Premium Essay

It320

In:

Submitted By mailtalon2
Words 300
Pages 2
1. What risk exposure are you subjecting your Microsoft Windows systems to by opening up ports on your internal firewall? Buy opening ports in your firewall it is allowing people access to you network and if anybody that trys to get in figures out the port they can potentially gain access to your system.

2. Using the VM’s on your student workstation, how can you test if your Windows internal firewall is configured properly? By going to start -> control Panel -> Select firewall there it gives you the options that are on Windows Firewall.

3. Name at least three significant risks of logging in to access points in airports, hotels and other public places. Explain. E-commerce involves the passing of sensitive information, like credit card numbers or bank account numbers, over the Internet, and the risk of losing the privacy of this information is high in public places. Theft of unencrypted wireless data can easily occur in public areas because WiFi hotspots do not provide encryption, such as WEP, WPA, or WPA2, in order to simplify the connection process and minimize the management workload. Evil twin hotspot: These are hot spots set up by a hacker and made available to the public. Unknowing users who connect to the Internet using these access points are then exposing their sensitive information to the hacker. To avoid being tricked by this set up, check to see if the login to a WiFi hotspot is SSL encrypted, and look for a valid security certificate.

4. Name at least three WLAN network devices commonly found in enterprise WLAN systems. NIC, Access Point, Wireless NIC

5. Name at least 5 methods of wireless communications that need to be secured and accounted for in a typical enterprise environment?

Video conferencing, Email, Messaging, Phone calls and

Similar Documents

Free Essay

It320 Quiz

...IT320 Cisco quiz 1. What are the three way to logon to a router? Answer: Telnet, Console and Modem The commands are as follows: Vty, Con0 and Auxiliary 2. Telco uses a CSU/DSU to connect to a leased line 3. A limited version of Cisco IOS is stored in ROM. 4. What command can you use to backup and restore the IOS from a server to flash, as well as the content of Ram to a Server and content of NVRAM to Server? Answer: Copy TFTP flash 5. What does the following acronyms stand for: Answer: RAM: Random Access Memory NVRAM: store the backup/startup configuration for the router Nonvolatile Random Access Memory IOS: Internetwork Operating System TFTP: Trivial File Transport Protocol 6. What are the four parts of the phone receiver? Voice Coil, Magnet, Diaphragm, Signal Cone 7. What is the frequency range that humans can hear? Answer: 20 Hz 8. What is it meant by Administrative Distance? Answer: Administrative distance is the feature that routers use in order to select the best path when there are two or more different routes to the same destination from two different routing protocols. 9. The modified final judgement of 1982 determined that every area in the US resides within a specific Local Access And Transport Area (LATA) 10. What layer of the OSI model is responsible for data formatting and encryption? Answer: Presentation Layer 11. What layer of the OSI model is responsible for the assembly and the disassembly of...

Words: 479 - Pages: 2

Free Essay

It320 Study Guide

...IT320 Final Exam Study Guide Ciscopress Textbook: (3) What do routers do? (19, 20) Crossover cable (14, 17) NVRAM (17) Location of router’s “running configuration” (14, 15, 17) Cisco IOS image stored where? (14, Table 1-3) Main use of Router internal hardware components: ROM (49) Show flash command (55) After a router completes POST, it loads what? (123) Command output description for: show cdp entry [device name] (154) Purpose of setting the router configuration register to 0x2102 (65) Command required to establish an entry password into the user mode (66) enable secret command (74) show version command (71) Function of Ctrl-P (125) show cdp interface command (129-130) Packet is finalized and framed at which layer? (54) Order of the router boot process (141) Exclamation points in a reply to a ping request (141) Important information you must pay attention to after issuing a ping command (141) Use of the ping command (142) port number (150) Class C IP address structure (11) The clock rate of an interface is applied to which router connector end (55) What loads after a router completes the POST? (49) show flash command (43) Symbol for the router privileged mode (153) Limited version of the Cisco IOS software is stored where? (154) Command to discover the configuration register setting (153) Has limited version of the Cisco IOS software (154-155) Information displayed by the show...

Words: 302 - Pages: 2

Free Essay

It320 Week 2

...Darius Humphrey IT320 Homework 2 Page 24 1. Attach a rollover cable to the PC’s COM port and then to either the Console or AUX port on the router. The console port is preferred because messages from the router are logged on this line. The AUX port is used for remote access and can also be used if the console port is damaged. You can also access the CLI through Telnet, but the Telnet client must have access to the router. 2. User EXEC mode allows on a limited number of basic monitoring commands and is often referred to as view-only mode. The user EXEC lever does not allow commands that might change the configuration of the router. It is identified by the > prompt. The privileged EXEC mode provides access to all router commands and this mode can be configured to require a password. It can also be configured to require a user ID. Configuration and management commands require the network administrator to beat the privileged EXEC level. The privileged EXEC mode is identified by the # prompt. 3. The platform on which the image runs The special features supported in the image Where the image runs and whether it has been zipped or compressed 4. ROMMON is not IOS; therefore it does not accept the IOS commands. It cannot route IP packets. The ROM_MON software is stored in a Rom chip instead of flash, so it should always be available even if some other network engineer made a mistake and erased all the contents of flash memory. Password recovery...

Words: 470 - Pages: 2

Free Essay

It320 Assignment 2

...Vocab Match Pg. 22 1. O IOS 2. L command-line interface (CLI) 3. I user EXEC mode 4. R privileged EXEC mode 5. S global configuration mode 6. A interface configuration mode 7. N routing protocol configuration mode 8. Q IOS image 9. B feature set 10. C ROM monitor /ROMMON 11. T boot ROM 12. D power-on self test (POST) 13. G bootstrap 14. J configuration register 15. U boot field 16. H boot system command 17. M setup mode 18. F host name 19. P console password 20. E enable password 21. K command recall Concept Questions Pg. 24 1. Attach a rollover cable to the PC’s COM port and then use either the Console port or the Auxiliary port on the router. The Console port is preferred because messages from the router are logged on this line. The second way is to use the Auxiliary port for remote access and can also be used if the Console port is damaged or not responding. The third way to access the CLI is through Telnet. 2. The user EXEC can only use a certain amount of commands and the user EXEC can’t configure anything on the router. The privileged EXEC can use every command and can configure the router anyway that person wants. 3. First it’s the platform in which the image runs on, second is the special features that are supported in the image, and last is where the image runs or whether it’s become a zipped or compressed file. 4. ROMMON is not IOS, so it doesn’t accept IOS commands...

Words: 354 - Pages: 2

Premium Essay

Course Descriptions

...GE117 Composition I | A 4 credit hour Composition course This course covers phases of the writing process, with special emphasis on the structure of writing and techniques for writing clearly, precisely and persuasively. Prerequisite or Corequisite: TB133 Strategies for the Technical Professional or equivalent GE127 College Mathematics I | A 4 credit hour Mathematics course This course will include, but is not limited to, the following concepts: quadratic, polynomial and radical equations, linear functions and their graphs, systems of linear equations, functions and their properties and triangles and trigonometric functions. Activities will include solving problems and using appropriate technological tools. Prerequisite: GE184 Problem Solving or TB184 Problem Solving or GE150 Survey of the Sciences or equivalent; Prerequisite or Corequisite: TB133 Strategies for the Technical Professional or equivalent GE184 Problem Solving | A 4 credit hour Science course This course introduces students to problem solving techniques and helps them apply the tools of critical reading, analytical thinking and mathematics to help solve problems in practical applications. GE192 College Mathematics II | A 4 credit hour Mathematics course This course will include, but is not limited to, the following concepts: exponential and logarithmic equations and functions, graphs of trigonometric functions, trigonometric equations, polar coordinates, oblique triangles, vectors and sequences. Prerequisite:...

Words: 1186 - Pages: 5

Premium Essay

Itt-Tech Answers

...Don Delara/IT320 IT320 Wan Technology/ Unit 4 Assignment: 4.1 1. At what layer of the OSI model does CDP operate? Data Link layer 2. What is the primary use for CDP? To discover information about directly connected Cisco devices 3. What network layer protocols can CDP provide information for? IP, Internetwork Packet Exchange (IPX), and AppleTalk 4. When CDP is enabled on an interface, a router (or switch) sends CDP advertisements on a regular basis, which list information about the sending router. Included in the packets are a series of Type/Length/Value, or TLV, data structures. 5. The show cdp neighbors command can be used to display one line of information about each directly connected CDP-enabled device. List the six pieces of information displayed. Device ID, local interface, holdtime, capability, platform, and port ID 6. In the topology of all Cisco devices shown in Figure 4-1, you are on Host A and consoled in to RTA. What devices can you see in the output from CDP commands? SWA, RTB, and RTC—only the directly connected devices that are attached to RTA 7. How would you gather information about other CDP-enabled devices in the network? By Telneting to those devices and using the show cdp neighbors command 8. From RTB in Figure 4-1, what devices can you see in the output from CDP commands? RTA and RTD 9. From RTC in Figure 4-1, what devices can you see in the output from CDP commands? RTA and RTD 10. From RTD in Figure 4-1, what devices...

Words: 1186 - Pages: 5

Premium Essay

Saved

...IT320 Unit 5 HW 1. When a router is first powered on, it completes a four-step initialization process: 1. Preforming a power-on self test (POST) 2. Loading a bootstrap program 3. Loading an IOS 4. Loading a configuration file The last three of these steps require the router to copy the files into RAM. Normally, most routers load an IOS image that is stored in flash memory and an initial configuration stored in NVRAM. 2. Routers use the following logic, in order, to attempt to load an IOS: 1. Load a limited-function IOS if the configuration register’s last hex digit is set to 0 or 1. 2. Load an IOS based on the configuration of boot system commands in the startup-configuration file. 3. Load the first file in flash as the IOS. 4. Use TFTP broadcasts to find a TFTP server and download an IOS from that server. 5. Load a limited-function IOS from ROM. In Step 1, the configuration register is a16-bit number that Cisco routers store in a hidden area of NVRAM. It can be set in a couple of ways and can be seen using the show version command. The most commonly used way to set its value is to use the config-register global configuration command. Routers use the 4 low-order bits of the configuration register as the boot field, which tells the router what to do in the first of the preceding five decision steps. If the value of the field is set to 0, the router loads the ROMMON (ROM Monitor), which is used for password recovery. If the value is set to1, the router loads...

Words: 448 - Pages: 2

Premium Essay

Wan Technology

...IT320 Ch. 2 Review Questions Pg. 76 (1-6) 1. A telephone's transmitter converts sound waves into electrical waves. The receiver converts electrical waves into sound waves. The standard telephone is a transducer that converts sound waves to electrical waves. 2. Modern phones use a miniature loudspeaker. At the center of a paper or plastic diaphragm is a coil of wire. This coil is suspended by the diaphragm or cone, into a circular slot formed by a permanent magnet. The current containing the audio is passed through the coil, which is then repelled and attracted by the magnet, causing the diaphragm to move and moving air as it does so. Early receivers used a thin steel plate as a diaphragm. The coil was wrapped around a laminated core and placed very close behind the plate. As the current passed through the coil it attracted the diaphragm, causing air to move and sound produced. 3. Transmitter – Source that produces a signal, such as a telephone transmitter or an optical laser., Receiver – Device that receives the signal., Dial Pad – A touchtone pad that has 12 buttons, each of which generates a specific tone when pressed. It’s used to dial the called party digits and send them to the serving central office., Switch Hook – Part of the telephone that is used to open the circuit when the handset is returned to the cradle or to close the circuit when the handset is picked up off the cradle., and Ringer – Notifies the called party that a call is coming in and should...

Words: 454 - Pages: 2

Premium Essay

It255

...Security Capstone Project 400 Level IS404 Access Control, Authentication & KPI IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications IS418 Securing Linux Platforms & Applications IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications 300 Level IS305 Managing Risk in Information Systems IS308 Security Strategies for Web Applications & Social Networking IS316 Fundamentals of Network Security Firewalls & VPNs IS317 Hacker Techniques Tools & Incident Handling EC311 Introduction to Project Management IT250 Linux operating System CNS Program Prerequisites: ment 300 Level IT320 WAN Technology &...

Words: 4114 - Pages: 17

Premium Essay

Seeking Help

...IT255 Introduction to Information Systems Security [Onsite] Course Description: This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Prerequisite(s) and/or Corequisite(s): Prerequisites: IT220 Network Standards and Protocols, IT221 Microsoft Network Operating System I, IT250 Linux Operating System Credit hours: 4 Contact hours: 50 (30 Theory Hours, 20 Lab Hours) Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security 400 Level Capstone Project IS418 IS404 Access Control, Authentication & KPI IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications Securing Linux Platforms & Applications 300 Level IS305 Managing Risk in Information Systems ...

Words: 4296 - Pages: 18