4. B. PC and switch D. Router and hub E. wireless access point and switch 5. B. collisions can happen, but the algorithm defines how the computers should notice a collision and how to recover. 6. C. two PCs, with one cabled to a router Ethernet port with a crossover cable and the other PC cabled to another router Ethernet port with a crossover cable.
It’s imperative that we not only protect against these types of activities on the network, but that we also conduct them ourselves. Ping sweeps are what they sound like. They’re a regular ping that almost anyone in the IT field uses as a basic troubleshooting step but, they are conducted across an entire range of addresses. Whereas a normal administrator would only ping one or two destinations, a malicious user may conduct a ping sweep to find every endpoint on a network that they are allowed a connection to. Most utilities that perform this operation can also perform a DNS lookup on all the IP addresses as well to produce the end points names.
TCP is the transport layer protocol that links the application layer to the network layer. TCP breaks the data into smaller packets, numbers the packets, ensures each packet is reliably delivered, and puts the packets in the proper order at the destination. IP is the network layer protocol and performs addressing and routing. IP software is used at each of the computers through which the message passes through; IP routes the message to the final destination. TCP/IP is the transport & network layer protocol used on the Internet.
What is a ping sweep and how does it work? A ping sweep is a, “diagnostic technique used in computing to see what range of IP addresses are in use by live hosts, which are usually computers.” (What is a Ping Sweep?, 2013). Using just the ping command in a command prompt, you can verify whether a host is alive or not if it returns the ping. In a ping sweep, this is done on a larger scale to see which IPs are active on a network. Doing this, the attacker will know which computers are alive and which aren’t so they know where they should concentrate their attacks on.
Increase fault border by change integrity DHCP orbital cavitys. 2. Balance the load on your DHCP host by using the 80/20 rule for scopes 3. countenance contrasted administration of DHCP hosts by comfiguring windows Firewall ports. Question 4 What is the name of the computer you are working from? SEA-SVR2 Question 5 What IP addressing settings are currently configured?
4. LAN-to-WAN • LAN-to-WAN Domain is where the IT Infrastructure links to a Wide Area Network (WAN) and the Internet. Responsible for applying the defined security controls to prevent unauthorized network access 5. WAN • Wide Area Network (WAN) Domain connects remote locations. Manages client’s firewalls and router configurations .The goal is to allow users the most access possible by making sure the data traveling in and out is safe 6.
What is the difference between a hub and a switch? Hub – Broadcasts data it receives to all devices connected to its ports. Switch – Establishes a direct connection from the sender to the destination, without passing the data traffic to other networking devices. 13. What information is not included in an Ethernet frame?
When using traffic analysis, this process reveals the amount, type, origin and destination of the traffic flow on a network. This process is used when there is an infected computer presumed in the network. Also, the process can identify which computer is downloading something that is legal or potentially illegal. If for some reason that there is an infected computer, traffic analysis could expose which computer(s) that are infected on the network. Using traffic analysis could also identify the amount of bandwidth that each computer(s) on the network are
Find a TCP three- way handshake for a Telnet, FTP, or SSH session. What is the significance of the TCP three- way handshake? The significance of the TCP three way handshake is to prevent data interception.A communication channel is created establish security protocols between the client and server. 7. What was the SEQ# of the initial SYN TCP packet and ACK# of the SYN ACK TCP packet?
Lots of good websites to provide instructions on | | |securing the system. Linux can use firewalls, IPS, IDS, and antivirus software. It can also | | |be configured to serve in these rolls to protect these systems unlike Windows; additional | | |software has to be purchased, while