You are on page 1of 27

2nd Quarter

Hardware and Software tools


Overview of Hardware Troubleshooting Tools
 There are different types of troubleshooting tools
 We have discuss 5 types of troubleshooting Tools
1) Cable tester
2) Crimper
3) Multimeter
4) Post Card
5) LSA punch down tools

Cable Testers
 Cable Testers also known as a media tester
 that is used for find network problems involves bad cabling and connectors.
 Generally it is used for test whether the cable works properly or not
 that was finding to the pinpoint the distance to a break in a cable.

Crimper
 to attach the RJ-45 type connectors to end of the cables.
 was generally used for network and telephone line cabling.

Multimeter
 to check the shorts in the coaxial cable.
 know as multitester as well as volt ohm meter (VOM)
 Multimeter can be used to directly measure electrical vales of voltage (V), current in ampier(A)
and resistance in ohms.

POST Cards
 tests the activity of the system as it boots up.
 used when the framework can't read from a floppy or hard drive.

LSA Punch down tool


 also known as a krone tool
 for embeddings the wire into protection removal connectors
 utilized by the network and telecommunication technicians.

TONE PROBE / TONE TRACER / CABLE TRACER


Put simply, the toner and probe are used in tandem to trace a single copper-based (twisted-pair
or coaxial) cable among a bundle or cluster of cables. The tone generator does just what its name
indicates, sending tone down the circuit that the technician is trying to identify.
• How does a tone and probe kit work?
The tone generator injects a signal onto the cable to be traced. Typically it's a Square wave (with
high harmonic content), or a warbling tone. The probe tool is usually called an Inductive Amplifier, but
in reality it works by capacitive coupling from the tone injected onto the wire.

Overview of Software Troubleshooting Tools


 There are different types of Software troubleshooting tools
 We have discuss 5 types of troubleshooting Tools
1) Putty
2) Ping
3) Tracert
4) Network Monitor
5) Ipconfig

Putty
 Putty is a free and open-source troubleshooting tool.
 Putty was created for Microsoft Windows, but it has been working on various operating systems
like as Linux.
 Utilizing putty we can perform different basic actions such as creating folders, copying them and
so on.

PACKET INTERNET GOPHER


Ping
 was first developed in 1983
 used to check whether the problem exists within the office or within the network of the (ISP)
Internet service provider
 used to provide a basic connectivity test between the requesting host and a destination host.

TTL and ms
• What is time-to-live (TTL)?
Time-to-live (TTL) is a value for the period of time that a packet, or data, should exist on a
computer or network before being discarded.
• Ping (latency is the technically more correct term) means the time it takes for a small data set to
be transmitted from your device to a server on the Internet and back to your device again. The
ping time is measured in milliseconds (ms)

TRACERT or TRACE ROUTE


Tracert
 troubleshooting tool
 which displays a list of all the routers between computer and a specified destination computer
 check the speed of connectivity.

Network Monitor
 One of the most popular networking Monitoring Tool is Microsoft Network Monitor.
 was originally designed and developed by Raymond Patch,
 Used for troubleshooting network problems and applications on the network
ipconfig
 Ipconfig stands for internet protocol configuration.
 used to troubleshoot internet issues and find information about the host computer TCP/IP
configuration.
 used to know current local IP address, default gateway, TCP/IP settings for troubleshooting a
networking issue

Nslookup
 Nslookup used for domain name or IP address mapping or for any other specific DNS record.
 it is a network administration command-line trouble shorting tool.
 Generally, nslookup used for find the ip address of a host and find the domain name of an ip
address and find mail servers for a domain.

What is DNS?
DNS, or the Domain Name System, translates human readable domain names (for example,
www.amazon.com)to machine readable IP addresses (for example, 192.0.2.44).
 
Nslookup
Nslookup www.google.com

Netstat
 displays network connections for the Transmission Control Protocol (TCP) (both incoming and
outgoing),number of network interface and network protocol statistics.
 accessible on all operating system
 used for finding problems in the system and to decide the measure of traffic on the system as a
performance measurement.

Netstat [-a] [-e] [-n] [-0] [-p proto] [-r] [-s] [-v] [interval]
Chapter 6
Information Systems Security
Learning Objectives
 Upon successful completion of this chapter, you will be able to:
 Identify the information security triad
 Identify and understand the high-level concepts surrounding information security tools
 Secure yourself digitally

Introduction
• Computers and digital devices are becoming integral to conducting business
- Which also makes them a target of attack
• Devices needs to be secured
• Networks that computers and devices use should also be secured

CIA Triad
Confidentiality — restrict access to authorized individuals
Integrity— data has not been altered in an unauthorized manner
Availability — information can be accessed and modified by authorized
individuals in an appropriate timeframe
Confidentiality
Integrity
Availability

Authentication
• Persons accessing the information is who they say they are
• Factors of identification:

- Something you know — user ID and password


— User ID identifies you while the password authenticates you
— Easy to compromise if weak password
- Something you have — key or card
 Can be lost or stolen
- Something you are — physical characteristics (i.e., biometrics)
— Much harder to compromise
— A combination of at least 2 factors is recommended
Access Control
Once authenticated — only provide access to information
necessary to perform their job duties to read, modify, add, and/or
delete information by:
- Access control list (ACL) created for each resource
(information)
• List of users that can read, write, delete or add
information
• Difficult to maintain all the lists
- Role-based access control (RBAC)
• Rather than individual lists
• Users are assigned to roles
• Roles define what they can access
• Simplifies administration

Tools for Information Security


• Authentication
• Access Control
• Encryption
• Passwords
• Backup
• Firewalls
• Virtual Private Networks (VPN)
• Physical Security
• Security Policies

Encryption
• An algorithm (program) encodes or scrambles information during
transmission or storage
Decoded/unscrambled by only authorized individuals to read it
How is this done?
— Both parties agree method (there are many) using keys
• Symmetric key — sender and receiver have the key which can be
risky
• Public Key— use a public and private key where the public key is
used to send an encrypted message and a private key that the
receiver uses to decode the message
Passwords
• Single-factor authentication (user ID/password) is the easiest to break
• Password policies ensure that this risk is minimized by requiring:
- A certain length to make it harder to guess
- Contain certain characters — such as upper and lower case, one number, and a special character
- Changing passwords regularly and do not a password to be reused
- Employees do not share their password
- Notifying the security department if they feel their password has been compromised.
- Yearly confirmation from employees that they understand their responsibilities

Backup
• Important information should be backed up and store in a separate location
- Very useful in the event that the primary computer systems become unavailable
• A good backup plan requires:
- Understanding of the organizational information resources
- Regular backups of all data
- Offsite storage of backups
- Test of the data restoration
• Complementary practices:
- UPS systems
- Backup processing sites

Virtual Private Networks (VPN)


Some systems can be made private using an internal network to limit access to them
- Can't be accessed remotely and are more secure
- Requires specific connections such as being onsite
• VPN allows users to remotely access these systems over a public network like the Internet
- Bypasses the firewall
- Encrypts the communication or the data exchanged
• CPP students have this ability for:
- Exchange services from your Outlook client
- Mapping a drive or mounting a file share
- Instructions to establish a VPN connection can be found at https://ehelp.wiki.cpp.edu/VPN
(Virtual Private Network): Requirements

Physical Security
• Protection of the actual equipment
- Hardware
- Networking components
• Organizations need to identify assets that need to be physically secured:
- Locked doors
- Physical intrusion detection - e.g., using security cameras
- Secured equipment
- Environmental monitoring — temperature, humidity, and airflow for computer equipment
- Employee training
Security Policies
• Starting point in developing an overall security plan
• Formal, brief, and high-level statement issued by senior management
— Guidelines for employee use of the information resources
— Embraces general beliefs, goals, objectives, and acceptable procedures
— Includes company recourse if employees violate the policy
• Security policies focus on confidentiality, integrity, and availability
— Includes applicable government or industry regulations
• Bring Your Own Device (BYOD) policies for mobile devices
— Use when accessing/storing company information
— Intellectual property implications
• Difficult to balance the need for security and users' needs

Personal Information Security


• Simple steps that individuals can take to be more secure:
• Keep your software up to date
• Install antivirus software
• Use public networks carefully
• Backup your data
• Secure your accounts with two-factor authentication
• Make your passwords long, unique, and strong
• Be suspicious of strange links and attachments
• For more information on personal information security, visit the Stop, Think, Connect website at
http://www.stopthinkconnect.org/

Summary
• Identified the information security triad
• Identified and understand the high-level concepts surrounding information security tools
• How to secure yourself digitally

NETWOR DEVICES-FOR SECURITY FIREWAL
Contents
• Introduction
• History
• Why firewall security
• Types of firewalls
• Working
• Need for firewalls
• Next generation firewall
• Advantages and disadvantages
• Conclusion

Introduction
• A firewall is a network security system, either hardware- or software-based, that controls
incoming and outgoing network traffic based on a set of rules.
• Network firewalls are frequently used to prevent unauthorized Internet users from accessing
private networks connected to the Internet, especially intranets.
• All messages entering or leaving the intranet pass through the firewall, which examines each
message and blocks those that do not meet the specified security criteria.

Continued...
• In protecting private information, a firewall is considered a first line of defense.
• In most sewer infrastructures, firewalls provide an essential layer of security that, combined
with other measures, prevent attackers from accessing your servers in malicious ways.

History
• Computer security borrowed the term firewall from firefighting and fire prevention, where a
firewall is a barrier established to prevent the spread of fire.
• Before firewalls emerged in the late 1980s, the only real form of network security was
performed by access control lists (ACLs) residing on routers.
• Firewall emerged in the late 1980s when the Internet was a fairly new in terms of its global use
and connectivity.

Why firewall security...?


• Remote login
• Application backdoors
• SMTP session hijacking
• Operating system bugs
• Denial of service
• Viruses

Types of firewalls
• Hardware firewalls
• Software firewalls
Hardware firewall
• Hardware firewall can be purchased as a stand-alone product but are also typically found in
broadband routers, and should be considered an important part of your system and network set-
up.
• Most hardware firewalls will have a minimum of four network ports to connect other computers,
but for larger networks, business networking firewall solutions are available.

Software firewall
• Software firewalls are installed on your computer (like any software) and you can customize it
allowing you some control over its function and protection features. A software firewall will
protect your computer from outside attempts to control or gain access your computer.
• New generation Operating systems come with built in firewalls or you can buy a firewall software
for the computer that accesses the internet or acts as the gateway to your home network.

How do firewall work?

Firewall logic
• Firewalls use 3 types of filtering mechanisms:
1. Packet filtering
2. Proxy service
3. Stateful inspection

Packet filtering
 Data flow consists of packets of information and firewalls analyze these packets to sniff out
offensive or unwanted packets depending on what you have defined as unwanted packets.
 Looks at each packet entering or leaving the network and accepts or rejects it based on user
defined rules. Packet filtering is fairly effective and transparent to users, but it is difficult to
configure.
Proxy service
• A proxy server is a type of gateway that hides the true network address of the computer(s)
connecting through it.
• A proxy server connects to the Internet, makes the requests for pages, connections to servers,
etc., and receives the data on behalf of the computer(s) behind it.
• The firewall capabilities lie in the fact that a proxy can be configured to allow only certain types
of traffic to pass (e.g., HTTP files, or web pages).
• Proxy firewalls are considered to be the most secure firewall because they prevent direct
network contact other systems.

Firewall proxy servers works at the application layer of the firewalls, where both ends of a connection
are forced to conduct a session through the proxy.

Stateful inspection
 A newer method that doesn't examine the contents of each packet but instead compares
certain key parts of the packet to a database of trusted information.
 Information traveling from inside the firewall to the outside is monitored for specific defining
characteristics, then incoming information is compared to these characteristics.
 If the comparison yields a reasonable match, the information is allowed through. Otherwise it is
discarded.

How do Firewalls protect Businesses


• Large corporations often have very complex firewalls in place to protect their extensive
networks.
• On the outbound side firewalls can be configured to prevent employees from sending certain
types of emails or transmitting sensitive data outside of the network.
• On the inbound side, firewalls can be programmed to prevent access to certain websites (like
social networking sites).
• A company might choose to designate a single computer on the network for file sharing and all
other computers could be restricted.

The need of Firewalls for Personal Use


• For home use, more simply.
• The main goal of a personal firewall is to protect your personal computer and private network
from malicious mischief.
• Viruses are often the first type of malware that can be transmitted to your computer through
email or over the Internet and can quickly cause a lot of damage to your files. There are two
ways a Firewall can prevent this from happening.
• It can allow all traffic to pass through except data the meets a predetermined set of criteria, or it
can prohibit all traffic unless it meets a predetermined set of critical

Next generation firewalls


• Today, a new generation of users, applications, and security threats are posing risk to the
enterprise wireless network.
• Traditional firewalls are not strong enough to provide complete application visibility and control.
• Next Generation Firewalls allow organizations to achieve network transparency, reduce
vulnerabilities, and conserve network performance
• A newer class of firewalls, next generation firewall - NGFW, filters network and Internet traffic
based upon the applications or traffic types using specific ports.
• Next Generation Firewalls (NGFWs) blend the features of a standard firewall with quality of
service (QOS) functionalities in order to provide smarter and deeper inspection.

Benefits of NGFW
The 3 great benefits offered by next generation firewall for your enterprise wireless network are
1. Application Identification
2. Application Control
3. Threat Prevention

Advantages
• Low cost.
• Packet filters make use of current network routers.
• Makes Security Transparent to End-Users.
• Easy to install. High speed
• Packet filters make use of current network routers. Therefore implementing a packet filter
security system is typically less complicated than other network security solutions.
• Packet filters are generally faster than other firewall technologies because they perform fewer
evaluation

Disadvantages
• Packet filtering by a software firewall can degrade your system's performance, because it's a
demanding task to examine every packet of data.
• Whichever option you choose, configuring and maintaining the firewall can be a difficult.
• A network firewall also can lend users a false sense of security, encouraging them not to
maintain security at the machine level if the network firewall fails or is not configured properly,
this system proved disastrous.
• Sometimes difficult to remove or un-install a firewall complement
These are the following materials needed in the configuration task:
1. Connectors
- It is used to connect external devices to the computer system.

2. Adapter
- A piece of hardware that plugs into an expansion slot in your computer.

3. Wires and Cables


- It is used to connect computers for network.

4. Appropriate software
- This software packages are used to install new drivers needed in setting up your computer.

5. Computer storage media


- These help you in saving data and providing backup for your files such as diskette, compact disc,
flash drives and memory cards.
6. Reference book
- These are books that will provide topics about networking or related books on computer.

7. Manuals
- These provide instructions for certain operation or task.

8. Cable tie
- It is used to organized wires and cables used in connecting computers to avoid tangling.

These are the following tools/ testing devices needed in the configuration task:
1. Screw drivers
- Flat screw driver is used to fasten negative slotted
- Philips screw driver is used to fasten positive slotted & screws.
2. Pliers
- Side Cutter pliers is used for cutting and trimming of connecting wires or terminal leads in the
circuit board.
- Long nose pliers is used for holding, bending and stretching the lead Of electronics component
and connecting wire.

3. Soldering iron/gun
- It is used to join two Or more metal conductors with the support of soldering lead melted
around it.

4. Multi-tester
- It is used by technician for measuring current, voltage and resistance.

5. Magnifying glass
- It is a device made of glass with handle. It exaggerates or increase the apparent size of an
Object.
6. Safety apparel suit (coverall)
- It is used by the person for body protection.

7. Anti-static Mist Strap


- It absorbs the Static electricity of the material when being hold by the hands.

8. Tweezers
- It is used to hold the small sensitive part of the computer.

9. Mini-vacuum cleaner
- It is used for cleaning sensitive parts of the computer.

Personal Protective Equipment


You must wear/use something in order to protect yourself against unexpected harm that may arise
while performing certain tasks. Different jobs used different gadgets or suits to prevent unexpected
harmful events that may hurt us. The equipments below may be used as PPE:
• Goggles — is used to prevent tiny particles from entering our eyes.
• Coverall/apron- is worn by a person to prevent his body or clothes from any types of dirt.
• Gloves — are used in handling object without hurting your hands.
• Dust mask — is used to cover the mouth and nose from tiny particles when cleaning computer
peripherals.
• Shoes with rubber sm4e and rubber mat — are used to avoid us from slippery.
• Anti-static wrist strap - It absorbs the static electricity of the material when being hold by the
hands.

How to install a wired network adapter


To connect to a network, your computer needs a network adapter. Fortunately, most computer
manufacturers know that connecting to the Internet or other computers is important to computer users,
and they include a network adapter with your computer.

If you need to add a network adapter, first choose which method you want to use to install it. Most
people prefer to use a USB (Universal Serial Bus) network adapter, because it's easy to install. If you
have a portable computer, you might find a CardBus (also known as PCMCIA or PC Card) or CF network
adapter better meets your needs. If you have a desktop computer with the proper amount of available
space, you may also have the option of adding an internal network adapter.

The instructions you follow to install a network adapter depend on how you connect it.

How to determine if you have a network adapter


Many newer computers have a network adapter built in that you can use to connect to a wired network.
If you want to install a wired network adapter and are whether your computer already has one, look for
a network port on the back of the computer. Network ports resemble phone jacks, but they are slightly
larger and bavy eight pins inside

When does first United Nations Day was celebrated?


United Nations Day is celebrated on October 24 of each year. It is a day to celebrate the
creation of the United Nations. On October 24, 1945, 50 countries met in San Francisco,
California, to form a group of nations who would work together for world peace. This group
was called the United Nations, or UN for short. Today, the UN has 193 member
states/countries.
What was the purposes of united nation?
 The United Nations saves lives. While the world's media concentrates on
international scandals and policy intervention failures, the United Nations' powerful
lifesaving work with organizations such as the World Food Program, the United
Nations Peacekeeping Forces, and the many other U.N. agencies is rarely covered.
Every year, the World Food Programme (WFP) feeds 90 million people in 80
countries. Another example: The United Nations' women's initiatives improve
maternity and child health and save the lives of 30 million women each year. Another
example is that the United Nations vaccinates 58 percent of the world's youngsters,
saving 3 million lives per year.
 The United Nations provides assistance to refugees. The United Nations helps 38
million refugees every year, protecting them from wars, crises, starvation, and
persecution.
 The United Nations works to combat climate change and promote sustainable
development. The United Nations, which develops knowledge, conducts research,
and brokers international climate accords, does more to safeguard the environment
than any other institution on the planet.
MODULE -3
DATA PROTECTION - RAID
Module 3: Data Protection — RAID
Upon completion of this module, you should be able to:
• Describe RAID implementation methods
• Describe the three RAID techniques
• Describe commonly used RAID levels
• Describe the impact of RAID on performance
• Compare RAID levels based on their cost, performance, and protection

Lesson 1: RAID Overview


During this lesson the following topics are covered:
• RAID Implementation methods
• RAID array components
• RAID techniques

Why RAID?
RAID
 It is a technique that combines multiple disk drives into a logical unit (RAID set) and provides
protection, performance, or both.
• Due to mechanical components in a disk drive it offers limited performance
• An individual drive has a certain life expectancy and is measured in MTBF:
 For example: If the MT BF of a drive is 750,000 hours, and there are 1000 drives in the array,
then the MTBF of the array is 750 hours (750,000/1000)
• RAID was introduced to mitigate these problems

RAID Techniques
• Three key techniques used for RAID are:
 Striping
 Mirroring
 Parity
RAID Technique - Parity
• Parity is a calculated value that's used to restore data from the other drives if one of the drives
in the set fails. It determines the number of odd and even bits in a number, and this information
is used to reconstruct data if a sequence of numbers is lost, which is the case if one of the disks
fail.

Actual parity calculation is a bitwise XOR operation

RAID Level 0 - Characteristics


• RAID level 0 divides data into block units and writes them across a number of disks.
• As data is placed across multiple disks, it is also called "data stripping"
• The advantage of distributing data over disks is that if two different I/O requests are pending for
two different blocks of data, then there is a possibility that the requested blocks are on different
disks

RAID Level 0
• There is no parity checking of data.
• So if data in one drive gets corrupted then all the data would be lost. Thus RAID 0 does not
support data recovery
• Spanning is another term that is used with RAID level 0 because the logical disk will span all the
physical drives
• RAID 0 implementation requires minimum 2 disks

RAID Level 0 - Advantages


• Advantage of RAID level 0 is that it increases speed.
• Throughput (speed) is increased because:
 Multiple data requests probably not on same disk
 Disks seek in parallel
 A set of data is likely to be striped across multiple disks
• Implementation is easy
• No overhead of parity calculation
RAID Level 0 - Disadvantages
• Not a true RAID because it is not fault tolerant
• The failure of just one drive will result in all data in an array being lost. Implementation is easy
• Should not be used in mission critical environments

RAID Level 1 - Characteristics


• This level is called "mirroring" as it copies data onto two disk drives simultaneously.
• As same data is placed on multiple disks, it is also called "data mirroring"
• The automatic duplication of the data means there is little likelihood of data loss or system
downtime.

RAID Level 1
• Data stripping is used as in RAID 0, but each logical strip is mapped to two separate physical drives
• Thus every disk in the array has a mirror disk that contains the same data
• Data can be read from either disk but is written on both disks

RAID Level 1 - Characteristics


• A read request can be executed by either of the two disks
• A write request means that both the disks must be updated. This can be done in parallel
• There is no overhead of storing parity information
• Recovery from failure is simple. If one drive fails we just have to access data from the second
drive
RAID Level 1 - Advantages
• Main advantage is RAID 1 provides fault tolerance. If one disk fails, the other automatically takes
over.
• So continuous operation is maintained.
• RAID 1 is used to store systems software (such as drivers, operating systems, compilers, etc) and
other highly critical files.

RAID Level 1 - Disadvantages


Main disadvantage is cost. Since data is duplicated, storage costs increase.

RAID Level 2
• In RAID 2 mechanism, all disks participate in the execution of every I/O request.
• The spindles of individual disk drives are synchronized so that each disk head is in the same
position on each disk at any given time.
• Data stripping is used.
• Error correcting code is also calculated and stored with data
• Not implemented in practice due to high costs and overheads

RAID Level 3
• Data is divided into byte units and written across multiple disk drives.
• Parity information is stored for each disk section and written to a dedicated parity drive.
• All disks can be accessed in parallel
• Data can be transferred in bulk. Thus high speed data transmission is possible

RAID Level 3
• In case of drive failure, the parity drive is accessed and data is reconstructed from the remaining
devices.
• Once the failed drive is replaced, the missing data can be restored on the new drive
• RAID 3 can provide very high data transfer rates
RAID LEVEL 4
• •RAID 4 is very similar to RAID 3 in that a parity disk drive is always one of the five associated
disk drives. But the difference is instead of doing the parity at the byte level. in RAID 4, the
parity is done at the block level.

RAID LEVEL 5
• RAID 5 consists of block-level striping with distributed parity.
• Unlike in RAID 4, parity information is distributed among the drives. It requires that all drives but
one be present to operate at that block.

BENEFITS OF RAID
• Data loss can be very dangerous for an organization
• RAID technology prevents data loss due to disk failure
• RAID technology can be implemented in hardware or software
• Servers make use of RAID technology
Redundant Array of Independent Disks
(RAID)
Level 0
• Striping
 no fault tolerance
• High performance
Level 1
• Mirroring
Level 2
• Data striping over all drives at the bit level; parity data created with hamming code
 Hamming codes = overlapping parity that is used to reconstruct the original data
Level 3
• Byte-level parity
• All parity data is on one disk
Level 4
• Block-level parity
Level 5
• Interleave parity— data and parity over all disks
ComServ
Movie review
Every child is special
This hardware tool is used for finding network problems involves bad cabling and connectors.
Cable Testers
This hardware tool use to attach the RJ-45 type connectors to end of the cables. k
Crimper
This hardware tool is use to check the shorts in the coaxial cable k
Multimeter
This hardware tool use to tests the activity of the system as it boots up *
POST Cards
Also known as Krone tool *
LSA punch down tool
Is a software tool that can perform different basic actions such as creating folders, copying them and so
on *
Putty
PING Acronym (Give the meaning)
PACKET INTERNET GOPHER
IPCONFIG Acronym (Give the meaning)
internet protocol configuration
TTL Acronym (Give the meaning)
time to live
TRACERT Acronym (Give the meaning)
TRACE ROUTE
DNS Acronym (Give the meaning)
Domain Name System
BYOD Acronym (Give the meaning)
Bring Your Own Device
VPN Acronym (Give the meaning)
Virtual Private Networks
It is a command line that used for domain name or ip address mapping for any other specific dns record
NSLOOKUP
It is a software tool that displays network connections for transmission control protocol *
NETSTAT
What does "C" stands for in CIA Triad
Confidentiality
What does "l" stands for in CIA Triad *
Integrity
In CIA triad this refer to, restrict access to authorized individuals *
Confidentiality
In CIA triad this refer to, that the data has not been altered in an authorized manner k
Integrity
In CIA triad this refer to the information, that can be accessed and modified by authorized individuals in
an appropriate timeframe *
Availability
Give at least one example of "Tools for information Security *
Authentication
Give at least one example of "Tools for information Security *
Access Control
This refer to only provide access to information necessary to perform their job duties to read, modify
add and or delete information *
Access Control
An Algorithm which encodes or scrambles information during transmission
Encryption
This Security tools, inspect and stops packets of information that don't apply to a strict set of rules
Firewall
This Security tools allows remote users to remotely access these systems over a public network like the
internet *
Virtual Private Networks
In Firewall, Give 1 type of filtering mechanism *
Packet filtering
What filtering mechanism, which looks at each packet entering or leaving the network and accepts or
rejects it *
Packet filtering
Is a type of gateway that hides the true network address of the computer(s) connecting through it
Proxy service

1. what does R stands for in "RAID"


Redundant
2. What is the main disadvantage of RAID 1?
COST
3. This RAID pertains to, data striping over all drives at the bit level
RAID 2
4. what does A stands for in "RAID"
Array
5. In one sentence, describe how RAID 4 works
In RAID 4, a parity disk drive is always one of the five associated disk drives, just like in RAID 3. The
distinction is that instead of doing parity at the byte level, it is done at the block level. Parity is done
at the block level in RAID 4.
6. This RAID pertains to, data and parity over all diks
RAID 5
7. RAID 1, is also known as?
mirroring
8. In one sentence, describe how RAID 1 works
Raid 1 mirrors data by copying it to two disk drives at the same time.
9. Is a network security system, either hardware or software-based, that controls incoming and
outgoing network traffic
firewall
10. In one sentence, describe how RAID 5 works
Block-level striping with distributed parity is used in RAID 5. Unlike RAID 4, parity information is
delivered evenly across the disks in RAID 5. To operate at that block, all drives except one must be
present.
11. RAID 4, is also known as?
Block level parity
12. RAID 0 is also known as?
Striping
13. In one sentence, describe how RAID 0 works
Data is divided into block units and written across a number of drives in RAID level 0. It's also known
as "data stripping" because data is spread across numerous disks.
14. This RAID pertains to, all parity data is on one disk
RAID 3
15. Select the 3 types filtering mechanism
Proxy Service
Stateful Inspection
Packet Filtering
16. what does I stands for in "RAID"
Independent
17. It is a method where data divides into block units, or chunk and writes them across a number of
disks
data stripping
18. It is a method where data flows consist of packets of information and firewalls analyze these packet
to sniff out offensive or unwanted packets.
Packet filtering
19. This level is also called "blank" as it copies data onto two disk drives simultaneously
mirroring
20. It is a new method that doesn't examine the contents of each packet but instead compares certain
key parts of the packet
Proxy service
21. What is the main advantage of RAID 1?
Fault tolerance
22. Is a type of gateway that hides the true network address of the computer(s) connecting through
Proxy service
23. The 3 great benefits offered by next generation firewalls
application identification
Application Control
Threat Prevention
24. what does D stands for in "RAID"
Disks
25. RAID 3, is also known as?
All parity data is on one disk

You might also like