CYB_230_Module_Three_Lab_Worksheet
docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
230
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
5
Uploaded by DrTree1894
CYB 230 Module Three Lab Worksheet
Complete this worksheet by replacing the bracketed phrases in the Response column with the relevant information.
Lab: Basic Network Configuration
Prompt
Response
In the lab section “Configuring a Centos Network Interface Manually
With the Networkmanager Service,”
Step 9
, insert your name at the
command line below the output and include it in your screenshot.
Prompt
Response
In the lab section “Configuring a Centos Network Interface Manually
With the Network Service,”
Step 14
, insert your name at the
command line below the output and include it in your screenshot.
At the end of
Step 19
in “Configuring a Centos Network Interface
Manually With the Network Service,” you are asked to resolve the
addresses for three different names that all result in the same IP
address. Which version would you find most useful? Explain why.
Lab: Network Security—Firewalls
Prompt
Response
In the lab section “Configure Windows Firewall With Advanced
Security Using Administrative Tools,”
Step 12
, insert your name at the
command line below the output and include it in your screenshot.
Explain why it is not necessary to create an inbound rule on the
internal 192.168.12.10 Windows server so that it can receive the
response (ICMP echo reply) from the internal 192.168.12.11 Windows
server.
When communication occurs between two devices on the same local
network there is generally no need to create an inbound rule on the
receiving server (192.168.12.10) to allow the response from the
sending server (192.168.12.11). The reason for this is that local
network communication happens at the data-link layer and the
network layer, rather than passing through the Windows Firewall,
which is typically responsible for handling inbound and outbound
traffic from external networks.
Explain the advantages and disadvantages of having the firewall
disabled at startup in the Linux operating system.
Disabling the firewall at startup in a Linux OS offers simplicity, reduced
resource usage, and avoids false positives. However, it exposes the
system to security risks, lacks control over network traffic, increases
the attack surface, and may lead to compliance issues.
Lab: Implementing Security Policies on Windows and Linux
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Prompt
Response
In the lab section “Securing the Windows Logon Process,”
Step 17
,
modify “Warning!” to “Warning - [YOUR NAME]”. Provide a
screenshot of the output of
Step 19
.
In the lab section “Auditing Logon Failures,”
Step 23
, provide a
screenshot of the output.
Prompt
Response
What is the importance of automating system checks and log file
creation for server management?
Automation optimizes resource usage, aids in compliance reporting,
and simplifies troubleshooting through detailed logs. It facilitates
scalability, ensures standardization, and enhances overall system
reliability.