Free Essay

Week 5 Assessment

In: Computers and Technology

Submitted By dds54
Words 346
Pages 2
Lab #7 Assessment Questions

1. The Routing and Remote Access Services are need in Windows Server 2008 to provide remote access to clients. This service is important in a corporate environment because there is the potential to have several hundred or thousands of clients to manage and the IT personnel to support that many computer is limited and unable to provide hands on service to every client.

2. The IP host range for the remote VPN client pool is 172.30.0.250 through 172.30.0.252.

3. There are two encryption setting available from the remote access server, Microsoft Encrypted Authentication version 2 (MS-CHAPv2) and Microsoft Encrypted Authentication (MS-CHAP). MS-CHAPv2 is more secure and the best option to use but MS-CHAP does offer backwards compatibility.

4. During a Remote access session the client is only asked to provide it’s credentials once. This is an example of milt-factor authentication because the knowledge factor and the inherence factor used in the authentication of the user.

5. Strong encryption is important for both authentication and communication protocols because this is the connection used to communicate with the remote server. The weaker the authentication and communication protocol is then you are making it easier for unwanted user to gain access to your network.

6. MS Windows Server 2008 authentication protocols are EAP, MS-CHAPv2, MS-CHAP, and PAP. EAP is the strongest security by providing the most flexibility in authentication variations.

7. The other type of connection supported by MS Remote Access Services in Server 2008 is dial-up networking.

8. The IP address assigned after connecting tot he VPN server was 172.30.0.251. In Network Connections you can view the properties of the various connections that are system has. From this properties window you are able to view the details about IP addresses.

9. To verify the IPSec VPN tunnel is encrypting you IP data payload you can view the station of the network connection and view details about what protocols, encryption and other information about the VPN connection.…...

Similar Documents

Premium Essay

Week 5

...Week 5 Individual Assignment - Due Day 7 Class, Six months after the merger described in Change and Culture Case Study I, the new administration initiated a significant reduction in force. A decision was made to redesign patient care delivery. The administration’s first job redesign recommendation was that of a universal worker. The universal worker would deliver many support services. Aware that this model often failed when implemented in other organizations, your administrator charged you with making redesign work this time.   Resource: Week Four article by Peter Senge Write a 1,750- to 2,100-word paper in which you address the following: * How would you begin the process of job redesign? Do not consider only the universal worker. * What work processes and performance expectations must be considered once the design is completed? *  Based on the article by Peter Senge in Week Four, what steps and structures will you put in place to make the organization a true learning organization, and thereby encourage workers and managers to adapt and excel in spite of the changes? * How can you plan and control the intraorganizational and interorganizational communications that must occur to implement the job design changes? *  How can management ensure individual job satisfaction for this position? Cite at least five references. Format your paper consistent with APA guidelines. This assignment is worth seventeen percent of your class grade.  There......

Words: 262 - Pages: 2

Premium Essay

Lab 5 Assessment Worksheet

...characters: uppercase letters, lowercase letters, numbers, symbols/don't contain the user's user name or screen name 5. Could you perform the analysis in other computers? If so, how do you connect from the main computer? Under the Security Settings extension to Group Policy, you can. The Security Configuration Tool Set also includes an extension snap-in to the Group Policy editor to configure local security policies as well as security policies for domains or organizational units (OUs). Local security policies only include the Account Policy and Local Policy security areas described above. Security policies defined for domains or OUs can include all security areas. In this scenario the other computers would have to be part of the domain or OU. 6. What sources could you use as a source to perform the MBSA security state? MBSA will automatically assess missing security updates on target computers based on their access to the live Microsoft Update Web site. If the target computer is also assigned to a WSUS server, the Microsoft Update results are limited to the updates approved by the WSUS server administrator. If the target computer cannot determine its security state based on Microsoft Update and an assigned WSUS server, the offline catalog (Wsusscn2.cab) on the scanning computer is pushed to the target computer to make the security assessment 7. What does WSUS stand for and what does it do? Windows Server Update Services, enables administrators to manage......

Words: 676 - Pages: 3

Free Essay

Is3230 Lab 5 Assessment

...Lab 5 Assessment | 1. They are a. Password b. Token c. Shared secret 2. Authorization is a set of rights defined for a subject and an object; this concept is aligned with Identification and Authentication because these are the 3 steps to the access control process 3. Remote Access servers, Authentication servers, and Logical IDS 4. Network should be both connected and secured physically and remotely in order to avoid unauthorized access to the system. The three are the computer has authorized access. Computer settings must be in compliance with the security standards, and the user having authorization access. 5. NAC Systems implement network security policy at the network access point relatively than the client (endpoint) operating system. Reliant on the system architecture and configuration, NAC systems can deliver physical port security or logical port/access security. NAC systems necessitate authentication for both the endpoint and user before the network access point forwards traffic for that client 6. PKI refers to a framework of programs, data standards, communication protocols, policies, and cryptographic mechanisms. The PKI infrastructure delivers for the generation, production, spreading, control, accounting and obliteration of public key certificates. PKI offers a selection of facilities containing issuance of digital certificates to individual users and servers, end-user enrollment software, assimilation with......

Words: 468 - Pages: 2

Premium Essay

Week 5

...Week 3 Summary MGT/311 Team B William Osborn, Juli Gibson, Ramon Taboa, Terrence Griffin, Cedric Davis June 30, 2014 James Eyster Week 5 Summary: Team B This week we learned ways to help make the changes within the company easier for the employees. Changes in the workplace can consist of things such as management, change in how the work is done, and change of ownership to name a few. Most people fear the unknown so when changes are made within the company. Some common fears are losing their job, that the change will affect the culture and effectiveness of implanting that change. There are some ways that the company can help to relieve some of that fear by educating the employees on the changes that are being made. The company can also relieve some of the fear by having open communication by letting the employees ask questions and give them an honest answer. Some negative ways to implement the change are by manipulation and cooptation. By doing this it can backfire on the company when the truth comes out. Going hand in hand with a company implementing changes is stress in the workplace. There are many things that can contribute to stress in the workplace. There are various ways stress in the workplace can occur for example, workload, coworkers, management, and pay. For an employee to relieve some of that stress it may help to take breaks to get some alone time. This will help the employee rest their mind......

Words: 428 - Pages: 2

Free Essay

Week 5

...Week 5 Internet Service providers Ashour, Kalled Week 5 Internet Service providers Ashour, Kalled 2014 2014 Internet Service Providers In Denver Colorado, there are only two main options for personal home internet service. You can either get broadband through Comcast, or DSL through Century Link. Both have their positives and negatives, and both are around the same price. Comcast is 39.99 a month, for broadband internet service. While Century Link is $29.95 a month for DSL service. I personally have DSL though Century Link as I think that their customer service is much better than Comcast. Century Link provides packages of 1.5, 7, 12, 20 and 40Mbp/s connections, though all of them are the same price. I personally have the 40Mbp/s connection and pay $30 a month for the service. The router they provide has wireless capability and has suited all of my needs. Century Link has been running a campaign that they will be installing a full fiber optic system in the Denver area over the next year. So their speeds will be increasing in order to compete with Comcast. Comcast provides up to 50Mb/s for $40 a month, on a dedicated broadband line. Meaning that you should always have 50Mb/s no matter the time of day. They do offer more expensive plans with higher bandwidth, such as 105Mb/s for $45 a month. This is where Comcast has a clear advantage over Century Link. They can offer much higher speeds for just $15 more a month. They also have plans that package HBO and......

Words: 392 - Pages: 2

Free Essay

Week 2 Clinical Assessment

...Week 2 Clinical Assessment 1st Question. Since Clara is an adopted child I would like to know if the Lawson’s knew any of her biological parent’s history. Clara’s condition could result from genetics, if her parents suffered any psychological disorders Clara’s condition could be hereditary. Also I would want to know at what age Clara become separated from her biological parents, and how long has she been in the family of the Lawson’s. My next question would be to assess the relationship between the Lawson’s to see if they have a good or dysfunctional relationship; is there any fights or arguments in front of Clara? Lastly I would ask how long does Clara’s tantrums last? Does she try to hurt herself or others around her? The Lawson’s mention that Clara’s tantrums are recent, I would want to know if there were any significant changes or events that may have happened in Clara’s life that may have had a direct or indirect effect on Clara’s life. 2nd Question. I would consider the Rorschach test and drawing (Comer, 2005, p. 72) simply because Clara is only 4 years old it would be difficult to conduct any other forms of clinical assessment. The Rorschach test would be ideal for getting Clara to let me into her thought processes. At Clara’s age she is not capable of accurately describing her life and how she feels about it. I would also consider clinical observation more specifically naturalistic observation (Comer, 2005, p. 79). With this type of observation I would......

Words: 603 - Pages: 3

Premium Essay

Lab 5 Assessment Questions & Answers

...computer network, website or large computer system. Security awareness training is a formal process for educating employees about corporate policies and procedures for working with information technology. 4. Why is it important to prevent users from engaging in downloading or installing applications and software found on the Internet? There are hundreds of malicious programs that can cause damage to computers and information on the computers. They can also slow down machine, and they might even use the computer to spread themselves to entire organization. 5. When trying to combat software vulnerabilities in the Workstation Domain, what is needed most to deal with operating system, application, and other software installations? Perform windows update regularly, but checked those updates before installing. Install antivirus software and apply patches and quick scan once a day. Perform full scan on antivirus once a week. 6. Why is it important to educate users about the risks, threats, and vulnerabilities found on the internet and the World Wide Web? Users need to be aware of all the possible risks that come with dealing with internet and email. Such as pop ups, and also clicking on items that they should not be clicking on, which can cause significant damage to the company. 7. What are some strategies for preventing users or employees from downloading ad installing rogue applications and software found on the internet? First educate the users and remind them that......

Words: 717 - Pages: 3

Premium Essay

Chapter 5 Assessment

...Lab #4 - Assessment Worksheet Performing a Qualitative Risk Assessment for an IT Infrastructure Course Name and Number: CYBS 221 1001 Student Name: Kendall Watson Instructor Name: Dave Anderson Lab Due Date: September 20, 2015 at 11:59pm Overview In this lab, you defined the purpose of an IT risk assessment, you aligned identified risks, threats, and vulnerabilities to an IT risk assessment that encompasses the seven domains of a typical IT infrastructure, you classified the risks, threats, and vulnerabilities, and you prioritized them. Finally, you wrote an executive summary that addresses the risk assessment findings, risk assessment impact, and recommendations to remediate areas of noncompliance. Lab Assessment Questions & Answers 1. What is an IT risk assessment's goal or objective? Click here to enter text. The goal is to define how the risk to the system will be managed, controlled, and monitored. 2. Why is it difficult to conduct a quantitative risk assessment for an IT infrastructure? A qualitative assessment is based on opinion than actual fact, and IT risk assessments need to be based on a quantitative analysis. 3. What was your rationale in assigning a "1" risk impact/risk factor value of "Critical" to an identified risk, threat, or vulnerability? The critical needs to be mitigated immediately. 4. After you had assigned the "1," "2," and "3" risk impact/risk factor values to the identified risks, threats, and......

Words: 428 - Pages: 2

Premium Essay

Bus 599 Week 5 Bus599 Week 5

...com/q/bus-599-complete-course-bus599-complete-course/21454 http://workbank247.com/q/bus-599-complete-course-bus599-complete-course/21454 BUS 599 Week 1 Discussion "Company Description" Throughout this course, you will develop a series of written papers / projects that you will later combine into a complete business plan for a Non-Alcoholic Beverage company. For this discussion, you must first review the “NAB Company Portfolio”.  The mentioned portfolio contains the company parameters and details you must follow when developing your company. Provide the following information to set the foundation for your non-alcoholic beverage (NAB) business plan. Please respond to the following: * Create your NAB company name and explain its significance. * Develop your company’s Mission Statement and provide a rationale for its components. BUS 599 Week 2 Discussion "Growing Honest Tea"  Please respond to the following: * Review the following documents: * Honest Tea’s business plan for 1999 (PDF). * A strengths, weaknesses, opportunities, and threats (SWOT) analysis based on Honest Teas’ business plan (PDF). * Suppose Honest Tea has hired you as a consultant to evaluate the completeness of their strategy for future growth. Base your evaluation on the provided SWOT analysis. Provide a rationale for your response. BUS 599 Week 3 Discussion "Don't Miss the Mark"  Please respond to the following: * Watch the following......

Words: 5722 - Pages: 23

Premium Essay

Bus 519 Week 5 Bus519 Week 5

...Link for the Answer: http://workbank247.com/q/bus-519-complete-course-bus519-complete-course/22300 http://workbank247.com/q/bus-519-complete-course-bus519-complete-course/22300 BUS 519 Week 1 Discussion "What is Risk?"  Please respond to the following: * There are three (3) schools of thought regarding risk. The first considers the positive and negative aspects of risk, but sees them as separate. The second group believes that there are benefits from treating threats and opportunities together, while the third school does not label uncertainties, but addresses uncertainty as part of “doing the job.” Argue the value of having a risk strategy despite the cost associated with it. Include an example to support your response. Provide a rationale for your selection and determine how this approach helps a project to be successful. BUS 519 Week 2 Discussion "Need for Risk Management" Please respond to the following: * There are four (4) critical success factors that are important for effective risk management: supportive organization; competent people; appropriate methods, tools and techniques; and simple, scalable process. Determine three (3) obstacles for an organization to manage risk effectively. Suggest strategies from the perspective of a project manager to avoid the obstacles. BUS 519 Week 3 Discussion "Project Initiation" Please respond to the following: * Using the “Stakeholder Analysis Template” (Appendix B2 in the Hillson and Simon text) for a company that you......

Words: 2422 - Pages: 10

Premium Essay

Qnt 561 Week 5 Weekly Learning Assessments - Assignment

... 9 10 8.0 4 12 4.0 10 12 6.0 5 8 5.0 11 6 8.6 6 7 10.0 12 6 8.0 a. If we want to estimate selling price on the basis of the age of the car, which variable is the dependent variable and which is the independent variable? b-1. Determine the correlation coefficient. (Negative amounts should be indicated by a minus sign. Round your answers to 3 decimal places.) b-2. Determine the coefficient of determination. (Round your answer to 3 decimal places.) c. Interpret the correlation coefficient. Does it surprise you that the correlation coefficient is negative? (Round your answer to nearest whole number.) Want to see the Individual Assessment of Week 5..?? Click QNT 561 Week 5 Weekly Learning Assessments Chapter 13 Exercise 12 The Student Government Association at Middle Carolina University wanted to demonstrate the relationship between the number of beers a student drinks and his or her blood alcohol content (BAC). A random sample of 18 students participated in a study in which each participating student was randomly assigned a number of 12-ounce cans of beer to drink. Thirty minutes after they consumed their assigned number of beers, a member of the local sheriff’s office measured their blood alcohol content. The sample information is reported below. Student Beers BAC Student Beers BAC 1 6 0.1 10 3 0.07 2 7 0.09 11 3 0.05 3 7 0.09 12 7 0.08 4 4 0.1 13 1 0.04 5 5 0.1 14 4 0.07 6 3 0.07 15 2 0.06 ...

Words: 1756 - Pages: 8

Free Essay

Week 5

...Title | Discerning the Difference Between Issues and Problems | Assessment A: Distinguishing Between an Issue and a Problem | "They said one hit wouldn't hurt." What problems or issues do you see with this? | ☑ Mostly issues - people might have different opinions on if a single hit could hurt, much less kill you as in the commercial. | ☐ It's a problem - I think most people would agree that a single use of drugs could potentially be deadly. | | OK, so as far as this video is concerned, our challenge is to keep kids from even trying drugs. How do we express that? I would say something like "How can we prevent adolescents from experimenting with drugs?" | ☐ That is way too general. | ☐ That is a bit general. | ☑ That is a bit specific. | ☐ That is way too specific. | | Well, how do we do that? It's a broad issue and there is no single answer to solve it. | ☐ We need to just try every solution we can think of. Even if they don't work, we'll make progress. | ☐ We need to try to turn this problem into an issue. They are easier to handle. | ☑ We need to come up with as many ways to express the problem as possible. | | Oh. I guess that makes sense! So, let's try – do you think we can do this now?. | ☑ At lunch? No - we need to do a lot more research and thinking about this. Otherwise, we won't know if we are actually focused on a solution or not. | ☐ Sure! We just need to think about where we want to go long term with our......

Words: 512 - Pages: 3

Premium Essay

Week 5

...week 5 Describe the neuroanatomy of and neural processes related to learning based on current literature. There is a subtle difference between learning and memory whereas learning is the process by which in one’s mind there is an incorporation of new information and abilities and memory is the way in which the mind stores the information and abilities. There is a great importance from the outset that there are many kinds of memory such as procedural memory. Procedural memory is the process of remembering how to do certain things. Declarative memory is another memory where one can remember actual semantic information. These two memories are often unrelated in many instances. A prime example of these two memories would be a basketball player may have the perfect three point shot, but does not need to be fully aware of the physics that goes into shooting a three-pointer because procedural memory comes into play. To some extent this describes the difference between declarative and procedural memory. Even though that they are totally different form one another they both are a kind of memory. You can describe learning as a process in which experiences are incorporates into a person’s memory. This definition can be broad and encompasses not only the most traditional type of learning such as school learning. Learning can also be described as people forming memories of significant events that have occurred in the past. However, biologically, learning encompasses all of these......

Words: 578 - Pages: 3

Premium Essay

5 Question Assessment Paper

...5 Question Assessments Chronological Life Events • Ms. Shelly Skelton DOB 10/26/1985 Mother (PARAN) • Anthony Flores DOB 07/16/2002 Son (PIR) • Madison Flores DOB 07/17/2008 Daughter (PIR) • Family does not have any prior history with JCDHR, or any other county. • A report can in concerning the safety and well being of the children. The report stated that there is no working power, and the home is dirty. Also stated that there is a pit bull that use for fighting, and the dog poops all over the porch, and it’s rarely cleaned up. The report stated that Anthony is known for wearing dirty clothes to school, the mother Ms. Skelton is a “pill head” that abuses loratabs, opiates, and methadone. The report stated that Ms. Skelton allows her sister to smoke meth in the back room of the home, and that Ms. Skelton slaps and yells at Madison. The report also stated that there is never any food in the home for the children. Area of Concern • The safety of the children. • The potential for future maltreatment as it relates to no food in the home, no working power, and the house being excessively dirty. • The children not having food. • Anthony going to school dirty. • Ms. Skelton not performing parental duties and responsibilities. • Living arrangements seriously endanger a child’s physical health. Potential Team Members/Projected Outcome • Social worker • Social worker supervisor • Ms. Shelly Skelton ...

Words: 311 - Pages: 2

Premium Essay

Week 5

...lemons and make lemonade. 5. Openness to experience: Rodriguez would score well beyond all measure, because he never feared the unknown. He wrapped his arms around new experiences and embraced life with a positive attitude. * Do you believe that Rodriguez is high or low on core self-evaluation? On what information did you base your decision? Most would believe that Rodriguez from the world’s point of view would be a high core self-evaluation based on the information within the text. He never settled for what was in front of him therefore he looked beyond a situation, bettered himself by going to school for whatever reason he needed he was always improving himself and meshing within the situation. If this was an assessment of himself most would believe he would give himself the opposite low core self-evaluation based on his humbled attitude with life. Rodriguez never thought he learned everything. In addition, what blows the mind is he pays himself a mediocre salary even despite the fact that the company is doing pretty well. He is thinking beyond the situation, beyond himself, this is an inspiring story and an amazing evaluation. * What information about Rodriguez suggests that he had a proactive personality? The information is laid out as so: When Rodriguez was offered a job in a jewelry store he took it, but later seen beyond that situation, but rather than jumping out without any direction he decided to learn while working the 9-5 job and went to school......

Words: 1268 - Pages: 6