Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Module 6 : Assignment 6 . 2 - Creating firewall rules Similar to packet sniffing, port scanning and other security tools, vulnerability scanning can help

Module 6: Assignment 6.2- Creating firewall rules
Similar to packet sniffing, port scanning and other security tools, vulnerability scanning can help you to secure your own network or it can be used by the bad guys to identify weaknesses in your system to mount an attack against. The purpose of a firewall (host based or network based) is to allow or block traffic based on rules. If you are not running a web server, then port 80 should not be open on the system.
You used a network scanner in Module 1, now you will create firewall rules to block or allow traffic.
Purpose
During this assignment, you will create a Windows firewall rule to deny ICMP traffic and traffic out to websites.
Directions
1. Read and execute the instructions for Hands-on Project 2 staring on page 324.
2. Write a paper describing your experience and project results. Describe challenges you encountered.
3. Paste the screenshots into your paper. For each screenshot, describe in DETAIL what is taking place.
4. Save and upload your assignment file here to Canvas.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Main Memory Database Systems

Authors: Frans Faerber, Alfons Kemper, Per-Åke Alfons

1st Edition

1680833243, 978-1680833249

More Books

Students also viewed these Databases questions

Question

3. Would you say that effective teamwork saved their lives?

Answered: 1 week ago