Unit 6 Lab 1
1. It is important to prioritize your risks, threats, and vulnerabilities to identify which ones
are paramount to fix. The risks, threats, vulnerabilities that present the largest problem to
your network should be priority one while everythin
Unit 4 Lab 1
1. The goal or objective of an IT risk assessment is identify and control how risks
will be managed, monitored, and controlled.
2. It is difficult to conduct a qualitative risk assessment for an IT infrastructure
because it is more of an opin
Unit 5 Lab 1
1. The difference between NMAP and Nessus is that NMAP is used for mapping a
networks hosts and their open ports while Nessus is a vulnerability scanner.
2. The scanning application that is better for performing a network discovery
Unit 2 Lab 1
1. User domain risk
Workstation domain risk
Application domain risk
3. Confidentiality When personal information is compromised.
Integrity When a risk management reporter walks in.
Availability Having backup servers.
4. User domain imp
Unit 4 Assignment 1
1. Estimate the qualitative and quantitative risks of bringing the project to completion:
On time: little to no risk because the project would be developed and fully operational
within the time limit of the contract.
One month early: t
Unit 3 Lab 1
1. The goal or objective of an IT risk management plan is to define risks and how
they will be managed, monitored, and controlled throughout a company.
2. The five fundamental components of an IT risk management plan are identify the
Unit 1 Lab 1
1. Unauthorized access from a public internet would violate HIPPA in the reasoning
that anyone can look over your shoulder and see your credentials and/or your
work information including information like health disabilities or social security
HIT F8 go into safe mode with command prompt
Command line-Type net user administrator /active:yes
Burn iso image
OPTION 3 RESET BACKDOOR(https:/www.youtube.com/watch?v=qIOIe0nr6DQ)
USE WINDOWS 7 I
storage area network (SAN) is a collection of computers and storage devices, connected over a
high-speed optical network and dedicated to the task of storing and protecting data.
Understanding the benefits of a SAN
The benefits of using a SAN are many bec
A modem is a device or program that enables a computer to transmit data over, for
example, telephone or cable lines. Computer information is stored digitally, whereas
information transmitted over telephone lines is transmitted in the form of analog waves.
Risk is the likelihood that a loss will occur. Losses occur when a threat exposes a vulnerability
ThreatA threat is any activity that represents a possible danger.
VulnerabilityA vulnerability is a weakness.
LossA loss results in a compromise to busines
DANGEROUS FILES(.exe ,.com,.pif,.bat.scr)
TYPE CLS then enter to reset screen
CD space . enter to exit directory
Virus option 1
Run as admin cmd
Look for any exe or inf extension files
Cd System 32
Microsofts BitLocker drive encryption software for encrypt hard drive
Have at least two partitions: a system partition (which contains the files needed to start
your computer and must be at least 100 MB) and an operating system partition (which
Adventure Works Marketing Plan
Table of Contents
Revised layout, In scope, out
HIPAA applies to PHI (Protected Health Information). This is information that identifies who the healthrelated information belongs to. I.e. names, email addresses, phone numbers, medical record numbers,
photos, drivers license numbers, etc
1. Unique User
ACIVE DIRECTORY DOMIAN SERVICES-(NEED A DNS SERVER TO INSTALL)-CREATE
USER S,GROUPS,GROUP POLICYS
DCPROMO.EXE-to create a new domain or delete the domain
DCPROMO /FORCEREMOVAL-TO DELETE DOMAIN CONTROLLER OR REMOVE ACTIVE
DIRECTORY DOMIAN SERVICES
Storage area network-high speed network of storage device, each server can access that
storage device as if it was directly connected to that server,easy migration as well aS
A SAN moves storage resources off the common user network ,and reorganizes them
COBIT-Control Objectives for Information and related Technology (COBIT) is a set of good
practices for IT management. It is designed to provide a framework for control of IT functions.
COBIT was written by the IT Governance Institute (ITGI) with ISACA. IS
ACPI advanced configuration and power interface
ADSL asymmetrical digital subscriber line
accelerated graphics port
advanced micro devices
audio modem riser
APIPA automatic private internet protocol addressi
Lab #3: Assessment Worksheet
1. What is the goal or objective of an IT risk management plan? - The purpose of the Risk
Management Plan is to define how risks will be managed, monitored and controlled throughout
2. What are the fi
THE PIE CHART REPRESENTS THE DATA CLEARER AND MORE PRECISE.
1. Success = "A head is flipped on a single coin"
2. p = 0.5
3. q = 0.5
4. n = 10
5. x = 6
P(x=6) = 10C6 * 0.5^6 * 0.5^4 = 210 * 0.015625 * 0.0625 = 0
The date and time stamp of the Nmap host scan is 2010-07-31 13:36 Eastern Daylight
Time. The amount of tests or scripts ran during the scan was 67. The amount of ports that are
open on the targeted host is 50. The servi
HIPPA compliance law
Table of Contents
Chapter One Introduction
1.1 Purpose and Applicability
1.2 Target audience
1.3 Related Publications
1.4 Organization of this Special Publication
Chapter Two The Fundamentals
Lab 2: Align Risk, Threats, & Vulnerabilities to COBIT P09 Risk Management Controls
1. A. A low risk factor is Intra-office employee romance gone bad.
B. A medium risk factor is Workstation OS has a known software vulnerabili
Risk Management Plan:
The risk management plans purpose is to identify what risks DLIS has.
Risk Assessment Plan:
The risk assessment plans purpose is to identify how dangerous the risks identified in the risk