CYB 230 Module Three Lab Worksheet Brandon Meadows 4
.docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
230
Subject
Computer Science
Date
Jun 10, 2024
Type
docx
Pages
3
Uploaded by BrigadierMeerkatMaster1059
CYB 230 Module Three Lab Worksheet
Complete this worksheet by replacing the bracketed phrases in the Response column with the relevant information.
Lab: Basic Network Configuration
Prompt
Response
In the lab section “Configuring a Centos Network Interface Manually With the Networkmanager Service,” Step 9
, insert your name at the command line below the output and include it in your screenshot.
In the lab section “Configuring a Centos Network Interface Manually With the Network Service,” Step 14
, insert your name at the command line below the output and include it in your screenshot.
Prompt
Response
At the end of Step 19
in “Configuring a Centos Network Interface Manually With the Network Service,” you are asked to resolve the addresses for three different names that all result in the same IP address. Which version would you find most useful? Explain why.
I believe the first version is more useful and most preferred. Due to it being a group of letters that configure into words that we understand, it is a lot easier for us to remember.
Lab: Network Security—Firewalls
Prompt
Response
In the lab section “Configure Windows Firewall With Advanced Security Using Administrative Tools,” Step 12
, insert your name at the
command line below the output and include it in your screenshot.
Explain why it is not necessary to create an inbound rule on the internal 192.168.12.10 Windows server so that it can receive the response (ICMP echo reply) from the internal 192.168.12.11 Windows server.
When establishing a new inbound rule on the internal 192.168.12.10 Windows server for ICMP echo replies are not required due to stateful firewalls that will automatically allow return traffic for established connections based on connection tracking.
Explain the advantages and disadvantages of having the firewall disabled at startup in the Linux operating system.
Advantages:
A simplified configuration. Not as complex. Reduced resource overhead.
Disadvantages: More security risks. Loss of network isolation. No application filtering.
Less protection in complex situations. Lab: Implementing Security Policies on Windows and Linux
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Photo Gallery Scenario
Develop a System Sequence Diagram for the scenario below:
A user enters a website’s address to the system.
If the address is correct, the system takes the user to the main page.
If the user enters an incorrect address the system displays an error message.
The user selects the photo gallery option from the main page.
From the photo gallery page, the user selects a photo by the photo’s name.
According to the website’s configuration, it takes 5 seconds for the system to display any selected photo.
If the time limit is not exceeded, the system displays the photo.
If the time limit is exceeded, the system displays photo not available.
The user can request to destroy the interaction with the photo gallery page.
Note: The photo selection process can be repeated.
DIAGRAM
arrow_forward
In order to complete the term project for your introductory engineering class, you will need to create a PowerPoint presentation of a certain length and deliver it to the class at the time and date specified by your professor.
arrow_forward
An ACL is list attached to a resource, giving permissions, or rules about exactly who can access it.
True
False
arrow_forward
Draw level 1 DFD of the given scenario.
Mention your brain storming as well before the
drawing. A web based software for an online
book store is to be developed when a valid
customer logon to the site a list of available
books is displayed. When the customer selects
the required book a form will be displayed that
will take input the credit card number and
other necessary information of the user.
After submission of the form by the customer
the validity of the credit card is ensured by a
banking system (external to the system). The
valid orders are passed to the shipment
department and an email is sent to the
customer that his order is being shipped.
arrow_forward
The user support layers consist of sessions, presentations, and programmes. How?
arrow_forward
Create Functional and Non-Functional requirements for the following system:
A parking deck system manages an entry/exit gate, which opens to let a vehicle (i.e., car) into or out of the deck and closes when the car has passed through. A driver must push a button to print a parking permit. When the driver takes the parking permit, the system raises the gate. The system lowers the gate after the vehicle has passed through. A permit id and time of entry is printed on the parking permit, and is also encoded on the permit’s bar code. When the vehicle leaves the parking deck, the driver inserts the parking permit into a bar code reader, which scans the bar code, and then transmits the bar code to the parking system. The parking system calculates a fee that is based on the number of hours that have elapsed since the vehicle entered the parking deck, and displays the fee to the operator and driver. The driver must pay the operator with cash or check. The operator accepts the payment, and if…
arrow_forward
Define Configuration Control.
arrow_forward
login role id
login usenmame
login id
user password
Login
user id
user name
role id
user mobile
Has
role name
user email
role desc
per id
user address
Permiion
per role ld
per name
per module
Manage
upld name
upld id
wp img id
med desc
upld img-id
wp id
med type
wall papers
upleads
upld type
wp type
wp desc
Has
med title
ed id
upid desc
wp name
med name
upid date
img dese
img id
img type
Your task for this week is to create SQL query to develop a table for PERMISSION
schema also add all the necessary constraints according to the given database
schema.
arrow_forward
Project 6-3: Contact Manager
Create a program that a user can use to manage the primary email address and phone number for a
contact.
Console
Contact Manager
COMMAND MENU
list - Display all contacts
view - View a contact
add - Add a contact
del - Delete a contact
exit Exit program
Command: list
1. Guido van Rossum
2. Eric Idle
Command: view
Number: 2
Name: Eric Idle
Email: eric@ericidle.com
Phone: +44 20 7946 0958
Command: add
Name: Mike Murach
Email: mike@murach.com
Phone: 559-123-4567
Mike Murach was added.
Command: del
Number: 1
Guido van Rossum was deleted.
Command: list
1. Eric Idle
2. Mike Murach
Command: exit
Bye!
Specifications
•
Use a list of lists to store the data for the contacts. Provide starting data for two or more contacts.
•
For the view and del commands, display an error message if the user enters an invalid contact
number.
When you exit the program, all changes that you made to the contact list are lost.
arrow_forward
Instruction: First, read the scenario in the image then answer the following question.
Question1 :
You are recommending that the team make use of the Adaptive Approach to the SDLC. How can this approach be applied to the Harbour Management System project?
arrow_forward
The unit used for text size is in Android is
Select one:
a. dp
b. rm
C. px
O d. sp
arrow_forward
Er diagram to er model
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage
Related Questions
- Photo Gallery Scenario Develop a System Sequence Diagram for the scenario below: A user enters a website’s address to the system. If the address is correct, the system takes the user to the main page. If the user enters an incorrect address the system displays an error message. The user selects the photo gallery option from the main page. From the photo gallery page, the user selects a photo by the photo’s name. According to the website’s configuration, it takes 5 seconds for the system to display any selected photo. If the time limit is not exceeded, the system displays the photo. If the time limit is exceeded, the system displays photo not available. The user can request to destroy the interaction with the photo gallery page. Note: The photo selection process can be repeated. DIAGRAMarrow_forwardIn order to complete the term project for your introductory engineering class, you will need to create a PowerPoint presentation of a certain length and deliver it to the class at the time and date specified by your professor.arrow_forwardAn ACL is list attached to a resource, giving permissions, or rules about exactly who can access it. True Falsearrow_forward
- Draw level 1 DFD of the given scenario. Mention your brain storming as well before the drawing. A web based software for an online book store is to be developed when a valid customer logon to the site a list of available books is displayed. When the customer selects the required book a form will be displayed that will take input the credit card number and other necessary information of the user. After submission of the form by the customer the validity of the credit card is ensured by a banking system (external to the system). The valid orders are passed to the shipment department and an email is sent to the customer that his order is being shipped.arrow_forwardThe user support layers consist of sessions, presentations, and programmes. How?arrow_forwardCreate Functional and Non-Functional requirements for the following system: A parking deck system manages an entry/exit gate, which opens to let a vehicle (i.e., car) into or out of the deck and closes when the car has passed through. A driver must push a button to print a parking permit. When the driver takes the parking permit, the system raises the gate. The system lowers the gate after the vehicle has passed through. A permit id and time of entry is printed on the parking permit, and is also encoded on the permit’s bar code. When the vehicle leaves the parking deck, the driver inserts the parking permit into a bar code reader, which scans the bar code, and then transmits the bar code to the parking system. The parking system calculates a fee that is based on the number of hours that have elapsed since the vehicle entered the parking deck, and displays the fee to the operator and driver. The driver must pay the operator with cash or check. The operator accepts the payment, and if…arrow_forward
- Define Configuration Control.arrow_forwardlogin role id login usenmame login id user password Login user id user name role id user mobile Has role name user email role desc per id user address Permiion per role ld per name per module Manage upld name upld id wp img id med desc upld img-id wp id med type wall papers upleads upld type wp type wp desc Has med title ed id upid desc wp name med name upid date img dese img id img type Your task for this week is to create SQL query to develop a table for PERMISSION schema also add all the necessary constraints according to the given database schema.arrow_forwardProject 6-3: Contact Manager Create a program that a user can use to manage the primary email address and phone number for a contact. Console Contact Manager COMMAND MENU list - Display all contacts view - View a contact add - Add a contact del - Delete a contact exit Exit program Command: list 1. Guido van Rossum 2. Eric Idle Command: view Number: 2 Name: Eric Idle Email: eric@ericidle.com Phone: +44 20 7946 0958 Command: add Name: Mike Murach Email: mike@murach.com Phone: 559-123-4567 Mike Murach was added. Command: del Number: 1 Guido van Rossum was deleted. Command: list 1. Eric Idle 2. Mike Murach Command: exit Bye! Specifications • Use a list of lists to store the data for the contacts. Provide starting data for two or more contacts. • For the view and del commands, display an error message if the user enters an invalid contact number. When you exit the program, all changes that you made to the contact list are lost.arrow_forward
- Instruction: First, read the scenario in the image then answer the following question. Question1 : You are recommending that the team make use of the Adaptive Approach to the SDLC. How can this approach be applied to the Harbour Management System project?arrow_forwardThe unit used for text size is in Android is Select one: a. dp b. rm C. px O d. sparrow_forwardEr diagram to er modelarrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Np Ms Office 365/Excel 2016 I NtermedComputer ScienceISBN:9781337508841Author:CareyPublisher:Cengage
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage