Question: Module 6 : Assignment 6 . 2 - Creating firewall rules Similar to packet sniffing, port scanning and other security tools, vulnerability scanning can help

Module 6: Assignment 6.2- Creating firewall rules
Similar to packet sniffing, port scanning and other security tools, vulnerability scanning can help you to secure your own network or it can be used by the bad guys to identify weaknesses in your system to mount an attack against. The purpose of a firewall (host based or network based) is to allow or block traffic based on rules. If you are not running a web server, then port 80 should not be open on the system.
You used a network scanner in Module 1, now you will create firewall rules to block or allow traffic.
Purpose
During this assignment, you will create a Windows firewall rule to deny ICMP traffic and traffic out to websites.
Directions
1. Read and execute the instructions for Hands-on Project 2 staring on page 324.
2. Write a paper describing your experience and project results. Describe challenges you encountered.
3. Paste the screenshots into your paper. For each screenshot, describe in DETAIL what is taking place.
4. Save and upload your assignment file here to Canvas.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!