Csit 161 Lab1

In: Computers and Technology

Submitted By mrnrollins1
Words 672
Pages 3
Lab 1
Part 1: 10 points
Instructions:
You are presented with a list of some risks and threats associated with the seven domains of a typical IT infrastructure. Below the list, the solutions or preventive actions to manage those risks and threats are listed.

Type the letter of the correct solution or preventative action in the blank to the right of each risk or threat.

Risks or threats: 1. Violation of a security policy by a user ____C___ 2. Disgruntled employee sabotage ___I_____ 3. Download of non-business videos using the
Internet to an employer-owned computer _____A___ 4. Malware infection of a user’s laptop _____L___ 5. Unauthorized physical access to the LAN ____N____ 6. LAN server operating system vulnerabilities ____F____ 7. Download of unknown file types from unknown sources by local users ___B_____ 8. Errors and weaknesses of network router, firewall, and network appliance configuration file ___H_____ 9. WAN eavesdropping ____M____ 10. WAN denial of service (DoS) or distributed denial of service (DDoS) attacks ___D_____ 11. Confidential data compromised remotely ____K____ 12. Mobile worker token stolen _____G___ 13. Corrupt or lost data ____E____ 14. Downtime of customer database ____J____

Solutions or preventative actions:
A. Enable content filtering and antivirus scanning at the entry and exit points of the Internet. Enable workstation auto-scans and auto-quarantine for unknown file types.
B. Apply file transfer monitoring, scanning, and alarming for unknown file types and sources.
C. Place employee on probation, review acceptable use policy (AUP) and employee manual, and discuss status during performance reviews.
D. Apply filters on exterior Internet Protocol (IP) stateful firewalls and IP router WAN interfaces.
E.…...

Similar Documents

Lab1

...Assessment Worksheet 15 1 Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) LAB #1 – ASSESSMENT WORKSHEET Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Course Name and Number: Student Name: Instructor Name: Lab Due Date: Overview Hackers typically follow a five-step approach to seek out and destroy targeted hosts. The first step in performing an attack is to plan the attack by identifying the target and learning as much as possible about the target. Hackers usually perform an initial reconnaissance and probing scan to identify IP hosts, open ports, and services enabled on servers and workstations. In this lab, students planned an attack on 172.30.0.0/24 where the VM server farm resides. Using Zenmap GUI, students then performed a “Ping Scan” or “Quick Scan” on the targeted IP subnetwork. Lab Assessment Questions & Answers 1. Name at least five applications and tools pre-loaded on the TargetWindows01 server desktop, and identify whether that application starts as a service on the system or must be run manually. WINDOWS APPLICATION LOADED 1. 2. 3. 4. 5. STARTS AS SERVICE Y/N ❑ Yes ❑ Yes ❑ Yes ❑ Yes ❑ Yes ❑ No ❑ No ❑ No ❑ No ❑ No 2. What was the allocated source IP host address for the TargetWindows01 server, TargetUbuntu01 server, and the IP default gateway router? TargetWindows01 IP 172.30.0.8 Default gateway 172.30.0.1 TargetUbuntu01 IP 172.30.0.4 Default gateway 172.30.0.1 TargetUbuntu01 credentials are not given...

Words: 786 - Pages: 4

Lab1

...Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) 1 Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Course Name and Number: Student Name: Instructor Name: Lab Due Date: Overview Hackers typically follow a fi ve-step approach to seek out and destroy targeted hosts. The fi rst step in performing an attack is to plan the attack by identifying the target and learning as much as possible about the target. Hackers usually perform an initial reconnaissance and probing scan to identify IP hosts, open ports, and services enabled on servers and workstations. In this lab, students planned an attack on 172.30.0.0/24 where the VM server farm resides. Using Zenmap GUI, students then performed a “Ping Scan” or “Quick Scan” on the targeted IP subnetwork. Lab Assessment Questions & Answers 1. Name at least fi ve applications and tools pre-loaded on the TargetWindows01 server desktop, and identify whether that application starts as a service on the system or must be run manually. WINDOWS APPLICATION LOADED STARTS AS SERVICE Y/N 1. ❑ Yes ❑ No 2. ❑ Yes ❑ No 3. ❑ Yes ❑ No 4. ❑ Yes ❑ No 5. ❑ Yes ❑ No 2. What was the allocated source IP host address for the TargetWindows01 server, TargetUbuntu01 server, and the IP default gateway router? LAB #1 – ASSESSMENT WORKSHEET Assessment Worksheet 15 3. Did the targeted IP hosts respond to the ICMP echo-request packet with an ICMP echo-reply packet when you initiated the “ping” command at your DOS prompt? If......

Words: 440 - Pages: 2

Lab1

...Assessment Worksheet 15 1 Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Using Zenmap GUI (Nmap) LAb #1 – ASSESSMENT WORKSHEET Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Course Name and Number: ITSY 1400 student Name: BEN HAYES Instructor Name: STEVEN F. SCHROEDER Lab due date: MAR. 7 Overview Hackers typically follow a five-step approach to seek out and destroy targeted hosts. The first step in performing an attack is to plan the attack by identifying the target and learning as much as possible about it. Hackers usually perform an initial reconnaissance and probing scan to identify IP hosts, open ports, and services enabled on servers and workstations. In this lab, you will explore the Virtual Security Cloud Lab (VSCL). You will learn how to access several different applications, including PuTTY and the Zenmap Graphical User Interface (GUI) for the Nmap Security Scanner application. You will use the data you uncover to plan an attack on 172.30.0.0/24 where the VM server farm resides. Lab Assessment Questions & Answers 1. Name at least five applications and tools pre-loaded on the TargetWindows01 server desktop, and identify whether that application starts as a service on the system or must be run manually. windows applicaTion loaded 1. 2. 3. 4. 5. sTarTs as service Y/n q Yes q Yes q Yes q Yes q Yes q No q No q No q No q No 2. What was the allocated source IP host address for the TargetWindows01......

Words: 548 - Pages: 3

Lab1

...Unit 5 Lab 4 Adam Hitchcock 01/29/2014 TB-143 Task 1: LGA 1156 Connector- Uses I5, I7, Xeon, Celeron and Pentium processors. Its purpose is to allow PCI, DMI and FDI devices to connect to the rest of the system. Intel H55 Chipset-(Intel.com) Uses Pentium, I3, I5, I7 and Xeon processors. Its purpose us to allow PCI, USB, Network and serial devices to connect to the rest of the system Gigabyte GA-H55M-UD2H Motherboard- Supports Lynnfield I5,I3 and I7 CPU’s Task 2: (AMD.COM) AMD 770 Northbridge- Uses Phenom processors and it is for systems used for high end gaming. AMD SB710 Southbridge- Uses Athlon processors and it is for systems used for high end embedded client applications. Socket AM3 Connector- Uses Phenom II processors and was used to support DDR3 SDRAM. Task 3: (Intel.com) Processor | Clock Speed | Internal Cache | Bus Speed | Archictecture | I7 | 3.7 Ghz | 1.5 MB | 4.8 GT/s | Bloomfield | I7 Mobile | 1.6 Ghz | 6 MB | 2.5 Gt/s | Clarksfield | I5 | 3.46 Ghz | 8 MB | 4.8 GT/s | Lynnfield | I5 Mobile | 2.40 Ghz | 3 MB | 2.5 GT/s | Arrandale | I3 | 2.93 Ghz | 4 MB | 2.5 GT/s | Clarkdale | I3 Mobile | 2.13 Ghz | 3 MB | 2.5 GT/s | Nehalem | Vpro | 2.90 GHz | 3 MB | 2.5 GT/s | Clarksfield | Vpro Mobile | 3.40 GHZ | 4 MB | 5 Gt/s | Nehalem | Xeon 7000 | 1.73 Ghz | 4 MB | 4 GT/s | Nehalem | Xeon 5000 | 1.87 Ghz | 4 MB | 2 GT/s | Gainestown | Xeon 300 | 2 Ghz | 4 MB | DMI | Clarkdale | Itanium 9000 | 733 Mhz | 2 MB | 133 Mhz |......

Words: 447 - Pages: 2

Lab1

...The pros and cons of a cellular network vs. a fixed line network. The pros of a cellular network include cost the phone companies charge more than what you'd pay for most alternatives, and some are taxed more as well. There are some locations where getting new wired phone service is expensive or even impossible. Long Distance and extra features like Call Waiting are normally included with alternative phones. More features on cellular and broadband phones normally include Long Distance, Voice Mail, Caller ID, Call Forwarding and more, usually at no additional charge. They also have Text Messaging and various forms of data service which are unavailable with a landline. Portability is another so if you move your home more than average your phone and your number can stay with you. There are no "installation" charges. Internet Access is another pro your wireless phone can also use with either with an internal browser or tethered to your computer, and available wherever there is cellular coverage. A few cons of the cellular network are safety if you need to call 911, public safety authorities won't automatically know where you are you'll have to tell them. Reliability is another wired telephone services have come as close to 100% reliable while cell networks aren’t and sometimes have bad signals. Their network has substantial power backup, redundant circuits and years to get it right. In an extended power outage, such as after a hurricane or snowstorm, the service may not work,......

Words: 721 - Pages: 3

Lab1

...iLab #2 - Ecosystems, Biodiversity, and Species March 10, 2014 SCI 204 iLab #2 - Ecosystems, Biodiversity, and Species Exercise #1- Discuss the producer, consumer and decomposer relationships in this ecosystem after the eruption. List 3 references. After the forests were destroyed by lava and mudflow, producers were completely destroyed and died out. This caused a disruption in the food cycle because then, consumers such as deer had less food supply causing them to starve and die. After a while, the decomposers begin to kick start the cycle for new life, bringing back order. Exercise #2- Discuss any two plant species and any two animal species that are affecting the Everglades. What are the challenges facing the native species and how are they adapting to the changing environment? List 3 references. Plants – Australian pine- This plant was brought over to the Everglades and used for landscaping purposes from South pacific Islands and Australia. The tree’s roots disrupt the nesting of the native creatures such as the American crocs and turtles. Brazilian pepper plant- This pepper tree was brought over from Brazil to market the peppers. As birds ate the seeds, they begin to spread them from their feces. As these trees begin to spread throughout the Everglade, its dense structure allowed it to form concentrated thickets......

Words: 683 - Pages: 3

Lab1

...Laboratory Instructor Guide Lab 1: Computer Model Understanding Activity (paper and pencil) Learning Objectives and Outcomes The student is expected to demonstrate the ability to work with the von Neumann model of a computer. To demonstrate this ability, the student will: 1. Draw a diagram of a computer from the von Neumann perspective, including definitions of all parts of the model. 2. Provide examples of the Input, Output, and Memory sections of the model. 3. Provide a comparison table showing the similarities and differences between desktop and notebook computers. Required Setup and Tools In this laboratory, students will need only paper and pencil to do the required work. However, the use of a drawing program, such as Visio or the Drawing toolbar in Microsoft Word, is suggested for drawing the von Neumann computer model. Lab Solutions The student should provide solutions similar to what is shown here. Task 1: Here is an example of the von Neumann model of the computer. 1 Memory Control Unit Arithmetic Logic Unit Output Input Accumulator Central Processing Unit Here are the functions of each component in the von Neumann model of the computer. Component Control Unit Arithmetic Logic Unit Accumulator Function Control operations between all components of the computer. Perform calculations using the accumulator. Store the result of the last calculation. Accumulators are registers that store temporary numbers and can be hard-wired to the......

Words: 765 - Pages: 4

Lab1

...LAB 1 Tuesday Hacking and Countermeasures Reconnaissance, scanning, Gaining Access, Maintaining Access, Covering Tracks I would follow the fives steps of hacking and start with step number one, reconnaissance, and a bit of scanning. I believe google would be a great tool for performing the first step in hacking, there is a lot of information on most things there. Other tool sthat could be used are NMap, Paratrace, and ScanRand. Social engineering is one of the best ways to get information abotu a company or person. In social engineering one could pretend to be a higher up just trying to run a check and get all sorts of information. One of the most common forms of social engineereing is a method called phishing. Enumeration is similiar to scanning a system for vulnerabilitiesthat can be used to attack the system. This is vital to a hackers object since it reveals the information needed to access the target. To avoid detection a good hacker will always cover their tracks. This is done by purging any information in the system that could even minutely show the trace that someone was their. You must be careful when doing this because sometimes its not whats there that gets the hacker busted but what wasn’t. An attacker will leave some sort of backdoor into the system. This allows for re-entry at a later time that doesnt appear in scans by the company As the security professional your job is to find holes in......

Words: 442 - Pages: 2

Lab1

...October 6, 2014 Unit 2 Analysis 1, NT1110 Computer Shopper Computer Type | Price | RAM | Hard Drive | Processor Speed | Cyber Power PC Gamer Ultra GUA880 Desktop | $571.99 | 8 Giga Bytes | 1024 Giga Bytes | 3.8 Giga Hertz (4 Mega Bytes Cache) | Dell Inspiron i3646-1000 BLK Desktop | $249.99 | 4 Giga Bytes | 500 Giga Bytes | 2.41 Giga Hertz | Acer C720 Chromebook | $199.00 | 2 Giga Bytes | 32 Giga Bytes | 1.4 Giga Hertz | HP 15-g070nr 15.6-inch Laptop | $249.99 | 4 Giga Bytes | 500 Giga Bytes | 1.35 Giga Hertz | Gamers would most likely prefer the Cyber Power PC Gamer Ultra GUA880 Desktop. Cause for one you need a high processor speed to be able to run games so they don’t lag. You also need a lot of memory on your hard drive to be able to download games because they take a lot of memory. An on top of that whenever updates come out it can possibly make the size of the game bigger depending on how major the update is. Also you need a descent amount of RAM cause not only does it help save memory but it helps with how fast your game will download. Lastly it’s a lot cheaper than some of the bigger brands of the gamer desktops especially with the 1024 Giga Byte hard drive. Cause there are more expensive gamer desktops with less memory on its hard drive than this one. Business owners would prefer the HP 15- g070nr 15.6- inch Laptop. Especially if they go on business trips for meetings because you have more than enough memory on your hard drive to be able......

Words: 402 - Pages: 2

Lab1

...PERFORMANCE CERTIFICATE OF COMPLIANCE Project Name Project Address (Part 1 of 3) Date PERF-1 29-Jul-2010 T2408SamplePermit Enforcement Agency Use Building Permit # Checked by/Date GENERAL INFORMATION Date of Plans Building Conditioned Floor Area 39,700 Climate Zone 12 HOTEL/MOTEL GUEST BUILDING TYPE PHASE OF CONSTRUCTION NONRESIDENTIAL NEW CONSTRUCTION HIGH RISE RESIDENTIAL ADDITION ALTERATION STATEMENT OF COMPLIANCE This Certificate of Compliance lists the building features and performance specifications needed to comply with Title 24, Parts 1 and 6 of the State Building Code. This certificate applies only to a building using the performance compliance approach. Documentation Author Signature Date Telephone The Principal Designers hereby certify that the proposed building design represented in the construction documents and modeled for this permit application are consistent with all other forms and worksheets, specifications, and other calculations submitted with this permit application. The proposed building as designed meets the energy efficiency requirements of the State Building Code. Title 24, Part 6. ENV. LTG. MECH. 1. I hearby affirm that I am eligible under the provisions of Division 3 of theBusiness and Professions Code to sign this document as the person responsible for its preparation; and that I am licensed in the State of California as a civil engineer, mechanical engineer (envelope & mechanical only), or......

Words: 6912 - Pages: 28

Lab1

...Task 1: LGA 1156 Connector- Uses I5, I7, Xeon, Celeron and Pentium processors. Its purpose is to allow PCI, DMI and FDI devices to connect to the rest of the system. Intel H55 Chipset-(Intel.com) Uses Pentium, I3, I5, I7 and Xeon processors. Its purpose us to allow PCI, USB, Network and serial devices to connect to the rest of the system Gigabyte GA-H55M-UD2H Motherboard- Supports Lynnfield I5,I3 and I7 CPU’s Task 2: (AMD.COM) AMD 770 Northbridge- Uses Phenom processors and it is for systems used for high end gaming. AMD SB710 Southbridge- Uses Athlon processors and it is for systems used for high end embedded client applications. Socket AM3 Connector- Uses Phenom II processors and was used to support DDR3 SDRAM. Task 3: (Intel.com) Processor | Clock Speed | Internal Cache | Bus Speed | Archictecture | I7 | 3.7 Ghz | 1.5 MB | 4.8 GT/s | Bloomfield | I7 Mobile | 1.6 Ghz | 6 MB | 2.5 Gt/s | Clarksfield | I5 | 3.46 Ghz | 8 MB | 4.8 GT/s | Lynnfield | I5 Mobile | 2.40 Ghz | 3 MB | 2.5 GT/s | Arrandale | I3 | 2.93 Ghz | 4 MB | 2.5 GT/s | Clarkdale | I3 Mobile | 2.13 Ghz | 3 MB | 2.5 GT/s | Nehalem | Vpro | 2.90 GHz | 3 MB | 2.5 GT/s | Clarksfield | Vpro Mobile | 3.40 GHZ | 4 MB | 5 Gt/s | Nehalem | Xeon 7000 | 1.73 Ghz | 4 MB | 4 GT/s | Nehalem | Xeon 5000 | 1.87 Ghz | 4 MB | 2 GT/s | Gainestown | Xeon 300 | 2 Ghz | 4 MB | DMI | Clarkdale | Itanium 9000 | 733 Mhz | 2 MB | 133 Mhz | Merced | Pentium | 50 Mhz | 2 MB | 60 MT/s | P5 | Celeron | 267 Mhz |...

Words: 354 - Pages: 2

Lab1

...Services Provided for Older Adults with Disability There is no doubt that our population is aging. In the next 25 years, one in every five Americans will be aged 65 years or older, and with the increasing uncertainty of the public assistance programs on which many older adults rely on, changing family structures, and as medical advances extend the lives of those with chronic conditions or disability, older adults will come into contact with nonprofit social service agencies in greater numbers than ever before. Social and human services, nonprofit agencies, many of which have traditionally focused on youth and nuclear families, must begin preparing to address the problem that might face the aging society. The U.S. Census Bureau projects that by the year 2030; the populations of adults aged 65 years and older will double the number that we have right now. In order to effectively serve older adults with disability, human service professionals must have an understanding of the many issues that affect them. The population of older Americans will be increasingly diverse in terms of Race or ethnicity and socioeconomic status. Older adults, especially those aged 85 and older and/or with low annual household incomes, are far more likely to experience disabilities and physical limitations than the general population. Base on the services that are provided in long-term care facilities, I believe they will serve in the best interest of......

Words: 866 - Pages: 4

Lab1

...Assessment Worksheet Analyzing IP Protocols with Wireshark Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview In this lab, you exercised a wide variety of capabilities of the Wireshark packet capture and analysis software. In the first part of the lab, you learned about probe placement, clocking/timing issues, Wireshark traffic capture, and the use of filters. In the second part of the lab, you utilized a capture file to answer basic questions about key IP protocols and the basic configuration of the IP hosts from which traffic is captured. Finally, in the third part of the lab, you explored Wireshark on your own to answer a set of challenge questions. Lab Assessment Questions & Answers 1. What are some causes of the number of bytes on the wire exceeding the number of bytes being captured? It could mean that not everything is being captured or that partial or malformed packets have been captured. It is also possible that the computer that is running Wireshark is not capable of keeping up with the interface. 2. What are the source and destination MAC address in Frame 546? 00:22:fa:1c:eb:e6 01:00:5e:7f:ff:fa 3. What is the manufacturer-specific ID for Intel Core? 1c:eb:e6 4. What...

Words: 381 - Pages: 2

Lab1

...computers LAB 2.1 RESEARCH Advantages OF MULTICORE PROCESSORS The proximity of multiple CPU cores on the same die allows the cache coherency circuitry to operate at a much higher clock rate than is possible if the signals have to travel off-chip. Combining equivalent CPUs on a single die significantly improves the performance of cache snoop (alternative: Bus snooping) operations. Put simply, this means that signals between different CPUs travel shorter distances, and therefore those signals degrade less. These higher quality signals allow more data to be sent in a given time period since individual signals can be shorter and do not need to be repeated as often. The largest boost in performance will likely be noticed in improved response time while running CPU-intensive processes, like antivirus scans, ripping/burning media (requiring file conversion), or searching for folders. For example, if the automatic virus scan initiates while a movie is being watched, the application running the movie is far less likely to be starved of processor power, as the antivirus program will be assigned to a different processor core than the one running the movie playback. Assuming that the die can fit into the package, physically, the multi-core CPU designs require much less Printed Circuit Board (PCB) space than multi-chip SMP designs. Also, a dual-core processor uses slightly less power than two coupled single-core processors, principally because of the......

Words: 748 - Pages: 3

Lab1

...The way you present yourself in the classroom makes an impression on your instructor and your classmates. Do you present yourself as a serious, dedicated student, or do you come off as uninterested or maybe even disruptive? As a college student, you are expected to act in a mature manner. Below is a list of Do’s and Don’ts for the college classroom that will help facilitate a learning centered atmosphere: Take responsibility for your education Instructors are here to create a learning environment – whether or not you learn depends on your willingness to listen, ask appropriate questions, and do the work necessary to pass the course. Attend class Students who attend class, listen to the instructor, ask questions, and take good notes are more likely to pass with a higher grade. If you must miss a class, contact your instructor ahead of time to let him or her know that you will not be in class. DO NOT ask the instructor to repeat material you missed because you skipped a class. Be on time Walking in late disturbs everyone. At this college and many places of employment, tardiness communicates lack of interest and lack of dependability. If you cannot avoid being late, make sure to be unobtrusive about your entry. Come to class prepared – turn your work in on time Complete assigned reading before coming to class. Make sure to bring common classroom supplies such as a pencil, paper, textbook, test materials, etc. along with completed homework. Students who......

Words: 366 - Pages: 2