You are on page 1of 10

CYB 140 All DQs

For more course tutorials visit

www.tutorialrank.com

CYB 140 Week 1 Discussion Physical Security

CYB 140 Week 2 Discussion Virtualized Server vs. Physical Server

CYB 140 Week 3 Discussion A Firewall Can't Do it All


CYB 140 Week 4 Discussion Intrusion Detection Systems

CYB 140 Week 5 Discussion VPN vs SSL

.....................................................................................................................
.........................................

CYB 140 Entire Course


For more course tutorials visit

www.tutorialrank.com

CYB 140 Week 1 Discussion Physical Security


CYB 140 Week 1 Assignment Security Control Evaluation

CYB 140 Week 2 Discussion Virtualized Server vs. Physical Server

CYB 140 Week 2 Assignment Monitoring Servers

CYB 140 Week 2 Assignment Install OS Updates and Configure


Security Policy

CYB 140 Week 2 Assignment Application Data Establish Host Security


CYB 140 Week 3 Discussion A Firewall Can't Do it All

CYB 140 Week 3 Assignment Firewall Configuration

CYB 140 Week 4 Discussion Intrusion Detection Systems

CYB 140 Week 4 Assignment Network Fundamentals Understanding


IPSec

CYB 140 Week 4 Assignment Understanding IDS Firewall Evasion and


Honeypot
CYB 140 Week 4 Assignment IDS vs. IPS Presentation

CYB 140 Week 5 Discussion VPN vs SSL

CYB 140 Week 5 Assignment Configuring VPNs

CYB 140 Week 5 VPN Configuration Plan

.....................................................................................................................
.........................................

CYB 140 Week 1 Discussion Physical Security


For more course tutorials visit

www.tutorialrank.com

Respond to the following in a minimum of 175 words:

After watching the Lynda.com® video "Physical Security Control


Types," explain the various types of security controls, how they relate to
the security controls specified in the Reading for NIST SP-800-53A, and
how their implementation protect a company's assets, including the
facilities, IT infrastructure, and network.

.....................................................................................................................
.........................................

CYB 140 Week 2 Discussion Virtualized Server vs.


Physical Server
For more course tutorials visit

www.tutorialrank.com

Respond to the following in a minimum of 175 words:


After watching the Lynda.com® videos "Virtualization" and
"Virtualization Security," describe the security challenges that a
virtualized environment, such as virtual servers, present. How are they
different from the security issues of physical servers?

.....................................................................................................................
.........................................

CYB 140 Week 3 Discussion A Firewall Can't Do it All


For more course tutorials visit

www.tutorialrank.com

Respond to the following in a minimum of 175 words:

You have been learning how firewalls use Access Control Lists (ACLs)
to block traffic from specified IP addresses. Firewalls can also block
ports, however firewalls do not provide complete security.

Research five types of firewalls.


Discuss the basic limitations of a typical firewall's security. What does a
firewall not do for protection?
.....................................................................................................................
.........................................

CYB 140 Week 4 Discussion Intrusion Detection Systems


For more course tutorials visit

www.tutorialrank.com

Respond to the following in a minimum of 175 words:

After watching the Lynda.com® video "Network Intrusion Detection


and Prevention," discuss techniques used to evade Intrusion Detection
Systems (IDS) as if you were a hacker.

.....................................................................................................................
.........................................

CYB 140 Week 5 Assignment Configuring VPNs


For more course tutorials visit

www.tutorialrank.com
Complete the following exercise from Practice Lab "N10-005 -
Network+: Configuring VPNs":

Exercise 1 - "Configure Remote Access"

Exercise 2 - "Configure Network Access Protection"

Capture screenshots for each task while completing the exercise. Paste
screenshots in a Word document.

Write a 1- to 2-page reflection on the purpose and results of the lab


explaining obstacles you encountered and how you overcame them.

Submit your screenshots and reflection.

.....................................................................................................................
.........................................
CYB 140 Week 5 Discussion VPN vs SSL
For more course tutorials visit

www.tutorialrank.com

Respond to the following in a minimum of 175 words:

You are an information security professional within your organization.


Your boss comes into your office and asks you to explain the difference
between a VPN and SSL connection. The company uses both, but your
boss is confused on what each is used for.

Discuss how you would explain the difference between a VPN and SSL
connection. What advantages or disadvantages do they each offer?

You might also like