Top-Rated Free Essay
Preview

Unit 9 Lab 1

Satisfactory Essays
334 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 9 Lab 1
Unit 9 Lab 1
1. Encrypt email, security software, content checking tool, anti-spam tool, and secure firewall configurations.

2. Certificate Authority or Certification Authority (CA) is an entity, which is core to many PKI (Public Key Infrastructure) schemes, whose purpose is to issue digital certificates to use by other parties.
It implies a trusted third party.

3. An attacker can create a certificate for any domain. This certificate will appear to be signed by a trusted CA. Thus, you will see that the site's cert is trusted and you will never get any notification to the contrary.

4. EFS.

5. Once a file has been initially encrypted, file sharing is enabled through a new button in the user interface (UI). A file must be encrypted first and then saved before additional users may be added. After selecting the Advanced Properties of an encrypted file, a user may be added by selecting the Details button. Individual users may add other users from the local machine or from the Active Directory, provided the user has a valid certificate for EFS.

6. DES Data Encryption Standard.

7. The Secure Hash Algorithm 1 (SHA-1) is a well-known and currently secure cryptographic hash function designed by the NSA. SHA1 and Triple DES are the same, they both use algorithms.

8. symmetric-key: It only needs one key to encrypt the message. And both user only need the same key to decode the message. And the in order to create the key is by moving the bit. asymmetric-key: It needs two different keys- public key and private key. Everyone can see the public key and only the person who has private key can decode the message.

9. Complexity, cost, lack of scalability, and lack of interoperability with VoIP systems.

10. PGP uses the RSA algorithm and the IDEA encryption algorithm. The PGP is considered to have Windows interface which is more polished. GPG stands for Gnu Privacy Guard it does not use the IDEA encryption algorithm.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 2130 Lab

    • 191 Words
    • 1 Page

    1. An amino acid consists of a carbon atom attached to a hydrogen atom, an amine group, a side group, and a _____________ group.…

    • 191 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Unit 1 Labs JM

    • 964 Words
    • 5 Pages

    Exercise 1.4.4 – UCS is a standard of characters, it was created so that there would be…

    • 964 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 5 Lab JM

    • 625 Words
    • 5 Pages

    802.1 handle architecture, security, management, and internetworking of LAN, MAN, and WAN standardized by IEEE802. It provides internetworking, audio/video bridging, data center bridging and security.…

    • 625 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 8 Lab 8

    • 1017 Words
    • 8 Pages

    If you used the number of bytes instead you would get a whole different amount of possible networks which isn’t right.…

    • 1017 Words
    • 8 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 10 Lab

    • 563 Words
    • 2 Pages

    1. ZenMap GUI sends out broadcasts for server queries for various different types of operating systems in servers (OS). By examining how various hosts respond to certain queries, ZenMap GUI can distinguish what kind of OS and server exists.…

    • 563 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 8 Labs

    • 1237 Words
    • 6 Pages

    Would the IP address in Figure 8-1 be valid as a class C address? Why or why not?…

    • 1237 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 3 Lab

    • 290 Words
    • 2 Pages

    TCP – This protocol is what is used to break data down into manageable pieces and package them to send out to the proper address.…

    • 290 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 2 Lab 2.1

    • 374 Words
    • 2 Pages

    Wi-Fi wireless networks support ad hoc connections between devices. Ad hoc Wi-Fi networks are pure peer to peer compared to those utilizing wireless routers as an intermediate device.…

    • 374 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    unit 7 lab 10

    • 595 Words
    • 3 Pages

    Task 1: Hardware firewalls provide a strong degree of protection from most forms of attack coming from the outside to the internal network. Hardware firewalls can protect computers on a local area network and they can be implemented without much configuration difficulty.…

    • 595 Words
    • 3 Pages
    Good Essays
  • Good Essays

    11. Unencrypted files that are moved or copied to a folder with the encryption attribute set are always encrypted; by default encrypted files can be opened only by the user account that encrypted the file…

    • 250 Words
    • 1 Page
    Good Essays
  • Good Essays

    Unit 9 P1

    • 780 Words
    • 4 Pages

    Unit 9- Outdoor and Adventurous Expeditions P1- Describe 4 Different Expeditions By: Hayley Hawkins Anna McNuf Aim: Cycle 11,000 miles around 50 USA states along with to get kids and communities inspired on bikes and to raise awareness and funds for a chosen charity Year: July, 2013 Expedition: cycle 11,000 miles through North America, taking in one beautiful Canadian province and all 50 states of the USA. Starting in Alaska and ending with Hawaii Goal: Cycle through 50 States Equipment- clothes, bike, tent, sleeping bag, map, cycling shoes, water cleaner (Jet Boil Flash), GO PRO, Ipad and Iphone. Starting in Alaska and ending in Hawaii, I'll pedalled, unassisted, through each and every US state.…

    • 780 Words
    • 4 Pages
    Good Essays
  • Good Essays

    chapter01

    • 7053 Words
    • 24 Pages

    The certificate authority (CA) is the trusted authority for certifying individuals' identities and creating an electronic document indicating that individuals are who they say they are.…

    • 7053 Words
    • 24 Pages
    Good Essays
  • Satisfactory Essays

    Unit 7 Lab

    • 293 Words
    • 2 Pages

    10. In order to craft back-up and recovery procedures, you need to review the IT systems, hardware, software and communications infrastructure needed to support business operations, functions and define how to maximize availability. This alignment of IT systems and components must be based on business operations , functions, and prioritizations. This prioritization is usually the result of a risk assessment and how those risks, threats, and vulnerabilities impact business operations and functions. What is the proper sequence of development and implementation for these following plans?…

    • 293 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Windows Part 2

    • 771 Words
    • 3 Pages

    3. When considering the two GPO categories, how are they the same? How are they different?…

    • 771 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    Unit 8 Lab 1

    • 662 Words
    • 2 Pages

    9. Place the connector in the curing over and follow the manufacturers’ cure schedule for curing the epoxy.…

    • 662 Words
    • 2 Pages
    Good Essays