Sec572 Security Testing Ilab

Related Essays

Security Testing From Agile Perspective.
getting its due importance. In this paper we would discuss issues involved in security testing in traditional software development lifecycle approach like waterfall
Security Test
general manager, wants to hire off-duty police officers as part-time security staff. Which of the following statements about off-duty police officers is false?Answer
Penetration Testing
payroll or an audit, and chances are they'll recognize the need for improvements in security. For the test results to have maximum impact, the tester needs to put
Cobit Security Checklist
seventh checklist item is COBIT DS5.5, which specifies proactive IT security testing. It also specifies logging and monitoring functions that will facilitate early

Submitted by to the category Science and Technology on 04/18/2013 08:39 PM

Student Name _________________________________ Date _____________

SEC572 Security Testing iLab

Task 1 – Verify Connectivity between Router and Hosts

Complete the table below based on the dynamic routes displayed in the routing table:

Routing protocol | Destination Network | Metric | Outbound Interface |

| | | |

| | | |

* Select the Task 1 commands and output in the Virtual CLI using the mouse. Click on the Copy button. Use <Ctrl>V to paste the commands into your Lab Document.

Task 2 – Flow Analysis Security Port Scans

* Open the Permitted services links Public_Server->Dallas_Host and Public_Server->Dallas_Server. Note the TCP and UDP port numbers that are open. Use <Alt><PrtSc> to capture the Public_Server->Dallas_Host and the Public_Server->Dallas_Server windows and use <Ctrl>V to paste the two captured windows into your Lab Document. [Note: expand the window to show the entire table content]

* What are the UDP and TCP ports that are permitted in traffic from the Public_Server to the Dallas_Host? What are the UDP and TCP ports that are permitted in traffic from the Public_Server to the Dallas_Server?

Destination | UDP Ports Permitted | TCP Ports Permitted |

Dallas_Host | | |

Dallas_Server | | |

Task 3 - Deny Upper TCP ports Public_Server->Dallas Server

* Use the Dallas router Virtual CLI (as we did in Task 1) to define an extended ACL that will deny all TCP services with port numbers above 255 from the Public Server to the Dallas Server while allowing all other traffic. Apply the ACL to the outside (S0/1) interface of the Dallas router for all inbound traffic. Execute a show running-config command to verify. Copy these Virtual CLI commands and the command output to your iLab document. The required commands are shown below:

* Open the Permitted services links “Public_Server->Dallas_Host” and “Public_Server->Dallas_Server”. Note the TCP and...

View Full Essay
Full Essay Stats...
  • Words: 427
  • Pages: 2
  • Views: 629

Join now to view this essay and thousands of others on It's free Join Now!