Premium Essay

Unit 1 Lab

In: Computers and Technology

Submitted By mozurjus
Words 1655
Pages 7
Students will be provided with a copy of the VMware image of the Linux distribution and tools that will be used through out this course when I return to class on September 25, 2012.

Accompanying this lab students will need to answer the questions from the Security Strategies in Linux Platforms and Applications lab book.

To accomplish the lab assignment below, students will need to obtain a copy of the Fedora Image provided to you by the Substitute Instructor and complete a basic VMware installation of Fedora. The questions in the lab book will be based on the installation experience.

Assigned Pages: 6-10
Questions: 1 through 15.

This assignment is due by the end of class for Unit 1.

1. During the install, the option to sync with a NTP (Network Time Protocol) server was checked. From a security perspective, why is it important for a system to keep accurate time?
Accurate time is important because of the date/time stamps (records) that occur on both log-in's and any changes that were made. This allows the logs to be checked to see what individual made the changes, or was logged-in at the time the changes were implemented.
2. During the install, a password has been set for the "root" user. What is the "root" user, and when is it appropriate to use this account?
The "root" user is name or account that by default has access to all commands and files. It is also referred to as the root account, root user and the superuser. It would be appropriate to use this account to modify the system in any way desired and to grant and revoke access permissions (eg. the ability to read, modify and execute specific files and directories) for other users, including any of those that are by default reserved for root.
3. During the install, X-Window and a Desktop Manger were installed. However, in a production environment it is recommended NOT to run the X-Window

Similar Documents

Premium Essay

Unit 1 Labs

...ITT TECHNICAL INSTITUTE NT1210 Introduction to Networking Onsite Course GRADED ASSIGNMENTS Graded Assignment Requirements Retain all handouts issued in every unit, as well as any assignment, research, or lab documents you prepare as part of assignments and labs. Some may be used more than once in different units. NOTE: Always check with your instructor for specific due dates of assignments. Graded Assignments Unit 1 Assignment 1: Computer Basics Review Course Objectives and Learning Outcomes Identify the major needs and major stakeholders for computer networks and network applications. Describe how digital devices store data. Describe the differences between input and output devices. Assignment Requirements In the Chapter Review Activities at the end of Chapter 1 in the Odom textbook (answers can be found in the textbook): Respond to the multiple-choice questions. Complete the List the Words inside Acronyms table. Required Resources Odom textbook Computer with word processing software Internet access Printer Submission Requirements: Submit your responses as a typed document using Arial or Times New Roman 12-point font, double-spaced. Label your assignment Unit 1 Assignment 1. Unit 2 Assignment 1: Identifying Network Topologies Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Identify the classifications of networks and how they are...

Words: 16182 - Pages: 65

Free Essay

Unit 1 Lab

...1. The CPU is what actually runs the programs. 2. 1, 0 3. Digital data, and/or digital device 4. Key words, or reserved words 5. Nmeumonics 6. A compiler translates a high-level language program into a separate machine language program. An interpreter both translates and executes the instructions of a high-level program. 7. Operating system Popular Programming languages 1970s: Pascal: Niklaus Wirth. 1970, and was developed for use in education to teach programming. C: Dennis Ritchie. Developed between 69 and 73. It was designed to encourage cross-platform programming, and to be used by straight forward compliers. Smalltalk: Alan Kay, Dan Ingalls, Adele Goldberg. Developed between 69 and 72. It was designed primarily for educational use. Scheme: Guy L. Steele and Gerald Jay Sussman. Developed in 1975 for educational uses. SQL: Donald D. Chamberlin and Raymond F. Boyce. Appeared in 1974. Designed to manipulate and retrieve data. 1980s: C++: Bjarne Stroustrup. Appeared in 1983. Developed for systems programming. Ada: Jean Ichbiah. Developed in 1980 for the Department of Defense as a unified language for embedded and real-time systems. Eiffel: Bertrand Meyer. Appeared in 1986. Developed to eliminate bookkeeping instructions to make code more readable and easier to program. Objective-C: Brad Cox and Tom Love in1983. Perl: Larry Wall. Appeared in 1987. Developed as a general purpose Unix coding mechanism. 1990s: Python: Guido van Rossum, and...

Words: 457 - Pages: 2

Premium Essay

Unit 5 Lab 1

...Physical Networking Unit 5 Lab 1 Wired and Wireless Networks The biggest difference between these two types of networks is one uses network cables and one uses radio frequencies. A wired network allows for a faster and more secure connection and can only be used for distances shorter than 2,000 feet. Several other disadvantage of a wired network such as the “need to run cables in difficult environments through walls, floors and ceilings. Cables need to be run from computer to computer and switch to switch. Process can be time consuming. Loose cables likely remain the single most common and annoying source of failure in a wired network.” (PACE University, n.d.) While a wireless network is a very useful and convenient networking device, however these types of networks a lot less secure and transmission speeds can suffer from outside interference. Although wireless networking is a lot more mobile than wired networking the range of the network is usually 150- 300 indoors and up to 1000 feet outdoors depending on the terrain. The cost for wired networking has become rather inexpensive. Ethernet cables, hubs and switches are very inexpensive. Broadband routers cost more, but these are optional components of a wired network, and their higher cost is offset by the benefit of easier installation and built-in security features. The primary parts of a wired network are the cables, network adapters, and routers. Wired...

Words: 315 - Pages: 2

Premium Essay

Nt1310 Unit 1 Lab 1

...God created man in his own image, and since limits do not bound God, the athletic limit of of humans remains undetermined. In Lab 2, the progression of the men’s 100 meter freestyle world record engages people to ponder the possibility to human performance and how fast a man can swim the event. Since the early 1900’s, the world record has steadily decreased and the mathematical model provided in the lab accurately represents some of the historical time period, but the model appears to limit human performance to 44 in the race. Predicting the times around 1980-2010 very closely, the model then slopes to a near horizontal line above y = 44. Although the future of the potential time remains in question, other historical evidence persuades me to believe man will swim faster than the model limits....

Words: 503 - Pages: 3

Premium Essay

Nt1330 Unit 1 Lab 1

...The main purpose of the Lab 1 was to install, configure and test Amazon Web Service Virtual Private Cloud by launching an Ubuntu Linux instance to see if it connects. The lab started with a scenario where I am a newly hired IT guy at Flux Unlimited with my first task to set up and test the company’s network infrastructure using Amazon Web Services to provide the perfect cloud based solution that they need. This starts with setting up of a VPC which is a virtual network dedicated to AWS and it is logically isolated from other virtual networks in the AWS cloud. Next after this is selection of right region with at least two Available Zones (data center) in each region. The AZs in each region helps to provide redundancy in case there is an outage in any of the available AZ. After creating a VPC, a public subnet named FluxPublicSubnet was...

Words: 444 - Pages: 2

Premium Essay

Nt1310 Unit 1 Lab 1

...Technology is ever changing in today’s world. Most people are accustomed to the traditional fixed line LAN, but there are others who are always on the go and would like to explore the possibility of cellular networks. The purpose of this paper is to compare and contrast several attributes of purely fixed line networks vs. having a purely cellular network. Fixed line networks have been and will continue to be a huge industry because the major players provide the backbone. For this reason alone, the company should not expect to pay outrageous prices for equipment. From a security standpoint, fixed line networks are less susceptible to wire sniffing attacks and more secure than cellular networks due to the fact that the hacker would have to gain access to the fixed line network rather than simply intercepting the transmission from a cellular network. While fixed line networks are considered the norm for most companies, they do have limitations. A company which adopts a purely fixed line network will not have the capability to send or receive data unless the user is physically inside the company. This would prove to be a major drawback to companies who have employees who travel to other cities to attend meetings, seminars, etc. Cellular networks are relatively new and are still developing. While employers can expect increased productivity due to employees being able to send and receive data at any time, one important drawback is the fact that the employees need to be in...

Words: 422 - Pages: 2

Premium Essay

Database Unit 1 Lab 1

...Lab 1 1. A collection of information accessible from a computer or server 2. DBMS is a Database Management System that organizes information internally. 3. Dbms stores information, spreadsheet runs formulas 4. Product | Use | Where it was used | Cost | DB2 | Open database environment | A small single-user application to a large multi-user system. | $598 + $99 additional user | Microsoft Access | Relational databases that have tables of data. | Software developers and data architects | $199 (Amazon) | Microsoft SQL Server | primary function is to store and retrieve data as requested by other software applications | workloads ranging from small single-machine applications to large Internet-facing applications with many concurrent users | Vary (Different Prices for different purposes) | Filemaker Pro | database engine with a GUI-based interface | ??? | $329.00 | Oracle | transfer any customer info from one location to any other in the world | larger organizations and small chain stores | ??? (Couldn’t find anything) | Mysql | database for use in web applications | Personal and commercial use | $2k-$10k/year | 5. “DBMS stands for database management system whereas RDBMS stands for relational database management system; these softwares are created to maintain and utilize large scale collection of data in an efficient manner.” http://www.differencebetween.info/difference-between-dbms-and-rdbms 6. 290 7. Peng J Wu 8. Footlocker: Employee...

Words: 447 - Pages: 2

Premium Essay

Is 3120 Unit 1 Lab 1

...Use the internet to help you answer the following questions: 1. What is the current state of IPv6? Estimate what percentage of the network infrastructure is running IPv6 traffic. What percentage of the network is running IPv4 traffic? IPv6 - Reports in November 2008, indicated that penetration was still less than one percent of Internet traffic in any country. The leaders were Russia (0.76%), France (0.65%), Ukraine (0.64%), Norway (0.49%), the United States (0.45%), and China: 0.24%). IPv4 - Of the 4.3 billion Internet addresses possible with today's Net mainstream technology, 95 percent are gone. That is a 90% use across the worlds internet use IPv4 2. Find a company that offers unified communications. a. What technologies are being used? i. Microsoft • Audio, video, and Web conferencing • Instant messaging • Unified messaging • Voice-over Internet Protocol (VoIP) • Secure communication • Mobility • Provide IT control with failover, redundancy, and scalability • Manage compliance, and archiving policies for messaging and telephony systems b. What type of network infrastructure is being used? IPTV – Internet Protocol Television 3. Find the following models on the internet: a. B2C – Groupon, Livingsocial, Amazon Local. b. B2B – Adobe, Cisco, American Express (Other CC companies) c. B2G – Construction and Infrastructure, Information Technology 4. Look up the general definitions of the following acronyms that relate to unified communications: ...

Words: 324 - Pages: 2

Premium Essay

Unit 1 Lab 1 Nt1230

...Name Student # Date Assignment Requirements Follow the directions in the Lab Manual for Lab 1, and complete all Exercises. Answer all the questions. Submission Requirements Microsoft Word. 1-2 pages. Self-Assessment Checklist I followed the directions in the lab manual for all exercises. | * | I submitted answers to all of the questions for this lab. | * | I used critical thinking. | * | I have followed the submission requirements:File Format: Microsoft Word (.doc /.docx)Length: 1-2 pagesFont: Times New Roman 12 point sizeLine Spacing: Double | * | Lab 1 worksheet Preparing a Virtual Workstation Image Exercise 1.3 | Exploring Windows 7 | Overview | In order to familiarize yourself with the new Operating System being rolled out in your organization, you decide to manipulate some common features to see how they differ from previous Windows versions. In this exercise you will work with screen saver and other display properties. | Completion time | 30 minutes | Question 1 | What is the current screen resolution? 800x600 | Question 2 | What security advantages does displaying the login screen on resume offer? Offers security from anyone coming along and taking a look at what your doing | Question 3 | How did changing the theme affect your display? It gave a different background | Exercise 1.4 | Creating an .iso Image From Windows 7 Installation Media (Optional) | Overview | Carrying around installation...

Words: 275 - Pages: 2

Free Essay

Unit 9 Lab 1

...Task 1 1. The Cisco RV220W Firewall is a hardware firewall that doubles as a router. It has VPN security to allow safe access from remote computers and offices. It also protects against cloud based threats. ZoneAlarm is a software two-way firewall and also comes with backup software. It monitors your programs constantly and should a virus or malicious program make it through it catches it immediately. Task 2 1. Panda, Norton, and Kapersky all offer free trial versions of their products. AVG is the only full-fledged free anti-virus software in the group. McAfee does not offer trial versions or a free version, only purchasable options. 2. A Trojan horse is an application that appears benign but is really a destructive program. A user will think they are downloading something beneficial to their computer and when they do the Trojan horse begins to corrupt their system. Phishing is when a person receives an email that directs them to a false website that appears to be legit and then has the user enter sensitive personal information such as credit card numbers, social security number, etc. A drive-by download occurs when a user visits a website, doesn’t have to click any links or anything, and malicious software automatically begins to download in the background without the users knowledge. Task 3 1. A full backup backs up all the files and folders on a specific drive every time you use that file set. It takes longer and uses up more file space. An incremental back...

Words: 586 - Pages: 3

Premium Essay

Nt1130 Unit 1 Lab

...Unit 1 Assignment 1: Windows 2008 Network Services Most networks out there will take advantage of DNS and DHCP services. These services make managing a network an easier task for the administrator. While they are not always required for a network to function, most cases they will be used. Knowing what these services do will help the administrator determine if they are required for the network. DNS stands for Domain Name System. What this service does is help convert IP addresses into names easily remembered by the user. Instead of having to remember an IP address for every device on the network an administrator could set up DNS so names can be assigned to all the devices. Most users will find remembering a name easier than trying to recall a string for 12 numbers. DHCP stands for Dynamic Host Configuration Protocol. What DHCP does is assign IP addresses to devices. Without DHCP an administrator would have to assign IP addresses to each device on the network. Maybe in a small network this wouldn’t be a problem, but a network with more than 10 devices this may become a large task for one person. DHCP can be configured with a range of IP addresses for a network and it will assign each device an address that is not being used. It keeps track of what devices are using IP addresses and which ones are not. Knowing how each of these services work will help an administrator decide if they want to use them. In a network with say 5 devices the administrator may want to manually assign...

Words: 357 - Pages: 2

Premium Essay

Unit 5 Lab 1

...Wired and Wireless Networks ITT Technical Institute Physical Networking – NT1310 11/10/2014 Wired and Wireless Networks The biggest difference between these two types of networks is one uses network cables and one uses radio frequencies. A wired network allows for a faster and more secure connection and can only be used for distances shorter than 2,000 feet. Several other disadvantage of a wired network such as the “need to run cables in difficult environments through walls, floors and ceilings. Cables need to be run from computer to computer and switch to switch. Process can be time consuming. Loose cables likely remain the single most common and annoying source of failure in a wired network.” (PACE University, n.d.) While a wireless network is a very useful and convenient networking device, however these types of networks a lot less secure and transmission speeds can suffer from outside interference. Although wireless networking is a lot more mobile than wired networking the range of the network is usually 150-300 indoors and up to 1000 feet outdoors depending on the terrain. The cost for wired networking has become rather inexpensive. Ethernet cables, hubs and switches are very inexpensive. Broadband routers cost more, but these are optional components of a wired network, and their higher cost is offset by the benefit of easier installation and built-in security features. The primary parts of a wired network are the cables, network adapters, and routers. Wired...

Words: 1042 - Pages: 5

Premium Essay

Unit 10 Lab 1

...Once a fiber optic cable plant, network, system or link is installed, it needs to be tested for four reasons: to insure the fiber optic cable plant was properly installed to specified industry standards. to insure the equipment intended for use on the cable plant will operate properly on the cabling to insure the communications equipment is working to specifications to document the cable plant and network for reference in case of future problems Tools and Test Equipment Needed The following tools are needed to test and troubleshoot the fiber optic cable plant, system or link properly. Optical Loss Test Set or power meter and test source with optical ratings matching the specifications of the installed system and proper connector adapters. An OLTS that merely tests cable plant loss may not include a calibrated power meter needed for testing transmitter and receiver power, so a calibrated power meter and source are a better choice for link or system testing. Reference test cables with proper sized fiber and connectors and compatible mating adapters of known good quality. These do not generally need to be “reference quality” but only in good condition, generally defined as having connector losses of less than 0.5 dB. Visual fiber tracer and/or visual fault locator Connector inspection microscope with magnification of 100-200X and fixturing for proper connectors. Video microscopes are recommended. e. Cleaning supplies intended specifically for the cleaning of fiber optic connectors...

Words: 592 - Pages: 3

Premium Essay

Unit 7 Lab 1

...Gerald Johnson NT1310T Unit 1 Exercise Local Exchange 3/13/2016 The purpose of a Network is to share data. To make this possible, you have to be able to connect to other computers. To make this enticing to people to want to take advantage of this technology, it has to be simple not so complex. This sounds a little difficult to understand as far as a qualified answer, but to sum things up that is it. The question to ask and that many people don’t consider is how data is transferred from one computer to another computer? Transferring data that is being sent by the user who has created and initialized the transfer of information using a source such as an email service for example. How do you get information from one computer to another, and how do you make it simple and easy to do this? Companies that succeeded at doing this have a great profit with exponential growth possibilities and revenue. For example Cisco company who has made billions by allowing different groups of networks to share data across what we call the internet. Games take advantage of this technology to connect to other computers. Networking companies have succeeded so well in allowing people to connect across their internal networks and the internet that pretty much any app. is able to send data to another computer. There is a physical connection running between two computers that want to connect. This is made possible because phone lines that run from houses to switches to other houses that...

Words: 472 - Pages: 2

Premium Essay

Nt1310 Unit 1 Lab Report

...1) As an individual, what did you contribute/accomplish in lab this week? 2) What did you learn (individually and as a team)?  3) How can you or your team improve in the future? 4) As a team, what do you need to accomplish in lab next week? 1) In lab this week, after multiple attempts to evaluate and redesign the cranking system for the dollar bill side of our project, we (my lab partner and I) decided to use six dowels to fabricate the conveyor belt. We went over many designs, mostly facing the same problem: no supporting unit for the system. We eventually came up with a design that attained our need and started fabricating in lab. However, since we should have figured this out earlier, we had to work on fabricating out of labs so that we could catch up with the progress. 2)...

Words: 440 - Pages: 2