Lab 15 Questions & Answers
docx
keyboard_arrow_up
School
Santa Fe College *
*We aren’t endorsed by this school
Course
CET1600
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
2
Uploaded by BaronTurtleMaster3907
1.
Highlight which kind of pod the lab was done in NetLab:
Network Security
Security+
2.
Provide the lab # in NetLab.
Lab #: 15
3.
What is the name of the lab in NetLab you completed?
Name of the Lab
: Implementing Common Protocols and Services for Basic Security
Practices
Provide about 100-150 words as an answer for each question.
Make sure to explain specific
terminology from the lab and what protocols or configurations should be used to be more secure.
Each question
’
s answer should have new information (i.e. don
’
t just restate the same thing in
each).
4.
Provide one screenshot from the lab. Explain with specific details how this
screenshot captures the purpose of the lab. Make sure you reference the
information in the screenshot specifically (may want to circle or highlight relevant
information in it).
In the provided screenshot, there are a total of 11 tabs, each containing vital information
necessary for the proper setup and operation of the proxy server. These tabs encompass a
comprehensive range of details, from specifying the required ports for access to
configuring essential security settings that are paramount for the proxy to function
efficiently and securely. Additionally, this setup allows for the fine-grained control of
user permissions, ensuring that individuals accessing the proxy server have precisely the
level of access to user information that is required, and no more.
5.
What did you learn in completing the lab? If you don't feel you learned anything,
explain how it would be useful to someone who hasn't done something similar. Make
sure to provide specifics examples (i.e. if providing a Linux command, make sure to
provide the command and explain what the command does).
The commands I learned in this exercise covered:
openssl: This is the command for OpenSSL, a versatile open-source toolkit for SSL/TLS
and cryptographic tasks.
req: Within OpenSSL, the req subcommand is pivotal for Certificate Signing Requests
(CSRs) and certificate management.
-new: Utilizing the -new flag signifies the intention to create a fresh CSR, not renewing
or altering an existing one.
-key server.key: This portion designates the private key file, such as "server.key," which
plays a crucial role in CSR generation, proving control over the associated domain or
entity.
-out server.csr: The -out parameter specifies the output location, saving the generated
CSR as "server.csr."
These commands are fundamental for generating CSRs and obtaining SSL/TLS
certificates, ensuring secure server communication.
6.
What did you have to research to better understand the lab?
Explain what you
researched and what you learned from it (provide specifics such as providing the
Linux command and explanation of what it does).
If you didn’t have to research
anything, research something related to the lab you are interested in and explain
what you learned from it making sure to provide specifics.
I researched how to set up website certificates, which are crucial for establishing a
website's digital identity on the internet. When visiting a website, ensuring it's genuine
and not fraudulent is vital, and SSL/TLS certificates play a key role.
These certificates function as digital ID cards issued by trusted Certificate Authorities
(CAs), confirming a website's legitimacy. Here's a simplified explanation:
SSL/TLS certificates provide two main benefits:
Authentication: They validate a website's identity. When you visit a secure site, your
browser checks the certificate to ensure it matches the site's name, indicating
trustworthiness.
Encryption: Certificates enable secure communication by encrypting data between your
computer and the website. Sensitive information like passwords becomes a secret code
only your computer and the site can understand.
This newfound knowledge significantly enhanced my understanding of the exercise's
conclusion.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help