Premium Essay

Nt2580 Lab 1 - Nt2580 Lab 1 Lab #1 - Assessment Worksheet...

In:

Submitted By mack10573
Words 584
Pages 3
A network is a group of computers (often called nodes or hosts) that can share information through their interconnections. A network is made up of the following components:
Computer systems (nodes or hosts).
Network devices that enable connectivity (such as hubs, switches, and routers).
The transmission medium provides a path for electrical signals between devices.
Network interfaces are devices that send and receive electrical signals.
Protocols are rules or standards that describe how hosts communicate and exchange data.

Despite the costs of implementation and maintenance, networks actually save organizations money by allowing them to:
Consolidate (centralize) data storage
Share peripheral devices like printers
Increase internal and external communications
Increase productivity and collaboration

One way to classify networks is based on the role network devices play:

Network Type Description
Peer-to-peer In peer-to-peer networking (also called workgroups), each computer controls access to its own resources. Security controls on each computer identify who can have access to the computer's resources. Advantages of peer to peer networks include: Easy implementation
Inexpensive
Disadvantages of peer to peer networks include: Difficult to expand (not scalable)
Difficult to support
Lack centralized control
No centralized storage

Windows 7 includes a new feature called a HomeGroup. The HomeGroup is a simple way to create a peer-to-peer network for sharing files and printers. Client/server In client/server networking, shared resources reside on special computers called servers. Other computers, called clients connect to the server to access resources. Security controls on the server identify which clients can have resource access. Advantages of client/server networks include: Easily expanded (scalable)
Easy support

Similar Documents

Premium Essay

Lab 6 Security

...Lab #6 - Assessment Worksheet Implementing a Business Continuity Plan Course Name and Number: NT2580 Student Name: Instructor Name: Lab Due Date: Overview In this lab, you implemented a portion of your organization’s BCP. Based on the BIA, the organization determined that the internal Active Directory database and the corporate Web site must be recoverable in the event of system failure or natural disaster. To accomplish this, you configured local backups of Active Directory on the existing virtual server using Windows Server Backup. You also configured the organization’s Web servers to host content from a single NFS share, and back up that NFS share daily using Windows. Lab Assessment Questions & Answers 1. What is the purpose of the business impact analysis (BIA)? The BIA perceives the organization from the impact that is going to occur for an organization in the critical business processes are interrupted or tampered with. 2. What is the difference between the disaster recovery plan (DRP) and a business continuity plan (BCP)? The DRP helps recover the infrastructure necessary for normal business operation whereas the BCP helps keep the critical business processes running should a disaster occur. 3. What are the commands used in Windows 2012 to mount the NFS share on the Linux server. mount -o mtype=hard 4. Is creating redundancy for systems such as Active Directory or Web servers a part of the DRP or the BCP? ...

Words: 304 - Pages: 2

Premium Essay

Lab 4 Doc.

...Lab #4 – Assessment Worksheet Configure Group Policy Objects and Microsoft Baseline Security Analyzer (MBSA) Course Name & Number: NT2580 Student Name: Bryan Villa Instructor Name: Mr. Kravitz Lab Due Date: May 17, 2013 Lab #3 Assessment Questions & Answers 1. Define why change control management is relevant to security operations in an organization? Allows for testing and documentation of changes before they sent to management for review and implementation. 2. What type of access control system uses security labels? Logical/MAC 3. Describe two options you would enable in a Window’s Domain password policy? -Password must meet requirements -30 minute lockout after 3 failed attempts to get login correct 4. Where would patch management and software updates fail under security operations management? They must ensure the patches and updates don’t affect other programs or even leave weak spots in a systems security. 5. Is there a setting in your GPO to specify how many login attempts will lockout an account? Name 2 parameters that you can set to enhance the access control to the system. Yes a. Password must meet the requirements b. Minimum password length 6. What are some Password Policy parameters that you can define for GPOs that can enhance the C-I-A for system access? c. Enforce password history d. Minimum password age e. Maximum password age f. Password must meet complexity requirements 7. What...

Words: 326 - Pages: 2

Premium Essay

Ivp4 vs Ipv6

...1. What is the difference between a risk analysis (RA) and a business impact analysis (BIA)? a. Risk assessment (RA) is a structure discipline that must discover the threats, vulnerabilities, and values of an organization’s assets. A key factor in risk assessment is the determination of the likelihood of an adverse event affecting an Organization, process, or system. Risk assessment is a valuable tool to help the organization recognize itself threat environment and ensure that the steps are undertaken to minimize the resulting risks to an acceptable level. b. Business Impact Analysis (BIA) is the key to a successful BCP implementation. Understanding and standardizing Enterprise business process names is critical to the success of the BIA. The intent of the BIA process is to help the organization’s management appreciate the magnitude of the operational and financial impacts associated with a disaster or serious disruption. When they understand, management can use this knowledge to calculate the recovery time objective (RTO) for time-critical support services and resources. For most Organizations, these support resources include: Facilities - IT infrastructure (including voice and data communications networks) - Hardware and software - Vital records Data - Business partners The connection is made when each of the time-critical business processes is mapped to the above supporting resources. 2. What is the difference between a disaster recovery plan (DRP) and a business continuity...

Words: 966 - Pages: 4