Top-Rated Free Essay
Preview

NT1110 Module5 Lab

Satisfactory Essays
254 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
NT1110 Module5 Lab
Task 1: Understanding BIOS and POST
1. A user boots his or her computer and hears a sequence of six beeps. The computer uses AMI BIOS. What error is indicated by the six beeps?
The error that is indicated by the six beeps is 8042 Gate AZ0 test error. This beep code is caused by an expansion card that has failed pt the motherboard that is no longer working.
2. A different user with a computer using Phoenix BIOS hears a sequence of beeps with pauses in between. The sequence is beep - pause - beep beep beep - pause - beep beep beep beep- pause - beep beep beep. What error is indicated by this beep sequence?
The error that is indicated by this beep sequence is test 512k base memory.

Task 2: Basic Security
Firewalls may be hardware devices or software programs. Hardware firewalls protect an entire network. Software firewalls protect a single computer. Research the Internet for an example of each of these types of firewalls and compare their features. Linksys and Cisco make firewall/routers for home use. The Zone labs are an example of a software firewall.
1. Software firewall: ZoneAlarm two way firewall advanced firewall privacy and security toolbar identity protection antivirus/anti-spyware engine threat emulation pc tune up find my laptop enhanced browser protection advanced real time antivirus
2. Hardware firewall: Sophos new SG series appliances advanced threat protection dynamic app control web malware protection lighting performance customizable web filing
VPNs made easy complete on-box reporting flexible deployment simple management

You May Also Find These Documents Helpful

  • Satisfactory Essays

    The switches in the diagram booted at the same time. Based on the information provided in the diagram fill in the chart below:…

    • 326 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1120 Lab 3

    • 115 Words
    • 1 Page

    1. It can show hackers where to attack and what the most vulnerable parts of the traffic are.…

    • 115 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Mgmt 305 Question Paper

    • 479 Words
    • 2 Pages

    ____6. Refer to Exhibit 2. What is the probability that a randomly selected computer will have a…

    • 479 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Milk Lab

    • 431 Words
    • 2 Pages

    4. The ticker machine was turned on (turnt) and the car was released and stopped as it exited the ramp.…

    • 431 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 1 Module 2

    • 283 Words
    • 2 Pages

    On Thursday, December 22nd 2016, at approximately 10:00AM Mrs. Marie Ernst, HAAS Assistant Principal, informed me a HASD tablet computer, issued to Gilbert Reyes, Grade 10, was broken during period 1/2. She received information on Wednesday, December 21st, 2016 from Mr. Michael Shebolock, HAAS Physical Ed Teacher, regarding the broken tablet.…

    • 283 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    1. What are the six steps that you can use to solve any computer problem?…

    • 850 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    4. Which of the following Windows 7 tools does not aid in the hardware troubleshooting process?C…

    • 466 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Computer Components

    • 699 Words
    • 6 Pages

    1. Examine the following motherboard. One interesting thing you will see is the use of two BIOS chips. The M-BIOS chip is the Main BIOS chip and the B-BIOS chip is the Backup BIOS chip, which is used to rewrite the M-BIOS chip if it becomes corrupted. (Refer to the high-resolution imges for closer inspection.)…

    • 699 Words
    • 6 Pages
    Good Essays
  • Good Essays

    There are two types of firewalls, there is the in-bound firewall that protects against all things that come into your computer. Then there is the two-way firewall. With this firewall it protects both inbound and outbound threats. This type is used quite often these days. Many computer only have a one-way firewall, but many of them like Zone alarm are two way firewalls. Firewalls are used to block or accept information into your computer that is not a threat. It will either send it to where it needs to be or it will block it if the potential of the file is threatening to your device. A type of firewall is your basic McAfee, which works with Microsoft Corporation on your basic computer it is a program that is already installed into your device. It is a virus protector that works with your computers already installed firewall to keep out and potential harmful viruses or threats to your computer. You can do basic setting for the firewall or you can put it to your liking to make sure of no type of threats can enter your computer.…

    • 783 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    3. The teacher will give the question and the answer of the question is found in the chip.…

    • 328 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    parenting skills

    • 297 Words
    • 2 Pages

    14. Provide the correct description for code V69.4 from the tabular list. __________Lack of adequate sleep_________…

    • 297 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    |Hint: Look at Figure 6-56 Use this flowchart when first facing a computer problem |…

    • 882 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Computer Hardware

    • 692 Words
    • 3 Pages

    1.) You need to upgrade memory in a system but you don’t have the motherboard…

    • 692 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Sonicwall

    • 1842 Words
    • 8 Pages

    Today’s evolving threat landscape renders stateful packet inspection (SPI) firewalls irrelevant. SPI does not secure your organization against malware passing from the web and mobile devices or enable application control, which can hurt the productivity of your employees and your organization. In addition, as businesscritical applications move to the cloud, organizations need to ensure that bandwidth is available so that employees can quickly and easily access vital data. Only deep packet inspection (DPI) can do all this, by inspecting every byte of every packet. However, lesser solutions lack the power and sophistication to accomplish DPI without turning the firewall into a bottleneck for high-speed broadband networks. Organizations should not have to trade advanced DPI security and application control for network performance. The new SonicWALL® TZ 215 is the highest-performing, most secure Unified Threat Management (UTM) firewall available today in its price point. It provides full deep packet inspection (DPI) without diminishing network performance, thus eliminating bottlenecks that other products introduce, while enabling businesses to realize increased productivity gains. Designed for small businesses, distributed enterprises, branch offices and retail deployments, the new TZ 215 elegantly integrates the most effective anti-malware, intrusion prevention, URL filtering into a single solution, driving down cost and…

    • 1842 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Grading System

    • 689 Words
    • 3 Pages

    Comment: _______________________________________________________________________________ BIOS Update - Windows for LIFEBOOK A531/AH531 Copyright (c) Fujitsu Technology Solutions 2011 _______________________________________________________________________________…

    • 689 Words
    • 3 Pages
    Powerful Essays