Lab Questions

docx

School

Santa Fe College *

*We aren’t endorsed by this school

Course

CET1600

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

2

Uploaded by BaronTurtleMaster3907

Report
1. Highlight which kind of pod the lab was done in NetLab: Network Security Security+ 2. Provide the lab # in NetLab. Lab #: 22 3. What is the name of the lab in NetLab you completed? Name of the Lab : Capturing Network Traffic Provide about 100-150 words as an answer for each question. Make sure to explain specific terminology from the lab and what protocols or configurations should be used to be more secure. Each question s answer should have new information (i.e. don t just restate the same thing in each). 4. Provide one screenshot from the lab. Explain with specific details how this screenshot captures the purpose of the lab. Make sure you reference the information in the screenshot specifically (may want to circle or highlight relevant information in it). Wireshark is a robust open-source network protocol analyzer that excels at capturing and meticulously examining data packets in real-time on computer networks. It serves as an indispensable tool for network professionals, enabling them to address network irregularities, closely oversee network operations, and conduct in-depth analysis of security incidents by providing detailed insights into network traffic. For instance, in the illustrative example above, one can observe a cluster of IPs within the network landscape. By skillfully implementing filters, such as focusing on the File Transfer Protocol (FTP), one can expertly sift through the network traffic, pinpointing the precise origin of these packets. This proficiency allows us to deduce the source and destination of data transfers, contributing significantly to network analysis and troubleshooting efforts. 5. What did you learn in completing the lab? If you don't feel you learned anything, explain how it would be useful to someone who hasn't done something similar. Make
sure to provide specifics examples (i.e. if providing a Linux command, make sure to provide the command and explain what the command does). Through completing the lab, I learned the following: By executing the command tcpdump icmp ens192 -s 0 -w netcapture1.pcap -c 100, one can effectively learn to capture specific network packets associated with the 'icmp' protocol on the 'ens192' interface. This command, broken down into its components, offers valuable insights: tcpdump: Initiates the packet capture process. icmp: Specifies the protocol to filter packets (in this case, ICMP). ens192: Identifies the network interface to monitor. -s 0: Sets the snapshot length to capture entire packets. -w netcapture1.pcap: Specifies the output file name ('netcapture1.pcap') to save captured packets. -c 100: Limits the capture to the first 100 packets encountered. This knowledge can be useful for those who haven't worked with such commands before. It enables them to precisely capture and analyze network traffic related to a specific protocol on a designated network interface, providing valuable insights into network behavior and troubleshooting potential issues. 6. What did you have to research to better understand the lab? Explain what you researched and what you learned from it (provide specifics such as providing the Linux command and explanation of what it does). If you didn’t have to research anything, research something related to the lab you are interested in and explain what you learned from it making sure to provide specifics. In preparation for the lab, I thoroughly reviewed server management essentials. This included revisiting Server Manager, a vital Windows server administration tool. I also examined various server types, such as file, web, and database servers, each with its unique configurations for optimal performance. Much of my research focused on user roles and permissions, covering user account creation, access level assignments, and detailed file permissions, including NTFS and share permissions. Additionally, I delved into security best practices like password policies, account lockouts, and firewall settings, emphasizing the importance of safeguarding server resources and data. This thorough preparation equips me with the knowledge and confidence to manage servers, allocate user roles, and establish permissions effectively in the lab.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help