Log in as administrator.
Click the Start button, right-click Computer, and select Manage
In Server manager, Expand Configuration and Expand Local Users and Groups.
Right-click Users and select New Users.
Type the User
IP Classes Worksheet
Fill in the worksheet and submit online. You should identify the class of address and whether it is private
Module 12 Assignment
Here are some effective ways on how you can secure your home wireless network. You can
ensure that all updates and patches are applied to the devices connected to the network. Gaining
control of one device on the network, gives an att
Scenario 4-1: Using Windows Firewall
Click the Start button
Then open the Control Panel
Click System and Security
Then followed by Windows Firewall
Click the Turn Windows F
Scenario 1-1 (Designing a Physical
Im a security manager for a medium-sized bank and I was asked to design a security solution to
keep intruders out of the bank after hours. The tree most important areas are the parking lot,
Biometric solutions cost lots of money and it will have to be installed and placed on all
doors that you want to protect. Also youll need to set up each user that use biometrics and youll
have to set up a workstation and an administ
Subnetting 7 Steps to Subnetting
1. How many subnets or hosts are needed or created?
Amount is given or calculated using the formula 2n 2 = x.
Write down the formula 2n 2 = x.
Replace the known values.
o n = the number of bits borrowed (subnet bits) or th
'l - - ‘ -
File E t View Go tuiel Analyze Statistics Telephony Help
0 ® I. x
l ' App/ya msptay ﬁfty. <(m‘-/> -
No. A Time Source Destination Protocol Length Into
4 2.9659859. 192.168.1- 255.255.2- DEeLSPiDl- 491 Dropbox LAM sync Discovery Protocol
DﬁprtpiipswitcrLcom T B“ C I is." Astmmenda PI * I E ‘- ‘ﬂ
ings D Praxi Most Visited Eh Jennifer Personal D JenniferSchool
Index of ftp:/ftp.ipswitch.com/
£15 Up to higher level directory
Name Size Last Modiﬁed
J, aspneLclient 6f8f2010 12.00100 AM
‘Capturing from Local Ariea' Connect
File Edit View Go Capture Analyze Stati i6 Telephony Help
Apply a dismay ﬁller (Err/1b
No. Time Souice Destination Protocol Length Info
F 10.000000000 192.168.1.107 255.255.255.255 DBaLSPeDISC 401Der
Scenario 1-4 (Examining Social Engineering)
A repair person that shows up to fix your telephone lines. The repair
person then asks for access to your wiring closet.
A person who poses as an auditor from the corporate office asks to set
up in a conference