CIS 675 Lab 4: Configuring a pfSense Firewall on the Server

Satisfactory Essays
Lab #4 – Assessment Worksheet
Configuring a pfSense Firewall on the Server

Course Name and Number: CIS 675 INFORMATION SECURITY Student Name: DARSHAN PATHAK (2640944) Instructor Name: Prof Selvan Snow Overview

In this lab, you first planned a configuration of the pfSense Firewall using a spreadsheet, the pfSenseFirewallPlanner_EmailServer, to protect an e-mail server computer. The pfSense Firewall is a current-generation product with most of the functionality and options that are found in most firewall products, though the implementation may vary from firewall to firewall. In the second part of the lab, you configured the pfSense Firewall using the planning spreadsheet that you created in Part 1 of the lab.
Lab Assessment Questions & Answers

1. Most remote configuration and administration uses the _______ protocol.
Remote configuration and administration uses Secure Sell Protocol. 2. SSH stands for?
SSH stand for Secure Sell.

3. The File Transfer Protocol (FTP) uses which transport protocol, TCP or UDP?
The FTP uses TCP.

4. From a security standpoint, it is more desirable to use the numeric IP address of a static IP host, such as an e-mail server, than to allow the address to be looked up the Domain Name Service. True or False?
True.

5. Because the e-mail server will not be required to run a browser, which protocol is not allowed by the firewall rules? HTTP.
.
6. Because the e-mail server uses a fixed, static, predetermined IP address, which protocol is not used, and, therefore, not specifically allowed to pass through the firewall?
DHCP

7. Hypertext Transfer Protocol (HTTP) and Secure HTTP (HTTPS) are the same protocol from a standpoint of passing or blocking them with a firewall. True or false?
FALSE

8. Which protocol is used for a variety of functions in the e-mail server, such as resolving the numeric address of email.user@emailserver.net, and which servers are blacklisted for being sources of Unsolicited

You May Also Find These Documents Helpful

  • Good Essays

    Lab Assessment Questions & Answers 1. Define why change control management is relevant to security operations in an organization. Change control is a precision arrangement of managing every change made to a system. This is to ensure that no unneeded changes are done, that every change is documented, and that no service is disrupted unless absolutely necessary, and that all resources efficiently used. 2. What type of access control system uses security labels? A LBA C Label Base Access…

    • 668 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    lab 4

    • 451 Words
    • 2 Pages

    Lab 4 Part 1: 10 points Assignment: Create an Internet and E-mail Acceptable Use Policy Learning Objectives and Outcomes Research and compare Internet and e-mail use policies enforced by other organizations. Create an Internet OR e-mail use policy for an organization. Assignment Requirements You are a networking intern at Richman Investments. An employee of the company used employer-owned equipment to access the Internet and check his personal Web-based e-mail account. He followed a…

    • 451 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Lab 4

    • 327 Words
    • 2 Pages

    Assessment Worksheet 65 Lab #4 – Assessment Worksheet Configure Group Policy Objects and Microsoft® Baseline Security Analyzer (MBSA) Course Name and Number: Student Name: Dennis Dobbins Instructor Name: P Butu Lab Due Date: 10/8/13 Overview In this lab, you used group policy objects to create a minimum password length password policy and link it to the newly created domain from the previous lab. You also ran the Microsoft® Baseline Security Analyzer (MBSA) and reviewed…

    • 327 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Lab 4

    • 506 Words
    • 3 Pages

    Lab 4 Tissues Purpose: The purpose of this lab is to disover Histology or the study of tissues. Tissue make up a large part of our bodies and in this lab we will learn about the different types and functions of tissues. Hypothesis: I believe at the end of this lab If I am willing to do the reasearch the I will be able to use a mircoscope to look at different tissue samples and learn about the many types of tissue cells and their functions. Materials: The internet Book:Human Antomony…

    • 506 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Lab 4

    • 794 Words
    • 4 Pages

    hours:minutes:seconds GMT did the P waves arrive? (See Lab Exercise #1, Step 1, Question 1) A) 01:48:00 B) 01:49:00 C) 01:50:00 D) 01:51:00 2. What time in hours:minutes:seconds GMT did the S waves arrive? (See Lab Exercise #1, Step 1, Question 2) A) 01:51:30 B) 01:52:00 C) 01:53:10 D) 01:54:20 3. What is the time lag (S-P) in hours:minutes:seconds GMT? (See Lab Exercise 1, Step 1, Question 3) A) 00:02:00 B) 00:03:20 C) 00:03:30 D) 00:04:10 4. What is the distance in kilometers between…

    • 794 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Lab #4

    • 451 Words
    • 2 Pages

    Lab #4 Compromise and Exploit a Vulnerable Microsoft Workstation IT Security: Attack & Defense Course Number: ISSC362 IP address for Windows vulnerable computer: 172.30.0.3 Open Ports on 172.30.0.3: 135/tcp open msrpc Microsoft Windows RPC 139/tcp open netbios-ssn 445/tcp open microsoft-ds Microsoft Windows XP microsoft-ds 1025/tcp open msrpc Microsoft Windows RPC 3389/tcp open microsoft-rdp Microsoft Terminal Service 5000/tcp open upnp Microsoft Windows…

    • 451 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Lab 4

    • 575 Words
    • 3 Pages

    LAB 4 1.List four cell structures that were common to both plant and animal cells. (4 points) a.What structures were unique to plant cells? (2 points) b. What structures were unique to animal cells? (2 points) 2.List five structures observed in the cell images and provide the function of each structure. (5 points) a.Structure 1 and function b. Structure 2 and function c.Structure 3 and function d.Structure 4 and function e.Structure 5 and function 3.The student is observing a single-celled…

    • 575 Words
    • 3 Pages
    Good Essays
  • Good Essays

    lab 4

    • 527 Words
    • 3 Pages

    NT1210 Chapter 4 Lab 4.1.1 Standards are put in place to make everything work together error free. Because Stability, Consistency, Minimization of packet errors. 4.1.2 Because the voltage used to transmit data needs only be high enough for the receiver to detect it. Making the voltage higher would make the receiver electronics more difficult. 4.1.3 Hospitals, security systems, PA & recording studios. The drawback of STP cables is that they will increase the total cost of an installation.…

    • 527 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Lab 4

    • 890 Words
    • 4 Pages

    Name and Course Section: Avital Gershtein, Section 701 Title: Aseptic Technique & culturing Microbes - Lab # 4 Purpose: The purpose of this experiment is to Learn and employ aseptic technique, to become familiar with basic requirements of microbial growth, to learn the basic forms of culture media, and to become familiar with methods used to control microbial growth. Bacteria Growth pattern after 24 hours Growth pattern after 48 hours L. acidophilus in liquid MRS broth No growth Amount of sediment…

    • 890 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    lab 4

    • 503 Words
    • 2 Pages

    Lab #3 - Assessment Worksheet Enabling Windows Active Directory and User Access Controls Course Name and Number: Networking Security Fundamentals Student Name: Instructor Name: Prof. Lab Due Date: Overview In this lab, you followed the Microsoft approach to securing the CIA triad. You created new user accounts and security groups, and applied the new user accounts to the security groups, just as you would in a real world domain. You created nested folders on the remote server and assigned…

    • 503 Words
    • 2 Pages
    Good Essays