Match Risks/Threats to Solutions:
1. Violaton of a security policy by a user – C
2. Disgruntled employee sabotage - I
3. Download of non-business videos using the internet to an employer-owned computer - A
4. Malware infection of a user’s laptop - L
5. Unauthorized physical access to the LAN - N
6. LAN server operating system vulnerabilities - F
7. Download of unknown file types - B
8. Errors and weaknesses of network router, firewall and network appliance configuration file - H
9. WAN eavesdropping - M
10. WAN Denial of Service (DoS) or Distributed Denial of Service (DDoS) - D
11. Confidential data compromised remotely - K
12. Mobile worker token stolen - G
13. Corrupt or lost data - E
14. Downtime of customer database – J
Lab #1 Assessment Questions and answers
1. Name at least five applications and tools pre-loaded on the Windows 2008 Server Target most computers and identify whether that application starts as a service on the system or must be run manually?
FileZila Server – starts as a service
Nmap - does not start as a service
WireShark – does not start as a service
WinPcap - does not start as a service
Tftpd32-SE does not start as a service
2. What is the DHCP means and what is use for regards to IP host address, DHCP Server, and IP default gateway router?
DHCP (Dynamic Host Control Protocol) is the client/server protocol that automatically provides an Internet Protocol (IP) host with its IP address and other related configuration information such as subnet mask, default gateway and DNS server information…(www.technet.microsoft.com)
3. What is the relationship between risks, threats and vulnerabilities as it pertains to information Systems Security throughout the seven domains of a typical IT infrastructure?
Without threats or vulnerabilities you have very little risk or having an incident. The more likely a threat can exploit any vulnerability the higher the risk becomes. Risk