0% found this document useful (0 votes)
60 views

Project

This document provides instructions for an assignment to gather publicly available information about the computer systems used by Park University without engaging in unauthorized access. Students are directed to search Park's website and related partners' websites, as well as use search engines and public databases, to find 10 items of information about Park's information infrastructure. They are to summarize the information found, cite the URLs, explain how each item was found, and discuss whether it should be publicly available. Finally, students must write a brief summary evaluating how well Park protects information about its systems based on the evidence found.

Uploaded by

Anas Toufeeq
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
60 views

Project

This document provides instructions for an assignment to gather publicly available information about the computer systems used by Park University without engaging in unauthorized access. Students are directed to search Park's website and related partners' websites, as well as use search engines and public databases, to find 10 items of information about Park's information infrastructure. They are to summarize the information found, cite the URLs, explain how each item was found, and discuss whether it should be publicly available. Finally, students must write a brief summary evaluating how well Park protects information about its systems based on the evidence found.

Uploaded by

Anas Toufeeq
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Unit 4: Project 1a

Your task is to gather publicly available information about the computer systems used by Park University.
Hardware, software, operating systems, applications, network topology, and personnel are all part of this
exercise. In short, you are looking for any information that would be of use to an attacker.

You may search Park’s web site and web sites of related partners.

You may use a search engine, like Google or Yahoo.

You may use Internet information stored in various public databases.

You may NOT do any port scanning.

You may NOT use information that is only contained in My Park, since that is not publicly available.

(40 points) Find 10 different items about Park’s information infrastructure

(1 points) Summarize which information you found.

(1 point) Cite the URL for this information.

(1 point) Show what search terms you used or how you found this information.

(1 point) Explain whether this item should or should not be publicly available.

(3 points) Write a brief summary of how well you think Park protects information about its systems. Be
sure to provide evidence to back up your opinions.
Cloud+ Certification Chapters 5 and 6 Labs

[WLOs: 1, 2, 3] [CLOs: 2, 4, 6]

Prior to beginning work on this assignment, review Chapters 5 and 6 from the CompTIA Cloud+
Certification: CVO-002 course textbook. Additionally, read the instructions provided on the IMPORTANT:
Read First page to complete this assignment. This assignment is split into two parts.

Part 1

In Microsoft Azure, complete the following labs for Chapters 5 and 6:

Chapter 5 – Exercise: Configuring Azure Backups

Chapter 6 – Exercise: Investigating Disk Redundancy in Azure

Chapter 6 – Exercise: Configuring Availability sets in Azure

For each step of each lab, use a screen capture tool of your choice. Please view Use Snipping Tool to
Capture Screenshots Links to an external site., How to Take a Screenshot on your Mac Links to an
external site., or 9 Ways to Take a Screenshot on a Windows PC, Laptop, or Tablet, Using Built-In Tools
Links to an external site.for assistance. Document the progress and completion of the labs in a Word
document. All screenshots should be placed into one Word document with the steps labeled. Be sure to
use headers to identify each lab for this assignment.

You might also like