CYB_230_Module_Three_Lab_Worksheet

docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

230

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

5

Uploaded by DrTree1894

Report
CYB 230 Module Three Lab Worksheet Complete this worksheet by replacing the bracketed phrases in the Response column with the relevant information. Lab: Basic Network Configuration Prompt Response In the lab section “Configuring a Centos Network Interface Manually With the Networkmanager Service,” Step 9 , insert your name at the command line below the output and include it in your screenshot.
Prompt Response In the lab section “Configuring a Centos Network Interface Manually With the Network Service,” Step 14 , insert your name at the command line below the output and include it in your screenshot. At the end of Step 19 in “Configuring a Centos Network Interface Manually With the Network Service,” you are asked to resolve the addresses for three different names that all result in the same IP address. Which version would you find most useful? Explain why. Lab: Network Security—Firewalls
Prompt Response In the lab section “Configure Windows Firewall With Advanced Security Using Administrative Tools,” Step 12 , insert your name at the command line below the output and include it in your screenshot. Explain why it is not necessary to create an inbound rule on the internal 192.168.12.10 Windows server so that it can receive the response (ICMP echo reply) from the internal 192.168.12.11 Windows server. When communication occurs between two devices on the same local network there is generally no need to create an inbound rule on the receiving server (192.168.12.10) to allow the response from the sending server (192.168.12.11). The reason for this is that local network communication happens at the data-link layer and the network layer, rather than passing through the Windows Firewall, which is typically responsible for handling inbound and outbound traffic from external networks. Explain the advantages and disadvantages of having the firewall disabled at startup in the Linux operating system. Disabling the firewall at startup in a Linux OS offers simplicity, reduced resource usage, and avoids false positives. However, it exposes the system to security risks, lacks control over network traffic, increases the attack surface, and may lead to compliance issues. Lab: Implementing Security Policies on Windows and Linux
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Prompt Response In the lab section “Securing the Windows Logon Process,” Step 17 , modify “Warning!” to “Warning - [YOUR NAME]”. Provide a screenshot of the output of Step 19 . In the lab section “Auditing Logon Failures,” Step 23 , provide a screenshot of the output.
Prompt Response What is the importance of automating system checks and log file creation for server management? Automation optimizes resource usage, aids in compliance reporting, and simplifies troubleshooting through detailed logs. It facilitates scalability, ensures standardization, and enhances overall system reliability.