Exploring_the_Seven_Domains_of_a_Typical_IT_Infrastructure_4e_-_Alejandro_Benavides
pdf
keyboard_arrow_up
School
American Military University *
*We aren’t endorsed by this school
Course
422
Subject
Information Systems
Date
Apr 3, 2024
Type
Pages
20
Uploaded by mrvidez
Exploring the Seven Domains of a Typical IT Infrastructure (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 01
Student:
Email:
Alejandro Benavides
alejandro.benavides@mycampus.apus.edu
Time on Task:
Progress:
14 hours, 45 minutes
100%
Report Generated:
Friday, February 9, 2024 at 12:12 AM
Section 1: Hands-On Demonstration
Part 1: Explore the Workstation Domain
4.
Make screen capture showing the Sign-in options for Alice’s account
.
Page 1 of 20
Exploring the Seven Domains of a Typical IT Infrastructure (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 01
7.
Make a screen capture
showing the View configured update policies page
.
14.
Make a screen capture showing the Virus & Threat Protection Settings
.
Page 2 of 20
Exploring the Seven Domains of a Typical IT Infrastructure (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 01
18.
Make a screen capture showing the security warning from attempting to run an
executable file
.
24.
Make a screen capture
showing the blocked attachment message
.
Page 3 of 20
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Exploring the Seven Domains of a Typical IT Infrastructure (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 01
28.
Make a screen capture
showing a successful connection to the adodson user folder
.
29.
Make a screen capture
showing a failed connection to another user folder
.
Page 4 of 20
Exploring the Seven Domains of a Typical IT Infrastructure (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 01
31.
Make a screen capture
showing a successful connection to the Marketing shared folder
.
32.
Make a screen capture
showing a failed connection to another shared folder
.
Part 2: Explore the LAN Domain
Page 5 of 20
Exploring the Seven Domains of a Typical IT Infrastructure (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 01
5.
Make a screen capture
showing the vWorkstation’s original ARP table
.
10.
Make a screen capture
showing the vWorkstation's updated ARP table.
Page 6 of 20
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Exploring the Seven Domains of a Typical IT Infrastructure (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 01
20.
Make a screen capture showing the Switch01 forwarding table
.
30.
Make a screen capture
showing the contents of the Employees directory
.
Part 3: Explore the LAN-to-WAN Domain
Page 7 of 20
Exploring the Seven Domains of a Typical IT Infrastructure (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 01
6.
Make a screen capture
showing the Outbound NAT settings
.
9.
Make a screen capture showing the
permissive LAN rules
.
Page 8 of 20
Exploring the Seven Domains of a Typical IT Infrastructure (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 01
12.
Make a screen capture showing the Static Routes page
.
16.
Make a screen capture
showing the result of your tracert to the pfsense-dc appliance
.
Page 9 of 20
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Exploring the Seven Domains of a Typical IT Infrastructure (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 01
22.
Make a screen capture
showing the Port Forward rules for the web server
.
25.
Make a screen capture
showing the DMZ firewall rules
.
Page 10 of 20
Exploring the Seven Domains of a Typical IT Infrastructure (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 01
Section 2: Applied Learning
Part 1: Explore the WAN Domain
5.
Make a screen capture showing the static route for the point-to-point connection
.
Page 11 of 20
Exploring the Seven Domains of a Typical IT Infrastructure (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 01
9.
Make a screen capture showing the BPG neighbor ping results
.
12.
Make a screen capture showing the traceroute to the file server
.
Part 2: Explore the Remote Access Domain
Page 12 of 20
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Exploring the Seven Domains of a Typical IT Infrastructure (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 01
9.
Make a screen capture
showing the successful connection to the email server
.
14.
Document whether the VPN connection is split tunnel or full tunnel, based on the tracert
results.
The VPN connection is split tunneling. Means some of the connection goes through the VPN and
some through the internet. 172.31.0.40 is going through the VPN and 203.30.340 is going through the
internet.
Page 13 of 20
Exploring the Seven Domains of a Typical IT Infrastructure (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 01
16.
Make a screen capture
showing the successful reverse DNS lookup for the internal host
.
Part 3: Explore the System/Application Domain
Page 14 of 20
Exploring the Seven Domains of a Typical IT Infrastructure (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 01
4.
Make a screen capture
showing the whoami results
.
10.
Make a screen capture
showing the members of the Developers AD group
.
Page 15 of 20
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Exploring the Seven Domains of a Typical IT Infrastructure (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 01
16.
Make a screen capture showing the password policy settings in the Group Policy
Management Console
.
20.
Make a screen capture
showing the DNS entries
.
Page 16 of 20
Exploring the Seven Domains of a Typical IT Infrastructure (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 01
28.
Make a screen capture
showing the Docker service status
.
31.
Make a screen capture
showing the juiceshop.com web page
.
Page 17 of 20
Exploring the Seven Domains of a Typical IT Infrastructure (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 01
36.
Make a screen capture showing the disks in the tank volume
.
Page 18 of 20
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Exploring the Seven Domains of a Typical IT Infrastructure (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 01
Section 3: Challenge and Analysis
Part 1: Explore the User Domain
Based on your research, identify
at least two compelling threats
to the User Domain and two
effective security controls
used to protect it. Be sure to cite your sources.
The two compelling threats to the User Domain are phishing attacks
and insider threats. The two effective security controls used to protect
the User Domain are user awareness training and access controls.
Divya Aradhya. (2018, April 13). What are three risks and threats of the user domain?
http://www.divyaaradhya.com/2018/01/15/what-are-three-risks-and-threats-of-the-user-domain/ Iainfoulds. (n.d.). Best practices for securing active directory
. Microsoft Learn. https://learn.microsoft.com/en
-us/windows-server/identity/ad-ds/plan/security-best-practices/best-practices-for-securing-active-
directory Part 2: Research Additional Security Controls
Page 19 of 20
Exploring the Seven Domains of a Typical IT Infrastructure (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 01
Based on your research, identify
security controls that could be implemented in the Workstation, LAN,
LAN-to-WAN, WAN, Remote Access, and System/Application Domains. Recommend
and explain
one security control for each domain. Be sure to cite your sources.
The recommended security controls for each domain are: Workstation
Domain - Antivirus software, LAN Domain - Firewalls, LAN-to-WAN
Domain - VPNs, WAN Domain - Intrusion detection systems, Remote
Access Domain - Multi-factor authentication, System/Application
Domain - Secure coding practices.
Dan Wand, M. (2020, June 30). Securing the seven domains of IT infrastructure
. LinkedIn.
https://www.linkedin.com/pulse/securing-seven-domains-infrastructure-dan-wand/ Powered by TCPDF (www.tcpdf.org)
Page 20 of 20