Preview

Nt1330 Unit 3 Lab Report

Powerful Essays
Open Document
Open Document
1967 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1330 Unit 3 Lab Report
Week 3 Lab
This lab consists of two parts. Make sure you label each section accordingly and answer all the questions.
For this lab it is recommended that you review the Demo Lab presentations in the Unit 5 and Unit 6 Learning Space. Click the PRACTICE link > DEMO LAB > then click the hyperlink to launch the demonstration.
Part #1

Apply Hardened Security for Linux Services & Applications
Learning Objectives and Outcomes
Upon completing this lab, students will learn about the following tasks:
• Harden Linux server services when enabling and installing them, and keep a security perspective during configuration
• Create an Apache Web Server installation and perform basic security configurations to assure that the system has been hardened
…show more content…
Unlike a hard link, a symbolic link does not contain the data in the target file. It simply points to another entry somewhere in the file system. This difference gives symbolic links certain qualities that hard links do not have, such as the ability to link to directories, or to files on remote computers networked through NFS. Also, when you delete a target file, symbolic links to that file become unusable, whereas hard links preserve the contents of the file.
7. Why is it recommended to disable Symbolic Links in MySQL? symbolic links are enabled by default. If you don't need them, you can disable them with the skip-symbolic-links option.
8. Why would you add the ‘skip-networking’ command?
You may even have services that are listening on a TCP port but don’t need to be. Database servers such as MySQL are often used in conjunction with Apache, and are frequently set up to coexist on the same server when used in this way. Connections that come from the same machine that MySQL is installed on use a domain socket in the filesystem for communications. Therefore, you don’t need to have MySQL listening on a TCP socket. To do this, you can either use the --skip-networking command-line option when starting MySQL or specify it in the [mysqld] section of your my.cnf file:
[mysqld]
...
…show more content…
What command would you use to allow all the traffic from the loopback?
-A INPUT -i lo -s 127.0.0.0/8 -d 127.0.0.0/8 -j ACCEPT - allows all traffic to the loopback network coming from the loopback device.
6. What command would you use to view the network port configuration for the iptables? iptables -vnL | more will give some port information, but portmap will provide even more.
7. If a service is to allow in one place and to deny in another what is the outcome?
First encountered rule takes priority.
8. Is the order of the rules important? If you deny something within the IP network layer, but permit something within the TCP transport layer that uses the IP network layer that you just denied, will your TCP traffic be permitted?
Yes. See #1 and #7. No, TCP traffic will not be allowed because it was already blocked by IP.
9. If one of the files does not exist what happens?
TCPWrappers will continue down its list without incident. Rules apply when matched.
10. Are the rules from TCP wrapped services cached? TCP wrapped services do not cache the rules from the hosts access files, so any changes to hosts.allow or hosts.deny take effect immediately without restarting network

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt1310 Unit 3 Lab Report

    • 1306 Words
    • 6 Pages

    The force applied and the diameter of the diameter of a hardened steel ball is kept constant while four different specimen blocks namely, aluminum, brass, copper and mild steel are penetrated by the indentation steel ball to create different indentations on each of them. The diameters of the indentions allow us to obtain the Brinell Hardness number to predict the hardest and the softest material among them. The experimental data would also allow us to compare the hardness measured with the other published results from other…

    • 1306 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Lab 9

    • 1001 Words
    • 3 Pages

    1. What are some common risks, and vulnerabilities commonly found in the System/Application Domain that must be mitigated with proper security countermeasures?…

    • 1001 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Apply this algorithm in cloud network and check the Quality of services for multi users when connected to the cloud.…

    • 246 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Unit 5 Problem Set 1

    • 522 Words
    • 3 Pages

    2. Which of the following mechanisms is most often used in firewall rules to allow traffic…

    • 522 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 2 Instructions

    • 389 Words
    • 2 Pages

    4. Open the Lab 2: Assessment Worksheet Assignment. USE THIS DOCUMENT TO RECORD YOUR LAB ANSWERS.…

    • 389 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    2. Which of the following mechanisms is most often used in firewall rules to allow traffic on to the network?…

    • 306 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    netw360

    • 598 Words
    • 3 Pages

    Answer each and every question in the lab. Note: There may be additional questions at the end of the lab:…

    • 598 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    a. IP Stateful firewall inspection takes place in layer 4, when traffic attempts to traverse the firewall a requested a source port and a destination port pair become part of the session allowing the source to receive information. Stateful inspection firewalls solve the vulnerability of permitting all the high numbered…

    • 928 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Nor Gate

    • 1094 Words
    • 5 Pages

    3) NOR GATE Schematic View: Program: * SPICE export from S-Edit 12.00 Tue Sep 15 04:22:22 2009 * Design: NOR…

    • 1094 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    The Integumentary System

    • 1117 Words
    • 6 Pages

    Directions: There are five (5) activities in this lab. Please be sure to complete them all. For all questions, type your answers into the yellow box ____ (including your name above) it will expand as you write.…

    • 1117 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    (please post an introduction to the lab, include what you will be doing for each activity)…

    • 671 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    F 4. The protocols that Windows uses by default at the network and transport layers are collectively called TCP/IP.…

    • 482 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    7. Security-Rules and access rights can be defined at the time server is set up.…

    • 567 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Windows Firewall: Quiz

    • 436 Words
    • 3 Pages

    Which of the following is not an item that can be used when building Windows Firewall rules?…

    • 436 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Basic Switch Commands

    • 419 Words
    • 2 Pages

    | Configures the switch for an IP address so that you can remotely connect to the switch and manage it. Also notice that the default gateway is set. If you do not set the default gateway, you will be unable to manage the switch from a different network.…

    • 419 Words
    • 2 Pages
    Satisfactory Essays

Related Topics