Premium Essay

Lab 5: Working with Firewalls, Encrypted

In: Computers and Technology

Submitted By Alusine
Words 669
Pages 3
Alusine T Jalloh
NT1230 Client Server Networking 1

LAB 5 WORKING WITH FIREWALLS, ENCRYPTED FILE SYSTEMS (EFS) ANDUSER ACCOUNT

Exercise 5.1 Installing Internet Information Server*
Exercise 5.2 Testing IIS Connectivity* 1. Webpage IIS7 Webpage (Internet information Services) appears which indicates that the web address was an accurate Web address and that I am connected to the internet.
What is the result, and what does the result indicate? 2. The result is the same as before and indicates the same as findings
What is the result, and what does it indicate 3. When the IP address is typed in from the virtual machine on the host computer work does not allow access to the webpage. Simply because the given IP Address does not exist on the net

What is the result?

4. The host machine does not allow connection to the internet website.

What is the result?

5. a) Insure the web address http://ip_address is correct. b) Search for the webpage with your search engine. c) Make sure you refresh the page in a few minutes.

List three possible reasons why you might be unable to connect to your computers web server using a browser on another computer.

6. The clearing of the cache is a necessary to avoid the web server from opening the same webpage previously accessed. Why is it necessary to clear the cache before you retest the web server connections? 7. The firewall prevented it from opening while turn on, turning the firewall off allowed access.

What are the results, and what could do the results indicate?

8. This is verified through testing other sites with the firewall settings turned off/ on.
What other test could you perform that it was your computers firewall that was blocking the connection and not the firewall on the computer you are as a client?

9. Don’t leave the firewall off do to the fact

Similar Documents

Premium Essay

Lab 5: Working with Firewalls, Encrypted

...Client Server Networking 1 LAB 5 WORKING WITH FIREWALLS, ENCRYPTED FILE SYSTEMS (EFS) ANDUSER ACCOUNT Exercise 5.1 Installing Internet Information Server* Exercise 5.2 Testing IIS Connectivity* 1. Webpage IIS7 Webpage (Internet information Services) appears which indicates that the web address was an accurate Web address and that I am connected to the internet. What is the result, and what does the result indicate? 2. The result is the same as before and indicates the same as findings What is the result, and what does it indicate 3. When the IP address is typed in from the virtual machine on the host computer work does not allow access to the webpage. Simply because the given IP Address does not exist on the net What is the result? 4. The host machine does not allow connection to the internet website. What is the result? 5. a) Insure the web address http://ip_address is correct. b) Search for the webpage with your search engine. c) Make sure you refresh the page in a few minutes. List three possible reasons why you might be unable to connect to your computers web server using a browser on another computer. 6. The clearing of the cache is a necessary to avoid the web server from opening the same webpage previously accessed. Why is it necessary to clear the cache before you retest the web server connections? 7. The firewall prevented it from opening while turn on, turning the firewall off allowed access. What...

Words: 669 - Pages: 3

Premium Essay

Nut1

...information in one place IMPORTANCE OF INFORMATION ACCESS • The implementation of the EHR will open up the employee to gain access to all the patient records available within one system. This includes x-rays, labs, notes, care plans, etc. • With secured passwords available to each employee, the employ is able to review current and past reports to increase the quality of care for that patient. • Accessing the chart at bedside will help prevent wrong patient errors. PERSONAL HEALTH INFORMATION Vulnerability The wondering eye Hackers Curious employees PERSONAL HEALTH INFORMATION • The patient health information(PHI) will be more vulnerable with the fact that the computer screens either on handhelds or desktops are more easily accessible to everyone's eyes who pass by them. • The risk of hackers getting into the system is also a risk for PHI to be breeched. • Curiosity of employees shows to be a risk involved with EHR. Employees have the risk of entering PHI when they want some information on the patient, even when it is not their patient or relevant to that patients care. PERSONAL HEALTH INFORMATION SECURITY Firewalls Encryption Password protection Limited access Penalties SECURITY • Manufacturers of the EHR create firewalls and encrypted information to help prevent from hackers entering the system. • Every employee of the facility will have a secure password to enter the system. • The password will only let the employee into the area that is relevant...

Words: 1060 - Pages: 5

Premium Essay

Nt1230

...Lab 5 worksheet WORKING WITH FIREWALLS, ENCRYPTED FILE SYSTEMS (EFS) AND USER ACCOUNT CONTROL (UAC) |Exercise 5.1 |Installing Internet Information Server | |Overview |Because this is only a test deployment, you will be using a Windows 7 computer to function as the web | | |server. In Exercise 5.1 you install Internet Information Services on your workstation and configure it | | |to host two web sites. | |Completion time |10 minutes | 19. Take a screen shot of the Internet Information Services (IIS) Manager console, showing the new site you created, by pressing Alt+ Prt Scr, and then paste the resulting image into the Lab05_worksheet file in the page provided by pressing Ctrl + V. |Exercise 5.2 |Testing IIS Connectivity | |Overview |In Exercise 5.2, you test the functionality of the web server you just installed. | |Completion time |20 minutes ...

Words: 1126 - Pages: 5

Premium Essay

Nt1230 Lab 5

...LAB 5 WORKSHEET WORKING WITH FIREWALLS, ENCRYPTED FILE SYSTEMS (EFS) AND USER ACCOUNT CONTROL (UAC) Exercise 5.1 Installing Internet Information Server Overview Because this is only a test deployment, you will be using a Windows 7 computer to function as the web server. In Exercise 5.1 you install Internet Information Services on your workstation and configure it to host two web sites. Completion time 10 minutes 19. Take a screen shot of the Internet Information Services (IIS) Manager console, showing the new site you created, by pressing Alt+ Prt Scr, and then paste the resulting image into the Lab05_worksheet file in the page provided by pressing Ctrl + V. Exercise 5.2 Testing IIS Connectivity Overview In Exercise 5.2, you test the functionality of the web server you just installed. Completion time 20 minutes Question 1 What is the result, and what does the result indicate? The result displays IIS7 welcome page it indicates the the web browser connects to the IIS page created earlier Question 2 What is the result, and what does it indicate? Same result as previous question it indicates that this is a local intranet page and not an internet page Question 3 What is the result? Screen stating web page not found Question 4 What is the result? Same result as before Question 5 List three possible reasons why...

Words: 1208 - Pages: 5

Premium Essay

Windows Servers

...Topics |Securing Windows 7 |Installing Windows Server 2008 | |Password and Account Lockout Policies |What Defines a Server | |Windows Firewall Configuration |Server Hardware | |Encrypting File System (EFS) |Windows Server 2008 Editions | |Remote Access Technologies |Server Roles in Windows Server 2008 | |Backup and Restore |Method of Installing Windows Server 2008 | |System Restore Points |Server Configuration | | |IP Address Settings | | |Management of Devices and Device Drivers | | |Microsoft Management Console (MMC) ...

Words: 2079 - Pages: 9

Premium Essay

Nt1230 Syllabus

...ITT Technical Institute NT1230 Client-Server Networking I Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisite or Corerequisite: NT1210 Introduction to Networking or equivalent Course Description: This course introduces operating principles for the client-server based networking systems. Students will examine processes and procedures involving the installation, configuration, maintanence, troublshooting and routine adminstrative tasks of popular desktop operating system(s) for standalone and network client computers, and related aspects of typical network server functions. Client-Server Networking I Syllabus Where Does This Course Belong? 1st QTR GS1140 NT1110 GS1145 Problem Solving Theory Computer Structure and Logic Strategies for the Technical Professional 2nd QTR NT1210 Introduction to Networking NT1230 Client-Server Networking I MA1210 College Mathematics I 3rd QTR NT1310 NT1330 MA1310 4th QTR PT1420 NT1430 EN1320 5th QTR PT2520 NT2580 EN1420 6th QTR NT2640 NT2670 CO2520 7th QTR NT2799 SP2750 Physical Networking Client-Server Networking II College Mathematics II Introduction to Programming Linux Networking Composition I Database Concepts Introduction to Information Security Composition II IP Networking Email and Web Services Communications Network Systems Administration Capstone Project Group Theory The follow diagram indicates how this course...

Words: 1834 - Pages: 8

Premium Essay

It 230 Computer Networking

...requirements for the installation of cabling and equipment data cabling in any offices or labs to be constructed or modified for the XYZ School System. 2. Minimum Cabling Requirements a. The Data Cabling and termination shall be in accordance with wiring configurations as per ANSI/TIA/EIA-568-B standards b. All cabling runs must be uninterrupted and without splices c. Where cabling is to be enclosed in a solid wall, the cables should be installed within a conduit for a additions or reconfigurations 3. General Specifications a. Data cable (CAT-6 UTP) i. Terminating method: CAT-6 socket 1. Green/White (1) 2. Green (2) 3. Orange/White (3) 4. Blue (4) 5. Blue/White (5) 6. Orange (6) 7. Brown/White (7) 8. Brown (8) ii. Each data point should have all 4pairs assigned and terminated as per ANSI/TIA/EIA-568-B standards b. Cables Labeling i. Data plates 1. On each face plate a unique number will be used to indicate the data’s location of cable termination on the patch panel 2. The data ports will be marked with orange labeling for each data connection ii. Wiring labels 1. Each cable will be sequentially numbered at each end to depict the cable number 2. Labeling should be completed with white on black colored labels 4. Data Cabling a. Unshielded Twisted Pair (10BaseT, 100BaseT, & 1000BaseT) i. Grade of cable - UTP CAT-6 cable ii. Termination - Internal cabling: segment of UTP Ethernet may not exceed 90 meters 5. Cables entering building a. The point of entry should be inaccessible to the public...

Words: 6096 - Pages: 25

Free Essay

Cis 534 - Lab Manual

...Security Design CIS 534 - Advanced Network Security Design 2 Table of Contents Toolwire Lab 1:Analyzing IP Protocols with Wireshark ........................................................................ 6 Introduction ............................................................................................................................................. 6 Learning Objectives ................................................................................................................................ 6 Tools and Software ................................................................................................................................. 7 Deliverables ............................................................................................................................................. 7 Evaluation Criteria and Rubrics ........................................................................................................... 7 Hands-On Steps ....................................................................................................................................... 8 Part 1: Exploring Wireshark ............................................................................................................... 8 Part 2: Analyzing Wireshark Capture Information .......................................................................... 12 Lab #1 - Assessment Worksheet ............................................................................

Words: 48147 - Pages: 193

Premium Essay

C156 Advanced Information Management

...accommodate both of the combining organizations. Telehealth not only includes communication between patients and healthcare providers, but also communication between healthcare providers in both of the combining organizations. Video conferencing can save healthcare providers time and money by allowing them to collaborate with one another without being physically near one another. A3. Identification of Team The interdisciplinary team on the project committee will consist of four team members. Team member A would be the project team lead in which I would nominate myself. It is important to have a nurse as project team lead because they understand the needs of the patients, the work flow of the unit and also how the system will affect those working at the point of care. The project lead should be an experienced nurse who is proficient within their specialty of nursing and is comfortable in a leadership role. The role of the project team lead can make the...

Words: 3168 - Pages: 13

Premium Essay

Company Security Policy

...Company Security Policy Rev 1.1.15.12.4 Dec 2015 Editors: Rhombus, Inc. Policy Team 1 Rhombus, Inc. 14 1.1 About This Document 14 1.2 Company History 14 1.3 Company Structure and IT Assets 14 1.4 Industry Standards 15 1.5 Common Industry Threats 15 1.6 Policy Enforcement 16 2 Credit Card Security Policy 17 2.1 Introduction 17 2.2 Scope of Compliance 17 2.3 Requirement 1: Build and Maintain a Secure Network 17 2.4 Requirement 2: Do not use Vendor-Supplied Defaults for System Passwords and Other Security Parameters 18 2.5 Requirement 3: Protect Stored Cardholder Data 19 2.6 Requirement 4: Encrypt Transmission of Cardholder Data across Open and/or Public Networks 20 2.7 Requirement 5: use and Regularly Update Anti-Virus Software or Programs 20 2.8 Requirement 6: Develop and Maintain Secure Systems and Applications 21 2.9 Requirement 7: Restrict Access to Cardholder Data by Business Need to Know 21 2.10 Requirement 8: Assign a Unique ID to Each Person with Computer Access 22 2.11 Requirement 9: Restrict Physical Access to Cardholder Data 22 2.12 Requirement 10: Regularly Monitor and Test Networks 23 2.13 Requirement 11: Regularly Test Security Systems and Processes 25 2.14 Requirement 12: Maintain a Policy that Addresses Information Security for Employees and Contractors 26 2.15 Revision History 29 3 Acceptable Use Policy 30 3.1 Overview 30 3.2 Purpose 30 3.3 Scope 30 3.4 Policy...

Words: 26545 - Pages: 107

Premium Essay

Network Security

...Network Security Clint Tipps September 21, 2014 ISSC340/ APUS Prof. Bryan Jensen Abstract This paper will cover several aspects of network security. Numerous different aspects of wired and wireless network security, including protocols applied to secure a network, penetration testing, digital forensics, and network hardening will be covered. There are numerous methods for providing security to a network, and even more to gain access to one. The challenge is to be one step ahead of anyone who may wish to penetrate the network. For this reason, many owners of large networks perform penetration testing in order to identify potential holes in their network. If malicious activity is detected, using digital forensics can help identify where the attack came from. This would, in turn, lead to a network engineer to harden the network against the identified threat. Network Security Over the last decade, computer systems have increased in speed and capacity while decreasing in price. Computers that where once used in corporate environments are now less powerful than a typical household computer. While this sea change occurred, network communications have grown and improved, to allow computers to communicate easily from remote locations, adding vast opportunities for illegal activities. Data can maliciously be changed or destroyed, systems can be made to malfunction and long distance charges can be avoided. One of the biggest challenges today is to control the security of the...

Words: 3488 - Pages: 14

Premium Essay

Information Security

...JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES LABORATORY MANUAL TO ACCOMPANY Security Strategies in Windows Platforms and Applications 1E REVISED 38542_FMxx.indd i 9/5/12 10:48 AM World Headquarters Jones & Bartlett Learning 5 Wall Street Burlington, MA 01803 978-443-5000 info@jblearning.com www.jblearning.com Jones & Bartlett Learning books and products are available through most bookstores and online booksellers. To contact Jones & Bartlett Learning directly, call 800-832-0034, fax 978-443-8000, or visit our website, www.jblearning.com. Substantial discounts on bulk quantities of Jones & Bartlett Learning publications are available to corporations, professional associations, and other qualified organizations. For details and specific discount information, contact the special sales department at Jones & Bartlett Learning via the above contact information or send an email to specialsales@jblearning.com. Copyright © 2013 by Jones & Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. No part of the material protected by this copyright may be reproduced or utilized in any form, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from the copyright owner. The Laboratory Manual to accompany Security Strategies in Windowa Platforms and Applications is an independent publication and has not been authorized, sponsored, or otherwise...

Words: 25969 - Pages: 104

Premium Essay

It Ceo

...System Security Plan University of Texas Health Science Center School of Public Health Note: This is simply a template for a NIH System Security Plan. You will need to complete, or add content, to many of the sections depending on your specific project with NIH. We have highlighted all the instruction areas in yellow. Please review each section carefully and contact SPH IT Services for any additional details. 1. Information System Name/Title [Enter the name of the system (or systems)] 2. Information System Owner [Enter the name and contact information for the system owner] Derek Drawhorn Asst Dean, Information Technology Services University of Texas Health Science Center Houston School of Public Health 1200 Herman Pressler Suite RAS E-17 Houston, TX 77030 (713) 500-9533 Derek.d.drawhorn@uth.tmc.edu 3. Other Designated Contacts, Including Those with “root” Access. [Enter the names and contact information for any other critical technical or administrative contacts for this system. This should include the IT (policy) director, system administrators, data center contacts, etc] Chris Harvey Asst Director, Information Technology Services University of Texas Health Science Center Houston School of Public Health 1200 Herman Pressler Suite RAS E-17 Houston, TX 77030 (713) 500-9544 Christopher.m.harvey@uth.tmc.edu 4. Assignment of Security Responsibility [Who is responsible for implementing security policy? Enter the name and contact information...

Words: 2842 - Pages: 12

Free Essay

Electronics

...Katherine Bailey CET 3010 Course Project Professor Yousef By Katherine Bailey CET 3010 Course Project Professor Yousef By Better Your Small Business Today Better Your Small Business Today Contents Introduction: 1 Current Business Process: 1 Patient Arrival 1 Check in Process: 1 Wait in waiting room 2 Urine Sample 2 Wait in waiting room for nurse 2 Nurse takes/records vitals on paper 2 Wait to see Doctor 2 See Doctor 2 Check Out: 2 Data Collection and Analysis: 3 Type of data collected: 3 Recommendation for collecting proper data using information technology: 3 Recommendation: 3 Digitized Form 4 Data and System Security 4 Ethical Issues: 5 Guidelines: 5 System Requirement’s: 6 System: 6 Other Requirments: 6 Conversion 7 Direct Data Entry 7 Idea: 7 References 8 introduction: I have been called to one of the Atlantic Urological Associates offices to provide recommendations for an efficient information system that will help with the following: * Minimize patient waiting time * Decrease paper work between the office and other healthcare entities * Increase quality of patient care * Optimize the billing and coding process Upon arriving at the doctor’s office I notice the waiting room is full and there is a line of people waiting to check in. Behind the desk is an overstressed receptionist who is trying to manage checking everyone in, answering the phones, and filing/completing paper work. When...

Words: 2672 - Pages: 11

Premium Essay

Wgu Itsecurity Capstone

...Capstone Project Cover Sheet Capstone Project Title: ABC Inc. Firewall upgrade Report Student Name: Michael Wakefield Degree Program: BS- IT Security Mentor Name: Dave Huff Signature Block Student’s Signature Mentor’s Signature Table of Contents Capstone Summary 3 Review of Other Work 13 Rationale and Systems Analysis 19 Goals and Objectives 25 Project Deliverables 28 Project Plan and Timelines 30 Project Development…………………………………………………………………………………………………………………………….31 Additional Deliverables………………………………………………………………………………………………………………………….35 Conclusion…………………………………………………………………………………………………………………………………………….35 References 37 Appendix 1: Competency Matrix 38 Appendix 2: Cisco ASA 5555-X Firewall Specifications…………………………………………………………….40 Appendix 3: ABC Inc. Project Schedule…………………………………………………………………………………….44 Appendix 4: High-Availability Design Screenshots……………………………………………………………………45 Appendix 5: Screenshots of inside to outside access; outside to DMZ access; NAT rules and configurations; and performance graphs and performance results….........................................51 Capstone Report Summary Internet of Everything (IoE) and “Big Data” equates to competitive advantages to the modern business landscape. Numerous white papers are circulating on the Internet highlighting the business case supporting the IoE initiative. For instance, in a white paper conducted by Cisco Inc. on the Value Index of IoE in 2013 reported the following: ...

Words: 9337 - Pages: 38