Lab 6 Securing a Server

In: Computers and Technology

Submitted By humbertocolato
Words 343
Pages 2
|ITCS202 Week 6 Lab Worksheet |

Student Name: John Smith

General Instructions:

This worksheet will assist you in completing your Labs for this week and is the MS Word document referred to in the lab instructions. After you complete this worksheet, please save it as lastname_lab6.doc and submit.

You are required to complete all sections indicated by red brackets. You will replace the red brackets and text with the indicated material. For example, for the “Student Name” section above, a completed response would look like this:

Student Name: John Smith

When responding with text, please leave the text red so that your instructor will be able to find your responses easily. When pasting an image, please replace the red text with the image.

Guidelines for the Week 6 Lab Securing a Server and Securing Infrastructure Services
Total Points: 35

• Students will be using a login to the Microsoft virtual labs.

Assignments (Using Labs 8 and 9 of the Microsoft virtual labs):
1. Perform Lab 8 Exercise 1 (3 points). [pic] [pic]

2. Perform Lab 8 Exercise 2 (3 points). >[pic] [pic]
3. Perform Lab 8 Exercise 3 (3 points). [pic] [pic]
4. Perform Lab 8 Exercise 4 (3 points). [pic] [pic]

5. Perform Lab 9 Exercise 1 (3 point). [pic] [pic]
6. Perform Lab 9 Exercise 2 (4 point). [pic] [pic]

7. Perform Lab 9 Exercise 3 (4 points). If you have problems, then try the following: Give Student01 Dial In permissions, disable the Windows Firewall on Server01 and 02, and finally, under Advanced TCP/IP Properties of IPv4, give Server01 and Server 02 a second IP address and use that second IP address on the other server as your destination VPN address.

[pic] [pic]

8. Perform Lab 9…...

Similar Documents

Lab 6

...Assessment Worksheet 91 LaB #6 – aSSESSmENt WORKSHEEt Perform Business Continuity Implementation Planning Course Name and Number: Student Name: Instructor Name: lab due date: 6 Perform Business Continuity Implementation Planning Overview In this lab, you were asked to begin the business continuity planning process for an e-commerce company, Online Goodies. You reviewed the key business functions and a prioritized list of impacted IT systems, applications, and data provided by your supervisor. You also compared the components of the major documentation required by the business continuity planning process: risk analysis, business impact analysis, business continuity plan, disaster recovery plan, and the business continuity implementation plan. Lab Assessment Questions & Answers 1. What is the difference between a risk analysis (RA) and a business impact analysis (BIA)? Risk analysis is often identifying the potential threats and the associated vulnerabilities to the organizations .Risk analysis doesn’t view the organization from the mission critical Business Process point of view. BIA the organization from the impact that is going to occur for an organization if the critical business processes are interrupted or tampered 2. What is the difference between a disaster recovery plan (DRP) and a business continuity plan (BCP)? Disaster recovery plan is have a full access to recover any lost data or essentials after a disaster while the business......

Words: 681 - Pages: 3

Lab 6

...1. Why are spindle fibers important for mitosis? (5 points) Chromosomes use spindle fibers as pathways to daughter cells during mitosis. 2. State the four bases that make up DNA. (4 points) a. Adenine b. Guanine c. Thymine d. Cytosine 3. What are the two base pairs? (2 points) a. T & C b. A & G 4. Answer the following questions: a. Define the term crossing over. (3 points) During meiosis’ prophase the homologous chromatids exchange segments. b. Explain why crossing over is important in meiosis. (3 points) Parents cell use it to pass genes off to their children cells. 5. What are the two main differences between mitosis and meiosis? (4 points) a. The amount of cell divisions b. The genes that are exchanged between chromosomes 6. Answer the following questions: a. Explain the difference between mitosis and cytokinesis. (3 points) Cytokinesis is running one cell into two cells. Mitosis is a nuclear division that causes the separation of chromosomes. b. When does mitosis occur during the cell cycle? (1 point) During the prophase, metaphase, anaphase, and telophase. c. When does cytokinesis occur during the cell cycle? (1 point) The telophase 7. Explain the differences that occur during cytokinesis of plant and animal cells. (5 points) The animal cell membrane is drawn inward until the cytoplasm is divided into two equal parts. In plant cells, cytoplasm is divided by the formation of a cell plate that extends until the two daughter cells become......

Words: 821 - Pages: 4

Securing Linux Lab Assignment

...Week 3 Lab This lab consists of two parts. Make sure you label each section accordingly and answer all the questions. For this lab it is recommended that you review the Demo Lab presentations in the Unit 5 and Unit 6 Learning Space. Click the PRACTICE link > DEMO LAB > then click the hyperlink to launch the demonstration. Part #1 Apply Hardened Security for Linux Services & Applications Learning Objectives and Outcomes Upon completing this lab, students will learn about the following tasks: * Harden Linux server services when enabling and installing them, and keep a security perspective during configuration * Create an Apache Web Server installation and perform basic security configurations to assure that the system has been hardened before hosting a web site * Configure and perform basic security for a MySQL database, understanding the ramifications of a default installation and recommending hardening steps for the database instance * Install, setup and perform basic security configuration for Sendmail to be able to leverage the built-in messaging capabilities of the Linux System * Enable and implement secure SSH for encrypted remote access over the network or across the Internet of a Linux server system Overview This lab is an extension of the previous hands-on labs, and it incorporates security hardening for Linux services and applications loaded in the physical server. This demonstration will configure security and hardened......

Words: 2020 - Pages: 9

Lab 1 Server 2012

...LAB 1 Questions Exercise 1.1 1. Remove the File 2. Check to make sure that the drive is installed correctly in the PC and then if it still occurs you need to reformat the drive to work with the windows server. Exercise 1.2 Roles on the Server Manager are File Services and Web Server (IIS) 3. The conditions that the upgrade option is not available during the windows server 2012 installation process is when it is a new hard drive with no previous version of windows. 4. An example of a compatibility note that will stop the upgrade process and force you to take action before restarting the installation would be when the previous version of windows installed is not able to be upgraded to windows server 2012. Using server manager determine which roles are installed on the server and make a note of them in the space on your worksheet. File and Storage Services and Web Server (IIS) 5. The proof that you would have that the procedure just completed has upgraded the operating system on the computer and not just performed a new, clean installation is to check to see if previous users are still available. Exercise 1.3 6. You cannot install the Server Migration tools to the Server running Windows Server 2008 using the Add Roles and Features Wizard on your server because you must Register Windows Server Migration Tools on source computers that are running older releases of Windows Server than your destination server. That would be Windows Server 2012,......

Words: 269 - Pages: 2

Microsoft Server 1 Lab 6.1

...1-23-2012 Microsoft Server 1 6.1 Lab 1.What headings are available in the right-handed pane?montor tools,data collector ,and reports 2.What is monitored by% idle time? 3.What instances are available in the instances osf slected object section? 4.What is the average value of% idle time of the w2k839 computer?95.418 5.What is the average value of processor queue length on the W2kzzcomputer? 0.700 6.What subheading are available in the system stability report selection? Software unitalls, application failure, hardware failure, windows and miscellaneous 7.Waht logs are available by default? Application,security,setup,system and forward event 8.What is most recent Event id logged to the Application log? Application,security,setup,system,forward events 9.What is the most recent Event ID logged to security log? 4634 10.What is most recent event id logged to setup log? 1610 11. What is most recent event id logged to system log? 7036 12.How many events are displayed in this custom view? 52 13.What is the keyboard shortcut to begin a network capture? F5 14.What appears in the Capture Filter pane? 15.Does anything appear in the Network Conversations pane? no 16.Does anything appear in the Network Conversations pane? All traffic,my traffic, 17.Where will WSUS downloads be stored by default? (c:/wsus) 18.What database does WSUS use by Default? MSDE 19.What types of updates does WSUS......

Words: 260 - Pages: 2

Lab 6

...the required questions. You must retype the questions in your lab report in order to make your answers very clear. Also, you should support your answers with graphical results. In most cases, you will be instructed to view the graph either As Is or time_average, and you might want to zoom in when you feel like it is necessary. However, please do not hesitate to include addition graphs in any view of your choice any time that you feel like those graphs may support your answer. Also, you are encouraged to use your textbook, the Internet, or any other reference material that you feel will help support your answers to the questions. However, make sure that you reference any such materials at the end of your lab report. Copying a Graph to Your Lab Report After You Have Clicked Show To view your graphical data, click anywhere on that specific graph, and then hit the (alt) and (prt scr) keys on your keyboard at the same time. If you now go to your Word document and select Edit –> Paste from your tool bar (or Ctrl-V), the graph will be pasted into your Word document. Some questions will require you to import specific graphs, but you should feel free to import graphical results any time when you feel like it helps to support your answer. Also, always make sure that you clearly label your graphs. Required Lab Questions for NETW320, Codec Selection for Campus Network (This section is worth 75% of your grade for this lab.) 1. Go to the Results Browser, select Results for......

Words: 1257 - Pages: 6

Lab 6

...Category | Points | Description | Section 1Configuring OSPF Single Area: 40 Points * Task 1: Step 5 * Related Explanation or Response * Task 1: Step 6 * Related Explanation or Response * Task 1: Step 10 * Related Explanation or Response * Task 2: Step 4 * Related Explanation or Response * Summary Paragraph | 2323232320 | Paste the requested screenshot.Provide the requested answer.Paste the requested screenshot.Provide the requested answer.Paste the requested screenshot.Provide the requested answer.Paste the requested screenshot.Provide the requested answer.In your own words, summarize what you have learned about IP subnetting and configuration. | Total | 40 | | ------------------------------------------------- Name: Barry Bird Date:4/17/14 Professor: Mohammad Kasraian ------------------------------------------------- Configuring OSPF Single Area vLab (30 points) Write a paragraph (minimum five college-level sentences) below that summarizes what was accomplished in this lab, what you learned by performing it, how it relates to this week’s TCOs and other course material, and (just as important) how you feel it will benefit you in your academic and professional career. (10 points) In this Ilab we learned how to Configuring OSPF setting in a router simulated environment. We learned the commands that must be used to properly install these settings. We learned how to create a designated router and a backup......

Words: 506 - Pages: 3

Lab# 6

...Lab #6 – Assessment Worksheet Identifying and Removing Malware on a Windows System Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview In this lab, you used AVG AntiVirus Business Edition to identify the viruses, worms, Trojans, malware, or other malicious software found on a compromised Windows machine. You completed a scan of the entire computer, learned how to exclude folders to avoid false positives, and understood the importance of maintaining the signatures database. You discovered the difference between a full computer scan and a Resident Shield scan. Finally, you also permanently removed the malware identified by the antivirus software and scheduled the scan to run automatically. Lab Assessment Questions & Answers 1. Why is it recommended to update the antivirus software’s signature database before performing an antivirus scan on your computer? updating the antivirus software with the latest virus definitions ensures the software has the latest information to identify and quarantine threats. 2. What are typical indicators that your computer system is compromised? slow response opening, operating system not booting up correctly or no functioning normally, event logs reporting numerous unusual......

Words: 291 - Pages: 2

Lab 6

...Lab Assessment Questions & Answers 1. What is the difference between roles and features in Windows Server 2008? A server role is a set of software programs that lets a computer perform a specific function for multiple users or other computers within a network. Features are software programs that can support or increase the functionality of one or more roles, or improve the functionality of the server, regardless of which roles are installed. 2. What is installed when you choose the Windows Server Backup Feature? Windows Server Backup Microsoft Management Console (MMC) snap-in. 3. How often should servers be backed up? It is recommended to do them frequently. About every 90 days should be fine. 4. What are the different types of backup that are performed in servers? Copy Backup, Daily Backup, Differential Backup, Incremental Backup, Normal Backup. 5. What are the primary purposes of backing up a server? Recover information after it is lost. 6. Besides performing and scheduling changes, what else can you do in the Windows XP Backup and Restore program? In the Backup you can backup everything on the computer, selected files, drives, or network data, only backup the System State data. In the Restore you can only restore from a backup file. 7. Can you restore a server’s operating system image using the restore application? Yes, by using Windows Recovery Environment and a backup that you created earlier with Windows Server Backup. 8. What are the options to......

Words: 304 - Pages: 2

Lab 6

...University of West Florida Electrical and Computer Engineering Digital Logic and Computer Systems EEL 3701L Lab 6: BCD to Seven Segment Display Decoder Due: November 3, 2014 Meghan Szatkowski, Brandon Burrows, Michael Long Abstract: For this lab we were to create a circuit that displays decimal numbers from binary numbers since most humans are not capable of reading binary. Using a 7-segment display we are able to achieve that by converting the BCD value into a 7 bit output. The 7-segment display has 7 LEDs and a certain amount of voltage triggers each of the 7 segments to produce a decimal number. Procedure 1. Create a truth table for your 4 bit input and the corresponding output necessary to light the proper segments of the display. For example, if the input is represented by WXYZ and the output is identified as ABCDEFG then if the input is 0000, all outer LEDs should be lit while the middle LED should be off. Once you create the rows in a truth table for the other 9 combinations, find the function for each segment. 2. Depending on whether you are dealing with more 0s or 1s, choose NAND or AND gates to implement each segment function. 3. Wire the input DIP switches to the decoder input. Note that you have 2 3x8 decoders. You will need to use the inputs and enable lines to combine them in order to implement these 7 functions. 4. Wire the NAND or AND gates to the proper outputs of the decoders in order to implement the functions for each......

Words: 1151 - Pages: 5

Securing Internet Client and Server Applications on Windows Systems

...Securing Internet Client and Server Applications on Windows Systems Assessment Worksheet Note: This tab is for reference only. Please see your instructor to determine the assessment they wish you to use. Overview Both IIS and Internet Explorer can be hardened to improve confidentiality, integrity, and availability (CIA). In this lab, you identified security hardening opportunities for the IIS application, then made those changes on a Windows Server 2012 machine. Next, you will identified and modified the Internet Options for the Internet Explorer browser. Finally, you documented the changes you made and provided an explanation for how each change helps achieve CIA. Lab Assessment Questions & Answers 1. What are the steps you took to harden IIS? Disabled services not used by functional roles and blocked ports that were not in use. These steps are necessary because servers proved one or more specific services on the network. 2. What are the steps you took to harden the Internet Explorer browser? Opened only minimum required ports at the firewall; use encrypted connections for all communications; disabled any unneeded server features on the Web server. These are important because they heighten security. 3. As a result of this lab, which changes will you implement on your own Internet browser? Why? Disable any features that are not being used. Also turn on pop-up blocker. 4. Why should you change the directory where the log is stored? You should......

Words: 398 - Pages: 2

Lab 1 Securing Systems

...Lab #1 – Assessment Worksheet Assessing and Securing Systems on a Wide Area Network (WAN) 1. What is the first Nmap command you ran in this lab? Explain the switches used. The first nmap command used was nmap -O -v -O was to detect the operating system of the machine, while -v showed much detail. 2. What are the open ports when scanning and their service names? There are twelve open ports. 80 is HTTP services, 135 is the Microsoft EPMAP aka DCE/RPC locator service, 139 is the NetBios session service, 445 is the Microsoft-DS, SMB file sharing, and the common internet file sharing, 3389 is the RDP, 5357 is the web services for devices, and 49152 to 49157 is the DCOM or ephemeral ports. 3. What is the command line syntax for running an SMB vulnerability scan with Nmap against nmap --script=smb-check-vulns -p445 4. Explain why SMBv2 DoS (CVE-2009-3103) is bad. It allows a denial of service attack with the blue screen of death. It makes the system a high risk system. 5. What is the operating system of IP address The operating system is FreeBSD 7.X|8.X|9.X|10.X The only open port is port 22 which indicates it is the SSH. 6. What are the reverse IP addresses for the three remote computers scanned in this lab? is is is

Words: 291 - Pages: 2

Lab 6

...Unit 6 Lab 6.1: Pseudocode Learning Objectives and Outcomes Use Boolean variables and logical operators in computer programs. Use compound logical conditions. Required Setup and Tools Standard lab setup Lab Manual Lab Demo Media and Startup Files CD Recommended Procedures Complete Lab 6.1: Pseudocode from the lab manual. Deliverables Submit the following at the end of this lab activity: The completed inputOptions() module in pseudocode in Step 1 The completed displayProvider() module with a case structure in pseudocode in Step 2 The completed and workable algorithm with nested If-Else statements using logical operators in Step 3 Unit 6 Lab 6.2: Flowcharts Learning Objectives and Outcomes Use flowcharts and pseudocode to represent Boolean conditions. Use if-then, if-then-else, and case structures in a computer program. Use Boolean variables and logical operators in computer programs. Use compound logical conditions. Required Setup and Tools Standard lab setup Lab Manual Lab Demo Media and Startup Files CD Recommended Procedures Complete Lab 6.2: Flowcharts from the lab manual. Deliverables Submit the following at the end of this lab activity: Corrected variable declarations and initializations using Visio in Step 2 Corrected module calls using Visio in Step 3 Corrected inputOptions() module using Visio in Step 4 Corrected displayProvider() module with case labels and flow lines using Visio in Step 5 Corrected displayChoices() module with......

Words: 355 - Pages: 2

Securing Sql Server

...Best practices for Disaster Recovery. Research Assignment 9 Robert Montini (18738519) Mr. Troianos Research Assignment 9 Robert Montini (18738519) Mr. Troianos Best practices for securing SQL Server. Best Practices for Disaster Recovery. Bad things happen, but to a corporation, entity or country, a bad thing happening to its server is worse than bad. It’s a Disaster. The loss of crucial information, records and vital statistics can bring the death to whatever the data base is associated to. That is why Disaster Recovery is one of the most prioritized tasks a data base team may face. Given that the creating a data base is in itself the major goal, protecting that data base should a disaster befall it is as important. There are numerous ways to do this. This paper deals with the best practices of how to accomplish this. The first thing should be to make a backup plan. This should: 1. A computer where the backup will be stored 2. What programs that will be used to back up the database 3, The computers to be backed up 4. A schedule of when to backup new data to the data base 5. The offsite location where the data base recovery data will be stored The second practice is to document all the changes that are made to the database. These include service packs, hot fixes and QFEs that have been applied. This is crucial for getting a data base restored to its original state should a disaster occur. These steps should be implemented to help prevent or minimize......

Words: 1274 - Pages: 6

Securing a Linux Server

...Erik Thompson IS3440 21 Sep 2015 Unit 1 Discussion 1 Securing a Linux System As the significant prevalence of Linux web servers globally grows, security is often touted as strength of the platform for such a purpose. However, a Linux based web server is only as secure as its configuration and very often many are quite vulnerable to compromise. While specific configurations vary wildly due to environments or specific use, there are various general steps that can be taken to insure basic security considerations are in place. Many risks are possible from a compromise including using the web server into a source of malware, creating a spam-sending relay, a web or TCP proxy, or other malicious activity. The operating system and packages can be fully patched with security updates and the server can still be compromised based purely on a poor security configuration. Security of web applications first begins with configuring the server itself with strict security in mind. Many will often deploy various layers of security to react in real time to various hacking and threats for HTTP requests. Securing the entire server and any running services with a high level of security in mind is the first fundamental step to avoid the risk of being hacked or compromised. With the abundance of malware being installed into web applications hosted on Linux based servers, it is clear many servers are configured with little or no security in mind. For small and large businesses, having a......

Words: 555 - Pages: 3

Download | Movie Review on a Beautiful Mind | Bal Vikas Avam Shikshashastra Hindi 1/e PB