Lab 5 worksheet
Working with Firewalls, Encrypted File Systems (EFS) and User Account Control (UAC)
Installing Internet Information Server
Because this is only a test deployment, you will be using a Windows 7 computer to function as the web server. In Exercise 5.1 you install Internet Information Services on your workstation and configure it to host two web sites. Completion time
19. Take a screen shot of the Internet Information Services (IIS) Manager console, showing the new site you created, by pressing Alt+ Prt Scr, and then paste the resulting image into the Lab05_worksheet file in the page provided by pressing Ctrl + V.
Testing IIS Connectivity
In Exercise 5.2, you test the functionality of the web server you just installed. Completion time
What is the result, and what does the result indicate?
What is the result, and what does it indicate?
What is the result?
What is the result?
List three possible reasons why you might be unable to connect to your computers web server using a browser on another computer.
Why is it necessary to clear the cache before you retest the web server connections?
What are the results, and what do the results indicate?
What other test could you perform to prove that it was your computer’s firewall that was blocking the connection and not the firewall on the computer you are using as a client?
Why can you not simply leave Windows Firewall turned off when you deploy an actual web server?
Allowing a Program Through the Firewall
Windows Firewall is preventing clients from connecting to the web server. In Exercise 5.3 to enable client access, you will use the Windows Firewall control panel to allow access to the web server. Completion time
Why are you now able to connect to the Web site from the client?
Why are you unable to connect to the intranet site from the client?
Creating Windows Firewall Rules
The port you opened in Exercise 5.3 enables clients to access the default Web site hosted by your web server, but not the intranet Web site. In this exercise, you use the Windows Firewall with Advanced Security console to create rules that will enable clients to access both Web sites. Completion time
Why are there two separate rules for the World Wide Web Services?
How do the properties of the two rules differ?
How would the opening of the port you performed in Exercise 5.3 affect the World Wide Web Services (HTTP Traffic-In) rules you just examined?
What happens to the list of rules?
How would the rule creation procedure you just performed differ if you wanted to restrict client access to the intranet Web site to computers on the local network only?
14. Take a screen shot of the Properties sheet for the new rule by pressing Alt+ Prt Scr, and then paste the resulting image into the Lab05_worksheet file in the page provided by pressing Ctrl + V.
What are the results, and why are they different from the results you experienced with the program exception?
Using NTFS Compression
The graphic design department uses lots of image files, which are quite large. To save room, they have been saving images as .jpg files, but they are starting to notice degradation in the images when they are...
Please join StudyMode to read the full document