Preview

CIS 675 Lab 4: Configuring a pfSense Firewall on the Server

Satisfactory Essays
Open Document
Open Document
338 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
CIS 675 Lab 4: Configuring a pfSense Firewall on the Server
Lab #4 – Assessment Worksheet
Configuring a pfSense Firewall on the Server

Course Name and Number: CIS 675 INFORMATION SECURITY Student Name: DARSHAN PATHAK (2640944) Instructor Name: Prof Selvan Snow Overview

In this lab, you first planned a configuration of the pfSense Firewall using a spreadsheet, the pfSenseFirewallPlanner_EmailServer, to protect an e-mail server computer. The pfSense Firewall is a current-generation product with most of the functionality and options that are found in most firewall products, though the implementation may vary from firewall to firewall. In the second part of the lab, you configured the pfSense Firewall using the planning spreadsheet that you created in Part 1 of the lab.
Lab Assessment Questions & Answers

1. Most remote configuration and administration uses the _______ protocol.
Remote configuration and administration uses Secure Sell Protocol. 2. SSH stands for?
SSH stand for Secure Sell.

3. The File Transfer Protocol (FTP) uses which transport protocol, TCP or UDP?
The FTP uses TCP.

4. From a security standpoint, it is more desirable to use the numeric IP address of a static IP host, such as an e-mail server, than to allow the address to be looked up the Domain Name Service. True or False?
True.

5. Because the e-mail server will not be required to run a browser, which protocol is not allowed by the firewall rules? HTTP.
.
6. Because the e-mail server uses a fixed, static, predetermined IP address, which protocol is not used, and, therefore, not specifically allowed to pass through the firewall?
DHCP

7. Hypertext Transfer Protocol (HTTP) and Secure HTTP (HTTPS) are the same protocol from a standpoint of passing or blocking them with a firewall. True or false?
FALSE

8. Which protocol is used for a variety of functions in the e-mail server, such as resolving the numeric address of email.user@emailserver.net, and which servers are blacklisted for being sources of Unsolicited

You May Also Find These Documents Helpful

  • Satisfactory Essays

    1. Research the following organizations and explain their involvement with the Internet public IP addresses…

    • 334 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1210 Final Exam Review

    • 726 Words
    • 3 Pages

    Truth Table 0 AND 0 = False (0) / 1 AND 0 False (0) / 1 AND 1 True (1)…

    • 726 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT 1210, Unit 3 Homework

    • 1335 Words
    • 5 Pages

    5. Which of the following are true about the commonly used version of the TCP/IP model as shown in this chapter? (Choose two answers.)…

    • 1335 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS3220 Final Exam

    • 700 Words
    • 4 Pages

    4. Which of the following protocols is a connection-oriented protocol that operates at the transport layer of the OSI model and supports reliable connections?…

    • 700 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    nt1210 unit 1 lab1

    • 1325 Words
    • 5 Pages

    5. Which of the following are true about the commonly used version of the TCP/IP model as shown in this chapter? (Choose two answers.)…

    • 1325 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Unit 5 Problem Set 1

    • 522 Words
    • 3 Pages

    2. Which of the following mechanisms is most often used in firewall rules to allow traffic…

    • 522 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    1. Which of the following is true about a TCP/IP network? The network uses standards defined in TCP/IP RFC's plus other standards.…

    • 1038 Words
    • 4 Pages
    Good Essays
  • Good Essays

    NT1330 final exam

    • 1081 Words
    • 3 Pages

    7. Each host on a TCP/IP network should be configured with a number of mandatory and optional configuration items except for which of the following? Routing method…

    • 1081 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Router Simulation

    • 331 Words
    • 2 Pages

    9. What numeric port range is commonly used by clients in a client -> server communication session? 0 to 1023…

    • 331 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 7 Quiz 5

    • 507 Words
    • 9 Pages

    A ____________ is an email server that receives inbound email and simply forwards it to another…

    • 507 Words
    • 9 Pages
    Satisfactory Essays
  • Good Essays

    Because this is only a test deployment, you will be using a Windows 8 computer to function as the web server. In this exercise, you will install Internet Information Services on your workstation and then configure it to host two websites.…

    • 970 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    linux

    • 456 Words
    • 2 Pages

    1. What change is necessary to make sendmail listen to all network traffic on port 25? What file would you edit?…

    • 456 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    UNIT 2 Assignment 2

    • 1272 Words
    • 6 Pages

    2. Ann uses her email address, me@here.com, to send an email to Bob, whose email address is you@there.com. The message contains a few paragraphs of text. Which of the following will be important to the process of making sure that Bob receives this email?…

    • 1272 Words
    • 6 Pages
    Satisfactory Essays
  • Good Essays

    nt2640 week1

    • 1824 Words
    • 8 Pages

    3. The process of HTTP asking TCP to send some data and make sure that it is received correctly is an example of what?…

    • 1824 Words
    • 8 Pages
    Good Essays
  • Satisfactory Essays

    Chapter 2 Lab Manual

    • 1433 Words
    • 6 Pages

    2. Explain why you would want to limit the type of incoming connections that you allow on a computer. Use your textbook and Internet research to support your answer…

    • 1433 Words
    • 6 Pages
    Satisfactory Essays