Free Essay

Nt1230 Lab 1

In: Computers and Technology

Submitted By minimike5528
Words 253
Pages 2
Lab 1 worksheet
PREPARING A VIRTUAL
WORKSTATION IMAGE

|EXERCISE 1.1 |CREATING A WINDOWS 7 VIRTUAL APPLIANCE |
|OVERVIEW |YOU ARE CREATING A NEW COMPUTER VIRTUAL APPLIANCE WITH WINDOWS 7 PROFESSIONAL USING VMWARE PLAYER. |
| |YOUR FIRST TASK IS TO CREATE A NEW VIRTUAL MACHINE AND INSTALL WINDOWS 7 PROFESSIONAL 32BIT WITH |
| |APPROPRIATE SETTINGS FOR THE TEST LAB NETWORK. |
|COMPLETION TIME |30 MINUTES |

Required: Paste a snapshot of your virtual machine settings after the appliance is installed.

|Exercise 1.2 |Working with Disks |
|Overview |In this exercise, you will create a second Virtual Hard drive. You will need the new computer to have|
| |two installed disk drives. You will then initialize the second disk and create data partitions on the|
| |computer. |
|Completion time |30 minutes |

Required: Paste a snapshot of your virtual machine settings after the second hard drive is installed.

|Exercise 1.3 |Exploring Windows 7 |
|Overview |In order to familiarize yourself with the new Operating System being rolled out in your organization,|
| |you decide to manipulate some common features to see how they differ from previous Windows versions. |
| |In this exercise you will work with screen saver and other display properties. |
|Completion time |30 minutes |

|Question 1 |What is the current screen resolution? |
| |800 x 600 |
| | |

|Question 2 |What security advantages does displaying the login screen on resume offer? |
| |No one will be able to logon to your computer while you’re away. |
| | |

|Question 3 |How did changing the theme affect your display? |
| |It removes/disables the screensaver; Screensavers correspond to each theme. |
| | |…...

Similar Documents

Premium Essay

Lab 1

...Assessment Worksheet 111 LAB #7 – ASSESSMENT WORKSHEET Relate Windows Encryption and Hashing to Confidentiality and Integrity Course Name and Number: Student Name: Instructor Name: Lab Due Date: Overview This lab demonstrated how hashing tools can be used to ensure message and file transfer integrity and how encryption can be used to maximize confidentiality. Common hashing and encryption tools, including MD5, SHA1, and GnuPG, were used. You used GnuPG to generate both a public and private key and a secret key for encryption only. Lab Assessment Questions & Answers 1. If you and another person want to encrypt messages, should you provide that person with your public 7 Relate Windows Encryption and Hashing to Confidentiality and Integrity key, private key, or both? You should both provide each other with your public keys. 2. What does GPG allow you to do once it is installed? GPG allows you to encrypt and decrypt data and generate public and private keys. 3. Name two different types of encryption supported by GPG for your key. GPG supports symmetric ciphers DES and Blowfish as well as asymmetric ciphers ELGamal and RSA. 112 LAB #7 | Relate Windows Encryption and Hashing to Confidentiality and Integrity 4. What happens when you sign and trust a new key to your keychain? A new private and public key is created with a fingerprint for non repudiation. 5. If a user sends you his/her public key, will he/she be able to decrypt your......

Words: 472 - Pages: 2

Premium Essay

Lab 1

...lExercise 10: Acid-Base Balance: Activity 2: Rebreathing Lab Report Pre-lab Quiz Results You scored 100% by answering 4 out of 4 questions correctly. 1. In cases of acidosis, the pH of the blood is You correctly answered: c. less than 7.35. 2. Carbon dioxide and water form You correctly answered: a. carbonic acid (a weak acid). 3. Which of the following is true of respiratory acidosis? You correctly answered: c. The amount of carbon dioxide in the blood is greater than normal. 4. Rebreathing You correctly answered: b. is exemplified by breathing into a paper bag. 01/09/14 page 1 Experiment Results Predict Question: Predict Question: What do you think will happen to the pH and PCO2 levels during rebreathing? Your answer : b. pH will decrease and PCO2 will increase. Stop & Think Questions: Which of the following can cause respiratory acidosis? You correctly answered: c. airway obstruction Experiment Data: Condition Normal Rebreathing Min PCO2 40 40 Max PCO2 40 53.02 Min pH 7.40 7.24 Max pH 7.40 7.42 01/09/14 page 2 Post-lab Quiz Results You scored 100% by answering 4 out of 4 questions correctly. 1. Rebreathing simulates You correctly answered: a. hypoventilation and respiratory acidosis. 2. Hypoventilation results in You correctly answered: c. an accumulation of carbon dioxide in the blood. 3. The renal system can compensate for respiratory acidosis by You correctly answered: b. excreting H+ and retaining bicarbonate ion. 4. Respiratory acidosis can be......

Words: 381 - Pages: 2

Premium Essay

Nt1230 Lab 2

...Ryan Arnold NT1230 1/21/14 Lab 2: Table 2-1 Disk 0 Disk 1 Disk type (basic or dynamic) Basic Basic Total disk size 60.00GB 15.00GB Number and type of partitions 1 Primary 0 Amount of unallocated space 20.00GB 15.00GB Lab 2: Table 2-2 Disk 0 Disk 1 Unallocated space left (in gigabytes) 18.05 GB 15.00 GB Unallocated space left (in megabytes) 18483.2 MB 15360.00 MB Questions 1. What is the number of the 2 GB partition you created earlier in this exercise? It is the second partition listed, Partition 2. 2. Why does the command not execute properly? It does not execute properly because Partition 2 is in FAT32 format, and therefor is not supported. 3. How much available shrink space can be found in the volume? There are 19283 MB, or 19 GB of available shrink space. 4. How is the the resulting volume different from the one you created in Exercise 2.1?......

Words: 443 - Pages: 2

Premium Essay

Lab 1

...Lab 1 1. Reconnaissance, Scanning, Gaining Access, Maintaining Access, and Covering Tracks 2. You need to do a lot of reconnaissance like network scanning, social engineering, and dumpster diving. 3. A hacker can use tools like Netcraft and PCHels to report on your domain, IP number, and operating system, tools such as NMap identify your host systems and services, tools like LANguard Network Scanner identify system vulnerabilities, and tools such as AET Network Scanner 10, FPort 1.33, and Super Scan 3 scan your devices to determine ports that are open and can be exploited. 4. A social engineer is a person who smooth-talks people into revealing information such as unlisted phone numbers, passwords, and other sensitive information. 5. Enumeration is a process to gather the information about user names, machine names, network resources, shares and services. 6. Once the attack is done the hacker will cover his tracks by modifying the log files, using Trojans to destroy system logs or replace system binaries at the same time, and other techniques like steganography and tunneling. 7. When covering up their tracks a hacker can use rootkits that can disable logging altogether and discard all existing logs making it a lot easier to do it again. 8. You should continue testing and report your findings when you finish. 9. NIST Special Publication 800-115 10. Planning, Discovery, Attack, and Reporting 11. To find out if they are vulnerable to attack before they actually get......

Words: 276 - Pages: 2

Free Essay

Lab 1

...Lab 1 HIPPA IT Asset Description | Seven Domains of typical IT | Privacy Data Impact | Assessment | Critical- Major-Minor | | ASA_5505 | LAN-WAN | Authentication | Major | ASA_Instructor | LAN-WAN | Authentication | Major | ASA_Student | LAN-WAN | Authentication | Major | Cisco_2811 | WAN | Packets | Major | Workstations | Workstations | Identification | Minor | LAN Switch 1 | LAN | FTP | Minor | LAN Switch 2 | LAN | FTP | Minor | Norfolk | WAN | Packets | Critical | Tampa | WAN | Packets | Critical | Indy | WAN | Packets | Critical | Seattle | WAN | Packets | Critical | West Covina | WAN | Packets | Critical | User | User | Email | Minor | Remote Access | Remote Access | P to P Information | Major | Questions : 1. It helps identify areas of potential risks. 2. The purpose of an asset classification is to evaluate the health of the company by examining how well each of the company's type of assets is performing 3. HIPPA – identify health care patient files, protect health information for not to be expose to others without concern of the patient and the fallow the ePHI law`s 4. HIPPA website is a minor but it do not make it major because it can`t be hacked or harm, also a e-commerce we have to be very careful what we promote or what we put on place. 5. Because is private HIPPA secure the information for not to be expose 6. Updates,Firewalls make sure data is in place 7. Data strategies differ greatly from one......

Words: 369 - Pages: 2

Premium Essay

Lab 1

...Lab 1: Input, Processing, and Output This lab accompanies Chapter 2 of Starting Out with Programming Logic & Design. Name: ___________________________ Lab 1.1 – Algorithms This lab requires you to think about the steps that take place in a program by writing algorithms. Read the following program prior to completing the lab. Write a program that will take in basic information from a student, including student name, degree name, number of credits taken so far, and the total number of credits required in the degree program. The program will then calculate how many credits are needed to graduate. Display should include the student name, the degree name, and credits left to graduate. Step 1: Examine the following algorithm. (Reference: Designing a Program, page 31). 1. Get the student name. 2. Get the degree program name. 3. Subtract the number of credits taken so far from the required credits for the degree. 4. Get the number of credits required for the degree program. 5. Get the number of credits the student has taken so far. 6. Display the input information in Step 1 and 2. 7. Display the calculated information. Step 2: What logic error do you spot and how would you fix it? Step 3: What steps require user interaction (Ex: user must type in some input)? Lab 1.2 – Pseudocode This lab requires you to think about the steps that take place in a program by writing pseudocode. Read the following......

Words: 2451 - Pages: 10

Premium Essay

Unit 1 Lab 1 Nt1230

...Name Student # Date Assignment Requirements Follow the directions in the Lab Manual for Lab 1, and complete all Exercises. Answer all the questions. Submission Requirements Microsoft Word. 1-2 pages. Self-Assessment Checklist I followed the directions in the lab manual for all exercises. | * | I submitted answers to all of the questions for this lab. | * | I used critical thinking. | * | I have followed the submission requirements:File Format: Microsoft Word (.doc /.docx)Length: 1-2 pagesFont: Times New Roman 12 point sizeLine Spacing: Double | * | Lab 1 worksheet Preparing a Virtual Workstation Image Exercise 1.3 | Exploring Windows 7 | Overview | In order to familiarize yourself with the new Operating System being rolled out in your organization, you decide to manipulate some common features to see how they differ from previous Windows versions. In this exercise you will work with screen saver and other display properties. | Completion time | 30 minutes | Question 1 | What is the current screen resolution? 800x600 | Question 2 | What security advantages does displaying the login screen on resume offer? Offers security from anyone coming along and taking a look at what your doing | Question 3 | How did changing the theme affect your display? It gave a different background | Exercise 1.4 | Creating an .iso Image From Windows 7 Installation Media (Optional) | Overview | Carrying around......

Words: 275 - Pages: 2

Premium Essay

Nt1230 Lab 5

...LAB 5 WORKSHEET WORKING WITH FIREWALLS, ENCRYPTED FILE SYSTEMS (EFS) AND USER ACCOUNT CONTROL (UAC) Exercise 5.1 Installing Internet Information Server Overview Because this is only a test deployment, you will be using a Windows 7 computer to function as the web server. In Exercise 5.1 you install Internet Information Services on your workstation and configure it to host two web sites. Completion time 10 minutes 19. Take a screen shot of the Internet Information Services (IIS) Manager console, showing the new site you created, by pressing Alt+ Prt Scr, and then paste the resulting image into the Lab05_worksheet file in the page provided by pressing Ctrl + V. Exercise 5.2 Testing IIS Connectivity Overview In Exercise 5.2, you test the functionality of the web server you just installed. Completion time 20 minutes Question 1 What is the result, and what does the result indicate? The result displays IIS7 welcome page it indicates the the web browser connects to the IIS page created earlier Question 2 What is the result, and what does it indicate? Same result as previous question it indicates that this is a local intranet page and not an internet page Question 3 What is the result? Screen stating web page not found Question 4 What is the result? Same result as before Question 5 List three possible reasons......

Words: 1208 - Pages: 5

Free Essay

Lab#1

...IS 3220July 7, 2014 Lab #1 Analyze Essential TCP/IP Networking Protocols 1. What is the purpose of the address resolution protocol (ARP)? ARP is used to mediate between Ethernet (and other broadcast link-level protocols) and the network layer, or IP protocols. Put more simply, ARP converts IP addresses to Ethernet addresses. 2. What is the purpose of the dynamic host control protocol (DHCP)? DHCP (Dynamic Host Configuration Protocol) is a communications protocol that lets network administrators centrally manage and automate the assignment of Internet Protocol (IP) addresses in an organization's network. http://searchunifiedcommunications.techtarget.com/definition/DHCP/ARP. Lab #2 Network Documentation 1. When you TELNET to LAN Switch 1 and LAN Switch 2, why is it a good idea to first PING an IP interface or port’s IP address? The ping verifies connectivity by sending ICMP echo packets to a host and listening for an echo reply. This will detect if there are any name resolution issues. 2. Why is using Telnet a security risk for an IP network infrastructure? Telnet sessions are in clear text and programs such as packet sniff can capture passwords and then use them to log into those sessions. 3. How can you mitigate the security risk caused by Telnet? Intrusion detection is a packet inspection tool that monitors, intercepts and responds to abuse in real time. ICMP inspection permits responses to ICMP packets like ping and traceroute that come......

Words: 427 - Pages: 2

Premium Essay

Lab 1

...Laboratory #1 Lab #1: Evaluate Business World Transformation – Impact of the Internet and WWW Learning Objectives and Outcomes Upon completing this lab, students will be able to complete the following tasks: * Identify the security challenges on the web as they relate to various business models and the impact that is made in e-Commerce and Internet-based deployments * Extract various businesses’ personal identifiable information (PII) that is collected and stored from Internet users by a business in a web application * Distinguish among the different reasons for the attacks on web sites and determine exactly what the attackers are after when they target your WWW presence * Evaluate the current state of security on a LAMP server using Telnet, Skipfish and TCPdump to identify whether the proper tools are installed for a security evaluation of the server * Install and use Firefox Web Browser with the Live HTTP Headers plug-in Lab #1 – Compromised Business Application Impact Analysis Course Name & Number: ______________________________________________________________ Student Name: _______________________________________________________________________ Instructor Name: _____________________________________________________________________ Lab Due Date: _______________________________________________________________________ Overview The threats of the Internet go way beyond an attacker defacing your website. An attack can include......

Words: 849 - Pages: 4

Free Essay

Nt1230 Unit 2 Assignment 1

...NT1230 Unit 2 Disk Redundancy 1. RAID stands for Redundant Array of Independent Disks. A way of logically putting multiple disks together into a single array, getting more reliability and faster capabilities. 2. Use RAID if redundancy and reliability are important. If there are problems with your computer RAID will give you more throughputs enabling you to read and write data from multiple drives instead of one. 3. A. RAID 0: Known as stripping. Where data is stored across any number of disks. You can have from two (2) to thirty two (32) physical disks. If one disk fails, all information is lost. There is no redundancy. B. RAID 1: Known as mirroring. Data is written identically across all drives in the array. Used mainly for redundancy. No data will be lost if a drive fails. You must have two (2) disks. C. RAID 5: Data is split over three or more discs, in a way that protects the data if any of the discs fail. Parity is stored on all of the discs in the drive array, which means that if one disc fails, you won't lose all of your information. Reading is faster since the data has more drives to read from. Writing is a downfall due to the fact that the data has to be compared and processed in order to create the parity. Must have 3 disk minimum and from 8 to 16 maximum. D. RAID 6: Is like RAID 5 with the stripping and parity across the array of disks but adds a second set of parity information for each block of data. Level-6 requires a minimum of four......

Words: 488 - Pages: 2

Premium Essay

Nt1230 Lab 5

...LAB 5 NT1230 5.1 5.2 Question 2 The result was “ this page can not displayed” Question 3 Intranet explorer could not open the page. Question 4 Page still could not be open. Question 5 •Make sure the web address http://ip_address is correct. •Look for the page with your search engine. •Refresh the page in a few minutes Question 6 It is important to clean caches before retesting the web server so it does not open the same cache if there was an error Question 7 The firewall was not letting it open till firewall was turned off Question 8 By testing on other sites with the firewall also turned off and on Question 9 You should not leave your firewall off because it protects your pc 5.3 Question 10 We allowed to open port 80 on HTTP Question 11 Port 4444 is not open 5.4 Question 12 (1) Use good anti virus softwares - To prevent computer from Viruses & other attacks. (2) Be aware of Phising & other social engineering tricks Question 13 The action are what differ from social to security Question 14 The rule we applied in exercise 13.3 applies only to Domain type network by default. So this rule allow connection to intranet inside your network only and will block all incoming connections from outside Public, Private. Question 15 The list was sorted by Domain profile rules. Question 16 On Profile page. Unchecking the Domain and Private checkboxes will prevent client access to the intranet website Question 17 The......

Words: 293 - Pages: 2

Premium Essay

Lab 1

...Unit 1 Labs Lab 1.1 Step 13 Lab 1.2 Define Major Topics for a Database NOUNS | MAJOR TOPIC | Doctors | Patients | Drugs | Side Effects | Researchers | Patient Information | Westlake Research Hospital | Conducting test of new Depression Drugs | Lab 1.3 Create a Statement of Work Scope The Software-Tracking database will be used to help manage the school’s software licensing. The software will be monitored for lifecycle and version corrections as well as keeping track of the number of users accessing the software under the constraints of the license agreement. The faculty and staff computers will be tracked for which version and licensed copy of software is currently running on each system. Constraints The database can be used for accessing the faculty and staff’s logon to the school employee website for the purpose of inputting and updating hours worked. Faculty and staff members can conduct business related work, such as adjusting work schedules, and student’s grades in the system but are not able to view student’s personal files in the registrars system. Objectives * Make for a more efficient system by allowing employees to have control of shared calendars and student’s grades. * Improve the tracking of Software Licensing and the Lifecycle of programs. Tasks and Timeline 1. Gathering Data: Meet with School Board and those involved to discuss the needs and wants for a database. Time Allotted: 3 weeks. Deliverables: A list of......

Words: 365 - Pages: 2

Premium Essay

Nt1230 Week 1 Hw

...1. What replaced the Quick Launch toolbar? a) Magic Desktop b) Pin to Taskbar c) Sidebar d) Notification Area 2. Where do you place gadgets in Windows 7? a) Sidebar b) Notification area c) Taskbar d) Desktop 3. Which feature enables you to minimize all windows except the one on which you want to focus? a) Aero Snap b) Aero Shake c) Aero Peek d) Aero task switching 4. Which of the following is not a library that is included with Windows 7? a) Music b) Documents c) Movies d) Pictures 5. What Windows 7 feature replaces the Security Center found in Windows Vista? a) BranchCache b) Libraries c) ReadyBoost d) Action Center 6. In Windows 7, what is designed to replace VB Script for scripting and performing actions at the command line? a) Resource Monitor b) PowerShell c) Visual Basic d) C## 7. Which of the following editions is available as a volume license only? a) Windows 7 Ultimate b) Windows 7 Enterprise c) Windows 7 Professional d) Windows 7 Home Premium 8. Which of the following editions of Windows 7 can be added to an Active Directory domain? a) Windows 7 Home Basic b) Windows 7 Home Premium c) Windows 7 Starter d) Windows 7 Professional 9. Which of the following editions supports AppLocker? a) Windows 7 Ultimate b) Windows 7 Home Basic c) Windows 7 Professional d) Windows 7 Home Premium 10. Which edition of Windows 7 is designed for low-end mobile devices, usually sold through OEMs? a) Windows 7 Home......

Words: 1501 - Pages: 7

Free Essay

Lab 1

...Post-Lab Questions 1. What were your controls for this experiment? What did they demonstrate? Why was saliva included in this experiment? This experiment is looking for amylase in-particular. The first control was a negative control, Water ,this would show there is no Amylase present. The second control would be a Positive control ,the starch solution this would show the presence of the enzyme amylase. The negative control water does not contain starch. Saliva contains Amylase this is why it is included in the experiment. The saliva is a positive because it turned yellow, this shows no starch left because the amylase broke it all down. 2. What is the function of amylase? What does amylase do to starch? The function of amylase is to start the digestion proses. Amylase function is to break down starch to sugar. 3. Which of the foods that you tested contained amylase? Which did not? What experimental evidence supports your claim? The cooked rice contained Amylase and the starch solution contained amylase. The water the Apple contained no starch. 4. Saliva does not contain amylase until babies are two months old. How could this affect an infant’s digestive requirements? Usual babies do not start eating food until three months. The reason there saliva does not contain amylase is because there bodies have not started producing it yet. For there digestion it means they will not break down any starch foods and just pass them trough there......

Words: 630 - Pages: 3