Unit 3 Part 2 Lab - Describe how the dd command

Question # 00851375 Posted By: wildcraft Updated on: 02/29/2024 04:16 AM Due on: 02/29/2024
Subject Computer Science Topic General Computer Science Tutorials:
Question
Dot Image

Unit 3 Part 2 Lab

  1. Describe how the dd command is used in the lab and why dd is a dangerous Linux command. In addition list and describe two other dangerous linux commands.
  2. List and discuss two common SSH security risks. Describe how you would avoid and mitigate each of these risks.
  3. What do the events information, audit success, audit failure, warning, and error mean in the context of windows logs. List and describe any two event codes that you would monitor for Windows security logs and why?
  4. Research iptables firewall rules and write and describe a rule that would drop all SSH connections from a specific IP address.
  5. Write an iptables firewall rule that will allow established and related incoming traffic. Describe what this rule does and why it is not considered a security risk.
  6. why is only port 80 open on 192.168.1.30. What iptables rule would open 192.168.1.30 for http, https, and ssh connections?
Dot Image
Tutorials for this Question
  1. Tutorial # 00846853 Posted By: wildcraft Posted on: 02/29/2024 04:17 AM
    Puchased By: 2
    Tutorial Preview
    The solution of Unit 3 Part 2 Lab - Describe how the dd command...
    Attachments
    Unit_3_Part_2_Lab_-_Describe_how_the_dd_command.ZIP (18.96 KB)

Great! We have found the solution of this question!

Whatsapp Lisa