Tutor profile: Jesse L.
Subject: Information Technology
What is a Honey Pot and how can it assists an administrator?
A Honey pot is a computer setup outside of an enclave which is known vulnerabilities on it. The Honey pot is then used to attack attackers to record their information and reported back to administrators. Honey pots are great tools to allow the administrators information on how to secure their networks from attackers.
Subject: Computer Science (General)
When a computer looses its trust with the domain controller, what is one way it could reestablish trust with the domain?
Remove the machine from the domain (requiring local administrator credentials). Then rejoin the machine to the domain generating a new trust.
Subject: Computer Networking
When designing at network for a company there are 2 basic features which pertain to security that can be implemented easily at layer 2 and 3 of the OSI model. What are two security features in networking could be used in the development of a network design?
1. Vlan's: Vlan's allow for network segregation by keeping machines/devices on separate subnets. This feature is commonly used to separate departments such as finance from other departments. 2. ACLs: Access Control Lists keep certain machines from communicating from one another. These ACLs can be extremely specific to ports or they can be very broad to restricting all traffic from certain subnets.
needs and Jesse will reply soon.