...Exams & Answer Keys Exams & Answer Keys Networking Application Services and Security Course Revision Table Footer Date: 09/30/07 10/10/07 Section: All All Reason for Change: New Curriculum QA Edits Implementation Date: December 2007 December 2007 © ITT Educational Services, Inc. Date: 10/10/07 Exams & Answer Keys [Exam I —Unit 6] DATE: ________________________________ STUDENT NAME: ________________________________ COURSE NUMBER: ________________________________ INSTRUCTOR: ________________________________ ITT COLLEGE: ________________________________ General Instructions: 1. This is a closed-book, closed-notes Exam. No reference material (including assignments and lab) will be permitted for use during the exam session. 2. The exam contains true/false and multiple choice types of questions. 3. Please use the separate answer sheet provided to you for marking your answers. 4. Each question is worth two points. Good luck! © ITT Educational Services, Inc. Date: 10/10/07 Exams & Answer Keys 1. The most common cause of security breaches is ______. a. no alarm system b. weak passwords c. untrained security guards d. poor perimeter lighting 2. Windows Server administrators should not use the Administrator account for everyday activity. They should use the ________ command, only when performing administrative functions. a. super user b. run as c. task manager d. power user 3. For organizations with wireless networks, deployment of ________ is necessary...
Words: 3277 - Pages: 14
...Systems Security 400 Level Capstone Project IS418 IS404 Access Control, Authentication & KPI IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications Securing Linux Platforms & Applications 300 Level IS305 Managing Risk in Information Systems IS308 Security Strategies for Web Applications & Social Networking IS316 Fundamentals of Network Security Firewalls & VPNs IS317 Hacker Techniques Tools & Incident Handling EC311 Introduction to Project Management IT250 Linux operating System ment CNS Program Prerequisites: ©ITT Educational Services, Inc. Date: 10/25/2010 Introduction to Information...
Words: 4296 - Pages: 18
...Unit 1 None Unit 2 Search and explore the ITT Tech Virtual Library for resources on the Linux Filesystem. Use the following keywords and phrases to help you locate appropriate resources: ext file system Linux hierarchical file system Linux standards base Linux directory structure Unit 3 Search and explore the ITT Tech Virtual Library for resources on bash. Use the following keywords and phrases to help you locate appropriate resources: bash scripts bash history bourne shell bourne again shell commands in Linux Unit 4 Search and explore in the following places. Find resources that help you understand how CUPS is used for printer management. Submit one resource from the ITT Tech Virtual Library and one from the Chapter 14 suggested resources. ITT Tech Virtual Library The More Information section of textbook Chapter 14, page 561 Use the following keywords and phrases to help you locate appropriate resources: CUPS server CUPS in Linux Linux printer configuration Fedora 15 printer server Unit 5 Search and explore in the following places. Find resources that help you understand mail services in Linux. ITT Tech Virtual Library The More Information section of textbook Chapter 20, page 732 Use the following keywords and phrases to help you locate appropriate resources: Send mail configuration SMTP in Linux Dovecot Email servers in Linux Fedora 15 email server Unit 6 Search and explore the ITT Tech Virtual Library for information on the...
Words: 467 - Pages: 2
...------------------------------------------------- Wireless Network Release Form Your access to ITT wireless network is subject to the “Computer and Electronic Information Policy” contained in Appendix D of the Student Handbook, and the Wireless Network Usage Guidelines document accompanying this form. This form must be signed by the student, and turned in to the Network Administrator. Student Network Login ID: Name (Printed) Name (Signed) Date ------------------------------------------------- Student Wireless Information Packet Directions for adding printers included ------------------------------------------------- Please sign and return the form on the last page to the System Support Technician’s office in order to obtain access to the ITT wireless network. Wireless Networking – User Responsibilities * ITT students will follow the terms of all applicable ITT policies, procedures, guidelines, standards, and all applicable local, state and Federal regulations when using equipment connected to ITT’s network whether or not the individual is using wireless or wired network connections. * Users will implement the recommended security software, hardware settings, patches, and protocols on end-user equipment used to access ITT’s wireless network. * Users assume responsibility for support and troubleshooting of problems when using wireless network interface cards not supported by ITT. * Users will report known misuse or abuse of the wireless...
Words: 2514 - Pages: 11
...ITT Technical Institute IT255 Introduction to Information Systems Security Onsite Course SYLLABUS Credit hours: 4 Contact/Instructional hours: 50 (30 Theory Hours, 20 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: IT220 Network Standards and Protocols, IT221 Microsoft Network Operating System I, IT250 Linux Operating System Course Description: This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas: Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security Capstone Project 400 Level IS404 Access Control, Authentication & KPI IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications IS418 Securing Linux Platforms & Applications IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications ...
Words: 4114 - Pages: 17
...Syllabus NT2799 Network Systems Administration Capstone Project SYLLABUS Credit hours: 4.5 Contact hours: 56 (34 Theory, 22 Lab) Prerequisite(s): Completion of a minimum of 72 credits earned in the program of study including NT2640 IP Networking or equivalent. © ITT Educational Services, Inc. All Rights Reserved. -1- 13/01/2013 Network Systems Administration Capstone Project SYLLABUS COURSE SUMMARY COURSE DESCRIPTION This course provides an opportunity for students to work on a comprehensive project that includes the design, planning and implementation of a network solution for solving specific business problems. Common project management processes are applied to identify deliverables and outcomes of the project. MAJOR INSTRUCTIONAL AREAS 1. Project Management Techniques 2. A Fundamental Review of the Basics of Electronics in the AASNSA Program 3. Capstone Project 4. Research of Current and Emerging Technology COURSE OBJECTIVES 1. Apply important concepts of project management to the actual capstone project proposed for this course. 2. Use Microsoft Office Project to help plan and manage the actual capstone project. 3. Analyze the requirements for the capstone project. 4. Integrate and apply the knowledge acquired in the program to provide effective technological solutions for given problems. 5. Work in teams on a large-scope project. 6. Document solutions to a problem in detail...
Words: 7871 - Pages: 32
...ITT-TECH Institute Hanover, MD Configuring and Maintaining the DHCP and DNS Server Roles Unit 2 Jovanny Avelino Client-Server II NT1330 Professor Arthur VIII Due: 3/21/2016 DHCP: DHCP is a standard protocol that make TCP/IP network configuration much easier for the administrator by dynamically assigning IP addressing and providing additional configuration information to DHCP clients automatically. DHCP configuration information can centrally manage all information can stored in one single location. Because DHCP is dynamically host configuration can eliminate the prose of manually configured all client IP address. Other benefit of DHCP is the opportunity of set up the subnet mask, default gateway and the DNS IP address. And give the flexibility of change IP address when is need it. The DHCP server have different ways to communicate with the client: * DHCPDISCOVER: is when the client send a broadcast to find a DHCP server. * DHCPOFFER: soon and he server find the client than the server respond, and send a offer. * DHCPREQUEST: is when the client respond to the offered from the DHCP server. * DHCPDECLIEN: mean that the client declined the DHCP server offered. * DHCPACK: is the way the DHCP server confirm the IP address and configuration parameters. * DHCPRELEASE: is the way the client cancel the IP address lease. * DHCPINFORM: is a message send by the client asking for additional configuration parameters, also use for detect unauthorized...
Words: 650 - Pages: 3
...ITT Technical Institute NT1230 Client-Server Networking I Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisite or Corerequisite: NT1210 Introduction to Networking or equivalent Course Description: This course introduces operating principles for the client-server based networking systems. Students will examine processes and procedures involving the installation, configuration, maintanence, troublshooting and routine adminstrative tasks of popular desktop operating system(s) for standalone and network client computers, and related aspects of typical network server functions. Client-Server Networking I Syllabus Where Does This Course Belong? 1st QTR GS1140 NT1110 GS1145 Problem Solving Theory Computer Structure and Logic Strategies for the Technical Professional 2nd QTR NT1210 Introduction to Networking NT1230 Client-Server Networking I MA1210 College Mathematics I 3rd QTR NT1310 NT1330 MA1310 4th QTR PT1420 NT1430 EN1320 5th QTR PT2520 NT2580 EN1420 6th QTR NT2640 NT2670 CO2520 7th QTR NT2799 SP2750 Physical Networking Client-Server Networking II College Mathematics II Introduction to Programming Linux Networking Composition I Database Concepts Introduction to Information Security Composition II IP Networking Email and Web Services Communications Network Systems Administration Capstone Project Group Theory The follow diagram indicates how this course...
Words: 1834 - Pages: 8
...ITT Tech | Week 7 Comparison of RADIUS and DIAMETER | [Type the document subtitle] | Jackie Cooper 2/5/2014 | Remote Authentication Dial In User Service (RADIUS) is a networking protocol that provides centralized Authentication, Authorization, and Accounting (AAA) management for users that connect and use a network service. RADIUS was developed by Livingston Enterprises, Inc. in 1991 as an access server authentication and accounting protocol and later brought into the Internet Engineering Task Force (IETF) standards. Because of the broad support and the ubiquitous nature of the RADIUS protocol, it is often used by ISPs and enterprises to manage access to the Internet or internal networks, wireless networks, and integrated e-mail services. These networks may incorporate modems, DSL, access points, VPNs, network ports, web servers, etc. RADIUS is a client/server protocol that runs in the application layer, using UDP as transport. The Remote Access Server, the Virtual Private Network server, the Network switch with port-based authentication, and the Network Access Server (NAS), are all gateways that control access to the network, and all have a RADIUS client component that communicates with the RADIUS server. RADIUS is often the backend of choice for 802.1X authentication as well. The RADIUS server is usually a background process running on a UNIX or Microsoft Windows server. Diameter is an authentication, authorization, and accounting protocol for computer...
Words: 669 - Pages: 3
...2 Chapter Exercises 1. Certain Ethernet adapters for ISA PC systems have limitations which can lead to serious network problems, particularly with NFS. This difficulty is not specific to FreeBSD, but FreeBSD systems are affected by it. 2. You must check if the directory you want to mount is actually exported on the NAS Gateway 500. To check what file systems, directories, or files are exported from NAS Gateway 500, use the showmount command. If NAS Gateway 500 doesn’t respond to the showmount command, you should check if the NFS server daemons are running at NAS Gateway 500. 3. By manually editing the NFS configuration file, and through the command line, i.e. through exportfs. 4. Read-write/ 192.16.0.0/var/ITT-Tech library 5. Refer to lab. 6. NFS attribute caching can cause inconsistencies when large numbers of client nodes are asked to access files that have been updated recently and the attribute caching data on the client has not expired. Disabling attribute caching eliminates the problem but may degrade performance for frequent file operations requiring file attribute data. 7. Mountfs 8. Diskless system - is a workstation or personal computer without disk drives, which employs network booting to load its operating system from a server. PXE boot - is an environment to boot computers using a network interface independently of data storage devices (like hard disks) or installed operating systems. Dataless system - Diskless and dataless clients are machines that are...
Words: 260 - Pages: 2
...Assignment 1 Client Server Configuration Unit 7 Assignment 1 Client Server Configuration Robert D Williams ITT-Tech MR. Brockman NT1230 Client Server Networking Friday, February 10, 2012 The hardware side should be set up with raided hard disks preferable in as a raid 6. There should be at least two NICs for each server to ensure that connectivity is not lost. IT recommends that we have at least three hours of a backup power available. In order to cut costs IT would like to if more then one server is required to set up virtual servers. The server roles that we network administration recommends would include, active directory services for security to ensure that they only authorized persons are accessing the system and to help to make sure that if necessary encrypt the information so that if the system is breached the information stays secure. An active directory domain services so that IT can manage the system better. This would include user profiles and is a required to add other services that will be needed as well. An active directory domain rights service is recommend to help ensure that only the users that need certain information have access to it. This also enables us to limit what some users can do with the information such as look or modify the information in a file. An application server, so that all employees will have access to needed programs to get their jobs done. A dynamic host control protocol and a domain name server are recommended...
Words: 589 - Pages: 3
...IS3340 —Windows Security E-mail: E-mail: VShafer@itt-tech.edu Cell Phone#: 865-236-1869 Title: Analyzing Windows Application Software for Security Vulnerabilities Learning Objective ▪ Design techniques to protect given Windows application software from security vulnerabilities. Key Concepts ▪ Vulnerabilities to Microsoft server and client applications ▪ Strategies for securing Microsoft server and client applications ▪ Procedures for securing Microsoft applications Class/Content Outline: 5:00pm – 5:50pm Theory 7 (50 min.) 1. Roll / Lesson Plan / Handouts 2. Review/ Discuss Unit 8 ~ ▪ Chapter 12 “Microsoft Application Security”; pp. 271-296 3. In Class IS3340.U8.GA1 ~ Unit 8 Assignment 1: Policy for Securing Windows Environment ▪ You will select from the list of security controls that best addresses to each given ERP vulnerabilities. (*Note: You will refer to the Unit 1 case scenario IS3340.U1.TS3.doc for the Ken 7 Windows Limited details.) We will discuss the correct answers in class 6:00pm – 7:40pm Lab 1 (100 min.) 4. Lab 8 ~ Apply Security Hardening on Windows Microsoft Server & Microsoft Client Applications; pp. 68-73 8:00pm – 9:40pm Theory 7 (100 min.) & 9:50pm – 10:45pm Theory 7 (55 min.) 5. IS3340.U8.GA2 ~ Unit 8 Assignment 2: Best Procedures to Secure Windows Applications ▪ To complete IS3340.U8.GA2.doc ~ You will write a Windows application policy and define its procedure for...
Words: 630 - Pages: 3
...ITT Technical Institute IS3340 Windows Security Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 60 (30 Theory Hours, 30 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisite: NT2580 Introduction to Information Security or equivalent Course Description: This course examines security implementations for a variety of Windows platforms and applications. Areas of study include analysis of the security architecture of Windows systems. Students will identify and examine security risks and apply tools and methods to address security issues in the Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas: Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA NT2580 NT2670 Introduction to Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to Security Auditing for Compliance Countermeasures Information Security Email and Web Services NT1230 NT1330 Client-Server Client-Server Networking I Networking II IS3230 IS3350 NT1230 NT1330 Issues Client-Server Client-Server SecurityContext in Legal Access Security Networking I Networking II NT1110...
Words: 2305 - Pages: 10
...and file management, user account management and certain device management (such as drives, printers, interface cards, etc.) will be discussed. Prerequisite(s) and/or Corequisite(s): Prerequisite: IT103 Operating Systems Credit hours: 4 Contact hours: 50 (30 Theory Hours, 20 Lab Hours) Syllabus: Linux Operating System Instructor | Jerry Black | Office Hours | Thursday, 4PM-6PM | Class Hours | Monday, 6:00PM – 10:20PM | Contact | Ms. Travis, 937-264-7707 | | jblack@itt-tech.edu | Major Instructional Areas 1. Introduction to Linux 2. Linux installation 3. Graphical user interface (GUI) desktops 4. Command-line interface (CLI) essentials 5. Hardware configuration: display, network, and printer 6. Networking: Resource sharing and remote access 7. Backup and restore utilities 8. Installing software in Linux 9. Scripting: Bourne Again Shell (bash) and Perl 10. Apache Web Server installation and configuration Course Objectives 1. Discuss the history and unique characteristics of the Linux operating system. 2. Perform an installation of Linux. 3. Use the components and features of the GNOME desktop environment. 4. Perform basic tasks by using the command-line interface (CLI). 5. Use the various Linux process management features. 6. Create and execute basic scripts by using the Perl programming language and Bourne Again Shell (bash). 7. Configure computer hardware in Linux. 8. Administer...
Words: 2032 - Pages: 9
... and UNIX servers and clients, Windows 2000, UNIX (Solaris 8) * Working understanding of L.A.M.P. configurations * Maintained healthy network environment via defrags, and firewalls * Troubleshoot printers, network connection issues, hardware problems ADDITIONAL QUALIFICATIONS * Excellent interpersonal, verbal, and written communication skills * Positive, self-motivated, and able to make difficult decisions in stressful situations * Outstanding small unit leadership skills * Enjoys working as a team member, as well as independently * Able to motivate staff to meet project deadlines EDUCATION/TRAINING ITT Technical Institute, San Diego, CA - Associate of Science in Computer Network Systems, Anticipated Graduation, June 2012 – Current GPA 3.81/4.0 * Courses include: Introduction to Personal Computers, Introduction to Computer Programming, Problem Solving, LINUX Operating System, MICROSOFT Desktop Operating Systems, Strategies for the Technical Professional, Network Standards and Protocols, College Mathematics 1 U.S. Marine Corps Trained in Firearms, Leadership, Diversity, Communication, Basic Electronics Maintenance, Computer & Networking System Administration EXPERIENCE IT Customer Support Agent, Mindtouch Inc., San Diego, CA (2011 – present) Help resolve issues faced by the users of the business Wiki Software * Providing first level customer support, e.g. troubleshooting issues with software in various server configuration...
Words: 536 - Pages: 3