Premium Essay

Network Systems Administration

In: Computers and Technology

Submitted By money5423
Words 606
Pages 3
NT2580 Introduction to Information Security STUDENT COPY: FINAL EXAM
30. What does risk management directly affect?
a. Company investments
b. Security policy framework
c. Security controls
d. Number of employees

31. Which of the following is a cipher that shifts each letter in the English alphabet a fixed number of?
Positions, with Z wrapping back to A?
a. Transposition
b. Vigenere
c. Caesar
d. Vernam

32. Identify a security objective that adds value to a business.
a. Revocation
b. Authorization
c. Anonymity
d. Message authentication

33. Which of the following is an asymmetric encryption algorithm?
a. AES
b. 3DES
c. RSA
d. RC4

34. Identify a security principle that can be satisfied with an asymmetric digital signature and not by a symmetric signature.
a. Nonrepudiation
b. Integrity
c. Authorization
d. Access control

35. Which of the following is a mechanism for accomplishing confidentiality, integrity, authentication, and
a. Cipher text
b. Cryptography
c. Access control
d. Hashing

36. In which OSI layer do you find FTP, HTTP, and other programs that end users interact with?
a. Application
b. Network
c. Physical
d. Data Link

37. Identify the configuration that is best for networks with varying security levels, such general users, a group of users working on a secret research project, and a group of executives.
a. Multilayered firewall
b. Screened subnet firewall
c. Border firewall
d. Ordinary firewall

38. Which of the following would you not expect to find on a large network?
a. Router
b. Switch
c. Hub
d. Firewall

39. Which of the following is a weakness of WLANs?
a. WPA
b. RF shielding
c. User groups
d. SSID beaconing

40. Identify an advantage of IPv6 over IPv4.
a. More secure
b. Larger address space
c. IPSec support
d. More commonly used

41. Identify one of the first…...

Similar Documents

Free Essay

Linux System Administration

...IT302 Linux System Administration Research Assignment 1 SELinux or Security Enhanced Linux uses an architecture that separates enforcement from access policy decisions. With this architecture different types of policies can be implemented, including Role-Based Access Control (RBAC), Type Enforcement (TE), and Multi-Level Security (MLS). The module assigns security labels to each subject or object. It uses a security class to determine the kinds of relationship a pair of labels might have. The triplet consisting of a pair of labels and a class are then sent to a policy server to determine if access is allowed. The security labels are assigned dynamic integer security ID's (SID's); the reply from the policy server is cached in an 'access vector cache' for performance reasons. SELinux was developed in coordination with the open source community and the National Security Agency (NSA) to provide the highest level of security for the Linux operating system. The three basic elements of the VServer are: The security context. A process in one security context cannot see processes in other security contexts, neither with the 'ps' command, nor with 'cat /proc' nor in any other way. As side-effect, this means that a process in one context cannot kill processes in other contexts. Capabilities. The existing Linux kernel provides a wide variety of capabilities which can be taken away from processes. These include the ability to change network addresses, to change the ownership of a......

Words: 291 - Pages: 2

Free Essay

Nfs (Network File System)

...NFS (Network File system) IPtables NFS protocol was developed by SUN microsystems using UNIX. NFS allows severs to share local directories with client systems. NFS runs on UNIX, DOS, Microsoft, VMS, Linux and more. NFS allows a client to access files on a remote server. The client user is usually unaware on the storage location on the file they are using. NFS reduces the storage needs used on the client and aids in the administration work load. With an NFS the file system stored on a remote server and the directory is shared over a local network. The server has a large capacity disk drive and device so that copies for file can be backed up with a problem. Diskless systems boot from the file server and load the system from a fileserver. Because a diskless client doesn’t require much to run a file server system you can use older machine as clients. Other options for NFS for Linux are netboot and dataless system. Netboot uses TFTP (Trivial File Transfer Protocol) that runs PXE (Preboot Execution Environment) a boot server for Intel. Dataless systems allow the user to store all files remotely but only Linux based applications can be kept on the disk. IPtables are composed of two components netfilter and IPtables. Netfilter a set of tables that hold rules the kernel uses to control network packet filtering. IPtables set up, maintain, and displays the rules stored by netfilter. Rules use one more categories matches or classified with single action. The rule that applies to......

Words: 387 - Pages: 2

Premium Essay

New Technology Research for Network Systems Administration

...My field of study is Network Systems Administrations. I am most interested in networking technology. I currently understand very little about networking, which is to say I understand the functionality but not how it works. The topic I chose was Home-linking Technology. The article I read was “Dual Band Router leverages 802.11ac wireless standard.” from the Product News Network. The article started by describing the speed of the new 802.11ac router. Equipped with the Broadcom 5 GHz WI-Fi chip, the Cloud Router 5700 can deliver speeds up to 1750 Mbps. Its predecessor, the 802.11n has vendor promised speeds of up to 600 Mbps. The Cloud Router also supports wireless HD streaming and multi-person online gaming. It allows users to monitor and control your network remotely. In addition the 5700 provides support of the IPv6 standard and is backwards compatible so the previous generation 802.11n will not become obsolete. I also learned new terminology; IEEE- Institute of Electrical and Electronics Engineers. It is listed as “the world’s largest professional association dedicated to advancing technological innovation and excellence for the benefit of humanity.” 802.11- Set of standards for implementing wireless local area network (WLAN) computer communication in the 2.4, 3.6 and 5GHz frequency bands. SPI Firewall- (Stateful Packet Inspection) is a firewall that keeps track of the state of the network connections traveling across it. WPA2- (Wi-Fi Protected Access II)......

Words: 325 - Pages: 2

Free Essay

Network Systems Administration

...Introduction: Global Positioning System, GPS Summary of key findings: Google,, Wikipedia, In a nutshell describing GPS - A navigational system involving satellites and computers that can determine the latitude and longitude of a receiver on Earth by computing the time difference for signals from different satellites to reach the receiver. Today, it is widely used by the civilian public for both commercial and recreational use. In addition to GPS, other systems are in use or under development. The Russian Global Navigation Satellite System (GLONASS) was in use by only the Russian military, until it was made fully available to civilians in 2007. The navigational signals transmitted by GPS satellites encode a variety of information including satellite positions, the state of the internal clocks, and the health of the network. These signals are transmitted on two separate carrier frequencies that are common to all satellites in the network. Two different encodings are used: a public encoding that enables lower resolution navigation, and an encrypted encoding used by the U.S. military. So in 20 years you can just imagine where this will lead… As of December 2013, there are 32 satellites in the GPS constellation. The additional satellites improve the precision of GPS receiver calculations by providing redundant measurements. With the increased number of satellites, the constellation was changed to a......

Words: 358 - Pages: 2

Free Essay

Principles of Network and System Administration

...Chapter (Self-test Objective) Question # 1: What kinds of issues does system administration cover? Answer: As we discussed in class, a Network System Administrator has to be knowledgeable, has to have customer service skills to be stay calm & collected when a complaint occurs, and must be able to rectify the problem. As the course text book “Principles of Network and System Administration”, by author Mark Burgess mentions in chapter #1 section 1.6 The challenges of system administration : “System administration is not just about installing operating systems. It is about planning and designing an efficient community of computers so that real users will be able to get their jobs done. That means: • Designing a network which is logical and efficient. • Deploying large numbers of machines which can be easily upgraded later. • Deciding what services are needed. • Planning and implementing adequate security. • Providing a comfortable environment for users. • Developing ways of fixing errors and problems which occur. • Keeping track of and understanding how to use the enormous amount of knowledge which increases every year.” The author also mentions that some of the Network System Administrators are responsible for both the hardware of the network and the computers which it connects, i.e. the cables as well as the computers and some are only responsible for the computers. Most importantly a System Administrator must have an understanding of how data flows from......

Words: 337 - Pages: 2

Free Essay

Specialized Network Administration

... Specialized Network Administration INTA 457-1404A-01 AIU Online Anthony Cox 8/31/2014 Introduction Today’s business world requires network administrators to keep their systems compatible and competitive. Compatibility will keep their network systems current with today’s trends and recent developments and while there can be a certain cost expected when upgrades are implemented, it is a relatively small price to pay to remain competitive in today’s market. Questions have arisen about the current network and ways to improve the efficiency and effectiveness of our network system. The following problems have been researched and addressed in the following pages: 1. Toll charges are currently being applied to communications between Los Angeles (LA) and Miami offices 2. Network upgrade needs to be implemented to remain competitive a. Eliminate all interoffice toll charges b. No adverse effects on the Wide Area Network (WAN) c. Diagram the network layout The current network has been around for a while and is in desperate need of upgrade. It is my belief that the upgrade should begin at the local area networks (LANs) in both Miami and LA. Only by upgrading both offices equally, can we expect to achieve the efficiency which we desire. The recommended changes should be enough to lower the collective overhead and operational expenses while preparing the company for continued future growth. To implement this growth, many challenges......

Words: 645 - Pages: 3

Free Essay

Network Systems Administration

...Everyone loves pizza and beer and I am certainly no exception so it would have surprised no one to find me at Frank’s Pizza on an otherwise unremarkable evening in 1987, what did surprise many was what happened less than a year after this particular night. In a small town in Northern California more famous for its rich gold rush era history than any culinary notoriety in a downtown still dominated by structures from the late 1800’s is a pizza joint named Frank’s, no one remembers who gave it that name, the owner for the vast majority of my life is named William Jackson Davis and if he ever knew the titular namesake he never told me or anyone I know, but history or name aside no one I ever heard of had anything but praise for the pies that were produced there, 4 hour waits on a Friday or Saturday were not uncommon. So it was there I was headed on that portentous evening nearly thirty years ago after a back breaking week of working in construction putting drywall on houses, with a great hunger and thirst only such demanding and dusty work can produce and looking forward to nothing more than the filling and delicious pizza and ice cold refreshing beer when I noticed that the owners had hired a new waitress, a striking Green eyed beauty with a bust that would cause babies for miles around to begin salivating, now as a young single man not many years out of the Marine Corps my reaction was somewhat predictable, I hit on her like a Miner Forty-niner on a rich vein in the......

Words: 821 - Pages: 4

Premium Essay

Network Administration Portfolio

...keep these documents, secure, in house. A well-designed network infrastructure that has the applicable requirements of the users is often well worth the financial sunk cost. A solid network is considered one of the most critical resources in an organization, both in the private and public sector, especially with paperless transmission of business documents between companies. A solid network is the cornerstone for providing the means of transmitting data (sometimes sensitive), from one computer to another. The mission of any business is to offer a useful product, increase profits, and increase work force potential. Because of these possibilities networks may increase the organizational learning rate, which many business professionals believe is the only fundamental advantage in competition. The accuracy and speed of daily business transactions for large and small organizations are vital to their success. Unscheduled disruptions resulting in the failure to process these daily business transactions can be costly, and potentially disastrous. This essay will describe some of the possible gains, and drawbacks one may face when installing/upgrading a network. Advantages Employees want the ability to have access to all files, and services whenever needed. It is no surprise that our modern workplace is no longer bound to the office. It is a continuous workforce connected globally through the Internet via networks. The new virtual workplace is powered by......

Words: 867 - Pages: 4

Free Essay

Network Systems Administration

...7.1.1 Cost and manpower and materials would be enormous. 7.1.2 Signal lost would affect transmission by increasing distances. 7.1.3 UTP is used for LAN’s as well as phone lines. Coaxial cables are also useful for internet connection. 7.1.4 Satellite is a way of creating a network over long distances. WiMAX, is a standards-based technology enabling the delivery of last mile wireless broadband access as an alternative to cable and DSL. HSPA+, enhances the widely used WCDMA (UMTS) based 3G network with higher speeds for the end user. 7.1 Review 1) UTP and Coaxial cables can be used if signal enhancers are placed at correct distances. 2) WLAN’s are limited to shorter distances due to signal interference from attenuation and objects between the AP and devices. 7.2.1 Dedicated lease lines are very effective in transmission, but can be costly. 7.2.2 Full mesh topologies are good for no fault networking. Creating it can be difficult to maintain and assemble. Partial mesh is good when every computer is not important in the network. 7.2.3 Star topologies are great for small LAN’s. But, they have a high level of fault error in the system. 7.2.4 T1 uses 24 DSO channels, E1 has a speed of 2048 Mbps, E3 has 16 E1 channels, T3 has 43,736 Mbps and 28 DS1 channels. 7.2 Review 1) PPP allows their frames to flow from the customer router to the ISP router. A control protocol is used to set a standard everyone can understand. 2) LAN’s tend to have more immediate......

Words: 341 - Pages: 2

Premium Essay

Network Systems

...Network Attached Storage Network Attached Storage (NAS) is a dedicated hard drive which is set up with its own network address and provides file-level data storage services to other devices on the network. It allows both programming and files to be served faster because they are not competing for processor resources. NAS usually configured with a web browser and do not require a keyboard, mouse or monitor. Unlike other external hard drives, NAS has a processor. Some NAS devices will run using standard operating system like MS Windows, many other NAS devices use their own proprietary operating system. A NAS can store any data that appears in form of files, including email boxes, Web content, remote system backups, etc… Overall the use of a NAS parallels those traditional file servers. NAS devices come in many varieties depending on you build it or purchase it from a vendor. The speed is usually 1GB Ethernet connection but it can be changed to multiple GB to 10GB, fiber optic by adding PCI-e network cards. The capacity range also can be varied. If you have a port replication and add-on hardware drive controller cards, there really isn’t a limit on size. For example: if you have a board with 6 SATA ports which can be replicated (1 to 5 port) allowing 30 drives to be attached. Then if 3TB drives were used in RAID 50 that would be 72TB of storage capacity. As far as fault tolerance, RAID 50 can be quite stable if it’s set-up correctly. While RAID 10 is one of the best set-ups...

Words: 497 - Pages: 2

Free Essay

It-302-Linux System Administration

...can be applied to Unix-like operating system kernels, such as Linux and that of BSD. SELinux was developed by the United States National Security Agency, it was released to the open source development community under the GNU GPL on December 22, 2000. SELinux users and roles are not related to the actual system users and roles. For every current user or process, SELinux assigns a three string context consisting of a role, user name, and domain. This system is more flexible than normally required: as a rule, most of the real users share the same SELinux username, and all access control is managed through the third tag, the domain. Circumstance for when the user is allowed to get into a certain domain must be configured in the policies. The command runcon allows for the launching of a process into an explicitly specified context, but SELinux may deny the transition if it is not approved by the policy configuration. The security of an unmodified Linux system depends on the correctness of the kernel, all the privileged applications, and each of their configurations. A problem in any one of these areas may allow the compromise of the entire system. In contrast, the security of a modified system based on an SELinux kernel depends primarily on the correctness of the kernel and its security policy configuration. While problems with the correctness or configuration of applications may allow the limited compromise of individual user programs and system daemons, they do not pose a......

Words: 907 - Pages: 4

Premium Essay

Systems Administration

...COURSE TITLE: BICT LEVEL 300 EVENING SUBJECT: SYSTEMS ADMINISTRATION Q1. Outline the installation process of the Ubuntu Server Edition? Ans. * By using a pen drive or from a VMware network * By using a CD-ROM or do a bootable disc and slot it into the device * Q2. Describe the installation process of Ubuntu from a CD or a bootable disc. Ans. * First, download and burn the appropriate ISO file from the Ubuntu web site3. * Boot the system from the CD-ROM drive. * At the boot prompt you will be asked to select the language. This is default and it will show up immediately you install the server. * After, select an installation language. This is what will see you through the installation process. * Choose the continent and country. This is very important because there are servers all over the world that the Ubuntu or Linux system can go in for updates. It looks for servers available in the specified region and relays you to that server. This makes updating quite easy. * You will then asked to select your keyboard layout or the keyboard detection. * It will load the components from the CD or bootable drive onto the system. * The installer then discovers your hardware configuration, and configures the network settings using Dynamic Host Configuration Protocol (DHCP) which will make everything automatic and find your local host name by default * However, if you want to configure the network manually, you will need a static IP......

Words: 611 - Pages: 3

Premium Essay

Network Systems

...Networking operating system It is the software that runs on a server and enables the server to manage data, users, groups, security, applications, and other networking functions.[2] The network operating system is designed to allow shared file and printer access among multiple computers in a network, typically a local area network (LAN), a private network or to other networks. The most popular network operating systems are Microsoft Windows Server 2003, Microsoft Windows Server 2008, UNIX, Linux, Mac OS X, and Novell NetWare. Multiuser File Sharing A network operating system manages concurrent requests from clients and provides the security necessary in a multiuser environment. A file sharing component is installed in each client machine that interacts with the server to share files and applications as well as devices on the network such as printers, faxes and modems. Peer-to-Peer In a Peer-to-peer network operating system users are allowed to share resources and files located on their computers and access shared resources from others. A peer-to-peer network sets all connected computers equal; they all share the same abilities to utilize resources available on the network. Client/Server Client/server network operating systems allow the network to centralize functions and applications in one or more dedicated file servers. The server is the center of the system, allowing access to resources and instituting security. The network operating system provides the......

Words: 1924 - Pages: 8

Free Essay

The System of Public Administration in Poland

...The System of Public Administration in Poland In a general sense, the ‘administrative system’ may be defined as the totality of the principles of organization and operation of public administration. In a narrow sense, the administrative system is usually taken to mean an organizational system or structure based on law, within the framework of which public administration functions, and also the operational mechanism of the entire structure and its parts. In addition, it includes functional connections, rules and methods of proceeding designed to guarantee flawless operation of the entire system and its segments. A. Central Administration Central administration constitutes an important segment of the administrative apparatus situated on the highest level of its organizational structure. It includes a fairly complex organizational and functional mechanism composed of various organs, offices, agencies and institutions {e.g., governmental agencies or special funds) set up to fulfill the respective tasks of public administration throughout the entire country. The shape of this mechanism is outlined in general terms by the Constitution and specified in more detail by ordinary legislation and executive orders issued on a statutory basis. Central administration is internally diversified. It is divided into two basic segments, the political-governmental and the administrative-executive. To distinguish these two principal components of the central apparatus, they are......

Words: 5129 - Pages: 21

Premium Essay

Network Administration

...Advanced Network Technology June 1993 OTA-BP-TCT-101 NTIS order #PB93-203735 Recommended Citation: U.S. Congress, Office of Technology Assessment, Advanced Network Technology--Background Paper, OTA-BP-TCT-1O1 (Washington, DC: U.S. Government printing Office, June 1993). For sale by the U.S. Government Printing Office Supcl IIIILWIICIII (If [k)c ulllLlll\. \lAll stop $s01’, \$ Allllg((u. [)(’ 2(141? () ~?x ISBN 0-16 -041805-4 -— . . Foreword omputer networks are having dramatic impacts on our lives. What were once esoteric tools used only by scientists and engineers are becoming more widely used in schools, libraries, and businesses. At the same time, researchers are working to develop even more capable networks that promise to change fundamentally the way we communicate. This background paper analyzes technologies for tomorrow’s information superhighways. Advanced networks will first be used to support scientists in their work, linking researchers to supercomputers, databases, and scientific instruments. As the new networks are deployed more widely, they will be used by a broader range of users for business, entertainment, health care, and education applications. The background paper also describes six test networks that are being funded as part of the High Performance Computing and Communications Program. These test networks are a collaboration of government, industry, and academia, and allow researchers to try new approaches to network design and to attack a......

Words: 37290 - Pages: 150

Fairy Tail 335 | Jeux Wii | Fairy Tail 445