...NET230-Final Multiple Choice Identify the letter of the choice that best completes the statement or answers the question. ___C_ 1. When ____ is used with only a filename and without parameters, the status of the object is displayed, indicating whether the object is encrypted and whether new files added to a folder will be encrypted. a.|CONVERT|c.|EFS| b.|CIPHER|d.|AES| ___C_ 2. Windows 2000 EFS uses ____. a.|DESX|c.|3DES| b.|AES|d.|4DFS| ___D_ 3. ____ must be used to grant or restrict access to objects in the shared folder. a.|Shared folders|c.|LFN| b.|Objects|d.|NTFS permissions| ____A 4. The ____ is a server-side software that sends a print job to the proper server in the format required by that server. a.|print client|c.|language monitor| b.|network interface driver|d.|print provider| ___D_ 5. A(n) ____ works with the printer driver to despool spool files during playback, making any needed changes to the spool file according to its data type. a.|print processor|c.|printer router| b.|mismatched document|d.|RAW spool file| ___D_ 6. ____ provides printer control at the print-job level and enables users to change printer defaults levels, such as number of copies, color, and printer languages. a.|Network interface printer|c.|Direct Driver Interface| b.|Printer Job Language|d.|Print resolution| ___B_ 7. Which of the following terms describes the contents of a completely or partially interpreted data file that contains text and control...
Words: 849 - Pages: 4
...Summary: Provided onsite and remote support for over 20 years on both tier 1 and 2 levels. TECHNICAL SKILLS Hardware: Pentium desktops, laptops, notebooks. Hewlett Packard printers connecting with both printer servers and TCP/IP .All modems and compatible, desktop scanners, Multimedia (CD and R/W ROMS) HP plotters, port replicators, and most other peripherals. Worked with Cisco routers and Hubs. Experience with Macintosh. Software: Bomgar remote access software, Microsoft Office XP 2003, 2007 2010. (Includes: Word, Excel, PowerPoint and Outlook), Active Directory, TC/PIP Citrix Metaframe. Norton, Mcafee, Trend Micro anti-virus. Malwarebytes. Trend Micro’s Data Armor and file Armor. GHOST. Experience with Macintosh versions of aforementioned software. Operating Systems: MS-DOS (all versions), Windows 95, 98, 2000, ME, NT, XP Vista, 7, and 8.Desktop (Including Networks) Novell 3.x and 4.x, Windows NT, 2003 and 2008. Also experience with most versions of MAC. PROFESSIONAL EXPERIENCE IT Contractor March 2015 – Present Robert Half onsite at Landmark Apartment Trust IT Consultant * Upgrading iPads with new operating systems and Remote Management app. by contacting each of the 90 properties owned by phone and walking user through the process Teksystems onsite at Bayfront Health Service Desk/Desktop Support * Answer calls to the helpline and providing support through remote access or onsite support * Work...
Words: 488 - Pages: 2
...CURRICULUMVITAE PERSONALDETAILS FIRST NAME : BRUCE SURNAME : CHIMUKA ADDRESS : SMARTNET NETWORKS LIMITED LUBAMBE ROAD, NORTHMEAD, BOX 37933, LUSAKA, ZAMBIA DATE OF BIRTH : 25/10/1983 PLACE OF BIRT : MONZE NATIONALITY : ZAMBIAN NRC No : 131232/77/1 SEX : MALE MARITAL STATUS : MARRIED RELIGION : CHRISTIAN HOBBIES : LISTENING TO GOSPEL MUSIC LANGUAGES : ENGLISH, NYANJA&TONGA CONTACT No : +260950254807, +260968793352, EMAIL : bcchimusb562@gmail.com EDUCATIONALBACKGROUND 2012: Bachelor of Business Administration in CMIS; Rusangu University. 2005:Grade10-12; Namwala High School. 2002:Grade9; Itezhi-Tezhi Basic School. 2001:Grade1-8; Mujika Basic School, Monze. PROFESSIONAL QUALIFICATIONS * Candidate-Master’s Degree of Science in Information Technology * Candidate- Cisco Certified Network Associate * Certified Fiber Optic Technician * SMB Account Manager * BBA-Computer and Management Information Systems WORKEXPERIENCE * Am currently working with Smartnet Network Limited as Technical Sales...
Words: 858 - Pages: 4
...lab itself, those common steps have been collected in this file. You may refer to this document at any time during your lab session. Though you may not be required to perform each of these steps in every lab, the Common Lab Steps are listed in the order that you are most likely to encounter them. As you review this list, you should pay attention to the logic and flow of the lab. This will help you to perform the lab procedures more quickly and more accurately. Note: The other virtual machines used in this environment may require as long as 10 minutes to complete their initialization processes (wake-up sequences) and load all required software. If you receive a connection error message, wait at least one minute before clicking on the Remote Desktop Connection icon to retry the connection. Virtual Lab Environment You will use the virtual lab environment to complete the learning activities in this lab manual. Note: The virtual lab environment, also called the Virtual Security Cloud Lab (VSCL) requires Java, Adobe Flash, and a compatible Web browser. The list of compatible browsers and required version numbers for Java and Flash is available on the VSCL Web site (http://campus.toolwire.com/b4ubegin/start.asp). The Technical Support Help Desk will not be able to assist you in the use of unsupported Web browsers. If you use an unsupported browser, you may not be able to complete the labs as directed in the lab procedures. You will need to download...
Words: 2388 - Pages: 10
...3Mokihana Sabang NT2580 Unit 3 10/11/12 Wallace Dear Richman Investments, I am happy to hear that you are looking to expand your company and are currently looking for a remote access policy. One, I think giving your employees the ability to use their company computers from home and when traveling for the business is a great opportunity, I also believe it can be a high risk with nothing in place of security. I purpose that all computers in which has been provided by the company use RDG. Microsoft Remote Desktop Gateway (RDG) * Allows you to log in to your ETSU computer from off-campus * Requires no software installation * Presents a lower security risk * Does not expire (subject to periodic review) With that said there will be rules set for all employees’ in which RDG is to use. 1) All employees will sign a RDG agreement. 2) All employees who will be given a company computer will need to get permission from Vice president. 3) When connect to the company internet/server you must make sure no one else will be on your network. 4) Computers must be up to date with anti-virus and any recommended software. 5) 30 minutes of inactivity, computer will automatically disconnect from the network. 6) Only the Headquarters VP, Presidents, and IT will be able to access any other sites on the network. *(not vice versa) I want to thank you for giving me the opportunity to help you with getting this setup for your company. Feel free...
Words: 263 - Pages: 2
...and click Login in the Login box 2. To connect to he VPN for the first time, click Start AnyConnect - If you get the warning as seen above about the Java plu-in, please click Trust to move forward. You may notice the two windows below. Please, click on run in the warning window to continue. 3. When you get to this the window above, click on “Mac OS X 10.6+ (Intel)” to download the installer of the VPN client. - The installer will be downloaded to your default download location 4. Navigate to your default download location and locate the downloaded “anyconnect…-k9.dmg” file. Then, start the installation process of the client. - Once you locate the “.dmg” file, lunch it and a temporary drive will be created on your desktop. Access the “AnyConnect VPN 3.xxxx” drive and lunch the “vpn.pkg” file that it contains. - Once the “vnp.pkg” file is lunched you will be guided through the installation process as indicated in the window above. 5. Once the installation process has completed, locate the “Cisco” folder in the “Applications” folder and lunch the “Cisco AnyConnect Secure Mobility Client” . - Once lunched, you’ll be prompted to enter the address, “vpn.csvcl.net”, in the box below. - Once you type the address, click “Connect” and enter your username and password in the box below 6- Type your assigned username and password and click OK to login to the VPN. Note: Once you have successfully connected to the VPN, proceed to PART II which...
Words: 807 - Pages: 4
...lab itself, those common steps have been collected in this file. You may refer to this document at any time during your lab session. Though you may not be required to perform each of these steps in every lab, the Common Lab Steps are listed in the order that you are most likely to encounter them. As you review this list, you should pay attention to the logic and flow of the lab. This will help you to perform the lab procedures more quickly and more accurately. Note: The other virtual machines used in this environment may require as long as 10 minutes to complete their initialization processes (wake-up sequences) and load all required software. If you receive a connection error message, wait at least one minute before clicking on the Remote Desktop Connection icon to retry the connection. Virtual Lab Environment You will use the virtual lab environment to complete the learning activities in this lab manual. Note: The virtual lab environment, also called the Virtual Security Cloud Lab (VSCL) requires Java, Adobe Flash, and a compatible Web browser. The list of compatible browsers and required version numbers for Java and Flash is available on the VSCL Web site (http://campus.toolwire.com/b4ubegin/start.asp). The Technical Support Help Desk will not be able to assist you in the use of unsupported Web browsers. If you use an unsupported browser, you may not be able to complete the labs as directed in the lab procedures. You will need to download...
Words: 2387 - Pages: 10
...Scan Report October 12, 2015 Summary This document reports on the results of an automatic security scan. The scan started at Mon Oct 12 18:07:01 2015 UTC and ended at Mon Oct 12 18:33:02 2015 UTC. The report first summarises the results found. Then, for each host, the report describes every issue found. Please consider the advice given in each description, in order to rectify the issue. Contents 1 Result Overview 2 2 Results per Host 2.1 172.30.0.7 . . . . . . . . . . . . . . . . 2.1.1 High ms-wbt-server (3389/tcp) 2.1.2 Low ms-wbt-server (3389/tcp) 2.1.3 Log ms-wbt-server (3389/tcp) . 2.1.4 Log general/CPE-T . . . . . . 2.1.5 Log general/HOST-T . . . . . 2.1.6 Log general/tcp . . . . . . . . . 2.1.7 Log ssh (22/tcp) . . . . . . . . 2.2 172.30.0.11 . . . . . . . . . . . . . . . 2.2.1 High ms-wbt-server (3389/tcp) 2.2.2 Medium general/tcp . . . . . . 2.2.3 Medium http (80/tcp) . . . . . 2.2.4 Low ms-wbt-server (3389/tcp) 2.2.5 Low http (80/tcp) . . . . . . . 2.2.6 Log ms-wbt-server (3389/tcp) . 2.2.7 Log general/tcp . . . . . . . . . 2.2.8 Log http (80/tcp) . . . . . . . 2.2.9 Log general/CPE-T . . . . . . 2.2.10 Log general/HOST-T . . . . . 2.2.11 Log general/icmp . . . . . . . . 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...
Words: 12664 - Pages: 51
...Begin Solution Dual Monitors Setup: 1. On the desktop of your laptop and not your remote computer. 2. Right click the desktop and navigate to screen resolution. 3. Under multiple displays ensure that extend desktop is selected and click apply. 4. Both monitors should now be on but the screen orientation may be off. 5. When looking at your monitors from left to right take notice of the numbers that flash on the screen when clicking the Identify button on the top right of the screen. 6. For example if you press the Identify button and on the left screen is a 2 and the right monitor is a 1 make sure the monitors in the program look the same. If they are not drag the monitor that is wrong on the other side of the monitor. 7. Click on the left monitor after making the last change and select the option make this my main display. 8. Once everything looks right please click the OK button at the bottom of the screen. 9. If you move your mouse from left screen to right screen the mouse should move to either side with ease. Configuring Remote Desktop with Dual Monitors: 1. Open remote desktop on the laptop and not your PC at work. 2. On the bottom left of the remote desktop connection screen click on Show Options. 3. Click on the Display tab on top of the window. 4. Make sure the option Use all my monitors for the remote session is checked. 5. Above that option is a slider ranging from...
Words: 327 - Pages: 2
...complying with PCI-DSS standards. 6. What are the 11 titles of mandates and requirements for SOX compliance? * Public Company Accounting Oversight Board (PCAOB) * Auditor Independence * Corporate Responsibility * Enhanced Financial Disclosures * Analyst Conflicts of Interest * Commission Resources and Authority * Studies and Reports * Corporate and Criminal Fraud Accountability * White Collar Crime Penalty Enhancement * Corporate Tax Returns * Corporate Fraud Accountability 7. What purpose may COBIT serve to help comply with regulations such as Sarbanes-Oxley? The purpose for COBIT was to provide comply for IT Infrastructure library. 8. What is RDP? What port number does it use? RDP is Remote Desktop and it uses port...
Words: 266 - Pages: 2
...List of hosts | 172.30.0.1 | High Severity problem(s) found | | 172.30.0.2 | High Severity problem(s) found | | 172.30.0.200 | High Severity problem(s) found | | 172.30.0.4 | High Severity problem(s) found | | 172.30.0.8 | High Severity problem(s) found | | 172.30.0.9 | High Severity problem(s) found | | [^] Back | 172.30.0.1 | Scan Time Start time : | Sun May 25 13:18:40 2014 | End time : | Sun May 25 13:22:00 2014 | | | Number of vulnerabilities Open ports : | 9 | High : | 2 | Medium : | 0 | Low : | 19 | | | | Remote host information Operating System : | Linux Kernel 2.6 on Debian 6.0 (squeeze) | NetBIOS name : | | DNS name : | | | | | [^] Back to 172.30.0.1 | Port general (0/icmp) | [-/+] | Nessus Scan Information | Synopsis: Information about the Nessus scan. Description: This script displays, for each tested host, information about the scan itself: - The version of the plugin set - The type of plugin feed (HomeFeed or ProfessionalFeed) - The version of the Nessus Engine - The port scanner(s) used - The port range scanned - The date of the scan - The duration of the scan - The number of hosts scanned in parallel - The number of checks done in parallel Risk factor: None Solution: n/a Plugin output: Information about this scan : Nessus version : 4.2.2 (Build 9129) (Nessus 4.4.1 is available - consider upgrading) Plugin feed version : 201107120935 Type of plugin...
Words: 29098 - Pages: 117
...E-mail, terminal services) …While Enforcing Strict Security Allow access only to necessary applications and resources for certain users Mitigate risks from unmanaged endpoints Customize experience and access for diverse user groups (partners, suppliers, employees) Enable provisional workers (contractors, outsourcing) Enforce consistent security policy Support myriad of devices (smartphones, laptops, kiosks) …And the Solution Must Achieve Positive ROI Minimize initial CAPEX costs Lower ongoing administrative and support OPEX costs 3 www.radiusconsultingghana.com Copyright © 2010 Juniper Networks, Inc. www.juniper.net THE SOLUTION: JUNIPER NETWORKS SA SERIES SSL VPN APPLIANCES Mobile User – Cafe Secure SSL access to remote users from any device or location Easy access from Web-browsers – no client software to manage Dynamic, granular access control to manage users and resources SA6500 VoIP Teleworker Business Partner or Customer Single comprehensive solution to access various application types from various devices available Wireless User Airport Kiosk User 4 www.radiusconsultingghana.com Copyright © 2010 Juniper Networks, Inc. www.juniper.net JUNIPER NETWORKS SSL VPN MARKET LEADERSHIP...
Words: 3503 - Pages: 15
...EMCO Remote Desktop GoToMyPC® Current uses: A main use of remote desktop software is remote administration. It can also be used for "headless computers": instead of each computer having its own monitor, keyboard, and mouse, or using a KVM switch, a monitor, keyboard and mouse can be attached to one computer with remote control software, and headless computers controlled by it. The duplicate desktop mode is useful for user support and education. Remote control software combined with telephone communication can be nearly as helpful for novice computer-users as if the support staff were actually there. Since the advent of cloud computing remote desktop software can be housed on USB hardware devices, allowing users to connect the device to any PC connected to their network or the Internet and recreate their desktop via a connection to the cloud. This model avoids one problem with remote desktop software, which requires the local computer to be switched on at the time when the user wishes to access it remotely. (It is possible with a router with C2S VPN support, and Wake on LAN equipment, to establish a virtual private network (VPN) connection with the router over the Internet if not connected to the LAN, switch on a computer connected to the router, then connect to it.) The common name for USB devices with the capacity to remotely recreate a user's desktop is "secure portable office".[1] Malicious use Remote control software is also used maliciously. From 2008, typically...
Words: 653 - Pages: 3
...Authentication (NLA) 3. Medium: SMB Signing Required 9. Yes, there are solutions for the three listed vulnerabilities: 1. Low: Terminal Services Encryption Level is not FIPS-140 Compliant * Description: The encryption setting used by the remote Terminal Services service is not FIPS-140 compliant. * Solution: Change RDP encryption level to : 4. FIPS Compliant 2. Medium: Terminal Services Doesn’t Use Network Level Authentication (NLA) * Description: The remote Terminal Services is not configured to use Network Level Authentication (NLA). NLA uses the Credential Security Support Provider (CredSSP) protocol to perform strong server authentication either through TLS/SSL or Kerberos mechanisms, which protect against man-in-the-middle attacks. In addition to improving authentication, NLA also helps protect the remote computer from malicious users and software by completing user authentication before a full RDP connection is established. * Solution: Enable Network Level Authentication (NLA) on the remote RDP server. This is generally done on the 'Remote' tab of the 'System' settings on Windows. 3. Medium: SMB Signing Required * Description: Signing is not required on the remote SMB server. This can allow man-in-the-middle attacks against the SMB server. * Solution: Enforce message signing in the host's configuration. On Windows, this is found in the policy setting 'Microsoft network server: Digitally sign communications (always)'...
Words: 613 - Pages: 3
...distance learning with ability to support hands-on computer lesson is needed. In this paper, a platform for region-wide distance learning computer-based hands-on workshop is presented through the actual developments. The proposed platform supports 1) teaching/learning activities in a hands-on computer workshop 2) efficient large-scale remote computer laboratory. Computer virtualization and StarBED large-scale computing testbed were utilized to create a distance learning computer laboratory, virtual and physical. This paper discusses various aspects of deploying virtual and physical lab environments for region-wide learners in a synchronous-style distance learning workshop. Keywords Hands-on computer workshop, remote laboratory, distance learning, educational technology 1 Introduction With digital and telecommunication technologies, distance education has been developed to extend boundary of knowledge sharing to be more location and time independent. It has been widely deployed in academic or training programs to mobilize knowledge within or across organizations, countries and regions. With its characteristic to share knowledge to more learners at remote locations, it has become a costeffective solution for human resource development. In the digital age which daily operations of humans are computer-assisted, practical skills to use computers to accomplish specialized tasks in different fields are...
Words: 4133 - Pages: 17