CIS 1130 Topic 7 Labs

docx

School

Sinclair Community College *

*We aren’t endorsed by this school

Course

1130

Subject

Computer Science

Date

Dec 6, 2023

Type

docx

Pages

4

Uploaded by EarlRockKingfisher16

Report
CIS 1130 – Topic 7 Homework Your Name: Date: 06.19.2022 Instructions : Answer the questions below in the space provided; be sure your answers are clearly written and grammatically correct with no spelling errors. Following these questions, paste the screen shots showing the requested element. Chap 9 – Network Naming Question 9.1 2 Points Question: In your own words explain what function DNS performs. Your Answer: To translate domain names into IP addresses, which browsers use to load internet pages. Question 9.2 1 Points Question: What is the purpose for the nslookup command? Your Answer: Lets an internet server administrator or any computer user ente a host name and find out the IP address or domain name system record. Updated 05/21
Question 9.3 2 Points Question: Perform a nslooup for microsoft.com paste either the text or a screen shot in the next cell. Your Answer: Updated 05/21
Chap 10 – Securing TCP/IP Question 10.1 2 Points Question: In your own words explain what Authentication and Authorization and explain why they are different. Your Answer: Authentication verifies who the user is, working through passwords, biometric information entered by user, Authentication is the first step of access the management process, is visible and changeable by users. Authorization determines what resources a user can access; Authorization works through setting that are implemented and maintained by organization. It takes place always after authentication. Is not visible or changeable by user. Question 10.2 1 Points Question: Open a web browser and go to my.sinclair.edu. Open the certificate information for my.sinclair.edu. What signature hash algorithm was used on this site? Your Answer: Sha256 Question 10.1 1 Points Question: How is nonrepudiation used on websites? Your Answer: Nonrepudiation is achieved through cryptography, like digital signatures, and includes other services for authentication, auditing, and logging. In online transactions, digital signatures ensure that a party cannot later deny sending information or deny the authenticity of its signature. Updated 05/21
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Wireshark Practice (Open wirshark_example_cis.pcapng file. Use this pcap file to answer the following question.) 1 point Question: In packet number 14 what domain name did the client request from the DNS server? The response to the request is Packet number 15 is you want more information. Your Answer: Dma1.org: type A, class IN, addr 208.97.177.128 Updated 05/21