Premium Essay

Vlab

In:

Submitted By RJManofSteel
Words 626
Pages 3
Working with Others Kelley Smith 7/19/2015 GS2520: Professional Communications Charles McCoin

The article that I found for managing conflict in a work environment is by Bonnie Hagemann and Saundra Stroope and is called “Conflict Management: Lessons from the Second Grade”. In this article, Stroope and Hagemann discuss strategies on how to avoid and resolve conflict while at work. They found that second graders used the same techniques to resolve conflict as those at the upper levels in the business world. Here are the techniques they touch on in their article: * Get help * Compromise * Avoid * Talk it out * Negotiate * Chance * Ignore * Take turns * Apologize * Share * Postpone * Humor * Better results
These 13 techniques are the most important things to consider when trying to resolve conflict in the workplace, but you must make sure to choose the correct technique since they all have very different outcomes. For instance, when choosing to avoid the conflict you have to make sure that the issue is an unimportant one before avoiding it because it could lead to worse problems than the original issue. When considering negotiation as a conflict technique, you have to take it one step at a time. One of the best times to use this tactic is when negotiating one’s salary and benefits. Another technique that is extremely useful is apologizing. You have to know when to own up to a mistake, take ownership of it, and ask for forgiveness. Once you can be open enough with your co-workers to say I made a mistake and for that I’m sorry, you can then have a more open work relationship with them and make it a better working environment for all concerned. Another technique that should always have a place in the work environment is humor, after all, it is a powerful tool. “It breaks up

Similar Documents

Premium Essay

Vlab

...1. Identify the four recognized business functions and each security practice of OpenSAMM. a. Governance, construction, verification, and deployment. 2. Identify and describe the four maturity levels for security practices in SAMM. a. 0 – implicit starting point representing the activities in the practice being unfulfilled. 1 – initial understanding and ad hoc provision of security practice. 2 – increase efficiency and effectiveness of the security practice. 3 – comprehensive mastery of the security practice. 3. What are some activities an organization could perform for the security practice of Threat Assessment? a. Identify threats and establish responses to these threats. 4. What are the two recommended assessment styles for SAMM, and how are they used? a. Processes handling vulnerability reports and operational incidents 5. What are the three main objectives of the OWASP Application Security Verification Standard (ASVS) Project? a. Understand, establish and compliance 6. Identify the four levels used for ASVS. a. Automated verification, manual verification, design verification, and internal verification 7. According to the OWASP development guide, what are some guidelines for handling credit cards on Web sites? a. Use compliant equipment, maintain security, and unique keys 8. What are the four known data-validation strategies? a. Constrain, accept, reject, and sanitize 9. When should the testing process be introduced in the Software Development Lifecycle...

Words: 276 - Pages: 2

Premium Essay

A Large Scale Web Base Vitual Oscilloscope

... | |National University of Singapore | |10 Kent Ridge Crescent, Singapore 117576 | |E-mail: elekocc@nus.edu.sg | Abstract VLAB, a pilot web-based virtual laboratory on an oscilloscope experiment has been developed and launched for over 1000 first year undergraduate engineering students in the Faculty of Engineering in NUS (National University of Singapore). Rather than simulating the oscilloscope display on the client as is often done in other virtual laboratories, the system uses real-time video capture of the actual oscilloscope's display. In addition, the use of the mouse to turn the control buttons and knobs of the instrument has been implemented so that a more realistic feel of the instrument is provided. Since its launch, VLAB has in general received positive feedback from numerous users and can be accessed from http://vlab.ee.nus.edu.sg/vlab. Introduction The use of the Internet has been expanding exponentially and is now extensively used as a connectivity and reference tool for commercial, personal and educational purposes. In particular, the...

Words: 4337 - Pages: 18

Premium Essay

Module 3 Essay

...Syllabus NT1210 Introduction to Networking SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory, 22 Lab) Prerequisite: NT1110 Computer Structure and Logic or equivalent © ITT Educational Services, Inc. All Rights Reserved. -1- 05/08/2013 Introduction to Networking SYLLABUS COURSE SUMMARY COURSE DESCRIPTION This course serves as a foundation for the study of computer networking technologies. Concepts in data communications, such as signaling, coding and decoding, multiplexing, circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments. MAJOR INSTRUCTIONAL AREAS 1. Networking fundamentals 2. The OSI model and its use in networking 3. LANs, WANs, MANs and their implementation 4. Physical layer fundamentals 5. Basics of the data link layer 6. The functions of TCP/IP 7. IP addressing, subnetting, and supernetting 8. Diagramming the physical components that comprise a network 9. Logic created by the interconnectivity of network components 10. Applying network security 11. Future developments in networking COURSE OBJECTIVES 1. Explain key networking concepts and terminology. 2. Identify the advances...

Words: 4795 - Pages: 20

Free Essay

Networking Week 1 Lab Report

...1ElementK Tutorial, How to use vLabs Lab - 10 Points | 10 | After reading the reading the ElementK iLab Tutorial, answer the related questions. | Section 2Using Windows Applications as Network Tools - 15 Points * Task 1, Step 3 * Related explanation or response * Task 1, Step 7 * Related explanation or response * Task 1, Step 19 * Related explanation or response * Task 1, Step 22 * Related explanation or response * Summary Paragraph | .625.625.625.625.625.625.625.62510 | Required ScreenshotAnswer the question or provide the required observation when requested.In your own words, summarize what you have learned concerning network commands available within the Windows operating system. | Section 3Troubleshooting TCP/IP Problems Lab - 15 Points * Task 1, Step 1 * Related explanation or response * Task 2, Step 2 * Related explanation or response * Task 2, Step 3 * Related explanation or response * Task 3, Step 1 * Related explanation or response * Summary Paragraph | .625.625.625.625.625.625.625.62510 | Required ScreenshotAnswer the question or provide the required observation when requested.In your own words, summarize what you have learned about the Network Monitor. | Total | 40 | | ------------------------------------------------- Name: Date: Professor: ------------------------------------------------- ElementK Tutorial, How to use vLabs Lab (10 points) ------------------------------------------------- ...

Words: 1280 - Pages: 6

Free Essay

Net 204 Ilab3

...Redundancy - 15 Points Task 4: Step 1 Related Explanation or Response Task 4: Step 2 Related Explanation or Response Task 4: Step 3 Related Explanation or Response Task 5: Step 1 Related Explanation or Response Summary Paragraph | 1 1 1 1 1 1 1 1 7 | Paste the requested screenshot Provide the requested answer Paste the requested screenshot Provide the requested answer Paste the requested screenshot Provide the requested answer Paste the requested screenshot Provide the requested answer In your own words, summarize what you have learned about configuring floating routes. | Total | 30 | | Name: Date:Professor: A Simple Network Using RIP Protocol vLab (15 points) Write a paragraph (minimum five college-level sentences) below that summarizes what was accomplished in this lab, what you learned by performing it, how it relates to this week’s TCO’s and other course material; and just as important, how you feel it will benefit you in your academic and professional career....

Words: 1050 - Pages: 5

Premium Essay

Netw202 Week 5 Lab Report

...* Task 1: Step 27 * Related Explanation or Response * Summary Paragraph | 121212128 | Paste the requested screenshot.Provide the requested answer.Paste the requested screenshot.Provide the requested answer.Paste the requested screenshot.Provide the requested answer.Paste the requested screenshot.Provide the requested answer.Answer the question or provide the required observation when requested.In your own words, summarize what you have learned about IP Subnetting and configuration. | Total | 40 | | ------------------------------------------------- Name: Daniel Stevenson Date:8/10/13 Professor: Winston Park ------------------------------------------------- Performing Switch Startup and Initial Configuration vLab (20 points) Write a paragraph (a minimum of five college-level sentences) below that summarizes what was...

Words: 1279 - Pages: 6

Premium Essay

Unit 4 Lab 2

...Security and Web Applications Unit 4 Vlab 2 Assessment 1. Injection, Broken Authentication and Session Management, XSS, Insecure Direct Object References, Security Misconfiguration, Sensitive Data Exposure, Missing Function Level Access Control, Cross-Site Request Forgery, Using Components with Known Vulnerabilities, Unvalidated Redirects and Forwards. 2. A Brute force attack in an attack that uses force instead of vulnerabilities to make its way into a site. Usually trying to crack username and password combinations. The risks of these attacks can be mitigated by strengthening password requirements, introducing lockouts when let’s say 3 attempts are made. That would unmotivated and attacker. 3. A user has established a level of privilege with Amazon. AN attacker uses CSRF to exploit the trust of that user. The attacker is posing as the user and is performing actions to get the latest porn film sent to his house. Boom, free porn. 4. SQL Injection, Brute Force, CSRF. 5. Hackers will use web applications with uploading options to upload files that are malicious. 6. A successful SQL injection exploit can read sensitive data from the database, modify database data execute administration operations on the database (such as shutdown the DBMS), recover the content of a given file present on the DBMS file system and in some cases issue commands to the operating system. (https://www.owasp.org/index.php/SQL_Injection) 7. That user information pertaining to...

Words: 285 - Pages: 2

Free Essay

Netw240 Week 2 Lab Report: Linux Commands and Directories

...Name: | | DSI# | | Date | | NETW240 Week 2 Lab Report: Linux Commands and Directories Step 2: File System Navigation 1: Display a long listing of the root ( ⁄) directory. Enter ls -l ⁄ Verify that the output is from the ⁄etc directory and is a long list. What type of files may you find in this directory? Write your answer below. binbootcgroupdevetchomeliblost+foundmediamntoptprocrootsbinselinuxsrvsystmpusrvar | 2: Display a long listing of the ⁄etc directory. Enter ls -l ⁄etc Verify that the output is from the ⁄etc directory and is a long list. What type of files may you find in this directory? Write your answer below. | 3: Display a long listing of the ⁄bin directory. Enter ls -l ⁄bin. Verify that the output is from the ⁄bin directory and is a long list. What type of files may you find in this directory? Write your answer below. | 4: Display a long listing of the ⁄sbin directory. Enter ls -l ⁄sbin. Verify that the output is from the ⁄sbin directory and is a long list. What type of files may you find in this directory? Write your answer below. | 5: Display a long listing of the ⁄dev directory. Enter ls -l ⁄dev. Verify that the output is from the ⁄dev directory and is a long list. What type of files may you find in this directory? Write your answer below. crw--w---- 1 root tty ...

Words: 1575 - Pages: 7

Premium Essay

Comp 230

...contents from extending across page boundaries. Task 1: Displaying IP Configuration Settings Open the Windows Command Prompt using the desktop or the Taskbar icon. Maximize the size of the CLI. Use the ipconfig /all command to determine the following IP configuration settings for “Wired” Ethernet NIC: IP Address: | 192.168.100.10 | Subnet Mask: | 255.255.255.0 | Default Gateway: | 192.168.100.1 | MAC (Physical) Address | 00-0C-29-10-F6-6B | Copy and paste the specified ipconfig /all command output from the Windows CLI into the Task 1 box provided below. (Note: Answers will vary between students.) Task 1 ipconfig /all Command Output C:\Scripts>ipconfig/allWindows IP Configuration Host Name . . . . . . . . . . . . : vlab-PC1 Primary Dns Suffix . . . . . . . : Node Type . . . . . . . . . . . . : Hybrid IP Routing Enabled. . . . . . . . : No WINS Proxy Enabled. . . . . . . . : NoEthernet adapter Wired: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : vmxnet3 Ethernet Adapter #2 Physical Address. . . . . . . . . : 00-0C-29-10-F6-6B DHCP Enabled. . . . . . . . . . . : No Autoconfiguration Enabled . . . . : Yes Link-local IPv6 Address . . . . . : fe80::59be:448c:8a92:9d84%15(Preferred) IPv4 Address. . . . . . . . . . . : 192.168.100.10(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.0 Default Gateway . . . . . . . . . : 192.168.100.1 DHCPv6 IAID . . . . . . . . . . . : 352324649 DHCPv6 Client DUID...

Words: 967 - Pages: 4

Free Essay

Ilab Week 7

...Response * Task 1: Step 6 * Related Explanation or Response * Task 1: Step 10 * Related Explanation or Response * Task 2: Step 4 * Related Explanation or Response * Summary Paragraph | 2323232320 | Paste the requested screenshot.Provide the requested answer.Paste the requested screenshot.Provide the requested answer.Paste the requested screenshot.Provide the requested answer.Paste the requested screenshot.Provide the requested answer.In your own words, summarize what you have learned about IP subnetting and configuration. | Total | 40 | | ------------------------------------------------- Name: Date: Professor: ------------------------------------------------- Configuring OSPF Single Area vLab (30 points) Write a paragraph (minimum five college-level sentences) below that summarizes what was accomplished in this lab, what you learned by performing it, how it relates to this week’s TCOs and other course material, and (just as important) how you feel it will benefit you in your academic and professional career. (10 points) ------------------------------------------------- Copy and paste the following screenshots from your Configuring OSPF Single Area lab below. Task 1, Step 5: Paste a screenshot showing the route table of the Indianapolis router. (2 points) Question: Based on the information in the route table, what network was learned by OSPF? (3 points) *Hint* Read and study the explanations within the lab for assistance...

Words: 386 - Pages: 2

Premium Essay

Netw 204

...Step 1 * Related Explanation or Response * Task 4: Step 2 * Related Explanation or Response * Task 4: Step 3 * Related Explanation or Response * Task 5: Step 1 * Related Explanation or Response * Summary Paragraph | 1111111 17 | Paste the requested screenshotProvide the requested answerPaste the requested screenshotProvide the requested answerPaste the requested screenshotProvide the requested answerPaste the requested screenshotProvide the requested answerIn your own words, summarize what you have learned about configuring floating routes. | Total | 30 | | Name: Date: Sep 15, 2014 Professor: ------------------------------------------------- A Simple Network Using RIP Protocol vLab (15 points) Write a paragraph (minimum five college-level sentences) below that summarizes what was accomplished in this lab, what you learned by performing it, how it relates to this week’s TCO’s and other course material; and just as important, how you feel it will benefit you in your academic and professional career. (7 points) I learned how to tell which...

Words: 1100 - Pages: 5

Free Essay

Is440

...Assessment Worksheet vLab-1 1. During the Minimal install, NTP (Network Time Protocol) server was not installed. From a security perspective, why is it important for a system to keep accurate time? The Time protocol provided a server's notion of time in a machine readable format, and there is also an ICMP Timestamp message UNIX systems base their notion of time on interrupts generated by the hardware clock. Delays in processing these interrupts because UNIX systems clocks to lose time slowly but erratically. These small changes in timekeeping are what the time scientist call jitter. 2. During the install, you set a password for the root user. What is the root user, and when is it appropriate to use this account? The root user is the administrator of the account. You will use this account only when you are making important changes in the system. 3. The Minimal installation process that was used in the lab did not include an X-Window interface. Why is it best practice not to run X-Window in a production environment? During Linux installation, deselecting X Window packages, especially the base packages, will return errors concerning failed dependencies. You can safely deselect all of these applications, in addition to X itself. 4. What partitioning options are available when installing CentOS? EXT2 & EXT4 5. Why is it important to put the swap file on a separate partition from the root (/) partition? It effects the File system and server if poorly configured ...

Words: 379 - Pages: 2

Premium Essay

Week 1 Lab

...4: Step 2 * Related Explanation or Response * Task 5: Step 1 * Related Explanation or Response * Task 5: Step 1 * Related Explanation or Response * Summary Paragraph | 2323232310 | Paste the requested screenshotProvide the requested answerPaste the requested screenshotProvide the requested answerPaste the requested screenshotProvide the requested answerPaste the requested screenshotProvide the requested answerIn your own words, summarize what you have learned about Configuring Static and Default Routes. | Total | 30 | | ------------------------------------------------- Name: jim smith Date: Professor: ------------------------------------------------- Configuring Static and Default Routes vLab (30 points) Write a paragraph (minimum five college-level sentences) below that summarizes what was accomplished in this lab, what you learned by performing it, how it relates to this week’s TCO’s and other course material; and just as important, how you feel it will benefit you in your academic and professional career. (10 points)This week we learned about the significance of an R or S next to a network entry. In class we learned basic cisco routing commands. We also learned about the different router modes and how to diagnose problems with the router setup. Learning this will help me when I’m out in the field and need to diagnose problems on a network. We went over what to do if you turn on your router and it displays ROMMON. ------------------------------------------------- ...

Words: 502 - Pages: 3

Free Essay

Network 204

...Explanation or Response * Task 4: Step 3 * Related Explanation or Response * Task 6: Step 1 * Related Explanation or Response * Task 6: Step 3 * Related Explanation or Response * Summary Paragraph | 2323232310 | Paste the requested screenshotProvide the requested answerPaste the requested screenshotProvide the requested answerPaste the requested screenshotProvide the requested answerPaste the requested screenshotProvide the requested answerIn your own words, summarize what you have learned about RIP to EIGRP Migration. | Total | 30 | | ------------------------------------------------- Name: Corey Collins Date: Professor: ------------------------------------------------- RIP to EIGRP Migration vLab (30 points) Write a paragraph (minimum five college-level sentences) below that summarizes what was accomplished in this lab, what you learned by performing it, how it relates to this week’s TCO’s and other course material; and just as important, how you feel it will benefit you in your academic and professional career. (10 points) In this Lab I learned how to RIP to EIGRP migration. This lab tought me how to change and set up the router and network for RIP to EIGRP Migration. This lab will help me learn how to setup a network that has to use these protocols. It will help me in my career field if I ever run into this problem or when I have to setup a network that deals with EIGRP Migration. ------------------------------------------------- ...

Words: 457 - Pages: 2

Premium Essay

Information Security

...JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES LABORATORY MANUAL TO ACCOMPANY Security Strategies in Windows Platforms and Applications 1E REVISED 38542_FMxx.indd i 9/5/12 10:48 AM World Headquarters Jones & Bartlett Learning 5 Wall Street Burlington, MA 01803 978-443-5000 info@jblearning.com www.jblearning.com Jones & Bartlett Learning books and products are available through most bookstores and online booksellers. To contact Jones & Bartlett Learning directly, call 800-832-0034, fax 978-443-8000, or visit our website, www.jblearning.com. Substantial discounts on bulk quantities of Jones & Bartlett Learning publications are available to corporations, professional associations, and other qualified organizations. For details and specific discount information, contact the special sales department at Jones & Bartlett Learning via the above contact information or send an email to specialsales@jblearning.com. Copyright © 2013 by Jones & Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. No part of the material protected by this copyright may be reproduced or utilized in any form, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from the copyright owner. The Laboratory Manual to accompany Security Strategies in Windowa Platforms and Applications is an independent publication and has not been authorized, sponsored, or otherwise...

Words: 25969 - Pages: 104