Title: CIS 341 Innovative Education--snaptutorial.com
1CIS 341 Innovative Education--snaptutorial.com
2CIS 341 Innovative Education--snaptutorial.com
CIS 341 Quiz 1 For more classes
visit www.snaptutorial.com
Question 1 Which attack is
prevented by using IPSec in AH mode?
Question 2 Why is the default
implementation of ISS 6.0 more stable than
previous versions? Question 3
Which authentication option for IPSec
is most appropriate when computers are not in the
same Active Directory forest?
3CIS 341 Innovative Education--snaptutorial.com
CIS 341 Week 3 Case Study 1 Bring Your Own
Device (BYOD) For more classes
visit www.snaptutorial.com Case Study 1 Bring
Your Own Device (BYOD) Due Week 3 and worth 60
points Read the following articles located in the
course shell The dark side of BYOD from
TechRepublic and BYOD As We Know It Is Dead
from Forbes. Write a two to three (2-3) page
paper in which you Identify the primary benefits
of BYOD in organizations, and determine the key
ways in which its concepts can enhance an end
users overall working experience.
4CIS 341 Innovative Education--snaptutorial.com
CIS 341 Week 4 Assignment 1 Identifying
Potential Malicious Attacks, Threats, and
Vulnerabilities For more classes
visit www.snaptutorial.com Assignment 1
Identifying Potential Malicious Attacks, Threats,
and Vulnerabilities Due Week 4 and worth 75
points You have just been hired as an Information
Security Engineer for a videogame development
company. The organization network structure is
identified in the below network diagram and
specifically contains 1) 2 Firewalls 5) 2
Windows Server 2012 Active Directory Domain
Controllers (DC)
5CIS 341 Innovative Education--snaptutorial.com
CIS 341 Week 6 Case Study 2 Public Key
Infrastructure For more classes
visit www.snaptutorial.com Case Study 2 Public
Key Infrastructure Due Week 6 and worth 60
points Suppose you are the Information Security
Director at a small software company. The
organization currently utilizes a Microsoft
Server 2012 Active Directory domain administered
by your information security team. Mostly
software developers and a relatively small number
of administrative personnel comprise the
remainder of the organization. You have convinced
business unit leaders that it would be in the
best interest of the company to use a public key
infrastructure (PKI) in order to provide a
framework that fosters confidentiality,
integrity, authentication, and nonrepudiation.
6CIS 341 Innovative Education--snaptutorial.com
CIS 341 Week 8 Assignment 2 Identifying
Potential Risk, Response, and Recovery For more
classes visit www.snaptutorial.com Assignment
2 Identifying Potential Risk, Response, and
Recovery Due Week 8 and worth 75 points In
Assignment 1, a videogame development company
recently hired you as an Information Security
Engineer. After viewing a growing number of
reports detailing malicious activity, the CIO
requested that you draft a report in which you
identify potential malicious attacks and threats
specific to your organization. She asked you to
include a brief explanation of each item and the
potential impact it could have on the
organization.
7CIS 341 Innovative Education--snaptutorial.com
CIS 341 Week 10 Technical Project Paper
Information Systems Security For more classes
visit www.snaptutorial.com Technical Project
Paper Information Systems Security Due Week 10
and worth 150 points Suppose you are the IT
professional in charge of security for a small
pharmacy that has recently opened within a
shopping mall. The daily operation of a pharmacy
is a unique business that requires a combination
of both physical and logical access controls
geared toward protecting medication and funds
located on the premises, as well as the
customers personally identifiable information
and protected health information that resides on
your system.
8CIS 341 Innovative Education--snaptutorial.com
CIS 341 Week 10 Technical Project Paper
Information Systems Security For more classes
visit www.snaptutorial.com Technical Project
Paper Information Systems Security Due Week 10
and worth 150 points Suppose you are the IT
professional in charge of security for a small
pharmacy that has recently opened within a
shopping mall. The daily operation of a pharmacy
is a unique business that requires a combination
of both physical and logical access controls
geared toward protecting medication and funds
located on the premises, as well as the
customers personally identifiable information
and protected health information that resides on
your system.
9CIS 341 Innovative Education--snaptutorial.com