File - Matthew C. Phaneuf

advertisement

COT410 LAN Fundamentals

Week 4 Worksheet (WS4)

Unit 6 / Unit 7 Assignments

Name: ____MATT PHANEUF_____

The worksheet is a guide you should use to assure that all work for the week is completed properly. You should complete the assignment worksheet, then, post the worksheet in the proper B b weekly folder.

Please label all submitted files using the format: [first initial & last name]-[COT410WSx]. Example: nstudent-COT410WS4

Unit 6

Wireless Networking

Unit time: 165 minutes

Read pages 6-1 through 6-34

Complete B-1: Comparing wireless networking standards, complete questions 1-8 on page 6-17 and

6-18. (24 points)

Item Answer

1. WiFi, Bluetooth, Infrared, 802.11a, WiMax

2. Wifi

3. 802.1x

4. 10M

5. No

6. Speed, distance, freq, cost, security

7.

Yes, the computers could be networked together or the Scanners could be connected to the WiFi network

Complete Unit 6 review questions,

pages 6-31through 6-33 (32 points)

1. B

2. B

3. C

4. C

5. A

6. INFORMAL

7. A,B,D

8. C

9. TRUE

10. B

11. B

12. CHALKING

13. D

14. SSID

15. TRUE

16. FALSE

February 10, 2011 1 | P a g e

Unit 7

Security Threats and Mitigation

Unit time: 135

Read pages 7-1 through 7-44

Complete A-1: Identifying common security threats, complete questions 1-8 on page 7-6 and 7-7

(16 points)

Item Answer

1. D

2. A

3. A

4. TRUE

5. D

6.

TROJAN- DELIVERY VEHICLE FOR CODE

LB- RUNS WHEN A CONDITION IS MET

7. NO

8.

COULD BE MALICIOUS (DDOS) OR COULD BE PART A TEAM TO COMPLETE A DISTRIBUTED

COMPUTING TASK

Complete A-2: Discussing social engineering, complete questions 1-3 on page 7-11. (6 points)

Item Answer

1. A,B

2.

3.

TRAINING

EAVESDROPPING, FINGER WATCHING

Complete A-3: Discussing DoS attacks, complete questions 1 and 2 on page 7-14. (4 points)

Item Answer

1.

2.

FLOODS SERVER WITH HALF OPEN TCP CONNECTION

AUTOMATICALLY DROP ICMP TRAFFIC FROM OUTSIDE THE NETWORK

Complete B-1: Creating a security policy, complete questions 1-8 on page 7-27. (16 points)

Item Answer

1. TO PROTECT THE ORGANIZATIONS INFORMATION AND LIMIT LIABILITIES AND LEGAL ACTIONS

2. TO ENSURE A SINGLE PERSON ISN’T IRREPLACEABLE

3. TO PRETECT THE ORGANIZATION FROM A MAJOR SECURITY INCIDENT

4. E

5. LENGTH TO SET AUTO EXPIRATION

6. SPECIFIES SERVICE LEVELS FOR SUPPORT AND PENALTIES FOR SERVICES NOT BEING MET

7. OPERATIONS SECURITY

8. PERSONALLY IDENTIFIABLE INFORMATION

February 10, 2011 2 | P a g e

Complete B-2: Creating a human resources policy, complete questions 1-6 on page 7-30. (12 points)

Item Answer

1. TO EVALUATE POTENTIAL SECURITY RISKS

2. KEEP EMPLOYEES FRESH

3. HELP ALLEVIATE ABUSE OF POWER

4. HELP PREVENT MISTAKES

5. EXIT INTERVIEW, ACCESS REMOVED, ESCORTED EXIT

6. EMPHASIZES RESPONSIBILITY, ACT LEGALLY, AND HONESTY

Complete B-3: Creating an incident response and reporting policy, complete questions 1-5 on page 7-34.

(10 points)

Item Answer

1.

AVAILABLE RESOURCES

IDENTIFY STEPS TO BE TAKEN

ACCEPTABLE RISKS DOCUMENTED

DUE DILIGENCE

CONTAINMENT, BECAUSE ERADICATION WON’T WORK UNLESS THE THREAT IS CONTAINED

2.

FIRST.

DISCONNECT FROM NETWORK, SYSTEM SHUT DOWN, FIREWALL HARDENED, LOG ON

3.

ACCOUNTS DISABLED, FILE TRANSFERS SUSPENDED

4. SYSTEM RESTORE AND PASSWORD RESETS

5. JUSTIFY THE EXPENSES AND USED FOR TRAINING OR LEGAL PURPOSES

Complete B-5: Identifying the need for user education and training, complete questions 1-4 on page 7-40. (8 points)

Item Answer

1. VERY, TO PREVENT ACCIDENTAL LOSS OF DATA

2. ENABLES ALL USERS TO BE A PART OF THE SECURITY TEAM

3.

4.

REASON FOR TRAINING, SECURITY CONTACTS, WHO TO CONTACT, ACTIONS TO TAKE, POLICIES,

APPROVED TECHNIQUES, SYSTEM ACCOUNT SECURITY

LOGON BANNERS, SYSTEM ACCESS FORMS, DEPARTMENTAL BULLETINS

Complete B-6: Identifying education opportunities and methods, complete questions 1-3 on page 7-42.

(6 points)

Item Answer

OJT- HANDS ON

1. CLASS-SHARE PERSONAL EXPERIENCES

2.

3.

ONLINE-CENTRALIZED STORAGE AND TEACHING AND TIME CONVENIENCE

OJT-NEED PRIOR TRAINING

CLASS-SCHEDULES

ONLINE-LACK OF PERSONAL INTERACTION

OJT-BECAUSE IT’S EQUIPMENT BASED

February 10, 2011 3 | P a g e

Complete Unit 7 review questions,

pages 7-43 through 7-44 (34 points)

1. DOS

2. SYN FLOOD

3. ICMP

4. ZOMBIES

5. DOS, WEB SPOOFING, INFO THEFT, TCP

SESSION HIJACKING, DATA CORRUPTION

6. ACCEPTABLE USE

7. DUE CARE

8. NEED

9. DELETING FILES OR REFORMATTING

DISKS DOESN’T FULLY ERADICATE THE

DATA STORED

10. REQUESTS THAT ALL PERSONNEL

ARE HONEST, TRUSTWORTHY, ACT

LEGALLY, AND RESPONSIBLE.

APPLICABLE TO USE OF COMPANY

DATA

11. INCIDENT RESPONSE

12. CHANGE MANAGEMENT

13. TRUE

14. PHONE DIRECTORIES, ORG CHARTS,

MANUALS, CALENDARS, HARDWARE

15. TROJAN

16. NEGLECT, LACK OF TRAINING,

COMPLACENCY

17. DELETING FILES OR REFORMATTING

DISKS DOESN’T FULLY ERADICATE

THE DATA STORED

LabSim Labs

Complete the following LabSim Resources and Labs.

6.0 Wireless Networking

6.1 Wireless Concepts

6.1.1 Radio Frequency Wireless

6.1.2 Wireless Architecture

6.1.3 Wireless Architecture Facts

6.1.4 Wireless Infrastructure Facts

6.1.5 Exam Questions

6.2 Wireless Standards

– Section 6.1 (1 point)

6.2.1 802.11 Wireless Standards

6.2.2 Wireless Standards Facts

6.2.3 Infrared and Bluetooth

6.2.4 Infrared and Bluetooth Facts

6.2.5 Exam Questions - Section 6.2 (10 points)

6.3 Wireless Security

6.3.1 Wireless Security

6.3.2 Wireless Security Facts

6.3.3 Wireless Attacks

6.3.4 Wireless Attack Facts

6.3.5 Exam Questions - Section 6.3 (9 points)

6.4 Wireless Configuration

6.4.1 Wireless Network Configuration

6.4.2 Wireless Configuration Tasks

6.4.3 Configuring Wireless Networks

6.4.4 Create a Wireless Network (6 points)

February 10, 2011 4 | P a g e

6.4.5 Secure a Wireless Network (3 points)

6.4.6 Select a Wireless Adapter (3 points)

6.4.7 Configure Wireless Profiles (7 points)

6.4.8 Exam Questions - Section 6.4 (8 points)

7.0 Wide Area Networks (WANs)

7.1 Wide Area Networks (WANs)

7.1.1 WAN Technologies

7.1.2 WAN Structures

7.1.3 WAN Services

7.1.4 WAN Media Facts

7.1.5 WAN Facts

7.1.6 WAN Services Facts

7.1.7 Exam Questions – Section 7.1 (17 points)

7.2 Internet Connectivity

7.2.1 Traditional Internet Connectivity

7.2.2 Mobile Internet Connectivity

7.2.3 Fiber and Power Line Internet Connectivity

7.2.4 Internet Services Facts

7.2.5 Connect to a DSL Network (7 points)

7.2.6 Exam Questions - Section 7.2 (13 points)

8.0 Network Security

8.1 Network Threats

8.1.1 Network Threats

8.1.2 Social Engineering

8.1.3 Network Threat Facts

8.1.4 Countermeasures Facts

8.1.5 Exam Questions – Section 8.1 (18points)

Critical Thinking – Case Projects

Case Project 1

You are working on assignments for two customers: Thomas Jefferson Community College in Virginia and the Tasty Pelican restaurant in Montréal. For the community college, you help them to design a wireless network for the financial resources team members in the administration building and you help them determine how to connect the administration building to the student services building. For the

Tasty Pelican restaurant, you help design a small private wireless network for their restaurant and a public network for their adjoining coffee shop.

Question 1-1: Designing a Wireless Network for Roaming Team Members

Thomas Jefferson Community College uses a team approach for managing the financial resources of the college. The team members primarily work in the administration building which houses the president’s office, human resources, payroll, accounting, development, and the main IT office. Each area uses teams and team members who are often mobile, going between work areas. For example, the payroll supervisor is on both the payroll team and the human resources team. She also often attends meetings in the accounting area and serves as a backup accounting supervisor. In another example, the IT

February 10, 2011 5 | P a g e

manager of applications development spends equal amounts of time in the president’s, human resources, payroll, accounting, development, and IT areas. Currently it is difficult for any team member to access networked computer resources when they are not in their office. How might you design a wireless networking alternative for this environment? (10 points)

Answer: I would incorporate Wireless Access Points as point-to-multipoint LANs throughout the campus utilizing the already present wired network. The WAP’s would be in the multiple areas that they would work to ensure a strong signal and fast speeds

Question 1-2: Connecting the Administration Building to Student Services

The network in the Thomas Jefferson Community College administration building is connected to the network in the student services building only via five old dial-up modem connections in an access server because a river separates the buildings. DSL and cable modem options are not available in this area.

What wireless alternatives exist for the college to link these buildings? Which of the alternatives do you recommend?

(10 points)

Answer: There is outdoor point-to-point, or outdoor point-to-multipoint options that could be utilized. If they just want to connect the two buildings then the point-to-point option with directional high gain antennas between buildings would work. If they wanted to connect more than one building then the point-to-multipoint option may be a better fit.

Question 1-3: Wireless Options for a Restaurant and Coffee Shop

The Tasty Pelican is an upscale restaurant in Montréal that services up to 55 customers per evening. The management of the Tasty Pelican wants to speed the processing of food orders by equipping its waitpersons with handheld devices. Also, the Tasty Pelican has an adjoining coffee shop and they want to offer public wireless Internet access in the coffee shop. What wireless options do you recommend for the restaurant and the coffee shop? (10 points)

Answer: I would recommend the Mobile MICROS system located here: http://www.micros.com/Solutions/ProductsAM/MobileMICROS/

This company specializes in exactly what they are looking for. The waitpersons could take their orders at the tables and they would automatically be sent to the kitchen without having to go to a kiosk. To offer public wireless internet access, I would recommend they get an additional DSL line just for the public internet access and keep it separated from whatever internet connection the restaurant already has. Then ensure the connection is secure with a firewall and only offer theWiFi password to customers.

Question 1-4:

Security Measures

What security measures are available for wireless solutions that might be applied to the Thomas

Jefferson Community College and the Tasty Pelican designs? (10 points)

Answer: Regarding the campus, there should be some sort of authentication for the wireless users.

That would mean incorporating a RADIUS server and RADIUS Client software or they could just use a username/password for access. The restaurant’s setup of mobile POS devices could be secured by only allowing as many ip addresses access to the network as there are devices. They could even statically assign them to further secure the network. And for the public internet café, as stated before, I would

February 10, 2011 6 | P a g e

recommend an additional DSL line setup just for the public access and just use a wireless router to

share the connection.

Additional Assignment Requirements

____ Participate in DQ 4.1 and DQ 4.2

____ Complete Unit 6 Quiz

____ Complete Unit 7 Quiz

February 10, 2011 7 | P a g e

Download