Testing Your Firewall
Revision 3 February 2011
What is the usefulness of the Shields Up! tool for both
home and business use.
You can see what your firewall is blocking from the
point of view from someone outside your network.
Users at h
CIT 1640 Homework 4
Complete the following Case Projects from the textbook.
Case Project 9-1 (page330). You do not need to install software to complete this
project. After reading through the project answer the following questions.
What major vulne
NETSTAT & NBTSTAT
1) Why would you use these utilities?
You would use these utilities to either monitor traffic or troubleshoot
2) After working with NBSTAT and NBTSTAT? Why?
Netstat would be useful to use to check
ADDRESS RESOLUTION PROTOCOL
USING MICROSOFT WINDOWS
How/why could ARP be a security threat/issue?
ARP is vulnerable to sniffing and spoofing attacks. For example, if
someone knows someone elses IP address, the bad person could
1) In what security situations is TCPView best suited?
TCPView is best suited for a situation where you want to monitor the
traffic going in and out of your system. It is a good way to catch if there is
a program r
CIT 1640 Homework 3a
Complete the following Hands-On projects from the textbook. Please answer the
questions within the project on a separate sheet of paper.
Project 7-1 Use Rainbow Tables
You do not need to actually install the Ophcrack. After rea
Spring 2011 - CIT 1640 Mid Term
1. What are the difficulties for I.T. administrators when end users are using third party proxy servers?
Third-Party proxy servers allows a user to get past an environments web filtering system. If your compa