Preview

Unit 8 Assignment 1

Good Essays
Open Document
Open Document
509 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 8 Assignment 1
Lab 7: Security Basics.
TASK 1
Zone –Alarm is a two way firewall. The software is free! It also provides an array of features like identity theft protection, online backup’s, and web security. Linksys has firewall settings on their SOHO routers. These firewalls protect the entire network. Most of the SOHO routers on the market today are wireless and provide all different types of wireless security including WPA 2 and also allowing for parental control. Firewalls are sometimes bought as a standalone device but most of the time these days they are built into the router. Software routers are installed on your computer and protect your computer from unwanted traffic.

TASK 2
Trojan horse – pretends to be a ligament program.
Malicious e-mail attachments - or worm usually attached to an e-mail
Drive-by-downloads – when you visit a web site a virus attaches itself

TASK 3
Full back up – Backs everything up
Differential backup- remembers everything up until last full backup
Incremental backup – remembers everything up to last regular backup
For safety backups should be stored off site because you could lose everything this will allow you to have the information off-site to be retrieved at a later date.

$TTL 13000
@ IN SOA mailer.justafigmont.net. hostmaster.justafigmont.net.(
8824456781; serial
18000; refresh every 12 hours
4100; retry after two hours
442700; expire after two weeks
80500 ); minimum TTL of 1 day

IN NS mailer.justafigmont.net.
IN MX 10 mailer.justafigmont.net. mailer IN A 192.168.3.1 firewall IN A 192.168.3.19 switch IN A 192.168.3.3 relay IN A 192.168.3.20

cisco IN CNAME switch www IN CNAME mailer mrtg IN CNAME mailer

First, the SOA record lists the name server for the domain, and next the e-mail address of the administer of the domain (note that the @ has been replaced by a period). The serial number doesn 't have to be a date, however, whenever a change to the zone file on the master DNS server is changed, the



References: http://www.debianhelp.co.uk/zonefile.htm

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1230 Unit 10 Assignment

    • 409 Words
    • 2 Pages

    The company I choose is a small IT company. The company offers all the big major companies technical support. They have to backup client information, finical records, and employee’s information. The company would use the GFS scheme for backing up their information. The GFS scheme comes with a full month backup which is stored offsite, and a weekly and daily backup that is kept onsite as well as offsite. The weekly and daily backups are kept onsite for 30 days then are reused and recycled daily and weekly at the offsite location. The monthly backup that is secured offsite is kept for 3 years depending on the client. Presently for the…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1110 Module5 Lab

    • 254 Words
    • 2 Pages

    Firewalls may be hardware devices or software programs. Hardware firewalls protect an entire network. Software firewalls protect a single computer. Research the Internet for an example of each of these types of firewalls and compare their features. Linksys and Cisco make firewall/routers for home use. The Zone labs are an example of a software firewall.…

    • 254 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    A: Backing up baseline configurations (the state of a computer before it is upgraded) so a computer can quickly be restored to its prior state. Backing up servers before they are upgraded.…

    • 770 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Unit 10 Assignment 1

    • 256 Words
    • 1 Page

    First of all I would recommend that you use Raid-1 as your fault-tolerant hardware. RAID-1 is most often deployed with two disks. The disks are mirrored – providing fault tolerance. Read performance is increased while write performance will be similar to a single disk – if not less. A single disk failure can be sustained without data loss. RAID-1 is often used when fault tolerance is key and there isn’t an exceptional space or performance requirement.…

    • 256 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Unit 9 Assignment 1

    • 113 Words
    • 1 Page

    Baldeo Persaud NT 1330 Unit 9 Assignment 1 During the design phase: Define the scope of application of Group Policy. Determine the policy settings that are applicable to all corporate users. Classify users and computers based on their roles and locations. Plan desktop configurations based on the user and computer requirements.…

    • 113 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Unit 9 Assignment 1

    • 582 Words
    • 2 Pages

    The PKI must go through a formal certification and accreditation (C&A) process before it can be deployed in Quality Medical Company (QMC) operational environment. An independent Third Party must certify all (HIPPA) PKI systems. We will use system certification as a formal procedure for testing security safeguards in the computer system or major application to determine if they meet applicable requirements and specifications outlined.…

    • 582 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Unit 9 Assignment 1

    • 756 Words
    • 3 Pages

    DSL- Digital subscriber line. A type of Internet access service in which the data flows over the local loop cable from the home to the telco central office, where a DSLAM uses FDM technology to split out the data and send it to a router, and split out the voice frequencies and send them to a traditional voice switch.…

    • 756 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    Unit 2 Assignment 2

    • 299 Words
    • 1 Page

    The evolution of the Ethernet standards will have a large effect on data storage requirements. As the speeds of these connections continue to increase, users and businesses will be able to transfer larger files faster and will required larger data storage to accommodate the increased demand of resources. Thirty years ago, when the standard was only 10MB, there was nowhere near the need for the data storage capacity as there is today, with the current standard being 100 Gbit, with 1 Tbit on the way. Data storage wasn’t as high in demand before because it would take an extremely long amount of time to transfer large files, but as the speed increases, so will the demand.…

    • 299 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Base on the premise that there is a mix of computers running Windows 2000, Windows XP, Windows Vista, Windows 7, and Mac OS X, you must research and devise a plan to thwart malicious code and activity by implementing countermeasures and prevention techniques for dealing with viruses, worms, logic bombs, Trojan horses, and other related forms of intentionally created deviant code.…

    • 932 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Unit 3 Assignment 3

    • 288 Words
    • 1 Page

    Data classification policy is important for securing data from risks, which includes unauthorized users, modification, disclosure, access, use, and removal. This is to ensure protection on data assets from unauthorized users. Data must be maintained in a secure, accurate and reliable manner and be available for authorized use. In order to implement security measures, the data must be classified into categories like; confidential, restricted, and public. Confidential and restricted will be required some sort of access mechanism to authenticate anyone who wants to access any classified documents. In order to construct a Classification policy, one must know what type of data are available, where they are located, what type of access levels are implemented and what protection level is implemented and does it adhere to compliance regulations.…

    • 288 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Unit 7 Assignment 3

    • 409 Words
    • 2 Pages

    Structuration Theory is a social theory based on several Theorists throughout time but notably Anthony Giddens. Basically Structuration Theory of our social systems stating that both structure and agents are equal in how we interact socially.…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    You have recently carried out research on two contrasting businesses based locally in London covering the purpose, ownership, organisational structure and strategic planning of each business.…

    • 633 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Unit 2 Assignment 1

    • 309 Words
    • 1 Page

    Audience is needed or argument is invalid. Audience can take either side and the desired outcome is that they will take your side in the argument at the end. There is also the possibility of a common ground where each side of the argument settles.…

    • 309 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    unit6 assignment 2

    • 461 Words
    • 3 Pages

    Richman is considering buying insurance for each smartphone. Use the ALE to determine the usefulness of this safeguard. For example, Richman could purchase insurance for each device for $25 per year. The safeguard value is $25 X 1,000 devices, or $25,000. It is estimated that if the insurance is purchased, the ARO will decrease to 5. Should the company purchase the insurance?…

    • 461 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Unit 10 assignment 1

    • 2611 Words
    • 11 Pages

    Networking Basics: In a network, there are many complex communications devices which are involved in management. Each of these enables access and connectivity to the network. This includes hubs and switches, repeaters, routers, bridges, gateways & wireless devices.…

    • 2611 Words
    • 11 Pages
    Powerful Essays

Related Topics