LAB #9 - Essay Example

Comments (0) Cite this document
It establishes a barrier between a trusted, secure internal network, with another network, assumed not secure and not trusted. Many…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER92% of users find it useful
LAB #9
Read TextPreview

Extract of sample "LAB #9"

IMPORTANCE OF FIREWALL, NETSTAT AND SYSTEMCTL COMMANDS INTRODUCTION In computing, firewall refers to a network security system that controls the incoming and outgoing network traffic based on an applied rule set. It establishes a barrier between a trusted, secure internal network, with another network, assumed not secure and not trusted. Many personal computer operating systems incorporate software-based firewalls to protect against threats from the public Internet.
Netstat is a command-line tool that displays network connections for the transmission control protocol, routing tables and a network interface and network protocol statistics. Additionally, Netstat can be used to show sockets that are listening on your system. Netstat can be used to help determine if there are unauthorized outlets open to or from your system, which could indicate malicious activity being directed towards your system.
System CT is a command line utility that is used to control various aspects of services on a system (start or stop, run at startup). It is used to introspect the state of the system and service manager.
Major options used
-t, --type= The argument is usually a comma separated list of unit types such as service and socket
--state= a comma-separated list should be used as the argument for unit LOAD, SUB or ACTIVE status. The specified states are shown when the units are listed.
-p,--property= Used when teaching unit/manager properties with show command, limit display to certain features as specified by argument
-a,--all Used when listing groups, showing all loaded units and inactive units regardless of their state. Also shows all properties regardless of whether they are set or not. The list group files command is often used in listing all units.
--runtime: used with enable, disable or edit, it makes changes temporarily and are lost on reboot
Netstat options
-a = used to display active TCP connections with the listening state and UDP ports being that are being listened.
-b = shows the processes actual file name
-e = used as a switch to display statistics about the network connection.
-f = makes the command display the fully qualified domain name (FQDN), and foreign IP addresses are applicable.
-n = used to prevent Netstat from attempting to determine host names for external IP addresses.
-o = used for troubleshooting tasks and displays the PID associated with any displayed connection.
-s = used to show detailed statistics by protocol.
-t + shows the current TCP Chimney offload state in the place of displayed TCP state.
-x = shows all network direct listeners, connections, and endpoints.
Firewall options
The firewall uses many options specifically for certain tasks. There are options administrator accounts, anti-virus, audit, downloads, DNS, amongst others.
These commands can be used on various operating systems and can be applied to any network issues, and system administrators and network and internet administrators can use them.
In troubleshooting of common system errors, this commands are easier to use and understand. Read More
Cite this document
  • APA
  • MLA
(“LAB #9 Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
LAB #9 Essay Example | Topics and Well Written Essays - 500 words. Retrieved from
(LAB #9 Essay Example | Topics and Well Written Essays - 500 Words)
LAB #9 Essay Example | Topics and Well Written Essays - 500 Words.
“LAB #9 Essay Example | Topics and Well Written Essays - 500 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document


Ethical hacking

...content/structure [31 - 40] Very good content/structure [21 – 30] Good content/lacking some clarity or structure [11 – 20] Adequate/lacking content [0 – 10] Misleading/incorrect methods or structure /50 Activity and Results [19 - 20] Excellent [16 - 18] Covered well [10 - 15] Good, missing some elements [0 – 9] Very poor or missing most elements /20 Reflection [16 – 20] Excellent including related thoughts/ideas [11 – 15] Good, many areas covered [5 – 10] Relates only to lab outcomes with lack of personal insight [1 -4] Lack of depth of reflection / limited content [0] No reflection /20 Total /100 Lab Description Lab 2 - Essential TCP/IP tools Description of exercise...
8 Pages(2000 words)Coursework

LSweek 9 m 9

...? Why sustainability must become a fundamental factor in the calculus of management A review of literature Sustainability as a fundamental factor in cal management Sustainable development in management is an important venture in the corporate world as asserted by McElroy (2010), tensions exhibited with the use sustainability in relation to organizational activities such as strategic management and measurement of performance. As mentioned in earlier discussions, sustainable development refers to a conservancy driven development that seeks to assure the needs of the present day while conserving future needs for future generations. Thesis The concepts of sustained development is based on the ideas of ensuring that the basic needs... Why...
4 Pages(1000 words)Essay

Lab #7 and #9

...cingulate gyrus during selective attention performance. Lab # 9 Article 1: Tucker, L. A. and Kano, M. J. (1992). Dietary fat and body fat: a multivariate study of 205 adult females. American Journal of Clinical Nutrition, 56:616-22. Did the article imply causation? Yes Summary: Obesity increases the risk of mortality and morbidity chronic diseases such as diabetes and stroke. Although excess energy intake directly contributed to obesity some animal experiments have shown a relationship with diet composition. This cross sectional study was carried out to find out the relationship between dietary fat intake and obesity. For this study 205 females were recruited and their food consumption details were...
2 Pages(500 words)Assignment

Lab work 9

...Lab Work 9 Answers only….Please put answers in simple writing term, because I study off of your answers as well. Thanks so much for your assistance with this. 1. Give the function for these formed elements 1a. Lymphocytes- A type of agranular leukocytes the mediate immune responses, including antigen- antibody reactions. Lymphocytes can be B cells (which primarily secrete antibodies) or T cells (which attack viruses, cancer cells, and transplanted tissue cells). Natural killer cells are also lymphocytic type that attack microbes and some tumor cells (Tortora and Derrickson 742). 1b. Eosinophils/ Basophils- Eosinophils (those that stain red) function mainly in allergic reactions by combating the effects of...
1 Pages(250 words)Coursework


... Procedure This experiment requires three cuvettes, a spectrophotometer, a graduated cylinder, dye of three differentcolours. The first step is to fill the three cuvettes with red dye, green dye and blue dye with each holding a dye of different colour. The initial concentrations of these dye is 100% at the beginning of the experiment. The cuvettes are then placed into a spectrophotometer. They are oriented in such a way that their smooth sides lining face the light source to enable easy penetration of light through them. Multiple trials were then performed because the spectrophotometer can only measure one sample at a time. In order to ensure accuracy and precision, it was necessary to re-calibrate the spectrophotometer three... Procedure...
1 Pages(250 words)Essay


...WiFi Hot Spot of WiFi Hot Spot Before starting this there are few things should be checked that are. Either of the type (Desktop / Laptop) of the system it must have wireless LAN card installed. For wireless hotspot we need a wireless connection to be free from use and wired LAN connection to be connected. We will use that wired LAN connection to share the connection wirelessly with others. Keep this noted that some work network do not allow connection sharing because of group policies defined by the network engineers. Step 1: We shall start working by going into the Network and Sharing Center via Control Panel; it can also be quickly accessed by right-clicking on the network icon in the system tray. Once we are there, we... Hot Spot of WiFi ...
2 Pages(500 words)Lab Report


...Experiment #3 — observing the Moon’s Phases Objective To determine the relationship of the Earth, Moon and Sun as the Moon orbits the Earth. Introduction In astronomy, determining the relative position of the moon, the sun and the Earth requires the study of phases of the moon at different days of observation. In which case, complete cycle through the phases called lunar month gives the synodic month, always around 29 days. The lab report studied these phenomena to realize moon’s position in relation to the other two. Procedure The moon was observed and a dark part was shaded to show how the moon would look like at each point from the Earth. Each phases of the moon was labeled and presented in diagram forms as shown in...
1 Pages(250 words)Essay


...Discussion In the test for the engine parameters, it was found out that the temperature changes for ambient temperature, and fuel in the engine increased with time. On the other hand, the temperatures for oil output, the exhaust, cooler in the engine, the cooler output and the oil input decrease with time. The results recorded were used to calculate for the derived values such that torque was obtained as 72.7 N/M and ranges between 72.1 N/M - 72.7 N/M, the brake power was obtained to be in the range 40987.46667 KW - 8370.193333 KW, the brake thermal efficiency was calculated to be 32% and ranges between 23.4 % - 32.4 %. Finally the volumetric efficiency was found to be 60%. It is important to point out that the torque... In the test for the...
2 Pages(500 words)Lab Report


...Lab It is crucial to familiarize with various concepts before conducting lab experiments. One of the importantconcepts for this experiment is solubility, which can be defined as the ability of a substance (solute) to dissolve in another (solvent) (Bauer et al. 216). The estimation maximum quantity of a substance that dissolves in a solvent at equilibrium yields solubility (Brown et al. 120). Qualitative analysis is done to identify elements in the sample used for the experiment. For this experiment, qualitative analysis was employed to establish whether or not a precipitate would form upon adding some acids and bases. A flow chart was used to distinguish between cations in the resultant solution. A flow...
1 Pages(250 words)Essay


...Should this Ore be mined Introduction Prior to working on the lab experiment, various perceptions should be comprehended such asspectroscopy method utilized in the lab. Calorimeter also known as spectrometer is a tool that is used in figuring out the quantity of light that a given solution absorbs while using various wavelengths (λ).The spectrometer cannot determine the quantity of light absorbed(A) by certain solution unless calibration is done first. The opposite of Transmittance (T %) is Absorbance (A) which can be defined as the quantity of light that is absorbed or transmitted through a sample. Moreover, a highly concentrated solution is, the more it absorbs light, and the less transmitted light...
2 Pages(500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic LAB #9 for FREE!

Contact Us