To begin this assignment, review the prompt and grading rubric in theModule Three Lab Worksheet Guidelines and Rubric PDFdocument. Next, read theModule Three Lab Worksheet Word Documentso you will be prepared to take specific screenshots as you work through the labs.
You will need to access the labs in theInfoSecenvironment:
CYB 230 Module Three Lab Worksheet Guidelines and Rubric CYB 230 Module Three Lab Worksheet Guidelines and Rubric Overview These labs represent tasks that a network administrator will routinely perform. It is extremely important for a practitioner to have skills in these areas to inform security policy and procedures. Prompt Complete the Module Three Lab Worksheet, which is linked in the Lab Worksheet assignment in Module Three of your course. In the worksheet, you will respond to prompts related to these labs: Basic Network Configuration Network Security—Firewalls Implementing Security Policies on Windows and Linux Rubric Guidelines for Submission: Submit your completed worksheet. Use a file name that includes the course code, the assignment title, and your name—for example, CYB_100_Project_One_Neo_Anderson.docx. Critical Elements Proficient (100%) Needs Improvement (70%) Not Evident (0%) Value Basic Network Configuration: Screenshot 1 Provides screenshot of the output of “Configuring a Centos Network Interface Manually With the Networkmanager Service,” Step 9 Does not address critical element, or response is irrelevant 10 Basic Network Configuration: Screenshot 2 Provides screenshot of the output of “Configuring a Centos Network Interface Manually With the Network Service,” Step 14 Does not address critical element, or response is irrelevant 10 Basic Network Configuration: Short Response Explains why one of the name-resolution approaches would be most useful Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail Does not address critical element, or response is irrelevant 10 Network Security— Firewalls: Screenshot Provides screenshot of the “View and Configure Windows Firewall With Advanced Security (Wfas),” Step 12 Does not address critical element, or response is irrelevant 10 Critical Elements Proficient (100%) Needs Improvement (70%) Not Evident (0%) Value Network Security— Firewalls: Short Response 1 Explains why it is not necessary to create an inbound rule on the internal 192.168.12.10 Windows server so that it can receive the response from the internal Windows server Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail Does not address critical element, or response is irrelevant 10 Network Security— Firewalls: Short Response 2 Explains the advantages and disadvantages of having the firewall disabled at startup in the Linux operating system Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail Does not address critical element, or response is irrelevant 10 Implementing Security Policies on Windows and Linux: Screenshot 1 Provides screenshot of the output of “Securing the Windows Logon Process,” Step 19, with the modified warning Does not address critical element, or response is irrelevant 10 Implementing Security Policies on Windows and Linux: Screenshot 2 Provides screenshot of the output of “Auditing Logon Failures,” Step 23 Does not address critical element, or response is irrelevant 10 Implementing Security Policies on Windows and Linux: Short Response Describes the importance of automating system checks and log file creation for server management Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail Does not address critical element, or response is irrelevant 10 Articulation of Response Submission is free of errors related to grammar, spelling, and organization and is presented in a professional and easy-to- read format Submission has some errors related to grammar, spelling, or organization that negatively impact readability and articulation of main ideas Submission has critical errors related to grammar, spelling, or organization that prevent understanding of ideas 10 Total 100% CYB 230 Module Three Lab Worksheet Complete this worksheet by replacing the bracketed phrases in the Response column with the relevant information. Lab: Basic Network Configuration Prompt Response In the lab section “Configuring a Centos Network Interface Manually With the Networkmanager Service,” Step 9, insert your name at the command line below the output and include it in your screenshot. [Insert screenshot.] In the lab section “Configuring a Centos Network Interface Manually With the Network Service,” Step 14, insert your name at the command line below the output and include it in your screenshot. [Insert screenshot.] At the end of Step 19 in “Configuring a Centos Network Interface Manually With the Network Service,” you are asked to resolve the addresses for three different names that all result in the same IP address. Which version would you find most useful? Explain why. [Insert short response.] Lab: Network Security—Firewalls Prompt Response In the lab section “Configure Windows Firewall With Advanced Security Using Administrative Tools,” Step 12, insert your name at the command line below the output and include it in your screenshot. [Insert screenshot.] Explain why it is not necessary to create an inbound rule on the internal 192.168.12.10 Windows server so that it can receive the response (ICMP echo reply) from the internal 192.168.12.11 Windows server. [Insert short response.] Explain the advantages and disadvantages of having the firewall disabled at startup in the Linux operating system. [Insert short response.] Lab: Implementing Security Policies on Windows and Linux Prompt Response In the lab section “Securing the Windows Logon Process,” Step 17, modify “Warning!” to “Warning - [YOUR NAME]”. Provide a screenshot of the output of Step 19. [Insert screenshot.] In the lab section “Auditing Logon Failures,” Step 23, provide a screenshot of the output. [Insert screenshot.] What is the importance of automating system checks and log file creation for server management? [Insert short response.]