Answered You can buy a ready-made answer or pick a professional tutor to order an original one.

QUESTION

Assessment Description Through managed services, you can secure a system. Enabling and disabling ports sets the precedence for inbound and outbound data to defend the network. Performing security as A

Assessment Description Through managed services, you can secure a system. Enabling and disabling ports sets the precedence for inbound and outbound data to defend the network. Performing security as

Assessment Description

Through managed services, you can secure a system. Enabling and disabling ports sets the precedence for inbound and outbound data to defend the network. Performing a security assessment on a firewall ensures the protection of the network services.

Part 1

In this lab, you will use the GVM Vulnerability Scan Report that was generated in the Vulnerability Scanning Lab.

Choose five open/closed ports and determine the applicable protocol/application.

Perform the following tasks to implement the basics of pfSense post-installation configuration:

  1. Update to the latest stable version.
  2. Set HTTPS to port 8443.
  3. Include the traffic graph on the dashboard.
  4. Disable port traffic for World of Warcraft games ports (not the World of Warcraft website). Refer to "World of Warcraft Router and Firewall Port Information," located in the topic Resources, as needed.
  5. Disable inbound ICMP protocol.
  6. Choose a social media website and disable all domains for that website.
  7. Choose a video streaming website and enable all domains for that website.
  8. Provide screenshots of the original port scan, the traffic graph of the dashboard, the World of Warcraft disabled ports, the disabled inbound ICMP protocol, disabled domains for the social media website, enabled domains for the video streaming website, and the GVM Scan Report.

Part 2

Write a 500- to 700-word lab report (to include all screenshots from Part 1) addressing the following:

  1. Summarize the issues encountered, lessons learned, and successes in a bullet point format.
  2. Describe the screenshots provided.
  3. Examine a specific architecture and identify potential vulnerabilities. Include a description of 3-5 vulnerabilities of the hybrid network used in this lab.
  4. Explore in-depth advanced and novel areas of networks and protocols. Include a description of what you learned from exploring the networks and protocols in this lab.

Make sure to support the report with at least 3 creditable resources other than the textbook.

While APA style is not required for the body of this assignment, solid academic writing is expected, and documentation of sources should be presented using APA formatting guidelines, which can be found in the APA Style Guide, located in the Student Success Center.

This assignment uses a rubric. Review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are not required to submit this assignment to LopesWrite.

Show more
tutorjej
tutorjej
  • @
  • 44 orders completed
ANSWER

Tutor has posted answer for $15.00. See answer's preview

$15.00

**** ind ****** to the ******** ****

Click here to download attached files: Hybrid Networks.edited.docx
or Buy custom answer
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question