Minggu, 31 Oktober 2010

Lab 8.4.3 Performing a Vulnerability Analysis

| | 0 komentar

CAUTION: This lab may violate legal and organizational security policies. The security analyzer downloaded in this lab should only be used for instructional purposes in a lab environment. Before using a security analyzer on a live network, check with your instructor and network administration staff regarding internal policies concerning the use of these tools. Objectives · Download and install security analyzer software. · Test a host to determine potential security vulnerabilities. Background / Preparation Security analyzers are valuable tools used by network administrators and auditors to identify network and host vulnerabilities....
Read more...

Lab 8.4.2 Configuring Access Policies and DMZ Settings

| | 0 komentar

Objectives · Log in to a multi-function device and view security settings. · Set up Internet access policies based on IP address and application. · Set up a DMZ for an open access server with a static IP address. · Set up port forwarding to limit port accessibility to only HTTP. · Use the Linksys WRT300N Help features. Background / Preparation This lab provides instructions for configuring security settings for the Linksys WRT300N. The Linksys provides a software-based firewall to protect internal, local-network clients from attack by external hosts. Connections from internal hosts to external destinations can be filtered based on the IP address, destination website,...
Read more...

Rabu, 27 Oktober 2010

CCNA Discovery 1 Module 9 Exam Answers Version 4.0

| | 0 komentar

1. What should a network administrator do first after receiving a call from a user who cannot access the company web server? • Ask the user what URL has been typed and what error message displays. 2. A customer called the cable company to report that the Internet connection is unstable. After trying several configuration changes, the technician decided to send the customer a new cable modem to try. What troubleshooting technique does this represent? • substitution 3. Only one workstation on a particular network cannot reach the Internet. What is the first troubleshooting step if the divide-and-conquer method is being used? • Check the workstation TCP/IP configuration. 4. Which two troubleshooting...
Read more...

CCNA Discovery 1 Module 8 Exam Answers Version 4.0

| | 0 komentar

1. Identify three techniques used in social engineering. (Choose three.) • vishing • phishing • pretexting 2. During a pretexting event, how is a target typically contacted? • by phone 3. While surfing the Internet, a user notices a box claiming a prize has been won. The user opens the box unaware that a program is being installed. An intruder now accesses the computer and retrieves personal information. What type of attack occurred? • Trojan horse 4. What is a major characteristic of a Worm? • exploits vulnerabilities with the intent of propagating itself across a network 5. A flood of packets with invalid source-IP addresses requests a connection on the network. The server busily...
Read more...

CCNA Discovery 1 Module 7 Exam Answers Version 4.0

| | 0 komentar

1. Why is IEEE 802.11 wireless technology able to transmit further distances than Bluetooth technology? • has higher power output 2. What are three advantages of wireless over wired technology? (Choose three.) • anytime, anywhere connectivity • easy and inexpensive to install • ease of adding additional devices 3. What are two benefits of wireless networking over wired networking? (Choose two.) • mobility • reduced installation time 4. A technician has been asked to provide wireless connectivity to the wired Ethernet network of a building. Which three factors affect the number of access points needed? (Choose three.) • the size of the building • the number of solid interior walls...
Read more...

Kamis, 21 Oktober 2010

Lab 7.3.5 Configuring Wireless Security

| | 0 komentar

Objectives * Create a security plan for a home network. * Configure the wireless access point (AP) portion of a multi-function device using security best practices. Background / Preparation A well-planned security implementation is critical to the safety of a wireless network. This lab goes over the steps that must be taken to ensure the safety of the network using the following scenario. You have just purchased a Linksys WRT300N wireless router, and you want to set up a small network in your home. You selected this router because the IEEE 802.11n specification claims that it has 12 times the speed of an 802.11g and 4 times the range. Because the 802.11n uses 2.4 GHz, it is backward compatible...
Read more...

Lab 7.2.6 Configuring a Wireless Client

| | 0 komentar

Objective • Install and configure a driver for a wireless USB NIC for a wireless client computer. • Determine the version of the driver installed and check the Internet for updates. Background / Preparation In this lab you will install a driver for a wireless USB NIC in a computer. The driver is a type of software that controls the wireless NIC. The driver comes on a CD with the NIC or can be downloaded from the Internet. Many manufacturers require that the driver is installed before the adapter is connected. The procedure described in this lab is for a Linksys USB 802.11g wireless NIC, but is similar to others. You should always follow the procedure recommended by the wireless NIC manufacturer. The...
Read more...

Lab 7.2.5 Configuring a Wireless Access Point

| | 0 komentar

Objective · Configure the wireless access point (AP) portion of a multi-function device to allow access to a wireless client. Background / Preparation The Linksys WRT300N includes an integrated 4-port switch, a router and a wireless Access Point (AP). In this lab, you will configure the AP component of the multi-function device to allow access for wireless clients. The basic wireless capabilities of the multi-function device will be configured but this will not be a secure wireless network. Setting up a secure wireless network will be covered in a later lab. The following resources are required: · Windows XP based computer that is cabled to the multi-function device · ...
Read more...

Kamis, 14 Oktober 2010

Lab 6.2.3 Exploring FTP Objective

| | 0 komentar

Demonstrate how to use FTP from the command prompt and GUI. Background / Preparation File Transfer Protocol (FTP) is part of the TCP/IP suite. FTP is used to transfer files from one network device to another network device. Windows includes an FTP application that you can execute from the command prompt. There are also many free GUI versions of FTP that you can download. The GUI versions are easier to use than typing from a command prompt. When using FTP, one computer is normally the server and the other computer is the client. When accessing the server from the client, you need to provide a username and password. Some FTP servers have a userID named anonymous. You can access these types of...
Read more...

CCNA DISCOVEY 1.6

| | 0 komentar

NAMA : FANI AYU FRASTIKA NIM/BP: 02845/08 PEND. TEKNIK INFORMATIKA CCNA Discovery 1 Module 6 Exam Answers Version 4.0 1. A user types www.cisco.com into a web browser address textbox. What does www.cisco.com represent? • the IP address of a web server 2. What type of server would use IMAP? • e-mail 3. Which type of server would most likely be used first by a network client in a corporate environment? • DHCP 4. Which protocol is used by FTP to transfer files over the Internet? • TCP 5. Which protocols are TCP/IP application layer protocols? (Choose two.) • FTP • SMTP 6. Which of the following are layers of the TCP/IP model? (Choose three.) • Application • Internet...
Read more...

Jawaban quiz CCNA chapter 6

| | 0 komentar

1. 1. The part of message that is missing is retransmitted 2. 2. DNS => A user request a website by typping in it’s name E-mail => Internet protocol enable user to send the message to each other over the internet File transfer => A user upload new to his or her website DHCP => A workstation gets its ip address automaticly Web service => A user types in a URL and a page loads in the client browser Telnet => A network technician logs into a workstation from the remote site 3. 3. DNS server => translate a domain name to an ip address Commond DNS port number => 53 Domain name => cisco.com 4. 4. DNS 5. 5. Web...
Read more...

Lab 6.2.1 Observing DNS Name Resolution Objectives

| | 0 komentar

• Observe the conversion of a URL to an IP address. • Observe DNS lookup using the nslookup command. Background / Preparation Domain Name System (DNS) is invoked when you type a Uniform Resource Locator (URL), such as http://www.cisco.com, into a web browser. The first part of the URL describes which protocol is being used. Common ones are HTTP (Hypertext Transfer Protocol), HTTPS (Hypertext Transfer Protocol over Secure Socket Layer), and FTP (File Transfer Protocol). DNS uses the second part of the URL, which in this example is www.cisco.com. DNS translates the domain name (like www.cisco.com) to an IP address in order to allow the source host to reach the destination host. Work in pairs...
Read more...

Rabu, 13 Oktober 2010

Tugas CCNA chapter 5

| | 0 komentar

Background / Preparation Network technicians work with binary, decimal, hexadecimal numbers with computers and networking devices. In this lab you will use the Windows Calculator application to convert between the binary, decimal, and hexadecimal number systems. You will also use the powers function to determine the number of hosts that can be addressed based on the number of bits available. The following resources are required: • PC with Windows XP installed and functional Step 1: Access Windows Calculator and determine mode of operation a. From the Start button menu, select All Programs > Accessories, and click on Calculator. An alternate method of starting the Calculator application...
Read more...

My Playlist

Pages

Followers

Diberdayakan oleh Blogger.
 
 
 
top