4.4.3 Noise SMF Crosstalk Coaxial Interference Coaxial Op en (Open Circuit) UTP Short (Short Circuit) MMF Break UTP 4.4.4 I first start with my anti-virus to run any scans, after that I go into my device manager and click the network adapter. I then will go into my general tab and click trouble shoot. 4.4.5 Some of the common strategies for trouble shooting from top down starts with are you able to view a web page in your browser, can you se nd or receive email and/or are your username and password correct, and are your Interne t Explorer connection settings correct. If none of those are an issue you take it a little further. Is there a firewall configured on your computer, is your firewall block ing ports, if you turn off the firewall does it resolve your problem?
(4 points) 3. How a home user gets an IP address? (2 points) Your Internet service provider (ISP) can lease a permanent IP address to you, but that isn’t really necessary, unless you’re running your own Web or e-mail server on your home network. 4. Change the following IPv4 addresses from binary to dotted-decimal notion: (8 points) a.
The benefits of using peer-to-peer are that it is secure, scalable, serverless, self-tuning, self-repairing, and sharing. Lab 2.2 Exercise 2.2.1 The comparative cost of buying 30 individual printers versus
domain controller 1) What is the term used to describe a read-only copy of a user profile stored on a network share? Mandatory Profile 2) When you create a new user account with the User Accounts control panel, you can only add it to which of the following groups? ((choose all that apply)) Administrators and Users 3) When you log on to a newly installed Win 7 computer for the first time, why can you not use the administrator account? It is disabled 4) What is true about The User Accounts Control Panel? It can create Local Users Only.
Why are you now able to continue to the web site from the client? By disabling the firewall it allows all traffic through to the web site 11. Why are you unable to connect to the intranet site from the client? From my computer I was able to access both site when the firewall is open Exercise 5.4 12. Why are there two separate rules for the World Wide Web Services?
These provide a high level of security and are known as a clientless method. This means you don’t have to run a dedicated VPN client to connect to the network. The connection is applied at the web browser level making easier and more reliable than other
Remote access will be limited in certain areas, while at least Applications will be approved for access (Shared application data is an important part of Richman’s network). Systems and system settings will not be accessible from remote, out of network connections, to protect from outside alterations of systems or system settings, and any Data access will be read only, with safeguards in place to prevent data from being altered or stolen. Further, access to various Systems and Data, etc will be protected by Network Segmentation. We will create security trust zones in order to control and thereby grant access to remote users. This works in conjunction
G domain controller Multiple Choice 1. What is the term used to describe a read-only copy of a user profile stored on a network share? a. Mandatory profile b. Super-mandatory profile c. Roaming profile d. Search profile 2. When you create a new user account with the User Accounts control panel, you can only add it to which of the following groups?
Question 1 Grade Average= (67.4 + 86.4 + 79.2 + 80 + 68.2) / 5 = 76.24 Question Score= (0.15 * 76.24) = 12 Question 2 Grade Score= 55% Question Score= (0.10 * 55) = 5.5 Question 3 A VPN (virtual private network) is a way of creating a secure connection over the public internet say from a teleworkers province, to their employer’s headquarters. The user is authenticated and the sensitive data being sent through the VPN tunnel is encrypted. This therefore makes using VPN over the internet, similar to having a dedicated layer 2 leased line. Cisco SSL (Secure Socket Layers) is used to encrypt the data before it is sent through the VPN tunnel. It uses a variety of algorithms to provide authenticity and integrity of the data, and uses session keys.
Video 2.04 * Chkdsk * Can automatically fix file system errors * Can scan for and attempt to recover bad sectors * Can be run from Command line * CMD * CHKDSK Terms No terms used Summary This video covered the check disk function and what it does. Also how to access the program via windows and via command line. My Thoughts Pretty good video especially for the novice user. Helpful to understand how to access things from both windows and CMD. Video 2.06 * Disk Cleanup * Conserves Hard Drive space * Email * Clean out your email folder * Disk Clean up does NOT clean you email Terms Disk Cleanup- A files utility that cleans out the recycling bin, temp internet