Lab 15 Questions & Answers

docx

School

Santa Fe College *

*We aren’t endorsed by this school

Course

CET1600

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

2

Uploaded by BaronTurtleMaster3907

Report
1. Highlight which kind of pod the lab was done in NetLab: Network Security Security+ 2. Provide the lab # in NetLab. Lab #: 15 3. What is the name of the lab in NetLab you completed? Name of the Lab : Implementing Common Protocols and Services for Basic Security Practices Provide about 100-150 words as an answer for each question. Make sure to explain specific terminology from the lab and what protocols or configurations should be used to be more secure. Each question s answer should have new information (i.e. don t just restate the same thing in each). 4. Provide one screenshot from the lab. Explain with specific details how this screenshot captures the purpose of the lab. Make sure you reference the information in the screenshot specifically (may want to circle or highlight relevant information in it). In the provided screenshot, there are a total of 11 tabs, each containing vital information necessary for the proper setup and operation of the proxy server. These tabs encompass a comprehensive range of details, from specifying the required ports for access to configuring essential security settings that are paramount for the proxy to function efficiently and securely. Additionally, this setup allows for the fine-grained control of user permissions, ensuring that individuals accessing the proxy server have precisely the level of access to user information that is required, and no more. 5. What did you learn in completing the lab? If you don't feel you learned anything, explain how it would be useful to someone who hasn't done something similar. Make sure to provide specifics examples (i.e. if providing a Linux command, make sure to provide the command and explain what the command does). The commands I learned in this exercise covered: openssl: This is the command for OpenSSL, a versatile open-source toolkit for SSL/TLS and cryptographic tasks. req: Within OpenSSL, the req subcommand is pivotal for Certificate Signing Requests (CSRs) and certificate management.
-new: Utilizing the -new flag signifies the intention to create a fresh CSR, not renewing or altering an existing one. -key server.key: This portion designates the private key file, such as "server.key," which plays a crucial role in CSR generation, proving control over the associated domain or entity. -out server.csr: The -out parameter specifies the output location, saving the generated CSR as "server.csr." These commands are fundamental for generating CSRs and obtaining SSL/TLS certificates, ensuring secure server communication. 6. What did you have to research to better understand the lab? Explain what you researched and what you learned from it (provide specifics such as providing the Linux command and explanation of what it does). If you didn’t have to research anything, research something related to the lab you are interested in and explain what you learned from it making sure to provide specifics. I researched how to set up website certificates, which are crucial for establishing a website's digital identity on the internet. When visiting a website, ensuring it's genuine and not fraudulent is vital, and SSL/TLS certificates play a key role. These certificates function as digital ID cards issued by trusted Certificate Authorities (CAs), confirming a website's legitimacy. Here's a simplified explanation: SSL/TLS certificates provide two main benefits: Authentication: They validate a website's identity. When you visit a secure site, your browser checks the certificate to ensure it matches the site's name, indicating trustworthiness. Encryption: Certificates enable secure communication by encrypting data between your computer and the website. Sensitive information like passwords becomes a secret code only your computer and the site can understand. This newfound knowledge significantly enhanced my understanding of the exercise's conclusion.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help