Explain what you hoped to learn from completing the lab

Assignment Help Computer Engineering
Reference no: EM133655182

Discussion Post: Reflection on Labs

For this discussion post, you will need to review the performance lab reports you completed.

Respond to the following in a post of 150 to 200 words:

For the lab from which you learned the most:

1. Describe the single most important lesson you learned from completing this lab.
2. Explain how you will apply this lesson in your current position or one you hope to obtain.

For the lab from which you learned the least:

1. Explain what you hoped to learn from completing this lab but didn't learn.
2. Recommend how this lab could be modified or what it could be replaced with to better meet your needs.

Lab:

Using OpenSSL to Create a Public/Private Key Pair

In this lab, you will use OpenSSL to create a public/private key pair. OpenSSL is used for secure communication over the network. It works on the exchange of public keys and authentication by a private key.

Completion of 7.4.2 demonstrated the use of "openSSL" to make a "private key and public key pair." Several instructions in the terminal program are executed as a result of this. Once the instructions are executed, OpenSSL will encrypt the system traffic and "exchange private and public keys."

 

Reference no: EM133655182

Questions Cloud

Describe security and risks associated with a health care : Describe security and risks associated with a health care IT application. What are security standards and risks of not upholding the standards?
What type of business systems processes exist : What type of business system's Processes exist? How important is it to define the Process Specifications in systems analysis and design?
Crime prevention principles : Crime Prevention Principles.The back wall of a building in an office center is repeatedly tagged with graffiti.
Reporting centers differ in type of offenders they serve : While day reporting centers differ in the type of offenders they serve, they all have three common threads
Explain what you hoped to learn from completing the lab : Explain what you hoped to learn from completing this lab but didn't learn. How this lab could be modified or what it be replaced with to better meet your needs.
Implement your planned experience with people you know : Implement your planned experience with people you know, or children you care for. For instance, you could gather your family together, and implement the planned
Describe how the best practice could be implemented : Describe how the best practice could be implemented. How you will determine best practice has resulted in improvement or has inversely affected collaboration.
What is an ip address of the google server : Test your connectivity to google. What is an IP address of the google server? How many hops (routing devices) separate your computer and the google server?
Quality of life policy : Describe the problem and provide evidence of Mayor Rudy Giuliani's "quality of life" policy. What are the causes of the problem?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Decide how your organization should house its backups

Your Organization has approximately 10 TB of data, and you need to decide if your organization should have on-site or off-site tape storage.

  Which of the algorithms results in the minimum average

What is the turnaround time of each process for each of the scheduling algorithms in part a? Which of the algorithms results in the minimum average waiting time

  You have been asked to make a program designed to keep

given the following program descriptionprogram description - you have been asked to create a program designed to keep

  How are secure software update, management

CSC 120 Hampton University How are secure software update, management of trusted applications, and attestation used to automate security assurance verification

  Flowcharts and pseudo-code are two language-independent

flowcharts and pseudo-code are two language-independent ways to capture the programming steps needed to solve a

  Major business it applications supply chain management

Of the three major business IT applications supply chain management, customer relationship management, and social media

  How big data analytics is used in the situations

This week's reading centered around how Big Data analytics can be used with Smart Cities. This is exciting and can provide many benefits to individuals.

  Constructing and Evading network traffic based model of IDS

Project - ML for Security. Constructing & Evading network traffic based model of IDS. Create a model that learns normal network traffic

  Describe how the given new forms meet usability standards

Describe how these new forms meet usability standards. Include Speaker Notes in the PowerPoint presentation. Format your PowerPoint speaker notes according.

  Describe population chosen and how participant are contacted

What interview questions will be asked. Describe the population chosen and how participants are contacted. Describe how sampling is performed.

  What is your favorite protocol

What is your favorite protocol? What port does it use? Does it use TCP or UDP? Are there any sibling/parent protocols for it? Please give a detailed explanation

  Evaluate the influence of the internet on businesses

Choose a topic from this week's course materials, and summarize what you learned about the topic. Provide citation and reference to the material(s) you discuss.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd