Free Essay

Is3110 Week 5 Lab

In: Computers and Technology

Submitted By brettwlvn
Words 467
Pages 2
Lab Assessment Questions

1. How do documented back-up and recovery procedures help achieve RTO? * By documenting and implementing backup and recovery procedures, the process for recovery is much more efficient, helping with the time portion of RTO. By having effective backup and recovery procedures you should have the necessary resources to restore systems from backups and a repeatable process that is known to succeed in achieving RTO. 2. True or False. To achieve an RTO of 0, you need 100% redundancy in your IT system, application, and data. * True. This is a special case of disaster recovery called business continuance. Technology that is capable of maintaining a synchronous mirror or continuous data replication stream must be utilized for all data (work product, application, server personalities, etc.).

3. Review the “Restore Horror Stories” scenario on page 371 of the text. What is most important when considering data back-up? * The goal of backing up data is to be able to restore it. 4. Review the “Restore Horror Stories” scenario on page 371 of the text. What is most important when considering data recovery? * Perform test restores. A test restore will attempt to restore data from a recent backup. If the test succeeds, the backup is good. If the test doesn’t succeed, the backup process needs to be addressed. 5. What are the risks of using your external e-mail box as a back-up and data storage solution? * It takes too much time. It can take days to upload a baseline copy of your data, and in the event of a disaster it will take days to download and restore your data. * It's just not practical * Automatic settings for online backup can skip important folders and include useless ones. It is no replacement for the human mind in making important decisions. No piece of software can possibly know what is appropriate for your specific situation without your help; it can't know which user(s) to back up, which email program you use, or where your bookkeeping files are stored. * There are good reasons to use external drives to organize your data, but many services will only back up data on your internal hard drive, ignoring any external drives. * Online backup or storage accounts can be just as easily be "hacked" into as your email accounts can be. * Online services don’t automatically encrypt your data on their storage which means that employees or law enforcement have access to you data and you may not even be notified. * Security breach of an online service can put your data at risk. * Company stability can cause any service to change their Terms of Service. * Your legal responsibilities as a business owner with your client’s personal information. * Your data can't be backed up or restored if your internet connection is down.…...

Similar Documents

Free Essay

Cis333 Week 5 Lab 4

...Lab 5 Assessment 4- Questions & Answers Lab Assessment Questions & Answers 1. Define why change control management is relevant to security operations in an organization. • Change control is a precision arrangement of managing every change made to a system. This is to ensure that no unneeded changes are done, that every change is documented, and that no service is disrupted unless absolutely necessary, and that all resources efficiently used. 2. What type of access control system uses security labels? • A LBA C Label Base Access Control 3. Describe two options you would enable in a Windows Domain password policy. • Password must meet complexity requirements • Minimum Password length 4. Where would patch management and software updates fall under in security operations and management? • Procedures/ The SA or other personnel to be the responsible authority in informing all local authorities about patches that are related to software packages included on the entire inventory of the organizations software. • • Also in Procedures/ Additionally, any post-patch update distributions to the Database/Management Configuration Plan will be executed immediately after any patching has been done. 5. Is there a setting in your GPO to specify how many logon attempts will lock out an account? Yes, The Account Lockout Threshold can be set, this policy determines the number of failed......

Words: 689 - Pages: 3

Premium Essay

Is3110 Lab 6

...Lab 6 1. Why is it important to prioritize your IT infrastructure risks, threats, and vulnerabilities? It is important to prioritize because you must be aware of what the risks, threats, and vulnerabilities there are to your infrastructure. You need this so that you know where the most attention needs to be focused on. 2. Based on your executive summary produced in Lab #4 Perform a Qualitative Risk Assessment for an IT infrastructure, what was the primary focus of your message to executive management? Setting up security measures through various means includes the following: * Forcing users to update password every X number of days. * Educating the users. * Firewalls - Anti-malware 3. Given the scenario for your IT risk mitigation plan, what influence did your scenario have on prioritizing your identified risks, threats, and vulnerabilities? Common things such as user activity can be a very big risk, so your best bet is to consider all options as potential threats. You will have to rank some risk higher than the others. 4. What risk mitigation solutions do you recommend for handling the following risk element? A user inserts a CD or USB hard drive with personal photos, music, and videos on organization owned computers. A good antivirus program and have all devices scanned as soon as they are plugged in. Educate employees Disable optical drives/USB ports. 5. What is security baseline definition? A baseline is a starting point or a......

Words: 759 - Pages: 4

Free Essay

Lab 5

...Lab 5.1 The Condition | True or False | attAverage >= verizonAverage | True | tmobileAverage == 868 | True | verizonAverage < sprintAverage | False | sprintAverage != attAverage | True | Lab 5.2 The Condition | Expected Output | If tmobileAverage > 800 AND verizonAverage> 800 ThenDisplay “Both have average downloadrates over 800”ElseDisplay “One or both of the averagesare less”End If | Both average download Rates over 800 | If sprintAverage == 800 ThenDisplay “Sprints download rate is 800”End If | No display | If attAverage >= 1300 OR tmobileAverage>=900Display “Select either carrier”End If | Select either carrier | Lab 5.3 Main Module() //Declare variables on the next 3 lines Declare Integer testScore = 0 Declare String category = “ “ Declare String interview = “ “ //Make Module calls and pass necessary variables on the next 4 lines Call getScore(testScore) Call employCat(testScore, category) Call interviewPoss(testScore, interview) Call displayInfo(testScore, category, interview) End Main Module getScore(Integer Ref testScore) //Ask user to test score Display “Please enter test score” Input testScore End Module Module employCat(Integer testScore, String ref category) //Determine what employment category they are in based on their test score //Similar to if the score is less than 60, then category is “No” //Otherwise, if score is less than 70, then category is “Maybe” //…and so on if testScore => 85 then Set...

Words: 288 - Pages: 2

Free Essay

Is3110 Lab 4

...| LAB 4 * A. Healthcare provider under HIPPA compliance law * Risk-Threat-Vulnerability | Primary Domain Impacted | Risk Impact/Factor | Unauthorized access from public Internet | LAN-WAN | Major | User destroys data in application and deletes all files | USER | Minor | Hacker penetrates your IT infrastructure and gains access to you internal network | SYSTEM APPLICATION | Critical | Intra-office employee romance gone bad | USER | Minor | Fire destroys primary data center | LAN | Major | Service provider SLA is not achieved | WAN | Major | Workstation OS has a known software vulnerability | LAN-WAN | Major | Unauthorized access to organization owned workstations | USER | Major | Loss of production data | SYSTEM APPLICATION | Minor | Denial of Service attack on organization DMZ and e-mail server | LAN-WAN | Critical | Remote communications from home office | REMOTE ACCESS | Minor | LAN server OS has a known software vulnerability | LAN | Major | User downloads an unknown e-mail attachment | USER | Minor | Workstation browser has software vulnerability | WORKSTATION | Major | Mobile employee needs secure browser access to sales order entry system | REMOTE ACCESS | Minor | Service provider has a major network outage | WAN | Critical | Weak ingress/ egress traffic filtering degrades Performance | LAN-WAN | Major | User inserts CDs and USB hard drives with personal photos, music, and videos on organization owned......

Words: 296 - Pages: 2

Premium Essay

Is3110 Lab 6

...IS3110 Lab 6 DAWOOD ALRUBAYE 1. Why is it important to prioritize your IT infrastructure risks, threats, and vulnerabilities? Because you need to know which is most important and which is negligible. In some cases, protecting your infrastructure from a high priority threat is more important and so you may want to protect against that even if it leaves you vulnerable to low priority threats. This mainly just shows you which areas need your attention the most. 2. 2. Based on your executive summary produced in Lab #4 – Perform a Qualitative Risk Assessment for an IT infrastructure, what was the primary focus of your message to executive management? * Setting up security measures through various means. * Forcing users to update password every X number of days. * Educating users. * Firewalls * Anti-malware 3. Given the scenario for your IT risk mitigation plan, what influence did your scenario have on prioritizing your identified risks, threats, and vulnerabilities? 4. What risk mitigation solutions do you recommend for handling the following risk element? User inserts CDs and USB hard drives with personal photos, music, and videos on organization owned computers. * A good antivirus program and have all devices scanned as soon as they are plugged in. * Educate employees. * Disable optical drives/USB ports (if they are not needed) 5. What is security baseline definition? A baseline is a starting point or a standard.......

Words: 319 - Pages: 2

Free Essay

Week 5 Lab

...Wireless Spectrum Introduction This lab is going to be very interesting and challenging. We are being introduced to what, for some, is going to be the first time ever using a program that captures and records signals. We must then analyze them and use this as a tool to better be prepared to install and even troubleshoot our networks. My goal for this lab would be to gain a better understanding of this program and be able to recognize how it could be useful for me in my future endeavors. 1. Are any channels being used that overlap other channels? (10 points) It would appear that channels 1, 8 and 11 have the most use going on and that 8 and 11 overlap each other. 2. If you had to install a new wireless LAN, what channel would you use? (10 points) I would use something in the 3-6 range as it would provide the least amount of overlap with other channels. 3. What channels are being used? (10 points) It appears to me that channels 1, 5, and 11 are currently in use. 4. What channel is being used the most? (10 points) Channel 11 appears to have the most use going on on currently. 5. What type of signal is being shown? (10 points) The signal appears to match that of a HyperX RFID Reader. 6. What frequency, not channel, is being used? (5 points) The frequency in use is 2450 mhz. 7. What type of signal is being shown? (10 points) The signal being displayed is 802.11g. 8. How strong in dBms is this signal? (5 points) The signal strength......

Words: 461 - Pages: 2

Premium Essay

Is3110 Labs

...Brett Reigel Lab 2 Assessment Worksheet COBIT 1. A. WAN to LAN Domain B. System Application Domain C.LAN Domain D. Server Domain 2. a. PO9.3 Event Identification – Identify threats with potential negative impact on the enterprise, including business, regulatory, legal, technology, trading partner, human resources and operational aspects. b. PO9.4 Risk Assessment – Assess the likelihood and impact of risks, using qualitative and quantitative methods. c. PO9.5 Risk Response – Develop a response designed to mitigate exposure to each risk – Identify risk strategies such as avoidance, reduction, acceptance – determine associated responsibilities; and consider risk tolerance levels. 3. a. Unauthorized access from public internet - AVAILABILITY b. User destroys data in application and deletes all files - INTEGRITY c. Workstation OS has a known software vulnerability – CONFIDENTIALITY d. Communication circuit outages – AVAILABILITY e. User inserts CD’s and USB hard drives with personal photos, music and videos on organization owned computers – INTEGRITY 4. I have yet to remediate any threats in a real world application. 5. a. People b. Infrastructure c. People d. People e. People 6. True 7. Because risk management is an ongoing process that requires a constant, and vigilant application of COBIT. 8. The data classification standard defines categories of data. Each Category defines how you must handle that data and any special......

Words: 373 - Pages: 2

Premium Essay

Netw202 Week 5 Lab Report

...points) Write a paragraph (a minimum of five college-level sentences) below that summarizes what was accomplished in this lab, what you learned by performing it, how it relates to this week’s TCOs and other course material, and just as importantly, how you feel it will benefit you in your academic and professional career. (8 points) In this Week 5 lab I learned how to create a startup script for a switch device in a network. Doing so allowed me to configure passwords to access the user mode and privileged mode of the switch device. This was very interesting to learn, going through the steps I realized that once you memorize the commands or at least have a quick reference sheet the task becomes a lot easier to perform. It definitely is a useful skill to have and to learn while progressing in this career field. ------------------------------------------------- Copy and paste the following screenshots from your Performing Switch Startup and Initial Configuration lab below. Task 1, Step 2: Paste a screenshot AFTER you execute the “erase startup-config” command but BEFORE you execute the “reload” command. NOTE! Be sure to take the screenshot before you reload or you will have to repeat this step in order to obtain the correct results. (1 point) Question: What is the effect of erasing the startup-config file? Hint: Read and study the explanations within the lab for assistance. (2 points) The erase startup-config command, erases the saved configuration in NVRAM. It......

Words: 1279 - Pages: 6

Premium Essay

Ip Networking Week 5 Labs

...gateway 192.168.21.17 S2 - R2: enable – con t – interface f0/0 192.168.85.18 255.255.255.240 – no sh – interface s0/0/0 – ip address 10.30.1.2 255.255.255.252 – no sh PC2: ip address 192.168.85.21 255.255.255.240 – gateway 192.168.85.18 S3 - R1: con t – hostname LAN-A R2: con t – hostname LAB-B S4 - show ip interface brief – verify proper IP addresses Show ip interface s0/0/0 – check proper clock rate Ipconfig /all – verify correct IP, mask, and gateway on PC S5 - R1: router eigrp 100 – network 10.0.0.0 – network 192.168.21.0 R2: router eigrp 100 – network 10.0.0.0 – network 192.168.85.0 S6 - show ip eigrp interfaces S7 - The pings work S8 - tracert 192.168.85.21. 3 hops S9 - show ip eigrp neighbors S10 - con t – line vty 0 4 – password ciscopress – login. I used 10.30.1.1. S11 - copy running-config startup-config show flash TASK 2 1. Shutdown – administratively downs a interface 2. Log-adjacency changes – sends a syslog when a neighbor goes up or down 3. Control-plane – routers learning to route packets through the network 4. Scheduler allocate 20000 1000 – allows 20000 microseconds for interrupt time and 1000 microseconds of processing time 5. Scheduler allocate interrupt-time process-time – this is the syntax for the scheduler allocate command 6. Login local – password at startup 7. Line con 0 – console passwords and settings 8. Line aux 0 – passwords and setting related to the aux port 9. Line vty 0 4 –......

Words: 1198 - Pages: 5

Premium Essay

Lab 5

...Name: Date: Instructor’s Name: Assignment: SCI103 Phase 1 Lab Report Title: Measuring pH Levels Instructions: Enter the Virtual Lab, and conduct the experiments provided before going out into the virtual field for additional research. Please type your answers on this form. When your lab report is complete, submit it to the Submitted Assignments area of the Virtual Classroom. Part I: Answer the following questions while in the Phase 1 lab environment. Section 1: You will be testing 4 known solutions for pH levels using a standard wide-range indicator. Based off of the results obtained in the lab room, fill in the following table: |Solution Number |pH from Lab |Acid, Base or Neutral? |Solution Name (what was in the test tube?) | |Solution 1 |6 |Acid |Pure Water | |Solution 2 |1 |Acid |Lemon Juice | |Solution 3 |12 |Base |Bleach | |Solution 4 |5 |Acid |Coffee | 1. How many drops of wide range indicator will you use for each test, based on industry standards......

Words: 696 - Pages: 3

Premium Essay

Is4550 Week 5 Lab

...------------------------------------------------- Week 5 Laboratory: Part 1 Part 1: Assess and Audit an Existing IT Security Policy Framework Definition Learning Objectives and Outcomes Upon completing this lab, students will be able to complete the following tasks: * Identify risks, threats, and vulnerabilities in the 7 domains of a typical IT infrastructure * Review existing IT security policies as part of a policy framework definition * Align IT security policies throughout the 7 domains of a typical IT infrastructure as part of a layered security strategy * Identify gaps in the IT security policy framework definition * Recommend other IT security policies that can help mitigate all known risks, threats, and vulnerabilities throughout the 7 domains of a typical IT infrastructure Week 5 Lab Part 1: Assessment Worksheet (PART A) Sample IT Security Policy Framework Definition Overview Given the following IT security policy framework definition, specify which policy probably can cover the identified risk, threat, or vulnerability. If there is none, then identify that as a gap. Insert your recommendation for an IT security policy that can eliminate the gap. Risk – Threat – Vulnerability | IT Security Policy Definition | Unauthorized access from pubic Internet | Acceptable use policy | User destroys data in application and deletes all files | Backup Recovery Policy | Hacker penetrates your IT infrastructure and gains......

Words: 1625 - Pages: 7

Premium Essay

Netw 202 Week 5 Lab Report Latest

...NETW 202 WEEK 5 LAB REPORT LATEST To purchase this visit following link: http://www.apexseekers.com/product/netw-202-week-5-lab-report-latest/ Contact us at: HELP@APEXSEEKERS.COM NETW 202 WEEK 5 LAB REPORT LATEST SECTION I: Converting Decimal to Binary and Binary to Decimal SECTION II: Classifying Network Addressing Apex Seekers aims to provide quality study notes and tutorials to the students of NETW 202 Week 5 Lab Report Latest in order to ace their studies. NETW 202 WEEK 5 LAB REPORT LATEST To purchase this visit following link: http://www.apexseekers.com/product/netw-202-week-5-lab-report-latest/ Contact us at: HELP@APEXSEEKERS.COM NETW 202 WEEK 5 LAB REPORT LATEST SECTION I: Converting Decimal to Binary and Binary to Decimal SECTION II: Classifying Network Addressing Apex Seekers aims to provide quality study notes and tutorials to the students of NETW 202 Week 5 Lab Report Latest in order to ace their studies. NETW 202 WEEK 5 LAB REPORT LATEST To purchase this visit following link: http://www.apexseekers.com/product/netw-202-week-5-lab-report-latest/ Contact us at: HELP@APEXSEEKERS.COM NETW 202 WEEK 5 LAB REPORT LATEST SECTION I: Converting Decimal to Binary and Binary to Decimal SECTION II: Classifying Network Addressing Apex Seekers aims to provide quality study notes and tutorials to the students of NETW 202 Week 5 Lab Report Latest in order to ace their studies. NETW 202 WEEK 5 LAB REPORT LATEST To purchase this visit following......

Words: 881 - Pages: 4

Premium Essay

Is3110 Lab 6

...1. You must be aware of what the risks, threats, and vulnerabilities are to your infrastructure so that you know where the most attention is needed 2. Setting up security measures through various means. Forcing users to update password every X number of days. Educating users. Firewalls Anti-malware 3. Common things such as user activity can be a huge risk, so it’s best to consider all options as potential threats with some being higher and lower than others. 4. Disable auto-run, deny USB storage devices for users, and restrict installation rights from within Active Directory 5. Security baselines are security settings which establish duties, but nothing else. 6. What are your plans/goals? What will the budget cost be? 7. Evaluating risk interactions and common causes because if you don’t know what the risk is, you can’t possibly mitigate it. 8. All short-term mitigation tasks need to be implemented immediately. Long-term mitigation tasks should be implemented immediately following all critical tasks. On- going is exactly that, the tasks involved here are part of day-to-day operations and need to be handled. 9. User Domain 10. System-Application 11. WorkStation 12. Because it allows users to access the private network 13. Because you do not know how it will react to the already implemented software. Just because there is a security does not mean you install it to the live servers. You basically need...

Words: 290 - Pages: 2

Free Essay

Lab 5

... c.s. * Prepared slide of mature lily anther (pollen grains), c.s. * Mature pollen * Glass slide * Coverslip * Compound microscope * 0.5% sucrose, in dropping bottle * Prepared slide of lily ovary, c.s megaspore mother cell * Compound microscope * Bean fruits * Soaked bean seeds * Iodine solution(I2KI), in a dropping bottle * Herbarium mount of Capsella, with fruits Procedure: Refer to Biology lab manual, lab 5- pages 3-7. Results: Questions: 1. Gymnosperms | Angiosperms | | | a.cones | flowers | c.Bare, not enclosed; found on scales, leaves or as cones. | Enclosed inside an ovary, usually in a fruit. | b. seed | Endosperm | 2. Pollination is the act of transferring pollen from the male part of a flower to the female part of a flower. Fertilization occurs when the male gamete of any sexually reproducing organism combines with a female gamete to form a zygote. 3. A. receptacle B. c.ovary D. filament E. stigma 4. It is a monocotyledon. 5. A. anther pollen tetrad B. pollen sacs...

Words: 362 - Pages: 2

Premium Essay

Netw 202 Week 5 Lab Report Latest

...NETW 202 WEEK 5 LAB REPORT LATEST To Purchase this tutorial visit following link http://wiseamerican.us/product/netw-202-week-5-lab-report-latest/ Contact us at: SUPPORT@WISEAMERICAN.US NETW 202 WEEK 5 LAB REPORT LATEST SECTION 1: Converting Decimal to Binary and Binary to Decimal SECTION 11: Classifying Network Addressing NETW 202 WEEK 5 LAB REPORT LATEST SECTION 1: Converting Decimal to Binary and Binary to Decimal SECTION 11: Classifying Network Addressing NETW 202 WEEK 5 LAB REPORT LATEST SECTION 1: Converting Decimal to Binary and Binary to Decimal SECTION 11: Classifying Network Addressing NETW 202 WEEK 5 LAB REPORT LATEST SECTION 1: Converting Decimal to Binary and Binary to Decimal SECTION 11: Classifying Network Addressing NETW 202 WEEK 5 LAB REPORT LATEST SECTION 1: Converting Decimal to Binary and Binary to Decimal SECTION 11: Classifying Network Addressing NETW 202 WEEK 5 LAB REPORT LATEST SECTION 1: Converting Decimal to Binary and Binary to Decimal SECTION 11: Classifying Network Addressing NETW 202 WEEK 5 LAB REPORT LATEST SECTION 1: Converting Decimal to Binary and Binary to Decimal SECTION 11: Classifying Network Addressing NETW 202 WEEK 5 LAB REPORT LATEST SECTION 1: Converting Decimal to Binary and Binary to Decimal SECTION 11: Classifying Network Addressing NETW 202 WEEK 5 LAB REPORT LATEST SECTION 1: Converting Decimal to Binary and Binary to Decimal SECTION 11: Classifying Network Addressing NETW 202 WEEK 5 LAB REPORT......

Words: 515 - Pages: 3