It320

In: Computers and Technology

Submitted By mailtalon2
Words 300
Pages 2
1. What risk exposure are you subjecting your Microsoft Windows systems to by opening up ports on your internal firewall? Buy opening ports in your firewall it is allowing people access to you network and if anybody that trys to get in figures out the port they can potentially gain access to your system.

2. Using the VM’s on your student workstation, how can you test if your Windows internal firewall is configured properly? By going to start -> control Panel -> Select firewall there it gives you the options that are on Windows Firewall.

3. Name at least three significant risks of logging in to access points in airports, hotels and other public places. Explain. E-commerce involves the passing of sensitive information, like credit card numbers or bank account numbers, over the Internet, and the risk of losing the privacy of this information is high in public places. Theft of unencrypted wireless data can easily occur in public areas because WiFi hotspots do not provide encryption, such as WEP, WPA, or WPA2, in order to simplify the connection process and minimize the management workload. Evil twin hotspot: These are hot spots set up by a hacker and made available to the public. Unknowing users who connect to the Internet using these access points are then exposing their sensitive information to the hacker. To avoid being tricked by this set up, check to see if the login to a WiFi hotspot is SSL encrypted, and look for a valid security certificate.

4. Name at least three WLAN network devices commonly found in enterprise WLAN systems. NIC, Access Point, Wireless NIC

5. Name at least 5 methods of wireless communications that need to be secured and accounted for in a typical enterprise environment?

Video conferencing, Email, Messaging, Phone calls and…...

Similar Documents

Itt-Tech Answers

...Don Delara/IT320 IT320 Wan Technology/ Unit 4 Assignment: 4.1 1. At what layer of the OSI model does CDP operate? Data Link layer 2. What is the primary use for CDP? To discover information about directly connected Cisco devices 3. What network layer protocols can CDP provide information for? IP, Internetwork Packet Exchange (IPX), and AppleTalk 4. When CDP is enabled on an interface, a router (or switch) sends CDP advertisements on a regular basis, which list information about the sending router. Included in the packets are a series of Type/Length/Value, or TLV, data structures. 5. The show cdp neighbors command can be used to display one line of information about each directly connected CDP-enabled device. List the six pieces of information displayed. Device ID, local interface, holdtime, capability, platform, and port ID 6. In the topology of all Cisco devices shown in Figure 4-1, you are on Host A and consoled in to RTA. What devices can you see in the output from CDP commands? SWA, RTB, and RTC—only the directly connected devices that are attached to RTA 7. How would you gather information about other CDP-enabled devices in the network? By Telneting to those devices and using the show cdp neighbors command 8. From RTB in Figure 4-1, what devices can you see in the output from CDP commands? RTA and RTD 9. From RTC in Figure 4-1, what devices can you see in the output from CDP commands? RTA and RTD 10. From RTD in Figure 4-1, what......

Words: 1186 - Pages: 5

It320

...Unit 1 Assignment 1: Match Risks/Threats to Solutions Learning Objectives and Outcomes ♣ You will learn how to match common risks or threats within the seven domains of a typical IT infrastructure with solutions and preventative actions. Assignment Requirements This is a matching activity. You will receive the Match Risks/Threats to Solutions worksheet, which contains a numbered list of common risks and threats found in a typical IT infrastructure. You must enter the letter for the correct solution or preventative action in the blank to the right of each risk or threat. Required Resources Worksheet: Match Risks/Threats to Solutions Submission Requirements ♣ Format: Microsoft Word ♣ Font: Arial, Size 12, Double-Space ♣ Length: 1 page ♣ Due By: Unit 2 Instructions: You are presented with a list of some risks and threats associated with the seven domains of a typical IT infrastructure. Below the list, the solutions or preventive actions to manage those risks and threats are listed. Write the letter of the correct solution or preventative action in the blank to the right of each risk or threat. Risks or threats: 1. Violation of a security policy by a user ________ 2. Disgruntled employee sabotage ________ 3. Download of non-business videos using the Internet to an employer-owned computer ________ 4. Malware infection of a user’s laptop ________ 5. Unauthorized......

Words: 566 - Pages: 3

It255

...Security Capstone Project 400 Level IS404 Access Control, Authentication & KPI IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications IS418 Securing Linux Platforms & Applications IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications 300 Level IS305 Managing Risk in Information Systems IS308 Security Strategies for Web Applications & Social Networking IS316 Fundamentals of Network Security Firewalls & VPNs IS317 Hacker Techniques Tools & Incident Handling EC311 Introduction to Project Management IT250 Linux operating System CNS Program Prerequisites: ment 300 Level IT320 WAN Technology & Application IT302 Linux System Administration 200 Level Networking Application Services & Security   IT260 IT255 Introduction to Information Systems Security IT220 Network Standards & Protocols IT221 Microsoft Network Operating System I IT250 Linux Operating System 100 Level TB143 Introduction to Personal Computers ISS Foundational Courses ISS Technical Courses ISS Capstone Project Technical Basic Courses CNS Prerequisites 1 Date: 10/25/2010 Introduction to Information Systems Security Syllabus Course Summary Major Instructional Areas 1. Information Systems Security fundamentals 2. Seven domains of a typical Information Technology (IT)......

Words: 4114 - Pages: 17

Wan Technology

...IT320 Ch. 2 Review Questions Pg. 76 (1-6) 1. A telephone's transmitter converts sound waves into electrical waves. The receiver converts electrical waves into sound waves. The standard telephone is a transducer that converts sound waves to electrical waves. 2. Modern phones use a miniature loudspeaker. At the center of a paper or plastic diaphragm is a coil of wire. This coil is suspended by the diaphragm or cone, into a circular slot formed by a permanent magnet. The current containing the audio is passed through the coil, which is then repelled and attracted by the magnet, causing the diaphragm to move and moving air as it does so. Early receivers used a thin steel plate as a diaphragm. The coil was wrapped around a laminated core and placed very close behind the plate. As the current passed through the coil it attracted the diaphragm, causing air to move and sound produced. 3. Transmitter – Source that produces a signal, such as a telephone transmitter or an optical laser., Receiver – Device that receives the signal., Dial Pad – A touchtone pad that has 12 buttons, each of which generates a specific tone when pressed. It’s used to dial the called party digits and send them to the serving central office., Switch Hook – Part of the telephone that is used to open the circuit when the handset is returned to the cradle or to close the circuit when the handset is picked up off the cradle., and Ringer – Notifies the called party that a call is coming in and......

Words: 454 - Pages: 2

It320 Week 2

...Darius Humphrey IT320 Homework 2 Page 24 1. Attach a rollover cable to the PC’s COM port and then to either the Console or AUX port on the router. The console port is preferred because messages from the router are logged on this line. The AUX port is used for remote access and can also be used if the console port is damaged. You can also access the CLI through Telnet, but the Telnet client must have access to the router. 2. User EXEC mode allows on a limited number of basic monitoring commands and is often referred to as view-only mode. The user EXEC lever does not allow commands that might change the configuration of the router. It is identified by the > prompt. The privileged EXEC mode provides access to all router commands and this mode can be configured to require a password. It can also be configured to require a user ID. Configuration and management commands require the network administrator to beat the privileged EXEC level. The privileged EXEC mode is identified by the # prompt. 3. The platform on which the image runs The special features supported in the image Where the image runs and whether it has been zipped or compressed 4. ROMMON is not IOS; therefore it does not accept the IOS commands. It cannot route IP packets. The ROM_MON software is stored in a Rom chip instead of flash, so it should always be available even if some other network engineer made a mistake and erased all the contents of flash memory. Password......

Words: 470 - Pages: 2

It320 Assignment 2

...Vocab Match Pg. 22 1. O IOS 2. L command-line interface (CLI) 3. I user EXEC mode 4. R privileged EXEC mode 5. S global configuration mode 6. A interface configuration mode 7. N routing protocol configuration mode 8. Q IOS image 9. B feature set 10. C ROM monitor /ROMMON 11. T boot ROM 12. D power-on self test (POST) 13. G bootstrap 14. J configuration register 15. U boot field 16. H boot system command 17. M setup mode 18. F host name 19. P console password 20. E enable password 21. K command recall Concept Questions Pg. 24 1. Attach a rollover cable to the PC’s COM port and then use either the Console port or the Auxiliary port on the router. The Console port is preferred because messages from the router are logged on this line. The second way is to use the Auxiliary port for remote access and can also be used if the Console port is damaged or not responding. The third way to access the CLI is through Telnet. 2. The user EXEC can only use a certain amount of commands and the user EXEC can’t configure anything on the router. The privileged EXEC can use every command and can configure the router anyway that person wants. 3. First it’s the platform in which the image runs on, second is the special features that are supported in the image, and last is where the image runs or whether it’s become a zipped or compressed file. 4. ROMMON is not IOS, so it doesn’t accept IOS......

Words: 354 - Pages: 2

It320 Study Guide

...IT320 Final Exam Study Guide Ciscopress Textbook: (3) What do routers do? (19, 20) Crossover cable (14, 17) NVRAM (17) Location of router’s “running configuration” (14, 15, 17) Cisco IOS image stored where? (14, Table 1-3) Main use of Router internal hardware components: ROM (49) Show flash command (55) After a router completes POST, it loads what? (123) Command output description for: show cdp entry [device name] (154) Purpose of setting the router configuration register to 0x2102 (65) Command required to establish an entry password into the user mode (66) enable secret command (74) show version command (71) Function of Ctrl-P (125) show cdp interface command (129-130) Packet is finalized and framed at which layer? (54) Order of the router boot process (141) Exclamation points in a reply to a ping request (141) Important information you must pay attention to after issuing a ping command (141) Use of the ping command (142) port number (150) Class C IP address structure (11) The clock rate of an interface is applied to which router connector end (55) What loads after a router completes the POST? (49) show flash command (43) Symbol for the router privileged mode (153) Limited version of the Cisco IOS software is stored where? (154) Command to discover the configuration register setting (153) Has limited version of the Cisco IOS software (154-155) Information displayed by the show...

Words: 302 - Pages: 2

It320 Quiz

...IT320 Cisco quiz 1. What are the three way to logon to a router? Answer: Telnet, Console and Modem The commands are as follows: Vty, Con0 and Auxiliary 2. Telco uses a CSU/DSU to connect to a leased line 3. A limited version of Cisco IOS is stored in ROM. 4. What command can you use to backup and restore the IOS from a server to flash, as well as the content of Ram to a Server and content of NVRAM to Server? Answer: Copy TFTP flash 5. What does the following acronyms stand for: Answer: RAM: Random Access Memory NVRAM: store the backup/startup configuration for the router Nonvolatile Random Access Memory IOS: Internetwork Operating System TFTP: Trivial File Transport Protocol 6. What are the four parts of the phone receiver? Voice Coil, Magnet, Diaphragm, Signal Cone 7. What is the frequency range that humans can hear? Answer: 20 Hz 8. What is it meant by Administrative Distance? Answer: Administrative distance is the feature that routers use in order to select the best path when there are two or more different routes to the same destination from two different routing protocols. 9. The modified final judgement of 1982 determined that every area in the US resides within a specific Local Access And Transport Area (LATA) 10. What layer of the OSI model is responsible for data formatting and encryption? Answer: Presentation Layer 11. What layer of the OSI model is responsible for the assembly and the disassembly......

Words: 479 - Pages: 2

Seeking Help

...Issues IS423 Securing Windows Platforms & Applications IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications Securing Linux Platforms & Applications 300 Level IS305 Managing Risk in Information Systems IS308 Security Strategies for Web Applications & Social Networking IS316 Fundamentals of Network Security Firewalls & VPNs IS317 Hacker Techniques Tools & Incident Handling EC311 Introduction to Project Management IT250 Linux operating System ment CNS Program Prerequisites: ©ITT Educational Services, Inc. Date: 10/25/2010 Introduction to Information Systems Security Syllabus 300 Level IT320 WAN Technology & Application IT302 Linux System Administration 200 Level   IT260 Networking Application IT255 Introduction to Information Systems Security IT220 Network Standards & Protocols IT221 Microsoft Network Operating System I IT250 Linux Operating System Services & Security 100 Level TB143 Introduction to Personal Computers ISS Foundational Courses ISS Technical Courses ISS Capstone Project Technical Basic Courses CNS Prerequisites ©ITT Educational Services, Inc. Date: 10/25/2010 Introduction to Information Systems Security Syllabus Course Summary Major Instructional Areas 1. Information Systems Security fundamentals 2. Seven domains of a typical......

Words: 4296 - Pages: 18

Course Descriptions

...with these areas will also be discussed. Prerequisite: IT250 Linux Operating System IT320 WAN Technology and Application | 4 credit hours This course discusses typical Wide Area Network (WAN) technologies along with survey on existing services and applications. Introductory router configuration skills will be included.Prerequisite: IT220 Network Standards and Protocols IT321 Network Technology and Service Integration | 4 credit hours Discussions on areas where computer networking and telecommunication technologies converge in todays networking and internetworking industry. Concepts and case studies of how voice, data and video can be integrated on to one network will be discussed. Extended coverage on router configuration will be included. Prerequisite: IT320 WAN Technology and Application IT331 Network Development Capstone Project | 4 credit hours Network design and implementation project to be jointly agreed upon by the student and the faculty member. The project includes major process of product lifecycle such as data gathering and analysis, needs assessment, planning, designing, testing, implementation, documentation, etc., in addition to actually building a simulated network using existing equipment. Prerequisites: Completion of a minimum of 80 credits earned in the program of study including IT260 Networking Application Services and Security or equivalent and IT320 WAN Technology and Application or equivalent TB133 Strategies for the Technical......

Words: 1186 - Pages: 5

Saved

...IT320 Unit 5 HW 1. When a router is first powered on, it completes a four-step initialization process: 1. Preforming a power-on self test (POST) 2. Loading a bootstrap program 3. Loading an IOS 4. Loading a configuration file The last three of these steps require the router to copy the files into RAM. Normally, most routers load an IOS image that is stored in flash memory and an initial configuration stored in NVRAM. 2. Routers use the following logic, in order, to attempt to load an IOS: 1. Load a limited-function IOS if the configuration register’s last hex digit is set to 0 or 1. 2. Load an IOS based on the configuration of boot system commands in the startup-configuration file. 3. Load the first file in flash as the IOS. 4. Use TFTP broadcasts to find a TFTP server and download an IOS from that server. 5. Load a limited-function IOS from ROM. In Step 1, the configuration register is a16-bit number that Cisco routers store in a hidden area of NVRAM. It can be set in a couple of ways and can be seen using the show version command. The most commonly used way to set its value is to use the config-register global configuration command. Routers use the 4 low-order bits of the configuration register as the boot field, which tells the router what to do in the first of the preceding five decision steps. If the value of the field is set to 0, the router loads the ROMMON (ROM Monitor), which is used for password recovery. If the value is set to1, the router......

Words: 448 - Pages: 2