CYB 230 Module Three Lab Worksheet
docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
230
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
5
Uploaded by SuperKoala931
1
3-2 Lab Worksheet
Chris Lawton
Southern New Hampshire University
CYB 230: Operating System Security
Dr. Casey R. Morganelli
March 19, 2023
2
CYB 230 Module Three Lab Worksheet
Complete this worksheet by replacing the bracketed phrases in the Response column with the relevant information.
Lab: Basic Network Configuration
Prompt
Response
In the lab section “Configuring a Centos Network Interface Manually
With the Networkmanager Service,”
Step 9
, insert your name at the
command line below the output and include it in your screenshot.
3
Prompt
Response
In the lab section “Configuring a Centos Network Interface Manually
With the Network Service,”
Step 14
, insert your name at the
command line below the output and include it in your screenshot.
At the end of
Step 19
in “Configuring a Centos Network Interface
Manually With the Network Service,” you are asked to resolve the
addresses for three different names that all result in the same IP
address. Which version would you find most useful? Explain why.
The version I found most helpful was using the cserver.example.com.
This will remove the need to remember IP addresses and will provide
the domain. This will help me to resolve the IP or get the IP address
through the host command.
Lab: Network Security—Firewalls
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
4
Prompt
Response
In the lab section “Configure Windows Firewall With Advanced
Security Using Administrative Tools,”
Step 12
, insert your name at the
command line below the output and include it in your screenshot.
Explain why it is not necessary to create an inbound rule on the
internal 192.168.12.10 Windows server so that it can receive the
response (ICMP echo reply) from the internal 192.168.12.11 Windows
server.
Both are connected to the same network and the firewall rule was
put in place on the .11 so the inbound rule is not required due to
traffic already being trusted between the two devices.
Explain the advantages and disadvantages of having the firewall
disabled at startup in the Linux operating system.
Disabling the firewall at startup could allow for quicker startup time
and work as all programs will be able to function properly without any
denials. Major disadvantage would be that the device would be open
for threats as soon as you start it up. Although you lose the drawback
of speed, it is very important to always keep your firewall active and
running.
Lab: Implementing Security Policies on Windows and Linux
5
Prompt
Response
In the lab section “Securing the Windows Logon Process,”
Step 17
,
modify “Warning!” to “Warning - [YOUR NAME]”. Provide a
screenshot of the output of
Step 19
.
In the lab section “Auditing Logon Failures,”
Step 23
, provide a
screenshot of the output.
What is the importance of automating system checks and log file
creation for server management?
Automating system checks and log file creation can help to identify
security concerns if something were to arise or track errors. This
could help with the assistance of finding when a security breach took
place.