Preview

NETW202 W7 Lab

Satisfactory Essays
Open Document
Open Document
916 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
NETW202 W7 Lab
Enhancing the Security of Initial Switch Configuration iLab (17 points)
Write a paragraph (a minimum of five college-level sentences) below that summarizes what was accomplished in this iLab; what you learned by performing it; how it relates to this week’s TCOs and other course material; and, just as importantly, how you feel it will benefit you in your academic and professional career. (7 points)
This iLab allowed me to practice setting up the initial switch configuration and enhancing its security. I believe that it allows me to see the importance of this weeks TCO’s and work with other coruse materials well enough to get a better understanding of them. I believe this will allow me to set up security protocols in my future career and my academic life.
Copy and paste the following screenshots from your Enhancing the Security of Initial Switch Configuration iLab below.
Task 1, Step 7: Paste a screenshot after you use a show command on NYCORE1 to verify the SSH settings. (1 point)

Question: Why is SSH a better choice for remote access compared to the use of Telnet?
Hint: Read and study the explanations within the iLab for assistance. (1.5 points)
SSH is a better choice for remote access over Telnet because it allows for direct access into the system, and is more accessable. However if someone were to try to login via SSH, they would also need to know the password for Telnet, so it is a good idea to configure them together.
Task 1, Step 12: Console into NYCORE1. Check the ARP cache to find the MAC address that is mapped to: 10.1.1.1 (the second address value varies depending on which pod you were assigned for your iLab). (1 point)

Question: What is the purpose of the ARP cache, and how is it populated?
Hint: Read and study the explanations within the iLab for assistance. (1.5 points)
The purpose of the ARP cache is to adapt layer 2 to layer 3 and it is populated in most cases dynamically in order to update the ARP table.
Task 1, Step 18: Paste a screenshot

You May Also Find These Documents Helpful

  • Good Essays

    Nt1310 Unit 1 Question Paper

    • 4923 Words
    • 20 Pages

    allowed on all trunk links. An ARP request is sent by computer 5. Which device…

    • 4923 Words
    • 20 Pages
    Good Essays
  • Satisfactory Essays

    LAB8.1.1) Network ID is 110| Host id is 10.10.1|Network ID binary is 01101110 Host ID is 00001010.00001010.00000001…

    • 367 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 5 Lab JM

    • 625 Words
    • 5 Pages

    2. If not found build ARP request frame containing MAC address, IP Address, and forwarding IP address.…

    • 625 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IT255 Project 1

    • 663 Words
    • 2 Pages

    A priority to the LAN domain is proper security of physical equipment. Only authorized personnel are allowed to gain access into...…

    • 663 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1430

    • 285 Words
    • 1 Page

    i. Both are text-based protocols: mouse movements cannot be transferred only keystrokes. Both are connection-oriented and are client-server protocols. The main difference is in security. SSH offers security mechanisms that protect the user against anyone with malicious intent while Telnet has no security measures whatsoever.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    In this lab I was able to accomplish by using the show commands I learned how to investigate the network status. Not only will the benefit my professional career but it will also help me in the course on how to trouble shoot and learn the basics.…

    • 1117 Words
    • 6 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 3253 Words
    • 14 Pages

    For this you need to edit the /etc /network/interfaces file and you need to add the…

    • 3253 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    Why talk about Anderson v GMC or even Keck v Wesley Medical Center? Because staffing is still an issue. It will become more of an issue as reimbursement continues to be curtailed. Moreover, as patient ratios are increasingly mandated, and studies of the impact of nurse staffing on patient outcomes are providing a growing body of knowledge, it is not only possible but likely that now that we can know what is safe hospital leadership will be held liable if they do not maintain safe staffing levels. Indeed, in the Keck case, it is important to note that Keck never filed a suit or even a claim against the nurse assigned to her care. Making a profit at the expense of human life and well-being is and always will be an issue that is directly impacted…

    • 273 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Use the DETER Visualization tab to show the network and use arp and ifconfig commands to detect MAC and IP addresses for each machine.…

    • 2570 Words
    • 11 Pages
    Good Essays
  • Satisfactory Essays

    week 3

    • 311 Words
    • 2 Pages

    Write a paragraph (minimum five college-level sentences) below that summarizes what was accomplished in this lab, what you learned by performing it, how it relates to this week’s TCOs and other course material, and (just as important) how you feel it will benefit you in your academic and professional career. (8 points)…

    • 311 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Netw202 Week 2 Ilab

    • 579 Words
    • 3 Pages

    Write a paragraph (minimum five college-level sentences) below that summarizes what was accomplished in this lab, what you learned by performing it, how it relates to this week’s TCO’s and other course material; and just as important, how you feel it will benefit you in your academic and professional career. (10 points)…

    • 579 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Netstat

    • 481 Words
    • 2 Pages

    15. What command is used to log on to a remote server, computer, or router?…

    • 481 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The Department of Homeland Security are wide-ranging, and their goal is clear: “A safer, more secure America, which is resilient against terrorism and other potential threats.” The three key concepts form the foundation of our national homeland security strategy designed to achieve this vision: The three are as follows 1) Security 2), Resilience 3), Custom and Exchange. These concepts drive broad areas of activity that the Quadrennial Homeland Security Review (QHSR) process defines as homeland security missions. It prevent, to protect, to respond, and recover, as well as to build in security, to ensure resilience, and to facilitate customs and exchange. The responsibility falls on hundreds of thousands of people from across the federal government, state, local, tribal, and territorial…

    • 1767 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Edgar Allan Poe and Washington Irving are both enthralling writers. They both have unusual styles of writing but they are similar in some ways. The writers are comparable in the use of tone in their works. Irving‘s use of tone in his stories are typically optimistic, yet dramatic. Poe’s uses of tone in his stories are filled with horror and are also dramatic. Poe and Irving use different techniques to develop a complex meaning in their short stories. For instance, elements such as imagery, tone, and irony are placed in these stories contribute to make these stories intense.…

    • 751 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Assignment 3.1 Ccna Labs 2

    • 1221 Words
    • 5 Pages

    5. AUS(config)#line vty 04, AUS(config-line)#password cisco, AUS(config-line)#login, AUS(config-line)#exec-timeout 30 0 < - - optional, AUS(config-line)#logging synchronous < - - optional.…

    • 1221 Words
    • 5 Pages
    Powerful Essays