Module 6 lab 1
Get no OS found message when we try boot the computer.
BIOS does not detect the hard drive.
The hard drive is damage.
Sector 0 of the hard drive an incorrect or malformed MBR.
An incompatible parti
Module 6 lab 6-2
Defines an HTML document
Defines a title for document
Defines the documents body
<BODY BGCOLOR =#?> </BODY>
Defines a background color
2. Object c and Swift
3. In a compiled implementation, the original program is translated into native machine
instructions, which are executed directly by the hardware.
In an interpreted implementation of a language, th
Module 4 Lab 1
Module 4 Lab
Software as a Service (SaaS): The most commonly used and recognized service, SaaS
is when users access applications over the Internet that are provided by a third party.
The applications need not be in
Occur when the same data is stored in more than one place.
Happens when deleting one piece of data accidentally deletes all information about a
different piece of a data.
Unit 8 Project Part 7: Configuration Management, Change Management and Test Plans
November 06, 2014
The best practices with regards for configuration management process that relates to the
organizations e-commerce monthly release sche
Unit 4 Discussion 1: Social Network Groups for AllA Stupendous Idea or Security Incident
Waiting to Happen?
October 09, 2014
The present thought of making "Social Groups for All" so open to anyone could prove to
be a disaster for many reason
1. What is Brute Force Attack and how can the risks of these attacks be mitigated?
a. A password and cryptography attack that does not attempt to decrypt any
Social networks are web-based applications people use to connect with others with whom
they share common interests, either professionally or personally. Users post co
Running head: UNIT 3 LAB 3 ASSESSMENT QUESTIONS
Unit 3 Lab 3 Assessment Questions
October 2, 2014
UNIT 3 LAB 3 ASSESSMENT QUESTIONS
Unit 3 Lab 3 Assessment Questions
1. What is the purpose and function of Google analytics?
Social networking is a big advantage for e-business model. The reason being is that
mobile web technology is growing eight times faster than the equivale
Compromised Business Application Impact Analysis
A Pubically Traded Retailer with retail outlets
and online shopping/shipping
Windows Deployment Services
assists in rebuilding or deploying
workstations quickly and efficiently in
an enterprise environment.
Local GPOs support folder
redirection and Group Policy
The Default Domain Policy
Unit 2 Assignment 1: Calculate the Window of Vulnerability
A vulnerability is a flaw in an information technology product that could allow violations of
security policy. (L., 2000) A vulnerability or weakness in a system or network can come about
Unit 3 Discussion 1: Access Control Models
Access controls are methods used to restrict and allow access to certain items, such as
automobiles, homes, computers, even your mobile device. The four parts that make up access
controls are: Authorization, Iden
Unit 3 Assignment 1: Remote Access Control Policy Definition
Authorization- Richman Investments must define rules as to who has access to which computer
and network resources. My suggestion is that RI implements either a group membership policy
or an auth
Unit 2 Assignment 2: Microsoft Environment Analysis
1. Vulnerability in Wireless LAN AutoConfig Service Could Allow Remote Code Execution
Vulnerabilities in Remote Desktop Could Allow Remote Code Execution (2671387)
Vulnerabilities in Kernel-Mode
Unit 1 Assignment 2
Data classification standard provides the means of how the business should handle and secure
different types of data. Through security controls different data types can be protected. All these
security controls should apply to each of
m "nun 7-.
E Ethernet adapter Local rea Connection:
r Connectionspecific DNS Suffix vlahs.1oca1
TM'm:la4 Description . . . . . . . . . UHware ccelerated HD PCNet dapter
Physical ddress. . . . . ' 333029991413
Unit 1 Assignment 1
1. Violation of a security policy by a user.
2. Disgruntled employee sabotage.
3. Download of non-business videos using the Internet to an employer-owned computer.
4. Malware infection of a users laptop.
5. Unauthorized physica
Study Part 3
1. To make sure your systems and security controls work as expected
2. A. Baseline
C. Closed-circuit TV
D. Systems that spot irregular behavior
3. Black-box testing, White-box testing and Gray-box testing
4. Is based on knowledge of
Study Material Part 2
1. The Brewer and Nast Integrity Model is based on a mathematical theory published in
1989 to ensure fair competition. It is used to apply dynamically changing access
permission. It can separate competitors data within the same integ
1. Risk the likelihood that something bad will happen to an asset
Threat any action that could damage an asset
Vulnerability a weakness that allows a threat to be realized or to have an effect on an
2. SOX requires publicly traded compan
Project Part 1 Multi-Layered Security Plan
1. Disruption prevention - This is an approach to protect the entire device. A majority of wellknown Internet security software falls into this category. They are designed to prevent a broad
array of malicious at