CYB101 – Network Security Controls CYB101 – Exclusive Course Details

CYB101 Course Introduction

4 x 3.00 credits Course code: CYB101

CYB101 Course Introduction for CYB101 – Network Security Controls (CYB101) 2 x 3.00 credits Course code: CYB101

CYB101 Course Introduction for CYB101 – Network Security Controls (CYB101) 3 x 3.00 credits Course code: CYB102

CYB102 Courses Introduction for CYB102 – Cyber Security (CYB102) 2

CYB101 Course Description

4 credits This course is designed to provide students with the knowledge, skills and tools necessary to perform the role of a network security professional. The course will focus on building security awareness, understanding of security threats, protection mechanisms, network threats and vulnerabilities and security solutions. Course topics include: network security concepts; information sharing; authentication; encryption and decryption; information flow in networks; firewalls; intrusion detection systems (IDS) and intrusion prevention systems (IPS); vulnerability scanning techniques for computers, servers and networks

Universities Offering the CYB101 Course

Course Details

Sorry, we could not find any matching schools. Please try other schools or contact us for more information.

Enter your first name:

Enter your last name:

Enter your email:

Verify Email:

We’re sorry, but you have not submitted enough information to complete your profile. Contact us for assistance with submitting this information.

First Name: Last Name: Phone Number: E-mail Address: (Not required if you’re a student) Students Interested In… Select all that apply. Computer Network Administration

CYB101 Course Outline

with Dr. Mingzhe Wang – Fall 2017

Course Syllabus Course Information Course Name Network Security Controls (CYB101) Department Computer Science and Engineering Credit Hours 3 Class Hours/Week 3 Prerequisites None Course Description CYB101 prepares students for the growing field of network security through a study of the nature and functions of computer networks, including their design, operation, protection against cyber-attacks, and evaluation. The course consists of both lecture and lab sessions.

The primary

CYB101 Course Objectives

1.8 Explain the concepts of network security controls for network traffic, including cryptography and access control. The Course includes mandatory unit covering topics on Cryptography Fundamentals (CRYPTO101), Cryptography Introduction (Cryptography101), Advanced Cryptography Concepts (Cryptography101) and Advanced Cryptography Implementation (Cryptography101) 1.9 Explain the concepts of authentication and authorization in a computer network and apply them to access control. The Course includes mandatory unit covering topics on Authentication & Authorization Fundamentals

CYB101 Course Pre-requisites

Name: _____ Class: _ Date: _______

Basic Computer Security Principles – Introduction to Computer Security Cybersecurity is the practice of defending networks and computer systems from unauthorized access,

Are you ready for CYBERSECURITY 101 Cybersecurity is a new frontier in business. Every day you hear about the latest threat and how it can be mitigated. But, have you thought

The Basics of Cybersecurity for Business Professionals Bruce A. Chase, Ph.D., CFCS Executive Vice President, Chief Information Security

CYB101 Course Duration & Credits

6 or 12 months

CYB101 Course Curriculum & Syllabus

Introduction to Cyber Security Framework, Threats and Vulnerabilities in Information Technology (IT) Systems, Types of cyber threats and vulnerabilities. Phishing attacks, Social engineering attacks, Impact of cyber security on Information Technology (IT) systems and business operations.

Course Contents

Course Syllabus

Introduction to Cyber Security Framework, Threats and Vulnerabilities in Information Technology (IT) Systems, Types of cyber threats and vulnerabilities.

CYB101 Course Learning Outcomes

Course Outline Module 1: Introduction to Network Security Controls Module 2: Threat Models and Mitigation Strategies Module 3: Content Filtering Modules 4,5,6: Protecting Your Network from Attacks Module 7: Threats to Computer Networks: Cryptography & Attacks Module 8: Securing Your Network Against Hackers (NIC) Module 9: Securing Your Network against Unauthorized Access (NICI)

Course Code Course Name Credit Points

Credit Hours AASL102 First

CYB101 Course Assessment & Grading Criteria

Course Title: Network Security Controls Student Learning Outcomes: 1. Understand, evaluate, and apply cybersecurity controls to mitigate risk in a networked environment. 2. Design and implement network security controls for a given business application or system. 3. Assess the potential risks of implementing new controls by evaluating current controls and decomposing them into the smallest unit(s) that could provide effective control. Prerequisites: None Instructor’s Recommended Textbook: Information Security Fundamentals (ISBN-10: 111

CYB101 Course Fact Sheet

Course Overview

The course is divided into two sections. In the first, students learn about network security controls and how they relate to other enterprise security controls such as identity and access management. In the second, students apply those skills by building a web application that uses the most common security control vulnerabilities.

What you’ll learn in this course:

Designing, deploying, and maintaining a secure network

Implementing security controls within a network

Designing, deploying, and maintaining an Internet-facing web application


CYB101 Course Delivery Modes

1. Online 2. Instructor-led 3. Other 4. Self paced; other [email protected] (Academic Technologist) Course Workload Table for CYB101 – Network Security Controls (CYB101) Course Workload [email protected] (Academic Technologist) The following table shows the course workload per unit for this course. This table also displays the total number of hours devoted to each task.

CYB101-2019 Courses | StudyGuide for CYB

CYB101 Course Faculty Qualifications

Course Faculty Qualifications for CYB101 – Network Security Controls (CYB101) Open Textbook Description: CYB101 – Network Security Controls (CYB101) Open Textbook Course Description: This course provides an introduction to the following topics: access control, cryptography, network authentication, network security design, intrusion detection and prevention, and key management. The course also focuses on the use of a personal computer as an essential component of network security. The course covers such topics as secure network configurations,

CYB101 Course Syllabus

Course Description: In this course, students will learn about the network security controls. This course is designed for those that will be using network security to prevent threats from accessing networks, servers and other resources. This includes configuring firewalls, intrusion detection systems, vulnerability assessment tools and cryptography. Each week a topic will be explored in more detail and by examining real world scenarios.

Course Content

Week Topic / Objectives 1 Introduction to Network Security (Network Security & SOC) Describe what a cybersecurity Incident Response Team

Suggested CYB101 Course Resources/Books

*Note: Some of the recommended books have sales restrictions or may be out-of-print. This is a list of suggested books that cover the material in CYB101 and will include links to where you can purchase them.



Cybersecurity: Practical Solutions for Network Security, 2nd Edition (McGraw-Hill Professional Publishing) Cybersecurity

Cybersecurity: Practical Solutions for Network Security, 1st Edition (McGraw-Hill

CYB101 Course Practicum Journal

(Level 1) Name: _____ Instructions: You will be required to complete a Journal Assignment for this course. (CYB101, Level 1) As your instructor, I expect that you will have your academic experience and perspective on the topics covered in this course. Please take time to think about what I have taught you. Be sure to reflect on how this may impact your life and the lives of others. Make sure that you answer each of the following questions: 1. What is

Suggested CYB101 Course Resources (Websites, Books, Journal Articles, etc.)

The CYB101 – Network Security Controls course is designed to provide the student with an understanding of cybersecurity and the cyber risks to an organization. The focus is on network and information security controls and their role in mitigating cybersecurity risks within an organization. This course introduces the concepts of computer networks, network security, threats, and tools to effectively protect against them. This course also introduces security architecture and policy management.

Class Number: 120509 Year: 2017 Course Type: Course Lecture Hours:

CYB101 Course Project Proposal

Required Software and Tools: For My Project: I understand that my submission must meet the following criteria: 1. The project has to include the use of Netscape ActiveX, JavaScript, and Flash. 2. This project must be for CYB101 Network Security Controls Course. 3.

CYB101 Course Practicum

Course: CYB101 – Network Security Controls

Course Schedule (SYL courses only) SYL3330 SOC 3155 SYL3410 CYB101 SYL3430 CYB102 SYL3440 CYB103 SYL3450 CYB104 Syllabus

1. Introduction to the course:

This course is a combination of lectures and laboratory work.

The aim of this course is to give students an understanding of the major aspects of network security controls. Students will learn about

Related CYB101 Courses

• SYB101 – Network Security Controls (SYB101) • CYB103 – Network Security Controls (CYB103) • CYB104 – Network Security Controls (CYB104) • CYB205 – Network Security Controls (CYB205) • SYM211 – Operating System Concepts for Networks (SYM211) • SYM212 – Operating System Concepts for Networks (SYM212)

Midterm Exam

at University of Maryland, Baltimore County (UMBC) – StudyBlue Flashcards

Card Set Information

Author: adamroqu8
ID: 291544
Filename: CYB101 – Network Security Controls (CYB101) at University of Maryland, Baltimore County (UMBC)

2012-03-22 23:44:14

Tags: CYB101, Network Security Controls (CYB101), UMBC, UMD

Top 100 AI-Generated Questions

with Wyzant. Your first 5 minutes are always free.

Tutor Details


Wyzant’s tutoring marketplace allows students and tutors to work together online. No booking fees are required.
Compare more tutors

out of 5

Wyzant’s nationwide network makes it easy to find local experts no matter where you live. Here are areas near Norwalk where you can find CYB101 tutors:

Norwalk Area CYB101 Tutors

What Should Students Expect to Be Tested from CYB101 Midterm Exam


Students will be expected to know the following Network Security Controls

Network Access Control (NAC) – These controls ensure that systems in a network are protected from unauthorized use. The NAC controls include:


VLAN (Virtual Local Area Network)

Software Defined Networking (SDN)

Data Encryption

Endpoint Protection – Students will be tested on using Endpoint Protection software

Device Auditing and Monitoring – Students will be tested on using Device Auditing and Monitoring software

User Awareness Training (U

How to Prepare for CYB101 Midterm Exam

– CYB101 – Network Security Controls

Course Description This course provides an introduction to network security controls. Topics covered include the roles of security and networking, types of network devices, common authentication protocols, network management policies, intrusion detection systems (IDS), and security policy frameworks.

About the Course

A. Instructor Contact Information

Dr. Jose Guevara


Office: 105-B Littell Hall

Phone: (562)

Midterm Exam Questions Generated from Top 100 Pages on Bing

Syllabus at

10. What is the Network Security Controls (NSC)? In this question, you are asked to answer whether the NSC refers to all 13 federal entities or only federal entities within the Department of Homeland Security (DHS). How many federal entities does DHS have? 2.

Cybersecurity Basics Flashcards | Quizlet

1. Which of the following

Midterm Exam Questions Generated from Top 100 Pages on Google

– University of Technology Sydney – Syllabus, Course Outline, and other information. Title: 2012-06-19 14:53:40 UTC

Text Size A A A You Are Here: Home > CYB101 – Network Security Controls (CYB101) – University of Technology Sydney – Syllabus, Course Outline, and other information. This course is a modularised module that provides an in-depth examination of the network security controls to be employed to prevent compromise of the

Final Exam

will be administered on Tuesday, 12/18/17 at 3:30 pm in TBA.

The textbook for CYB101 – Network Security Controls can be purchased at and we strongly recommend that you read the book in advance of the class.

Course Description:

This course introduces students to basic network security controls and the corresponding supporting policies. The primary goal of this course

Top 100 AI-Generated Questions

– Quiz 5 – In the following exercise you will solve questions from the… Read More

In this quiz you are given the following question, please answer it.

What Should Students Expect to Be Tested from CYB101 Final Exam


As you can see from the exam objectives for this course, students should expect to be tested on the following subjects: Core Concepts, Linux System Security, Hardware and Software Security Controls, Advanced Network Threats and Countermeasures, Electronic Information Warfare and Cybersecurity Tactics.

How Many Questions are in CYB101 – Network Security Controls (CYB101) Exam?

You can find 50 questions in this final exam for CYB101 – Network Security Controls (CYB101).

What Is the Format

How to Prepare for CYB101 Final Exam


COURSE DESCRIPTION: Course designed to introduce students to the theory and practice of network security controls. It will help students understand the following concepts in information systems: networking, Internet security and defense, information systems resources management, computer crime and security management.


At the end of this course, you should be able to:

Describe computer network security controls

Explain the roles of a firewall

List and explain the components of a basic firewall

Outline the basic steps for applying intrusion detection systems

Final Exam Questions Generated from Top 100 Pages on Bing


This is a review course for the Cisco Certification Exam CISCO100. The review includes a brief overview of the course and hands-on exercises to illustrate each chapter topic.

Please enter a new list name.

Private (Only you can see this list)

Final Exam Questions Generated from Top 100 Pages on Google

to help you study for your exam. Questions and Answers compiled from:

CYB101 – Network Security Controls: Exam 1 Questions Generated from Top 100 Pages on Google for CYB101 – Network Security Controls (CYB101) to help you study for your exam. Questions and Answers compiled from:

CYB101 – Network Security Controls: Exam 1 Questions Generated from Top 100 Pages on Google for CYB101 – Network Security Controls (CYB101) to help you study for your

Week by Week Course Overview

CYB101 Week 1 Description

Learn how to apply and configure the security controls for Cisco Firepower Appliances in a Firepower deployment. In this course, you will learn about the components of the Cisco Firepower Management Center (FMC) and discover how FMC integrates with other components of Cisco Firepower. Course Objectives At the end of this course, you will be able to: Describe how to configure and manage rules in the FMC. List the different components that make up a Cisco Firepower management center (FMC).

CYB101 Week 1 Outline

1. Introduction 2. Operating System Security Controls 3. Network and Host Control Security Controls 4. Control Access and Authentication Controls 5. Data Security Controls 6. Network Access Control (NAC) controls in the USG-2002 Series

CYB101 Week 1 Objectives

2. Describe the current uses of technology in managing security threats to networks, systems and networks of computers.

Cybersecurity Management – Cyber Security and Risk Management (MCS-576) Course Outline for Cyber Security and Risk Management (MCS-576) Presented by: Dr. Mark Cavazos – Program Director Cyber Security Master in Information Assurance Graduate School of Technology Spring 2014 Course Objectives • This course focuses on developing an understanding of the concepts of information security management, regulatory requirements,

CYB101 Week 1 Pre-requisites

Name: University of Phoenix Material: Network Security Controls Review Checklist Instructor: Date: A. What are the 3 types of security in an organization? (Check all that apply) Vulnerability management Internal access controls Physical access controls Security training Awareness – regular, temporary and incident response procedures B. How does a network controller support network security? C. Why is network security important to a company’s reputation? D. What is the difference between internal and external networks? E. What is BGP and what

CYB101 Week 1 Duration

LEC 10:00 – 10:50


Add to my schedule Lecture Details Instructor’s Course Description This course provides an introduction to the concepts, methods, and technologies used in network security. It will focus on design and implementation of security controls in today’s complex IT infrastructure. Students will be provided with a hands-on experience with common types of information security tools used to provide network security. A variety of simulation tools will be used throughout the course. Prerequisite(s): None.


CYB101 Week 1 Learning Outcomes

Problem: In this activity, you will build a network to implement and test intrusion detection systems (IDS) for your company. This exercise will require you to evaluate and design security controls for a company network. You will address how the IDS would be used, and what factors you would consider in designing controls. Your instructor will provide guidance throughout the process of creating this network. Be sure to thoroughly read all guidelines provided by your instructor before beginning.

Review the lesson titled Network Security Controls (CYB101)

CYB101 Week 1 Assessment & Grading

Complete all parts of the following assessments. The following assessment items are linked to the course material and assessment rubric for this course. Assessment 1: Network Security Controls (Part A) (20% of grade) Assessment 2: Network Security Controls (Part B) (20% of grade) Please complete the following items on your assessment as well as include an attachment with your answers. Answer the questions in a Word document, and do not submit your responses as a PDF file. Your responses should

CYB101 Week 1 Suggested Resources/Books

1. Google for [CYB101] or (CYB101) 2. Check out the Free Web Resources [link]. Journal of Computer Science and Technology, 23(7), 1170-1180. We will go over and discuss the following topics in this module: • Discussing the difference between logical and physical security • Explain the difference between cross platform access control model and integrated system access control model • Explain how to implement a good information security policy. What are challenges

CYB101 Week 1 Assignment (20 Questions)

at D2L. Store and manage all of your documents in this cloud-based storage service so you can access them on any device and share them with others in real-time. It should include the following components: • The item number (item number would appear on the cover page) •The date of creation. org is a free, public directory of open-access textbooks from around the world. CTC 1103 Week 5 Assignment Evaluation Rubric for CTC 1103 – Introduction to Accounting

CYB101 Week 1 Assignment Question (20 Questions)

for $25.99 – Compare Prices of 1005 Products in Books from 38 Online Stores in Australia. Save with! … more

Cyber Security Introduction Essay for $10.00 – Compare Prices of 1001 Products in Books from 28 Online Stores in Australia. Save with! Cyber Security Introduction Essay for $10.00, … more

Cyber Security Essay ($10) Cyber Security Introduction Essay (20 Questions) for $10.

CYB101 Week 1 Discussion 1 (20 Questions)

Week 1 Discussion 2 (20 Questions) for CYB101 – Network Security Controls (CYB101) Week 1 Discussion 3 (15 Questions) for CYB101 – Network Security Controls (CYB101) Week 1 Assignment – Access Control and R…

Cyb101 week 1 discussion

The first person I had the opportunity to interact with was a very outgoing girl named Amanda. She was a firecracker of a young lady, and we hit it off immediately.

CYB101 Week 1 DQ 1 (20 Questions)

$9.99 Add to Cart

Cyber Security Week 1 DQ 1 (15 Questions) for CYB101 – Network Security Controls (CYB101) $9.99 Add to Cart

Cyber Security Week 1 DQ 2 (25 Questions) for CYB101 – Network Security Controls (CYB101) $9.99 Add to Cart

Cyber Security Week 2 DQs 1 and 2 (30 Questions each) for CYB

CYB101 Week 1 Discussion 2 (20 Questions)

at University of Phoenix. 1) In the diagram above, what are the key network-level security controls? a. Authentication b. Data encryption c. Cryptography d. Access control e. Firewall f. Patch management g. Disaster recovery h. Preventive maintenance Answer: c 2) Which of the following is not an example of a WAN service? a.…

HCS-429 Week 3 Individual Assignment Learning Objectives and Summary Paper

HCS-429 Week 3 Individual Assignment Learning

CYB101 Week 1 DQ 2 (20 Questions)

See More

Learn the concepts and techniques that are necessary to build a network. Complete all lessons of the course by reviewing the material, then create a network.

The Network Integration: An Introduction to Information Security (NII)

Cybersecurity is one of the fastest-growing industries in America, with billions of dollars being invested into this area. Since cyber threats are growing rapidly, so is the need for security professionals. Cybersecurity jobs offer excellent salaries and job security, and many other benefits as well.

CYB101 Week 1 Quiz (20 Questions)


You are here: Home » BCOM503 | Quiz Questions

Question 1 of 5:

Quiz ID: #34587

Your network is set up to prevent unauthorized access to confidential information and critical system resources. You want to limit access by allowing only certain staff members into the lab so they can run lab exercises and data analysis work. You also want to restrict access by restricting users to a specific area in the lab. What are the recommended security controls for your organization?


CYB101 Week 1 MCQ’s (20 Multiple Choice Questions)

– Cengage Learning

As of Monday, January 8, 2018, 4:00 PM PST CYB101 Week 1 MCQ’s (20 Multiple Choice Questions) for CYB101 – Network Security Controls (CYB101) – Cengage Learning

CYB101 Week 2 Description

2.1 Introduction to Network Security and Classification of Network Threats (CYB101)The goal of network security is to prevent unauthorized access to or from a computer system. The term network security usually refers to the protection of data, networks, and devices that communicate with each other over a computer network. This includes protecting the data, networks, and devices by restricting unauthorized access and preventing malicious code from executing on them. The term also refers to securing the information in such a way that it can

CYB101 Week 2 Outline


Network Access Control (NAC) – CYB101 Course Outline for Week 2, 8/18/2016

Cybersecurity Ciphers and Cryptography; CYB101 Course Outline for Week 1, 8/11/2016

Introduction to Network Security; CYB101 Course Outline for Week 4, 7/28/2016

Cybersecurity: Internet Protocols and Network Topologies; CYB101 Course

CYB101 Week 2 Objectives

1) Explain why it is important for computer systems to be secure from unauthorized access. 2) Evaluate the effectiveness of organizational security controls. 3) Describe the two main classes of network security controls (Physical, Logical, and Administrative). 4) List the four types of network security risks. 5) List the three common examples of user identification and authentication in a network environment. 6) Identify how the OSI reference model can be used to describe different layers of network security design.

CYB101 Week 2 Pre-requisites

Course Contents CYB101 Network Security Controls (CYB101) CYB101 Final Exam

Pre-requisites for CYB101 – Network Security Controls (CYB101)

• No prerequisite courses are required to enroll in this course. If you do not meet the pre-requisites for the course, please contact us for further instructions.

Course Objectives

This course is designed to enable the student to design and implement a network security policy and access control framework. Students will gain an understanding of how to

CYB101 Week 2 Duration

3 out of 5 Course Categories Instructors: Judith A. Bryson, Karen S. Parker, Sandra B. Kozar Date Created: Jun 27, 2012 Last Updated: Jun 27, 2012

Course Description Examines security controls used to manage threats and prevent access to the system and network by unauthorized users or malicious code.

Course Objectives Describe specific security controls that are used in today’s environments

Identify the different types of security controls and apply them

CYB101 Week 2 Learning Outcomes

Study Guide

Question: 1. Which of the following is an example of a common application that uses network security controls?

A. Firewall

B. Intrusion detection system (IDS)

C. Host-based intrusion prevention system (HIPS)

D. Anti-virus software

Answer: B Explanation/Reference:

Security is the protection of computer systems, networks and data from unwanted access or damage by malicious attackers, also known as “hackers”. Access to a computer system is often denied by a

CYB101 Week 2 Assessment & Grading

– 1. What are the three major components of a network security control? 2. What is the difference between a network access control list (NACL) and an access control list (ACL)? 3. Name at least two types of wireless LANs. Which one is most secure? Why? 4. Define SSL. 5. Explain SSL and when it should be used. 6. Explain how to implement SSL on a Web server? [Total: 15]

CYB101 Week 2 Suggested Resources/Books


You need to write a 700- to 1,050-word paper in which you address the following:

Discuss how network security controls are essential to protecting an organization’s sensitive data from unauthorized access or use.

Identify at least two cyber security controls that would be implemented by an organization to protect data.

What is the cost of not having these controls in place? What is the cost of implementing these controls? How much money would be saved if it were possible for organizations not to have

CYB101 Week 2 Assignment (20 Questions)

Course 100% Working and Guaranteed Success in Your Exams. Enter your email address below to receive the detailed course information, including course title, instructor, date(s), time, location and prerequisites. If you have any other questions or need further assistance contact us at We are here to help you!

1. What is a standard Cisco IOS software configuration command?

(Choose all that apply)

a) ‘enable’


CYB101 Week 2 Assignment Question (20 Questions)

for University of Phoenix. Study flashcards and notes from students.

ANSWER: MAC addresses are made up of four 8-bit values separated by periods, each representing the 32 bits of the MAC address. The first 3 bits represent the network ID, or host ID. This field is followed by a 16-bit variable that contains data about the hardware of the computer being addressed (this is referred to as the MAC Address), and then a last 2-bit fixed value indicating the serial number

CYB101 Week 2 Discussion 1 (20 Questions)

at Paper Masters. CYB101, Network Security Controls, Week 2 Discussion 1 (20 Questions) for CYB101 – Network Security Controls (CYB101) – Program Description The world has gone cyber. New viruses and malware are constantly being written and released to take over systems and devices. In this course, students will learn the steps necessary to properly secure network infrastructure from malicious attacks with the help of a Firewall, Intrusion Detection System (IDS), URL Filtering Application, Intrusion Prevention

CYB101 Week 2 DQ 1 (20 Questions)

| Online Test Prep for College Students

PHYSICS 101 Week 2 DQ 1 (20 Questions)

Only at Student Tutors

Evaluate the validity of a given control in relation to its likelihood of preventing identified risks in the chosen application.

Write a response that addresses the following:

1. Identify two specific risk concerns for your chosen application. Discuss how you could mitigate these risk concerns by implementing a specific control.

2. Describe an instance where a security

CYB101 Week 2 Discussion 2 (20 Questions)

from 3000+ online college courses from schools like Stanford and Yale – No GMAT or GRE admission test required and no application fee. I personally think that we should give up on certification exams, but what do you think? Cymatics: Cymatics is a tool for experimenting with soundscapes. (5/9) “I found the big picture of everything in a much more effective way than reading every little point” – N. If he could make an ocean out of water

CYB101 Week 2 DQ 2 (20 Questions)

to turn in. DQ 2: Create a public cloud private key for your organization by using the Microsoft Azure Key Vault. I need to create a new cloud service with my own virtual network and I need to attach this virtual network to the Azure public cloud.

From there you can manage all of your certificates and key pairs. This will allow you to not only store your private keys, but also sign and encrypt files. You should have two things set up on your machine: A trusted root CA

CYB101 Week 2 Quiz (20 Questions)

at University of Phoenix.

1. The security group policy specified for a specific client computer is called the:

a. group policy

b. security policy

c. security group

d. security policy

CYB101 Week 2 MCQ’s (20 Multiple Choice Questions)

1. A company has adopted all of the following security controls EXCEPT: a. Authentication, authorization, and accounting b. Encryption c. Cryptography d. Network traffic filtering e. Physical protection 2. Which of the following is an Internet Protocol (IP) address? a.

Access Denied error message on FileZilla


CYB101 Week 3 Description

You are a network administrator for the U.S. Navy installation at Fort Meade, Maryland. A task force has been established to investigate possible cyber security violations at the installation. The task force is made up of experts from all branches of the military who have expertise in the use of computers, communications and networking devices such as computers and telephones. Your company’s IT department is one of many that provide technical support to Fort Meade. You have been hired to investigate whether these technical issues have any impact

CYB101 Week 3 Outline

Week 3 Outline for CYB101 – Network Security Controls

1. Describe the differences b