IP Routing Table
N -> E IP ROUTE 192.168.10.32 255.255.255.224 10.1.1.4
N -> W IP ROUTE 192.168.10.64 255.255.255.224 10.1.1.3
N -> S IP ROUTE 192.168.10.96 255.255.255.224 10.1.1.2
N -> C IP ROUTE 192.168.10.128 255.255.255.224 10.1.1.5
E -> N IP ROUTE 1
2 February 2014
Unit 5 Exercise 1 Security
From: Systems Admin
My recommendations would be to install a firewall software on the server and and configure the
router to block malicious IPs, now for the virus and spyware threats on
January 30, 2014
From : Systems Administrator
To fix these problems we would use the windows group policy editor and
make it to where they are unable to change the
Second we can make the Team Lea
Subneting: is the process of stealing bits from the host and make
them part of my network.
Distribution Company with 4 departments 20 users/dept
Account, Sales, Purchasing and Marketing
Shop for Equipment
Hardware Servers nodes printer OSs
December 16, 2013
Service Provide Types
RBOCs refer to a regional bell operating company. In 1982 the U.S government filed a
suit against AT&T, which was considered a monopoly at the time. As a result AT&T
divested its loc
Questions for Midterm
What is a mainframe?
What is data communication?
What decades deregulations started?
Whats Prevising Computing?
What is telecommunication?
What is the porpoise of protocols?
What is the standard bodies that exist? ANCII IETF?
[Type the document subtitle]
Unit 3. Assignment 1.
The assignment for Unit 3 is requesting details about the following three
organizations and their involvement with the Internet public addresses. The first
organization is the American Registry for intern
DISK REDUNDANCY RESEARCH
1. What does RAID stands for?
Redundant array of independent disks (originally redundant array of inexpensive disks)
2. When would we use RAID?
When we want to have more read/write speed, performance
Similar in both the OSI and TCP/IP models
Specifies the physical characteristics of a network
Stacked below the data link player
Transmits an unformatted data bit stream
Has Four key components:
LAN Physical Components - Media
Servers generally control and manage
networked resources in a LAN
Depending on use key server elements include:
Primary memory or Ram
Processor; speed as well as number must
January 30, 2014
American Registry for internet Numbers, organization was more focused with the distribution
and management of internet resources such as IPv4 and IPv6 and it also provides services
related to coordinat
Dear Valerie Bernier
I have taken a look at your upgrade request on your workstations, and while your workstations
meet the minimum requirements for Windows 7 I cannot recommend an upgrade due to the
minimum enhancements that your workstations will get fr
April 12, 2014
DNS, or Domain Name Service, is usually considered worth creating by several
different reasons. If you tend to switch around machines, IP addresses, ISPs, or are
maintaining a bunch of web add
April 18, 2014
Unit 3 Assignment 1 Active Directory Design Scenario
Questions I would ask to design the active directory are?
1. How many sites does our business have? I need to know this to determine how many
intersite connections I
April 17, 2014
For Branch 1
1. We will set up a Help Desk that will handle all troubleshooting and replications.
2. I will add a redundant 56k POTS line for back up.
3. The replication will
Unit 6 Exercise 1
1. Triangulation is getting resources from 3 types of sources, this helps finding reliable
2. Primary Sources are actual records or artifacts and are considered more reliable,
secondary sources ar
April 25, 2014
There is an easy way to determine the roles that each DC holds; the easy
way would be using ntdsutil.
The dcdiag its more of a diagnostic tool to identify abnormal behavior in
Here are the
Unit 6 Problems
Remote Desktop: Based on the former Terminal Services
System image backup: Saves data to a VHD
BranchCache: Conserves WAN bandwidth
Distributed Cache Mode: Files cached on each client
Volume Shadow Copies: P
May 9, 2014
Unit 7. Assignment 1AD Password Policy Planning
A strong password would be on that is anywhere from 6 to 12 characters,
the characters should include upper case, lower case letters, numbers and
special characters. Also the
Unit 8, Exercise 1. AD OU Planning Scenario
How many sub departments will there be?
How many departments will there be?
How many OUs will be needed within each Parent OU?
Will departments be required to share resources?
May 30, 2014
Unit 10. Exercise 1. AD Troubleshooting Scenario: Troubleshooting
The most important feature to anything you do computerized is how much free space
your system currently has. This is accomplished by running disk def