Free Essay

Unit 8 Lab

In: Business and Management

Submitted By BrandNewClassic
Words 293
Pages 2
1. In the certificate store. No
2. Decryption key
3. Authentication Header is used to prove the identity of the sender and ensure the data is not tampered with while Encapsulated Security Payload provides authentication and encryption and encrypts the IP packets and ensures their integrity.
4. Create Enrollment Object, Set Enrollment Parameters, Create Request, Submit Request, Process request, Get Certificate, Accept Certificate
5. Advantages: Straight-forward Concept, Chain-length limit, Less time to obtain a usable certificate within the CA Disadvantages: Scalability, Single point of trust, Still need an impeccable CA
6. Outline the business scenario, Define the application certificate requirements, Create certificate policies and practices statements, Design the certification authority (CA) infrastructure, Create a certificate renewal strategy, Develop a CA management plan
7. System overview, hardware, applications
8. Display information about the digital certificates that are installed on a DirectAccess client, DirectAccess server, or intranet resource.
9. The OpenSSL Project is a collaborative effort to develop a robust, commercial-grade, full-featured, and Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols as well as a full-strength general purpose cryptography library managed by a worldwide community of volunteers that use the Internet to communicate, plan, and develop the OpenSSL toolkit and its related documentation.
10. It is so that a user can use one username and password for multiple applications. It can help security because it is only one username and password that a user will have to know. It can increase security risk by if someone gets ahold of a user’s or an administrators username and password, they can do harm to the system.
11. True
12. Mapping, confidentiality
13. SHA-1 due to better encryption
14. False
15. True

Similar Documents

Premium Essay

Unit 8 Lab

...Lab 8 Assessment 1. Where can you store your public keys or public certificate files in the public domain? Is this the same thing as a public key infrastructure (PKI) server? Certificate stores 2. What do you need if you want to decrypt encrypted messages and files from a trusted sender? Decryption key 3. When referring to IPSec tunnel mode, what two types of headers are available and how do they differ? Authentication Header is used to prove the identity of the sender and ensure the data is not tampered with while Encapsulated Security Payload provides authentication and encryption and encrypts the IP packets and ensures their integrity. 4. Provide a step by step progression for a typical Certificate Enrollment process with a Certificate Authority. Create Enrollment Object Set Enrollment Parameters Create Request Submit Request Process request Get Certificate Accept Certificate 5. When designing a PKI infrastructure what are the advantages and disadvantages of making the CA available publicly over the Internet or keeping it within the private network? Advantages Straight-forward Concept Chain-length limit Less time to obtain a usable certificate within the CA Disadvantages Scalability Single point of trust Still need an impeccable CA 6. Designing a PKI involves several steps. Per the Windows Best Practices for Designing a PKI, what are those steps? In your words, explain what each step is meant to do? * Outline...

Words: 634 - Pages: 3

Premium Essay

Unit 8 Lab Questions

...Richard Bailey Unit 8 lab 8.1 August 19, 2013 NT2580 Introduction to Information Security 1. So you can find the weekness and fix before it can be implamented on the server and goes live. 2. A reflective XSS attack a type of computer security vulnerability. It involves the web application dynamically generating a response using non-sanitized data from the client. Scripts, like JavaScript or VB Script, in the data sent to the server will send back a page with the script. 3. SQL Injections can be used to enter the database with administrator rights.  Best way to avoid this is using Java in websites. 4. methods, including character scrambling and masking, numeric variance and nulling, rely on an array of built-in SQL Server system functions that are used for string manipulation. 5. Well co-ordinated and regulary audited security checks is the best way forword. 6. . There has been considerable debate comparing the security attributes of open source and proprietary software (Anderson, 2002). However, for a careful interpretation of the data, rigorous quantitative modeling methods are needed. The likelihood of a system being compromised depends on the probability that a newly discovered vulnerability will be exploited. Thus, the risk is better represented by the vulnerabilities which are not yet discovered and the vulnerability discovery rate rather than by the vulnerabilities that have been already discovered in the past and remedied by patches. ...

Words: 489 - Pages: 2

Premium Essay

Nt1310 Unit 8 Lab 8

...The objective of lab eight was to describe the fronts there are on different types of maps. II. Methods: The materials that we used for lab eight was four different websites and our textbook. The first website was http://www.state.nj.us/dep/seeds/wssym.htm and we used this to help us read the different types of symbols that were on the maps. http://weather.uwyo.edu/surface/front.html was used to look at the map that had fonts of the day. http://weather.rap.ucar.edu/surface/ we used this website to look at weather symbols of a specific area from the previous map. The last website was http://earth.nullschool.net where we looked at the flow of the air on the map. I used my book to learn how to read a station model. All of the things that were used for this lab were very important in order to get it done. III. Results:...

Words: 515 - Pages: 3

Premium Essay

Nt1310 Unit 8 Lab

...The objectives of “Lab 8: Lemon Car Competition” were to use redox reactions to store energy in capacitors, to learn about battery cells and construct a lemon citrus cell to power devices, and to build a vehicle powered by either a lemon battery or a capacitor to be entered in a competition. The competition objective was to win the competition. The winner was the vehicle with the highest competition ratio, which was calculated using Equation 1 below. To have the highest competition ratio, the cost and time traveled were minimized and the distance traveled was maximized. The designed vehicle came in last place along with three other vehicles because it did not travel. The car costed $3.50 and traveled 0 foot, so the competition ratio was zero....

Words: 1036 - Pages: 5

Premium Essay

Nt1310 Unit 8 Lab

...Give a basic explanation of each step necessary to assemble a connector to a piece of fiber optic cable 1. Cable and Optical fiber preparation 2. Oven cured Epoxy application and connector assembly 3. Oven cured epoxy polishing General Guidelines The following contains information on the placement of fiber optic cables in various indoor and outdoor environments. In general, fiber optic cable can be installed with many of the same techniques used with conventional copper cables. Basic guidelines that can be applied to any type of cable installation are as follows:     Conduct a thorough site survey prior to cable placement.     Develop a cable pulling plan.     Follow proper procedures.     Do not exceed cable minimum bend radius.     Do not exceed cable maximum recommended load.     Document the installation. Conduct a Site Survey The purpose of a site survey is to recognize circumstances or locations in need of special attention. For example, physical hazards such as high temperatures or operating machinery should be noted and the cable route planned accordingly. If the fiber optic cable has metallic components, it should be kept clear of power cables. Additionally, building code regulations, like the National Electric Code (NEC)** must be considered. If there are questions regarding local building codes or regulations, they should be addressed to the authority having jurisdiction, such as the fire marshal or city building inspector. Develop a Cable...

Words: 2096 - Pages: 9

Premium Essay

Nt1310 Unit 8 Lab Report

...After the water is hot enough it will switch off the heater and it will switch on motor to rotate the inner drum back and forth, sloshing the clothes through the soapy water. 7. The detergent work with water pulls out the dirt or stain from the clothes and trap the dirt in the water. 8. After finish wash the washing machine will switch on the water valves to drains from both drums. Then will be rinse mode where the pump is switched on to help empty the water in the drums. 9. Now the microcontroller will invoke the water valves to switches on again to allow clean water enter the drums. 10. The microcontroller invoke the inner drums to rotate back and forth again in order the clean water to rinses the clothes that have detergent. Then will empties the drums again and repeats this process few times to get rid all the soap. 11. After the clothes are rinsed from the detergent then the microcontroller invoke the inner drum rotate in very high speed, speed may reach around 80 mph. All the clothes will flung against the outside edge...

Words: 427 - Pages: 2

Premium Essay

Nt1310 Unit 8 Lab Report

...Lab 8 This chapter give as closer look into binoculars and telescopes. Hans Lippershey invented the telescope. He tested this by looking at small object in the floor. There are two different kinds of telescopes. These two different kinds of telescopes are the refractor and reflector. As the name states it the reflecting telescope uses mirrors to reflect the image and come back into the pupil. First the light goes through the front of the telescope and goes in the concave mirror. When this is done the light and image is passed on to the flat mirror and is reflected into the eye piece and the image goes into the pupil. The refractor telescope uses lenses to magnify the image. The light first goes in the primary lens and then the light goes...

Words: 1707 - Pages: 7

Premium Essay

Nt1310 Unit 8 Lab Results

...1. The first independent variable is the different luminance cues which included light, equiliminant and dark conditions, and the second independent variable was the target location either positioned on the same side (valid trial) or at an opposite location (invalid trial). The dependent variables include the reaction times of participants measured in milliseconds and the responses recorded for stimuli identification. 2. Specifically, a limitation is that the researcher only used green and red hues in his experiment instead of including the other opponent pairs, yellow paired with blue and black with white. A second weakness is the experiment only had square stimulus shapes instead of containing multiple shapes, such as bars and circles. Lastly, the researcher should have included a control group or neutral trials in order to solidify the results suggesting dual processing. 3. First, the researcher controlled for different sources of luminance information by using the same stimulus, setting the subject’s equiluminance point, and by adding random noise to eliminate the possible effect of luminance cues. Furthermore, the researcher controlled for confounding factors and bias by randomizing the trial order presented to subjects, the location of the target, and the target’s orientation. Lastly, the researcher controlled for flawed data by eliminating reaction times that deviated greatly by categorizing such times as misses and anticipatory responses. 4. This quarter, I learned that...

Words: 818 - Pages: 4

Premium Essay

Ie1110 Unit 8 Lab Page 93

...1. Define self-reliance and self-reliance in action? Self-reliance is the capacity to rely on one's own capabilities, and to manage one's own affairs; independence not to be dependent. Lf-reliance in action means that you chose to think positive. 2. What are the benefits of self-reliance? That you can literally create your own future. It can lead to a lifelong personal and career fulfillments. It will enhance your happiness. 3. How can you become a self-reliant optimist? You can choose to believe in positive outcomes and take persistent action based on that belief. 4. What are the reasons why some people don’t plan? They don’t know what they want. They are reactive. They are waiting for someone else to do the planning. They don’t want to take the timed to plan. They can’t predict the future. They fear not meeting a written goal. They have an overconfidence of what they can carry in their heads. 5. What are the benefits of planning? It says that you have a goal. It clarifies what needs to be done toward your goa A plan keeps you on course. It is the foundation of time management toward your goal. It sets growth expectations and allows you to personally stretch. 6. Make an action plan for one of your specific objectives. My objective is to secure a job in th3e industrial oil refinery that will secure my future. Need: Go to school to get educated so that I am get a job that will enough to secure my future. Results expected: To secure job. T secure pay scale...

Words: 412 - Pages: 2

Premium Essay

Unit 8. Lab 1. Fiber Optic Connector Assembly

...Unit 8. Lab 1. Fiber Optic Connector Assembly The most critical part, the Cable and Fiber Preparation where the fiber is mounted, is the ferrule. The Ferrule is a long, thin cylinder with the fiber mounted in the center hole. The center hole is sized to match fiber's cladding diameter which is usually 125um. When fiber connector ferrules are made from several types of materials including ceramic(Zirconia), stainless steel and plastic. The ferrule's job is to center and align the fiber and protects it from mechanical damage. The end of fiber is at the end of the ferrule, where the fiber end is polished smooth either flat or with a curvature. The ferrule is mounted in the connector body and then the connector body is attached to the fiber optic cable structure. Finally, a strain-relief rubber boot protects the connector-cable junction. Fiber optic connectors usually do not have the male-female polarity. Most fiber connectors are male only. Instead, fiber connectors mate to each other in fiber adapters, which are often called mating sleeves or coupling receptacles. Fiber optic adapters used to mate different connector types such as a FC connector to a SC connector are called hybrid adapters. Although this approach requires the use of separate adapters, it otherwise reduces fiber connector inventory requirements since now you need to stock one type of connector only. Another advantage is that fiber adapters can be designed to mate one type of connector to another, which is a big...

Words: 604 - Pages: 3

Free Essay

Unit 8 Lab 6: Control Panel Exercises

...1) Computer differentness Dell-inspiron desk top | HP-pavilion HPE desk top | Model : 1660s-2000Bk | Model : H8-1234 | Hard disk capacities | 500GB | Hard disk capacities | 1TB | Amount of ram/expandable ram | 4GB/8GB | Amount of ram/expandable ram | 10GB/36GB | Processor speed | 2.7 Ghz | Processor speed | 3.56 Ghz | Cost | $399.99 | Cost | $699.99 | Toshiba -Satellite laptop | HP-Elite Book Laptop | C855D-S5205 | Model :XU1OLUT | Hard disk capacities | 320GB | Hard disk capacities | 750GB | Amount of ram/expandable ram | 4GB/16.6GB | Amount of ram/expandable ram | 8GB/32GB | Processor speed | 1.7 Ghz | Processor speed | 2.20 Ghz | cost | $329.99 | Cost | $3,166.88 | 2) What computer will go with the best jobs? The first profession that I chose to look at was an educator. The computer that I feel would meet the needs of an educator is the Dell-inspiron desk top Model: 1660s-2000Bk. The reason that I feel this is the best fit is a program that would help an educator is Microsoft office. The requirements for the program is that the computer is going to need 3.0 GB disk space, 256 MB RAM, and a 500 MHz or faster processer. Everything that Dell-Inspiron desk top meets everything that they need and it’s not too expensive. The second profession that I chose to look at was a Movie Maker. The computer that I feel would meet the needs of an educator is the HP-pavilion HPE desk top Model : H8-1234. The reason that I feel this is the best fit is a program...

Words: 532 - Pages: 3

Premium Essay

Unit 8. Lab 1. Fiber Optic Connector Assembly

...Unit 8. Lab 1. Fiber Optic Connector Assembly Fiber Stripping “The outer sheath of fiber cables can be removed using electrical cable stripping tools, and scissors or a razor blade can trim the Kevlar strength member. However, the fiber coating must be very carefully removed to avoid damaging the fiber, surface flaws and scratches are the cause of most fiber failures. The coating can be removed using fiber strippers.” (Newport, nd) Fiber Termination “End-face surface quality is one of the most important factors affecting fiber connector and splice losses. Quality end-faces can be obtained by polishing or by cleaving. Polishing is employed in connector terminations when the fiber is secured in a ferrule by epoxy.” (Newport, nd) Fiber Cleaving “Fiber Cleaving is the fastest way to achieve a mirror-flat fiber end and it takes only seconds. The basic principle involves placing the fiber under tension, scribing with a diamond or carbide blade perpendicular to the axis, and then pulling the fiber apart to produce a clean break.” (Newport, nd) “Once the optical fiber is terminated with a particular connector, the connector end-face preparation will determine what the connector return loss, also known as back reflection, will be. The back reflection is the ratio between the light propagating through the connector in the forward direction and the light reflected back into the light source by the connector surface.” (Newport, nd) “Minimizing back reflection is of great importance...

Words: 1739 - Pages: 7

Premium Essay

Nt 1210

...ITT Technical Institute NT1210 Introduction to Networking Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1110 Computer Structure and Logic or equivalent Course Description: This course serves as a foundation for the study of computer networking technologies. Concepts in data communications, such as signaling, coding and decoding, multiplexing, circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110...

Words: 4400 - Pages: 18

Premium Essay

Nt1210 Introduction to Networking Onsite Course

...ITT Technical Institute NT1210 Introduction to Networking Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1110 Computer Structure and Logic or equivalent Course Description: This course serves as a foundation for the study of computer networking technologies. Concepts in data communications, such as signaling, coding and decoding, multiplexing, circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110...

Words: 4400 - Pages: 18

Premium Essay

Unit 1 Labs

...ITT TECHNICAL INSTITUTE NT1210 Introduction to Networking Onsite Course GRADED ASSIGNMENTS Graded Assignment Requirements Retain all handouts issued in every unit, as well as any assignment, research, or lab documents you prepare as part of assignments and labs. Some may be used more than once in different units. NOTE: Always check with your instructor for specific due dates of assignments. Graded Assignments Unit 1 Assignment 1: Computer Basics Review Course Objectives and Learning Outcomes Identify the major needs and major stakeholders for computer networks and network applications. Describe how digital devices store data. Describe the differences between input and output devices. Assignment Requirements In the Chapter Review Activities at the end of Chapter 1 in the Odom textbook (answers can be found in the textbook): Respond to the multiple-choice questions. Complete the List the Words inside Acronyms table. Required Resources Odom textbook Computer with word processing software Internet access Printer Submission Requirements: Submit your responses as a typed document using Arial or Times New Roman 12-point font, double-spaced. Label your assignment Unit 1 Assignment 1. Unit 2 Assignment 1: Identifying Network Topologies Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Identify the classifications of networks and how they are...

Words: 16182 - Pages: 65