Premium Essay

Lab #10

In: Computers and Technology

Submitted By bear0804
Words 708
Pages 3
Lab #10 Assessment Questions & Answers

Network/Security Assessment Questionnaire
Network Assessment – Required Information

1. Do you have detailed logical network drawings? If so, please attach.

2. What Directory service, if any, is in use?

3. How many network elements do you have? List each, including make and model or attach list.

4. Have you configured multiple networks on this infrastructure? no 5. What internal (RFC1918 or otherwise not-Internet-routable) IP address ranges do you use?

6. What external (Internet routable) address ranges do you use?

7. What protocols are in use on your network?

8. What is the role of each network? (Attach list if multiple networks.)

9. How many hosts do you have on the network?

10. What operating systems are used among your servers and workstations?

11. What applications rely on your network(s)?

12. How many Internet-exposed servers are on your network?

13. What applications do you use to manage your network(s)?

14. What geographic locations connect to your network(s)?

15. What are your future growth plans for your network(s)?

Security Assessment – Required Information

1. Do you have firewalls, ACLs, or other types of traffic filters in place within your network? If yes, please describe.

2. What is the general firewall policy: Default permit, default deny inbound, default permit outbound?

3. Do you have any other filtering technologies implemented at the network or host level, such as data leakage prevention, spam filtering, and Web application firewall or other? If so, please describe.

4. Do you use wireless networking? If so, what types? What wireless security measures are in place?

5. Do you use any of the following technologies, and if so, what model:

b. Antivirus:
c. Anti-spyware or anti-spam:
d. Desktop encryption:
e. Other:...

Similar Documents

Free Essay

Pt1420 Lab 10

...Lab 10: File Access This lab accompanies Chapter 10 of Starting Out with Programming Logic & Design. Lab 10.1 – File Access and Visual Basic This lab examines how to work with a file by writing Visual Basic code. Read the following programming problem prior to completing the lab. Write and design a simple program that will take 3 pieces of data and write it to a file. Create variables and set them equal to the appropriate values: Declare string firstName = “xxx” Declare string lastName = “xxx” Declare integer age = your age Write this information to a file called myRecords.txt. Next, read this information from the file and print it to the screen. Step 1: Create a new Visual Basic workspace and add the following code: Module Module1 Sub Main() Dim firstName As String = "XXXX" Dim lastName As String = "XXX" Dim age As Integer = #### Dim writer As System.IO.StreamWriter = System.IO.File.CreateText("myRecords.txt") writer.WriteLine(firstName & " " & lastName & " " & age) writer.Close() Dim reader As System.IO.StreamReader = System.IO.File.OpenText("myRecords.txt") Dim myInfo As String = reader.ReadLine() Console.WriteLine(myInfo) reader.Close() 'this causes a pause so you can see your program Console.Write("Press enter to continue...") Console.ReadLine() End Sub End Module Step 2: Change......

Words: 347 - Pages: 2

Premium Essay

Lab Report 10

...Group Members:Edna Rodriguez, Bryce Bash, Alex Chick, Kang Park, Rose Date: 4/3/14 LI Jonathan Turner Unique 49190 Day: Thursday Room: 1.24 Lab Start Time 1:30pm Exercise 10 Lab Report Adhere to UT’s Honor Code and course policies. Answer group questions individually first before compiling them into one consensus group response. Individual questions are to be answered independently. Balance between brevity and completeness. Show your work for all calculations and be sure to include proper units where necessary. Any secondary resources need to be cited. One printed report is to be submitted at the START of your next laboratory period as well as a digital pdf version uploaded to Canvas. GROUP QUESTIONS 1. List the functions of the following external structures: (3 pts.) (a.) Chelapeds: large walking appendages of a crayfish; appendages allow the crayfish to grasp and tear food, and also defend itself (b.) Walking legs: the 4 pairs of appendages used to locomote in the crayfish, they are equipped with gills which allows for gas exchange (taking in oxygen, releasing carbon dioxide) (c:.) Maxillapeds: an appendage modified for feeding: holding food, touching and tasting (d.) Cephalothorax: the first segment of a crayfish, consisting of a head fused to the thorax (e.) Genital pore: location of where sperm or eggs are released (f.) Nephridiopore: Part of the excretory system for removing nitrogenous waste. (g.) Abdomen: the multi-segmented posterior region of the crayfish......

Words: 2434 - Pages: 10

Premium Essay

Lab 10 Networking

...Lab 10 Networking 1. Describe the following network Models. A. Peer-to-Peer: Two or more PCs are connected and share resources without being on separate servers. i. Client/Server: What is a client? A computer, program or process that makes requests for information from another computer. ii. What is a Server? The computer on which a program runs which then gives certain kinds of service to clients. 2. What is a computer modem and what does it do? The device is short for modulator-demodulator a modem or program that enables a computer to transmit data over for example telephone or cable lines. Computer information is stored digitally whereas information transmitted over telephone lines is transmitted in the form of analog waves 3. What is networking protocol? A network protocol defines rules and conventions for communication between network devices. A common example TCP/IP internet protocols Transmission control protocol TCP which uses set of rules to exchange messages with other internet points at the information packet level. Internet protocol IP which uses a set of rules to send and receive messages at the internet address level. 4. From the PC you are using 1. Click on Start then Run. 2. Type CMD in the run box. 3. You should now see the command prompt window. 4. Type IPCONFIG /all   in this window then press enter. 5. Record the information for the following. 1. Physical Address:......

Words: 576 - Pages: 3

Free Essay


...Virtual Lab Demonstrating the Scientific Method SCIE207-1302B-06 Biology Lab American Intercontinental University Purpose: To determine how added nitrogen affects the growth in arable and non-arable soils. Introduction: Nitrogen is known by others to be the main component that is most likely to limit growth in several ordinary terrestrial and marine ecosystems (Vitousek & Howarth, 1991). Arable soil is the perfect kind of soil used in agriculture that allows a variety of crops to grow (M.U.S.E., 2010). Hypothesis: It is determined that plants only grow on arable land when receiving an adequate amount of nitrogen fertilizer. Methods: To get my lab results I started with the introduction video titled Using the Scientific Method. At the end of the video a table appeared which represented the amount of mineral nitrogen fertilization. To gather data for the Arable soil, and the Nonarable Sandy Loam soil this following process was taken, in step 1 I clicked on the amount of mineral nitrogen which started with 0, and then I clicked the Arable Soil button which gave me the amount of yield of maize. I clicked the Nonarable Sandy Loam Soil button to get the amount of yield of maize. I repeated this step 1 process from the chart that is measure in multiplies of 20, up to 180. After gathering this information I filled in the lab report with the number of yield of maize for each amount of mineral nitrogen for the Arable and Nonarable......

Words: 512 - Pages: 3

Premium Essay

Liquor Industry

...RESEARCH PAPER A Comparative Study of BTL in Building up the Brand In Indian Spirit Market In Case Of Royal Challenge against Royal Stag Whisky Praveer Gupta The main objective of the working paper is to understand the performance of Royal Challenge Whisky since its inception and to measure the potential of Royal Challenge brand as a premium segment whisky. This also explains the role of BTL strategies carried out so far and a few consumer insights about the market so as to forecast its position. Page | 1 RESEARCH PAPER Abstract Royal Challenge Whisky brand was launched in 1886 by Shaw Wallace & company. The brand had a healthy growth of about 10 percent till 2005 when the company was bought by the country’s largest spirit maker United Spirits Limited. RC had sales above one million cases in the year 2003-04 with a market share of 56 percent in the premium segment whisky which had grown to 65 percent at the end of December 2003 in competition with UB Spirits Division’s Signature Whisky and Seagram’s Blenders Pride. Over the year, UB kept working on the brand to bring up the same position by various marketing activities like linking the brand with IPL cricket Team (Royal Challengers Bangalore) and an associate sponsor of India's first Formula 1 team Force India etc. In 2014, Diageo bought majority stake in USL and came up with pricing strategy to decrease the prices in order to retain the market share, while other companies such as Pernod......

Words: 4677 - Pages: 19

Premium Essay

Research Paper Lab 10

...Morgan Johnson (19407679) NS 1110  Friday Research Paper Lab 10 Morgan Johnson (19407679) NS 1110  Friday Research Paper Lab 10 The topic I chose for my research project is setting up a business on the Darknet. I think it would be more accurate to say that the topic chose me. I was originally browsing the internet on the various subjects presented to us in the assignment handout and had started reading a little about ecommerce when this topic jumped out at me. As I started looking into the other topics on the sheet, I couldn’t get the information about the Darknet world out of my mind. I think I have a bit of a fascination with the outer edges of society and that includes cyber-society. The secretive world of the Darknet is interesting in itself but setting up an ebusiness that may or may not provide illegal goods and services requires such an intricate system of safeguards that, for someone new to the tech world like myself, it is like opening the door to a bizarre and complicated dimension. Even after spending some time researching the subject, it would take hours more and I still would have barely explored the world of the cyber underbelly. The first thing a person needs to do when setting up a potentially questionable business, is to research various countries legal relationship with the country you’re based in. For the sake of this paper, we will assume we live in the U.S. Find out which have or don’t have Mutual Legal Assistance Treaties. When you......

Words: 809 - Pages: 4

Free Essay

Social Studies Teacher

...Homework – Grade 7 Week of 10/21 – 10/25 Monday, 10/21 Tuesday, 10/22 Wednesday, 10/23 Thursday, 10/24 Wksh: Power to a Power (p 2) Wksh: Division with Exponents (p 3) Wksh: Mixed Review (p 4) Study for test. Complete review sheet. Friday, 10/25 Test in class. Print out next week’s hw assignments. Have a great weekend.   Topics covered for the week Power to a power Division with exponents Textbook Additional help can be found in Chapter 1: pp 10 – 13 Chapter 4: pp 194 – 203 Chapter 9: pp 453 – 457 and p 822 Chapter 12: pp 674 – 678       Test Topics Intro to exponents/meaning of exponents Exponents with a zero power Negative exponents Exponents with similar bases Power to a power Division with exponents 1 Name _________________________ Date __________________________ Math Period ______ Power to a Power Expand each of the following expressions. 1) (2rm3)2 2) (– 4a2) – 3 3) (– 3m2p3)2 ____________________________________________________________________________________ Simplify. Write all exponents as positive if necessary. 4) (5x2)3 5) (xy3) – 5 (x2)4 • (– 3x6)4 6) ____________________________________________________________________________________ 7) (6x2y3)3 8) (– 2mn5)5 9) (4x2)2 • (3y)2 Mixed Review. Simplify. (All answers must have positive exponents) 10) – (m4)3 11) – 3x0 12) – (xy)0 ____________________________________________________________________________________ 13) xy0 14) (– m4)3 15) ( ) –3 _______...

Words: 451 - Pages: 2

Free Essay


...E8-3 P8-4 E9-1 P-912 E8-3 1. Do not include. The item was not sent until Jan 4th, since it is a custom item it is not the customers until it ships. 2. No. The cost was not received until Jan 3. 3. Yes. The item was ordered before Dec 31st, and it was a part of your inventory on hand. 4. No. It should not be included in inventory because since it is on consignment it does not belong to the sender. 5. Yes. The item was received on Dec 28th and you already paid for it P8-4 A. 1700-1400 = 300 1. 100*5.00 = 500 200 *5.10 = 1020 500+1020 = 1520 2. 200*5.80 = 1160 100*5.60 = 560 1160+560 = 1720 3.Total costs 9160/total inventory 1700 = 5.39 300*5.39 = 1617 E9-1 Part Quantity Cost Market Total Cost Total Market Lower of Cost or Market 110 600 95 100 57000 60000 57000 111 1000 60 52 60000 52000 52000 112 500 80 76 40000 38000 38000 113 200 170 180 34000 36000 34000 120 400 205 208 82000 83200 82000 121 1600 16 14 25600 22400 22400 122 300 240 235 72000 70500 70500 370600 362100 355900 a. 355900 b. 362100 P9-12 a. The retail method would be applied if a company has a high volume of items sold at a low prices. Some advantages of using the retail method would be that you do not need to do a physical inventory assessment of each of your items. You can accurately gague how much inventory you have on hand by using a calculation of how much you have sold thus far and subtracting from your beginning...

Words: 294 - Pages: 2

Free Essay

Wireshark Lab 10 - Udp

...Wireshark Lab 10: UDP Submitted in Partial Fulfillment of the Requirements for CIS240 Networking Concepts Spring 2013 1. Select one UDP packet from your trace. From this packet, determine how many fields there are in the UDP header. (You shouldn’t look in the textbook! Answer these questions directly from what you observe in the packet trace.) Name these fields. There are 4 fields in the UDP datagram 1) Source Port 2) Destination Port 3) UDP Datagram length 4) Checksum field 2. By consulting the displayed information in Wireshark’s packet content field for this packet, determine the length (in bytes) of each of the UDP header fields. UDP Header Length = Source Port (2 bytes) + Destination Port (2 bytes) + Length Field (2 bytes) + Checksum field (2 bytes) = 8 bytes 3. The value in the Length field is the length of what? (You can consult the text for this answer). Verify your claim with your captured UDP packet. The length field = 59 bytes – this is the sum of the UDP header (8 bytes) + UDP payload (in this case SMNP data 51 bytes) 4. What is the maximum number of bytes that can be included in a UDP payload? (Hint: the answer to this question can be determined by your answer to 2. above) The length of the length field is 2 bytes or 216 – 1 less the header bytes = 65535 – 8 = 65527 bytes. This is in theory. In practice, due to avoiding fragmentation in Network layer, this is restricted to the MTU defined in data link......

Words: 478 - Pages: 2

Premium Essay


...341WI 4 Credit Hrs | Instruction Mode: L (lab) and P (class) Professor Andrew Holder • SCB 113 • 816-235-2293 • 913-543-3709 (fax) Office Hours: T/Th 1:00-4:00, 5:00 – 7:30 Lecture: T/Th 4PM | Labs: T/Th 1PM (AFT), 5PM (EVE) Credit: Lab + Lecture = 4 credits | Format: Lab + Lecture (P) Lecture / Class Policies and Procedures Correspondence with UMKC Student Learning Outcomes Scientific Reasoning & Quantitative Analysis * Apply principles/methods of sciencea, mathb, statisticsc and logicd to solve problems and draw logical inferences. * Chpt 3: Experimental Error (c) * Chpt 4: Statistics (c) * Chpt 6: Chemical Equilibrium (a, b, d, e, f) * Chpt 7: Activity & Systematic Trtmnt, (a, d, e, h) * Chpt 8: Monoprotic Acid-Base Equil., * Chpt 9: Polyprotic Acid-Base Equil. (a, d, e, g, h) * Develop quantitative literacy enabling comprehensione and evaluationf of info in broad contexts. * Chpt 3: Experimental Error, Chpt 4: Statistics (f) * Chpt 5: Quality Assurance and Calibration Methods (c) * Understand methodsg/principlesh of scientific discovery and their application * Sxn 0-2: The Analytical Chemist’s Job (g, h) * Sxn 0-3: General Stages in a Chemical Analysis (g, h) * Chpt 2: Tools of the Trade (g) * Carrying out laboratory analyses (g, h) * Chpt 10: Acid-base Titrations, Chpt 11: EDTA......

Words: 4091 - Pages: 17

Free Essay

Infant Milk Information

...INFANT’S MILK Brand (Nestle) | Standard Preparation | Per scoop | Per 1000 ml | Descriptions | | | Calorie (kcal) | Protein (g) | Fat (g) | Calorie (kcal) | Protein (g) | Fat (g) | | 0-12 monthsLactogen 1 Infant Formula GOS FOS + DHA Gentle Plus700 g = RM 18.35 | Scoop size =4.47 g1 litre = 134 g formula + 900 ml water*Refer to Table 1 | 22.3 | 0.5 | 1.2 | 668.7 | 14.1 | 34.8 | Per 100 gCHO = 55.7 gDHA = 48.0 mgOmega 6 = 4.2 gOmega 3 = 515 mg | 6 months-3 yearsLactogen 2Follow up FormulaLcomfortis +DHA Gentle Plus700g = RM 17.70 | Scoop size =4.7 g1 litre = 141 g formula + 900 ml water7 scoops = 210 ml 3 times per day | 22.3 | 0.7 | 1.0 | 669.8 | 20.2 | 30.9 | Per 100 gCHO = 55.3 gDHA = 40 mgOmega 6 = 3.4 gOmega 3 = 420 mg | 1-3 yearsLactogen 3 GrowLcomfortis + DHAActiv Grow700g = RM 17.40 | 1 litre = 147 g + 900 ml waterServing size : 34 gPer serving : 233 ml = 34 g +210 ml water 1 scoop = 4.9 g = 30 ml7 scoops = 210 ml 3 times per day | 22.3 | 0.7 | 0.9 | 668.9 | 20.1 | 27.3 | Per 100 gCHO = 58.3 gDHA = 27 mgOmega 6 = 2.9 gOmega 3 = 385 mgCalcium = 787 mg | 3-6 yearsLactogen 4 KidLcomfortis + DHAActiv Grow700g = RM 17.40 | 1 litre = 147 g + 900 ml waterServing size : 36 gPer serving : 233 ml = 36 g +210 ml water1 scoop = 5.1 g = 30 ml7 scoops = 210 ml 2-3 times per day | 23.2 | 0.7 | 0.9 | 668.9 | 20.1 | 26.9 | Per 100 gCHO = 58.3 gDHA = 27 mgOmega 6 = 3.0 gOmega 3 = 385 mgCalcium = 712 mg | 1-3 yearsNAN GrowPro Grow, Optipro, Lipid Smart, DHA & ARA700g...

Words: 1139 - Pages: 5

Free Essay

Investment Manager

...思想 Articles 中国宪法史上的国旗 余凌云 * 内容提要:在政权的交替之中,每当讨论国旗的改易,都会由立法机关审议通 过,制定专门决议,或者写入宪法,以获得正当性之基础,进而 为执政的合法性做一个脚注。作为国家的识别标志,统一国旗样 式至关重要,还得规范国旗使用的场合、仪式、禁忌等,通过不 断教育、学习、宣传、执法,惩恶扬善。唯有如此,才能激发人 们对民族、国家的认同与忠诚,为之奉献乃至牺牲之精神。 关  键  词:国旗 宪法史 审定 使用 2015 年第 3 期(总第 7 期) 099 中国宪法史上的国旗 一、国旗小史 照当时的国际惯例,没有挂国旗的船只可视为无 (一)初见于晚清 国籍或者海盗船,无法参加国际贸易,所以该船 在中国,旗帜自古有之,最早可以上溯到黄 也像很多中国商船一样在香港注册,升挂了英国 帝。布制旗帜的出现,中国也早于欧洲,据说在 国旗。1856 年 10 月 8 日,因该船涉嫌走私,广 公元前 3000 年就有,用于军事以及寺庙、宗教 东水师捕走了船上的几名水手。英国驻广州领事 仪式。而在欧洲,最早有记载的纺织旗帜,可以 巴夏礼借口广东水师侮辱了英国国旗,挑起事端, 追溯到公元前 400 年,绘制在意大利南部的帕爱 引爆了第二次鸦片战争。5 1 斯图姆 (Paestum) 古城的一个城墙上。 中文里面, 为了使外国人能对“中国官船”一目了然,6 旗的同义词很多, “旌” 有 、 “旂” 、 “旃” 、 “旄” 、 “麾” 避免误会、纠纷;发生争议,“我亦可执彼国之 等。旗帜多用来区别贵贱、等级,以及用在军旅、 例,与之辩论”,总理衙门决意采用国旗,但拿 祭祀、田猎、封番、封疆、朝会等场合。2 国旗,国之旗也。它不是一般的旗帜,是一 个国家的象征和标识。在中国,国旗的出现,却 不准这“是否有碍行军”,遂先与曾国藩等军事 官僚商议, 然后才奏请同治皇帝批准, 1866 年, 于 仿照外制确定了中国第一面国旗,也就是大清黄 是晚清的事,远远晚于欧洲,完全是西化的产物。 龙旗。因为龙旗是皇权的象征,“黄色龙旗”又 对于这段历史,小野寺史郎、施爱东、汪林茂都 有很详尽、细腻的研究。 3 第 一 次 鸦 片 战 争 以 后, 随 着 通 商 口 岸 的 开 和八旗中“正黄旗”的形态接近,为避免僭越, 深谙官场禁忌的曾国藩思虑之后,主动提出将黄 色龙旗削去一角, 7 所以,黄龙旗最初式样为斜 放,西洋船只大量涌入。西方国家普遍使用国旗 幅三角形。 之后, 黄龙旗逐渐被运用到军事、 外交、 来识别其船只和财产,形成了与国家主权有关的 通商等领域。 一套规则,涉及处理纠纷、航运等事务的理路。 1888 年,醇亲王奕譞与李鸿章奏请改为国际 使 用 国 旗 几 乎 具 有 了 护 身 符 的 性 质(talismanic 通行的长方形,他们认为,“旗式以方长为贵, 4 quality)。......

Words: 3858 - Pages: 16

Premium Essay

Information Centre

...Computer Lab Rules & Regulations Swinburne University computing facilities may only be used by current Swinburne students and staff. Swinburne identity card must be presented upon request. The computing facilities should only be used for educational and research purposes. The following rules and regulations apply to all lab computers on campus. Lab Rules & Regulations 1. The computer lab provided by the University is solely for educational and research activities. Students are prohibited from using the lab for any other reasons. 2. Students must have a valid student ID card to use the computer labs. 3. Students must abide by all rules and regulations, such as those shown on booking sheets, computer screens, and notices near the computers or on the wall. 4. Two-hour Usage Rule: When the lab is full and students are waiting for a vacant computer, the two-hour rule will apply. Students will be limited to 2 hours on the computer per session. 5. All users must abide by the license requirements of any software or resources being used on the computer. 6. The downloading of non-coursework related materials is strictly prohibited on the campus network as it uses much of the network bandwidth, thus slowing down all internet access. 7. All personal data must be saved on a floppy disk, handy drive or on your Home drive. Do not save personal data on the computer hard drive. 8. Please be reminded to scan your......

Words: 484 - Pages: 2

Premium Essay


...Lab Rules & Regulations 1. The computer lab provided by the University is solely for educational and research activities. Students are prohibited from using the lab for any other reasons. 2. Students must have a valid student ID card to use the computer labs. 3. Students must abide by all rules and regulations, such as those shown on booking sheets, computer screens, and notices near the computers or on the wall. 4. Two-hour Usage Rule: When the lab is full and students are waiting for a vacant computer, the two-hour rule will apply. Students will be limited to 2 hours on the computer per session. 5. All users must abide by the license requirements of any software or resources being used on the computer. 6. The downloading of non-coursework related materials is strictly prohibited on the campus network as it uses much of the network bandwidth, thus slowing down all internet access. 7. All personal data must be saved on a floppy disk, handy drive or on your Home drive. Do not save personal data on the computer hard drive. 8. Please be reminded to scan your handy drive before use to reduce the risk of any virus outbreak. 9. The Management is not responsible for any loss of data or personal belongings regardless of the cause. 10. No moving or unplugging of any equipment in the labs. 11. No pornographic and offensive images & videos. 12. No games (both computer and physical). 13.......

Words: 413 - Pages: 2

Premium Essay

Lab 10 Assessment Worksheet

...need to have access to the internet for the scan to be successful. 5. In what formats can the scan results be viewed? If you are running the tool from the GUI you can view them in there right after the scans. If you run it from the command line you can view it in the text file. 6. Could you scan one computer at a time or could you perform multiple scans at a time? Each computer can only be scanned at a time. 7. What portion of the scan takes longer? Is it necessary to perform this scan every time? Full scan. No, but you should run a full scan periodically. 8. Are the scans saved locally, and if so where? Yes, C:\users\username\SecurityScans folder 9. Could you exclude patches to be scanned for? No. 10. Which are some of the major recommendations that you would provide to secure any Windows system? Harden the operating system FIRST; install only the necessary services; use server roles when possible; SCW to apply least privilege principle to applications; remove or disable unneeded services, user accounts and extra application components; only open the minimum required ports at the firewall; define unique user accounts; user strong authentication; use encrypted connections for all communications; encrypt file, folders and volumes that contain private data; develop and maintain a Business Continuity Plan (BCP) and Disaster Recovery Plan (DRP); disable any server...

Words: 368 - Pages: 2