Stephen L Coates Jr (SteCoa8799) Monday, October 11, 2010 CIS 212 Network Security Concepts Lesson 1 Security Fundamentals Assignment
Activity 1-1 D iscussing Security Building Blocks 1) Three common goals of computer security are: A)Confidentiality, C) I
1. What is a fail-safe?
A fail-safe is a system or a plan that comes into operation in an event or something going wrong
or that is there to prevent such an occurrence.
2. What is complete mediation? What are some common exampl
Unit 3 Lab Report
Directions: In your own words, complete the items below using complete sentences. You may need
to refer to the lab instructions, your experience with the lab, or an outside source to answer the
questions. If you use another source, pleas
Burkart Questions Unit 4
What is Kerberos?
Kerberos is a secure method for authenticating a request for a service in a computer network.
Kerberos was developed in the Athena Project at the Massachusetts Institute of Technology.
How does Kerberos prove i
What do you think the basic principles for protecting information are? Explain why you feel
these are important.
As a starter what I think would be best would be to start with assigning minimum privileges. This way
you will hav
1. True or false? The difference between ell switching and packet switching networks is that in cell
switching data is divided into fixed length packets.
2. In which type of switching is a single path from one endpoint to another built when a
Unit 2 Lab Report
Directions: Before answering the lab questions, make sure to read the following:
Understanding Port Numbers
Guide to Intrusion Detection
In your own words, complete the items below using complete sentences. You may nee
1. Discuss the primary difference between the OSI reference model and the TCPIP model.
The OSI reference model has 7 layers, while the TCPIP only has 4. The application layer of the
TCPIP model combines the application
Stephen L Coates Jr (SteCoa8799) <Wednesday, December 08, 2010> CIS 212 Network Security Concepts Quiz#1 Activity 3-4 1. What does the term hardening mean? Harding refers to the tactics you use to modify the security procedures of a computer in order to r
Stephen L Coates Jr (SteCoa8799) <Wednesday, December 08, 2010> CIS 212 Network Security Concepts Lesson 11 Managing Security Incidents Assignment
Activity 11-2 Responding to a Physical Security Breach
1. Assuming you are the first responder, how should y
Stephen L Coates Jr (SteCoa8799)
Monday, October 11, 2010 CIS 212 Network Security Concepts Lesson 1 Security Threats Assignment
Activity 2-1 I dentifying social Engineering Attacks
1. Social Engineering attempt 2. False Alarm 3 Social Engineering attempt
CIS225 Networking II
Unit 2 Lab 1
IP Numbering Systems Practice
PART I: Number Systems Review
Use the following binary numbers to fill in the decimal answer on the left: