinking and analyses...

Customer Satisfaction

We offer dissertation papers as per students’ wishes. We also help craft out the best topics and design concept papers. By ordering with us, you are guaranteed of defending and making through those hard faced professors in the defense panel!

100% Plagiarism Free

We at Research Paper 101 take plagiarism as a serious offence. From the start, we train our writers to write all their papers from scratch. We also check if the papers have been cited appropriately. Our website also has a tool designed to check for plagiarism that has been made erroniusly. In essense, the paper you get will be 100% legit...

Affordable Prices

We understand that being a student is very challenging, some students balance between work and studies in order to survive. We therefore offer pocket friendly rates that are very competitive in the market.

Try it now!

Calculate the price of your order

Total price:

How it works?

Follow these simple steps to get your paper done

Place your order

Fill in the order form and provide all details of your assignment.

Proceed with the payment

Choose the payment system that suits you most.

Receive the final file

Once your paper is ready, we will email it to you.

Our Services

No need to work on your paper at night. Sleep tight, we will cover your back. We offer all kinds of writing services.


Essay Writing Service

No matter what kind of academic paper you need and how urgent you need it, you are welcome to choose your academic level and the type of your paper at an affordable price. We take care of all your paper needs and give a 24/7 customer care support system.


Admission Essays & Business Writing Help

An admission essay is an essay or other written statement by a candidate, often a potential student enrolling in a college, university, or graduate school. You can be rest assurred that through our service we will write the best admission essay for you.


Editing Support

Our academic writers and editors make the necessary changes to your paper so that it is polished. We also format your document by correctly quoting the sources and creating reference lists in the formats APA, Harvard, MLA, Chicago / Turabian.


Revision Support

If you think your paper could be improved, you can request a review. In this case, your paper will be checked by the writer or assigned to an editor. You can use this option as many times as you see fit. This is free because we want you to be completely satisfied with the service offered.