Top-Rated Free Essay
Preview

ISSC340 Week1Assignment

Satisfactory Essays
286 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
ISSC340 Week1Assignment
Name: _____ Date: ___
ISSC340 Week 1 Assignment (3% of Grade) APUS/Kageorgis

Lesson 1 Review: Overview of Local Area Networks
The purpose of this activity is to reinforce what you have learned so far about local area networks technologies.

1. What are the main architectural components of a LAN? (Minimum word count: 60)
The architectural components of a LAN are utilized to describe to network. They include the network's physical topology, how the nodes access it. The transmission technique and whether it is wired or wireless. Other factors are the protocols utilized to talk over the network and whether it shares information with other networks. As far as physical components go you have to look at switches, routers, servers, and clients. Other items are added to these depending on the size of the network in question.
2. Describe the function and characteristics of a network operating system (NOS). (Minimum word count: 100)
A network operating system is a piece of software that is utilized to manage the network resources available to the clients on your network. As a central point of management you have the ability to create and manage user accounts, security templates(group policy), allow users and systems access to file servers and printers, and control any information that is requested from outside your network. Proper utilization and configuration of your network operating system is essential for the security of your network. From the server you can place rules on each of your clients to limit the resources they have access to, while determining how much freedom they will enjoy on their systems.
3. Match each term below with the correct definition.

Answer: 1 - _C 2 - _E 3 - _D 4 - _A 5 - _B

You May Also Find These Documents Helpful

  • Better Essays

    INDP Kudler Fine Food

    • 1189 Words
    • 4 Pages

    The major network components devices are a Network Interface Card (NIC), a Hub, Switches, Servers, Cables and connectors, firewalls, work stations, wireless access points, Wide area networks (WANs), Routers, VOIP phones and Modems.…

    • 1189 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    ISSC362 Week 2

    • 645 Words
    • 3 Pages

    During the scanning step of the hacking attack process, you identified known software vulnerabilities in a Windows XP Professional Workstation. List the name and number of the critical Microsoft® vulnerabilities identified. What is vulnerability “MS08-067”?…

    • 645 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The purpose of this activity is to reinforce what you have learned so far about local area networks technologies.…

    • 494 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    ITN Final Chp 7 Through 12

    • 7250 Words
    • 75 Pages

    As discussed in this textbook, three layers of a network model are the components required for a typical network, including local area networks.…

    • 7250 Words
    • 75 Pages
    Satisfactory Essays
  • Good Essays

    ISSC342 Assignment5

    • 338 Words
    • 1 Page

    During the first two phases of the five step process of a cyber-attack a hacker conducts reconnaissance of the target network and scans for any vulnerabilities that could be exploited. (EC-Council, 2009) These vulnerabilities are known as a system’s attack surface. One of the core job functions of Network administrators is reducing this attack surface through a process called system hardening. There a number of techniques that can be used to harden Microsoft clients and servers such as scanning the system with nmap to find any vulnerabilities that comes from having open ports. After the initial scan the administrator should close open ports and uninstall unnecessary services. (Solomon, 2014) Administrators should also run follow up scans with nmap to make sure that there are no ports or services that they may have missed during their first run. Nmap is not the only program that can identify vulnerabilities within a server, the SCW utility should also be used when you are installing new server hardware to check for any unwanted services that may be set to run on the server as a default setting. (Solomon, 2014)…

    • 338 Words
    • 1 Page
    Good Essays
  • Satisfactory Essays

    ISSC 340

    • 275 Words
    • 2 Pages

    The purpose of this activity is to reinforce what you have learned so far about local area networks technologies.…

    • 275 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Mis 589 Unit 7

    • 943 Words
    • 4 Pages

    7. How do local area networks (LANs) differ from metropolitan area networks (MANs), wide area networks (WANs), and backbone networks (BNs)?…

    • 943 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Lan Consulting Plan

    • 2879 Words
    • 12 Pages

    Axia College. (2006). Networking Technologies. Retrieved August 28, 2009, from Axia College, Week Three, IT 240 Intro to LAN Technologies.…

    • 2879 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    f. The tandem switches main purpose is to switch trunks, routing them between class 5 switches. Many class 5 switches now have tandem switch capabilities blurring the line between class 4 and 5 switches.…

    • 568 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The first characteristic in the LAN architecture is the physical arrangement of the network. This is how the nodes connect. The topology of an LAN is the design pattern of interconnections between the computers and network sectors. The second component is the method of access for the nodes. Specifically, how the nodes connect to the transmission medium. A network interface card is a device that permits computers to be joined together in a network. The NIC acts as the translator; it allows the devices to direct data on the LAN. The NIC has a port to insert a cable that allows the device to be connected the network.…

    • 620 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    It230 Wk1 Checkpoint

    • 576 Words
    • 3 Pages

    References: Hallberg, B.A. (2010). Networking: A beginner’s guide (5th ed.). New York, NY: McGraw-Hill. https://portal.phoenix.edu/classroom/coursematerials/it_230/20130715/OSIRIS:45023271…

    • 576 Words
    • 3 Pages
    Good Essays
  • Best Essays

    Linux Course Project

    • 2602 Words
    • 11 Pages

    In the workplace today there are many different options for operating systems be they providers of server related services or end-user desktops there is a different Linux distribution for many different applications. There are also a number of advantages and disadvantages to adding onto or switching network operating systems within a company. In the following pages I would like to discuss some of the different options available to us and what apparent advantages the offer along with their disadvantages. Many operating systems are fundamentally the same. Servers provide access to files and information stored remotely within the network, while workstations provide application support as well as connectivity to the World Wide Web. You might say that when we talk about network operating systems there are generally two sides to the coin in a large network. The side of the workstation and the end-user, and the side of the server providing cloud storage, e-mail, and other remote end-user services.…

    • 2602 Words
    • 11 Pages
    Best Essays
  • Satisfactory Essays

    Is3350 Unit 4

    • 572 Words
    • 3 Pages

    * Discuss the inter-dependence of workstation hardware(network card, cabling; permissions; system bus; local-system architecture eg memory, processor, I/O devices) with network components.(P6,M3)…

    • 572 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    NT1210

    • 4443 Words
    • 28 Pages

    NT1210 Introduction to Networking Unit 2: Chapter 2, Introduction to Computer Networking 1 Objectives  Identify the major needs and stakeholders for computer networks and network applications.  Identify the classifications of networks and how they are applied to various types of enterprises. …

    • 4443 Words
    • 28 Pages
    Powerful Essays
  • Powerful Essays

    Date of Submission : 25-Feb-2011 Campus : Hendon School of Computing Science Dr G E Mapp Middlesex University List of Contents S.NO Content Page Number 1. Abstract 4 2. Introduction 4 3. Network Operating System 6 4.…

    • 4184 Words
    • 17 Pages
    Powerful Essays