0% found this document useful (0 votes)
30 views39 pages

File Sent

1) The document discusses hands-on exercises on configuring Windows Firewall settings and permissions for files, folders, and users. It includes creating TCP and ICMP outbound rules for Windows Firewall. 2) Hands-on exercises are described for setting permissions for files, folders, and applying file-level encryption. Testing of file, folder and encryption permissions is also covered. 3) A lab exercise questions permissions for files versus folders, effective permissions, and the limitations of encryption for data security.

Uploaded by

nermen wasfy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views39 pages

File Sent

1) The document discusses hands-on exercises on configuring Windows Firewall settings and permissions for files, folders, and users. It includes creating TCP and ICMP outbound rules for Windows Firewall. 2) Hands-on exercises are described for setting permissions for files, folders, and applying file-level encryption. Testing of file, folder and encryption permissions is also covered. 3) A lab exercise questions permissions for files versus folders, effective permissions, and the limitations of encryption for data security.

Uploaded by

nermen wasfy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 39

Faculty of computer and Information Technology

CISCO COMPUTER NETWORK DIPLOMA

CISC 330

Student Name Ghaida Sheikh


Sarah El-Zahrani

Lamia Mohammed
1-Hand s-on Exercise

1) Accessing windows Firewall Basic settings:


• Basic windows Firewall Settings:
• Customize Settings Window For windows Firewall:

2) Examining Windows Firewall with Advanced Security


• Windows firewall with advanced Security console
• Windows Firewall with advanced Security on Local computer Properties

• Outbound Rules in Windows Firewall with Advanced Security


3) Creating a TCP Outbound Rule
• New Outbound Rule Wizard
• New Outbound Rule Wizard Protocol and Ports
• New Outbound Rule Wizard Steps: Name Page
• Windows Firewall with Advanced Security New Outbound Rule
4) Creating an ICMP Outbound Rule:
• New Outbound Rule Wizard Step: Program Page
• Customize ICMP setting:
• New Outbound Rule Steps: Scope Page
• New Outbound Rule Wizard steps: New Page
5) Testing ICMP Rule Outbound Rule:
• New Outbound Rule in windows Firewall with Advanced Security
• Ping Failure

• Ping Success
2-Lab Exercise

1. What are the three main type of networks that Windows Firewall
handles?

following network types:

• Domain (workplace) networks.


• Private (discoverable) networks.
• Public (non-discoverable) networks.

2. It is important to turn Windows Firewall off. True or False?


False

3. What are the four rule types that you can create with the new rule
outbound wizard?
Program, Port, Predefined, and Custom

4. What is an easy way to test ICMP echo requests?


Using the ping command, you can test the Layer 3 network connections
between the host computer and another host device. The host generates and
sends an Echo Request message. The computer or device that the host sent an
Echo query message to receives the request, process it, and send back an
ICMP Echo Reply to the host.

5. You have the option to block all incoming traffic?


True \ You can block all incoming connections to your computer by
turning on Windows Firewall and configuring it to block all incoming
connections.
3-Hands -on Exercises

• User account
• Access control list: illustrate an ACL
1- Setting up creating file and folder:

• Permission Test Folder in C

• New folder Perm_Test_LM or SE


• Create files : four text Document named : test1, test2, test3,and test4.

There is no information in these files


2- Creating file permission:
The types of permissions available in security tab recorded in table 1

Permission for Authenticated


Users Allow Deny
Modify ✓
Read & Execute ✓
Read ✓
Write ✓
Special permission
Table 1
Full control Modify Read & execute
Read Write Special permission

• Edit in test1 permission window then add select users or groups and entered Name
(TestUser2):
• The Default permission given are to allow Read and Read & Execute:
• Under deny column click the write checkbox: Permission for Test1 Given to TestUser2
• Edit in test2 permission window then add select users or groups and entered Name
(TestUser2):

• Allow column: checkbox READ AND Read &Execute


• Edit in test3 permission window then add select users or groups and entered Name
(TestUser2):

• Deny column: checkbox Full control


3- Applying File- Level Encryption:
Right click in text4: locate AxCrypt: bold Encrypt :

Passphrase-protect and verify Passphrase :marcraft


4- Setting Folder Permission :
• Prosperities> edit >Add> add TestUser2
• Deny column: click Read & Execute checkbox
5- Test Folder Permission:
6- Testing File Encryption:
• Find And select to open with Notepad
• Delete the text and addding random characters and save
• Log off > User Testuser2
• Open > Permission Test > Perm_Test_SE
• Try to open test4 AxCrypt

Can’t open

File / folder Permission for TestUser2 Access?


Perm_Test_folder access Allow-write. No access to contents of folder
Deny- Read & Execute, List or the ACL
Folder contents, Read
Test1 Allow- Read & Execute, Can access file but cannot
Read change / save file
Deny – write
Test2 No explicit permission Can access, change, and save
given file
Test3 Deny – full control Denied any access
Test4 Allow- Read & Execute, Can access, change, and save
Read file
write
4-Lab Exercises

1) Which permission do folder have that files do not?

File / folder Permission for TestUser2 Access?


Perm_Test_folder access Allow-write. No access to contents of folder
Deny- Read & Execute, List or the ACL
Folder contents, Read
Test1 Allow- Read & Execute, Can access file but cannot
Read change / save file
Deny – write
Test2 No explicit permission Can access, change, and save
given file
Test3 Deny – full control Denied any access
Test4 Allow- Read & Execute, Can access, change, and save
Read file
write
2) What are effective permissions?
Effective Permissions is a set of permissions of the file or folder for any user or user group.
To secure the contents of the user, Windows sets some permission for each file or folder
object. It grants users specific user rights, that will allow the user or user group to read, modify,
delete, etc the object.

3) Does encryption alone make your data safe?


No , encryption isn't perfect and safe your data.

You might also like