Mile2 Cybersecurity Certifications

Isabelle Tubbs

Forum Replies Created

Viewing 15 posts - 76 through 90 (of 93 total)
  • Author
    Posts
  • in reply to: OCU C)OST C Discussion Lesson 07 #105604
    Isabelle Tubbs
    Participant

    Hello, Cameron! I also wrote about Storage Virtualization, and it is true that it took some time to find a con to using it. However, if a business is not willing to pay the initial cost of virtualization, then they need to decide whether or not to use it ahead of time. Although I think this would really not be an issue with large companies. Also, nice work with Desktop Virtualization. Using a third party can complicate things a bit, but your example of using it with gaming is great.

    in reply to: OCU C)OST C Discussion Lesson 07 #105603
    Isabelle Tubbs
    Participant

    Virtualization contains many different aspects. Each of which have some advantages and disadvantages. Two virtualization components are storage virtualization and data virtualization.

    Storage virtualization involves taking the amount of storage on the system to be assigned to the virtual machines, which makes the storage efficiency even greater and assures that storages changes to one VM do not affect the other VMs (GeeksforGeeks, 2025; Naik, 2024). For a company or organization, taking advantage of the amount of available storage is beneficial. However, this does make management of the virtual machines more complex, and using virtualization would be costly at first (GeeksforGeeks, 2024; GeeksforGeeks, 2025). This must be taken into account before opting to use virtual machines.

    Data virtualization is taking the combined data and creating a virtual data layer that shows the data all in one place (GeeksforGeeks, 2025; Naik, 2024). Having centralized control from virtualization gives IT professionals more convenience and saves their time. However, a risk with data virtualization is that using a third party’s platform could make the data open to attacks (GeeksforGeeks, 2025; GeeksforGeeks, 2024). As a result, security measures (as with any device or group of devices) must be put in place.

    References
    GeeksforGeeks. (2024, June 11). Pros and Cons of Virtualization in Cloud Computing. http://www.geeksforgeeks.org/pros-and-cons-of-virtualization-in-cloud-computing/
    GeeksforGeeks. (2025, April 10). Virtualization in Cloud Computing and Types. http://www.geeksforgeeks.org/virtualization-cloud-computing-types/#types-of-virtualization
    Naik, R. (2024, December 11). Understanding the Types of Virtualization in Cloud Computing. Crest Infosystems. http://www.crestinfosystems.com/types-of-virtualization/

    in reply to: OCU C)OST C Discussion Lesson 06 #105590
    Isabelle Tubbs
    Participant

    Hello, James! Those are two great options for troubleshooting. Command lines are helpful tools, especially with testing network connections. Task Manager helps to essentially get real-time information with how the CPU and memory are being used. Getting information from this gives a good starting place for what actions to take next.

    in reply to: OCU C)OST C Discussion Lesson 06 #105589
    Isabelle Tubbs
    Participant

    This week, we learned about the command line tools and options for testing a network connection. If there is an issue with a network connection, using these tools to troubleshoot the problem is important. For Windows, using ipconfig can provide information about the IP settings configured on the device. If the NetBIOS information is what is required, using nbtstat would be appropriate. Also, doing a ping, tracert, or pathping would be good tests to see what a device is currently able to connect to, like the server and other devices on the network.

    If the issue is not necessarily related to a network connection, there are other troubleshooting options. The Windows Recovery Environment is a troubleshooting tool that allows the Windows device to look for and resolve any problems, particularly with startup issues. This is helpful for IT professionals because it gives them information for how to solve the issue. Another option is to boot to the Windows Pre-Installation Environment, which allows access to files and helps resolve issues as well.

    in reply to: OCU C)OST C Devotion 03 #105588
    Isabelle Tubbs
    Participant

    The centurion’s faith in this passage is amazing, because even though he was not of the Jewish community, he trusted in Jesus, in His power, and in His authority. The centurion understood how authority worked because of his own experience and believed that Jesus had the heavenly authority to heal his servant.
    The centurion was humble enough to ask Jesus for help, even though the Romans were the ones occupying the Hebrew land at the time. He was so humble that he felt he did not deserve to have Jesus come to his home.
    Also, the centurion was kind enough to want his servant to get better and be healed. It is amazing that both Jesus and the centurion cared about a servant, who was considered as a lower status during that time period.
    Later, Jesus tells him to go home because his servant is healed. When the centurion goes back, he finds out that the servant was healed at the time when Jesus told him. Jesus does have the heavenly authority, and because the centurion believed, he and his servant were blessed.

    in reply to: OCU C)OST C Devotion 02 #104714
    Isabelle Tubbs
    Participant

    Also, I just wanted to share Matthew 7:1-2 (NIV) because I think it is key to this week’s discussion as well: “‘Do not judge, or you too will be judged. For in the same way as you judge others, you will be judged, and with the measure you use, it will be measured to you.” If we want to help someone improve and grow, we must correct them with God’s love in our hearts because we would want people to lovingly correct us as well.

    in reply to: OCU C)OST C Discussion Lesson 05 #104712
    Isabelle Tubbs
    Participant

    Hello, Carlos! Nice work on your explanation of AES, RSA, and ECC. Elliptic Curve Cryptography was a type of encryption I did not encounter before this discussion, so it was interesting to learn about it from your post. It makes sense for smaller devices to have a specific type of encryption for data, especially with the widespread use of mobile devices today.

    in reply to: OCU C)OST C Discussion Lesson 05 #104711
    Isabelle Tubbs
    Participant

    Encryptions are vital for securing data because they scramble that data using an encryption algorithm, which often involves the use of a pre-shared key (PSK) to secure, unlock, and unscramble the information. Three types of encryptions include RSA, 3DES, and AES. RSA (Rivest-Shamir-Adleman) encryption uses cryptography algorithms with two keys and are great to use with VPNs and services with email and communication (Human, 2023). Its purpose is based more on the type of information that needs to be secured rather than the type of organization. 3DES (Triple Data Encryption Standard) encryption, which can use two keys or three keys, uses a process of encrypting, decrypting, and encrypting again; it is often used for financial companies (Human, 2023). Finally, AES (Advanced Encryption Standard) encryption uses a block cipher that is symmetric and should mainly be used for classified data, like data from large organizations or the government (Human, 2023).

    References
    Human, H. (2023, February 2). Types of Encryption [Explanations, Examples, Significance] https://review42.com/resources/types-of-encryption/

    in reply to: OCU C)OST C Discussion Lesson 04 #104705
    Isabelle Tubbs
    Participant

    Hello, James! This is a great, concise explanation of how TCP and IP work together as TCP/IP. I also found it quite interesting to learn the differences between the two. Thanks for sharing the reference you used; it does tie in with what we have learned, like UDP, FTP, POP, etc. UDP is an alternative to TCP/IP, but it is not as reliable. Is there a situation that you think would warrant using UDP over TCP/IP?

    in reply to: OCU C)OST C Discussion Lesson 04 #104704
    Isabelle Tubbs
    Participant

    TCP/IP contains the protocols from Transmission Control Protocol and Internet Protocol. When exchanging data on a network, there needs to be specified rules concerning how it should be transported, where it is going, and what should happen when a failed data transfer occurs (Yasar, n.d.). Thus, the TCP/IP gives control over these processes to aid in data transmissions and network connections.
    Because we are focusing on TCP and IP in this discussion, I was curious about what the difference between the two are. Although they are grouped together for functionality, there are a few differences. TCP uses a higher-level protocol to run checks to make sure that the connection is working, that the data are transferred in the right order, and that ultimately the data are delivered (Yasar, n.d.). IP delivers the data and makes sure it goes to the right place, but it does not run checks like TCP does (Yasar, n.d.).
    References
    Yasar, K. (n.d.). What is TCP/IP? Informa TechTarget. Retrieved April 19, 2025 from https://www.techtarget.com/searchnetworking/definition/TCP-IP

    in reply to: OCU C)OST C Devotion 02 #104680
    Isabelle Tubbs
    Participant

    I would not say that I am always patient nor always judgmental toward people. With God’s help, I try to be gracious to people, especially because God has been so gracious to me, but even just recently I judged someone who I did not know until God pointed out that I really had no idea about the situation and honestly there was not much evidence even later to say that my thought was correct. In moments like that, the only thing to do is repent, reset, and ask God for help in not being so quick to judge.

    in reply to: OCU C)OST C Discussion Lesson 03 #104679
    Isabelle Tubbs
    Participant

    Hello, Misty! In your post, there was a network that you mentioned that I did not talk about in my post, which was the Content Delivery Network (CDN). It was great to read about it, and I can see how this would be another great option for network systems. Overall, this was a great overview of the different types of networks.

    in reply to: OCU C)OST C Discussion Lesson 03 #104673
    Isabelle Tubbs
    Participant

    There are several different categories of networks which have different purposes. A personal area network (PAN) spans a small space, ranging from a few inches or centimeters to a few yards or meters. A local area network (LAN) connects computers in a specified area. This could be used for universities, office buildings, etc. One similar category is the campus area network (CAN), which connects the campus buildings of, for example, a school or university so that all the devices on the campus are connected to the network. To reach an even greater distance, a wide area network (WAN) can go across several cities or even different countries using nodes. A metropolitan area network (MAN) is a type of network that spans across a city or at least part of a city. Finally, a storage area network (SAN) connects storage devices by using network technology. Thus, choosing a network depends on the size of the area that needs the network connection.

    in reply to: OCU C)OST C Discussion Lesson 02 #104664
    Isabelle Tubbs
    Participant

    Hello, Carlos! I like how you organized the benefits of command lines. It makes sense how command lines are efficient tools, but sometimes it can be hard to word the exact reasons. Although graphical user interfaces can sometimes be easier, the advanced tasks and smaller use of system resources do show the advantages of command line interfaces over graphical user interfaces. Is there a command that you think is used most often or that you use the most?

    in reply to: OCU C)OST C Discussion Lesson 02 #104663
    Isabelle Tubbs
    Participant

    Command lines allow IT professionals an efficient way to interact with the computer and give it commands by just entering a few lines of text. Some notable functions of command lines include showing information, editing information, and testing connections. To show a list of a computer’s directories, Linux uses the ls command. With commands like these, those in the IT field can gain the information they need. In fact, using the help command in Windows can even help someone to know the commands they are able to use. If someone wants to delete a file or directory in Linux, they must enter rm. This exemplifies the ability to edit information using command lines. Finally, to test a connection in Command Prompt/Windows Powershell, the ping command must be used. Testing a connection is extremely important for deciding what to do based on the results. Thus, command lines are vital tools for managing a computer and computer network.

Viewing 15 posts - 76 through 90 (of 93 total)

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .

Privacy Overview
Mile2 Cybersecurity Certifications

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.