Week 1 I Lab

In: Computers and Technology

Submitted By trose79
Words 666
Pages 3
Student Name _____________________ Date ___
SEC450 iLab1 Report

Initial Configuration Dallas Router

version 12.3(4)T7
!
hostname Dallas
!
interface FastEthernet0/0 ip address 192.168.100.1 255.255.255.0
!
interface FastEthernet0/1 ip address 192.168.10.1 255.255.255.0 shutdown
!
interface Serial0/0 bandwidth 1544 ip address 192.168.30.1 255.255.255.0 shutdown
!
interface Serial0/1 bandwidth 1544 ip address 200.100.10.2 255.255.255.0
!
router rip network 192.168.100.0 network 200.100.10.0
!
ip default-network 200.100.10.0 ip route 0.0.0.0 0.0.0.0 serial0/1
!
! line con 0 line aux 0 line vty 0 4 password cisco line vty 5 15 password cisco
!
end

Note: RED text indicates the required questions to answer

Task 1—Verify Connectivity and Configuration in Dallas router

#1. What CLI command does produce the output below?
-------------------------------------------------

-------------------------------------------------
The CLI command used is “show ip route”.

-------------------------------------------------

-------------------------------------------------

#2. Complete the table below based on the dynamic routes displayed in the routing table above.

Routing protocol | Destination Network | Metric | Outbound Interface | RIP | 192.168.100.0/24 | 120/1 | Serial0/0 | RIP | 192.168.200.0/24 | 120/1 | Serial0/1 | | | | |

#3. Write the CLI command to verify connectivity from the ISP Router to

1. Dallas Server:
-------------------------------------------------
Ping 192.168.100.11

2. Dallas Host:
-------------------------------------------------
Ping 192.168.100.10

3. Chicago Server:
-------------------------------------------------
Ping 192.168.200.11

4. Chicago Host:
-------------------------------------------------
Ping 192.168.200.10

Task 3—Deny…...

Similar Documents

Netw310 Week 1 Lab

...NETW310, Lab #1, Examine the Physical Layer Lab Report Each answer is worth seven points. Use a red colored font for you answers. Place the answers below the questions. 1. There are three patterns outlined on the screen which one of these is identifying the noise floor? Note: You are to give the PATTERN number (1 – 4), not state which panel or view it is shown in. Refer to the video named Recognizing the Noise Floor for this question. The first pattern shows the noise floor 2. What is the approximate signal level of the noise floor? Note: You are looking for the amplitude in dB. Refer to the video named Recognizing the Noise Floor for this question. 2.4GHz band noise floor is -95db, 5Ghz band noise floor is -100db 3. Of the 11 channels being displayed which ones have the lowest noise floor? Note: The tapering area on the far right edge is due to the fact that 2.4 GHz signal ends at channel 11. Observe the area to the right of channel 1 and the left of channel 11. Refer to the video named Recognizing the Noise Floor for this question. Channels 8-11 have the lowest noise floors 4. Inside the circle marked as Pattern 2 is this a signal from one of the three unlicensed frequency ranges? Note: Refer to the video named Recognizing Unlicensed Bands Signals for this question. Yes it is 5. If it is, what type of signal is this, 900 MHz, 2.4GHz, or 5 GHz? Note: Refer to the video named Recognizing Unlicensed Bands Signals for......

Words: 485 - Pages: 2

Week 1 Lab

...NETW420 ADVANCED NETWORK MANAGEMENT Title of the Lab School of Engineering and Information Sciences Instructor Name SUBMITTED BY: SUBMITTED ON: Table of Contents Objectives 3 Problem Definition 3 Background Theory 3 Methodology and Procedure 3 Observations, Data, Findings, and Results 4 Questions and Answers 4 Recommendations and Conclusions 4 Lessons Learned 4 Document Certification 4 Objectives * Write the purpose and usefulness of the lab experiment. * What are the main outcomes that will be addressed in this lab experiment? * For example, * This lab report investigates * network performance in a hub-based network; * the impact of quality of service (QoS) on VoIP and videoconferencing; and * the impact of intrusion prevention systems (IPS) on distributed denial of service (DDoS) attacks. Problem Definition * Discuss what you are trying to investigate. * Look at it this way: If there was nothing wrong, would you be performing this lab experiment? * What is not working right now that leads to the need of performing this lab experiment? * This will closely tie in with your recommendations later in the lab report. Background Theory * What networking theory is aligned with this lab experiment? * Perform a basic summary and analysis of the said theory, and explain how the theory will support the findings. Methodology and Procedure * For example, we use OpNet as a......

Words: 488 - Pages: 2

Netw208 Week 1 Lab

...NETW208 Week 1 iLab Report There are two sections to this iLab. * Section 1: Configuring a Dedicated VPN Using a Tunnel and Data Encryption vLab (20 points) * Section 2: Managing Remote Access Sessions vLab (20 points) Configuring a Dedicated VPN Using a Tunnel and Data Encryption vLab (20 points) Review the grading rubric below, and then complete the work for each step as indicated. Category | Points | Description | Section 1Configuring a Dedicated VPN Using a Tunnel and Data Encryption—20 points * Task 5: Step 3 * Related Explanation or Response * Task 10: Step 1 * Related Explanation or Response * Task 10: Step 2 * Related Explanation or Response * Task 10: Step 4 * Related Explanation or Response * Summary Paragraph | 121212128 | Paste the requested screenshot.Provide the requested answer.Paste the requested screenshot.Provide the requested answer.Paste the requested screenshot.Provide the requested answer.Paste the requested screenshot.Provide the requested answer.In your own words, summarize what you have learned about configuring a dedicated VPN using a tunnel and data encryption. | Write a paragraph (minimum five college-level sentences) below that summarizes what was accomplished in this lab; what you learned by performing it; how it relates to this week’s TCOs and other course material; and, just as important, how you feel it will benefit you in your academic and professional career. (8......

Words: 938 - Pages: 4

Week 1 Lab Report

...NETW310 Week 1 Lab Report Edward Welsh NETW310, Kenneth Chipps 3/8/14 Lab #1, Examine the Physical Layer Lab Report Each answer is worth seven points. Use a red colored font for you answers. Place the answers below the questions. 1. There are three patterns outlined on the screen which one of these is identifying the noise floor? The first pattern identifies the noise floor. 2. What is the approximate signal level of the noise floor? The approximate signal level of the noise floor is -95db at 2.4 GHz and -100db at 5GHz. 3. Of the 11 channels being displayed which ones have the lowest noise floor? Channels 8-11 have the lowest noise floors 4. Inside the circle marked as Pattern 2 is this a signal from one of the three unlicensed fequency ranges? Yes, it is a signal from one of the three unlicensed frequency ranges. 5. If it is, what type of signal is this, 900 MHz, 2.4GHz, or 5 GHz? 2.4GHz 6. Inside the circle marked as Pattern 3 is this a signal from one of the three unlicensed signal ranges?  Yes, it is a signal from one of the three unlicensed frequency ranges. 7. If it is, what type of signal is this, 900 MHz, 2.4GHz, or 5 GHz? 900MHz 8. In the area marked as Pattern 4 some interference has appeared. What type of interference is this, such as all-channel, co-channel, adjacent-channel? The type of interference is the adjacent-channel interference. 9. On what channel has this interference appeared on? The interference has appeared...

Words: 314 - Pages: 2

Is404 Week 1 Lab

...Week 1 Lab Part 1 - Assessment Worksheet Assess the Impact on Access Controls for a Regulatory Case Study Overview Watch the Demo Lab in the Week 1 Learning Space Unit 1, and answer the questions below. The lab demonstrates creating an Active Directory domain as well as user and group objects within the new domain. Directories will be created and permissions assigned based on the required access control as defined in the matrix. Group Policy Objects will also be created and linked to Objects within the domain to enforce security settings. Lab Assessment Questions & Answers 1. What does DACL stand for and what does it mean? Discretionary access control List (DACL) is a type of access control defined by the Trusted Computer System Evaluation Criteria "as a means of restricting access to objects based on the identity of subjects and/or groups to which they belong 2. Why would you add permissions to a group instead of the individual? It is more resourceful and less time consuming. 3. List at least 3 different types of access control permissions available in Windows. Full Control, Modify, Execute, Read, Write 4. What are the least permissions that you need in order to view the contents of a folder? Read, so the user has access to any file on the system that they are entitled to, but they are not able to make any changes. 5. What are other available Password Policy options that could be enforce to improve security? ...

Words: 1093 - Pages: 5

Netw240 Week 1 Lab

...DSI# Date | 11/03/13 | NETW240 Week 1 Lab Report: Installing Fedora Linux 20 points In the space provided below, write a minimum of five college-level sentences in your own words that describe your experiences with this lab assignment. Include an overview of the major tasks accomplished in this lab and any difficulties you encountered in the completion of this lab assignment. Installing the Fedora 13 seemed easy enough but did take a long time when it came to the part of loading everything. I followed the lab instruction that helped me accomplished this which wasn’t too bad to follow. I did wish it had the explanation of each step like the other labs because it helped me understand what I’m doing and given the reason I never dealt with Linux before. The overview of the whole installation started with the “disc” and running it, then from the initial I was able to customize a few things (language, date and time, storage drive, own password, partition, software package, etc.). Luckily I did not encounter any problem that I was not able to install it but instead it went smooth. Something I did notice different was the appearance and where the taskbar was located. Installing the Fedora 13 seemed easy enough but did take a long time when it came to the part of loading everything. I followed the lab instruction that helped me accomplished this which wasn’t too bad to follow. I did wish it had the explanation of each step like the other labs because it helped me understand......

Words: 367 - Pages: 2

Physics I- Lab 1

...Name ____________________________________ Motion in 2D Simulation Go to http://phet.colorado.edu/simulations/sims.php?sim=Motion_in_2D and click on Run Now. 1) Once the simulation opens, click on ‘Show Both’ for Velocity and Acceleration at the top of the page. Now click and drag the red ball around the screen. Make 3 observations about the blue and green arrows (also called vectors) as you drag the ball around. • The green arrow is usually longer than the blue arrow • The green arrow always points in the direction that the ball is going. • The blue arrow initially points in the direction that the ball is going but it then switches to the opposite way. 2) Which color vector (arrow) represents velocity and which one represents acceleration? How can you tell? • The green vector represents velocity and the blue vector represents acceleration. • When velocity is constant the acceleration declines. When I moved the ball at a slow, constant rate, the blue vector would get shorter or disappear. 3) Try dragging the ball around and around in a circular path. What do you notice about the lengths and directions of the blue and green vectors? Describe their behavior in detail below. • The blue and green vectors remain at a 90° angle to each other and the green vector becomes shorter than the blue vector. 4) Now move the ball at a slow constant speed across the screen. What do you notice now about the vectors? Explain why this happens. ...

Words: 316 - Pages: 2

Itt Week 1 Lab

...Charles M. Krout June 17, 2014 Week 1 Lab: Clear-Text Data in Packet Trace Learning Objectives and Outcomes * You will learn how to identify clear-text data in a packet trace. * You will become familiar with the NetWitness Investigator interface. Assignment Requirements You need a computer and Internet access to complete this assignment. You are newly hired as a technology associate in the information systems department at Corporation Techs in Dallas, Texas. Corporation Techs is an IT services organization supporting a number of clients in the Dallas/Fort Worth area. It’s a Wednesday, a dull day where you have nothing much exciting to do. Suddenly, you get a call from your manager. He appreciates the work you have been doing so far and thinks that you have the ability to take on more challenging work. To complete challenging tasks, you need to become familiar with the tools of the trade. So, you need to learn about a new packet analyzer called NetWitness Inspector. First, you must download and install the NetWitness Investigator software, and then open a demo trace file and find a clear-text password. You must also explore the tools on the toolbar in NetWitness Investigator to understand the options available. Perform the following steps: 1. Download and install the free version of NetWitness Investigator from the NetWitness Corporation Web site: http://www.netwitness.com/products/investigator.aspx 2. Register and activate the......

Words: 366 - Pages: 2

Week 1 Lab

...Category | Points | Description | Section 1Configuring Static and Default Routes - 30 Points * Task 4: Step 1 * Related Explanation or Response * Task 4: Step 2 * Related Explanation or Response * Task 5: Step 1 * Related Explanation or Response * Task 5: Step 1 * Related Explanation or Response * Summary Paragraph | 2323232310 | Paste the requested screenshotProvide the requested answerPaste the requested screenshotProvide the requested answerPaste the requested screenshotProvide the requested answerPaste the requested screenshotProvide the requested answerIn your own words, summarize what you have learned about Configuring Static and Default Routes. | Total | 30 | | ------------------------------------------------- Name: jim smith Date: Professor: ------------------------------------------------- Configuring Static and Default Routes vLab (30 points) Write a paragraph (minimum five college-level sentences) below that summarizes what was accomplished in this lab, what you learned by performing it, how it relates to this week’s TCO’s and other course material; and just as important, how you feel it will benefit you in your academic and professional career. (10 points)This week we learned about the significance of an R or S next to a network entry. In class we learned basic cisco routing commands. We also learned about the different router modes and how to diagnose problems with the router setup. Learning...

Words: 502 - Pages: 3

Netw310 Week 1 Lab

...Eugene Khavinson NETW310, Professor’s Name Current Date Lab #1, Examine the Physical Layer Lab Report Each answer is worth seven points. Use a red colored font for you answers. Place the answers below the questions. 1. There are three patterns outlined on the screen which one of these is identifying the noise floor? The first pattern shows the noise floor 2. What is the approximate signal level of the noise floor? 2.4GHz band noise floor is -95db, 5Ghz band noise floor is -100db 3. Of the 11 channels being displayed which ones have the lowest noise floor? Channels 8-11 have the lowest noise floors 4. Inside the circle marked as Pattern 2 is this a signal from one of the three unlicensed fequency ranges? Yes 5. If it is, what type of signal is this, 900 MHz, 2.4GHz, or 5 GHz? 2.4GHz 6. Inside the circle marked as Pattern 3 is this a signal from one of the three unlicensed signal ranges? Yes 7. If it is, what type of signal is this, 900 MHz, 2.4GHz, or 5 GHz? 900MHz 8. In the area marked as Pattern 4 some interference has appeared. What type of interference is this, such as all-channel, co-channel, adjacent-channel? Adjacent-channel 9. On what channel has this interference appeared on? Channel 4 and 5 10. Is this interference weaker than, the same, or stronger than the signal that was there before it appeared? The top has a higher range between channel 4 and 5 and is stronger than channel 6, and that is the range it is interfering......

Words: 272 - Pages: 2

Week 12 Lab 1

...Unit 7 Lab – Relate Windows Encryption and Hashing to Confidentiality & Integrity 1. Which Key do you provide anyone you want to encrypt messages with private or public keys or both? Public The key is always provided as part of the handshake in order to encryption to take place. 2. What does GPG allow you to do once it is installed? GPG allows you to encrypt your hard drives content in order to secure it. 3. Name 2 different types of encryption supported by GPG for your key? The MD5 and Sha1 type of hashing encryption are supported by GPG. 4. What happens when you sign and trust a new key on your keychain? A new key is created to include the private and public key based on how the new key was created. 5. If a user sends you a public key will he be able to decrypt your encrypted messages once you import and sign his key? Both parties need to have each other’s private keys in order to be able to encrypt and decrypt all messages that are exchange among themselves. 6. What are the similarities between an MD5 hash and a fingerprint? They both insert a fingerprint to the data. 7. How would you encrypt a webserver and the pages it serves up? I would set the web server to redirect its web traffic to SSL hence encrypting all conversations between server and host in relation to the web traffic. 8. Why is hashing all database inputs not considered encryption of a database? What value does hashing database entries from server to client? Hashing......

Words: 442 - Pages: 2

Is4550 Week 1 Lab

...------------------------------------------------- Week 1 Laboratory Part 1: Craft an Organization-Wide Security Management Policy for Acceptable Use Learning Objectives and Outcomes Upon completing this lab, students will be able to complete the following tasks: * Define the scope of an acceptable use policy as it relates to the User Domain * Identify the key elements of acceptable use within an organization as part of an overall security management framework * Align an acceptable use policy with the organization’s goals for compliance * Mitigate the common risks and threats caused by users within the User Domain with the implementation of an acceptable use policy (AUP) * Draft an acceptable use policy (AUP) in accordance with the policy framework definition incorporating a policy statement, standards, procedures, and guidelines Part 1 – Craft an Organization-Wide Security Management Policy for Acceptable Use Worksheet Overview In this hands-on lab, you are to create an organization-wide acceptable use policy (AUP) that follows a recent compliance law for a mock organization. Here is your scenario: * Regional ABC Credit union/bank with multiple branches and locations thrrxampexoughout the region * Online banking and use of the Internet is a strength of your bank given limited human resources * The customer service department is the most critical business function/operation for the organization * The organization wants......

Words: 639 - Pages: 3

Accounting Lab 1 Week 1

...AC1220 Lab 1.1 Introduction On January 1, 20x1, Jake Jones decides to start a computer repair business. The business will operate as a proprietorship under the name Jake’s Computer Repair Service. Requirement 1 Match each of the following accounting concepts or principles to the correct description: cost principle, entity concept, faithful representation principle, going-concern concept, and stable monetary unit concept. Description | Accounting Concept/Principle | Jones ensures that the information contained in the financial records of the business is complete, neutral, and free from material errors. | Faithful Representation Principle | All transactions entered into the financial records of Jake’s Computer Repair Service are U.S. dollar amounts. | Stable Monetary Unit Concept | Assets acquired by Jake’s Computer Repair Service, such as property and equipment, are recorded at their actual cost. | Cost Principle | Jones must keep his personal assets and liabilities separate from those of the business. | Entity Concept | Jones expects the business to be successful and to continue operating into the foreseeable future. | Going-Concern | Requirement 2 The following transactions take place in January 20x1, the first month of operations for Jake’s Computer Repair Service: a. Jan. 1, 20x1. Jones opens a business account with Ninth Street Bank and deposits $5,000. b. Jan. 2, 20x1. Jones borrows an additional $10,000 from Ninth Street Bank, signing...

Words: 735 - Pages: 3

Netw410 Week 1 Lab

...NETW410 Week 1 Lab Report Your Name NETW410 Professor Douglas Romans Current Date 1/10/2016 Lab #1, Introduction to Visio Lab Report: (70 points) Place the answers below the questions using a red-colored font. Answer in college-level sentences with proper grammar and spelling. Answer each part of the question for full credit. Question 1 (3 points) What is your experience with the Visio software? Have you used it before or is it your first experience with Visio? I do have some experience with Visio but it is extremely limited. At my internship my boss instructed me to make modifications of a Visio document that mapped out our entire building. That’s the extent of my Visio experience outside of installation. Question 2 (3 points) How did you access Visio? How do you feel about the different access methods? Luckily I already had Visio installed on my computer so I used the desktop application. Question 3 (3 points) What version of Visio did you use for this lab? As previously stated I have Visio installed on my computer, it’s Visio Professional 2013. Question 4 (3 points) What file extension does your version of Visio use? Does Visio support other extensions? My version of Visio saves in .vsdx file format. Question 5 (6 points: 3 points for each screenshot and comment) Use this website (http://www.ratemynetworkdiagram.com/index.php?z=1) to find a diagram that you think has good points. Paste a screen shot of the diagram in your lab......

Words: 826 - Pages: 4

Week 1 Lab

...ECET365 Week 1 iLab Cover Sheet DeVry University College of Engineering and Information Sciences Course Number: ECET365 Professor Laboratory Number: 2 Laboratory Title: Motor Control Submittal Date Objectives A. Develop software routines that control Stepper Motors, small permanent magnet DC motors, and Servos. B. Understand how an H-bridge can be used to control DC motors and Stepper Motors. Results Conclusions Team | | | EET | | Paige | | Name | | Program | | Signature | | | | | | | | Name | | Program | | Signature | | | | | | | | Name | | Program | | Signature | Observations/Measurements A. Questions for the DC Motor Procedures: 1. What is a use of an Optical Isolator (Optoisolator)? An Optical Isolator is a type of semiconductor that allows signals to transfer between circuits and systems, while isolating those systems from each other; they are mainly use for monitoring systems. 2. Use Ohmmeter to measure resistance for DC motor used in this Lab. 56 omhs 3. In Activity 1, explain how you turned the DC motor “on” and “off.” I tried using a transistor as switch using a breadboard and a power supply (battery) to power the motor, with a 1k ohms resistor to limit current, I also connected a custom power supply to add 3.3v onto the breadboard. On our project the simplest way is the ON-OFF switch with is used to control the switch to only rotate at the maximum speed of rotation only in one direction, to......

Words: 1314 - Pages: 6