Premium Essay

Lab 1 Questions for Fundamentals of Information Systems Security

In: Computers and Technology

Submitted By Rtorres327
Words 415
Pages 2
Lab 1 Assessment Questions 1. Name at least five applications and tools pre-loaded on the Windows 2003 Server Target VM and identify whether that application starts as a service on the system or must be run manually? Windows Applications Loaded | Starts as Service Y/N | FileZila Server | Y | Nmap | N | WireShark | N | WinPcap | N | Tenable Network Security | N | Tftpd32-SE | N | 2. What was the DHCP allocated source IP host address for the Student VM, DHCP Server, and IP default gateway router? a. Student – 10.96.108.20 b. TargetWindows01 – 10.96.109.30 c. TargetUbunto01 – 10.96.109.36 d. TargetUbuntu02 – 10.96.109.40 3. Did the targeted IP host respond to the ICMP echo-request packet with an ICMP echo-reply packet when you initiated the “ping” command at your DOS prompt? If yes, how many ICMP echo-request packets were sent back to the IP source? e. Yes. f. 4 4. If you ping the “WindowsTarget01” VM server and the “UbuntuTarget01” VM server, which fields in the ICMP echo-request / echo-plies vary? g. The TTL on Windows was 128 while on Ubuntu the TTL was 64. 5. What is the command line syntax for running an “Intense Scan” with ZenMap on a target subnet of 172.30.0.0/24? h. Nmap –T4 –A –V –PE –PS22, 25, 80 –PA21, 23, 80, 3389 10.96.109.30 6. Name at least 5 different scans that may be performed from the ZenMap GUI and document under what circumstances you would choose to run those particular scans. i. Ping Scan j. Quick Scan k. Intense Scan l. Regular Scan m. Intense Scan, No Ping 7. How many different tests did your “Intense Scan” definition perform? List them all after reviewing the scan report. n. 36 o. Nbstat p. Smb-os-discovery q. Smbv2-enabled 8. Describe what each of these tests or scripts performs...

Similar Documents

Premium Essay

It255

...ITT Technical Institute IT255 Introduction to Information Systems Security Onsite Course SYLLABUS Credit hours: 4 Contact/Instructional hours: 50 (30 Theory Hours, 20 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: IT220 Network Standards and Protocols, IT221 Microsoft Network Operating System I, IT250 Linux Operating System Course Description: This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security Capstone Project 400 Level IS404 Access Control, Authentication & KPI IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications IS418 Securing Linux Platforms & Applications IS421 Legal & Security Issues IS423 Securing Windows Platforms &......

Words: 4114 - Pages: 17

Premium Essay

Seeking Help

...Introduction to Information Systems Security [Onsite] Course Description: This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Prerequisite(s) and/or Corequisite(s): Prerequisites: IT220 Network Standards and Protocols, IT221 Microsoft Network Operating System I, IT250 Linux Operating System Credit hours: 4 Contact hours: 50 (30 Theory Hours, 20 Lab Hours) Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security 400 Level Capstone Project IS418 IS404 Access Control, Authentication & KPI IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications Securing Linux Platforms & Applications 300 Level IS305 Managing Risk in Information......

Words: 4296 - Pages: 18

Premium Essay

Essay

...Lab #3 – Assessment Worksheet Enabling Windows Active Directory and User Access Controls Course Name and Number: NT2520 Introduction to Information Security_V2.0 Student Name: Rony Azanon Instructor Name: Brandon Solomon Lab Due Date: august 9, 2015 Overview In this lab, you followed the Microsoft approach to securing the CIA triad. You created new user accounts and security groups, and applied the new user accounts to the security groups, just as you would in a real world domain. You created nested folders on the remote server and assigned unique file permissions using the new user accounts and security groups. You modified the Windows Group Policy enabling each new user account to use remote desktop services to remotely access the TargetWindows01 server. Finally, you tested the security layers you placed in the previous parts of the lab by using each new user account to access and modify the nested folders on the remote server. Lab Assessment Questions & Answers 1. What are the three fundamental elements of an effective security program for information systems? Identification, Authentication and Authorization 2. Of these three fundamental controls, which two are used by the Domain User Admin to create users and assign rights to resources? Security policy is set to read only 3. If you can browse a file on a Windows network share, but are not able to copy it or modify it, what type of access controls and permissions are probably......

Words: 482 - Pages: 2

Premium Essay

Jon Jons

...This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors in the CCNA Exploration: Network Fundamentals course as part of an official Cisco Networking Academy Program. Activity 1.1.1: Using Google Earth™ to View the World Learning Objectives Upon completion of this activity, you will be able to: • • • • • Explain the purpose of Google Earth. Explain the different versions of Google Earth. Explain the hardware and software requirements needed to use Google Earth (free edition). Experiment with Google Earth features such as Help | Tutorial. Experiment with Google Earth to explore continents, countries, and places of interest. Background Google Earth is a popular application that executes on the desktop of most operating systems. It requires a broadband connection to the Internet and displays Earth as a manipulated 2D, or 3D image. The popular world news channel, CNN, regularly uses Google Earth to emphasize where a news story has occurred. At the time of writing this activity, there are three versions of Google Earth. The version that fits most needs is Google's free version, Google Earth. A Google Earth Plus version includes GPS support, a spreadsheet importer, and other support features. The Google Earth Pro version is for professional and commercial use. The URL http://earth.google.com/product_comparison.html contains a description of the versions...

Words: 60675 - Pages: 243

Premium Essay

Nt1230 Syllabus

...5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisite or Corerequisite: NT1210 Introduction to Networking or equivalent Course Description: This course introduces operating principles for the client-server based networking systems. Students will examine processes and procedures involving the installation, configuration, maintanence, troublshooting and routine adminstrative tasks of popular desktop operating system(s) for standalone and network client computers, and related aspects of typical network server functions. Client-Server Networking I Syllabus Where Does This Course Belong? 1st QTR GS1140 NT1110 GS1145 Problem Solving Theory Computer Structure and Logic Strategies for the Technical Professional 2nd QTR NT1210 Introduction to Networking NT1230 Client-Server Networking I MA1210 College Mathematics I 3rd QTR NT1310 NT1330 MA1310 4th QTR PT1420 NT1430 EN1320 5th QTR PT2520 NT2580 EN1420 6th QTR NT2640 NT2670 CO2520 7th QTR NT2799 SP2750 Physical Networking Client-Server Networking II College Mathematics II Introduction to Programming Linux Networking Composition I Database Concepts Introduction to Information Security Composition II IP Networking Email and Web Services Communications Network Systems Administration Capstone Project Group Theory The follow diagram indicates how this course relates to other courses in the NSA program: 1 Date: 8/31/2012 Client-Server Networking......

Words: 1834 - Pages: 8

Premium Essay

Dfhdfh

... |[pic]www.csudh.edu | | |[pic] | |[pic] |College of Natural and Behavioral Sciences | | |Department of Computer Science | | |http://csc.csudh.edu | |Course Title: |Communication Systems Security | |Course Number: |CTC 362 | |Instructor Name: | Mehrdad S. sharbaf, ph.d. msharbaf@csudh.edu, Office: tba, phone: tba, office Hours: tba | |Date: |Spring Semester, 2016 | |Course Length: |_15_ Weeks | |Web Companion |N/A ...

Words: 1433 - Pages: 6

Premium Essay

Le Vlademe Eh

...and Instructor Information ITSY 2300- ‘Operating Systems Security’ Instructor: Danny A. Dominguez Campus and Office Number: Valle Verde Campus - Room A-1109 Office/Voice Mail Number: (915) 831-2833 Office Hours: Monday/Wednesday/Friday 8:00am – 9:00am 11:00am – 12:00pm Monday/Wednesday 3:00pm - 5:00pm By Appointment E-Mail Address: adomi146@epcc.edu II. Text and Materials A. Fundamentals of Information Systems Security 2nd Edition, Kim, David. Students have two options. They can order from the EPCC campus bookstore, or they can order from the publishers shopping portal (www.shopjblearning.com). Below are the bundle breakdowns and options: OPTION 1: Purchase at EPCC Bookstore: Printed Access Code (For Bookstore) Print Bundle: a. Print Text + Virtual Lab Access/eLab Manual ISBN: 978-1-284-07445-1 Bookstore sets student price: eBundle: a. eBook Rental + Virtual Lab Access/eLab Manual ISBN: 978-1-284-07444-4 Bookstore sets student price: OPTION 2: JONES & BARTLETT: E-mailed Access Code (For Student). Students can go to: www.shopjblearning.com, enter the ISBN in the Search field, and then Add to Cart- proceeding through the checkout process. Print Bundle: b. Print Text + Virtual Lab Access/eLab Manual ISBN: 978-1-284-07440-6 Approx. cost to the student: $170 eBundle: b. eBook Rental + Virtual Lab Access/eLab Manual ISBN:......

Words: 1345 - Pages: 6

Premium Essay

Test

...Technical Institute IS3340 Windows Security Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 60 (30 Theory Hours, 30 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisite: NT2580 Introduction to Information Security or equivalent Course Description: This course examines security implementations for a variety of Windows platforms and applications. Areas of study include analysis of the security architecture of Windows systems. Students will identify and examine security risks and apply tools and methods to address security issues in the Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program:    IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA    NT2580 NT2670  Introduction to  Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to  Security Auditing for Compliance Countermeasures Information Security Email and Web Services      NT1230 NT1330 Client-Server Client-Server  Networking I Networking II  IS3230 IS3350 NT1230 NT1330  Issues Client-Server Client-Server  SecurityContext in Legal Access Security Networking I Networking II   NT1110......

Words: 2305 - Pages: 10

Premium Essay

Windows Servers

...Topics |Securing Windows 7 |Installing Windows Server 2008 | |Password and Account Lockout Policies |What Defines a Server | |Windows Firewall Configuration |Server Hardware | |Encrypting File System (EFS) |Windows Server 2008 Editions | |Remote Access Technologies |Server Roles in Windows Server 2008 | |Backup and Restore |Method of Installing Windows Server 2008 | |System Restore Points |Server Configuration | | |IP Address Settings | | |Management of Devices and Device Drivers | | |Microsoft Management Console (MMC) ...

Words: 2079 - Pages: 9

Free Essay

Midterm Studyguidelines

...Exam Study Guide YOU MAY WANT TO PRINT THIS GUIDE. 1. The Final Exam is "open book, open notes." The maximum time you can spend in the exam is three hours, 30 minutes. If you have not clicked the Submit For Grade button by then, you will be automatically exited from the exam. In the Final Exam environment, the Windows clipboard is disabled, so you will not be able to copy exam questions or answers to or from other applications. 2. You should click the Save Answers button in the exam frequently. This helps prevent connection timeouts that might occur with certain Internet Service Providers, and also minimizes lost answers in the event of connection problems. If your Internet connection does break, when you reconnect, you will normally be able to get back into your Final Exam without any trouble. Remember, though, that the exam timer continues to run while students are disconnected, so students should try to re-login as quickly as possible. The Help Desk cannot grant any student additional time on the exam. 3. See Syllabus "Due Dates for Assignments & Exams" for due date information. 4. Reminders * You will only be able to enter your online Final Exam one time. * Click the Save Answers button often. * If you lose your Internet connection during your Final Exam, logon again and try to access your Final Exam. If you are unable to enter the Final Exam, first contact the Help Desk and then your instructor. * You will always be able to see the time......

Words: 1911 - Pages: 8

Premium Essay

Trying to Join Site

...IT1115 Introduction to Information Technology Syllabus Credit hours: 6.0 Contact/Instructional hours: 70 (50 Theory, 20 Lab) IT1115 Introduction to Information Technology Syllabus COURSE SUMMARY COURSE DESCRIPTION This course explores foundational topics related to information technology. Topics examined include computing devices, hardware, software, operating systems, computer networks, security, and computer programming. Logical problem solving, troubleshooting, and maintenance of computer systems are also introduced. MAJOR INSTRUCTIONAL AREAS 1. Computer History and Fundamentals 2. Hardware 3. Operating Systems 4. Basic Networking 5. Basic Security 6. Software 7. Basic Programming 8. Web Technologies 9. Troubleshooting COURSE LEARNING OBJECTIVES By the end of this course, you should be able to: 1. Identify the evolution of computers and different types of computers. 2. Convert numbers between binary, decimal, and hexadecimal number systems. 3. Explain the purpose, functions, and characteristics of a CPU. 4. Describe the physical components of a computer and various input and output devices, including storage and memory. 5. Describe the function of BIOS and the booting process of a computer. 6. Describe basic operating system architecture, its components, and storage management. © ITT Educational Services, Inc. All Rights Reserved. [2] 6/15/15 IT1115 Introduction to Information Technology Syllabus 7. Describe basic types of computer network topologies and......

Words: 12527 - Pages: 51

Premium Essay

Enable Windows Active Directory and User Access Controls

...50 LAB #3 | Enable Windows Active Directory and User Access Controls LAB #3 – ASSESSMENT WORKSHEET Enable Windows Active Directory and User Access Controls Course Name and Number: Student Name: Instructor Name: Lab Due Date: Overview This lab provided students with the hands-on skills needed to create a new Active Directory domain in Windows Server 2003 and demonstrated how to configure a centralized authentication and policy definition for access controls. The Active Directory users and workstation plug-ins were used to create users, groups, and configure role-based access permissions and controls on objects and folders in a Windows Server 2003 Active Directory system. Lab Assessment Questions & Answers 1. What are the three fundamental elements of an effective access control solution for information systems? Identification, Authentication, and Authorization. 2. What two access controls can be set up for Windows Server 2003 folders and authentication? Authentication and Access control. 3. If you can browse a file on a Windows network share, but are not able to copy it or modify it, what type of access controls and permissions are probably configured? What type of access control would best describe this access control situation? Assessment Worksheet 4. What is the mechanism on a Windows server where you can administer granular policies and 51 permissions on a Windows network using role-based access? 5. What is two-factor......

Words: 478 - Pages: 2

Premium Essay

Papers

...Description • Introduces the basic and fundamental concepts on databases and the management of databases in terms of the different applications. • Exposes the use of DBMS to create and maintain applications. – – – – table construction Forms queries and report generations Course Objectives • Trace the growth and importance of database application; • Identify the advantages and disadvantages of database systems; • Apply appropriate techniques and methodologies in building and maintaining database systems; and • Create database application for business processes. Value Aims • Values – Teamwork – Self-Esteem – Accuracy – Confidence – Patience • Skills – Analytical and Logical 1 11/11/2014 Course Requirements • • • • • • Lecture sessions Hands-on Activities Quizzes Assignments Periodic Examinations Individual projects COURSE ADMINISTRATION Grading Scheme (Prelim, Midterm and Endterm) • CLASS STANDING 40% – Assignments – Quizzes – Lab Activities Grading Scheme Percentile Distribution • Prelim 30% • Midterm 30% • Finals 40% • EXAMINATIONS • PROJECT 40% 20% PRELIM LECTURE • Basic Concepts and Definitions • Traditional File Processing System vs Database System • Components of the Database Environment • DB Development Process • Entity-Relationship Model • Relational Model 2 11/11/2014 PRELIM LAB • Differentiate the functions of spreadsheet and database • Perform importing data from a spreadsheet file to database management system application • Explain the different......

Words: 2854 - Pages: 12

Premium Essay

Movie Theater

...of Science and TechnologyDepartment of Information Technology ISSC641: Telecommunications and Network Security 3 Credit Hours8 Week CoursePrerequisite(s): None | Table of Contents | Instructor Information | Evaluation Procedures | Course Description | Grading Scale | Course Objectives | Course Outline | Course Delivery Method | Policies | Course Materials | Academic Services | Selected Bibliography | Instructor Information | Instructor: Dr. Elliott S. Lynn (Bio) Email: Elliott.lynn@mycampus.apus.edu Phone: 732.300.5569 Office Hours: By Appointment Only TOC Course Description (Catalog) | Telecommunications networks are a critical component of the global economic and social infrastructures. Securing critical infrastructure is an established priority within Information Security Management. This course examines the field of secure telecommunications networks, including emerging threats, system vulnerability, network evolution, and network defense mechanisms. [3 Semester Hours] TOC Course Objectives | A successful student will fulfill the following learning objectives: * Examine the principles of network security and cellular architecture. * Evaluate emerging threats and system vulnerability. * Assess......

Words: 2817 - Pages: 12

Premium Essay

It240

...|[pic] |Syllabus | | |College of Information Systems & Technology | | |IT/240 Version 4 | | |Intro to LAN Technologies | Copyright © 2012, 2009, 2007 by University of Phoenix. All rights reserved. Course Description This foundational course covers local area network topics including rationale for networking, the open systems interconnection (OSI) model, common network topologies and architecture, client/server concepts, basic hardware devices and usage, and basic networking security concepts. Policies Faculty and students will be held responsible for understanding and adhering to all policies contained within the following two documents: • University policies: You must be logged into the student website to view this document. • Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which......

Words: 2355 - Pages: 10