Lab Questions
docx
keyboard_arrow_up
School
Santa Fe College *
*We aren’t endorsed by this school
Course
CET1600
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
2
Uploaded by BaronTurtleMaster3907
1.
Highlight which kind of pod the lab was done in NetLab:
Network Security
Security+
2.
Provide the lab # in NetLab.
Lab #: 22
3.
What is the name of the lab in NetLab you completed?
Name of the Lab
:
Capturing Network Traffic
Provide about 100-150 words as an answer for each question.
Make sure to explain specific
terminology from the lab and what protocols or configurations should be used to be more secure.
Each question
’
s answer should have new information (i.e. don
’
t just restate the same thing in
each).
4.
Provide one screenshot from the lab. Explain with specific details how this
screenshot captures the purpose of the lab. Make sure you reference the
information in the screenshot specifically (may want to circle or highlight relevant
information in it).
Wireshark is a robust open-source network protocol analyzer that excels at capturing and
meticulously examining data packets in real-time on computer networks. It serves as an
indispensable tool for network professionals, enabling them to address network irregularities,
closely oversee network operations, and conduct in-depth analysis of security incidents by
providing detailed insights into network traffic.
For instance, in the illustrative example above, one can observe a cluster of IPs within the
network landscape. By skillfully implementing filters, such as focusing on the File Transfer
Protocol (FTP), one can expertly sift through the network traffic, pinpointing the precise
origin of these packets. This proficiency allows us to deduce the source and destination of
data transfers, contributing significantly to network analysis and troubleshooting efforts.
5.
What did you learn in completing the lab? If you don't feel you learned anything,
explain how it would be useful to someone who hasn't done something similar. Make
sure to provide specifics examples (i.e. if providing a Linux command, make sure to
provide the command and explain what the command does).
Through completing the lab, I learned the following:
By executing the command tcpdump icmp ens192 -s 0 -w netcapture1.pcap -c 100, one can
effectively learn to capture specific network packets associated with the 'icmp' protocol on the
'ens192' interface. This command, broken down into its components, offers valuable insights:
tcpdump: Initiates the packet capture process.
icmp: Specifies the protocol to filter packets (in this case, ICMP).
ens192: Identifies the network interface to monitor.
-s 0: Sets the snapshot length to capture entire packets.
-w netcapture1.pcap: Specifies the output file name ('netcapture1.pcap') to save captured packets.
-c 100: Limits the capture to the first 100 packets encountered.
This knowledge can be useful for those who haven't worked with such commands before. It
enables them to precisely capture and analyze network traffic related to a specific protocol on a
designated network interface, providing valuable insights into network behavior and
troubleshooting potential issues.
6.
What did you have to research to better understand the lab?
Explain what you
researched and what you learned from it (provide specifics such as providing the
Linux command and explanation of what it does).
If you didn’t have to research
anything, research something related to the lab you are interested in and explain
what you learned from it making sure to provide specifics.
In preparation for the lab, I thoroughly reviewed server management essentials. This included
revisiting Server Manager, a vital Windows server administration tool. I also examined various
server types, such as file, web, and database servers, each with its unique configurations for
optimal performance.
Much of my research focused on user roles and permissions, covering user account creation,
access level assignments, and detailed file permissions, including NTFS and share permissions.
Additionally, I delved into security best practices like password policies, account lockouts, and
firewall settings, emphasizing the importance of safeguarding server resources and data.
This thorough preparation equips me with the knowledge and confidence to manage servers,
allocate user roles, and establish permissions effectively in the lab.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help