Question: #7806

IT286X Assessment 2 Complete Solution

Assessment Grading Rubric
Course: IT286X Assessment 2 Points: 200
Copyright Kaplan University


Project Directions
This component of the Course Assessment consists of a 6 to 10 page Project that assesses the following learning outcome:
IT286-2: Investigate device and infrastructure security, access control, authentication, and authorization.
Once you start the Assessment, you will have 1 week to complete the Project. You must submit your Project to the Dropbox within the specified time. When you are ready to submit it, go to the Dropbox and complete the steps below, or download the directions here: http://extmedia.kaplan.edu/global/DropboxGuide_s.pdf:
• Click the link that says “Submit an Assignment.”
• In the “Submit to Basket” menu, select “Essay.”
• Click the “Add Attachments” button.
• Follow the steps listed to attach your Word documents.


Use the following convention to name your Project: IT286‐Outcome1‐LastName‐ FirstInitial, where your own name is typed (example: IT286‐Outcome2‐Smith-J). Submit the completed document as an attachment to the basket. Please notify Academic Advising when your assignment is submitted and ready for grading.


A Kaplan University faculty member will grade the Project within 48 hours and notify your advisor of your grade. A score of 80% or better is required to pass this portion of the Course Assessment. A score of at least 80% on each of the five Assessments is required to pass the Course Assessment for full course credit.


Outcome Assessment 2 Project Requirements
Provide a brief explanation of the following questions:
1. Select the best answer and provide a brief explanation (approx. 1/4 page essay) for each of the following questions:
A. Which device stores information about the paths data takes on a network?
a. router
b. firewall
c.buffer
d. ping utility


B. Sockets are a combination of the IP address and which of the following?
a. NIC card manufacturer number
b. default gateway
c. MAC address
d. port


C. One of the most common devices on a network is the switch. Which of the following defines the most important benefits of using a switch?
a. access control and reduced administration
b. simplified routing protocols and tables
c. efficiency and security
d. intrusion prevention and detection


D. IPv6, in addition to having more bits allocated for each host address, has mandatory requirements for which of the following protocols?
a. L2TP
b. IPSec
c. TFTP

d. LDAP


E. Which of the following access control method models allows the owner of a resource to assign permissions to that resource?
a. MAC
b. Role-based Access Control (RBAC)
c. DAC
d. Rule-based Access Control (RBAC)
2. Explain the basic technology of authentication protocols. What is the difference between authentication and authorization? Summarize how the Kerberos authentication protocol works.
3. Discuss the TCP three-way handshake. Explain how it maintains a communication session with another network host. What are the messages used?
4. Describe the different types of intrusion detection/prevention methods and their use. Which would be most beneficial in protecting a SQL server?
5. Explain the concept of a demilitarized zone (DMZ). What kind of devices would be placed inside a DMZ? Describe a bastion host.
6. Compare a VLAN (Virtual LAN) to a VPN (Virtual Private Network). How are they similar and how do they differ.
Project grading rubric=200 points
Project Criteria
Points Possible
Points Earned
1. Complete five questions.
1–A. 4 points for correct answers. 6 for explanation.
0–10
1–B. 4 points for correct answer. 6 for explanation.
0–10
1–C. 4 points for correct answer. 6 for explanation.
0–10
1–D. 4 points for correct answer. 6 for explanation.
0–10
1–E. 4 points for correct answer. 6 for explanation.
0–10
2. Explain the basic technology of
0–30

authentication protocols. What is the difference between authentication and authorization? Summarize how the Kerberos authentication protocol works.
3. Discuss the TCP three-way handshake. Explain how it maintains a communication session with another network host. What are the messages used?
0–30
4. Describe the different types of intrusion detection/prevention methods and their use. Which would be most beneficial in protecting a SQL server?
0–30
5. Explain the concept of a demilitarized zone (DMZ). What kind of devices would be placed inside a DMZ? Describe a bastion host.
0–30
6. Compare a VLAN (Virtual LAN) to a VPN (Virtual Private Network). How are they similar and how do they differ.
0–30
Column Total
0–200
Less deduction taken for spelling, grammar, and APA errors. Plagiarism is totally unacceptable.
New total after deductions.

Solution: #7816

IT286X Assessment 2 Complete Solution

Sockets are a mixture of the IP address as well as which of the port subsequent because...
Tutormaster
Rating: A+ Purchased: 11 x Posted By: Vikas
Comments
Posted by: Vikas

Online Users