CIS 3406
Article # 1
Samuel Liberatore
Title: Systems Automation: A Way to Reduce RIM risk
Source: Information Management Journal; May/Jun2016, Vol. 50 Issue 3, p38-40, 3p
Author: Penha-Lopes, Joao
Summary: The article focused on reducing information tech
Samuel Liberatore
Article Review # 3
CNT 3406
12/1/2016
The security of patient information and health records is a popular topic in the
realm of cyber security. However, a new concern is now a rising topic as well and it is
focused on the security of per
Samuel Liberatore
CyberCIEGE LAB JOURNAL
Information Assurance and Security Policies Module
I must admit that prior to installing and using CyberCIEGE I did not expect to enjoy
something labeled as an educational video game! However, I found it very inter
Lab Journal
CHAPTER 1
PROJECT 1
Installed Nmap as requested.
Entered IP of another local computer 192.168.1.104
THEN COMPLETED REGULAR SCAN SEE SCREENSHOT BELOW
Ports and hosts tab
HOST TAB SCREENSHOT
SCREENSHOT OF CLASSMASTES IP ADDRESS BEING SCANNED
INS
CNT 4504
Exercises Chapter 2
1. P3. Consider an HTTP client that wants to retrieve a Web document at a given URL. The IP
address of the HTTP server is initially unknown. What transport and application-layer
protocols besides HTTP are needed in this scenar
CNT 4504
TCP Lab Chapter 4
ICMP and Ping: ICMP-ethereal-trace-1 trace file.
Lets begin by opening the Windows Command Prompt application (which
can be found in your Accessories folder).
Start up the Wireshark packet sniffer, and begin Wireshark packet
cap
CNT 4504
1/24/2016
P5. Review the car-caravan analogy in Section 1.4. Assume a propagation speed of 100
km/hour.
a. Suppose the caravan travels 150 km, beginning in front of one tollbooth, passing through a
second tollbooth, and finishing just after a thi
CNT 4504
Exercises Chapter 3
1. P4a
(a) Suppose you have the following 2 bytes: 01011100 and 01100101. What is the 1s
complement of the sum of these 2 bytes?
Answer:
The sum of 01011100 and 01100101 is:
01011100
+01100101
=11000001 Sum
The 1s compliment i
CNT 4504
Exercises Chapter 5
Complete the following problems in Chapter 5: P5, P14, P17, P18.
P5: Consider the 5:bit generator, G=10011, and suppose that D has the value 1010101010.
What is the value of R?
Answer:
The division of 10101010100000 by 10011 i
Duvan Ochoa Polo
Section 12.1 & 12.3
2a) x * 1=0 (0)
2b) x+x=0 (0)
2c) x*1=x (0,1)
2d) x*x=1 (none)
24a) x 0 = x
24b) x 1 =
24c) X X = 0
24d) X
SEC 12.3
2)Solution:
4) Solution:
6) a)
b)
=1
c)
d)
Duvan Ochoa-Polo
Section 3.1
6) If ak < 0, then we set N = N +1, otherwise N is unchanged. After all n steps we end up with N
equal the number of negative integers in the list of a1, a2,., an. N = 0 is the initial value for the
number of negative integers
Duvan Ochoa-Polo
Section 11.1 & 11.4 Exercises
Sec 11.1
4a) a is the root
4b) b, d, e, g, h, i, o are internal vertices
4c) c, f, j, k, l, m, n, p, q, r, s are leaves
4d) j has no children
4e) d is the parent of h
4f) p is the sub ling of o
4g) g, b, a, a
Duvan Ochoa-Polo
Section 4.1 & 4.2 Exercises
22)
a.111/99 is between 1 and 2, so the quotient is 2 and the remainder is 111(2)99 =
111+198 = 87
b.9999/101 = 99, so that is the quotient and the remainder is 0
c. 10299 div 999 = 10, 10299 mod 999 = 10299 10
Duvan Ochoa-Polo
Section 4.1 & 4.2 Exercises
22)
a.111/99 is between 1 and 2, so the quotient is 2 and the remainder is 111(2)99 =
111+198 = 87
b.9999/101 = 99, so that is the quotient and the remainder
Duvan Ochoa-Polo Lab 4
Seminole State College Altamonte Campus
Duvan Ochoa-Polo Lab 4
Duvan Ochoa-Polo Lab 4
Duvan Ochoa-Polo Lab 4
Duvan Ochoa-Polo Lab 4
Duvan Ochoa-Polo Lab 4
a. A list of the equipment that you will need for the wireless network (acces
Duvan Ochoa Polo
Section 12.1 & 12.3
2a) x * 1=0 (0)
2b) x+x=0 (0)
2c) x*1=x (0,1)
2d) x*x=1 (none)
24a)
24a) x
x 0 = x
24b)
24b) x
x 1 =
24c) X X = 0
24d) X
SEC 12.3
2)Solution:
4) Solution:
6) a)
b)
c)
= 1
d)
Duvan Ochoa-Polo
Section 11.1 & 11.4 Exercises
Sec 11.1
4a) a is the root
4b) b, d, e, g, h, i, o are internal vertices
4c) c, f, j, k, l, m, n, p, q, r, s are leaves
4d) j has no children
4e) d is the parent of h
4f) p is the sub ling of o
4g) g, b, a, a
Duvan Ochoa-Polo
Section 3.1
6) If ak < 0, then we set N = N +1, otherwise N is unchanged. After all n steps we end up with N
equal the number of negative integers in the list of a1, a2,., an. N = 0 is the initial value for the
number of negative integers
Duvan Ochoa-Polo
Section 6.1 & 6.2 Exercises
8) The value of the first letter can be selected 26 ways, the second 25 ways, the third 24.
26 25 24 = 15, 600
12) 2^1 + 2^2 + 2^3 + 2^4 + 2^5 + 2^6 =
Duvan Ochoa-Polo
Section 6.1 & 6.2 Exercises
8) The value of the first letter can be selected 26 ways, the second 25 ways, the third 24.
26 25 24 = 15, 600
12) 2^1 + 2^2 + 2^3 + 2^4 + 2^5 + 2^6 = 126
32)
a) 26^8 208827064576
b) P(26,8) 26x25x24x23x22x21x2
Home Design Solutions Infrastructure Consolidation
9 October 2016
IT Unlimited
Benjamin Rainey, Brent Tyler, Seth Beezhold and Adam Sullivan
Home Design Solutions
101 Sedalia Drive, Phoenix, AZ 85001
(602) 548-2436
Group 4
CIS4891 Capstone
Milestone 2 9 O
1 Overview
The purpose of this policy is to establish acceptable and unacceptable use of
electronic devices and network resources at HDS in conjunction with its established
culture of ethical and lawful behavior, openness, trust, and integrity.
HDS provid
1 Overview
The purpose of this policy is to establish acceptable and unacceptable use of
electronic devices and network resources at HDS in conjunction with its established
culture of ethical and lawful behavior, openness, trust, and integrity.
HDS provid
Security for HDSs New IT Infrastructure
Bruce Schneier, the renowned security technologist and author once said the motto
for any good security engineer is Security is not merely a product, but a process.
Its more than designing strong cryptography into a
Seth Beezhold
9-25-16
Organizations need to bring about continuous change in the business to implement and
adapt their selves to complex business environment. Various types of Information
Systems are used by businesses and organizations to support the pro
Example of screenshots and activities for lab 2 wireless networking
Part 2
Some examples using the suggested web app at toast.net are below
Examples of interference on network (Libretel SSID) with and without interference device (microwave
oven)
Examples