CSN09101 Networked Services Week 9: Early revision session Module Leader: Dr Gordon Russell Lecturers: G. Russell.

Slides:



Advertisements
Similar presentations
MFA for Business Banking – Security Code Multifactor Authentication: Quick Tip Sheets Note to Financial Institutions: We are providing these QT sheets.
Advertisements

1 Copyright © 2002 Pearson Education, Inc.. 2 Chapter 2 Getting Started.
© University of Reading School of Systems Engineering Matlab Assessment for Final Year Units Victor M. Becerra School of Systems.
Protocol layers and Wireshark Rahul Hiran TDTS11:Computer Networks and Internet Protocols 1 Note: T he slides are adapted and modified based on slides.
Everything.
Services Course Evaluation. 2 How to complete the Evaluation The Evaluation consists of 10 multiple choice questions to test.
1. 2 Its almost time to take the FCAT 2.0! Here are some important explanations and reminders to help you do your very best.
1. 2 Its almost time to take the FCAT 2.0! Here are some important explanations and reminders to help you do your very best.
1. 2 Its almost time to take the Computer Based Exam Biology EOC! Here are some important explanations and reminders to help you do your very best.
CCENT Study Guide Chapter 12 Security.
Media-X eWalk Walkthrough Install Training- Part Two Topic: Uploading Completed Walkthroughs Office of Institutional Education Programs 1.
Computer Architecture
Linux commands exercise 1. What do you need, if you try to these at home? You need to download and install Ubuntu Linux from the Internet – DVD is need.
1. 2 It’s almost time to take the Computer Based Exams (FCAT 2.0 and EOC)! Here are some important explanations and reminders to help you do your very.
We’ll be spending minutes talking about Quiz 1 that you’ll be taking at the next class session before you take the Gateway Quiz today.
Year 6 SATs th May – 15th May 2015.
Firewall Simulation Teaching Information Security Using: Visualization Tools, Case Studies, and Hands-on Exercises May 23, 2012.
Ipchains and Iptables Linux operating system natively supports packet-filtering rules: Kernel versions 2.2 and earlier support the ipchains command. Kernel.
Zhang Hongyi CSCI2100B Data Structures Tutorial 2
SYSTEM ADMINISTRATION Chapter 19
CSCI 530 Lab Firewalls. Overview Firewalls Capabilities Limitations What are we limiting with a firewall? General Network Security Strategies Packet Filtering.
The Internet. Telnet Telnet means using your computer as a terminal. All commands you type are sent to the host computer you are connected to and executed.
Chapter 23: ARP, ICMP, DHCP IS333 Spring 2015.
Click to edit Master subtitle style Chapter 17: Troubleshooting Tools Instructor:
Engineering H192 - Computer Programming The Ohio State University Gateway Engineering Education Coalition Lect 4P. 1Winter Quarter Introduction to UNIX.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Advanced Networking for DVRs
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
Module 7: Configuring TCP/IP Addressing and Name Resolution.
TUTORIAL # 2 INFORMATION SECURITY 493. LAB # 4 (ROUTING TABLE & FIREWALLS) Routing tables is an electronic table (file) or database type object It is.
ActEyes IP Cam Training Part 1: Camera Setup. Network Setup Overview Each IP Cam on the network will need its own IP address to be assigned. This address.
Chapter 9 Part II Linux Command Line Access to Linux Authenticated login using a Linux account is required to access a Linux system. The Linux prompt will.
07/11/ L10/1/63 COM342 Networks and Data Communications Ian McCrumRoom 5B18 Tel: voice.
Karlstad University Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
Microsoft Internet Security and Acceleration (ISA) Server 2004 is an advanced packet checking and application-layer firewall, virtual private network.
1 HCC Brandon Independent Study Orientation Power Point Instructor: Tiffany Cantrell.
Recovery-Oriented Computing User Study Training Materials October 2003.
1 The Firewall Menu. 2 Firewall Overview The GD eSeries appliance provides multiple pre-defined firewall components/sections which you can configure uniquely.
This presentation is designed to help assist you in registering and creating an account to do online homework using the MyMathLab program via CourseCompass.
INSTALLATION HANDS-ON. Page 2 About the Hands-On This hands-on section is structured in a way, that it allows you to work independently, but still giving.
Links and LANs Link between two computers via cross cable The most simple way to connect two hosts is to link the two hosts with a cross cable.
Hour 7 The Application Layer 1. What Is the Application Layer? The Application layer is the top layer in TCP/IP's protocol suite Some of the components.
CPSC 217 T03 Week I Part #1: Unix and HELLO WORLD Hubert (Sathaporn) Hu.
COP3502: Introduction to Computer Science Yashas Shankar.
Session 4: PREPARE FOR TESTS Year 7 Life Skills Student Wall Planner and Study Guide.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
Firewall Tutorial Hyukjae Jang Nc lab, CS dept, Kaist.
CGI Common Gateway Interface. CGI is the scheme to interface other programs to the Web Server.
CSN09101 Networked Services Week 6 : Firewalls + Security Module Leader: Dr Gordon Russell Lecturers: G. Russell.
Data Communications and Networks
Creating Programs on UNIX This term you can create programs on UNIX or you can create programs using a C++ compiler on your PC. This set of slides steps.
Telnet allows you to log in remotely to other computers connected to the Internet (but only computers that are set up to be logged in to). Once logged.
Networks Part 3: Packet Paths + Wireshark NYU-Poly: HSWP Instructor: Mandy Galante.
Information Security 493. Lab # 4 (Routing table & firewalls) Routing tables is an electronic table (file) or database type object that is stored in a.
1 Day 2 Logging in, Passwords, Man, talk, write. 2 Logging in Unix is a multi user system –Many people can be using it at the same time. –Connections.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
These steps will guide you through installing the pcAnywhere Host software so that we can remote control your PC from NZ! Once installed, it will only.
We’ll be spending a few minutes talking about Quiz 2 on Sections that you’ll be taking the next class session, before you work on Practice Quiz.
COSC513 Final Project Firewall in Internet Security Student Name: Jinqi Zhang Student ID: Instructor Name: Dr.Anvari.
MR-110 Keyboarding II Amber Krasny, MBA, CPC, CMRS.
Linux Tutorial Lesson Two *Getting Help in Linux *Data movement and manipulation *Relative and Absolute path *Processes Note: see chapter 1,2,3 from Linux.
1 UNIT 13 The World Wide Web. Introduction 2 Agenda The World Wide Web Search Engines Video Streaming 3.
Key Stage 2 SATs Parents’ Meeting Wednesday 4 th March 2015.
Firewalls. A Firewall is: a) Device that interconnects two networks b) Network device that regulates the access to an internal network c) Program that.
GCSE Mathematics Revision 2016/2017
Firewall Exercise.
Setting Up Firewall using Netfilter and Iptables
OPS235: Configuring a Network Using Virtual Machines – Part 2
Getting Started: Amazon AWS Account Creation
From ACCEPT to MASQUERADE Tim(othy) Clark (eclipse)
Presentation transcript:

CSN09101 Networked Services Week 9: Early revision session Module Leader: Dr Gordon Russell Lecturers: G. Russell

This lecture Preparation for Class Test Past Paper Exercises

Practical Class Test

Class Test The class test is a timed event, lasting up to 1hour 30 minutes. All the marks are on accuracy. There is no advantage in finishing early unless you correctly answer all the questions. It is only the best (i.e. Highest mark) for each question which is used to calculate your score. Remember the class average should be 55%. That is what the University recommends. You will be ed after a few days with your final mark and how the mark was calculated.

Each question has 1 or more Check buttons. You get the mark back immediately (Current Score). Press the Check button as often as you like Your actual score is the highest Current Score for that check (shown in Best Score). So don’t worry if you has 100% then get 0%, as your final mark uses the 100%.

Each question is weighted equally. If there are 4 questions then they are worth 100/4 each. If a question has two check buttons, then each check score is worth the question score / 2. Thus each button is weighted equally within a question.

The practical test is OPEN BOOK. The final exam is also OPEN BOOK. This means you can take into the exam any notes or books you like. You are not allowed electronic support (except the computer you are sitting at for the practical test). For instance, you cannot take your own laptop into the class. In the practical test, you can use any online resource you like, so long as you are not communicating with another person (so google is ok, but not or instant messenger).

WARNING OPEN BOOK does not mean you don’t have to study. In some ways it is harder than a closed book exam, as I wont ask questions where the answers are directly from the notes. You have to study. You have to study. And please remember to study. Each year I see students trying to answer questions involving users by googling “edit users”… This does not work! In the final written exam some people will be using a computer to type their exam answers rather than using paper (e.g. to compensate them for a disability). You are only allowed to use the computer to access the word processor in that case. But in the class test you are welcome to try and google the answers...

Answering Questions The practical will be very like the tutorial “diag”. You need to solve problems or produce working configurations. It can ask you to do things you have not done before. However, with a little thinking you should find that the tools you know and the files you have used will be sufficient to help. Sometimes you might need a new flag to help you. Try man on the command you think is the “almost” solution. I can complete the exam in less than 5 minutes…

Hints If it is not working think about all the things needed to make it work, and check them one at a time. If it is a service problem, feel free to look at the error logs (rather than telepathy). If it is hopeless reboot with a fresh image and try again in that question (really hopeless). If things are just weird ask for help. I will help you if the problem is not something I am actually testing (e.g. you cannot start apache because of a known apache bug).

Do the questions in the order shown. If you jump about between questions you will become confused. YOU MUST DO THE CHECKS IN THE ORDER SHOWN. If you configure your firewall, you may find you have blocked other services. Next trying apache or DNS will leave you doomed without resetting the firewall –Firewall reset: $ /etc/init.d/iptables restart If you are stuck but think everything is ok, I don’t mind you talking to me. I will either reply “you should know better” or if I think the problem is something I have not taught then I will suggest a solution (e.g. did you read the question?).

GOOD LUCK

Exam Questions

Possible Questions Remember, these slides were created long before the exams were written. The format of the exam is 20 question short answer, with 2 marks per question. These possible questions are only a possibility of what sort of questions might be asked in the real exam…

Question 1 What is the normal difference between a shell prompt which ends with the character ‘#’ and one which ends with a different character (like ‘%’ or ‘$’ for instance)?

Question 2 What is the home directory of root, and why is it not /home?

Question 3 The following commands are typed on a Unix computer. mkdir temp cd temp/ touch hia mkdir hua cd hua/ cp /etc/group. cd../../ ls temp/*.* What is printed on the screen in response to the last line of the commands?

Question 4 What does rc5 mean and what does 66 mean in the pathname: /etc/rc5.d/K66uta.

Question 5 The ethernet devices shown are from the point of view of M1. Assume MGW is the gateway machine for this cluster of machines. Also from the viewpoint of M1, the following is known: Eth0 : /16 Eth1 : /16 MGW is M2 is M3 is Supply ifconfig lines for this scenario for use on M1.

Question 6 The ethernet devices shown are from the point of view of M1. Assume MGW is the gateway machine for this cluster of machines. Also from the viewpoint of M1, the following is known: Eth0 : /16 Eth1 : /16 MGW is M2 is M3 is Continuing from the previous question, supply ip route commands for M3.

Question 7 The file /proc/net/arp contains three pieces of information about each network device detected. What is the information stored, and why is this needed?

Question 8 A packet arriving on eth0, which is then routed for output on eth1 would be handled by which chain of the filter table?

Question 9 Show the iptable commands relevant in defining a forwarding filter allowing only related or established connections in both directions, as well as http from the internet, to be accepted and all other forwarding traffic to be rejected. You can assume eth0 for the gateway connection and eth1 for internal traffic.

Question 10 Consider the following iptables configuration: iptables –P OUTPUT drop iptables –A OUTPUT –m state --state RELATED,ESTABLISHED –j ACCEPT iptables –A OUTPUT –p udp --dport ssh –j ACCEPT Would outgoing ssh connection requests be blocked? Give an explanation for your answer.

Question 11 After typing the following commands, name two parameters that would be shown if the request was successful. $ telnet grussell.org HEAD / HTTP/1.1 Host:

Question 12 Name four pieces of information which you would expect to find in the apache access log?

Question 13 Write mod_rewrite instructions so that only ip address can see a site, and anyone else should be externally redirected to