...IS3340-WINDOWS SECURITY | Auditing Tools for Windows System | Unit 4 Assignment 1 | | | 5/1/2014 | | 1. You want to schedule a weekly analysis for the Windows servers in your data center. The command should run as a scheduled job and report any available patches for the Windows Server 2008 R2 operating system, Internet information services (IIS) Web server, or structured query language (SQL) server that have not been installed. Which tool would be the best choice?. MBSA command line interface 2. You like the way MBSA presents scan results but you need to scan for vulnerabilities in older Windows products, including Microsoft Office 2000. Which tool provides extended scanning and the ability to use MBSA to view scan reports? Security Configuration and Analysis (SCA) 3. Your organization wants to encourage its employees and contractors to use vulnerability scanners at home as well as at work. You want to select a single vendor that can provide scanner software products for home and enterprise computers. A single vendor product line can streamline coordinating and analyzing scan results from many different computers. Which set of tools would be the best choice? Secunia Security Analyzers 4. You have developed several templates that consist of security settings for several types of computers, including desktop workstations, laptops, and various servers. You want to quickly compare a computer’s settings to its corresponding template to see if any...
Words: 271 - Pages: 2
...UNIT 4. Assignment 1. Copper vs Fiber As the name suggests, fibre optic technology uses pulses of light to carry data along strands of glass or plastic. It's the technology of choice for the government's National Broadband Network (NBN), which promises to deliver speeds of at least 100Mbps. When we're talking about 'speed' were actually talking about throughput (or capacity) — the amount of data you can transfer per unit time. And fiber optics can definitely transfer more data at higher throughput over longer distances than copper wire. For example, a local area network using modern copper lines can carry 3000 telephone calls all at once, while a similar system using fiber optics can carry over 31,000. So what gives it the technical edge over copper wires? Traditional copper wires transmit electrical currents, while fiber optic technology sends pulses of light generated by a light emitting diode or laser along optical fibers. In both cases you're detecting changes in energy, and that's how you encode data. With copper wires you're looking at changes in the electromagnetic field, the intensity of that field and perhaps the phase of the wave being sent down a wire. With fiber optics, a transmitter converts electronic information into pulses of light — a pulse equates to a one, while no pulse is zero. When the signal reaches the other end, an optical receiver converts the light signal back into electronic information, the throughput of the data is determined by the frequency range...
Words: 396 - Pages: 2
...Motherboards Marc Burzynski Unit 4 Assignment 1 NT1110 07/20/2013 Video 1.04 Summary This video talked about the differences in the different form factors motherboards as well as the similarities. It explains for those of us who prefer to build our own systems that we should select our motherboard before buying the tower and after we have selected the CPU. It also explains about the different types of connectors found on motherboards. List Of Topics, Terms And Definitions * Motherboard – The most important consideration, the size and shape is determined by form factor * ATX Form Factor – Replaced the AT form factor, ATX is smaller, easier to work on, better organization, has support for a wide variety of I/O devices, usually has is the P1 20 pin or 24 pin power connector, on the older ATX form factor motherboards were connected via the PS/2 connector at the back of the case, the newer ATX form factor motherboards connected keyboard and mouse via a USB, usually has between two and four DIMM slots, has either PCI E Oren AGP slot but not both, usually has 2 40 pin IDE slots, and usually 1 to 2 serial ATA slots. The ATA form factor was the first to introduce the soft power switch on the front of the computer; the soft power switch does not immediately cut power but instead allows the computer to go through the normal shutdown procedure. There is however a power switch on the back of the computer, flipping the switch immediately kills power. Another important...
Words: 540 - Pages: 3
...even buy a case because sometimes the motherboard will not fit into the case. There are three form factors today. Atx which replaced older AT Motherboards. They are also easier to work on. ATX also has a soft power switch on the front of the computer and a power switch on the back. The second form is the BTX form. This has better air flow for cooling by having an intake vent on the front of the computer and an exhaust vent on the back. The last is an NLX form used on low end computers and is also known as daughter boards. On the bottom of the motherboard there are numerous copper traces know as Buses. A motherboard will have expansion slots. It will have either several PCi slots and one AGP slot or several PCI slots and one PCIe slot. 3 &4. ATX-easy to work on, replace old At form BTX- better cooling for cpu NLX- daughter boards Riser cards- plug into motherboard, and support additional expansion slots Soft power- button on front of computer that does not immediately cut off computer. Allows normal OS shutdown process Wake on LAN- Configured in CMOS any keyboard or network activity will repower your system if it is in standby Motherboard Connectors- P1 Power, 40 pin IDE, 34 pin floppy drive, SATA, 50 or 68 pin SCSI 5. Before choosing anything with your computer you should choose both a cpu and a motherboard. There are three forms to choose from. PCIe or PCI express slots are expected to replace old AG connectors because they are the fastest to date. This information is a necessity...
Words: 313 - Pages: 2
...Jake Robinson ET3220 Unit 4 Assignment 1: Unit Review Questions 6.2 The function of a modem is modulation and demodulation. A modem takes a signal and modulates it so that the data can be sent via an audio link such as a phone. Then at the other end of the line another modem demodulates the signal back into the original data that was to be sent. 6.3 Three major advantages of digital transmission over analog transmission are: 1. Digital transmissions cannot get corrupted by noise. 2. Digital signals typically use less bandwidth. 3. Digital transmissions can be encrypted so that only the intended recipient can decode it. 6.4 In ASK or amplitude-shift keying the two binary values are represented by two different amplitudes of the carrier frequency. The limitations of ASK are that it is linear and sensitive to atmospheric noise, distortion, propagation condition on different routes in PSTN. It requires extensive bandwidth and is therefore a waste of power. 6.7 QAM is a popular analog signaling technique that is known as quadrature amplitude modulation. This modulation technique is a combination of ASK and PSK. QAM can also be considered a logical extension of QPSK. QAM takes advantage of the fact that it is possible to send two different signals simultaneously on the same carrier frequency, by using two copies of the carrier frequency, one shifted by 90 degrees with respect to the other. 6.8 The sampling theorem tells us that the sampling...
Words: 260 - Pages: 2
...NT1330 Unit 4 Assignment 1. AD Design Replication Scenario AD Design Replication Scenario To whom it may concern: I am the IT Administrator for the company and I have been asked to give my recommendations for the Active Directory Replication Design of the two new Branches. The first I can recommend for you is that all the information that is needed for each new site is correctly documented and added to the Root Active Directory through the Active Directory sites and services. This is done because the Root AD automatically builds the inter-site replication topology based on the information provided about the new site connections. Each new site’s AD will have one each domain controller that is known as the inter-site topology generator and they are assigned to build the topology at their sites. To add two new branch offices we will need to find a strategy to design a replication process. To implement this we will need to use inter-site replication. Inter-site replication is needed when adding domain controllers located in different sites. We will also need a site link (Site link is a logical, transitive connection between two sites that allows replication to occur) protocol of Remote Procedure Call (RPC) over Internet Protocol (IP) which is the preferred choice for the replication process. This allows you to communicate with network services on various computers and also keep data secure when being transmitted by using both encryption and authentication...
Words: 580 - Pages: 3
...Melanie Waghalter Johnson Unit 4 Assignment 1 Professor Cynthia Waddell ACC555: Fraud Examination “How to Steal a Million Dollar Without Taking the Cash” Seneca Staunton was an overwhelmed accounting clerk at Carlton Chemicals. His job was to deal with AR collection, customer service issues, process payments and keep the AR records straight. He was a quiet man who preferred to work alone than with others, and this was his down fall with Carlton Chemicals. The only time that Seneca was vocal was when his department was audited. He would get upset and complain about the added work load caused by the auditors. He would delay getting reports and other paperwork to them causing issues with completing the audit itself. When the reports finally got to the head auditor there were discrepancies in the reports. The senior auditor took her concerns to Seneca’s boss, Max Fairchild, because the reports would not reconcile and she was concerned. After being brought the discrepancies in the reports, Max spent several hours in trying to figure out what Seneca had done. He was unable to find if the money was missing by embezzlement or misapplied funds. All he knew at this point is that Seneca was the only one to apply the payments and that he was the one to answer the questions. Waiting until the next afternoon, Max spoke with Seneca who immediately admitted that he had misapplied the funds, but had not stolen any of the money. Max had decided to write a reprimand on Seneca stating...
Words: 868 - Pages: 4
...CHANGE PROPOSAL1 Change Proposal Name: Warly Gonzalez Moreno Course: NSG3039 Institution: South University Week 2, Assignment 3 Literature review Healthcare technology has turned into more and more complicated, changing the approach nursing care is delivered and conceptualized. Since the invention of technology, healthcare practitioners have confidence in massively on the sense of touch, ability to perceive with eyes, hearing, and odor to detect changes and guide the convalescents status. Over time, nurses' separated spirits were replaced with automation designed to catch physical shifts in patient surroundings (Bell &Thornton, 2013, p.55). Despite the fact technology has been capable...
Words: 1446 - Pages: 6
...Identifying Types of Malware Infection 1) You notice that your computer is getting slower each day. You have terminated unneeded programs, disabled unneeded services, and have recently defragmented the disks. Your computer has plenty of memory but it still seems slow. Since it only started getting slow within the last two weeks, you suspect a malware attack. You have carefully examined each of the programs running but there are no unusual programs. However, you do notice that there is substantial disk activity, even when no programs are running that should be using the disk. What kind of malware do you think is present in your computer? Rootkit and likely another type of malware – Closing all programs and still seeing disk usage would suggest that a rootkit has installed and is actively hiding the actual program running. The rootkit would hide the program while a virus or worm is likely behind the scenes wreaking havoc. 2) You download a new program to display the current weather on your desktop. Since you installed the weather application you noticed a lot of network activity and your computer is getting slow. When you terminate the weather application your computer speeds up. What kind of malware do you think is present in your computer? Trojan Horse – Acting as a useful program, it actually infects and runs amuck inside of the pc and network. 3) Within a week after ordering a new widescreen television (TV) from an online retailer, you start getting many email...
Words: 407 - Pages: 2
...Outcome four includes revising, editing, and proofreading. In order to achieve this: there mustn't be errors that obstruct the comprehension of the work, the changes made must address critiques from instructor and peers and the writing must clear and intentional on multiple levels. This is paramount to a paper's overall efficacy as it creates a work that is understandable and clear to the reader. These types of requirements can be seen in almost any project that is adequate. Nearly all works must display fluency and responses to constructive criticism. For this, I chose SA 2.3. In this assignment one was required to annotate and cite three separate sources as well as describe a community, one of its problems and provide a possible solution....
Words: 570 - Pages: 3
...GGR124 Assignment 3: Analyze urban change Section 1: Background and Observations The King-Spadina area, often referred to as one of the “Kings” is situated in the downtown core, surrounded by Simcoe St. to the East, Front St. to the South, Bathurst St. to the West and Queen St. to the North. The area is bisected by King St. and Spadina St., and is adjacent to Toronto’s financial district. Historically, the King-Spadina Area was one of the City’s primary manufacturing and industrial areas, however the area fell into a long period of decline because of several factors including changes in the manufacturing processes, an increase in interactions between international markets allowing many companies shifted operations elsewhere . A period...
Words: 1153 - Pages: 5
...I went through the Collection 2 test and the Collection 2 resources to identify the standards that are being taught and tested. Attached you will find the information I gathered. As I go through the Collections to update the tests and curriculum, I will create something similar for each Collection. You will notice that the document has some blank boxes. I can't fill in those boxes until I do all of the Collections and determine what standards are being tested for each strand of the curriculum. It looks like there is a lot of author purpose in Collection 2, but the questions are not worded the same as those in the Collection test. The students might have done poorly on the O.Henry piece because they were looking for author purpose in a fiction piece, while the Collection anchor texts focus on nonfiction. One way to address this might be to teach the fiction piece "The Censors" which focuses on Author Purpose. You will also notice that I pulled the lexiles for the stories and for the passages on the test. The O.Henry piece is actually on level. A 9th grade lexile is between 960-1120 with a "stretch band" of 1050-1335. We want kids reading a variety of texts that fall on grade level, but also stretch to the next level. The lexile for the nonfiction pieces are above the stretch band. I believe this is because of the technical terms that are being used. Lexiles are determined by the length of the words used and the length of the sentences. Both nonfiction pieces use longer sentence...
Words: 533 - Pages: 3
...Digital graphics assignment 1 CPU- the CPU is an abbreviation for central processing unit and acts as the brain of the computer. Carrying out a high percentage of the commands given by hardware and software that is also installed in the computer. An example of a modern day CPU is the Intel core i7 processor Graphics card- the graphics card is a piece of hardware installed into a computer on the motherboard, which processes and displays images that the computer needs displaying. The graphics card has its own memory built in so it does not strain the CPU to use and doesn’t use the RAM installed to run constantly. The higher the amount of built in memory the higher quality it can process and display images .And example of a modern day graphics...
Words: 739 - Pages: 3
...Motherboards The motherboard represents the logical foundation of the computer. Everything on the computer must be connected to the motherboard. When building a computer you must first decide what Motherboard or what CPU you will use, because your Motherboard will tell you what CPU you should buy and vise-versa. In that note, you can’t buy a case without your Motherboard selected, the size and shape of your case are determined by the form factor of your Motherboard. Form Factors: ATX * ATX replaced the older AT because of its more compact design and it’s better organized which makes it easier to work on. * ATX support 20 pin P1 connector and the newer 24 pin P1 Connector. * Supports 2 IDE Connectors and will probably have 1 or 2 SATA connectors * Soft Power Switch which allows for the PC to go through the shutdown process by not immediately shutting off when button pressed. BTX * This Form Factor is compatible with all of the ATX functions including the 20 and 24 pin connector * It was designed for better airflow with an intake vent on the front and Exhaust vent on the back, to work with this design CPU and Memory is installed parallel which creates better cooling for the CPU(No blocked airflow). NLX * Supports Riser cards. These are cards that connect to the motherboard expansion slots to allow connection of additional expansion cards. * Riser cards are also known as Daughter cards BUSES * The copper traces you find on the bottom...
Words: 480 - Pages: 2
...he hosting can be divided into three general types:. Shared hosting, virtual private servers (VPS) for its acronym in English dedicated servers and shared hosting plans are the lowest level of web hosting in terms of performance, price and capacity customization, which lets users with big needs two alternatives to evaluate, VPS or dedicated servers. There are multiple options available for those looking for each of these solutions, which creates a slightly blurred line between the two. Dedicated servers are generally the fastest and most powerful option available, although some of the high-end options VPS can equal in performance to the most basic dedicated servers through a similar rate. The point is that dedicated servers actually occupy the upper strata of the range of web hosting for their performance, and usually priced accordingly, however, there are several benefits in selecting dedicated not usually present in the solutions of VPS servers. One of the main attractions of a dedicated server is that it is under the complete control of the client, therefore, it can be restarted when necessary and may It is fully customized in terms of software running. The custom software can be very important for several reasons, but even if the software is based on a specific platform, not all VPS providers give their customers the ability to install and run additional software. In fact, most shared hosting providers have limits on what can be installed in terms of resource allocation and...
Words: 793 - Pages: 4