Lab 9

In: Computers and Technology

Submitted By Nglapion
Words 1289
Pages 6
Lab #9 - Assessment Worksheet Questions

OSPF - Network Design - OSPFv2 for IPv4 and OSPF v3 for IPv6

Course Name & Number: __________________________________________

Student Name: _________________________________________

Instructor Name: ________________________________________________

Lab Due Date: _________________________________________________

Explain your migration plan for implementing OSPFv2 within the Complex Company’s network:

The migration plan consists of six sites, A B C D E & F. Each site has 40 subnets and 300 hosts that need connectivity. The routing protocol we will be using is OSPFv2, the breakdown is below:

* Site A will be connecting with Site F and the Area is 101 * Site B will be connecting with Site C and the Area is 102 * Site D will be connecting with Site E and the Area is 105 * Area 0 is the backbone of this network

Each site will be connected to the other for redundancy purposes, the schema for this is as follows:

* We will be using a Class B network * The IP Address for Site A is 172.32.0.0/23 * The IP Address for Site B is 172.32.2.0/23 * The IP Address for Site C is 172.32.4.0/23 * The IP Address for Site D is 172.32.8.0/23 * The IP Address for Site E is 172.32.10.0/23 * The IP Address for Site F is 172.32.12.0/23

The IP addressing Scheme used for the 15 other connections in Area 0 are as follows:

* The IP address block assigned to link 1, which connects RTR-A and RTR-B is 172.32.12.4/30 * The IP address block assigned to link 2, which connects RTR-A and RTR-C is 172.32.12.8/30 * The IP address block assigned to link 3, which connects RTR-A and RTR-D is 172.32.12.12/30 * The IP address block assigned to link 4, which connects RTR-A and RTR-E is 172.32.12.16/30 * The IP address block assigned to link 5, which connects RTR-A and…...

Similar Documents

Lab 9

...1. Who are its real users? Are they Internal or external users? If both, are they authenticated differently? 2. What should be considered ‘CONFIDENTIAL’ data/ assets in the system? 3. What is the purpose of the application? 4. What are the different environments in which the application is deployed? Is the code given for review in the same manner as the one deployed in production? 5. How important is this application to the enterprise? 6. Is the application integrated with other applications in the company? Is the data coming from somewhere and/or going somewhere? 7. What are the entry points and exit points in this application? 8. Are audit trails and logs pertaining to the application maintained somewhere? 9. Are there ay security Measures in place? 10. What is the architecture of the application? 11. What is the duration of the test? Test Plan Scope Goals and Objectives Identify if a remote attacker could penetrate web-based application server defenses. Determine the impact of a security breach on: o The integrity of the company’s order systems. o The confidentiality of the company’s customer information. o The internal infrastructure and availability of web-based application server information systems. Test Plan Tasks Fist thing that we did was try to gain fingerprint the system, by using netcat tool to look up information about the system. Also we are going to use social networking tools to gain even more......

Words: 1514 - Pages: 7

Managing Risk Lab 9

...Managing Risk in Information Systems Lab 9 Assessment Questions 1. How does documented back-up and recovery procedures help achieve RTO? a. By having effective backup and recovery procedures you should have the necessary resources to restore systems from backups and a repeatable process that is known to succeed in achieving RTO. By documenting and implementing backup and recovery procedures, the process for recovery is much more efficient, helping with the time portion of RTO. 2. True or False. To achieve an RTO of 0, you need 100% redundant, hot-stand-by infrastructure (i.e., IT system, application, and data, etc.). b. True 3. What is most important when considering data back-up? c. Registry, directories, and imperative operating data as well as licensing. 4. What is most important when considering data recovery? d. Most current, working recovery and in a timely manner (fast). 5. What are the risks of using your external e-mail box as a back-up and data storage solution? e. First, you are at the mercy of the provider. If it is a large recovery you may not be able to have internet access to download it. File corruption could be an issue as well as back up size allowable for email. 6. Identify the Total Amount of Time Required to Recover and Install the Lab #9 Assessment Worksheets on Your Student VM Hard Drive and open the file in Microsoft Word to verify integrity. {Insert your timed RTO using your......

Words: 711 - Pages: 3

Managing Risk Lab #9

...What is most important when considering data recovery?       d. Most current, working recovery and in a timely manner (fast).   5. What are the risks of using your external e-mail box as a back-up and data storage solution?       e. First, you are at the mercy of the provider. If it is a large recovery you may not be able to have internet access to download it. File corruption could be an issue as well as back up size allowable for email.   6. Identify the Total Amount of Time Required to Recover and Install the Lab #9 Assessment Worksheets on Your Student VM Hard Drive and open the file in Microsoft Word to verify integrity. {Insert your timed RTO using your computer clock – following your documented instructions and steps}.       f. N/A. Was not asked to do this portion of the lab and cannot finish this question.   7. Did you achieve your RTO? What steps and procedures can you implement to help drive RTO even lower?       g. I am assuming from the lab, steps that would be with better equipment, a Hot-Site and lots of money.   8. What are some recommendations for lowering the RTO for retrieval and access to the back-up data file?       h.......

Words: 323 - Pages: 2

Is3230 Unit 9 Lab 9

...Encryption Standard. 7. What is SHA1, and what is it used for? The Secure Hash Algorithm 1 (SHA-1) is a well-known and currently secure cryptographic hash function designed by the NSA. Is it used similarly to TripleDES or are they different? They are the same, they both use algorithms. 8. Provide and explanation for the difference between symmetric keys and asymmetric keys in a PKI? symmetric-key: It only needs one key to encrypt the message. And both user only need the same key to decode the message. And the in order to create the key is by moving the bit. asymmetric-key: It needs two different keys- public key and private key. Everyone can see the public key and only the person who has private key can decode the message. 9. What is a common drawback to Encrypting using enterprise level tools such as PGP? Complexity, cost, lack of scalability, and lack of interoperability with VoIP systems. So even though implementing encryption is appealing, many businesses may balk at the potential obstacles. 10. What is the difference between PGB and GPG? “PGP” stands for “Pretty Good Privacy.” It was developed by Phil Zimmermann. At first it was written as copyrighted freeware under the Gnu Public License. Later, PGP was upgraded and made into a propriety program. The rights for this program are traded around. The reason for this upgrade was legal defense costs and royalty issues related to the export laws of the USA. Now the PGP program is owned by PGP......

Words: 804 - Pages: 4

Is3920 Lab 9

...high-profile data security breaches at major financial services firms, data brokers (including ChoicePoint and LexisNexis), and universities. In the past three years, multiple measures have been introduced, but to date, none have been enacted. This report will be updated regularly. Contents Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Data Security Breaches in Federal Agencies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Data Security Breaches: Highlights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 For Additional Reading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75 List of Tables Table 1. Data Security Breaches in Businesses (2000-2007) . . . . . . . . . . . . . . . 11 Table 2. Data Security Breaches in Education (2000-2007) . . . . . . . . . . . . . . . . 26 Table 3. Data Security Breaches in Financial Institutions (2001-2007) . . . . . . . 47 Table 4. Data Security Breaches in Local, State, and Federal Government (2003-2007) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 Table 5. Data Security Breaches in Health Care (2003-2007) . . . . . . . . . . . . . . 70 1 For additional information on legislative proposals......

Words: 18803 - Pages: 76

Lab 9

...with cron jobs? Type the command su –c ‘ vi /etc/rsyslog.conf ‘ and then scoll down to after the last entry listed under remote-host and add the line syslog.err @@172.130.1.254:61514 8. As a system administrator you notice the logs on your system are starting to take lots of space. You have a remote syslog server with plenty of space but want to minimize the amount of logs on the physical system. What is a manual and an automatic way to do this in Linux? You can tediously manually delete the old logs or you can utilize log rotate which is designated for automatic rotation, compression, and removal of log files. It uses a cron job for scheduling of tasks, the configuration settings can be accessed by typing /etc/logrotate.conf 9. What port does syslog run on and what transport protocol does it use? Why is this important information? Port 514 – Syslog protocol does not ensure ordered delivery of packets. 10. Specify a security implication of the Syslog service on a system? A good syslog implementation has the potential to drastically increase an organization’s security defense posture and stability if fully implemented while continuing to meet or exceed these regulatory requirements. Because security and IT professionals tend to look at syslog in a blinded manner, it tends to be an unknown gem in the security and IT industries....

Words: 608 - Pages: 3

Is4550 Lab 9

...layered security strategy? a. When implementing a new Policy 3. IN you gap analysis of the IT security policy framework definitions provided, which policy definition was missing from all access to various IT systems, applications, and data throughout the scenario? a. Data Access Policy 4. Do you need policies for you telecommunication and Internet service providers? a. Yes 5. Which policy definitions from the list provided in lab#9-part B helps optimize performance of an organization’s internet connection? a. Asset Identification and Classification Policy 6. What is the purpose of a Vulnerability Assessment & Management Policy for an IT infrastructure? a. It identifies, quantifies, and prioritizes (or ranking) the vulnerabilities in a system 7. Which policy definition helps achieve availability goals for data recovery when data is lost or corrupted? a. Threat Assessment and Management Policy 8. Which policy definitions reference a Data Classification Standard and use of cryptography for confidentiality purposes? a. Asset Management Policy 9. Which policy definition from the sample IT security policy framework definition mitigate risk in thee User Domain? a. Security Awareness Training Policy 10. Which Policy definition from the sample IT security policy framework definition mitigates risk in the LAN-to-WAN Domain? a. Vulnerability Assessment and Management Policy 11. How does an IT security policy framework make it easier to monitor and enforce throughout......

Words: 616 - Pages: 3

Unit 9 Lab Recommend It Security Policies to Help Mitigate Risk

...Unit 9 Lab Recommend IT Security Policies to Help Mitigate Risk IS3350 1. Which IT assets did you prioritize as critical to administrative or student computing? I prioritize the file servers and the teachers’ notebook as critical to administrative and student computing. 2. List your top five (5) risk exposures for which you believe this school should have specific risk mitigation strategies. - No firewall - Unauthorized access to school computers - Open connections on the WLAN. - The principals traveling notebook can carry a virus - wireless access security 3. Given the potential risks that you identified, what IT security policies would you recommend be created by the school to help mitigate each of the identified risk exposures you listed in #above? I would say create an AUP and a policy that implements the encryption of the file servers. First and foremost a comprehensive security policy that takes into consideration the variables and factors at the school. This includes students, teachers, physical access, layout of the school and property, security measures as defined by FERPA, HIPAA, etc. A password policy needs to be in place that stresses complexity, minimum length (recommendations) and recycling or expiring passwords. This could be accomplished with a minimum length of 8 characters, one being a capital letter, one being a number, and one being a special character. Physical security should be setup in a way that there are......

Words: 350 - Pages: 2

Unit 9 Lab Security Basics

...Unit 9 Lab Security Basics Task 1: Features of Hardware and Software Firewalls * Hardware Firewall – Cisco ASA 5505 Firewall 1) Usually purchased as a stand-alone product typically found in routers or other networking equipment. 2) Usually a minimum of 4 network ports (the Cisco unit has 8) 3) Usually used in businesses or large networking systems 4) Intended for network security * Software Firewall – 2014 Trend Micro Instant Security and Antivirus 1) Usually purchased by individual users 2) Usually an installable form of software 3) Protects from outside attempts to control or gain access to your computer 4) Protects against Trojan programs or email worms 5) Only protects individual computer, not a network Task 2: Part 1: Which anti-virus program is free and which provide trial versions * Panda – No free trial or free version; yearly prices : $31.99, $49.99, $35.00 * Norton – No free product ,free trial version for 30 days; yearly prices : $49.99, $79.99, $49.99 * McAfee – No free or trial versions; yearly prices : $79.99, $49.99, $44.99 * AVG – No freeware, trial for 30 days; yearly prices : $39.99, $54.99 * Kaspersky – Offers a free anti-virus software and 30 trial; yearly prices : $69.95, $64.95, $59.95, $59.95 Part 2: Define malicious code terms Term – Trojan horse Program Definition – generally non-self-replicating type of malware program containing malicious code that, when......

Words: 1359 - Pages: 6

Nt 1330 Lab 9

...NT1330 LAB 9 1. Reader is the permission level assigned by default 2. No the Microsoft .Net Framework 1.1 would not be installed 3. Yes Microsoft .Net Framework is listed because you would of had to install it Screen shot- My workstation does not work with the server I had to copy from my classmate so I cannot take a screen shot. Although this would of worked because I followed all steps up to the turning on the workstation number. 4. Yes you would see the .Net Framework being installed upon logon. 5. Yes the .Net Framework would be installed - Again no screenshot could be taken but it would work following up to the steps I have completed. 6. The software restrictions from the policy blocks it from opening 7. Yes you would just have to move that file to another file location 8. You would be able to open Internet Explorer 9. Remove help menu and remove pictures icon from start menu 10. GPOB is shown because it is the parent OU This should say GPOB but I didn't make the 10C OU a child OU to the 10B. I also couldn't delete it but I know the process of this if I hadn't of done that. 11. No because this is the Admin account 12. No It is not available. It was removed. 13. 10BUser2 has the help and support menu because of the security filter we set. The GPOB only applies to the 10BUser1 which 10BUser2 is not a member of. 14. Leave the permissions for authenticated users in place and deny the Apply Group Policy permission to the 10BGroup1 group object....

Words: 277 - Pages: 2

Psych 1010 Lab Assignment 9

...Joel Palathuruthil Access id: fh8021 Section: #011 TA: Justin Aqwa Assignment 9 The Big 5 Theory of Personality is what many psychologists consider to be a test that measures the five fundamental dimensions of personality. The theory was derived in 1970 by two research teams one of Paul Costa and Robert McCrae and Warren Norman/Lewis Goldberg. Both teams took different routes to reach the same fundamental idea that most human personality traits can be boiled down to five broad dimensions of personality regardless of language or culture. The five dimensions were created by asking thousands of people many questions. Then analyzing the data with factor analysis the scientists found the five dimensions, they didn’t set out to find the dimensions but through the work of their research these dimensions were discovered. On the first trait, Openness to experience/intellect I scored on the 47th percentile and I fall a bit below the half mark on the scale. I feel I scored this percentile because I like to be in a routine and don’t really care for seeking out new experiences. I don’t entirely agree with this score because I may like routine at times but I tend to be creative and curious most of the time. Second trait, Conscientiousness I scored on the 25th percentile and I fell below the half way point of the scale. I scored this percentile because I’m not usually organized with my work or most things and it can be a mess and I have turned in work late because of that. I......

Words: 558 - Pages: 3

Physics 2 Lab Exp. 9

...Experiment 9: Reflection, Refraction, and Total Internal Reflection Purpose: The purpose of this experiment was to study the laws of reflection, refraction and total internal reflection, to measure the focal length of mirrors with convex and concave mirrors, and to measure the index of refraction of water. Theory: In this experiment, we learned that the angle of incidence θi is the angle that the incident ray makes in regards to the normal one. Also, the angle of reflection θr is the angle that the reflected ray produces from the normal one. Also, we discussed how the law of reflection is used to explain the behavior of the incident and reflected rays. According to Snell’s law, we observed that the incident ray, the reflected ray, and the normal line to the surface, all lie in the same plane and θi=θr. During the experiment we analyzed, the light striking the interface between two transparent materials and part of the light was reflected. The angle of the reflection equaled to the angle of incidence. The rest was passed along the interface and the ray entered that entered the second material was refracted. When light travels from medium #1, with a refractive index being n1, into the medium #2, with refractive index n2, the equation sinθ1= n2sinθ2. Lastly, we did a test that shows that when a light passes from a medium of large refractive index into one of small refractive index, the refracted ray it produces bends away from the normal because......

Words: 1433 - Pages: 6

Acc Python Lab 9

...Algorithm High Card prompt for the name of player 1 and player 2 initialize two card objects and call the .deal() method print to the players to show what card by calling .get_face_value() on the card objects display the result (if card 1 > card 2 display player1 won else if card 2 > card1 display player 2 won, else display tie) Face_value if card is 1 display ace if card is 2 display two if card is 3 display three if card is 4 display four if card is 5 display five if card is 6 display six if card is 7 display seven if card is 8 display eight if card is 9 display nine if card is 10 display ten if card is 11 display jack if card is 12 display queen if card is 13 display king make change prompts user for the cost of the item prompts user for the amount tendered determines how much change if any is returned to the customer by subtracting amount tendered by the cost of the item prints 'customer still owes money' if the amount tendered is not greater than or equal to the amount owed prints the change in the amount of dollar bills, quarters, dimes, nickels and pennies owed back to the customer deal hand creates 5 card objects and gives them values with the .deal() method puts the 5 Card objects in a list calls the method display_hand() to display the face value of each card in the list calls the method hand_stats() to give the stats of the hand such as: the highest/lowest card and the total/average value of the cards menu prints the menu and prompts...

Words: 1265 - Pages: 6

Cis 329 Lab 9 Configuring Hyper

...CIS 329 LAB 9 CONFIGURING HYPER To purchase this visit following link: http://www.activitymode.com/product/cis-329-lab-9-configuring-hyper/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 329 LAB 9 CONFIGURING HYPER CIS 329 LAB 9 CONFIGURING HYPER-V CONFIGURING HYPER-V THIS LAB CONTAINS THE FOLLOWING EXERCISES AND ACTIVITIES: Exercise 9.1 Installing Client Hyper-V Exercise 9.2 Creating a Virtual Machine Using Hyper-V Manager Exercise 9.3 Configuring Virtual Machine Settings Lab Challenge Expanding a Virtual Hard Disk CIS 329 LAB 9 CONFIGURING HYPER To purchase this visit following link: http://www.activitymode.com/product/cis-329-lab-9-configuring-hyper/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 329 LAB 9 CONFIGURING HYPER CIS 329 LAB 9 CONFIGURING HYPER-V CONFIGURING HYPER-V THIS LAB CONTAINS THE FOLLOWING EXERCISES AND ACTIVITIES: Exercise 9.1 Installing Client Hyper-V Exercise 9.2 Creating a Virtual Machine Using Hyper-V Manager Exercise 9.3 Configuring Virtual Machine Settings Lab Challenge Expanding a Virtual Hard Disk CIS 329 LAB 9 CONFIGURING HYPER To purchase this visit following link: http://www.activitymode.com/product/cis-329-lab-9-configuring-hyper/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 329 LAB 9 CONFIGURING HYPER CIS 329 LAB 9 CONFIGURING HYPER-V CONFIGURING HYPER-V THIS LAB CONTAINS THE FOLLOWING EXERCISES AND ACTIVITIES: Exercise 9.1 ......

Words: 595 - Pages: 3

Lab 9

...IS4560 Lab 9 1. When you are notified that a user’s workstation or system is acting strangely and log files indicate system compromise, what is the first thing you should do to the workstation or system and why? Inform the IT help desk to have the user cease all activity on the workstation and to wait for you to arrive at the physical desktop location. The workstation must first be physically disconnected from the network leaving it physically isolated but now powered off. It should be left in its steady-state. This isolates the contaminated workstation from the organization’s network and Internet, as well as preventing the contamination from spreading. Logs, memory forensics, footprints, and other malicious activity must be kept in its steady-state untouched. Forensic images of the logs should be performed along with a memory forensics scan. Anti-virus and anti-malicious software removal tools can be enabled from a CD-drive 2. When an anti-virus application identifies a virus and quarantines this file, does this mean the computer is eradicated of the virus and any malicious software? No, many times virus and trojans can leave residuals or wreak havoc on other processes. It is important to note that the quarantined file is never off the computer until cleaned out or deleted – it’s like putting the unknown file in a holding tank until you can assess what it is and how to eradicate. 3. Where would you check for processes and services enabled in the background of your......

Words: 712 - Pages: 3