SlideShare a Scribd company logo
1 of 1
Download to read offline
530a2 | Information Systems homework help
Case Project 3-1: Evading Firewalls and the IDPS- 600 WordsYou have been assigned to use
Nmap to develop testing procedures for how attackers might try to evade detection at your
organization’s firewalls and IDPS. Prepare a report that explains which Nmap options can
be used to evade firewalls and IDPSs, and how these options function. Case Project 4-1:
Tunneling IPv6- 2 pagesYou have been assigned to report to your network administrators
on the use of Teredo. Prepare a two-page memo that outlines why Teredo was developed,
how it is implemented in Windows operating systems, for which types of networks it is
appropriate, and how long it should be implemented. Case Project 4-2 Creating ACLs You
have been assigned to create access control lists to filter specific traffic on a Cisco router.
Provide the commands needed to filter the appropriate traffic in each of the following
ACLs. ACL 1 Allow Telnet connections to the 192.168.1.0 network from the host 10.3.4.7
. Allow established connections from 172.16.0.0 network to anywhere. Permit all other
access. ACL 2 Prevent Telnet connections from 192.168.1.0 network to 172.16.0.0
network. Prevent reserved addresses from accessing any network. Deny spoofing from the
broadcast address. Permit all other access.

More Related Content

Similar to 530a2 Information Systems homework help.pdf

It04 roshan basnet
It04 roshan basnetIt04 roshan basnet
It04 roshan basnet
rosu555
 
packet-sniffing-switched-environment-244
packet-sniffing-switched-environment-244packet-sniffing-switched-environment-244
packet-sniffing-switched-environment-244
Tom King
 
Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1
MOHD ARISH
 

Similar to 530a2 Information Systems homework help.pdf (20)

It04 roshan basnet
It04 roshan basnetIt04 roshan basnet
It04 roshan basnet
 
packet-sniffing-switched-environment-244
packet-sniffing-switched-environment-244packet-sniffing-switched-environment-244
packet-sniffing-switched-environment-244
 
Nmap & Network sniffing
Nmap & Network sniffingNmap & Network sniffing
Nmap & Network sniffing
 
Network Security
Network SecurityNetwork Security
Network Security
 
Ccna 4 Chapter 1 V4.0 Answers
Ccna 4 Chapter 1 V4.0 AnswersCcna 4 Chapter 1 V4.0 Answers
Ccna 4 Chapter 1 V4.0 Answers
 
Linux Based Advanced Routing with Firewall and Traffic Control
Linux Based Advanced Routing with Firewall and Traffic ControlLinux Based Advanced Routing with Firewall and Traffic Control
Linux Based Advanced Routing with Firewall and Traffic Control
 
G3t R00t at IUT
G3t R00t at IUTG3t R00t at IUT
G3t R00t at IUT
 
Netw204 Quiz Answers Essay
Netw204 Quiz Answers EssayNetw204 Quiz Answers Essay
Netw204 Quiz Answers Essay
 
CEH v9 cheat sheet notes Certified Ethical Hacker
CEH v9 cheat sheet notes  Certified Ethical HackerCEH v9 cheat sheet notes  Certified Ethical Hacker
CEH v9 cheat sheet notes Certified Ethical Hacker
 
Alessio Lama - Development and testing of a safety network protocol
Alessio Lama - Development and testing of a safety network protocolAlessio Lama - Development and testing of a safety network protocol
Alessio Lama - Development and testing of a safety network protocol
 
CompTIA Security Plus Overview
CompTIA Security Plus OverviewCompTIA Security Plus Overview
CompTIA Security Plus Overview
 
111
111111
111
 
111
111111
111
 
Cyber security tutorial2
Cyber security tutorial2Cyber security tutorial2
Cyber security tutorial2
 
2015_01 - Networking Session - SPHMMC ICT workshop
2015_01 - Networking Session - SPHMMC ICT workshop2015_01 - Networking Session - SPHMMC ICT workshop
2015_01 - Networking Session - SPHMMC ICT workshop
 
Us 13-opi-evading-deep-inspection-for-fun-and-shell-wp
Us 13-opi-evading-deep-inspection-for-fun-and-shell-wpUs 13-opi-evading-deep-inspection-for-fun-and-shell-wp
Us 13-opi-evading-deep-inspection-for-fun-and-shell-wp
 
Firewall configuration
Firewall configurationFirewall configuration
Firewall configuration
 
Seminar Report - Network Intrusion Prevention by Configuring ACLs on the Rout...
Seminar Report - Network Intrusion Prevention by Configuring ACLs on the Rout...Seminar Report - Network Intrusion Prevention by Configuring ACLs on the Rout...
Seminar Report - Network Intrusion Prevention by Configuring ACLs on the Rout...
 
Automating cloud security - Jonny Griffin
Automating cloud security - Jonny GriffinAutomating cloud security - Jonny Griffin
Automating cloud security - Jonny Griffin
 
Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1
 

More from study help

BIOL103 Hazardous waste in Kuwait.pdf
BIOL103 Hazardous waste in Kuwait.pdfBIOL103 Hazardous waste in Kuwait.pdf
BIOL103 Hazardous waste in Kuwait.pdf
study help
 
Need this tableau work done.pdf
Need this tableau work done.pdfNeed this tableau work done.pdf
Need this tableau work done.pdf
study help
 
Fixed Income Investment Portfolio Project.pdf
Fixed Income Investment Portfolio Project.pdfFixed Income Investment Portfolio Project.pdf
Fixed Income Investment Portfolio Project.pdf
study help
 
Learning Debt Financing and Education.pdf
Learning Debt Financing and Education.pdfLearning Debt Financing and Education.pdf
Learning Debt Financing and Education.pdf
study help
 
What is a program in c language.pdf
What is a program in c language.pdfWhat is a program in c language.pdf
What is a program in c language.pdf
study help
 
number one is a Discussion response of at.pdf
number one is a Discussion response of at.pdfnumber one is a Discussion response of at.pdf
number one is a Discussion response of at.pdf
study help
 
Read the text below and answer the.pdf
Read the text below and answer the.pdfRead the text below and answer the.pdf
Read the text below and answer the.pdf
study help
 
Im missing a conclusion Wr ite a final conclusion for.pdf
Im missing a conclusion Wr ite a final conclusion for.pdfIm missing a conclusion Wr ite a final conclusion for.pdf
Im missing a conclusion Wr ite a final conclusion for.pdf
study help
 
Please assist with the below Thank.pdf
Please assist with the below Thank.pdfPlease assist with the below Thank.pdf
Please assist with the below Thank.pdf
study help
 
ques How has your sense of who you are shaped.pdf
ques How has your sense of who you are shaped.pdfques How has your sense of who you are shaped.pdf
ques How has your sense of who you are shaped.pdf
study help
 
Please Reference each website as well as.pdf
Please Reference each website as well as.pdfPlease Reference each website as well as.pdf
Please Reference each website as well as.pdf
study help
 
Raskolnikov got and sat down on the He waved his.pdf
Raskolnikov got and sat down on the He waved his.pdfRaskolnikov got and sat down on the He waved his.pdf
Raskolnikov got and sat down on the He waved his.pdf
study help
 

More from study help (20)

ESL Question.pdf
ESL Question.pdfESL Question.pdf
ESL Question.pdf
 
BIOL103 Hazardous waste in Kuwait.pdf
BIOL103 Hazardous waste in Kuwait.pdfBIOL103 Hazardous waste in Kuwait.pdf
BIOL103 Hazardous waste in Kuwait.pdf
 
Econometrics project AoE.pdf
Econometrics project AoE.pdfEconometrics project AoE.pdf
Econometrics project AoE.pdf
 
English Question.pdf
English Question.pdfEnglish Question.pdf
English Question.pdf
 
Script Pipeline Analysis.pdf
Script Pipeline Analysis.pdfScript Pipeline Analysis.pdf
Script Pipeline Analysis.pdf
 
Need this tableau work done.pdf
Need this tableau work done.pdfNeed this tableau work done.pdf
Need this tableau work done.pdf
 
Fixed Income Investment Portfolio Project.pdf
Fixed Income Investment Portfolio Project.pdfFixed Income Investment Portfolio Project.pdf
Fixed Income Investment Portfolio Project.pdf
 
Religion Question.pdf
Religion Question.pdfReligion Question.pdf
Religion Question.pdf
 
Short answer questions.pdf
Short answer questions.pdfShort answer questions.pdf
Short answer questions.pdf
 
Writing Question.pdf
Writing Question.pdfWriting Question.pdf
Writing Question.pdf
 
Learning Debt Financing and Education.pdf
Learning Debt Financing and Education.pdfLearning Debt Financing and Education.pdf
Learning Debt Financing and Education.pdf
 
What is a program in c language.pdf
What is a program in c language.pdfWhat is a program in c language.pdf
What is a program in c language.pdf
 
number one is a Discussion response of at.pdf
number one is a Discussion response of at.pdfnumber one is a Discussion response of at.pdf
number one is a Discussion response of at.pdf
 
Read the text below and answer the.pdf
Read the text below and answer the.pdfRead the text below and answer the.pdf
Read the text below and answer the.pdf
 
Criterion 3 Teaching for.pdf
Criterion 3 Teaching for.pdfCriterion 3 Teaching for.pdf
Criterion 3 Teaching for.pdf
 
Im missing a conclusion Wr ite a final conclusion for.pdf
Im missing a conclusion Wr ite a final conclusion for.pdfIm missing a conclusion Wr ite a final conclusion for.pdf
Im missing a conclusion Wr ite a final conclusion for.pdf
 
Please assist with the below Thank.pdf
Please assist with the below Thank.pdfPlease assist with the below Thank.pdf
Please assist with the below Thank.pdf
 
ques How has your sense of who you are shaped.pdf
ques How has your sense of who you are shaped.pdfques How has your sense of who you are shaped.pdf
ques How has your sense of who you are shaped.pdf
 
Please Reference each website as well as.pdf
Please Reference each website as well as.pdfPlease Reference each website as well as.pdf
Please Reference each website as well as.pdf
 
Raskolnikov got and sat down on the He waved his.pdf
Raskolnikov got and sat down on the He waved his.pdfRaskolnikov got and sat down on the He waved his.pdf
Raskolnikov got and sat down on the He waved his.pdf
 

Recently uploaded

Abortion pills in Riyadh Saudi Arabia (+966572737505 buy cytotec
Abortion pills in Riyadh Saudi Arabia (+966572737505 buy cytotecAbortion pills in Riyadh Saudi Arabia (+966572737505 buy cytotec
Abortion pills in Riyadh Saudi Arabia (+966572737505 buy cytotec
Abortion pills in Riyadh +966572737505 get cytotec
 
obat aborsi Banjarmasin wa 082135199655 jual obat aborsi cytotec asli di Ban...
obat aborsi Banjarmasin wa 082135199655 jual obat aborsi cytotec asli di  Ban...obat aborsi Banjarmasin wa 082135199655 jual obat aborsi cytotec asli di  Ban...
obat aborsi Banjarmasin wa 082135199655 jual obat aborsi cytotec asli di Ban...
siskavia95
 
obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...
obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...
obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...
yulianti213969
 
原件一样伦敦国王学院毕业证成绩单留信学历认证
原件一样伦敦国王学院毕业证成绩单留信学历认证原件一样伦敦国王学院毕业证成绩单留信学历认证
原件一样伦敦国王学院毕业证成绩单留信学历认证
pwgnohujw
 
Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...
Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...
Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...
Valters Lauzums
 
Abortion Clinic in Kempton Park +27791653574 WhatsApp Abortion Clinic Service...
Abortion Clinic in Kempton Park +27791653574 WhatsApp Abortion Clinic Service...Abortion Clinic in Kempton Park +27791653574 WhatsApp Abortion Clinic Service...
Abortion Clinic in Kempton Park +27791653574 WhatsApp Abortion Clinic Service...
mikehavy0
 
Audience Researchndfhcvnfgvgbhujhgfv.pptx
Audience Researchndfhcvnfgvgbhujhgfv.pptxAudience Researchndfhcvnfgvgbhujhgfv.pptx
Audience Researchndfhcvnfgvgbhujhgfv.pptx
Stephen266013
 
Displacement, Velocity, Acceleration, and Second Derivatives
Displacement, Velocity, Acceleration, and Second DerivativesDisplacement, Velocity, Acceleration, and Second Derivatives
Displacement, Velocity, Acceleration, and Second Derivatives
23050636
 

Recently uploaded (20)

Abortion pills in Riyadh Saudi Arabia (+966572737505 buy cytotec
Abortion pills in Riyadh Saudi Arabia (+966572737505 buy cytotecAbortion pills in Riyadh Saudi Arabia (+966572737505 buy cytotec
Abortion pills in Riyadh Saudi Arabia (+966572737505 buy cytotec
 
obat aborsi Banjarmasin wa 082135199655 jual obat aborsi cytotec asli di Ban...
obat aborsi Banjarmasin wa 082135199655 jual obat aborsi cytotec asli di  Ban...obat aborsi Banjarmasin wa 082135199655 jual obat aborsi cytotec asli di  Ban...
obat aborsi Banjarmasin wa 082135199655 jual obat aborsi cytotec asli di Ban...
 
社内勉強会資料_Object Recognition as Next Token Prediction
社内勉強会資料_Object Recognition as Next Token Prediction社内勉強会資料_Object Recognition as Next Token Prediction
社内勉強会資料_Object Recognition as Next Token Prediction
 
Fuel Efficiency Forecast: Predictive Analytics for a Greener Automotive Future
Fuel Efficiency Forecast: Predictive Analytics for a Greener Automotive FutureFuel Efficiency Forecast: Predictive Analytics for a Greener Automotive Future
Fuel Efficiency Forecast: Predictive Analytics for a Greener Automotive Future
 
Identify Customer Segments to Create Customer Offers for Each Segment - Appli...
Identify Customer Segments to Create Customer Offers for Each Segment - Appli...Identify Customer Segments to Create Customer Offers for Each Segment - Appli...
Identify Customer Segments to Create Customer Offers for Each Segment - Appli...
 
obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...
obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...
obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...
 
原件一样伦敦国王学院毕业证成绩单留信学历认证
原件一样伦敦国王学院毕业证成绩单留信学历认证原件一样伦敦国王学院毕业证成绩单留信学历认证
原件一样伦敦国王学院毕业证成绩单留信学历认证
 
Formulas dax para power bI de microsoft.pdf
Formulas dax para power bI de microsoft.pdfFormulas dax para power bI de microsoft.pdf
Formulas dax para power bI de microsoft.pdf
 
Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...
Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...
Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...
 
Abortion Clinic in Kempton Park +27791653574 WhatsApp Abortion Clinic Service...
Abortion Clinic in Kempton Park +27791653574 WhatsApp Abortion Clinic Service...Abortion Clinic in Kempton Park +27791653574 WhatsApp Abortion Clinic Service...
Abortion Clinic in Kempton Park +27791653574 WhatsApp Abortion Clinic Service...
 
Chapter 1 - Introduction to Data Mining Concepts and Techniques.pptx
Chapter 1 - Introduction to Data Mining Concepts and Techniques.pptxChapter 1 - Introduction to Data Mining Concepts and Techniques.pptx
Chapter 1 - Introduction to Data Mining Concepts and Techniques.pptx
 
Statistics Informed Decisions Using Data 5th edition by Michael Sullivan solu...
Statistics Informed Decisions Using Data 5th edition by Michael Sullivan solu...Statistics Informed Decisions Using Data 5th edition by Michael Sullivan solu...
Statistics Informed Decisions Using Data 5th edition by Michael Sullivan solu...
 
Identify Rules that Predict Patient’s Heart Disease - An Application of Decis...
Identify Rules that Predict Patient’s Heart Disease - An Application of Decis...Identify Rules that Predict Patient’s Heart Disease - An Application of Decis...
Identify Rules that Predict Patient’s Heart Disease - An Application of Decis...
 
Ranking and Scoring Exercises for Research
Ranking and Scoring Exercises for ResearchRanking and Scoring Exercises for Research
Ranking and Scoring Exercises for Research
 
Aggregations - The Elasticsearch "GROUP BY"
Aggregations - The Elasticsearch "GROUP BY"Aggregations - The Elasticsearch "GROUP BY"
Aggregations - The Elasticsearch "GROUP BY"
 
Audience Researchndfhcvnfgvgbhujhgfv.pptx
Audience Researchndfhcvnfgvgbhujhgfv.pptxAudience Researchndfhcvnfgvgbhujhgfv.pptx
Audience Researchndfhcvnfgvgbhujhgfv.pptx
 
Seven tools of quality control.slideshare
Seven tools of quality control.slideshareSeven tools of quality control.slideshare
Seven tools of quality control.slideshare
 
Predictive Precipitation: Advanced Rain Forecasting Techniques
Predictive Precipitation: Advanced Rain Forecasting TechniquesPredictive Precipitation: Advanced Rain Forecasting Techniques
Predictive Precipitation: Advanced Rain Forecasting Techniques
 
Displacement, Velocity, Acceleration, and Second Derivatives
Displacement, Velocity, Acceleration, and Second DerivativesDisplacement, Velocity, Acceleration, and Second Derivatives
Displacement, Velocity, Acceleration, and Second Derivatives
 
Las implicancias del memorándum de entendimiento entre Codelco y SQM según la...
Las implicancias del memorándum de entendimiento entre Codelco y SQM según la...Las implicancias del memorándum de entendimiento entre Codelco y SQM según la...
Las implicancias del memorándum de entendimiento entre Codelco y SQM según la...
 

530a2 Information Systems homework help.pdf

  • 1. 530a2 | Information Systems homework help Case Project 3-1: Evading Firewalls and the IDPS- 600 WordsYou have been assigned to use Nmap to develop testing procedures for how attackers might try to evade detection at your organization’s firewalls and IDPS. Prepare a report that explains which Nmap options can be used to evade firewalls and IDPSs, and how these options function. Case Project 4-1: Tunneling IPv6- 2 pagesYou have been assigned to report to your network administrators on the use of Teredo. Prepare a two-page memo that outlines why Teredo was developed, how it is implemented in Windows operating systems, for which types of networks it is appropriate, and how long it should be implemented. Case Project 4-2 Creating ACLs You have been assigned to create access control lists to filter specific traffic on a Cisco router. Provide the commands needed to filter the appropriate traffic in each of the following ACLs. ACL 1 Allow Telnet connections to the 192.168.1.0 network from the host 10.3.4.7 . Allow established connections from 172.16.0.0 network to anywhere. Permit all other access. ACL 2 Prevent Telnet connections from 192.168.1.0 network to 172.16.0.0 network. Prevent reserved addresses from accessing any network. Deny spoofing from the broadcast address. Permit all other access.