Case Project 6-1
The OSI model is a useful tool in troubleshooting a network because it enables you to isolate a
problem to a particular software module or piece of hardware. In this project, after reading the
description of a problem, identify the OSI mo
You have been called in to consult on a new network design for CNT Books. The requirements of this
design are summarized as follows:
The building has three floors.
There are 300 user workstations and 10 servers.
Users must be grouped a
. m Lasan4:WIrel:ssNetw x D CengageBminiMy Hon- x/ D Untitied Page x \ _
(- C I G) labcpnnectlDn.net/Content_LC2.aspx
You answered El out of 6 correctly.
Your score is: 50%.
You did not answer the following exerciseis) correctiy:
. m Lasan 3:5truc1ured Cat x \ D Cengagebmin *My Hon- 3: / D UnWed Page x \
(- C I G) labcunnectlDn.net/Content_LC2.aspx
: Hume Elmsmremew Acmvatepmauct
SIarWi red Ri n5
Click Next to continue.
'm Lawn 3:
. w Lasanmwireigssweiw: x D Untilledlage x \ X
(- C I G) labconnection.net/Content_LC2.aspx i 2: E
Exercise Detai 5
You answered 4 out of 14 correctly.
Your score is: 28%.
You did not answer the following exercise(s) conectly:
Drag and drop the ch
u Lason3:51!udured Cal: x \ D Cengagellmin rMy Hum x f D Untitied Page x '. X
(- C G) labcunnectlunnet/ContenLLClaspx
Ynu answered 3 out of 11 correctiv.
Data Transformation W 27%.
Van did not answer the follnwing exercisets) cor
m L530n3:5tructuredCat x D CengagelminrMyHol-r x D Unwed Page x \. _ X
(- C I G) labcunneclIDn.net/Content_LC2.aspx )k
Instructions (3 Administrator: Command Plump!
Write down the 1W4 address, subnet
mask and default gateway. Enter the
. m Lasanthakss Netw'. x \ D Cengagebmin *My Hon 3: / D Unwed Page x \
(- C I G) labconnectlon.net/Content_LC2.aspx l A: 5
You answered 2 out of 5 correctly.
Your score is: 40%.
You did not answer the following exercise(s) correctly:
D Unwed Fag:
6 C G) Iabconneamnnel/Cu menuczaspx
m. answered 15 an ar 21 mrrmy.
mm are rs. 75%.
m. an m swerve renown; exemsem mrreeuy:
mm re (in (ma \a'merazmmlm Furs mumrk cramming mar) hm mayma 31927 Emrywrarswer -
Chapfzr 1, P395
From this book, you have learned a little about the different file systems in Windows and Linux. To get
a better handle on the differences between them, write a short memo describing three properties of
each of these file systems: FAT16, F
You have created shared folders for all your companies departments and assigned the
appropriate permissions. Everyone can access the shares as planned, but now you find that an
extraordinary amount of disk space is being used on the server
As the network administrator for a growing ISP, you want to make efficient use of your network
addresses. One of the network addresses IANA assigned to you is a Class C network of 126.96.36.199. You
have decided to use the addresses in this
Case Project 10-3
Search for security policy templates on the Internet. A good place to start is the SANS Institute
(www.sans.org). Using one or more of the templates you find, develop a security policy for your school
or a business, and present
. m Lasanthakss Netw: x \ D Cengagebmin 7M)! Hon 3: / D Unlllled Page x \
(- C I G) labcunnectlun.net/Content_LC2.aspx *1 l
You answered 3 out of 9 correctly.
Your score is: 33%.
Yuu did nut answer the fulluwing exercise(s) correctly
. w LawnmwirekssNetw x D CengageBminilogmor x D Unmied Page x \. _ X
(- C I (D labconneclIon.net/Content_LC2.aspx 1 5
Now. use the netstat switch that ,
showsiist dfhoststhat are Proto Loca'l Addre S Fore1gn Addr St
What are the key features
Virtual Protection Groups
Broad on premise D and storage
Fast access to your data
End user access
Case Project 11-1
1. IP VPN allows remote worker to securely connect to a corporate network.
2. L2 MPLS WAN does not allow for QoS specifications.
3. IP VPAN can tunnel frame relay, ATM, and Ethernet traffic allowing the company to have a
Kali Linux was created by Mati Aharoni and Devon Kearns of Offensive Security also the creators
of BackTrack 5 which was the predecesor to Kali Linux. Digital forensics and penetration testing.
It can be launched from both CD or flash drive You
Applying Concepts Scenario: Snail-Speed Wi-Fi
The most probable reason the connection is so slow is because the APs are all programmed to use the
same channel. They should be programmed for different channels.
Lesson 3 case project
Applying Concepts Scenario: Stingy IP Camera
Looking at the issues given in the scenario, this likely indicates the cameras default gateway is
misconfigured or unreachable and should be corrected. Many frustra
PART 1: Case Project 11-1: Select a WAN Solution for Business Use
1. IP VPNs
2. Private Lines
3. L2 MPLS
4. Private Lines
6. Three Lines
7. Metro Ethernet
a. How large can a WAN network be built?
Carries information you
need on a small drive
Can fit in your pocket
Can plug them into just
about any computer
Doesnt hold much
Can be damaged in your
Project 1-3: Research Network Operating Systems
March 22, 2017
Fedora v. Windows 2008
For a thriving business like Scoops, there is definitely a need for an easy-to-use and reliable
operating system. Fedora and Windows 2008, are bo
1. Mati Aharoni created Kali Linux and its previous Linux distribution based on Knoppix was
2. It was made as a tool set for finding vulnerabilities in network systems. The only exception is that
. m Lasan a: Structured Cat x D CengageBmineMy Hon- x/ D Untitled Page x \ _ X
(- C I G) labconnection.net/Conteht_LC2.aspx
You answered 0 out ofs correCtly.
Your score is: 0%.
You did not answer the Following exercis
. m LamnthmkssNetw x D Unwed Fage x \_ _ X
(- C I G) labcpnnectlon.net/Content_LC2.aspx
You did not answer the FoHowing exercise) correctv:
Drag and drop the check mark. Identifv the STP cake.
Chapter 5, page 224
Drag and drop
Some of the reasons to choose External HDD (Hard Disk Drive) as a back up for home
networks are low cost per unit of storage, easy to use, and good life span with out data degradation.
However some drawbacks are they are prone to overheating, and malfunct