Lab 2

In: Computers and Technology

Submitted By jen71885
Words 403
Pages 2
Task 1: Identify the Ports Procedure 1. Look at the front and back of a desktop or notebook computer for the following bus connectors: RS232, USB, FireWire, and infrared. How many of each type of connector did you find? 12 2. Label the appropriate names to the ports and adaptors given below.
PS/2 keyboard port
PS/2 keyboard port
Parallel port
Parallel port
Ethernet
Ethernet
USB ports
USB ports
Serial port
Serial port
USB mini jack
USB mini jack
Audio ports
Audio ports
USB ports
USB ports

Task 2: Identify Memory Slots
Procedure

1. Using the Internet, locate a diagram or photo of these types of memory slots on a desktop or notebook computer: Memory Stick (MS), Micro Drive (MD), Compact Flash (CF), and Secure Digital (SD). 2. Explain the diagram or photo(s) with the name of each type of memory slot.

USB 1
USB 1
Memory card slot
Memory card slot
Examples:

USB 3.0 ports
USB 3.0 ports
Audio port microphone and earphone jacks
Audio port microphone and earphone jacks

IEEE 1394 port
IEEE 1394 port

E sata port
E sata port

Sd mini slot
Sd mini slot
Micro sd slot
Micro sd slot
USB 2.0 PORT
USB 2.0 PORT
Compact flash
Compact flash
Dual slot
Dual slot

Task 3: Identify the Configuration
Procedure
1. Identify the following configuration.

2. Define a SCSI and the need to use a SCSI Controller.
-------------------------------------------------
SCSI is a set of parallel interface standard used to attach printers, scanners, disk drives to a computer

-------------------------------------------------

-------------------------------------------------

-------------------------------------------------

Task 4: Identify the Color Codes
Procedure
Most recent systems and sound cards use the PC 99 color coding list. Fill in the table Color | Description | Pink | microphone in | Light…...

Similar Documents

Lab 2

...“Next”. * Click on the dropdown menu and select “FTP Server”. Click “Next”. * Check the box next to “External” and click “Next”. * Click the “Finish” button, and then click “Apply”. * Click the “Create a New Server Publishing Rules” and call it “Telnet”. Click the “Next” button. * Enter the IP address of Windows 2003 and click “Next”. * Click on the dropdown menu and select “Telnet Server”. Click “Next”. * Check the box next to “External” and click “Next”. * Click the “Finish” button, and then click “Apply”. * On the BackTrack 5r3 External machine, open a terminal and type the command nmap 216.1.seat.1 to nmap the Firewall. Five ports should be open. 2. Edit the local.rules file on snort creating a custom rule for yourname that has the message yournamepractice login. Start the sniffer on eth0 (tcpdump -i eth0 –s 0 –nntttt –w capture1.cap.) Log on to the Windows 2003 virtual machine. Create an account called yournamepractice with the password of P@ssw0rd. Add yourself to the administrators group. From the Windows 7 machine, telnet and ftp to the firewall IP Address. Log in as yournamepractice. Stop the capture and run it through snort. Take a screenshot of the yournamepractice alert. * Open a terminal on the Sniffer and type the command kwrite /etc/snort/rules/local.rules to edit the local.rules file. * Copy/past the last rule in the file onto a new line. ......

Words: 2739 - Pages: 11

Lab 2

...Unit 1. Assignment 1. Homework 1. Why is the CPU the most important component in a computer? The CPU stands for Central Processing Unit. It does all the processing for the entire system. Without it, your computer can't do anything. It has nothing to process information. It's just dead without it. 2. What number does a bit that is turned on represent? What number does a bit that is turned off represent? When a bit is turned on, it represents a "1". When it is turned off, it represents a "0". The exact value depends on where the bit is within the byte it is part of. In the binary number 0000 0001, the last bit is set to 1 and represents the number 1. 3. What would you call a device that works with binary data? Digital Data is data that is stored in binary, and a Digital Device is any device that works with binary data 4. What are the words that make up a high-level programming language called? The words that make up a high-level programming language are known as key words or reserved words. 5. What are the short words that are used in assembly language called? Mnemonic 6. What is the difference between a complier and an interpreter? A compiler translates code from a source language (e.g. C, C++, and Java) to a target language, which can then be executed by a (virtual or physical) machine. An interpreter reads code in an interpreted language (e.g. PHP, Perl, and Java Script) and directly executes the contained instructions. 7. What......

Words: 298 - Pages: 2

Lab 2

...1. What is the principle of least privilege? The priniclple of least privilege make it possible for user to have the least amount of privilege so that not everybody has full access to the files. 2. Why would you add permissions to a group instead of the individual? It is easier and more efficient to add a group to permission instead of having to add each user. If the user is already in the group, then the user would automatically get access to the shared files. 3. Why would you allow shared access to groups instead of to everyone? Because there are different groups in a business. HR is a different group than SF. Also you do not want employees having access to the manager group folders and files 4. List at least three different types of access control permissions you can enable for a file. Read, Delete, Modify 5. Which access control permissions allow you to delete files and/or folders? Delete Child (DC) 6. What is the lowest level permission needed to view a folder’s contents? Read Data (RD) 7. If you don’t remember the syntax when using icacls.exe, what command do you type to see the options? Icacls.exe 8. What other tool could you use to modify the privileges of the files or folders of a shared drive? The command prompt \grant command 9. During the lab exercise, were you able to create, modify, or delete a text file on Server B as SFmanager or HRmanager? Explain. Yes. While using the server A as admin, While using the command prompt I gave both SFmanager and......

Words: 276 - Pages: 2

Lab 2

...Procedure 1. Look at the front and back of a desktop or notebook computer for the following bus connectors: RS232, USB, FireWire, and infrared. How many of each type of connector did you find? 2. Label the appropriate names to the ports and adaptors given below. PS/2 Mouse PS/2 Mouse Parallel Port Parallel Port Modem Modem USB Keyboard USB Keyboard VGA VGA HDMI HDMI AV AV USB USB Task 2: Identify Memory Slots Procedure 1. Using the Internet, locate a diagram or photo of these types of memory slots on a desktop or notebook computer: Memory Stick (MS), Micro Drive (MD), Compact Flash (CF), and Secure Digital (SD). 2. Explain the diagram or photo(s) with the name of each type of memory slot. Examples: 1. Multi Card Reader, 2. USB 2.0, 3. Audio and Head Phone (Speaker), 4. SATA external Storage, 5. USB 3.0, 6. IEEE 6conductor Fire wire connector Card Reader (SD, mini SD, MMC) Card Reader (SD, mini SD, MMC) Micro Drive (T-Flash, Micro SD) Micro Drive (T-Flash, Micro SD) USB 2.0 USB 2.0 Card Reader Compact Flash (CF I, CF II) Card Reader Compact Flash (CF I, CF II) Memory Stick (MS, PRO, PRO Duo) Memory Stick (MS, PRO, PRO Duo) Task 3: Identify the Configuration Procedure 1. Identify the following configuration. 2. Define a SCSI and the need to use a SCSI Controller. ------------------------------------------------- The Small Computer System Interface (SCSI) is a set of parallel interface standards......

Words: 628 - Pages: 3

Lab 2

...Lab #2 – Student Steps: Student steps needed to perform Lab #2 – Align Risk, Threats, & Vulnerabilities to the COBIT Risk Management Controls: 1. Connect your removable hard drive or USB hard drive to a classroom workstation. 2. Boot up your classroom workstation and DHCP for an IP host address. Copyright © 2013 Jones & Bartlett Learning, LLC, an Ascend Learning Company Current Version Date: 05/30/2011 www.jblearning.com All Rights Reserved. -11- Student Lab Manual 3. Login to your classroom workstation and enable Microsoft Word. 4. Conduct a high-level narrative discussion and review of the COBIT v4.1 Framework. 5. Review the COBIT P09 Control Objective definition, scope, and focus areas for assessing and managing IT risk. 6. Relate how the COBIT (P09) Control Objective definition relates to assessing and managing IT risk within each of the seven domains of a typical IT infrastructure: User, Workstation, LAN, LAN-to-WAN, WAN, Remote Access, Systems/Applications Domains 7. Explore the structure and format of how to align risks, threats, and vulnerabilities identified from your IT infrastructure to the COBIT P09 Control Objective definition, scope, and focus areas Information, Applications, Infrastructure, and People. 8. Explore the hierarchy for assessing and managing IT risks: • Step #1: Align the risk, threat or vulnerability assessment to C-I-A primary first and assess • Step #2: Align the risk, threat, or vulnerability remediation to Effectiveness,......

Words: 381 - Pages: 2

Lab #2

...Lab #2 – Perform a Vulnerability Assessment Scan using Nessus 1. What is the application Zenmap GUI typically used for? Describe a scenario in which you would use this type of application? Typically used for port scanning. An organization may use this type of application to identify hosts on a network and/or identify what services are running on a particular host. 2. Which application is used for Step 2 in the hacking process to perform a vulnerability assessment scan? Nessus is a vulnerability assessment scanner 3. What must you obtain before you begin the ethical hacking process or penetration test on a live production network, even before performing the reconnaissance step? You must obtain written authorization / permission 4. What is a CVE listing? Who hosts and who sponsors the CVE database listing website? Common Vulnerabilities and Exposures (CVD) publishes software vulnerabilities and exposures as well risk mitigation solutions via software patches & updates. Sponsored by Mitre Corporation under contract for Dept of Homeland Security 5. Can Zenmpa GUI detect which operating systems are present on IP servers and workstations? Which option includes that scan? Yes, it can detect the OS being used. The command would be –o. 6. If you have scanned a live host and detected that it is running Windows XP workstation OS, how would you use this information for performing a Nessus vulnerability assessment scan? Have the......

Words: 333 - Pages: 2

Lab 2 Unit 2

...Lab 2.1 1. What are the Regulatory requirements? 2. What are medical rules or laws of private information that we need to know to set up this Database with the customer information (Data privacy)? 3. Please give me any specific requirements that are necessary? Business rules 1. Appointments 2. Social security 3. Medical record 4. Driver license 1. Middle initial 2. Are you a Jr. or Sr. Patient Entity | Patient Visit entity | 1. Medical record number | 1. Group number, appointment | 2. Social security number, Driver license | 2. Allergies | 3. Taking any medications | 4. Taking any medications | Composite key | Composite keys are the most common. | Make sure patient fills out all the whole application. Lab 2.2 Data Requirements 1. Allow Software Management Team and IT Staff to view, add, edit, and delete the types of software to be tracked. This includes type of software, licensing dates, status, and location. 2. Allow Software Management Team to enter, edit, and delete New Software Requests. 3. Allow Software Management Team to view the different licensing agreements and types. This includes viewing the pricing per agreement. 4. Allow Software Management Team to sign out software to users with administrative privileges. 5. Allow Software Management Team and IT Staff to update the status of software licenses. 6. Allow users, assigned IT users, Staff, and Software......

Words: 342 - Pages: 2

Lab 2

...Chapter 9 (Writing Today, pp. 171–196) 1. What is the purpose of a commentary? * The purpose of a commentary is to express opinions on current issues and events. 2. What is the basic organizational pattern of the commentary? * Basic Organization of a commentary is Introduction, Explain the current event or issue, Support for your argument *3, Clarification of your argument, and your conclusion. 3. What are strategies for inventing the content of your commentary? * For inventing the content of your commentary you need a good and recent event/ topic. You want to watch the news, and research the event to find out what people are talking about. 4. Which sources do you consult to gain information about what others know? * The sources you consult to gain information about what others know are, Online sources, Print sources, and Empirical sources. 5. What are strategies for organizing and drafting your commentary? * The Introduction – State your purpose and state your main point/ thesis statement * Explain the Current Event or Issue- Give enough background information to help readers understand the event or issue. Also show your readers that you understand the conversation. * Support Your Position- Each reason for your argument should support the main point or thesis, you stated in the introduction. Your support needs to steadily build up your argument for your side of the issue. * Clarify Your Position – Show your...

Words: 1015 - Pages: 5

Lab 2

...IS3110 Lab #2: Assessment Worksheet Align Risk, Threats, & Vulnerabilities to COBIT P09 Risk Management Controls Student Name: _____________________________________________________________ 1. From the identified threats & vulnerabilities from Lab #1 – (List At Least 3 and No More than 5), High/Medium/Low Nessus Risk Factor Definitions for Vulnerabilities) a. b. c. d. e. 2. For the above identified threats and vulnerabilities, which of the following COBIT P09 Risk Management control objectives are affected? • PO9.1 IT Risk Management Framework • PO9.2 Establishment of Risk Context • PO9.3 Event Identification • PO9.4 Risk Assessment • PO9.5 Risk Response • PO9.6 Maintenance and Monitoring of a Risk Action Plan 3. From the identified threats & vulnerabilities from Lab #1 – (List At Least 3 and No More than 5), specify whether the threat or vulnerability impacts confidentiality – integrity – availability: Confidentiality Integrity Availability a. b. c. d. e. 4. For each of the threats and vulnerabilities from Lab #1 (List at Least 3 and No More than 5) that you have remediated, what must you assess as part of your overall COBIT P09 risk management approach for your IT infrastructure? 5. For each of the threats and vulnerabilities from Lab #1 – (List at Least 3 – No More than 5), assess the risk impact or risk factor that it has on your organization in the following areas: a. Threat or Vulnerability #1: o......

Words: 469 - Pages: 2

Lab 2

...UMUC NSCI 101/103 Lab 2: Types of Forces INSTRUCTIONS: On your own and without assistance, complete this Lab 2 Answer Form electronically and submit it via the Assignments Folder by the date listed on your Course Schedule (under Syllabus). To conduct your laboratory exercises, use the Laboratory Manual that is available in the classroom. Laboratory exercises on your CD may not be updated. Save your Lab 2 Answer Form in the following format: LastName_Lab2 (e.g., Smith_Lab2). You should submit your document in a Word (.doc or .docx) or Rich Text Format (.rtf) for best compatibility. Experiment 1: Friction Table 1: Applied Force Required to Slide Cup Cup Material Force Applied F1 m1 = 300 g water Force Applied F2 m2 = 150 g water F1 / FN1 F2 / FN2 Plastic Avg: Avg: Avg: Avg: Styrofoam Avg: Avg: Avg: Avg: Paper F1 m1 = 150 g water F2 m1 = 100 g water F1 / FN1 F2 / FN2 Avg: Avg: Avg: Avg: Surface Description Questions: What happened to your applied force Fapp as you decreased the amount of water in the cup? Assume the......

Words: 619 - Pages: 3

Lab 2

..._____________________________________________________ Jeff Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ 18 Sept 2015 Lab Due Date: ________________________________________________________________ Overview In this lab, you used Nmap commands within the Zenmap application to scan the virtual network and identify the devices on the network and the operating systems and services running on them. You also used OpenVAS to conduct a vulnerability assessment and record the high risk vulnerabilities identified by the tool. Finally, you used the information you gathered from the report to discover mitigations for those risks and make mitigation recommendations based on your findings. Lab Assessment Questions & Answers 1. What is Zenmap typically used for? How is it related to Nmap? Describe a scenario in which you would use this type of application. Zenmap is the official GUI for the Nmap Security Scanner. It is a multi-platform, free and open-source application designed to make Nmap easy for beginners to use while providing advanced features for experienced Nmap users. This can be used for example to audit a network on a specific IP scheme. perform a vulnerability assessment scan in the 2. Which application can be used to reconnaissance phase of the ethical hacking process? OpenVAS 3. What must you obtain before you begin the ethical......

Words: 662 - Pages: 3

Lab 2

...Lab #2 – Assessment Worksheet Performing a Vulnerability Assessment Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview In this lab, you used Nmap commands within the Zenmap application to scan the virtual network and identify the devices on the network and the operating systems and services running on them. You also used OpenVAS to conduct a vulnerability assessment and record the high risk vulnerabilities identified by the tool. Finally, you used the information you gathered from the report to discover mitigations for those risks and make mitigation recommendations based on your findings. Lab Assessment Questions & Answers 1. What is Zenmap typically used for? How is it related to Nmap? Describe a scenario in which you would use this type of application. Zenmap is a graphical interface for Nmap, a port scanning tool that can quickly identify hosts and detect what operating system and services are running on them, and all without privileged access. Zenmap, and similar tools, are typically used during the scanning and vulnerability phase of the ethical hacking process. 2. Which application can be used to perform a vulnerability assessment scan in the reconnaissance phase of the ethical......

Words: 431 - Pages: 2

Lab 2

... | Unit 2: Lab 1: Managing Files | | Week 2 Assignments | | Unit 2: Lab 1: Managing Files | | Week 2 Assignments | NT1430 / Bowser Linux networking September 25, 2013 By: Cuneo, Thomas NT1430 / Bowser Linux networking September 25, 2013 By: Cuneo, Thomas Unit 2: Lab 1: Managing Files CH 6, Lab 1: Managing Files 1. [Denise@localhost ~]$ mkdir Unit2 2. [Denise@localhost ~]$ cd Unit2 [Denise@localhost Unit2]$ mkdir memos reports 3. [Denise@localhost Unit2]$ cd [Denise@localhost ~]$ touch memo.one [Denise@localhost ~]$ touch memo.two [Denise@localhost ~]$ touch memo.three [Denise@localhost ~]$ touch report.jan report.feb report.mar 4. [Denise@localhost ~]$ cp memo.one Unit2/memos 5. [Denise@localhost ~]$ cp memo.two Unit2/memos/memo.2 6. [Denise@localhost ~]$ mv memo.three Unit2/memos ((I removed the forward slash & it worked. Not sure if it is correct or not, but I am going to continue anyway…..)) [Denise@localhost ~]$ mv memo.three/Unit2/memos mv: missing destination file operand after `memo.three/Unit2/memos' Try `mv --help' for more information. [Denise@localhost ~]$ mv memo.three /Unit2/memos mv: cannot move `memo.three' to `/Unit2/memos': No such file or directory [Denise@localhost ~]$ mv memo.three/Unit2/memos mv: missing destination file operand after `memo.three/Unit2/memos' Try `mv --help' for more information. [Denise@localhost ~]$ mv memo.three/Unit2/memos.3 mv: missing destination file operand after......

Words: 1139 - Pages: 5

Lab 2

...------------------------------------------------- Top of Form Report Details for | Security assessment: | | Severe Risk (One or more critical checks failed.) | Computer name: | | IP address: | 192.168.2.100 | Security report name: | | Scan date: | 3/16/2016 2:54 PM | Scanned with MBSA version: | 2.3.2211.0 | Catalog synchronization date: | Security updates scan not performed | | | Sort Order: | Bottom of Form Windows Scan Results Administrative Vulnerabilities   Score   | Issue  | Result  | | Automatic Updates | | The Automatic Updates system service is not running. | What was scanned                How to correct this | | | | | Password Expiration | | All user accounts (3) have non-expiring passwords. | What was scanned      Result details      How to correct this | | | | | Incomplete Updates | | No incomplete software update installations were found. | What was scanned                | | | | | Windows Firewall | | Windows Firewall is disabled and has exceptions configured. | What was scanned      Result details      How to correct this | | | | | Local Account Password Test | | Some user accounts (1 of 3) have blank or simple passwords, or could not be analyzed. | What was scanned      Result details | | | | | File System | | All hard drives (1) are using the NTFS file system. | What was scanned      Result details | | | | | Autologon | | Autologon......

Words: 1675 - Pages: 7

Lab 2

...Role: Voter 1. Voters should use cost-benefit analysis to make their decisions but not everyone uses it. There will be a lot of voters making the same decision but every voter will make the same decision. There are many factors in the decision making but it differs for each voter. 2. Some of the decisions made by representatives are budget, new laws and many more, most of which are aimed for the wellbeing of the people. 3. It is necessary for voters to be informed and educated to make the right decision. Given the chance to vote, a voter should have all the information to make the best decision. Role: Entrepreneur 1. Entrepreneur creates job and bring in income for the city or state through taxes. Without Entrepreneur there would be major impact on the economic system. Big businesses often need the small businesses in order to stay in business. 2. It really doesn’t matter if the resources are scarce or not. Most entrepreneur care more about maximizes the profit and little about what type of resources is used. Role: Taxpayer 1. Higher tax on gasoline mean little these day. Regardless if gas goes over $5 a gallon people still need to buy gas to get to work and to do their daily chores. 2. It could swing both ways. It all comes down to the individual, if they need the money they will put in more hours and if they don’t need the money then why should they work more if they are getting paid less per hour. 3. Of course it’s important for government to understand the......

Words: 507 - Pages: 3