Question

How could blocking all ICMP traffic protect you? Could you still access some websites with your...

  • How could blocking all ICMP traffic protect you?
  • Could you still access some websites with your Port 80 rule enabled? Why?
  • Why would you want to allow incoming (not outgoing) Port 443, but block incoming Port 80?
  • Could malware rename itself in order to get through a firewall? Why would this work?
    0 0
    Add a comment Improve this question Transcribed image text
    Answer #1

    Hi Please find the answer of below question-

    Q1-How could blocking all ICMP traffic protect???


    Answer-There two firewall rules below-

    1-Select window and Click Start->Control Panel->System and Security-> and Windows Firewall.
    Click Advanced settings->click Outbound Rule-> New Rule (right-hand pane)->Click Custom->Next-> and Next
    Change the dropdown box to ICMPv4->click Next-> Next-> Next-> Next.
    Click Finish.
    Return to your command prompt.
    Type ping www.google.com
    This rule will block all ICMP traffic, it will effectively prevent you from using the ping command to send ICMP packets to other computers.
    You can use a command prompt to verify the rule was effective or not.


    2-Select window and Click Start->Control Panel->System and Security-> and Windows Firewall.


    Click Advanced settings->click Outbound Rule-> New Rule (right-hand pane)->Click Port->Next-> type “80” into the text box for Specific remote ports


    Browse to any non-secure (not HTTPS) only http websites and,Return to the Windows Advanced Firewall window,Select both of the rules you created.
    Right-click the selected rules->Click Disable Rule. (If you don’t disable the rules, your ICMP and Web traffic will still be blocked.)

    Q2-Could one still access some websites with Port 80 rule enabled??

    Answer-In some websites Port 80 is associated with Web traffic (HTTP) and Once you created and enabled the rule,
    all outgoing Port 80 traffic will be blocked then You will use a Web browser to verify the rule was effective,

    Q3-Why would you want to allow incoming (not outgoing) Port 443, but block incoming Port 80?

    Answer-Because port 80 is the port that server "listens to" or expects to receive from a Web client and assuming that the default was taken when the server was configured or set up,
    A port can be specified only in the range from 0-65536 on the NCSA server, In some websites Port 80 is associated with Web traffic (HTTP) and Once you created and enabled the rule,
    all outgoing Port 80 traffic will be blocked then You will use a Web browser to verify the rule was effective but secure Web traffic (HTTPS) running over Port 443 will still be accessible.


    Q4-Could malware rename itself in order to get through a firewall? Why would this work?

    Yes, malware can rename but its not mean it will require to make it though the firewall, It depends on the type of firewall, and the specific functionality of that firewall,and the firewall a malware can be rename itself, But it is not concluded that it is essential to make it only through the firewall,A firewall only protects unauthorized access through a network while allowing authorized access ,and if you visit a page encrypted with a virus or other malware, malware incidents is caused by outsiders,

    Add a comment
    Know the answer?
    Add Answer to:
    How could blocking all ICMP traffic protect you? Could you still access some websites with your...
    Your Answer:

    Post as a guest

    Your Name:

    What's your source?

    Earn Coins

    Coins can be redeemed for fabulous gifts.

    Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
    Similar Homework Help Questions
    • 1. What would these iptables rules do? iptables -A INPUT -p tcp -m tcp --dport 80...

      1. What would these iptables rules do? iptables -A INPUT -p tcp -m tcp --dport 80 -j ACCEPT iptables -A INPUT -p tcp -m tcp --dport 443 -j ACCEPT Allow web server traffic Block web server traffic Force port 80 traffic to port 443 Allow traffic from both 80 and 443 using UDP protocols 2. Timestamps are important because can not be changed or deleted by attackers when configured properly, allows you to correlate events across the network can always...

    • You are to create and apply a firewall rule set on your Ubuntu server and each...

      You are to create and apply a firewall rule set on your Ubuntu server and each rule should be commented. Make sure to use variables for the IP addresses in your firewall. It's good practice and if I have to test one or more of your rules, I can replace the address in the variable. For any packets you REJECT or DENY, those should be logged. That means you'll need to modify the rule so that if the rule matches...

    • IT's About Business 4.1 The Heartbleed Bug What Is Heartbleed? OpenSSL, an open-source software package, is...

      IT's About Business 4.1 The Heartbleed Bug What Is Heartbleed? OpenSSL, an open-source software package, is a popular type of transport layer security (TLS) software (discussed later in this chapter) that secures numerous websites around the world. Web servers use OpenSSL to encrypt sites. Such sites show up in browsers with a “lock” icon and the “https” prefix in the address bar. The encryption protects Internet sites offering banking, shopping, email, and other private communications. Roughly two out of three...

    • Hello! Could you please write your own four paragraph (5-6 sentences per paragraph) take away or...

      Hello! Could you please write your own four paragraph (5-6 sentences per paragraph) take away or reflection of the below information? Please complete in 24 hours if possible. Thank you! RIS BOHNET THINKS firms are wasting their money on diversity training. The problem is, most programs just don’t work. Rather than run more workshops or try to eradicate the biases that cause discrimination, she says, companies need to redesign their processes to prevent biased choices in the first place. Bohnet...

    • HDT Truck Company HDT Truck Company has been located in Crown Point, Indiana, since 1910. Its...

      HDT Truck Company HDT Truck Company has been located in Crown Point, Indiana, since 1910. Its only products— large trucks—are built to individual customer specifications. The firm once produced automobiles but dropped out of the auto business in 1924. The firm nearly went out of business in the late 1930s, but by 1940 its fortunes were buoyed by receipt of several military contracts for tank retrievers—large-wheeled vehicles that can pull a disabled tank onto a low trailer and haul it...

    • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

      The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

    • Please see the articles below… 1.  What is your opinion on the subject? 2.  Which ethical views (i.e.,...

      Please see the articles below… 1.  What is your opinion on the subject? 2.  Which ethical views (i.e., utilitarian view, moral rights view, justice view, practical view) you feel are being used by both sides of the argument (i.e., for and against downloading) to justify their positions? High Court Enters File-Sharing Spat; Justices Must Determine Software Providers' Liability For Copyright Violations by Anne Marie Squeo. Wall Street Journal. (Eastern edition). New York, N.Y.: Mar 30, 2005. pg. A.2 WASHINGTON -- The Supreme...

    • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

      Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

    • Using the book, write another paragraph or two: write 170 words: Q: Compare the assumptions of...

      Using the book, write another paragraph or two: write 170 words: Q: Compare the assumptions of physician-centered and collaborative communication. How is the caregiver’s role different in each model? How is the patient’s role different? Answer: Physical-centered communication involves the specialists taking control of the conversation. They decide on the topics of discussion and when to end the process. The patient responds to the issues raised by the caregiver and acts accordingly. On the other hand, Collaborative communication involves a...

    ADVERTISEMENT
    Free Homework Help App
    Download From Google Play
    Scan Your Homework
    to Get Instant Free Answers
    Need Online Homework Help?
    Ask a Question
    Get Answers For Free
    Most questions answered within 3 hours.
    ADVERTISEMENT
    ADVERTISEMENT
    ADVERTISEMENT