Вы находитесь на странице: 1из 3

Network Security Lab Addendum

Background.

Lab assignments require a connection to the Lab Manager computer and class Lab text, ”Lab manual For
Security+ Guide To Network Security Fundamentals”. Refer to the ”Lab Manager Tutorial” document for
information about connecting to our Lab Manager lab.

For labs that require Internet access, use the Lab Manager Vista or Server 2008 virtual computers.

The following table shows IP addressing for the Windows Server 2008 and Windows Vista computers:

OS IP Address IP Mask
Windows Server 2008 192.168.100.200 255.255.255.0
Windows Vista 192.168.100.100 255.255.255.0
Linux BackTrack 3 DHCP DHCP
* Gateway is unreachable

Procedure for Authenticating to Windows Server 2008 and Windows Vista.


Note: When using both Windows operating systems, better performance will be obtained by first starting
Windows Server 2008, and wait until it finishes the boot process before starting Windows Vista.

• Windows Server 2008- Switch user to Other User. The userid is Administrator,
password “Pa$$word” (case sensitive). Applications required for this lab are available from
the Desktop, folder “Lab Applications”; however, ArGoSoft Email Server has already been
loaded and an icon installed on the Administrator’s Desktop.

• Windows Vista- Switch to user Administrator, then enter password “Pa$$word” (case
sensitive). Applications required for this lab are available from the Desktop, folder “Lab
Applications”.

Lab Assignment and Survey Completion Information.

Assignments:
Submit assignments to your instructor in a PDF format only. (You may download free .pdf
creation software at http://www.cutepdf.com/products/cutepdf/writer.asp). Create your original
document in Wordpad, Word or any other editor of your choice, and when you are ready to
submit your work, you will “Print” the document to the CutePDF printer to create the .pdf that you
will submit. The assignment should be in Arial 10, single space between lines. The Lab Report
should have a cover page with Name, Course, Assignment, Date. The report will have an
introduction section that gives an overview of the report. The body of the report will show students
work via screen clips and lab discussion as requested in each lab assignment. The report will
have a conclusion section that will summarize activity and lessons learned. Finally, the report will
attach the student survey provided in this document.

All lab assignments are to be completed and submitted to the instructor no later than the due
date, and are late after the due date. Submission instructions will be provided by the instructor,
via blackboard.

Due dates and grading criteria will be provided by the instructor. Screen shots should be
included in the assignment, to demonstrate completion of the lab:

Network Security Lab Addendum 8-Sep-10 Pg: 1


Screen shots are taken from the lab manager virtual machine, look is professional, and
should be cropped so as to NOT include home computer desktop background.

Use applications such as MS “Paint” or “Gadwin Printscreen” to crop and clean up


screen shots before including the graphic in the assignment.

Surveys:
Surveys should be completed and attached to the Lab report. Surveys are not graded but are a
required part of the report. Results of the surveys will be used to improve lab content and inform
the instructor about potential problem areas.

Assignment 1. System Threats and Risks, and Intro to Security

Complete the following Chapter 2 and Chapter 3 labs. In completing this assignment, at a minimum
include screen shots shown below.

Use Lab Manager images W2k8Server and Windows Vista for Chapter 2 and Chapter 3 labs.

Lab Screen Shot Comments


2.1 Pg 16, step 18 Show command that was typed.
Pg 16, step 20 Show Notepad process in Process Explorer.

2.3 Pg 22, step 5 Show MD5 hash for your version of Winscp from the web site.
Pg 23, step 12 Show results of sigcheck command.
Explain any differences.
2.5 Pg 30, step 22 Show contents of Summary page.
Pg 31, step 34 Show Authentication prompt.

3.1 Pg 35, step 8 Show results of the ping command.


Pg 36, step 28 Show Policy File Name window, similar to Figure 3-1.
Pg 36, step 30 Show results of the ping command.
Pg 36, step 34 Show Rollback Security Configuration window.
Pg 36, step 36 Show results of the ping command.
3.3 Pg 44, step 13 Show security template inconsistency, similar to Figure 3-5.
Pg 44, step 14 Show Properties window, similar to Figure 3-6.
3.5 Pg 52, step 24 Show log violation(s), similar to Figure 3-9.

Network Security Lab Addendum 8-Sep-10 Pg: 2


Student Survey 1. System Threats and Risks, and Intro to Security
Strongly Strongly
Question Disagree Disagree Neutral Agree Agree N/A
1. I had access to the Lab Manager environment
when needed.
Comments:

2. The lab manual instructions were clear in


completing chapter lab tasks.
Comments:

3. I spent excessive time working on this


assignment.
Comments:

4. After completing these labs, I better understand


the objectives.
Comments:

5. The instructor was helpful in resolving and lab


issues or answering questions.
Comments:

6. Please provide one recommendation for improving this assignment.

7. From this assignment, please provide one example where you added to your knowledge.

Network Security Lab Addendum 8-Sep-10 Pg: 3

Вам также может понравиться