Question

Question 1: Go into your firewall settings on your Windows system or the virtual machine you...

Question 1:

Go into your firewall settings on your Windows system or the virtual machine you are using here. You can find them in Control Panel, System and Security, Windows Firewall. What are the settings for your Incoming Connections (should be listed underneath the status of your firewall)?

Question 2

Go into Allow apps to communicate through the Windows Firewall. What apps are allowed?

HTML Editor Keyboard Shortcuts

Question 3

Are there any that you were surprised to see allowed to communicate?

Question 4

Check the Event Viewer on your Windows system for any security violations. Do you find any?

Question 5

These are iptables rules from a Linux system. Can you explain what these rules are doing?

iptables -A INPUT -i eth0 -p tcp --dport 80 -m state --state NEW,ESTABLISHED -j ACCEPT
iptables -A OUTPUT -o eth0 -p tcp --sport 80 -m state --state ESTABLISHED -j ACCEPT

iptables -A INPUT -i eth0 -p tcp --dport 443 -m state --state NEW,ESTABLISHED -j ACCEPT

iptables -A OUTPUT -o eth0 -p tcp --sport 443 -m state --state ESTABLISHED -j ACCEPT

Question 6

Which type of rules would you consider to be more fine-grained and why? The Windows firewall or the Linux firewall?

Question 7

Are there advantages to the Windows firewall over the Linux firewall or the Linux firewall over the Windows firewall? Explain.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

vindle The mesf SeCure uoindous as a -veond thi ->んken oue by to all gud an H n then tly ealled adding nuo apps that ugovn, mleption manu ally ts alleo Intunit

Add a comment
Know the answer?
Add Answer to:
Question 1: Go into your firewall settings on your Windows system or the virtual machine you...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • These are iptables rules from a Linux system. Can you explain what these rules are doing? iptables -A INPUT -i eth0 -p t...

    These are iptables rules from a Linux system. Can you explain what these rules are doing? iptables -A INPUT -i eth0 -p tcp --dport 80 -m state --state NEW,ESTABLISHED -j ACCEPT iptables -A OUTPUT -o eth0 -p tcp --sport 80 -m state --state ESTABLISHED -j ACCEPT iptables -A INPUT -i eth0 -p tcp --dport 443 -m state --state NEW,ESTABLISHED -j ACCEPT iptables -A OUTPUT -o eth0 -p tcp --sport 443 -m state --state ESTABLISHED -j ACCEPT

  • These are iptables rules from a Linux system. Can you explain what these rules are doing? iptables -A INPUT -i eth0 -p t...

    These are iptables rules from a Linux system. Can you explain what these rules are doing? iptables -A INPUT -i eth0 -p tcp --dport 80 -m state --state NEW,ESTABLISHED -j ACCEPT iptables -A OUTPUT -o eth0 -p tcp --sport 80 -m state --state ESTABLISHED -j ACCEPT

  • 1. What would these iptables rules do? iptables -A INPUT -p tcp -m tcp --dport 80...

    1. What would these iptables rules do? iptables -A INPUT -p tcp -m tcp --dport 80 -j ACCEPT iptables -A INPUT -p tcp -m tcp --dport 443 -j ACCEPT Allow web server traffic Block web server traffic Force port 80 traffic to port 443 Allow traffic from both 80 and 443 using UDP protocols 2. Timestamps are important because can not be changed or deleted by attackers when configured properly, allows you to correlate events across the network can always...

  • You are to create and apply a firewall rule set on your Ubuntu server and each...

    You are to create and apply a firewall rule set on your Ubuntu server and each rule should be commented. Make sure to use variables for the IP addresses in your firewall. It's good practice and if I have to test one or more of your rules, I can replace the address in the variable. For any packets you REJECT or DENY, those should be logged. That means you'll need to modify the rule so that if the rule matches...

  • Answer these follwong questiong in great detail for a cyber secuirty/computer science class. 1. Consider the...

    Answer these follwong questiong in great detail for a cyber secuirty/computer science class. 1. Consider the following firewall rule, and describe what this permits or denies: sudo /sbin/iptables -A INPUT --dport 23 -j DROP 2.If a service is allowed in one place and denied in another, what is the outcome? (For example, a service is listed in both hosts.allow and hosts.deny) Explain. 3.If a rule for a service does not exist in either one of the files hosts.deny or hosts.allow,...

  • Please answer the following question according to the Image. 1. What directories and type of files...

    Please answer the following question according to the Image. 1. What directories and type of files exist in systemprofile? 2. How can the various types of files content assist in your investigation of the M57-Jean case? Be specific on content in at least “Application Data”, Cookies, and one (1) additional, systemprofile subdirectories. Artifacts are stored on a system based on what commands users run and where they decide to store certain files. Users are often not aware of clues their...

  • I would really appreciate your help. God bless you Question 4 The molar enthalpy of fusion of ice at 0 °C and 1 atm...

    I would really appreciate your help. God bless you Question 4 The molar enthalpy of fusion of ice at 0 °C and 1 atm pressure is 6024 J mol. The molar heat capacities at constant pressure of ice and water are 37.65 J Kmol and 75.30 J Kmol respectively, and may be taken as constant over the temperature range 0 to -20°C. Consider 2 mole of liquid water supercooled to -20 °C, which is allowed to freeze isothermally from liquid...

  • . Question 1 (40 marks) This question asks you to demonstrate your understanding of the following...

    . Question 1 (40 marks) This question asks you to demonstrate your understanding of the following learning objectives LO 1.6 Express the Laplace Transform of common mathematical functions and linear ordinary differential equations using both first principles and mathematical tables. LO 1.7 Construct transfer functions for linear dynamic systems from (i) differential equations and (ii) reduction of block diagrams. LO1.8 Determine the time response of a Linear SISO system to an arbitrary input and having arbitrary initial conditions. LO 1.9...

  • QUESTION (1) BOSE GAS: This one is to help you with the various manipulations. 1(a) The...

    QUESTION (1) BOSE GAS: This one is to help you with the various manipulations. 1(a) The energy of a spinless 3-dimensional Bose gas is given by U = ig;P;E;, where g; is the degeneracy of the j-th state, P; the probability of occupation of this state, and E; the energy of this state. Rewrite this in the form of an energy integral, incorporating both the density of states, and the Bose distribution function, as functions of energy. 1(b) Now show...

  • please explain neatly and show formulas thank you Question 1 Your answer is partially correct. Try...

    please explain neatly and show formulas thank you Question 1 Your answer is partially correct. Try again. The figure shows a thin rod, of length L = 1.50 m and negligible mass, that can p ot about one end to rotate in a vertical circle. A ea ball of mass m 15. C s attached to the other end. The rod is pulled aside to angle eo = 6.80° and released with initial velocity v 0-0. As the ball descends...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT