Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

1. Install VirtualBox and extensions. 2. Using the supplied VMs, install the Router-FW, DNS Server, Webserver, and CEO PC, ensuring they are connected to the

1. Install VirtualBox and extensions. 2. Using the supplied VMs, install the Router-FW, DNS Server, Webserver, and CEO PC, ensuring they are connected to the correct network segment. 3. Install a Kali Linux computer in each of the 3 network segments. 4. Using the CEO PC, open www.seclab.net with Firefox. Troubleshoot and resolve any issues discovered. 5. Use FTP to download Social-Media-Security-Policy to the CEO PC. 6. Document the OS version and IP configuration of the CEO PC. 7. Create a new user account on the web server. 8. Document the OS versions and IP configurations of the web and DNS servers. 9. Use nmap on Kali Linux to perform port scans on the DNS and Web servers. Document the open ports on each server. 10. Verify through that the trusted network is protected from the untrusted network. 11. Use Wireshark on Kali Linux to capture an FTP file transfer between the CEO PC and the web server.

What style or type of DMZ is being deployed?

2. Describe any problems you discovered on the CEO PC and how you resolved them.

3. List the OS version and IP configuration (IP address, prefix, default gateway, and DNS server) of the CEO PC.

4. List the OS version and IP configuration of the Web Server.

5. List the OS version and IP configuration of the DNS Server.

6. List the open ports and protocols found on the Web Server.

7. List the open ports and protocols found on the DNS Server.

8. What is the purpose of a security baseline for a server?

9. What are the contents of the file you transferred with FTP to the CEO computer?

10. What username and password were shown by Wireshark for the FTP session between the CEO computer and Web Server?

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Data Access Patterns Database Interactions In Object Oriented Applications

Authors: Clifton Nock

1st Edition

0321555627, 978-0321555625

More Books

Students also viewed these Databases questions