Preview

IT Assessment Questions and Answers

Satisfactory Essays
Open Document
Open Document
498 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IT Assessment Questions and Answers
IT255 Unit 1

Match Risks/Threats to Solutions:

1. Violaton of a security policy by a user – C
2. Disgruntled employee sabotage - I
3. Download of non-business videos using the internet to an employer-owned computer - A
4. Malware infection of a user’s laptop - L
5. Unauthorized physical access to the LAN - N
6. LAN server operating system vulnerabilities - F
7. Download of unknown file types - B
8. Errors and weaknesses of network router, firewall and network appliance configuration file - H
9. WAN eavesdropping - M
10. WAN Denial of Service (DoS) or Distributed Denial of Service (DDoS) - D
11. Confidential data compromised remotely - K
12. Mobile worker token stolen - G
13. Corrupt or lost data - E
14. Downtime of customer database – J

Lab #1 Assessment Questions and answers

1. Name at least five applications and tools pre-loaded on the Windows 2008 Server Target most computers and identify whether that application starts as a service on the system or must be run manually?

FileZila Server – starts as a service
Nmap - does not start as a service
WireShark – does not start as a service
WinPcap - does not start as a service
Tftpd32-SE does not start as a service

2. What is the DHCP means and what is use for regards to IP host address, DHCP Server, and IP default gateway router?

DHCP (Dynamic Host Control Protocol) is the client/server protocol that automatically provides an Internet Protocol (IP) host with its IP address and other related configuration information such as subnet mask, default gateway and DNS server information…(www.technet.microsoft.com)

3. What is the relationship between risks, threats and vulnerabilities as it pertains to information Systems Security throughout the seven domains of a typical IT infrastructure?

Without threats or vulnerabilities you have very little risk or having an incident. The more likely a threat can exploit any vulnerability the higher the risk becomes. Risk

You May Also Find These Documents Helpful

  • Satisfactory Essays

    None of these Save Question 3 (1 point) Clients can send a DHCP request message to multiple DHCP servers. Question 3 options: True False Save Question 4 (1 point)…

    • 268 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    There are two very important tools to use in Networking. They are Domain Name System (DNS) and Dynamic Host Configuration Protocol (DHCP). These help keep your Network organized while building it. A DNS is a system used to name computers and network services that is organized into a hierarchy of domains. It can help locate computers and services through user names. Dynamic Host Configuration Protocol allows a server to automatically assign IP addresses to a computer from a certain range of numbers configured for that network. These two tools work as the foundation for IT-Management.…

    • 370 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 3 Assignment 1

    • 1244 Words
    • 5 Pages

    Analysis and explanation of the threat and vulnerability pairs and their likelihood of occurrence. The chart explains the aspects of the vulnerabilities and threats. b\Because we have no data on these threats on the amount of occurrences we cannot assign an impact rating or a probability rating in which is high medium an low (reference page 121 of book)…

    • 1244 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    For two computers it’s not worth setting up a DHCP because when the two computers want to access the Internet, they will be provided the first available IP address. If you have five computers it would be a great idea to setup a DHCP because with setting up a DHCP you could set permissions which monitors what the other computers could access the Internet for, how long they could be logged in using the Internet and their activities. Now, if there were twenty-five computers it would be perfect to have a DHCP because each computer will have its own IP Address and the IP address would never expire. Also, with a DHCP you could get permission in what any users is able to do in their specific accounts between the network computer and you are able to monitor the daily activities of each…

    • 299 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Unit 3 Lab

    • 290 Words
    • 2 Pages

    DHCP eliminates the need to assign static IP addresses by allowing a server to assign addresses to devices as they connect to the network.…

    • 290 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    NT1330 FINAL EXAM NOTES

    • 1446 Words
    • 5 Pages

    If this system will be a DHCP server, you should set a static IP address, because that will be required when you try to set up the DHCP server role.…

    • 1446 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 8 Assignment 1

    • 349 Words
    • 1 Page

    default router: A host IP setting that refers to the IP address of some router, on the same subnet as the host, to which the host sends IP packets when the destination is on some other subnet.…

    • 349 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Domain Name System (DNS) and Dynamic Host Configuration Protocol (DHCP) are two things that have made anyone in the IT field’s life a lot easier. Fortunately for us, these two protocols can be implemented together or separately depending on the size and configuration of the network. So, let’s justify the use of DHCP in different scenarios.…

    • 220 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Question 1.1. (TCO 1) Which one of the following Windows NET commands options is not used to control services with the NET ????? ServiceName? (Points : 4)…

    • 566 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 3 Essay

    • 764 Words
    • 4 Pages

    8. Identify the five components of an information system. Which are most directly impacted by the study of computer security? Which are most commonly associated with its…

    • 764 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Just like Windows, Ubuntu used TCP/IP. IPv4 and IPv6 are available. Ubuntu also can use DNS for name resolution. IP addressing can be configured for DHCP to receive an IP address from an DHCP server…

    • 1499 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Is 305 Week 3 Quiz

    • 577 Words
    • 3 Pages

    Using the workstation domain, define risks associated within that domain and explain what can be done to reduce risks in that domain.…

    • 577 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit 7 Lab

    • 293 Words
    • 2 Pages

    3. How does risk management and risk assessment relate to a business impact analysis for an IT infrastructure?…

    • 293 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    IP addressing scenario

    • 548 Words
    • 3 Pages

    To understand the functions of DNS and DHCP, first we must acknowledge their necessities. Humans in general are fairly decent at remembering certain numbers, like home addresses, phone numbers, and Social Securities. And even those simple tasks are becoming difficult for us because of technology doing all the remembering for us. We are becoming lazier and more dependent on computers. If we can’t even do these menial tasks efficiently, how would you expect us to remember dozens of IP addresses for websites? This brings to a solution. Also known as name resolution, it allows us to enter the name of a website, and then the resolution service finds the IP address for that website and directs the request to…

    • 548 Words
    • 3 Pages
    Good Essays
  • Good Essays

    It Quiz

    • 421 Words
    • 2 Pages

    Refer to exhibit. Which type of tool is presented in the graphic? Hex screwdriver; Stripped screwdriver; Philips-head screwdriver; Flat-head screwdriver.…

    • 421 Words
    • 2 Pages
    Good Essays