Mile2 Cybersecurity Certifications

ATTENTION: Due to the approaching Hurricane Milton storm in the Tampa-Florida-USA area, the Mile2 main office will be closed
and some services will not be available until further notice. Please plan accordingly.

Cybersecurity Certifications

OCU C)NP A Week 02 Lesson 03 Discussion

Viewing 5 reply threads
  • Author
    Posts
    • #66109
      Jessica Jagerson
      Keymaster

      Provide at least three core protocols and their purpose.

    • #89776
      Amy Hastings
      Participant

      A core product is something that is the company brands operating system. Some examples of a core product is Microsoft Windows as windows is the core product of Microsoft. It is one of the most used operating systems, it is also used in a ton of different places including schools and offices and is available for people all over the world to browse the internet. Google search is another core product as it is Googles core product, it is used by billions and is the most popular internet search or browser. Lastly, Apple IOS is Apples Core Product used on I-phones, I-pads and it also has a wide variety of apps for anyone to use.

      • #89837
        Ashly Jackson
        Participant

        You have wonderfully written about protocols and purposes. In most cases, communication across a network like the Internet uses the OSI model. The OSI model has seven layers. Secured connections, network management, and network communication are the main networks. In networking, a protocol is a set of rules for formatting and processing data. Network protocols are like a common language for computers.

    • #89831
      Kanthony
      Participant

      Hi everyone! I hope Week 1 went well for each of you. Please always email me if you have any questions.

      This week, you need to read chapters 3 and 4 and watch the videos. Be sure to complete the week 2 devotional and discussion questions. **You don’t have to upload a word document for the devotions or the discussions.**

      Finally, be sure to complete the chapters 3 and 4 exams.

      Below is a great devotion from Billy Graham’s Daily Devotions. Have a great week! ~Dr. Anthony

      He who hath begun a good work in you will perform it until the day of Jesus Christ.
      —Philippians 1:6
      Being a Christian is more than just an instantaneous conversion. It is a daily process whereby you grow to be more and more like Christ. When you start out, you start out as a baby. You must be fed on the simple things of the Bible, and you learn to walk in your Christian life gradually. At first you will fall down and make many mistakes, but you are to continue growing. However, there are many people who have stopped growing. They remain spiritual babes all their lives. I am afraid that this experience is all too common today. Perhaps it is yours.

      Do you remember the day when you gave your heart and life to Christ? You were sure of victory. How easy it seemed to be more than conqueror through Christ who loved you. Thousands of Christians have struggles with themselves. The great need in Christendom today is for Christians to learn the secret of daily victory over sin.

    • #89836
      Ashly Jackson
      Participant

      There are three main types of network protocols: These include network management protocols, network communication protocols, and network security protocols. Network Management Protocol Purpose Network Management Protocol (SNMP) is an Internet standard protocol for collecting and organizing information about managed devices on an IP network and for modifying this information to change the behavior of the devices. is. Devices that typically support SNMP include cable modems, routers, switches, servers, workstations, printers, and more. The purpose of a network communications protocol is to define a set of protocols (that is, rules and standards) that enable network communications or internetworking to enable application programs to communicate with each other, regardless of the hardware or operating system on which they run. is. Ultimately, network security protocols are the rules and procedures that govern the secure transmission of data over computer networks. These protocols ensure that hackers, viruses, and other unauthorized persons or systems cannot access other people’s personal data and information. Network security protocols are network protocols that ensure the integrity and security of data sent over network connections. The specific network security protocols used depend on the type of data being protected and the network connection. A good network security system can help your business reduce the risk of data theft and sabotage. Network security helps protect your workstation from harmful spyware. It also ensures that your shared data remains secure.

      • #89903
        jmontgomery2
        Participant

        Your knowledge of core protocols is quite impressive and your eloquence in describing their functions was great. The flow of your paragraph is well thought out as each topic relates to the other how the protocols need to handle information transfer but also must be secure against hackers.

    • #89881
      Aaron Elliott
      Participant

      Internet Control Message Protocol (ICMP) is a protocol that occurs on the fly during data transit. This protocol has features to ping the destination, notify of unreachable hosts, as well as handling congestion with too much data transmitting. The protocol can slow data traffic down so data can be delivered or find new routes to deliver data. Packets time to live notifications are also given for undelivered data.

      Transmission Control Protocol (TCP) is a protocol that is connection based. The protocol ensures delivery, and the receiver are correct through a series of handshakes. TCP is referred to as a more reliable protocol as data is monitored during transmission to make sure the data being delivered correct.

      User Datagram Protocol (UDP) Considered an unreliable communication protocol based on the fact there is no check to see if the data was received. This protocol is meant for faster data transmission like streaming or other heavy data loads.

      • #89884
        Amy Hastings
        Participant

        Excellent job on explaining the details in these different core products. The three that you chose are excellent as well and you put a great amount of information for each! The TCP product does ensure the delivery of information and I like that you added this.

    • #89894
      Joseph Doss
      Participant

      SSH (Secure Shell) – enables remote administration of a (enabled) computer or device over a network connection, SSH runs on port 22 and is encrypted. SSH is a more secure replacement of Telent, allows the same administration of devices but is not encrypted.

      HTTPS (HyperText Transfer Protocol Secure)- Is an encrypted version of HTTP (HyperText Transfer Protocol) both are used to send data over the internet such as webpages. HTTPS runs of port 443, While HTTP runs on port 80.

      SMB (Server Message Block) – Is a protocol used to share files on a local network, it runs on port 445 and port 139

      • #89901
        Aaron Elliott
        Participant

        With the boom of online shopping, thanks to HTTPS shoppers can easily see which website is more reliable and less likely to have their information stolen. SSH sounds like an important tool for any server administrator.

Viewing 5 reply threads
  • You must be logged in to reply to this topic.

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .