CYB 230 Module Three Lab Worksheet Brandon Meadows 4

.docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

230

Subject

Computer Science

Date

Jun 10, 2024

Type

docx

Pages

3

Uploaded by BrigadierMeerkatMaster1059

CYB 230 Module Three Lab Worksheet Complete this worksheet by replacing the bracketed phrases in the Response column with the relevant information. Lab: Basic Network Configuration Prompt Response In the lab section “Configuring a Centos Network Interface Manually With the Networkmanager Service,” Step 9 , insert your name at the command line below the output and include it in your screenshot. In the lab section “Configuring a Centos Network Interface Manually With the Network Service,” Step 14 , insert your name at the command line below the output and include it in your screenshot.
Prompt Response At the end of Step 19 in “Configuring a Centos Network Interface Manually With the Network Service,” you are asked to resolve the addresses for three different names that all result in the same IP address. Which version would you find most useful? Explain why. I believe the first version is more useful and most preferred. Due to it being a group of letters that configure into words that we understand, it is a lot easier for us to remember. Lab: Network Security—Firewalls Prompt Response In the lab section “Configure Windows Firewall With Advanced Security Using Administrative Tools,” Step 12 , insert your name at the command line below the output and include it in your screenshot. Explain why it is not necessary to create an inbound rule on the internal 192.168.12.10 Windows server so that it can receive the response (ICMP echo reply) from the internal 192.168.12.11 Windows server. When establishing a new inbound rule on the internal 192.168.12.10 Windows server for ICMP echo replies are not required due to stateful firewalls that will automatically allow return traffic for established connections based on connection tracking. Explain the advantages and disadvantages of having the firewall disabled at startup in the Linux operating system. Advantages: A simplified configuration. Not as complex. Reduced resource overhead. Disadvantages: More security risks. Loss of network isolation. No application filtering. Less protection in complex situations. Lab: Implementing Security Policies on Windows and Linux
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help