Question: A network administrator has installed remote control software (Similar to a Trojan horse) in a number of external hosts, in order to control them remotely
A network administrator has installed remote control software (Similar to a Trojan horse) in a number of external hosts, in order to control them remotely from his host. The administrator's host (193.195.1.30) is located in a LAN protected by a Firewall. The server of the software is expected to run on the port 8, and use TCP protocol. Write the appropriate filtering rules to allow the network administrator to control remotely the external hosts running the remote control software
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
