Working with Firewalls, Encrypted File Systems Essay
Sorry, but copying text is forbidden on this website!
Installing Internet Information Server
Because this is only a test deployment, you will be using a Windows 7 computer to function as the web server. In Exercise 5.1 you install Internet Information Services on your workstation and configure it to host two web sites. Completion time
19. Take a screen shot of the Internet Information Services (IIS) Manager console, showing the new site you created, by pressing Alt+ Prt Scr, and then paste the resulting image into the Lab05_worksheet file in the page provided by pressing Ctrl + V.
Testing IIS Connectivity
In Exercise 5.2, you test the functionality of the web server you just installed. Completion time
What is the result, and what does the result indicate?
What is the result, and what does it indicate?
What is the result?
What is the result?
List three possible reasons why you might be unable to connect to your computers web server using a browser on another computer.
Why is it necessary to clear the cache before you retest the web server connections?
What are the results, and what do the results indicate?
What other test could you perform to prove that it was your computer’s firewall that was blocking the connection and not the firewall on the computer you are using as a client?
Why can you not simply leave Windows Firewall turned off when you deploy an actual web server?
Allowing a Program Through the Firewall
Windows Firewall is preventing clients from connecting to the web server. In Exercise 5.3 to enable client access, you will use the Windows Firewall control panel to allow access to the web server. Completion time
Why are you now able to connect to the Web site from the client?
Why are you unable to connect to the intranet site from the client?
Creating Windows Firewall Rules
The port you opened in Exercise 5.3 enables clients to access the default Web site hosted by your web server, but not the intranet Web site. In this exercise, you use the Windows Firewall with Advanced Security console to create rules that will enable clients to access both Web sites. Completion time
Why are there two separate rules for the World Wide Web Services?
How do the properties of the two rules differ?
How would the opening of the port you performed in Exercise 5.3 affect the World Wide Web Services (HTTP Traffic-In) rules you just examined?
What happens to the list of rules?
How would the rule creation procedure you just performed differ if you wanted to restrict client access to the intranet Web site to computers on the local network only?
14. Take a screen shot of the Properties sheet for the new rule by pressing Alt+ Prt Scr, and then paste the resulting image into the Lab05_worksheet file in the page provided by pressing Ctrl + V.
What are the results, and why are they different from the results you experienced with the program exception?
Using NTFS Compression
The graphic design department uses lots of image files, which are quite large. To save room, they have been saving images as .jpg files, but they are starting to notice degradation in the images when they are printed. They have therefore decided to use Windows bitmap (.bmp) files to store images, which are uncompressed. You need to implement NTFS compression, to save space, on a folder in which they store the .bmp images. Completion time
What color is the font for the Brochure Images folder?
How large is the Picture1file on the disk?
The image file has been moved into a folder using NTFS compression. Why isn’t the file any smaller?
What is the size on disk of the Picture1 file now?
Why did the file shrink, when it remained full size when it was moved?
30. Take a screen shot of the Brochure Images folder showing Picture1 by pressing Alt+ Prt Scr, and then paste the resulting image into the Lab05_worksheet file in the page provided by pressing Ctrl + V.
Using EFS Encryption
The graphic design team is working on a brochure for proprietary software that Contoso is going to use. The software is expected to give the company an edge over other companies, and management is very paranoid about keeping the new concepts secret. To help protect this data, you need to create an encrypted data store using EFS on the computers of all the members in the graphic design team who are assigned to the project. Completion time
What color is the font for the Sensitive Data folder?
Can you read the Sensitive Text file?
What occurs when you try to open the Sensitive Text file?
29. Take a screen shot of the Sensitive Data folder showing the Sensitive Text document by pressing Alt+ Prt Scr, and then paste the resulting image into the Lab05_worksheet file in the page provided by pressing Ctrl + V.