Itt255 Unit 5 Homework

In: Computers and Technology

Submitted By shugt
Words 407
Pages 2
Creating a baseline through log files can help identify several security anomalies. You can run your own tests and setup monitoring with the server tools available. After this is done you can compare these baseline readings with current usage to look for security events.

Failed logins- This can be a very useful anomaly if login monitoring is set up right. You need to set criteria to record only out of the ordinary login failures. You can set a clipping level to five so “ordinary” human logon errors are not written to a log file. This can help you see larger numbers of logon failures in a short time span. This can help an administrator pin point hackers or non authorized personnel that are trying to gain unauthorized access to the network/databases.

Bandwith elevation- Baselines can be set for both typical network traffic as well as band-with usage. You can have security alerts set when unacceptable traffic deviations occur. Also, you may set detection to alert administrator when band-with exceeds preset levels. This can help detect file movement as well as floods or attacks.

Sensitive laptop data Is unencrypted and susceptible to physical theft. To help secure:

- Set up strong user/password authentication system.

- Encrypt the hard drive, password protect the files and also use an anti-theft technology like intel’s anti-theft. It makes the user to re-authenticate when it is turned on or woke up from sleep mode. It will not leave the data unencrypted when it goes into sleep mode.

- Place a tracking program on the laptop to locate when lost or stolen

Open network drive shares allow storage privileges to outside users. To help secure:

- Make sure your network /wireless network is secured.

- You may set group policies to only allow certain members of groups to use this drive.

- You can set…...

Similar Documents

It-320 Unit 5 Homework

...Chapter 5 Review page 136 1., The OSI model defines the way things should be done by the software and hardware on a network so that communications can take place between two computers or nodes. Although it doesn’t seem to perform anything. 3. Just like anything else that is organized, if they are organized they will be easier to remember, to work with and to manage. 5. The Presentation layer is the 6th.The reside under the presentation layer-JPEG, MPEG & MIDI. Layer helps for the display. 7. Transport layer functions that reside are TCP, UDP-RTP & NCP. At the Transport layer, TCP takes the segment de-fined by layer 5 amd adds a header containing the port number, error checking schemes, flow contorl checks and sequence numbers. 9. Data Link layer functions that reside are Ethernet, Frame Relay, ATM & HDLC. To my understanding is the connectivity protocols for the OS. 11. To set up a routing protocol between five network routers you would be working under layers and would use information from 4, 3, 2 &1. But mostly 3. 13. TCP and UDP reside under layer 4 the Transport layer…… D. Part of the transport layer responsible for end to end transmission of information. 14. Layer 4 Transport, protocols- TCP, UDP-RDP & NCP. 15. Layer 3 Network, protocols- IP, IPX & AppleTalk. 16. Layer 2 Data Link, protocols- Ethernet, Frame relay, ATM & HDLC. 17. Layer 1 Physical, protocols- TDM, SONET, ADSL, 2B1Q, RS-232, RJ-45 & RJ-11. 18. The data link......

Words: 355 - Pages: 2

Unit 5

...UNIT 5 INDIVIDUAL PROJECT BUSN105 – Introduction to Business by La’Ketica T. Moore AIU Online April 22, 2013 Abstract In this unit I was asked to describe an organization basic legal, social, and economic environment. I am asked to describe the management structure and its operational and financial issues. Research and identify the impact of potential change factors including the role of technology. UNIT 5 IP Introduction The organization that will be discussed in this paper is healthcare this organization is important to this writer because it is her chosen field of employment. It is important to learn about healthcare because of all the recent changes to the law on a state, local, and federal level. This writer feels in order to learn about the healthcare regulations you need to learn about your rights as either a provider or as a patient. Basic Legal Environment The healthcare industry has come up on several changes over the past years that lead to lawsuits. Some of the legal issues that the healthcare has to deal with would be HIPPA which is the Health Insurance Portability and Accountability Act which protects the privacy of individually identifiable health information. OSHA assures the safe and healthful working of men and women by setting and enforcing standards and providing training, outreach, education and assistance. Patient documentation and communication which sparked the malpractice lawsuits over a decade ago, in keeping the patient......

Words: 841 - Pages: 4

Homework 5

...Homework 5 Solutions Assigned: 29 September 2004 Due: 06 October 2004 C:\Documents and Settings\John Bailer\My Documents\baileraj\Classes\Fall 2004\sta402\hw\Homework-5.doc 1. Refer to the 4 group (packaging method)- log-bacterial growth study. In this exercise, you will use SAS/GRAPH to construct figures displaying the means and standard deviations. a. Construct a figure containing side-by-side boxplots using the INTERPOL=BOX option associated with a SYMBOL statement used with PROC GPLOT. ODS RTF file='D:\baileraj\Classes\Fall 2003\sta402\hw\hw5-prob1a.rtf’; proc gplot data=class.meat; title h=1.5 ‘Plot of log(Bacterial count) vs. packaging condition'; title2 h=1 '[boxplot is plotted for each condition]'; symbol1 interpol=box /* plots +/- 2 SD from the mean at each conc */ value=dot; plot logcount*condition; run; ODS RTF CLOSE; [pic] b. Construct a figure with the data points plotted. Superimpose the mean plus/minus 2 std. deviation segments on this plot. ODS RTF file='D:\baileraj\Classes\Fall 2003\sta402\hw\hw5-prob1b.rtf’; proc gplot data=class.meat; title h=1.5 ‘Plot of log(Bacterial count) vs. packaging condition'; title2 h=1 '[mean +/- 2SD is plotted for each condition]'; symbol1 interpol=STD2T /* plots +/- 2 SD from the mean at each conc */ /* T= add top and bottom to each 2 SD diff */ value=dot; plot logcount*condition; run; ODS RTF CLOSE; [pic] c. ......

Words: 963 - Pages: 4

Nt1430 Unit 5 Homework

...Q3 If your firewall allowed only the machine with the ip add of 192.168.1.1 to send email outside of the network, how would you instruct the local copy of sendmail to use this server as a relay? $ cat /etc/mail/access Connect:192.168 RELAY Q4 What does dnl stand for in the m4 macro language? What are dnl commands used for? DNL stands for delete to new line, this token causes m4 to delete from the dnl to the end of the line. You can use this like the # command in the shell script. Q5 SpamAssassin is installed on your mail server, with the threshold set to an unusually low value of 3, resulting in a lot of false positives. Which rule could you give to your mail client to allow it to identify spam with a score of 5 or higher? required_score 5.00 Q6 Describe the software and protocols used when Max sends an email to Sam on a remote Linux system. a. Max’s MUA passes the email to sendmail. b. The sendmail daemon uses SMTP to deliver the email to the instance of sendmail on Sam’s system. c. On Sam’s system, sendmail passes the email to the local MDA (procmail). d. The MDA stores the email in Sam’s file in the spool directory. e. Sam’s MDA retrieves the email from the spool directory....

Words: 584 - Pages: 3

Unit 5

...Unit 5 Assignment: The Rational Consumer Name: - Course Number: - Section Number: - Unit Number: - 5 Date: - Newspaper vending machines are designed so that once you have paid for one paper; you have access to all the papers in the machine and could take multiple papers at a time. However, other vending machines dispense only one item (the item you bought). You do not have access to all the goods (sodas, candy, snacks, etc.) at one time. 1. Using the concept of marginal utility, explain why these vending machines differ? When the newspaper is purchased the marginal utility is zero as u get the same satisfaction from any newspaper purchased and you have access to many newspapers but only need one.. Sodas are only dispensed one at a time and each time one is dispensed the marginal utility lowers. Marginal utility diminishes as consumer satisfaction declines as the amount of the good or service consumed rises. So as more cokes are dispensed their marginal utility will start to decrease. Amy is shopping at a dollar store. She is currently buying 5 bracelets that cost $1 each and 4 sodas that cost $1 each. The table below indicates the marginal utility she obtains when she purchases this combination. Quantity Price per Unit MU per unit Bracelets 5 $1 30 Sodas 4 $1 40 2. A consumer maximizes utility when the last dollar spent on any good generates the same satisfaction as the last dollar spent on every other good. Is this consumer......

Words: 281 - Pages: 2

Pt1420 Unit 5 Assignment 1. Homework

...executed.” It is performed only when a certain condition is true. 2. You need to test a condition and then execute one set of statements if the condition is true. If the condition is false, you need to execute a different set of statements. What structure will you use? If the condition is false, we follow another path, which skips the action. 3. If you need to test the value of a variable and use that value to determine which statement or set of statements to execute, which structure would be the most straightforward to use? If and then 4. Briefly describe how the AND operator works. The AND operator connects two Boolean expressions into one compound expression. Both subexpressions must be true for the compound expression to be true. 5. Briefly describe how the OR operator works. The OR operator connects two Boolean expressions into one compound expression. One or both subexpressions must be true for the compound expression to be true. It is only necessary for one of the subexpressions to be true, and it does not matter which. 6. When determining whether a number is inside a range, which logical operator is it best to use? AND 7. What is a flag and how does it work? A flag is a variable that signals when some condition exists in the program. Algorithm Workbench Review: 1.Design an If- Then statement ( or a flowchart with a single alternative decision structure) that assigns 20 to the variable y and assigns 40 to the variable z if the variable x is greater than......

Words: 686 - Pages: 3

Pt1420 Unit 5 Assignment 1. Homework

...executed.” It is performed only when a certain condition is true. 2. You need to test a condition and then execute one set of statements if the condition is true. If the condition is false, you need to execute a different set of statements. What structure will you use? If the condition is false, we follow another path, which skips the action. 3. If you need to test the value of a variable and use that value to determine which statement or set of statements to execute, which structure would be the most straightforward to use? If and then 4. Briefly describe how the AND operator works. The AND operator connects two Boolean expressions into one compound expression. Both subexpressions must be true for the compound expression to be true. 5. Briefly describe how the OR operator works. The OR operator connects two Boolean expressions into one compound expression. One or both subexpressions must be true for the compound expression to be true. It is only necessary for one of the subexpressions to be true, and it does not matter which. 6. When determining whether a number is inside a range, which logical operator is it best to use? AND 7. What is a flag and how does it work? A flag is a variable that signals when some condition exists in the program. Algorithm Workbench Review: 1.Design an If- Then statement ( or a flowchart with a single alternative decision structure) that assigns 20 to the variable y and assigns 40 to the variable z if the variable x is greater than......

Words: 686 - Pages: 3

Programming Unit 10 Homework

...Unit 10 Assignment 1: Homework Short Answer Ch10 #1 Describe the three steps that must be taken when a file is used by a program. Open the file, Process the file, Close the file #2 Why should a program close a file when it’s finished using it? By closing a file, any unsaved data that is held in the buffer is saved to its file. Also, when a program closes files that are no longer being used, the files will not take up more of the operating system's resources than necessary. #4 If an existing file is opened in append mode, what happens to the file’s existing contents? In most languages, when you open an output file and that file already exists on the disk, the contents of the existing file will be erased. #5 In most languages, if a file does not exist and a program attempts to open it in append mode, what happens? The Program will create a new file Algorithm Workbench Ch10 #1 Design a program that opens an output file with the external name my_ name. dat, writes your name to the file, and then closes the file. Declare an internal name for an output file. Declare outputFile myFile // Declare the variable to hold values // that will be read from the file Declare String name // Open a file named my_name.dat on // the disk Open myFile “my_name.dat” // Write your name to the file Write myFile “Your Name” // Close the file Close myFile #2 Design a program that opens the my_ name. dat file that was created by the algo-rithm in question......

Words: 651 - Pages: 3

Unit 5

...Unit 5 Assignment 1: Homework  Short Answer 1-7 on page 158 1. Explain what is meant by the term “conditionally executed.” refers to the ability to execute a statement or sequence of statement 2. You need to test a condition and then execute one set of statements if the condition is true. If the condition is false, you need to execute a different set of statements. What structure will you use? Decision 3. If you need to test the value of a variable and use that value to determine which statement or set of statements to execute, which structure would be the most straightforward to use? 4. Briefly describe how the AND operator works. 5. Briefly describe how the OR operator works. 6. When determining whether a number is inside a range, which logical operator is it best to use? 7. What is a flag and how does it work  Algorithm Workbench Review Questions 1-5, starting on page 158 Algorithm Workbench 1. Design an If-Then statement (or a flowchart with a single alternative decision structure) that assigns 20 to the variable y and assigns 40 to the variable z if the variable x is greater than 100. If x > 100 Then Set y == 20 Set z ==40 End If 2. Design an If-Then statement (or a flowchart with a single alternative decision structure) that assigns 0 to the variable b and assigns 1 to the variable c if the variable a is less than 10. If A...

Words: 251 - Pages: 2

Unit 10 Homework Pt1420

...Unit 10 Assignment Homework PT1420 Intro to Programming True or False 1. When working with a sequential access file, you can jump directly to any piece of data in the file without reading the data that comes before it. False 2. In most languages, when you open an output file and that file already exists on the disk, the contents of the existing file will be erased. True 4. The purpose of an EOF marker is to indicate where a field ends. Files typically contain several EOF markers. False 5. When an input file is opened, its read position is initially set to the first item in the file. True Algorithm Workbench 1. Design a program that opens an output file with the external name my_ name. dat, writes your name to the file, and then closes the file. Declare an internal name for an output file. 2 Declare OutputFile myFile 3 4 // Declare the variable to hold values 5 // that will be read from the file 6 Declare String name 7 8 // Open a file named my_name.dat on 9 // the disk 10 Open myFile “my_name.dat” 11 12 // Write your name to the file 13 Write myFile “Your Name” 14 15 // Close the file 16 Close myFile 2. Design a program that opens the my_ name. dat file that was created by the algo-rithm in question 1, reads your name from the file, displays the name on the screen, and then closes the file. Declare InputFile myName Declare String name Open myName "my_Name.dat" Display "Your name is: " While NOT eof (myName) Read......

Words: 610 - Pages: 3

Unit 5

...Unit 5 assignment 1 When performing a cable installation there are a lot of things that you have to put into consideration. You want to draw up a plan first and some things that you would want to include in the plan would be where your telecommunications rooms are located, What is the distance from your leased line to your core router, and what type of cable are you going to be using for your backbone and horizontal lines. The first thing shouldn’t be cost when you are designing a network. You want to think of the safety and how your network will function with different mediums of cable. This things are important because your network to meet the needs of the company. You also want to make sure you have things in place like what type of fire protection your network will have. You want to make sure your racks in your telecommunication rooms are grounded properly. Without these things your network will not be very safe. You want it to be useful but you don’t want to lose everything in a telecommunications room because you failed to plan ahead for accidents that can happen. Well once you have your plan intact and it has been approved you need to think about how you are going to get this cable in the building. What types of tools are you going to need? If you are going to run CAT 5e though out the building you will need several different tools; such as cable pulleys, punch downs, wire cutters, and cable strippers. You will need most of these tools to install your cable into......

Words: 478 - Pages: 2

It 222 Unit 2 Homework

...Unit 2 Homework IT222 Kristopher Redmond Fill in the Blank pgs. 75-76 Complete the following sentences by writing the correct word or words in the blanks provided. 1. The amount of time that it takes for a change to be replicated to all domain controllers in an environment is called _________. Convergence 2. The default _________ of any new site link is 100. Cost 3. Intersite replication uses _________ traffic to reduce the impact to bandwidth on corporate WAN links. Compressed. 4. The KCC creates a(n) _________ to allow replication to take place in the opposite direction in the event that a single domain controller in the replication topology fails. Dual counter-rotating ring. 5. The purpose of the KCC is to create a(n) _________ between multiple domain controllers within a site as well as between sites. Replication topology. 6. By default, all Active Directory site links are _________. Transitive. 7. When Active Directory detects a replication conflict in which two objects have been modified nearly simultaneously, the first attribute that Active Directory will use as a tie-breaker is the _________. Version ID. 8. Active Directory will designate a(n) _________ within each site to manage intersite replication activity. Bridgehead server. 9. The minimum _________ that you can assign to a site link is 15 minutes. Frequency. 10. Within a single site, domain controllers will use _________ to inform other DCs that intrasite replication needs......

Words: 395 - Pages: 2

Pt1420 Unit 1 Homework

...Jonathan Ford Intro to Programming Unit 1 Homework 4/13/16   1. Why is the CPU the most important component in a computer?       a. Without the CPU, the computer could not run software. The CPU is the part of the computer that actually runs the programs. (pg. 3)   2. What number does a bit that is turned on represent? What number does a bit that is turned off represent?       b. 1 represents a bit that is turned ON. 0 represents a bit that is turned OFF. (pg. 8)   3. What would you call a device that works with binary data?       c. A device that works with binary data is called a DIGITAL device. (pg. 11)   4. What are the words that make up a high-level programming language called?       d. The words that make up a high-level programming language are known as KEY WORDS or RESERVED WORDS. (pg. 17)   5. What are the short words that are used in assembly language called?       e. The short words that used in assembly language are called MNEMONICS. (pg. 14)   6. What is the difference between a compiler and an interpreter?       f. A COMPILER is a program that translates a high-level language program into a separate machine language program. An INTERPRETER is a program that both translates and executes the instructions in a high-level language program. (pg. 17-18)   7. What type of software controls the internal operations of the computer’s hardware?       g. An operating system controls the internal operations of the computer’s hardware....

Words: 254 - Pages: 2

Unit 5

...individuals and the nation, using selected examples. | |Discuss how different types of health promotion are used to benefit the health and wellbeing of individuals and the nation, using selected | | |examples. | | M1/D1 Unit 5 |Name & type of Health promotion |Describe what it shows [Effect of alcohol & impact of alcohol] |What message is it trying to promote? |How could this benefit the individual? |How could this benefit the nation? |Is this an effective promotion? | |[E.g. leaflet/poster/video] | | | | |Explain your answer giving some examples of statistics | |Reference | ......

Words: 1717 - Pages: 7

Unit 5

...IT113 Unit 5 Homework Chapter 6 1. What are the 3 basic tools required to install a plug for UTP cable? A. Stripper (the wire kind), wire cutter, cable crimper 2. What type of fiber-optic tester should you purchase to make sure the fiber-optic cable was installed without any fault and that enough light is being transmitted through the fiber, and what are the three key attributes to know before you purchase a tester? A. You want the tester to have the capability for correct fiber connectors, support the correct type of fiber (single vs. multi mode) and test appropriate wavelength. You should purchase an attenuation tester since you are testing for the power of the light transmission. 3. Which of the following supplies enables the reduction of friction on the cables while being pulled? A. Wire pulling lubricant Chapter 9 1. What are the main aspects that must be addressed when designing and installing wall plates? A. Fixed or modular design wall plate, wall plate location, manufacturer system, and wall plate mounting system. 2. Which TIA standards should you refer to for ensuring proper design and installation of wall plates? A. Residential is ANSI/TIA-570-B, Commercial is ANSI/TIA-568-C.1 3. Your commercial office building environment is expected to change over the next few years as some of the network devices that are presently installed with coax connections need to be converted to RJ-45 and some network devices that are currently RJ-45 connections may......

Words: 408 - Pages: 2