0 - 126
128 - 191
192 - 223
224 - 239
240 - 255
Used for multicast.
Used for research.
= 2 = 126
(2 )-2 = 16,777,21
CIS225 - BLACKBURN
UNIT 1 LAB 1
TCP Model versus OSI Model
IPv4 Addressing and Subnetting
IP Version 4
Defined in 1981 as protocol for Internet routing
Divided into four groups with eight bits each
Each group is ca
m cums mew ms sxcsnsons Help
ical [Rm] New cm Mwe Object sq mm Baqumund Vewmrt
Ammm Physul Cong Desktop Cuslolnlnlezce
V5. Emmi) moms: mom Type 1an 25!"- F E-
m mm W A mp
_ m mm W E map I
o mm W s m
By: Michael Cox
Unit 1 Guided Practice: The OSI Reference Model
CIS202 Unit 2 Lab Activity 2.3
This lab instructs you on how to configure a routers interfaces.
The router should be reset to have no startup configuration.
NOTE: Wwhile your results will be very close to those shown below, details may vary, for example:
IP Addressing Basics
Name the five different classes of IP addresses
Describe the characteristics and use of the different IP address classes
Identify the class of an IP address based on the network number
Determine which part, or octet, of an
Unit 2 Reflection
1. What did you learn in this Unit?
In chapter 3. I learned about enterprise security and the types of concern a CASP
must deal with when looking to secure the infrastructure. Also learned how the
increase need for storage, growth in vir
Unit 1 Reflection
1. What have you learned in this Unit?
In chapter 1, I learned about cryptography and how it is one of the most powerful
tools that a security professional has. It offers the ability to verify the integrity of
patches, files and other im
Unit 3 Reflection
1. What have you learned in this Unit?
In this unit, I learned that Host Security can be divided into two categories, the
first one being reducing the attack surface, and implementing controls to detect
and respond to a problem. I also l
Unit 4 Application Assignment
1. What are entitlements and how do they contribute to the debt? What can be done
about entitlements to control spending?
Entitlements refer to the benefits and the welfare schemes provided to the
dependent population in the
Unit 3 Application Assignment
1. What is consumer confidence and what role does it play in the economy? What
effect, if any, would consumers pulling money out of their checking accounts and
putting into home safes have on investment, interest rates, and G
Mr. Merritt CIS 427
Nov. 9, 2016
Cryptography is the science of coding and decoding messages so as to keep the messages
secure. Coding takes place using a key that ideally is known only by the sender and intended
Chapter 4 Review Questions
By default, what is at the end of every ACL? D: An implicit deny statement
Which of the following can extended ACLs not check for? C: Response value
Extended ACLs can process all of the following except? A: SSL
Unit 1 Review Assignment
1. Which of the following features are supported with Enterprise Plus but not with Enterprise? A:
Sotrage I/O Control, B: Distributed Switch.
2. Which of the following is not a basic requirement for CPU for vCenter Server
Compatible with ESX/ESXi version 4.1
and later. Features released with later
vSphere distributed switch versions are
Compatible with ESXi
Unit 2 Application Assignment
1. What are the different types of unemployment?
Frictional: Unemployment that occurs because it takes workers time to move
from one job to another. Thought to only last short periods of time and not
problematic from an econo
Chapter 1 Review Questions
1. You have been asked by a member of senior management to explain the importance
of encryption and define what symmetric encryption offers. Which of the following
offers the best explanation? B: confidentiality
2. As the securi
Unit 1 Application Assignment
1. What are globalization, comparative advantage, and outsourcing?
Globalization refers to the tendency of international trader, investments, information
technology and outsourced manufacturing to weave the economies of diver
Chapter 3 Review Questions
1. _ provides the means to have assurance that only authorized subjects have access to
information and data. C: confidentiality
2. Which of the following is not a benefit of cloud computing? D: Increased data privacy
3. Which of
What are five MAC OSX interfaces? Panther, Leopard, Snow Leopard, Mountain Lion, and
How do I turn on AirPort?
From the Apple menu, choose System Preferences.
From the View menu, choose Network.
In the list of available network connections
Find locations of files
Create new directories
Change permissions on files
Locates the binary, source, and manual page files for a command
List directory contents