Lab 7 & 8

Powerful Essays
Week 4 Lab Part 1: Design a Multi-factor Authentication Process
Assessment Worksheet
Design a Multi-factor Authentication Process
Lab Assessment Questions & Answers

1. In an Internet Banking Financial Institution is Single Factor Authentication acceptable? Why or why not?

Yes it can be acceptable because you can buff up security elsewhere.

2. Explain the difference between Positive Verification and Negative Verification?

Negative verification is the opposite of positive verification. The customer must contact the bank to verify that the information is correct.

3. What vulnerabilities are introduced by implementing a Remote Access Server?

Could Allow Remote Code Execution, two heap overflow, cross-site scripting (XSS) vulnerability that could allow elevation of privilege, enabling an attacker to execute arbitrary commands on the site in the context of the target user.

4. What is a recommended best practice when implementing a Remote Access Policy server user authentication service?

Using multi-factor authentication.

5. Name at least 3 remote access protections or security controls that must be in place to provide secure remote access.

Authorized secure remote access, Traffic inspection and Coordinated Threat Control, Centralized security management and enterprise-wide visibility and control.

6. When dealing with RADIUS and TACACS+ for authentication methods, what protocols are used at Layer 4 for each of these techniques?

UDP for RADIUS and TCP for TACACS+

7. In TACACS+ communications, what part of the packet gets encrypted and which part is clear text?

MD5 for encryption and XOR for clear text

8. In RADIUS authentication, what is the purpose of the “Authenticator”?

To provide a modest bit of security.

9. Which of these two, RADIUS and TACACS+, combines both authentication and authorization?

RADIUS

10. Is combining authentication and authorization a less or more robust way of handling authentication?

You May Also Find These Documents Helpful

  • Better Essays

    Lab 7 & 8 Assignment

    • 1108 Words
    • 4 Pages

    BIMM 101: Recombinant DNA Lab Lab 7 & 8 Assignment Part B 1. A genomic library is a “collection of recombinant vectors or clones, among which is representative of the entire genome of the organism” (BIMM 101 Lab Manual, 47). In order to create a genomic library, genomic DNA from Vibrio fischeri was first isolated then treated with Sal I restriction enzyme to generate inserts (smaller fragments of DNA). Sal I restriction enzyme was also used to treat the vector plasmid in order to digest…

    • 1108 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    ISS 418 Lab 7 and 8

    • 1105 Words
    • 5 Pages

    Lab Assessment Questions & Answers 1. What is the command to view the current Linux Kernel parameters? The command that will allow you to see the Kernel parameters is sysctl –a. 2. What command can you run to list all the kernels available parameters one screen at a time with the ability to move forward and backwards on the output? The command that would you to do accomplish this would be the less /proc/modules 3. What is the purpose of enabling syncookies in the Linux Kernel? The purpose…

    • 1105 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Lab 8

    • 1110 Words
    • 5 Pages

    ESCI 1102 Lab 8 Population Change Directions: Listed below are this Learning Module lab questions to answer. When completed, upload this file back to the Lab dropbox (where you downloaded in the first place). FYI: I really like it when the answers are in a different format/color than the questions. It helps when grading. Part 1. Population Biology is an online virtual lab that will illustrate how competition affects population growth. Follow the instructions given. Two species of unicellular…

    • 1110 Words
    • 5 Pages
    Good Essays
  • Good Essays

    LAB 8

    • 385 Words
    • 1 Page

    LAB 8: Troubleshooting Task 1 Problem Description: A user boots her computer and hears a sequence of six beeps. The computer uses AMI BIOS. What error is indicated by the six beeps? A different user with a computer using Phoenix BIOS hears a sequence of beeps with pauses in between. The sequence is beep – pause – beep beep beep – pause – beep – pause – beep beep beep. What error is indicated by this beep sequence? The problem is the users are experience beeps when using their respective Bios systems…

    • 385 Words
    • 1 Page
    Good Essays
  • Powerful Essays

    Lab 8

    • 740 Words
    • 3 Pages

    GS104 Lab Report Experiment # 8 Static electricity or Electrostatics David Case: March 6, 2015 Experiment #8 Static Electricity or Electrostatics Objective: To explore the concepts of static electricity and to discover how many types of electrical charges exist and how they interact with each other Materials: 1 Scrap of white paper 1 Transparent tape 1 Aluminum Foil - 6"x 6" 2 Cup, Styrofoam, 8 oz 1 Dark paper - 1/2…

    • 740 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    Lab 7

    • 995 Words
    • 4 Pages

    Lab 7: Geologic Time 9 Answer Sheet Name(s) 1. As an example of how radioactive decay works, the TA may lead a small demonstration. Each student will receive one penny and stand up. At this point all of the students are parent isotopes. Every student should then flip their penny. Students whose penny lands heads-up should sit down. These students who are now seated are now daughter isotopes. The remaining standing students should again flip their penny, and students whose penny lands heads-up…

    • 995 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Unit 8 Lab 8

    • 3405 Words
    • 15 Pages

    Lab 8 answer key Exploring group policy administration This lab contains the following exercises: Exercise 8.1 Configuring the Local Computer Policy Exercise 8.2 Configuring Processing Order Exercise 8.3 Configuring Priority Order Exercise 8.4 Using Block Policy Inheritance and Enforce Exercise 8.5 Cleanup for Exercise 8.6 Exercise 8.6 Configuring Account Policies Post-Lab Cleanup Estimated lab time: 130 minutes Exercise 8.1 Configuring the Local Computer Policy Overview…

    • 3405 Words
    • 15 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 8 Lab 8

    • 1017 Words
    • 8 Pages

    Lab 8.1: IP Addressing and Classes Exercise 8.1.1 Network ID: 110 Host ID: 10.10.1 Network ID in binary: 1101110 Host ID in binary: 101010101 Exercise 8.1.2 Class Range Network ID Host ID Possible Networks Possible Hosts per Network A 0-127 A b.c.d 2^7 2^24 B 128-191 a.b c.d 2^14 2^16 C 192-223 a.b.c D 2^21 2^8 If you used the number of bytes instead you would get a whole different amount of possible networks which isn’t right. Exercise 8.1.3 No I will not fit in this the 192-223 range. Exercise…

    • 1017 Words
    • 8 Pages
    Satisfactory Essays
  • Satisfactory Essays

    LAB 7

    • 354 Words
    • 2 Pages

    last volume you created different from the previous ones? Explain why. The size of the volume is different. By shrinking the file it made the volumes less than 2000MB 7. What do you suppose would happen if you created another simple volume out of the free space left on the disk? I think that the it will run out of recourse. 8. Were you successful? No, The extend option is grayed out. 9. What is the result? It was successful 10. Does the capacity of the S: drives reflect the addition of the…

    • 354 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    1. What are some common risks, threats, and vulnerabilities commonly found in the LAN-to-WAN Domain that must be mitigated through a layered security strategy? A layered security strategy will encompass Rouge protocols such as Bit mining and P2P, Unauthorized network scanning and probing, and unauthorized access to the network. 2. What is an Access Control List (ACL) and how is it useful in a layered security strategy? An ACL is a Control list which will allow or deny traffic or devices based on…

    • 928 Words
    • 3 Pages
    Good Essays