CYB 230 Mod Three Lab Worksheet

docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

230

Subject

Information Systems

Date

Feb 20, 2024

Type

docx

Pages

4

Uploaded by ISSIT_Learn

Report
CYB 230 Module Three Lab Worksheet Complete this worksheet by replacing the bracketed phrases in the Response column with the relevant information. Lab: Basic Network Configuration Prompt Response In the lab section “Configuring a Centos Network Interface Manually With the Networkmanager Service,” Step 9 , insert your name at the command line below the output and include it in your screenshot. [ ] In the lab section “Configuring a Centos Network Interface Manually With the Network Service,” Step 14 , insert your name at the command line below the output and include it in your screenshot. [ ]
Prompt Response At the end of Step 19 in “Configuring a Centos Network Interface Manually With the Network Service,” you are asked to resolve the addresses for three different names that all result in the same IP address. Which version would you find most useful? Explain why. [I believe that using the name that contains the domain suffix is best course of action because it will ensure that the result that is provided is exactly what I am looking for. If I used the address without the suffix, the result could have been a .org, .net, .gov, or any other domain with that address name.] Lab: Network Security—Firewalls Prompt Response In the lab section “Configure Windows Firewall With Advanced Security Using Administrative Tools,” Step 12 , insert your name at the command line below the output and include it in your screenshot. [ ] Explain why it is not necessary to create an inbound rule on the internal 192.168.12.10 Windows server so that it can receive the response (ICMP echo reply) from the internal 192.168.12.11 Windows server. [It is not necessary for an inbound rule to be created on 192.168.12.10 to communicate with 192.168.12.11 because in the lab we created a firewall rule that allowed the two machines to communicate with each other on the 192.168.12.11 server and both computers are on the same network. ]
Prompt Response Explain the advantages and disadvantages of having the firewall disabled at startup in the Linux operating system. [Having an active, working, and correctly configured host-based firewall is very beneficial to any operating system. It controls the incoming and outgoing traffic on the system it is installed in and helps prevent the spread of malware. The Linux operating system does not automatically activate the firewall when it runs the boot cycle. Once the computers has booted, you can start the firewall but it will not protect anything because you have to add the rules/exceptions after activating it. There are no advantages of having a disabled firewall at startup. Furthermore, not having a working firewall at startup allows malicious traffic that can compromise the system to enter freely. Once the system has been compromised, activating the firewall may not do anything for protection as the firewall software may have also been compromised. ] Lab: Implementing Security Policies on Windows and Linux Prompt Response In the lab section “Securing the Windows Logon Process,” Step 17 , modify “Warning!” to “Warning - [YOUR NAME]”. Provide a screenshot of the output of Step 19 . [ ]
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Prompt Response In the lab section “Auditing Logon Failures,” Step 23 , provide a screenshot of the output. [ ] What is the importance of automating system checks and log file creation for server management? [System checks and log files can include a large amount of data and take up a significant amount of space on your system. Reviewing these files can be time consuming. Automating systems check and log file creation improves security performance by using rules to point out specific events that might represent problems or threats. This allows an administrator to review these files while still being able to conduct his routine duties. ]