CYB_230_Module_Three_Lab_Chris_Braccili
docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
230
Subject
Information Systems
Date
Feb 20, 2024
Type
docx
Pages
3
Uploaded by ColonelEel1513
Braccili
CYB 230 Module Three Lab Worksheet
Complete this worksheet by replacing the bracketed phrases in the Response column with the relevant information.
Lab: Basic Network Configuration
Prompt
Response
In the lab section “Configuring a Centos Network Interface Manually With the Networkmanager Service,” Step 9
, insert your name at the command line below the output and include it in your screenshot.
In the lab section “Configuring a Centos Network Interface Manually With the Network Service,” Step 14
, insert your name at the command line below the output and include it in your screenshot.
Prompt
Response
At the end of Step 19
in “Configuring a Centos Network Interface Manually With the Network Service,” you are asked to resolve the addresses for three different names that all result in the same IP address. Which version would you find most useful? Explain why.
The 1
st
one because it felt less tedious and it felt easier to do.
Lab: Network Security—Firewalls
Prompt
Response
In the lab section “Configure Windows Firewall With Advanced Security Using Administrative Tools,” Step 12
, insert your name at the
command line below the output and include it in your screenshot.
Explain why it is not necessary to create an inbound rule on the internal 192.168.12.10 Windows server so that it can receive the response (ICMP echo reply) from the internal 192.168.12.11 Windows server.
Because the fact that the servers are all connected to the exact same network
Explain the advantages and disadvantages of having the firewall disabled at startup in the Linux operating system.
The advantage would be it would be quicker because you don’t need to go through any authentication but obviously the disadvantage out ways everything because your obviously vulnerable to hackers.
Lab: Implementing Security Policies on Windows and Linux
Prompt
Response
In the lab section “Securing the Windows Logon Process,” Step 17
, modify “Warning!” to “Warning - [YOUR NAME]”. Provide a screenshot of the output of
Step 19
.
In the lab section “Auditing Logon Failures,” Step 23
, provide a screenshot of the output.
What is the importance of automating system checks and log file creation for server management?
It is important because it takes note of all activity so we know what’s going on if a problem comes we can take a look and solve it
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help