Linking Lab 1

In: Science

Submitted By fatback
Words 2154
Pages 9
Name: Faith Shell
Basic Coordinates & Seasons – Student Guide There are three main sections to this module: terrestrial coordinates, celestial equatorial coordinates, and understanding how the ecliptic is related to seasons on the Earth. Each of these sections has its own simulator(s). The background material necessary to utilize these tools is contained in each section.
Terrestrial Coordinates
Work through the explanatory material on units of longitude and latitude, finding longitude and latitude, and a bit of history (optional). * Open the flat map explorer. * Familiarize yourself with the cursor and how it prints out the longitude and latitude of the active map location. * Note that you can vary the central meridian of the map (i.e. change its longitude). Use the “shift map” arrows at the top of the simulator to affect large rapid changes. Use the shift-click feature of the cursor for finer control. * Note what information is accessible through the show cities and show map features check boxes. * Center the cursor on your present location. Click the open Google Maps button to launch the Google Map tool focused on this location. Experiment until you get a good feeling for the Google Map’s capabilities and then close this window. (Note that you must be connected to the Internet to make use of this feature.) Question 1: Use the flat map explorer to complete the following table. You are encouraged to try and predict the answers and then use the map’s cursor and other features to check the accuracy of your estimates. Location | Longitude | Latitude | The center of the island of Madagascar. | -19.864952 W | 46.446750 | North Pacific Ocean | 157.5º W | 21.2º N | Greenwich, England | Prime Meridian | 51.8º N | Havana, Cuba | 82.1º W | Tropic of Cancer | Sao Paulo, Brazil | 23.5500’S |…...

Similar Documents

Lab 1

...Assessment Worksheet 111 LAB #7 – ASSESSMENT WORKSHEET Relate Windows Encryption and Hashing to Confidentiality and Integrity Course Name and Number: Student Name: Instructor Name: Lab Due Date: Overview This lab demonstrated how hashing tools can be used to ensure message and file transfer integrity and how encryption can be used to maximize confidentiality. Common hashing and encryption tools, including MD5, SHA1, and GnuPG, were used. You used GnuPG to generate both a public and private key and a secret key for encryption only. Lab Assessment Questions & Answers 1. If you and another person want to encrypt messages, should you provide that person with your public 7 Relate Windows Encryption and Hashing to Confidentiality and Integrity key, private key, or both? You should both provide each other with your public keys. 2. What does GPG allow you to do once it is installed? GPG allows you to encrypt and decrypt data and generate public and private keys. 3. Name two different types of encryption supported by GPG for your key. GPG supports symmetric ciphers DES and Blowfish as well as asymmetric ciphers ELGamal and RSA. 112 LAB #7 | Relate Windows Encryption and Hashing to Confidentiality and Integrity 4. What happens when you sign and trust a new key to your keychain? A new private and public key is created with a fingerprint for non repudiation. 5. If a user sends you his/her public key, will he/she be able to decrypt your......

Words: 472 - Pages: 2

Lab 1

...Assessment Worksheet 15 1 Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Using Zenmap GUI (Nmap) LAb #1 – ASSESSMENT WORKSHEET Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Course Name and Number: student Name: Instructor Name: Lab due date: Overview Hackers typically follow a five-step approach to seek out and destroy targeted hosts. The first step in performing an attack is to plan the attack by identifying the target and learning as much as possible about it. Hackers usually perform an initial reconnaissance and probing scan to identify IP hosts, open ports, and services enabled on servers and workstations. In this lab, you will explore the Virtual Security Cloud Lab (VSCL). You will learn how to access several different applications, including PuTTY and the Zenmap Graphical User Interface (GUI) for the Nmap Security Scanner application. You will use the data you uncover to plan an attack on 172.30.0.0/24 where the VM server farm resides. Lab Assessment Questions & Answers 1. Name at least five applications and tools pre-loaded on the TargetWindows01 server desktop, and identify whether that application starts as a service on the system or must be run manually. windows applicaTion loaded 1. 2. 3. 4. 5. sTarTs as service Y/n q Yes q Yes q Yes q Yes q Yes q No q No q No q No q No 2. What was the allocated source IP host address for the TargetWindows01 server, LAN Switch 1, LAN Switch 2, and the IP default......

Words: 489 - Pages: 2

Lab 1

...1. Name at least five applications and tools pre-loaded on the TargetWindows01 server desktop, and identify whether that application starts as a service on the system or must be run manually. Windows application loaded sTarTs as service Y/n 1. q Yes q No adobe reader 2. q Yes Wireshark q No 3. q Yes q No Nessus 4. q Yes q No Firefox 5. q Yes Nmap q No 2. What was the allocated source IP host address for the TargetWindows01 server, TargetUbuntu01 server, and the IP default gateway router? IP default 172.30.0.8 server 14147 LAb #1 – ASSESSMENT WORKSHEET 1 1 Assessment Worksheet 15 38351_LB01_Pass4.indd 15 23/04/13 10:02 PM 3. Did the targeted IP hosts respond to the ICMP echo-request packet with an ICMP echo-reply packet when you initiated the “ping” command at your DOS prompt? If yes, how many ICMP echo-request packets were sent back to the IP source? Yes it did I got four back 4. If you ping the TargetWindows01 server and the UbuntuTarget01 server, which fields in the ICMP echo-request/echo-replies vary? The TTL changes from 64 to 128 5. What is the command line syntax for running an “Intense Scan” with Zenmap on a target subnet of 172.30.0.0/24? nmap -T4 -A -v -PE -PS22,25,80 -PA21,23,80,3389 172.30.0.0/24 6. Name at least five different scans that may be performed from the Zenmap GUI. Document under what circumstances you would choose to run those particular scans. Intense Scan-Complete Nmap report about all of the host discovered......

Words: 442 - Pages: 2

Lab 1

...Assessment Worksheet 15 1 Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Using Zenmap GUI (Nmap) LAb #1 – ASSESSMENT WORKSHEET Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Course Name and Number: Student Name: Instructor Name: Lab due date: Overview Hackers typically follow a five-step approach to seek out and destroy targeted hosts. The first step in performing an attack is to plan the attack by identifying the target and learning as much as possible about it. Hackers usually perform an initial reconnaissance and probing scan to identify IP hosts, open ports, and services enabled on servers and workstations. In this lab, you planned an attack on 172.30.0.0/24 where the VM server farm resides, and used the Zenmap GUI to perform an “Intense Scan” on the targeted IP subnetwork. Note: These forms have been formatted to allow you to complete the form online and save it using Adobe Reader. You may experience problems with either or both of these actions if you are using any other software program. Lab Assessment Questions & Answers 1. Name at least five applications and tools pre-loaded on the TargetWindows01 server desktop, and identify whether that application starts as a service on the system or must be run manually. windows applicaTion loaded 1. 2. 3. 4. 5. sTarTs as service Y/n q Yes q Yes q Yes q Yes q Yes q No q No q No q No q No 16 Lab #1 | Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) 2.......

Words: 467 - Pages: 2

Lab 1

...Assessment Worksheet 15 1 Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Using Zenmap GUI (Nmap) LAb #1 – ASSESSMENT WORKSHEET Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Course Name and Number: Student Name: Instructor Name: Lab due date: Overview Hackers typically follow a five-step approach to seek out and destroy targeted hosts. The first step in performing an attack is to plan the attack by identifying the target and learning as much as possible about it. Hackers usually perform an initial reconnaissance and probing scan to identify IP hosts, open ports, and services enabled on servers and workstations. In this lab, you planned an attack on 172.30.0.0/24 where the VM server farm resides, and used the Zenmap GUI to perform an “Intense Scan” on the targeted IP subnetwork. Note: These forms have been formatted to allow you to complete the form online and save it using Adobe Reader. You may experience problems with either or both of these actions if you are using any other software program. Lab Assessment Questions & Answers 1. Name at least five applications and tools pre-loaded on the TargetWindows01 server desktop, and identify whether that application starts as a service on the system or must be run manually. windows applicaTion loaded 1. 2. 3. 4. 5. sTarTs as service Y/n q Yes q Yes q Yes q Yes q Yes q No q No q No q No q No 16 Lab #1 | Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) 2.......

Words: 467 - Pages: 2

Lab 1

...Lab 1: Input, Processing, and Output This lab accompanies Chapter 2 of Starting Out with Programming Logic & Design. Name: ___________________________ Lab 1.1 – Algorithms This lab requires you to think about the steps that take place in a program by writing algorithms. Read the following program prior to completing the lab. Write a program that will take in basic information from a student, including student name, degree name, number of credits taken so far, and the total number of credits required in the degree program. The program will then calculate how many credits are needed to graduate. Display should include the student name, the degree name, and credits left to graduate. Step 1: Examine the following algorithm. (Reference: Designing a Program, page 31). 1. Get the student name. 2. Get the degree program name. 3. Subtract the number of credits taken so far from the required credits for the degree. 4. Get the number of credits required for the degree program. 5. Get the number of credits the student has taken so far. 6. Display the input information in Step 1 and 2. 7. Display the calculated information. Step 2: What logic error do you spot and how would you fix it? Step 3: What steps require user interaction (Ex: user must type in some input)? Lab 1.2 – Pseudocode This lab requires you to think about the steps that take place in a program by writing pseudocode. Read the following......

Words: 2451 - Pages: 10

Lab#1

...IS 3220July 7, 2014 Lab #1 Analyze Essential TCP/IP Networking Protocols 1. What is the purpose of the address resolution protocol (ARP)? ARP is used to mediate between Ethernet (and other broadcast link-level protocols) and the network layer, or IP protocols. Put more simply, ARP converts IP addresses to Ethernet addresses. 2. What is the purpose of the dynamic host control protocol (DHCP)? DHCP (Dynamic Host Configuration Protocol) is a communications protocol that lets network administrators centrally manage and automate the assignment of Internet Protocol (IP) addresses in an organization's network. http://searchunifiedcommunications.techtarget.com/definition/DHCP/ARP. Lab #2 Network Documentation 1. When you TELNET to LAN Switch 1 and LAN Switch 2, why is it a good idea to first PING an IP interface or port’s IP address? The ping verifies connectivity by sending ICMP echo packets to a host and listening for an echo reply. This will detect if there are any name resolution issues. 2. Why is using Telnet a security risk for an IP network infrastructure? Telnet sessions are in clear text and programs such as packet sniff can capture passwords and then use them to log into those sessions. 3. How can you mitigate the security risk caused by Telnet? Intrusion detection is a packet inspection tool that monitors, intercepts and responds to abuse in real time. ICMP inspection permits responses to ICMP packets like ping and traceroute that come......

Words: 427 - Pages: 2

Lab 1

...Laboratory #1 Lab #1: Evaluate Business World Transformation – Impact of the Internet and WWW Learning Objectives and Outcomes Upon completing this lab, students will be able to complete the following tasks: * Identify the security challenges on the web as they relate to various business models and the impact that is made in e-Commerce and Internet-based deployments * Extract various businesses’ personal identifiable information (PII) that is collected and stored from Internet users by a business in a web application * Distinguish among the different reasons for the attacks on web sites and determine exactly what the attackers are after when they target your WWW presence * Evaluate the current state of security on a LAMP server using Telnet, Skipfish and TCPdump to identify whether the proper tools are installed for a security evaluation of the server * Install and use Firefox Web Browser with the Live HTTP Headers plug-in Lab #1 – Compromised Business Application Impact Analysis Course Name & Number: ______________________________________________________________ Student Name: _______________________________________________________________________ Instructor Name: _____________________________________________________________________ Lab Due Date: _______________________________________________________________________ Overview The threats of the Internet go way beyond an attacker defacing your website. An attack can include......

Words: 849 - Pages: 4

Lab 1

...© Jones & Bartlett Learning, LLC. NOT FOR SALE OR DISTRIBUTION Lab #1 - Assessment Worksheet Performing Network Reconnaissance using Common Tools Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview In this lab, you explored the common tools available in the virtual lab environment. You used Wireshark to capture and analyze network traffic, OpenVAS to scan the network, reviewed a sample collection of data using NetWitness Investigator, connected to a remote Windows machine and explored two file transfer applications, FileZilla and Tftpd64. You used PuTTY to connect to a Linux machine and ran several Cisco commands to display statistics for the network interfaces. Finally, you used Zenmap to perform a scan of the network and created a network topology chart. Lab Assessment Questions & Answers 1. Name at least five applications and tools used in the lab. 2. What is promiscuous mode? 3. How does Wireshark differ from NetWitness Investigator? 4. Why is it important to select the student interface in the Wireshark? 5. What is the command line syntax for running an Intense Scan with Zenmap on a target subnet of 172.30.0.0/24? 6. Name at least five different scans that may be performed with Zenmap...

Words: 258 - Pages: 2

Lab 1

...Unit 1 Labs Lab 1.1 Step 13 Lab 1.2 Define Major Topics for a Database NOUNS | MAJOR TOPIC | Doctors | Patients | Drugs | Side Effects | Researchers | Patient Information | Westlake Research Hospital | Conducting test of new Depression Drugs | Lab 1.3 Create a Statement of Work Scope The Software-Tracking database will be used to help manage the school’s software licensing. The software will be monitored for lifecycle and version corrections as well as keeping track of the number of users accessing the software under the constraints of the license agreement. The faculty and staff computers will be tracked for which version and licensed copy of software is currently running on each system. Constraints The database can be used for accessing the faculty and staff’s logon to the school employee website for the purpose of inputting and updating hours worked. Faculty and staff members can conduct business related work, such as adjusting work schedules, and student’s grades in the system but are not able to view student’s personal files in the registrars system. Objectives * Make for a more efficient system by allowing employees to have control of shared calendars and student’s grades. * Improve the tracking of Software Licensing and the Lifecycle of programs. Tasks and Timeline 1. Gathering Data: Meet with School Board and those involved to discuss the needs and wants for a database. Time Allotted: 3 weeks. Deliverables: A list of......

Words: 365 - Pages: 2

Basic Coordinates and Seasons Linking Lab

...1. 46.52 E 19.54 S 2. Oahu, Hawaii 3. Essex, UK 4. Havana, Cuba 5. 46.1 W 23.1 S 6. Fairbanks, AK 7. Great Pyramid at Giza 8. Alaska 9. Hawaii 10. Alaska/Maine 11. Alaska 12. 38°53'49.2"N 77°02'11.4"W 13. On top of the flat map but the area is flattened and wider 14. On top of the globe, small dot 15. Because it could not be accurately represented on the flat map due to flattening and dimensions. 16. No they do not. 17. North Celestial Pole (Ursa Minor), +89 15’50.8 18. RA: 5h 55m 10s DEC: 7 degrees 24.426’ RA: 5h 14m 32s DEC: -08 degrees 12’5.89’ 19. Left, the equatorial system is nearly the same just mirrored 20.Ecliptic Location: Winter Solstice Approximate date: Sept 22 RA: 0h, 6h, 12h, 18h DEC: 0, 23.45, 0, -23.45 21. The ecliptic is slightly above the celestial equator and crosses at the vernal equinox. The right ascension on the equinox increases by 1h,2h,3h while the ecliptic moves by degrees 15,30,45 etc. 22. RA: 21.3h, 23.9, 2.9, 8.2, 9.2, 12.1, 1.9, 18.1 DEC: -15.8, 0.0, 20.0, 16.3, -0.6, -16.6, -23.4 Latitude of most direct: 15.8, 0.0, 16.5, 23.2, 16.2, 0.0, 16.6, 23.5 Latitude of least direct ray: 74.1 N, 90 N, 66.5 S, 73.9 S, 90 N, 73.6 N, 66.4 N 23. DEC is approximately equal to the latitude of the most direct ray and negative DEC corresponds to south latitudes. 24. The tropic of Cancer is the northernmost point on Earth where the sun’s rays can appear directly overhead at noon. The tropic of Capricorn is the southernmost point......

Words: 517 - Pages: 3

Lab #1

...Lab #1 – Assessment Worksheet Performing Reconnaissance and Probing Using Common Tools Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview In this lab, you explored the common tools available in the virtual lab environment. You used Wireshark to capture and analyze network traffic and OpenVAS to scan the network. You reviewed a sample collection of data using NetWitness Investigator, connected to a remote Windows machine, and explored two file transfer applications, FileZilla and Tftpd64. You used PuTTY to connect to a Linux machine and ran several Cisco commands to display statistics for the network interfaces. Finally, you used Zenmap to perform a scan of the network and created a network topology chart. Lab Assessment Questions & Answers 1. Name at least five applications and tools used in the lab. Wireshark , NetWitness Investigator ,OpenVAS ,PuTTY ,FileZilla . 2. What is promiscuous mode? Promiscuous mode allows Wireshark to capture any packets to any host on the same subnet or virtual LAN. if the promiscuous mode is not selected Wireshark will only capture the packets passing through the virtual LAN. 3. How does Wireshark differ from NetWitness Investigator? NetWitness analyze......

Words: 401 - Pages: 2

Lab 1

...Lab #1 – Assessment Worksheet Performing Reconnaissance and Probing Using Common Tools Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview In this lab, you explored the common tools available in the virtual lab environment. You used Wireshark to capture and analyze network traffic and OpenVAS to scan the network. You reviewed a sample collection of data using NetWitness Investigator, connected to a remote Windows machine, and explored two file transfer applications, FileZilla and Tftpd64. You used PuTTY to connect to a Linux machine and ran several Cisco commands to display statistics for the network interfaces. Finally, you used Zenmap to perform a scan of the network and created a network topology chart. Lab Assessment Questions & Answers 1. Name at least five applications and tools used in the lab. FileZilla, NetWitness Investigator, OpenVAS, PuTTY, and Wireshark. 2. What is promiscuous mode? This mode allows Wireshark to capture packets destine to any host on the subnet. 3. How does Wireshark differ from NetWitness Investigator? Wireshark looks at individual packets and is a up close detailed view. NetWitness Investigator give a overview of all the packets captured. 4. Why is......

Words: 365 - Pages: 2

Lab 1

...Assessment Worksheet Performing Reconnaissance and Probing Using Common Tools Introduction to Computer Security CSS150 Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview In this lab, you explored the common tools available in the virtual lab environment. You used Wireshark to capture and analyze network traffic and OpenVAS to scan the network. You reviewed a sample collection of data using NetWitness Investigator, connected to a remote Windows machine, and explored two file transfer applications, FileZilla and Tftpd64. You used PuTTY to connect to a Linux machine and ran several Cisco commands to display statistics for the network interfaces. Finally, you used Zenmap to perform a scan of the network and created a network topology chart. Lab Assessment Questions & Answers 1. Name at least five applications and tools used in the lab. Putty, Wireshark, Zenmap, FileZilla, Tftpd64, OpenVAS, NetWitness Investigator 2. What is promiscuous mode? Promiscuous mode is a network interface mode in which the NIC (network interface card) reports every packet that it sees on the same subnet or VLAN. Does not assume that this mode means you will see all traffic on you network mode but for purposes......

Words: 531 - Pages: 3

Linking Lab 1 Astr101

...Internet to make use of this feature.) Question 1: Use the flat map explorer to complete the following table. You are encouraged to try and predict the answers and then use the map’s cursor and other features to check the accuracy of your estimates. Location | Longitude | Latitude | The center of the island of Madagascar. | 46.5 E | 19.5 S | Just north of the Hawaiian Islands | 157.5º W | 21.2º N | Greenwich England | Prime Meridian | 51.8º N | Havana Cuba | 82.1º W | Tropic of Cancer | Sao Paulo, Brazil | 23.7 S | 46.8 W | Chukchi Sea between Russia & Alaska | International Date Line | Arctic Circle | Somewhere in Tibet | 90º W Meridian | 30º N Parallel | Question 2: Determine which of the 50 states defines the farthest extent of the United States in each of the 4 map directions. Direction | State | North | Alaska | South | Hawaii | East (there are two ways of thinking about this) | Alaska or Maine | West | Alaska | Question 3: The exact coordinates of the white house in Washington D.C., are 77.0365º W and 38.897º N. What are these exact coordinates in sexadesimal notation? **Show your calculation in the box below. (You can use the Google Map tool to check your answer.) 77 degrees 2’11” W ** (.0365*60=2.19 which becomes 2’ / .19*6=11.4 which becomes 11”, then put together 77degrees 2’11”) 38 degrees 53’23.52” N ** (.897*60=53.82 which becomes 53’ / .392*60 = 23.52” **Here's How: 1. The whole units of degrees will......

Words: 2457 - Pages: 10