CAUTION: This lab may violate legal and organizational security policies. The security analyzer downloaded in this lab should only be used for instructional purposes in a lab environment. Before using a security analyzer on a live network, check with your instructor and network administration staff regarding internal policies concerning the use of these tools.
Objectives
· Download and install security analyzer software.
· Test a host to determine potential security vulnerabilities.
Background / Preparation
Security analyzers are valuable tools used by network administrators and auditors to identify network and host vulnerabilities....
Minggu, 31 Oktober 2010
Lab 8.4.3 Performing a Vulnerability Analysis
Diposting oleh flavia | di 22.44 | 0 komentar
Read more...
Lab 8.4.2 Configuring Access Policies and DMZ Settings
Diposting oleh flavia | di 22.37 | 0 komentarObjectives
· Log in to a multi-function device and view security settings.
· Set up Internet access policies based on IP address and application.
· Set up a DMZ for an open access server with a static IP address.
· Set up port forwarding to limit port accessibility to only HTTP.
· Use the Linksys WRT300N Help features.
Background / Preparation
This lab provides instructions for configuring security settings for the Linksys WRT300N. The Linksys provides a software-based firewall to protect internal, local-network clients from attack by external hosts. Connections from internal hosts to external destinations can be filtered based on the IP address, destination website,...
Rabu, 27 Oktober 2010
CCNA Discovery 1 Module 9 Exam Answers Version 4.0
Diposting oleh flavia | di 21.11 | 0 komentar1. What should a network administrator do first after receiving a call from a user who cannot access the company web server?
• Ask the user what URL has been typed and what error message displays.
2. A customer called the cable company to report that the Internet connection is unstable. After trying several configuration changes, the technician decided to send the customer a new cable modem to try. What troubleshooting technique does this represent?
• substitution
3. Only one workstation on a particular network cannot reach the Internet. What is the first troubleshooting step if the divide-and-conquer method is being used?
• Check the workstation TCP/IP configuration.
4. Which two troubleshooting...
CCNA Discovery 1 Module 8 Exam Answers Version 4.0
Diposting oleh flavia | di 21.11 | 0 komentar1. Identify three techniques used in social engineering. (Choose three.)
• vishing
• phishing
• pretexting
2. During a pretexting event, how is a target typically contacted?
• by phone
3. While surfing the Internet, a user notices a box claiming a prize has been won. The user opens the box unaware that a program is being installed. An intruder now accesses the computer and retrieves personal information. What type of attack occurred?
• Trojan horse
4. What is a major characteristic of a Worm?
• exploits vulnerabilities with the intent of propagating itself across a network
5. A flood of packets with invalid source-IP addresses requests a connection on the network. The server busily...
CCNA Discovery 1 Module 7 Exam Answers Version 4.0
Diposting oleh flavia | di 21.10 | 0 komentar1. Why is IEEE 802.11 wireless technology able to transmit further distances than Bluetooth technology?
• has higher power output
2. What are three advantages of wireless over wired technology? (Choose three.)
• anytime, anywhere connectivity
• easy and inexpensive to install
• ease of adding additional devices
3. What are two benefits of wireless networking over wired networking? (Choose two.)
• mobility
• reduced installation time
4. A technician has been asked to provide wireless connectivity to the wired Ethernet network of a building. Which three factors affect the number of access points needed? (Choose three.)
• the size of the building
• the number of solid interior walls...
Kamis, 21 Oktober 2010
Lab 7.3.5 Configuring Wireless Security
Diposting oleh flavia | di 20.13 | 0 komentarObjectives
* Create a security plan for a home network.
* Configure the wireless access point (AP) portion of a multi-function device using security best practices.
Background / Preparation
A well-planned security implementation is critical to the safety of a wireless network. This lab goes over the steps that must be taken to ensure the safety of the network using the following scenario.
You have just purchased a Linksys WRT300N wireless router, and you want to set up a small network in your home. You selected this router because the IEEE 802.11n specification claims that it has 12 times the speed of an 802.11g and 4 times the range. Because the 802.11n uses 2.4 GHz, it is backward compatible...
Lab 7.2.6 Configuring a Wireless Client
Diposting oleh flavia | di 20.12 | 0 komentarObjective
• Install and configure a driver for a wireless USB NIC for a wireless client computer.
• Determine the version of the driver installed and check the Internet for updates.
Background / Preparation
In this lab you will install a driver for a wireless USB NIC in a computer. The driver is a type of software that controls the wireless NIC. The driver comes on a CD with the NIC or can be downloaded from the Internet. Many manufacturers require that the driver is installed before the adapter is connected. The procedure described in this lab is for a Linksys USB 802.11g wireless NIC, but is similar to others. You should always follow the procedure recommended by the wireless NIC manufacturer.
The...
Lab 7.2.5 Configuring a Wireless Access Point
Diposting oleh flavia | di 20.10 | 0 komentarObjective
· Configure the wireless access point (AP) portion of a multi-function device to allow access to a wireless client.
Background / Preparation
The Linksys WRT300N includes an integrated 4-port switch, a router and a wireless Access Point (AP). In this lab, you will configure the AP component of the multi-function device to allow access for wireless clients. The basic wireless capabilities of the multi-function device will be configured but this will not be a secure wireless network. Setting up a secure wireless network will be covered in a later lab. The following resources are required:
· Windows XP based computer that is cabled to the multi-function device
· ...
Kamis, 14 Oktober 2010
Lab 6.2.3 Exploring FTP Objective
Diposting oleh flavia | di 05.19 | 0 komentarDemonstrate how to use FTP from the command prompt and GUI.
Background / Preparation
File Transfer Protocol (FTP) is part of the TCP/IP suite. FTP is used to transfer files from one network device
to another network device. Windows includes an FTP application that you can execute from the command prompt. There are also many free GUI versions of FTP that you can download. The GUI versions are easier to use than typing from a command prompt.
When using FTP, one computer is normally the server and the other computer is the client. When accessing the server from the client, you need to provide a username and password. Some FTP servers have a userID named anonymous. You can access these types of...
CCNA DISCOVEY 1.6
Diposting oleh flavia | di 05.16 | 0 komentarNAMA : FANI AYU FRASTIKA
NIM/BP: 02845/08
PEND. TEKNIK INFORMATIKA
CCNA Discovery 1 Module 6 Exam Answers Version 4.0
1. A user types www.cisco.com into a web browser address textbox. What does www.cisco.com represent?
• the IP address of a web server
2. What type of server would use IMAP?
• e-mail
3. Which type of server would most likely be used first by a network client in a corporate environment?
• DHCP
4. Which protocol is used by FTP to transfer files over the Internet?
• TCP
5. Which protocols are TCP/IP application layer protocols? (Choose two.)
• FTP
• SMTP
6. Which of the following are layers of the TCP/IP model? (Choose three.)
• Application
• Internet...
Jawaban quiz CCNA chapter 6
Diposting oleh flavia | di 03.56 | 0 komentar1. 1. The part of message that is missing is retransmitted
2. 2. DNS => A user request a website by typping in it’s name
E-mail => Internet protocol enable user to send the message to each other over the internet
File transfer => A user upload new to his or her website
DHCP => A workstation gets its ip address automaticly
Web service => A user types in a URL and a page loads in the client browser
Telnet => A network technician logs into a workstation from the remote site
3. 3. DNS server => translate a domain name to an ip address
Commond DNS port number => 53
Domain name => cisco.com
4. 4. DNS
5. 5. Web...
Lab 6.2.1 Observing DNS Name Resolution Objectives
Diposting oleh flavia | di 03.40 | 0 komentar• Observe the conversion of a URL to an IP address.
• Observe DNS lookup using the nslookup command.
Background / Preparation
Domain Name System (DNS) is invoked when you type a Uniform Resource Locator (URL), such as http://www.cisco.com, into a web browser. The first part of the URL describes which protocol is being used. Common ones are HTTP (Hypertext Transfer Protocol), HTTPS (Hypertext Transfer Protocol over Secure Socket Layer), and FTP (File Transfer Protocol).
DNS uses the second part of the URL, which in this example is www.cisco.com. DNS translates the domain name (like www.cisco.com) to an IP address in order to allow the source host to reach the destination host. Work in pairs...
Rabu, 13 Oktober 2010
Tugas CCNA chapter 5
Diposting oleh flavia | di 20.44 | 0 komentarBackground / Preparation
Network technicians work with binary, decimal, hexadecimal numbers with computers and networking devices. In this lab you will use the Windows Calculator application to convert between the binary, decimal, and hexadecimal number systems. You will also use the powers function to determine the number of hosts that can be addressed based on the number of bits available.
The following resources are required:
• PC with Windows XP installed and functional
Step 1: Access Windows Calculator and determine mode of operation
a. From the Start button menu, select All Programs > Accessories, and click on Calculator. An
alternate method of starting the Calculator application...
Langganan:
Postingan (Atom)