Write one to two paragraph summary explaining what the each project was trying to accomplish.

LAB 3
Q1: – Write one to two paragraph summary explaining what the each project was trying to accomplish.
Based on this information: – 
1. Return to your router simulation program from Hands-On Project 4-1. You should see the > prompt, which is called the user mode prompt. From this prompt, you can view certain settings and enter privileged mode, where you can modify the router’s configuration. Type ? to see the commands available in this router’s user mode. Not all router simulators provide this feature, but it is available on all Cisco routers.
2. Type enable and press Enter. If your router simulator asks for a password, you can press Enter because you have not configured one. You should see a # prompt to indicate that you are in privileged mode, where you can change the router’s name, program banners, set passwords, and enter other configuration modes.
3. Type configure terminal and press Enter. The prompt changes to Router(config)#, which is global configuration mode. Type hostname Branch06 and press Enter. You have named the router, so the prompt changes to Branch06(config)#.
4. Type interface ethernet 0 and press Enter. The prompt changes to Branch06(config-if)#, which is interface configuration mode for the Ethernet 0 interface. Type exit and press Enter. You are now in interface configuration mode for the serial 0 interface. Press Ctrl+Z to return to privileged mode.
5. Type show running-config and press Enter. Examine the output, which shows information about the IOS version, hostname, services, line, and interfaces. Return to global configuration mode, as indicated by the Branch06(config)# prompt, type line vty 0 4 and press Enter. The prompt changes to Branch06(config-line)#.
6. Press Ctrl+Z to return to privileged mode, and then type exit and press Enter to return to user mode.
LAB 4
Q1: – What is the difference between “Regular” and “Intense” scans?
Q2: – Can you protect yourself from port scans? How?
Q3: – Can a proxy server really hide one’s identity?
LAB 5
1. What does the Whois tool do?
2. What does the Crawl website command do?
3. What legitimate uses would a network administrator have for the tools in Sam Spade?
3. How could a hacker use the information provided by Sam Spade for illegal purposes?
look into these websites for Questions 5-10
http://www.ponemon.org
https://www.pwc.com/us/en/services/consulting/cybersecurity/library/information-security-survey.html
5  What was the topic of each of your two Ponemon research studies?
6 What key finding did you read about in the PWC survey?
7. Who do you think completes the surveys that PWC compiles into its annual report?
8.  How could a research study about the cost of data breaches help a CIO or CISO plan for information security expenditures?
9. Why might it be difficult to get information about security breaches?
10. How could identifying new security trends and threats help a CIO or CISO?

The post Write one to two paragraph summary explaining what the each project was trying to accomplish. appeared first on Versed Writers.

Save your time - order a paper!

Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines

Order Paper Now