...Week 6 ToolWire – Router Configuration Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit ! version 12.1 service timestamps debug uptime service timestamps log uptime no service password-encryption ! hostname Router ! enable secret 5 $1$Q6ge$0JRjt.FY5EX2YNqRsgxTW. enable password cisco ! ! ! ! ! memory-size iomem 15 ip subnet-zero ! ! ! ! ! ! interface FastEthernet0/0 ip address 10.0.1.1 255.255.255.0 speed auto half-duplex no mop enabled ! interface Serial0/0 no ip address shutdown ! interface FastEthernet0/1 ip address 10.0.2.1 255.255.255.0 speed auto half-duplex no mop enabled ! interface Serial0/1 no ip address shutdown ! ...
Words: 2122 - Pages: 9
...NT2580-M1 Introduction to Information Security Unit 1: Information Systems Security Fundamentals 2015-Summer, 6/20/2015, Saturday (9:00am – 1:30pm) Student Name ___________________________________ Lesson Plan Theory (in class, Lab #2)……………………………..…………………..……...2 Reading Kim and Solomon, Chapter 1: Information Systems Security. Objectives……………..………………….……………………………….2 Student Assignments for this Unit Unit 1 Lab Perform Reconnaissance & Probing Using ZenMap GUI (Nmap) Lab #1: Performing Network Reconnaissance using Common Tools Overview and access vLab..............................................................................................3 Part 1: Exploring the Tools used in the Virtual Lab Environment……………16 Unit 1 Assignment Match Risks/Threats to Solutions Part 2: Connecting to a Linux Machine …………………. .........................44 Unit 1 Assignment Impact of a Data Classification Standard Part 3: Using Zenmap to Perform Basic Reconnaissance ……………………59 Appendix A. SYLLABUS………………………………………………..……..………….69 B. Forgot your password?………………………………………………..……..73 Instructor: Yingsang “Louis” HO Tel: 425-241-8080 (cell), (206) 244-3300 (school) Email: yho@itt-tech.edu NT2580_2015_Summer_M1_UNIT1.doc Page 1 of 76 Unit 1: Information Systems Security Fundamentals Learning Objective Explain the concepts of information systems security (ISS) as applied to an IT infrastructure. Key Concepts Confidentiality, integrity, and availability...
Words: 3379 - Pages: 14
...01 558366 ch01.qxd 11/24/03 10:15 AM Page 1 C H A P T E R Getting Started ou’ll find that Fedora is remarkably friendly and easy to use for work, play, or for just surfing the Internet. This chapter helps you to get logged in and use the friendly Fedora Bluecurve desktop and demonstrates how to log out and shut down the computer. You also learn how to configure the date, time, and your time zone, how to set up any printer you may have connected to your computer, and how to get your computer connected to the Internet. Even if you are eager and able to start using the many powerful applications with little or no help, please take the time to familiarize yourself with the terms and important concepts contained in this chapter, especially the information about users and security in the section “Before You Log In.” 1 ✦ ✦ Y ✦ ✦ Introductory Terms When you learn about a new operating system, you also need to learn new terminology. Here are a few basic terms you should learn to use Fedora. You will see these terms often throughout this book: ✦ Graphical User Interface (GUI) — A screen with icons, menus, and panels for the user to click on to initiate actions such as starting applications and opening files. ✦ Point and click — You move the mouse to point to something on the screen, and then click one of the mouse buttons to perform a task. By default, you click the left mouse button to do most tasks, but very often you can get a custom menu of options when...
Words: 7515 - Pages: 31
...NETW 230 Week 1 – 7 quizzes Click Link Below To Buy: http://hwaid.com/shop/netw-230-week-1-7-quizzes/ NETW 230 Week 1 quiz 1. Question : (TCO 1) _____ is highly componentized—allowing the installation of specific modules—and is managed via an IIS Manager interface. DHCP DNS Domain Internet Information Services Question 2. Question : (TCO 1) _____ service allows point-in-time copies of directly attached or SAN-based storage to provide backups. Volume Shadow Copy PowerShell IIS Server Manager Question 3. Question : (TCO 1) The _____ tab of the Task Manager allows you to view the network utilization of any connected network. This tab shows a graph of network history usage. Processor Memory Services Neworking Question 4. Question : (TCO 1) _____ is used by Windows Server 2008. This is a collection of related files that have some common criteria such as author, file type, or size range. Partition Stack Segment DFS Question 5. Question : (TCO 1) Windows Server 2008 installation generates several files containing information about the installation. Which of the following files provides information about set-up actions? Setuperror.log Setuperr.log Setupconfig.log Setupact.log Question 6. Question : (TCO 1) The _____ is used to create an answer file for automating Windows Server 2008 installation. Windows Wizard Installation Kit Windows Dynamic Installation Kit Windows Automated Installation Kit None...
Words: 1488 - Pages: 6
...Project Scope Project Justification Our company is a small, yet diverse company. We Employ only, the most professional and experienced of employees. Our employees have been with the company from start-up and offer a great deal of loyalty to our company as well as yours. Topologies Solutions Inc. was established in 1985 and we proudly hold a great record of completion and positive results, after completion. We also insure an “Always there” Policy in concerns to present to future customer service. We, at Topologies Solutions Inc, assure we can offer the cutting edge technology and experience needed to accomplish the project. We insure that the company obtains a high performance network for a reasonable price. Project description MK Institute of Higher Learning is purposing a project with the description to network a classroom based floor. This floor will consist of three wings. Each wing accommodates one distribution closet, which must be interconnected to one another. Each wing also has eight classrooms and one computer lab. Classrooms will need 2 drops and the computer labs will need 44 drops, resulting in 60 drops in all per wing. The ISP connection will be entering from the north wing’s distribution room. The institute will also be requiring that a wireless access coverage to the central lobby area, allowing 100 users simultaneously, to be made possible. Also noting that the central lobby area consists of three solid supports, holding a 25’ ceiling. Major Deliverables ...
Words: 607 - Pages: 3
...prevent unauthorized users from logging onto another person’s user account and accessing his/her data? By authorization, a person have to identify his/herself, the access control system verifies the person’s identity, the access control system must determine whether the person is authorized with a username and passwords 3. What permissions are necessary to allow an Active Directory Group called AD_Group to read and write files in a Sensitive directory such as C:\ERPdocuments\HRfiles? Read-Write permissions (Author) 4. How would you apply the permissions (ACLs) stated above (M,RX) to the AD_Group on C:\ERPdocuments\HRfiles from the command prompt using built-in Windows tools? You can use the extended change access control List tool (Xcals.exe) to modify and view NTFS permissions for files or folders 5. When adding permissions to a directory in an Active Directory Domain, would you prefer to add Groups or individual User accounts to said directories? Explain. I would prefer to add Groups, instead of adding permissions to each individual, if it is a large organization 6. Based on Microsoft’s Step-by-Step Guide on Understanding GPOs http://technet.microsoft.com/en-us/library/bb742376.aspx what is the significance of the “Block Inheritance” feature of GPOs and why would it be used? You can...
Words: 1377 - Pages: 6
...CONSOLIDATED DOCTORS A COMPERHENSIVE NETWORK DEVELOPMENT PROJECT SUBMITTED TO THE IT/COMPUTER NETWORK SYSTEMS PROGRAM IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE ASSOCIATE DEGREE By: The Pin Heads: Bobbi Haynes Beau Driscoll Peter Hsu Advisor - Bill Pool and Tracy Martin ITT TECHNICAL INSTITUTE SPOKANE, WASHINGTON NOVEMBER, 2011 Table of Contents Scope Document and Project Charter 4 Purpose 4 Goals and Objectives 5 Success Criteria 5 Project Context 5 Project Deliverables 6 Scope Specifications 6 Out-of-Scope Specifications 6 Assumptions 7 Constraints 7 Risks 7 Stakeholders 7 Recommended Project Approach 7 Cost Matrix 8 Security/Maintenance Plan 9 Introduction and Background 9 Budget 10 Roles and Responsibilities 10 System Administrator 10 Help Desk IT 11 Office Manager 11 Financial manager 11 Supervisors 12 Receptionist 12 Performance Measures and Reporting 12 Printers 12 Phones 13 Work stations and laptops 13 Serves 13 Routers and Switches 13 Software 14 Card Access System 14 Governance and Management/Security Approach 14 Customer/Business Owner Management and security 14 Standard Operations and Business Practices 14 Security 14 Data Sharing 15 Data Storage 16 Tools used for change control management 16 Problem reporting 16 Risk identification 16 Disaster Recovery 16 Documentation Strategies 16 Training 16 Security 17 Roles and Responsibilities 17 Network...
Words: 11047 - Pages: 45
...Group 3 Kristine Bird (AD Forest Domain OU, Groups and GPO Implementation) Ryan Bonisch (Contact list and LAN Implementation Tasks) Anthony Campo (Configuration of Routers, Switches, and VLANs) Gerald Casanada (Voice VLAN, Wireless, DHCP and DNS) Jennifer Coleman (AD Implementation and Tasks lists for AD Policies) Billie Jo Derouin (Security Implementation) Raymond Mack (Security Technology and Timeline) University of Maryland University College CMIT 495 Professor Sam Musa February 28, 2016 Table of Contents Introduction 2 Purpose 3 Implementation Requirements 3 Project Contact List 3 Tool List 3 Equipment Installation Plan 5 Project TimeLine 6 Lan Implementation task 7 Security Implementation task 11 Configuration Routers 41 Switches 46 VLAN Configurations 49 Voice VLAN and Wireless 51 DHCP and DNS 54 Active Directory Implementation Task 56 Active Directory Policies 58 AD Forest Domain OU formation/AD Group Formation/AD GPO Implementation 68 Security Technologies 88 Introduction The implementation of the WWTC is crucial to keep the business functioning and growing. To ensure that new office installation goes smooth group 3 will create a functional implementation plan from the design we proposed to WWTC over the last 7 weeks. Purpose The purpose of this plan is to provide a step by step guide on the network designed proposed by group 3. This implementation plan will include points of...
Words: 13687 - Pages: 55
...1230 Client server Topics • Transmission Control Protocol (TCP)/Internet Protocol (IP) for Wired and Wireless Networks • The Open Systems Interconnections (OSI) Model • IP Addressing • Firewalls TCP/IP for Wired and Wireless Networks[1] TCP/IP is an open-standard communications protocol suite that is the standard for communicating on the Internet • TCP and IP (two different protocols) contain all the fundamental mechanisms needed to support any and all types of networked communications • TCP/IP was developed as part of the ARPAnet project in the 1960’s (the early development of the current Internet) • TCP/IP became a unifying and reliable element that enabled interoperability across incompatible systems • One of TCP/IP's most basic yet critical functions is its preparation of application data for transmission across a network. • TCP/IP accepts data of virtually any size from applications (typically in the form of a file) and chops it up into smaller, more manageable chunks called segments (segmentation) • In communicating, TCP handles flow control, IP handles addressing • Being a suite of different protocols, TCP/IP includes such protocols as DNS, DHCP, http, ftp, POP3, SMTP and TELNET. Other TCP protocols may be found at http://www.protocols.com/pbook/tcpip1.htm The Open Systems Interconnections (OSI) Model The most common way to illustrate the communication...
Words: 1931 - Pages: 8
...|[pic] |Course Syllabus | | |College of Information Systems & Technology | | |NTC/362 Version 1 | | |Fundamentals of Networking | Copyright © 2013 by University of Phoenix. All rights reserved. Course Description This course provides a foundation in the basic telecommunications and networking technologies fundamental to the industry and to the broad field of telecommunications. Analog, digital, and radio frequency technologies are covered. Also covered in this course is an introduction to the OSI protocol model, network-switching systems, basics of wireless communications, and network security. Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents: • University policies: You must be logged into the student website to view this document. • Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at...
Words: 2455 - Pages: 10
...* 1-5 Ethernet Technologies and Cabling * 1-6 Cisco 3 Layer Model * 1-7 Summary * Chapter 2 – IP Addressing and Subnets * 2-1 IP Addresses – Composition, Types and Classes * 2-2 Private and Public IP addresses * 2-3 Subnetting * 2-4 Variable Length Subnet Masks (VLSM) * 2-5 Route Summarization * 2-6 Troubleshooting IP Addressing * Chapter 3 Introduction to Cisco Routers, Switches and IOS * 3-1 Introduction to Cisco Routers, Switches, IOS & the Boot Process * 3-2 Using the Command-Line Interface (CLI) * 3-3 Basic Configuration of Router and Switches * 3-4 Configuring Router Interfaces * 3-5 Gathering Information and Verifying Configuration * 3-6 Configuring DNS & DHCP * 3-7 Saving, Erasing, Restoring and Backing up Configuration & IOS File * 3-8 Password Recovery on a Cisco Router * 3-9 Cisco Discovery Protocol (CDP) * 3-10 Using Telnet on IOS * 3-11 CCNA Lab #1 * Chapter 4 Introduction to IP Routing * 4-1 Understanding IP Routing * 4-2 Static, Default and Dynamic Routing * 4-3 Administrative Distance and Routing Metrics * 4-4 Classes of Routing Protocols * 4-5 Routing Loops * 4-6 Route Redistribution * 4-7 Static and Default Route Lab * Chapter 5 Routing Protocols * 5-1 RIPv1 & RIPv2 * 5-2 Configuring...
Words: 95744 - Pages: 383
...new computers. The central site will control the communication for all the sites. Project Objectives The first course of action is to conduct research for the overall project. Design a LAN and WAN schematic in Visio to illustrate the actually layout. After design the layout for the network discuss how many network you will need to start your subnet process. In the research process you decided how much hardware you will need. Once you research on the internet you will find the better purchase. In the server process you will design and domain network and then configure the server with active directory. Scope: In Scope: * Hardware and software * Configuration of all network connection to allow for high speed communication at all 5 locations with proper security measures in place to secure all data * Guidance / advice on use of wireless systems. Out Scope: * Construction * Work delay due to unforeseen events such as natural disasters or a state of nation emergency * Security of all data and backup media outside of our possession during implementation of solution prior...
Words: 980 - Pages: 4
...Technology (IT), Legal, and Human Resources. The problem; however, lies in all four plants Sales and Marketing, Operations, Finance and Accounting, and Human Resources departments, which have outdated and unconsolidated systems. China Physical Layout One location is China. The Wide Area Network being used has three T1 connections in the United States and a Satellite connection in China. This paper is used for determining the architecture for the Riordan WAN and then research what possible security measures can be taken to reduce Vulnerabilities. The Layout is below: • Ethernet Backbone 1G • Windows Exchange server Email • Windows Network server Domain controller • Unix Server for ERP/MRP Customer and Vendor Relations • Linksys Wireless Router • VOIP Satellite Connection • 35 Dell Optiflex Desktops with windows 2000 • T1 Connection Immediate recommendations that stick out would be several things such as encryption, firewall, and outdated operating systems. The firewalls could be set up in multiple facets like Stateful Inspection, Application filtering, IP filtering, Protocols filtering and whatever access control setup is...
Words: 3147 - Pages: 13
...Services Marketing Assignment on customer gap and provider gap of QUBEE Submitted by: ORCHID Executive summary: This assignment topic is about choosing a service organization to analyze customer gap, to find the factors that causes customer gap and to give solutions to reduce or eliminate customer gap. We have chosen Qubee wireless broadband internet service provider to analyze its customer gap. Qubee provides both corporate services for offices, organizations etc. and individual customer services. But here we have considered only the individual customer services. Customer gap: Occurs when there is difference between expected service and perceived service. Expected service: Customer expectations are the hopes or believes about what should or will happen. The sources of expectations are price, advertising, word of mouth, physical evidence etc. Perceived service: The actual service experience. And the key factors that are responsible for the occurrence of this gap is the provider gaps. The provider gaps are given below: 1. Listening gap: Not knowing what the customers expect. 2. Service design and standard gap: Not having the right service designs and standards. 3. Service performance gap: Not delivering to service standards. 4. Communication gap: Not matching performance to promise. Company background: Qubee is the Bangladeshi customer-facing brand of Qubee Broadband, the wireless broadband business founded in 2007. It has a mission to provide...
Words: 1575 - Pages: 7
...computer name (for example, “ComputerA”) is called name resolution. Correct Answer(s): A 3. Which of the following is not a top-level domain name? A) .aero B) .coop C) .museum D) .corp Feedback: The available generic top-level domain names include .aero, .biz, .com, .coop, .edu, .gov, .info, .int, .mil, .museum, .name, .net, .org, and .pro. Correct Answer(s): D 4. The routing service included with Windows Server 2008 is better suited for __________. A) a smaller network B) a larger network C) a mid-size network D) large amounts of traffic Feedback: The routing service included with Windows Server 2008 is better suited for a smaller network or one with a small amount of network traffic that needs to pass between subnets. Correct Answer(s): A 5. Which feature is an integral part of IPv6, whereas it was an optional feature under IPv4? A) IP security B) subnetting C) DNS security D) name resolution Feedback: IP security through the use of IPSec is an integral part of IPv6, whereas it was an optional feature under IPv4. Correct Answer(s): A 6. The DHCP relay agent listens for which messages that are broadcast from the client? A) DHCPDISCOVER B) DHCPREQUEST C) DHCPINFORM D) All of the above Feedback: The DHCP relay agent is configured with the address of a DHCP server. The DHCP relay agent listens for DHCPDISCOVER, DHCPREQUEST, and...
Words: 9157 - Pages: 37