NT 2640 Assignment 1.
IP addresses classes and special-use IP address space
Class A network addresses have an 8-bit network-prefix with the highest order bit set to 0 and a
seven-bit network number, followed by a 24-bit host-number. A
Unit 3. Project Part 1 Multi-Layered Security Plan
Project Part 1 Multi-Layered Security Plan
Multi Layered Security Plan
This MLS plan will give a brief overview of the security strategies that will be i
Project Pt 2
Project Pt 2 It255
This is a multi-layered security plan. First, Assign people that are fully trained and/or provide the
training that makes it possible to do the job. To prevent malicious software and etc. in the 7
domains of an
UNIT 5 Assignment 1
A Good World Leader
A. I chose MAHATMA GANDHI, why? Because
I believe that Mahatma Gandhi was an international leader. I believe in this because he was the
preeminent leader of British-ruled India. He led India to independe
SP 2750 UNIT 3 JOURNAL 1
PERSONALITY TYPES AND GROUPS/ DIVERSITY
When we are talking in relation to personality types and groups diversity, we talk about the
group who possess individual qualities that are diverse from our traits. Diversity is
Unit 1. Lab 1. Data on Fixed Line vs. Cellular Debate
This paper documents the changing patterns of usage of mobile telephones in the US
from 1999 through 2001. While the rapid pace of consumer adoption of mobile telephone
3155 RESEARCH METHOD
UNIT 2 ASSIGNMENT 3
Digital Video as Qualitative Research Practice
For most students of the social world, the inventory of methods is broadly divided into the
quantitative and qualitative. While most of us are willing to a
UNIT 5 DISCUSSION 1
RISK ASSESSMENT AND RISK MITIGATION CONTROL
The NIST SP 800 -53 EV 3 identifies 18 families of controls. It groups these controls into three
classes: Technical, Operational, and Management. Some of the controls that fall un
Unit 5. Assignment 1.
Cabling Factors and Tools
When doing cable installation, efficiency and safety are some of the important considerations
that are to be taken seriously. Cables are of different uses and they help carry data, power and
Unit 9. Assignment 1
Difference between LED and Laser Transmitters
A laser emits coherent light while an LED emits incoherent light.
Optical transmitters generate the light signals carried by a fiber optic communication system. a
UNIT 3. Assignment
Network Topology Paper
Hierarchical Star is multiple computers connected to single, centrally located point. In
local area networks where the star topology is used, each machine is connected to a
central hub. The star topolo
Unit 6. Assignment 1.
A cable tester is a device that is used to test the strength and connectivity of a particular type of
cable or other wired assemblies. There are a number of different types of cable testers, each able
Copper Vs Fiber Paper
Discovering the perfect solution for my cabling infrastructure is a difficult task. However, once i
understand the distinct properties of copper and fiber my solution may seem clearer.
Advantages of Structur
Unit 7. Assignment 1.
Refraction, Reflection, and Signal Degradation in Fiber-Optic transmission.
Reflection is a computer process involving self-awareness. Just as with humans, reflection
depends on the capacity for independent reason, and pa
Unit 8. Assignment 1.
Splicing and Connection Performance
3 Factors that could affect splice performance are as follows:
The cladding diameter tolerance controls the outer diameter of the fiber, with tighter tolerances
Unit 9. Lab 1.
New Building Optical Network
Fiber optic network design refers to the specialized processes leading to a successful installation
and operation of a fiber optic network. It includes determining the type of communication
Unit 10. Exercise 1.
Testing Fiber-Optic Cables
A continuity tester consists of a battery in housing, with a test probe connected to one end
of the battery housing and a test wire with an alligator clip connected to the other end. It is
Unit 10. Assignment 1& 2
Examine Real-World Applications of Security Standards and Compliance Laws
are as Follows:
1. Data Encryption Standard (DES): A predominant algorithm for the encryption of electronic data. It
was influential in the adva
Unit 8 Assignment 1&2
The Internet is vulnerable to myriads kinds of attacks, due to:
1. Vulnerabilities in the TCP-IP protocol
2. No global flow control mechanisms
The above two problems lead to many TCP exploits and the dre
NT2640 Assignment 5
Cisco Networks EIGRP versus OSPF
Dynamical routing protocol
released by Cisco
Dynamical routing protocols
NT 2670 Assignment 3
Choosing Port Scanning Software
1. What is port scanning? ANS: is the name for the technique used to identify open ports and
services available on a network host. Also is a series of messages sent by someone attempting to
NT 2670 Unit 6 Assignment
Maintaining Web Services with a Dynamic External IP Address
1. What is Dynamic DNS? ANS: is a service that maps Internet domain names to IP
addresses. Also is a method, protocol, or network service that provides the c
Designing an Exchange Server (PORTFOLIO)
1. What is the total cost of the server you designed? ANS: $1,000
2. Would you recommend a multiple core processor? If so, why or why not? ANS: Yes,
because A multi-core processor is a
ITT TECHNICAL INSTITUTE
Email and Web Services
Email and Web Services
Unit 1 Assignment 1: Installing Server Roles with a Batch File
Course Objectives and Learning Outcomes
Unit 1. Assignment 1.
Match Risks/Threats to Solutions
1. Violation of a security policy by a user.
C. Place employee on probation, review acceptable use policy (AUP) and employee manual, and
discuss status during performance reviews.
Unit 1. Assignment 2.
Impact of a Data Classification Standard
I have identified at least three IT infrastructure domains affected by the Internal Use Only data
classification Standard. The infrastructure at Richman Investments will in
Unit 2. Assignment 1.
Calculate the Window of Vulnerability
Calculate the Window of Vulnerability
The four parts would be the Discovery-Time, Exploit-Time, Disclosure-Time, and Patch-Time.
All four of these must be looked at and evalua