Premium Essay

Network Systems Administration

In:

Submitted By money5423
Words 606
Pages 3
NT2580 Introduction to Information Security STUDENT COPY: FINAL EXAM
30. What does risk management directly affect?
a. Company investments
b. Security policy framework
c. Security controls
d. Number of employees

31. Which of the following is a cipher that shifts each letter in the English alphabet a fixed number of?
Positions, with Z wrapping back to A?
a. Transposition
b. Vigenere
c. Caesar
d. Vernam

32. Identify a security objective that adds value to a business.
a. Revocation
b. Authorization
c. Anonymity
d. Message authentication

33. Which of the following is an asymmetric encryption algorithm?
a. AES
b. 3DES
c. RSA
d. RC4

34. Identify a security principle that can be satisfied with an asymmetric digital signature and not by a symmetric signature.
a. Nonrepudiation
b. Integrity
c. Authorization
d. Access control

35. Which of the following is a mechanism for accomplishing confidentiality, integrity, authentication, and
Nonrepudiation
a. Cipher text
b. Cryptography
c. Access control
d. Hashing

36. In which OSI layer do you find FTP, HTTP, and other programs that end users interact with?
a. Application
b. Network
c. Physical
d. Data Link

37. Identify the configuration that is best for networks with varying security levels, such general users, a group of users working on a secret research project, and a group of executives.
a. Multilayered firewall
b. Screened subnet firewall
c. Border firewall
d. Ordinary firewall

38. Which of the following would you not expect to find on a large network?
a. Router
b. Switch
c. Hub
d. Firewall

39. Which of the following is a weakness of WLANs?
a. WPA
b. RF shielding
c. User groups
d. SSID beaconing

40. Identify an advantage of IPv6 over IPv4.
a. More secure
b. Larger address space
c. IPSec support
d. More commonly used

41. Identify one of the first

Similar Documents

Free Essay

Principles of Network and System Administration

...Chapter (Self-test Objective) Question # 1: What kinds of issues does system administration cover? Answer: As we discussed in class, a Network System Administrator has to be knowledgeable, has to have customer service skills to be stay calm & collected when a complaint occurs, and must be able to rectify the problem. As the course text book “Principles of Network and System Administration”, by author Mark Burgess mentions in chapter #1 section 1.6 The challenges of system administration : “System administration is not just about installing operating systems. It is about planning and designing an efficient community of computers so that real users will be able to get their jobs done. That means: • Designing a network which is logical and efficient. • Deploying large numbers of machines which can be easily upgraded later. • Deciding what services are needed. • Planning and implementing adequate security. • Providing a comfortable environment for users. • Developing ways of fixing errors and problems which occur. • Keeping track of and understanding how to use the enormous amount of knowledge which increases every year.” The author also mentions that some of the Network System Administrators are responsible for both the hardware of the network and the computers which it connects, i.e. the cables as well as the computers and some are only responsible for the computers. Most importantly a System Administrator must have an understanding of how data flows from machine...

Words: 337 - Pages: 2

Free Essay

Network Systems Administration

...Everyone loves pizza and beer and I am certainly no exception so it would have surprised no one to find me at Frank’s Pizza on an otherwise unremarkable evening in 1987, what did surprise many was what happened less than a year after this particular night. In a small town in Northern California more famous for its rich gold rush era history than any culinary notoriety in a downtown still dominated by structures from the late 1800’s is a pizza joint named Frank’s, no one remembers who gave it that name, the owner for the vast majority of my life is named William Jackson Davis and if he ever knew the titular namesake he never told me or anyone I know, but history or name aside no one I ever heard of had anything but praise for the pies that were produced there, 4 hour waits on a Friday or Saturday were not uncommon. So it was there I was headed on that portentous evening nearly thirty years ago after a back breaking week of working in construction putting drywall on houses, with a great hunger and thirst only such demanding and dusty work can produce and looking forward to nothing more than the filling and delicious pizza and ice cold refreshing beer when I noticed that the owners had hired a new waitress, a striking Green eyed beauty with a bust that would cause babies for miles around to begin salivating, now as a young single man not many years out of the Marine Corps my reaction was somewhat predictable, I hit on her like a Miner Forty-niner on a rich vein in the Mother...

Words: 821 - Pages: 4

Free Essay

Network Systems Administration

...Introduction: Global Positioning System, GPS Summary of key findings: Google, ALZ.org, Wikipedia, In a nutshell describing GPS - A navigational system involving satellites and computers that can determine the latitude and longitude of a receiver on Earth by computing the time difference for signals from different satellites to reach the receiver. Today, it is widely used by the civilian public for both commercial and recreational use. In addition to GPS, other systems are in use or under development. The Russian Global Navigation Satellite System (GLONASS) was in use by only the Russian military, until it was made fully available to civilians in 2007. The navigational signals transmitted by GPS satellites encode a variety of information including satellite positions, the state of the internal clocks, and the health of the network. These signals are transmitted on two separate carrier frequencies that are common to all satellites in the network. Two different encodings are used: a public encoding that enables lower resolution navigation, and an encrypted encoding used by the U.S. military. So in 20 years you can just imagine where this will lead… As of December 2013, there are 32 satellites in the GPS constellation. The additional satellites improve the precision of GPS receiver calculations by providing redundant measurements. With the increased number of satellites, the constellation was changed to a non-uniform...

Words: 358 - Pages: 2

Free Essay

Network Systems Administration

...7.1.1 Cost and manpower and materials would be enormous. 7.1.2 Signal lost would affect transmission by increasing distances. 7.1.3 UTP is used for LAN’s as well as phone lines. Coaxial cables are also useful for internet connection. 7.1.4 Satellite is a way of creating a network over long distances. WiMAX, is a standards-based technology enabling the delivery of last mile wireless broadband access as an alternative to cable and DSL. HSPA+, enhances the widely used WCDMA (UMTS) based 3G network with higher speeds for the end user. 7.1 Review 1) UTP and Coaxial cables can be used if signal enhancers are placed at correct distances. 2) WLAN’s are limited to shorter distances due to signal interference from attenuation and objects between the AP and devices. 7.2.1 Dedicated lease lines are very effective in transmission, but can be costly. 7.2.2 Full mesh topologies are good for no fault networking. Creating it can be difficult to maintain and assemble. Partial mesh is good when every computer is not important in the network. 7.2.3 Star topologies are great for small LAN’s. But, they have a high level of fault error in the system. 7.2.4 T1 uses 24 DSO channels, E1 has a speed of 2048 Mbps, E3 has 16 E1 channels, T3 has 43,736 Mbps and 28 DS1 channels. 7.2 Review 1) PPP allows their frames to flow from the customer router to the ISP router. A control protocol is used to set a standard everyone can understand. 2) LAN’s tend to have more immediate clients...

Words: 341 - Pages: 2

Premium Essay

New Technology Research for Network Systems Administration

...My field of study is Network Systems Administrations. I am most interested in networking technology. I currently understand very little about networking, which is to say I understand the functionality but not how it works. The topic I chose was Home-linking Technology. The article I read was “Dual Band Router leverages 802.11ac wireless standard.” from the Product News Network. The article started by describing the speed of the new 802.11ac router. Equipped with the Broadcom 5 GHz WI-Fi chip, the Cloud Router 5700 can deliver speeds up to 1750 Mbps. Its predecessor, the 802.11n has vendor promised speeds of up to 600 Mbps. The Cloud Router also supports wireless HD streaming and multi-person online gaming. It allows users to monitor and control your network remotely. In addition the 5700 provides support of the IPv6 standard and is backwards compatible so the previous generation 802.11n will not become obsolete. I also learned new terminology; IEEE- Institute of Electrical and Electronics Engineers. It is listed as “the world’s largest professional association dedicated to advancing technological innovation and excellence for the benefit of humanity.” 802.11- Set of standards for implementing wireless local area network (WLAN) computer communication in the 2.4, 3.6 and 5GHz frequency bands. SPI Firewall- (Stateful Packet Inspection) is a firewall that keeps track of the state of the network connections traveling across it. WPA2- (Wi-Fi Protected Access II) is...

Words: 325 - Pages: 2

Free Essay

Resume

...Lauren Lamotte | 7714 Lancer Ct | Niceville, FL 32578 | (850) 408-6789 | lauren.lamotte@us.af.mil November 14, 2015 Linda Vinetti Hiring Manager Capriccio Software, Inc. 3556 Gen DeGualle Blvd New Orleans, LA 70128 Dear Ms. Vinetti: I read of your company’s need for a Linux Systems Administrator in the New Orleans area on Indeed.com. I will be returning to New Orleans after my military enlistment is complete, and I believe that I would be an excellent fit for the company. I have worked as an IT professional in the United States Air Force for over six years, with my last three years working as a Linux Systems Administrator, and I am confident in my ability to become a valuable member of your team. I have an Associates degree in IT, and I am working towards by Bachelors degree in Information Systems Management. I am also professionally certified from Microsoft, Cisco, and CompTIA. As a Linux System Administrator, I have extensive experience in the following areas: * System Administration and Repair * Systems Installation, Configuration & Upgrading * Programming and Scripting * System Security, Backup and Recovery As a supervisor in the United States Air Force, I have experience working in teams, and I thrive under pressure. Additionally, I have excellent communication and interpersonal skills, which has...

Words: 894 - Pages: 4

Free Essay

Mircorsoft

...System Administrator Description: Computer networking jobs involve designing, setting up, and maintaining a network. Requirements: Although most users today have their own home networks, setting up, troubleshooting, and maintaining a corporate network can be a much more complicated task. Often, networking jobs also require a good understanding of how a network works, and in some cases how all the underlying protocols and structure of how networks work. Recommendations: There are numerous network and network related certifications available today, such as the CCNA, MCSE, etc. Often depending on the level of certification and the job you are applying for, the certifications will be more than enough to quality you for most network jobs. Some of the higher networking positions, especially in the development of network hardware or programming side, may also require past experience in networking or a degree. Difficulty: (MEDIUM - HIGH) Depending upon the job specifications and the complexity of the network usually determines the difficulty of this job. Networking Security expert Description: Test and find vulnerabilities in a system, hardware device, or software program. Requirements: This position is for someone who has a strong familiarity with how software, hardware, and networks work and how to exploit them. Often, you need to have a good understanding of how the overall system works as well as good programming skills. Recommendations: Keep up-to-date with all security...

Words: 1124 - Pages: 5

Premium Essay

System Admin

...System administration By: MANUEL Y.R.C What entails to be a system administrator? * A system administrator (SA) is responsible for managing and maintaining a multiuser computing environment. * He /she looks after computers, networks, and the people who use them. * May look after hardware, operating systems, software, configurations, applications, or security. * A system administrator influences how effectively other people can or do use their computers and networks. SA responsibilities include: * Installing, maintaining and troubleshooting workstations, servers, OSs, software applications and other computing systems * Creating user accounts and assigning user permissions * Executing anti-virus mechanisms * Creating backup * Creating file systems * Monitoring network communication * Updating systems upon release of new OSs or software * Implementing computer, network and security policies for system and network users. * Light programming or scripting * User training and management * Hardware and software system security, such as protection against hardware theft and abuse, malware/spyware and unauthorized use of systems and components, including firewall and intrusion detection system maintenance (http://www.techopedia.com/definition/4815/system-administrator-sa Book:the practice of system and network administration second adition by:Tomas A,limoncile) Consequences of not doing your work as system administrator...

Words: 507 - Pages: 3

Free Essay

Ntc/411 Network Management Paper

...Network Management (Your Name) NTC/411 (Current Date) (Instructor’s Name) Network Management Network management is an integral part of any IT system. Managing a network can be a tough task at times and managers have to decide on the best approaches for their network management. In this paper we’ll discuss out-of-band vs. in-band network management. We’ll also provide some examples of some of the protocols that perform in both types of network management and how enterprise systems are affected by the network management techniques along with business intelligence systems. In general, in-band and out-of-band refer to whether the solution or technique sits in the flow of the network traffic or out of the flow. Some IT professionals say that in-band network management provides better security than an out-of-band approach. Before we get into too much detail we need to discuss what an out-of-band and an in-band network management approach are. In-band approaches require devices or hardware to sit in the flow of live network traffic, often where endpoints access the network so that all client traffic has to pass through them. When a network manager decides to deploy an in-band device then they will be able to provide pre-connect and post-connect security. Network adapters are the most common type of in-band remote management hardware devices (Nevis Networks, 2007). In a Windows environment you can use remote access connections to manage servers...

Words: 1099 - Pages: 5

Premium Essay

Comp 230

...This course introduces basic programming concepts, logic, and scripting language tools used to automate basic system administrator processes. Critical thinking, logic, and troubleshooting are emphasized. Database applications are also introduced, helping students develop basic skills in using a typical database. Security topics are discussed. I am looking for someone on a weekly basis to login in to my online class and work on assignments, and discussion posts. Also a ilab, and short quizes multiple choice. There is also a course project: Your company is currently planning to automate many different system administration tasks. Your manager has asked you to research a system administration task and implement it using VBScript. In addition, your manager would like to see both a proposal that describes the system administration task and a complete VBScript solution with sample output runs. During the first 6 weeks of this course, you will be introduced to a variety of topics in VBScript. These topics include the following. VBScript Introduction: Variables, Constants, and Data Types VBScript Output Methods, VBScript Input Methods VBScript Decision-Making Statements VBScript Loop Structures and Arrays VBScript Procedures and Functions VBScript File Input/Output Methods The Course Project is worth 170 points and is comprised of the following deliverables. Week 3: Outline (30 points) Week 6: Complete proposal (140 points) The following...

Words: 343 - Pages: 2

Free Essay

Linux Unit 5

...First, let us analyze what file sharing in a centralized storage area on a server means. It means that basically when you store a file it will be stored in a predetermined place on a server instead of on the system. Now let us analyze what file replication is. File replication would be the server backing up by replicating to another server. Both of these are extremely helpful services provided by servers. How are these beneficial services increasing the ease of administration? Well, all of the different users will be storing their work to the server. That means they can login and access their files from any workstation on the local network. So I have come up with some examples showing different scenarios where this would be helpful. Example 1: As a student, if all of your files were being stored on a server you could login from any computer and access your files allowing for great mobility. Example 2: This one isn’t about a local network but I felt it was a great example anyway. When your access your e-mails they are stored on a server. Allowing you to login from anywhere and access the mail. Also, you can send yourself attachments so that you can access them at any time from any place. Example 3: Say you work in a lab and you want to do an experiment. You could search the server to find helpful information from other people’s work that is being shared. All of these examples benefit from replication as well. These servers replicating which would be backing up to the other servers...

Words: 492 - Pages: 2

Free Essay

Comparative Operating Systems

...COMPARATIVE OPERATING SYSTEMS TERM PAPER SUMMER 2001 COMPARISON OF NETWORK OPERATING SYSTEMS BY MUKUNDAN SRIDHARAN COMPARISON OF NETWORK OPERATING SYSTEM S Abstract We are in a era of computing in which networking and distributed computing is the norm and not a exception. The ability of a operating system to support networking has become crucial for its survival in the market. In today’s picture there is no operating system, which doesn’t support networking. This paper tries to give a review of various network operating systems or the networking support of a operating system, in relevance to the modern operating systems. The emphasis is on basic design and architecture, not their specifications or services. The paper considers various operating systems like Novell Netware, the sun NFS, the Styx, CIFS/SMB and Microsoft Windows 2000 server. Again the concentration is on modern and evolving operating systems like the Novell Netware and Microsoft’s Windows 2000. The objective of the paper is to study and compare various operating systems and to bring out the inherent advantages and disadvantages in using them. 1.0 INTRODUCTION Individual computers are connected together to form computer networks. The operating system, protocols and services which help us in interconnecting the computers are collectively called Network Operating systems. The webopedia.com defines Network Operating Systems as follows: An operating system that includes special...

Words: 12519 - Pages: 51

Free Essay

Nfs Security

...Linux NFS Paper Today I will be talking about NFS, or Network File system, and it used widely to share files across multiple servers and computers. Let me just clarify how the NFS system will work, a file will be taken from the directory, or NFS file system, the file will then be exported to the NFS client, then you would need to mount the file to the client, to make sure it was accessible throughout the entire system. With the system mount you can also see the IP addresses accessing the system, which isn’t that secure, seeing how anyone could simply scam their way into your system, which you really want to protect against. Today we want to learn how to properly secure that you have to cover the 3 main resources, or places to secure. The Portmapper, the server security, and the client security are the 3 things you must secure. The Portmapper is basically the root to the NFS, you want to make sure the ports are being used correctly, and are giving access to the right people, and is connected to an outside trusted network. You can simply use the etc/hosts command to check the ports, but you can also use that to allow and deny ports to anybody across the network. That’s a bit drastic, but can lead to a secure NFS especially if you notice any fishy IP addresses or activities across the network. With the server security, this is where it becomes more of a necessity to keep it secure, because without system security, the whole thing is going to go down the drain. It would be...

Words: 461 - Pages: 2

Free Essay

Nt1430W5Essay

...NT1430 NFS NFS is an open standard, cross-platform file system utility with implementations available for a wide range of operating systems, architectures, platforms, and appliances, from embedded systems to mainframes and high-performance clusters. NFS provides file sharing for Unix, Linux, mainframes, and other file systems, including Mac OS X. A Network File System (NFS) allows remote hosts to mount file systems over a network and interact with those file systems as though they are mounted locally. This enables system administrators to consolidate resources onto centralized servers on the network. Currently, there are three versions of NFS. NFS version 2 (NFSv2) is older and is widely supported. NFS version 3 (NFSv3) has more features, including 64bit file handles, Safe Async writes and more robust error handling. NFS version 4 (NFSv4) works through firewalls and on the Internet, no longer requires portmapper, supports ACLs, and utilizes stateful operations. Red Hat Enterprise Linux supports NFSv2, NFSv3, and NFSv4 clients, and when mounting a file system via NFS, Red Hat Enterprise Linux uses NFSv3 by default, if the server supports it. All versions of NFS can use Transmission Control Protocol (TCP) running over an IP network, with NFSv4 requiring it. NFSv2 and NFSv3 can use the User Datagram Protocol (UDP) running over an IP network to provide a stateless network connection between the client and server. When using NFSv2 or NFSv3 with UDP, the stateless UDP connection...

Words: 350 - Pages: 2

Free Essay

Sharing Files with Nfs

...Carr NT1430 Unit 7 Sharing Files with NFS Network File System (NFS) is a distributed file system protocol originally developed by Sun Microsystems in 1984, allowing a user on a client computer to access files over a network much like local storage is accessed. NFS, like many other protocols, builds on the Open Network Computing Remote Procedure Call (ONC RPC) system. The Network File System is an open standard defined in RFCs, allowing anyone to implement the protocol. NFS is the most-known service using remote procedure call (RPC). It is an excellent way of sharing files between Linux and other UNIX systems. NFS also allows for machines to mount without authentication, at boot, which is great if you have a cluster of systems or if you want to use a centralized home directory system (using an NFS-mounted directory for home directories to keep your configurations and files identical on multiple systems). The computer where directory located is called the server and computers or devices connecting to that server are called clients. Clients usually 'mount' the shared directory to make it a part of their own directory structure. NFS is perhaps best for more 'permanent' network mounted directories such as /home directories or regularly accessed shared resources. If you want a network share that guest users can easily connect to, Samba is more suited. This is because tools exist more readily across old and proprietary operating systems to temporarily mount and detach from Samba shares...

Words: 711 - Pages: 3