LAB 5 IT220 Exercise 5.1.1 * The 802.1 standard defines the 802 family of standards, describes the local area network, and defines the LAN address format. Exercise 5.1.2 * The 802.3af standard originally defined PoE functionality. The standard was enhanced in the year 2009, the name of it is 802.3at. Exercise 5.1.3 * 500 meters * 185 meters * 100 meters * Fiber Optic * UTP, 100 Meters * UTP, 100 Meters * Multi-Mode-Fiber Optic, 550 Meters * Single
Words: 845 - Pages: 4
Lab 5 The biggest difference between these two types of networks is one uses network cables and one uses radio frequencies. A wired network allows for a faster and more secure connection and can only be used for distances shorter than 2,000 feet. Several other disadvantage of a wired network such as the “need to run cables in difficult environments through walls, floors and ceilings. Cables need to be run from computer to computer and switch to switch. Process can be time consuming. Loose cables
Words: 294 - Pages: 2
LAB 5 NT1230 5.1 5.2 Question 2 The result was “ this page can not displayed” Question 3 Intranet explorer could not open the page. Question 4 Page still could not be open. Question 5 •Make sure the web address http://ip_address is correct. •Look for the page with your search engine. •Refresh the page in a few minutes Question 6 It is important to clean caches before retesting the web server so it does not open the same cache if there was an error Question 7 The firewall
Words: 293 - Pages: 2
LAB 5 WORKSHEET WORKING WITH FIREWALLS, ENCRYPTED FILE SYSTEMS (EFS) AND USER ACCOUNT CONTROL (UAC) Exercise 5.1 Installing Internet Information Server Overview Because this is only a test deployment, you will be using a Windows 7 computer to function as the web server. In Exercise 5.1 you install Internet Information Services on your workstation and configure it to host two web sites. Completion time 10 minutes 19. Take a screen shot of the Internet Information
Words: 1208 - Pages: 5
Lab Five Executive Summary A security test is a method of evaluating the security of a computer system or network by methodically validating and verifying the effectiveness of application security controls. A web application security test focuses only on evaluating the security of a web application. The process involves an active analysis of the application for any weaknesses, technical flaws, or vulnerabilities. Any security issues that are found will be presented to the system owner, together
Words: 5541 - Pages: 23
This assignment was designed put us, the student in a situation where we are placed in the supervisor position. In this assignment put the supervisor in a position of having to pick and choose what tasks to do themselves and what tasks should be delegated out after coming in and finding their basket full of tasks that need to be dealt with. When you obtain the position of supervisor, there is usually far too much for just you to do, therefore it is important to learn what to delegate and who to
Words: 848 - Pages: 4
b. Public transportation (If answered private vehicle to number 3 please go to question number 4, if answered Public Transportation please go to question number 5.) 4.) How likely are you willing to carpool? a. Very likely b. Likely c. No change d. Less likely e. Not likely at all 5.) Do you shop at other outlets in the area? If yes please answer question number 6, if no go to question number 7. a. Yes b. No 6.) Please rank the shopping
Words: 562 - Pages: 3
Customer number 1 Interested in a Camera Photo • What is your age? 38 • What is your gender? Male • What is your household size? 2 people • What is your household income? $40,000.00 • What is your profession? Handling heavy machinery • What is your education level? High School Diploma Psychographic Questions • What did you find interesting about this product? It’s capability of taking photos • What are your thoughts about the product? It has a great resolution Buying Pattern Questions
Words: 2014 - Pages: 9
common method of obfuscation used in most real world SQL attacks are methods, including character scrambling and masking, numeric variance and nulling, rely on an array of built-in SQL Server system functions that are used for string manipulation. 5. SQL injections is the most prone to extract privacy data elements out of a database. 6. If I could monitor when SQL injections are performed on an SQL database I would recommend well-coordinated and regularly audited security checks as a security countermeasure
Words: 287 - Pages: 2
Experiment 5 Titration of a Strong Acid with a Strong Base Part I: The purpose of this experiment was to prepare an aqueous solution of NaOH, and to determine the concentration of the secondary standard NaOH solution by titrating it with a solute of primary standard, KHP. Another objective of this experiment was to learn how to plot a 2nd derivative graph using LoggerPro, and determining the concentration of the secondary standard from the 2nd derivative data. The primary standard was
Words: 655 - Pages: 3