Cash-back offer from May 7th to 12th, 2024: Get a flat 10% cash-back credited to your account for a minimum transaction of $50.Post Your Questions Today!

Question DetailsNormal
$ 24.00

IT286X Assessment 2 | Complete Solution

Question posted by
Online Tutor Profile
request

Assessment Grading Rubric
Course: IT286X Assessment 2 Points: 200
Copyright Kaplan University


Project Directions
This component of the Course Assessment consists of a 6 to 10 page Project that assesses the following learning outcome:
IT286-2: Investigate device and infrastructure security, access control, authentication, and authorization.
Once you start the Assessment, you will have 1 week to complete the Project. You must submit your Project to the Dropbox within the specified time. When you are ready to submit it, go to the Dropbox and complete the steps below, or download the directions here: http://extmedia.kaplan.edu/global/DropboxGuide_s.pdf:
• Click the link that says “Submit an Assignment.”
• In the “Submit to Basket” menu, select “Essay.”
• Click the “Add Attachments” button.
• Follow the steps listed to attach your Word documents.


Use the following convention to name your Project: IT286‐Outcome1‐LastName‐ FirstInitial, where your own name is typed (example: IT286‐Outcome2‐Smith-J). Submit the completed document as an attachment to the basket. Please notify Academic Advising when your assignment is submitted and ready for grading.


A Kaplan University faculty member will grade the Project within 48 hours and notify your advisor of your grade. A score of 80% or better is required to pass this portion of the Course Assessment. A score of at least 80% on each of the five Assessments is required to pass the Course Assessment for full course credit.


Outcome Assessment 2 Project Requirements
Provide a brief explanation of the following questions:
1. Select the best answer and provide a brief explanation (approx. 1/4 page essay) for each of the following questions:
A. Which device stores information about the paths data takes on a network?
a. router
b. firewall
c.buffer
d. ping utility


B. Sockets are a combination of the IP address and which of the following?
a. NIC card manufacturer number
b. default gateway
c. MAC address
d. port


C. One of the most common devices on a network is the switch. Which of the following defines the most important benefits of using a switch?
a. access control and reduced administration
b. simplified routing protocols and tables
c. efficiency and security
d. intrusion prevention and detection


D. IPv6, in addition to having more bits allocated for each host address, has mandatory requirements for which of the following protocols?
a. L2TP
b. IPSec
c. TFTP

d. LDAP


E. Which of the following access control method models allows the owner of a resource to assign permissions to that resource?
a. MAC
b. Role-based Access Control (RBAC)
c. DAC
d. Rule-based Access Control (RBAC)
2. Explain the basic technology of authentication protocols. What is the difference between authentication and authorization? Summarize how the Kerberos authentication protocol works.
3. Discuss the TCP three-way handshake. Explain how it maintains a communication session with another network host. What are the messages used?
4. Describe the different types of intrusion detection/prevention methods and their use. Which would be most beneficial in protecting a SQL server?
5. Explain the concept of a demilitarized zone (DMZ). What kind of devices would be placed inside a DMZ? Describe a bastion host.
6. Compare a VLAN (Virtual LAN) to a VPN (Virtual Private Network). How are they similar and how do they differ.
Project grading rubric=200 points
Project Criteria
Points Possible
Points Earned
1. Complete five questions.
1–A. 4 points for correct answers. 6 for explanation.
0–10
1–B. 4 points for correct answer. 6 for explanation.
0–10
1–C. 4 points for correct answer. 6 for explanation.
0–10
1–D. 4 points for correct answer. 6 for explanation.
0–10
1–E. 4 points for correct answer. 6 for explanation.
0–10
2. Explain the basic technology of
0–30

authentication protocols. What is the difference between authentication and authorization? Summarize how the Kerberos authentication protocol works.
3. Discuss the TCP three-way handshake. Explain how it maintains a communication session with another network host. What are the messages used?
0–30
4. Describe the different types of intrusion detection/prevention methods and their use. Which would be most beneficial in protecting a SQL server?
0–30
5. Explain the concept of a demilitarized zone (DMZ). What kind of devices would be placed inside a DMZ? Describe a bastion host.
0–30
6. Compare a VLAN (Virtual LAN) to a VPN (Virtual Private Network). How are they similar and how do they differ.
0–30
Column Total
0–200
Less deduction taken for spelling, grammar, and APA errors. Plagiarism is totally unacceptable.
New total after deductions.

Available Answer
$ 24.00

[Solved] IT286X Assessment 2 | Complete Solution

  • This solution is not purchased yet.
  • Submitted On 20 Aug, 2015 08:10:32
Answer posted by
Online Tutor Profile
solution
Sockets are a mixture of the IP address as well as which of the port subsequent because...
Buy now to view the complete solution
Other Similar Questions
User Profile
AceTu...

IT286X Assessment 5 | Complete Solution

Tempest technology is applied to give EMI as well as RFI shielding for a complete room of processor or electronic tools (also used to stop eavesdropping) for the reason that TEMPEST covers equally ways to spy upon others as w...
User Profile
AceTu...

IT286X Assessment 4 | Complete Solution

Brute Force way of code breaking tries possible mixtures of characters in a try to “guess” the password and also key. Because Brute force attack is a try to guess a password with systematically attempting every possible m...
User Profile
AceTu...

IT286X Assessment 3 | Complete Solution

802.11i which is 802.11 models is the basis for WPA2 as outlined with the Wi-Fi grouping for the reason that WPA (sometimes demoted to as the outline IEEE 802.11i pattern) became obtainable in 2003. And also the Wi-Fi groupin...
User Profile
AceTu...

IT286X Assessment 2 | Complete Solution

Sockets are a mixture of the IP address as well as which of the port subsequent because the mixture of an IP address as well as a port number is identified a socket. And also mainly a socket exclusively identifies an only net...

The benefits of buying study notes from CourseMerits

homeworkhelptime
Assurance Of Timely Delivery
We value your patience, and to ensure you always receive your homework help within the promised time, our dedicated team of tutors begins their work as soon as the request arrives.
tutoring
Best Price In The Market
All the services that are available on our page cost only a nominal amount of money. In fact, the prices are lower than the industry standards. You can always expect value for money from us.
tutorsupport
Uninterrupted 24/7 Support
Our customer support wing remains online 24x7 to provide you seamless assistance. Also, when you post a query or a request here, you can expect an immediate response from our side.
closebutton

$ 629.35