Question: #7807

IT286X Assessment 3 Complete Solution

Assessment Grading Rubric
Course: IT286X Assessment 3 Points: 200
Copyright Kaplan University
Project Directions

 

This component of the Course Assessment consists of 6 to 10 page Project assessed in the following learning outcome:
IT286-3: Explain the protection of wireless networks and cloud services, and the hardening of hosts and applications.
Once you start the Assessment, you will have 1 week to complete the Project. You must submit your Project to the Dropbox within the specified time. When you are ready to submit it, go to the Dropbox and complete the steps below, or download the directions here: http://extmedia.kaplan.edu/global/DropboxGuide_s.pdf:


• Click the link that says “Submit an Assignment.”
• In the “Submit to Basket” menu, select “Essay.”
• Click the “Add Attachments” button.
• Follow the steps listed to attach your Word documents.
Use the following convention to name your Project: IT286‐Outcome1‐LastName‐ FirstInitial, where your own name is typed (example: IT286‐Outcome3‐Smith-J). Submit the completed document as an attachment to the basket.


Make sure that you save a copy of your submitted Project. When you are finished, select “Submit for Grade.” Please notify Academic Advising when your Project is submitted and ready for grading.
A Kaplan University faculty member will grade the Project within 48 hours and notify your advisor of your grade. A score of 80% or better is required to pass this portion of the Course Assessment. A score of at least 80% on each of the five Assessments is required to pass the Course Assessment for full course credit.


Outcome Assessment 3 Project Requirements
Provide a brief explanation of the following questions:


1. Select the best answer and provide a brief explanation (approx. 1/4 page essay) for each of the following questions:
A. Which of the following is a replacement for TKIP?
a. CCMP
b. SSID
c. WPA
d. WTLS
B. Which 802.11 standard is the foundation for WPA2 as outlined by the Wi-Fi Alliance?
a. 802.11a
b. 802.11b
c. 802.11i
d. 802.11n f
C. Cloud computing can involve the use of shared infrastructure. Which of the following is a feature of cloud computing that dynamically provisions or releases resources?
a. a virtual sandbox
b. virtualization
c. multitenancy
d. elasticity
Assessment Grading Rubric
Course: IT286X Assessment 3 Points: 200
Copyright Kaplan University
D. Which of the following monitors the contents of workstations, servers and networks to make sure key content is not deleted or removed?
a. Firewall
b. SLO
c. DLP
d. Archival
E. In the hardening a DNS server, which of the following would be a concern?
a. NAT
b. footprinting
c. security baseline
d. fuzzing
2. Explain at least four types of wireless attacks and methods to mitigate these attacks.
3. Compare the wireless security protocols. Discuss the pros and cons of the encryption protocols used.
4. Compare the three types of cloud service models. Describe what they provide to an organization.
5. Explain the three primary types of backup methods.
6. Discuss RAID and the use of fault tolerance.
Project grading rubric=200 points
Project Criteria
Points Possible
Points Earned
1. Complete five questions.
1–A. 4 points for correct answers. 6 for explanation.
0–10
1–B. 4 points for correct answer. 6 for explanation.
0–10
1–C. 4 points for correct answer. 6 for explanation.
0–10
1–D. 4 points for correct answer. 6 for explanation.
0–10
1–E. 4 points for correct answer. 6 for explanation.
0–10
2. Explain at least four types of wireless attacks and methods to mitigate these
0–30
Assessment Grading Rubric
Course: IT286X Assessment 3 Points: 200
Copyright Kaplan University
attacks.
3. Compare the wireless security protocols. Discuss the pros and cons of the encryption protocols used.
0–30
4. Compare the three types of cloud service models. Describe what they provide to an organization.
0–30
5. Explain the three primary types of backup methods.
0–30
6. Discuss RAID and the use of fault tolerance.
0–30
Column Total
0–200
Less deduction taken for spelling, grammar, and APA errors. Plagiarism is totally unacceptable.
New total after deductions.

Solution: #7817

IT286X Assessment 3 Complete Solution

802.11i which is 802.11 models is the basis for WPA2 as outlined with the Wi-Fi grouping for the reason that WP...
Tutormaster
Rating: A+ Purchased: 11 x Posted By: Vikas
Comments
Posted by: Vikas

Online Users