lab 3 Configuring and Managing the DHCP Server Role Question 1 | What is the name of the computer you are working from? SEA-SVR1 | Question 2 | What is the default lease duration of a Wired subnet type? 6 Days | Question 3 | What are three recommendations listed in Server Manager for managing the DHCP Server role? 1. Increase fault tolerance by splitting DHCP scopes.
Student Name Date SEC450 IPSec VPN Lab Report NOTE: Use carriage returns and page breaks as needed to prevent table contents from extending across page boundaries. Task 1—Configure a Site-to-Site IPSec VPN on the Dallas Router Which IKE (isakmp) policy would have the highest priority—100 or 200? 100 What authentication options are available? rsa-sig, rsa-encr, pre-share What encryption options are available? 3des, des, aes, aes 192, aes 256 What are the Diffie-Hellman group options available on most IOS Firewall routers?
In telecom closet 2, from the punch down block, to the switches, to the wall plates, and on to the offices workstation, plus one shared printer, cabling will change to Cat 5e UTP, using 1000 Base-T technology, achieving a throughput of 1000Mbps. A safety feature on Ethernet Lans, is its access method, CSMA/CD. CSMA/CD, means that your NIC checks the network to make sure it is not busy before transmitting, if two nodes do transmit at the same time having a collision, it will send out packets to inform other nodes of a data collision, then the NIC waits for the network to be inactive before retransmitting. On the
Question 15 The Wide Area Network (WAN) design below represents what type of fault-tolerant network design? Question 16 Which QoS design consideration is incorrect? Question 17 Which term is best described by the following definition: “Both NICs are active at the same time, and they each have their own MAC address”? Question 18 Which of the following is one of the two modes of Network Interface Card (NIC) redundancy? (Choose 2) Question 19 The ________ command can be used to display information about current sessions, including source and destination IP addresses and port numbers.
Step 2: If ARP resolution is not there in local cache, the source machine will generate an Address Resolution Protocol (ARP) request message, it puts its own data link layer address as the Sender Hardware Address and its own IPv4 Address as the Sender Protocol Address. It fills the destination IPv4 Address as the Target Protocol Address. The Target Hardware Address will be left blank, since the machine is trying to find that. Step 3: The source broadcast the Address Resolution Protocol (ARP) request message to the local network. Step 4: The message is received by each device on the LAN since it is a broadcast.
Michael Vulcano IT-130 Chapter 5 Assessment 2/6/13 Fill in the Blank 1) firewall 2) network and sharing center 3) router 4) osi model, 7 5) connectionless protocols 6) ping 7) nslookup.exe 8) dhcp 9) tracert.exe 10) application, physical True/False 1) F 2) T 3) T 4) T 5) T 6) T 7) F 8) F 9) F 10) F Review Questions 1) A hardware address or MAC address Short for Media Access Control address, is an address that uniquely identifies each node of a network and an ipv4 address is an IP address is a binary number that uniquely identifies computers and other devices on a TCP/IP network 2) On a TCP/IP network, an application sends function calls to an application level protocol, which then packages the application data to be transmitted over the network and then passes it down through the levels of the networking levels. At the transport level, the TCP or UDP protocol encapsulates the application level data by adding a header containing the port number and then passes the packet down to the network level. At the network layer, the IP adds its own header which contains the destination address for the packet, and passes it down to the data-link level. At the data-link level, ethernet completes the encapsulation process by applying a frame containing the address of a router on the local network.
What command would you use to create a new group called mygroup, with a group ID (GID) of 1423? Include the full command and all necessary options. # /usr/sbin/groupadd shared # tail /etc/group Haldaemon:x:68: Xfs:x:43 Gdm:x:42: Rich:x:1423: Mysql:x:27: Test:x:1424: Sharing:x:1425:test,rich # # /usr/sbin/useradd –D Group=1423 Home=/home INACTIVE=-1 EXPIRE= SHELL=/bin/bash SKEL=/etc/skel Create_MAIL_SPOOL=yes # From your current working directory, you have created a new directory (i.e. folder) called bubba. Now, you want to modify the permissions on your new directory to set the following permissions: user:read, write and execute group: read and execute other: read What command would you use to set these permissions?
3) When the printer displays “abcd” or garbled text, you may want to delete the current printer status and reinstall the printer to the correct driver. This should clear the problem, just remember to reboot the system and start all over again. It is a possibility that when you originally load the printer, it may have gotten corrupted. Basic Networking: Course NT1210/NT1310 1. OSI Model: Open System Interconnection * Is a conceptual model that characterizes and standardizes the internal functions of a communication system by partitioning it into abstraction layers 7) Application Layer | 6) Presentation Layer | 5) Session Layer | 4) Transport Layer | 3) Network Layer | 2) Data Link Layer | 1) Physical Layer | * The model group’s communication functions into seven logical layers.
How many networks will be created using a 255.255.0.0 given a class A IP network (i.e., 10.0.0.0)? 3. What would be the dotted decimal equivalent o the slash notation of /30? 4. What would be the dotted decimal equivalent o the slash notation of /8?NT2640.U3.AS1.IP Subnetting Assignment 5.
CIS 312 Final Exam Answers https://hwguiders.com/downloads/cis-312-final-exam-answers CIS 312 Final Exam Answers • Question 1 A(n) ____ increases a signal’s strength (amplitude) and can extend a signal’s range by boosting signal power to overcome attenuation. • Question 2 Square waves can be generated by rapidly switching (pulsing) an electrical or optical power source—a technique called ____. • Question 3 A(n) ____ is the maximum number of bits or bytes per second that the channel can carry. • Question 4 Messages can be loosely categorized into two types—data messages and command messages. • Question 5 ____ mode uses a single shared channel, and each node takes turns using the transmission line to transmit and receive.