Firewall log and monitor your own network traffic

Assignment Help Basic Computer Science
Reference no: EM133117473

All firewalls have some type of logging feature. This feature documents how the firewall handled various types of network traffic. The logs, if enabled, provide valuable information like source and destination IP addresses, port numbers, and protocols. You can also use the Windows Firewall log file to monitor TCP and UDP connections and packets that are blocked by the firewall.

Using your own computer, explain step-by-step how you would locate and enable the firewall log and monitor your own network traffic. Provide screenshots to document this process. What would you be able to determine from logging the firewall activity?

Reference no: EM133117473

Questions Cloud

Contingency planning is risk mitigation process : Contingency planning is a risk mitigation process for developing back-up plans in anticipation of events (scenarios) that might disrupt ‘business as usual'.
Information systems for business : What are the five major components that make up an information system? List the three examples of information system hardware?
Footprinting techniques : Explain the incident that occurred, and then list the steps you would follow to solve this case using FOOTPRINTING techniques.
Types of authentication mechanisms : Discuss the four processes involved in access control approaches and the types of authentication mechanisms
Firewall log and monitor your own network traffic : Explain step-by-step how you would locate and enable the firewall log and monitor your own network traffic.
Variance analysis-static-budget analysis : Why might managers find a flexible-budget analysis more informative than static-budget analysis?
Healthcare compliance : What is the difference between Medicare Advantage and traditional Medicare? What is a special investigation unit (SIU)?
Describe potential disadvantages of PaaS : Describe potential disadvantages of PaaS. Discuss how you might use IaaS to implement colocation. Define and describe SSO.
Main data preprocessing steps : Why are the original/raw data not readily usable by analytics tasks? What are the main data preprocessing steps?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Business continuity planning and disaster recovery planning

Explain in your own words why you believe planning( Business Continuity Planning and Disaster Recovery Planning ) is important.

  Tthe address space of the workstation

A high speed workstation has 64 bit words and 64 bit addresses with address resolution at the byte level.  a.   How many words can in be in the address space of the workstation? ?

  Create interface for automobile mechanics

Imagine you are managing a design project that will create an interface for automobile mechanics.

  Ethical hacking-generally found on the darknet

What type pf content is generally found on the Darknet? What kind of information can be found using the hiddenwiki?

  What are steps necessary to establish a malware-free device

How should Always Fresh verify that a client computer or device is compliant? What are the steps necessary to establish a malware-free computer?

  Draw the symbol for a steam turbine

Draw the symbols for a centrifugal pump and a positive displacement pump.

  Several lectures and embedded activities prepare

new health promotion initiative (while you may refer to previous or current reports, you are required to come up with your own initiative). Several lectures and embedded activities prepare you for this assignment throughout the unit.

  Entity integrity vs referential integrity

What is your understanding of Entity Integrity Vs Referential Integrity. Illustrated with simple examples for ease of understanding of the concepts.

  Identify the possible rational roots for the equation

Write a polynomial function f(x) whose coefficients have three sign changes. Find the number of sign changes that f(x) has. Describe the nature of the zeros.

  C++ program that accepts 10 values of gallons

(cin within a loop) Write and run a C++ program that accepts 10 values of gallons, one at a time, and converts each value entered to its liter equivalent before the next value is requested. Use a for loop in your program. Use the fact that 1 gallo..

  Example of a proactive technology

Security technologies can be grouped into two categories: proactive and reactive. Identify a real-world example of a proactive technology and an example of a reactive technology. Discuss how they support an organization's security posture.

  Calculate and print the sum and the average of the sequence

Write a program, which reads from the console N integers and prints them in reversed order. Use the Stack class.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd