Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Explaining the OSI and TCP/IP Models 1. How will knowing the OSI model help you perform networking tasks? 2. What is your experience with network

Explaining the OSI and TCP/IP Models


1. How will knowing the OSI model help you perform networking tasks?


2. What is your experience with network components?


Lesson 2 - Explaining Properties of Network Traffic


1. Which types of transmission media do you have experience working with?


2. Based on your course materials and or experiences. Which software tools have you found to be useful to capture and analyze network traffic?


Lesson 3 - Installing and Configuring Switched Networks


1. Have you encountered switching loops in your network? If so, what did you do to resolve the problem?


2. What category (or categories) of networks have you used (such as LAN, WAN, CAN, MAN, PAN, etc.)? Which have you been responsible for managing?


Lesson 4: Configuring IP Networks


1. Where would you expect to use custom subnet masks?


2. What measures have you taken to prepare for implementing IPv6?


Lesson 5 - Installing and Configuring Routed Networks


1. At your workplace, what situations might you use static routing for?


2. What dynamic routing protocol do you think you would recommend for implementation? Why?


Lesson 6 - Configuring and Monitoring Ports and Protocols


1. How do you see yourself using the tools covered in this lesson (like netstat, Nmap, Wireshark, nslookup, and dig)?


2. Will your organization host its own DNS servers or rely on third-party DNS servers? Why?


Lesson 7 - Explaining Network Application and Storage Services


1. Which *aaS do you plan to implement? Why?


2. Describe common roadblocks you might encounter while trying to implement virtualization.


Lesson 8 - Monitoring and Troubleshooting Networks


1. What network monitoring tasks have you used in your organization?


2. What method do you use when troubleshooting? Is it a formalized model documented within your organization?


Lesson 9 - Explaining Networking Attacks and Mitigations


1. Can you describe any exploited network vulnerabilities and/or threats and attacks that you have encountered?


2. Share your experiences with planning a VLAN infrastructure.


Lesson 10 - Installing and Configuring Security Devices


1. How does your organization use firewalls and proxies to protect the network, devices, and users?


2. What types of intrusion detection have been implemented in your organization?


Lesson 11 - Explaining Authentication and Access Controls


1. How does your organization manage patches and updates? Have you ever found the need to rollback updates? Why and how?


2. Do you believe there's value in conducting a penetration test in your organization? Why or why not?


Lesson 12 - Deploying and Troubleshooting Cabling Solutions


1. What types of cables do you have experience working with?


2. What challenges have you experienced when trying to deploy cabling systems?


Lesson 13 - Implementing and Troubleshooting Wireless Technologies


1. In your opinion, what are the primary considerations for implementing a wireless network?


2. What problems have you encountered when setting up a wireless network?


Lesson 14 - Comparing and Contrasting WAN Technologies


1. What methods have you used in your environments to connect to WANs?


2. Has your organization implemented any IoT devices? If so, what standard(s) are they based on?


Lesson 15 - Using Remote Access Methods


1. What remote administration tools are used in your workplace? Would you suggest others based on what you just learned?


2. Share your experiences with using VPNs. What protocols did you use? Can you think of any reasons why you would not update the protocols?


Lesson 16 - Identifying Site Policies and Best Practices


1. What security policies and physical security measures has your organization implemented? Are they cumbersome to use? Are they effective in protecting the network and its data?


2. What types of protections and measures does your company include in your business continuity plan?

Step by Step Solution

There are 3 Steps involved in it

Step: 1

Lesson 1 Explaining the OSI and TCPIP Models 1 Knowing the OSI model helps in understanding how data flows through a network It provides a structured ... blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Health Communication Theory Method And Application

Authors: Nancy Grant Harrington

1st Edition

0415824540, 978-0415824545

More Books

Students also viewed these Computer Network questions

Question

describe contingency planning for data aquisitions.

Answered: 1 week ago

Question

9.7 Evaluate methods used to treat sleep-wake disorders.

Answered: 1 week ago

Question

8.7 Explain how cocaine affects the brain.

Answered: 1 week ago