Professional Documents
Culture Documents
[BT] Several vendors provide a variety of inexpensive or free remote virtual computing
services. In this project, you will install join.me on a host computer, and share the host’s desktop
1. On the host computer, open a Web browser and navigate to join.me. Click start meeting
to begin the download. If you get a security warning requesting permission to run the
application, click Run. The application will download and will automatically initiate a
2. Look for the mini toolbar at the top of your screen and locate the nine-digit number. On
the client computer, open a Web browser and navigate to join.me. Type the nine-digit
number in the join meeting field and press Enter on your keyboard to access the meeting.
3. Take a few minutes to explore the features available on the client computer’s portal. How
can you open a chat? How can you request control of the mouse?
Answer: Answers may vary if the Web app is updated. At the time of printing, click Chat to
begin chatting. To request control of the mouse, click Meeting tools, then click Request control.
4. Now explore the features available on the host computer’s portal. How can you share
mouse control? What special features are only available with a Pro subscription?
Answer: Answers may vary if the web app is updated. At the time of printing, click Meeting tools, then
click Share mouse control. Pro subscription includes Pass presenter role, Annotate, and Record.
5. To end the meeting, click Meeting tools on the host computer and click Exit this
You can change the settings in Internet Explorer to make sure you’re using the latest version of SSL in
addition to TLS options.
1. Open Internet Explorer and click the Tools icon. Click Internet options.
2. On the Advanced tab, scroll down to the Security section. Which SSL/TLS options are
currently enabled?
Answer: SSL 3.0, TLS 1.0, TLS 1.1, and TLS 1.2 (answers may vary slightly)
3. If necessary, select Use SSL 3.0, Use TLS 1.0, Use TLS 1.1, and Use TLS 1.2. (In some
browsers, SSL 2.0 is not compatible with TLS.) If you’re using an unsecured wireless
network like at a coffee shop or a restaurant, also select Warn if changing between
secure and not secure mode so you’ll be notified when interacting with an unsecured
When visiting secure Web sites, it’s important to notice if you have a secure connection with a trusted
Web site before entering personal information on that site. Internet Explorer, for example, shows a
padlock icon when the site’s certificate has been identified and confirmed.
4. In Internet Explorer, navigate to paypal.com. What is the exact address shown in the
Answer: https://www.paypal.com/home
5. Use the mouse pointer to point to the padlock icon. What CA verified the legitimacy of
Answer: Web site information is included: “PayPal, Inc.; San Jose, California; US”
[End Applying Concepts]
[BT] Each of the protocols covered in this chapter plays an important role in securing
transmissions between remote locations. It’s important to have the big picture in mind regarding
how these protocols interact with each other in various parts of the system when troubleshooting
[BT] In this project, you will synthesize the major characteristics of each protocol into a
single reference table. You can create Table 7-1 below in a word-processing program or a
spreadsheet program. Then refer to the information given in this chapter to fill in the missing
pieces.
1. Which cloud computing service model gives software developers access to multiple
A. IaaS
B. PaaS
C. SaaS
D. XaaS
Answer: B. PaaS
2. What service in Windows Server 2012 R2 authenticates remote users and computers to the
A. Active Directory
B. Group Policy
C. DirectAccess
Answer: C. DirectAccess
A. PPPoE
B. RAS
C. PPP
D. SLIP
Answer: A. PPPoE
4. Which encryption protocol does GRE use to increase the security of its transmissions?
A. SSL
B. SFTP
C. IPsec
D. SSH
Answer: C. IPsec
5. Which tunneling protocol is accepted and used by multiple vendors?
A. SSL VPN
B. L2TP
C. SSL
D. SSH
Answer: B. L2TP
6. A hacker runs a program that tries numerous character combinations until it stumbles on the
correct combination and cracks the key. What offensive strategy is this program using?
B. Zero-day exploit
C. CIA triad
7. What is the minimum acceptable key size for today’s security standards?
A. 8 bytes
B. 128 bits
C. 256 bits
D. 512 bits
B. Private key
C. Public key
D. Network key
9. What feature must be configured on a router to redirect traffic from an insecure port to a
secure one?
B. Mutual authentication
D. Port forwarding
10. Which of the following is NOT one of the three AAA services provided by RADIUS and
TACACS+?
A. Authentication
B. Authorization
C. Access control
D. Accounting
12. All types of remote access techniques require some type of ________________, which
13. Which Transport layer protocol does PPTP use? Which Transport layer protocol does L2TP
use?
14. What unique VPN connection characteristic is provided by the conjunction of RRAS and
DirectAccess?
15. What are the two primary encryption techniques used by VPNs today?
16. When surfing online, you get some strange data on an apparently secure Web site, and you
realize you need to check the legitimacy of the site. What kind of organization issues digital
certificates?
17. Which two protocols are available to create secure transmissions for HTTP sessions?
Answer: Wireless
[BT] In this project, you learn to use SSH in Ubuntu. Using the Ubuntu VMs you created in
the case projects in Chapters 2 and 3, follow the steps to use SSH.
[BT] Using the VM that has Ubuntu Server installed, do the following:
2. SSH is included in Ubuntu Server but is not installed. Enter this command to install and start
3. Enter the command ifconfig and write down the IP address of the Ubuntu Server VM.
[BT] Using the VM that has Ubuntu Desktop installed, do the following:
• Click the search icon in the upper-left corner of the screen and then click Terminal
Enter.
• Press Ctrl+Alt+T.
6. Using the shell prompt, enter the command ifconfig and note the IP address of the Ubuntu
Desktop VM.
7. Enter the ssh command with the IP address of the Ubuntu Server VM. For example, if the
ssh 192.168.1.147
8. Enter your password on the server to log in to the server using SSH. You now have an SSH
session established between the Ubuntu Desktop VM and the Ubuntu Server VM.
9. Enter the dir command. What directory is the server’s current default directory?
12. To shut down each VM, use this command in each VM: sudo poweroff
Another random document with
no related content on Scribd:
Gutenberg” is associated) is accessed, displayed, performed,
viewed, copied or distributed:
1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if
you provide access to or distribute copies of a Project
Gutenberg™ work in a format other than “Plain Vanilla ASCII” or
other format used in the official version posted on the official
Project Gutenberg™ website (www.gutenberg.org), you must, at
no additional cost, fee or expense to the user, provide a copy, a
means of exporting a copy, or a means of obtaining a copy upon
request, of the work in its original “Plain Vanilla ASCII” or other
form. Any alternate format must include the full Project
Gutenberg™ License as specified in paragraph 1.E.1.
• You pay a royalty fee of 20% of the gross profits you derive from
the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”
• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.
1.F.
Most people start at our website which has the main PG search
facility: www.gutenberg.org.