NTC/362 Fundamentals of
Networking |
|
Or you may purchase tutorials by the Week below.
|
|
|
|
|
NTC/362 Week 1
Includes Everything listed below for Week 1, A+ Work!
NTC/362 Wk 1 – MindTap Unit 1 Quiz
Use the MindTap Access link to access this assignment.
Complete MindTap Unit 1 Quiz (Unit 1: Introduction > Unit 1 Apply > Unit 1 Quiz).
- Which type of address is used at the Transport layer to identify the receiving application?
- You have a network that consists of seven computers running Windows 10 Professional. You add an eighth computer with Windows Server 2016 installed. Which networking model can the network now support that it could not support without the addition of the eighth computer?
- Which email protocol allows an email client to download email messages to the local computer?
- In the client-server model, what is the primary protocol used for communication between a browser and web server?
- A network consists of five computers, all running Windows 10 Professional. All the computers are connected to a switch, which is connected to a router, which is connected to the Internet. Which networking model does the network use?
- You have a network of ten computers connected to a single switch that has 12 ports. You need to add six more computers to the network so you add a second switch by connecting it to the first switch by way of a network cable. Which network topology is now used?
- Which application embedded in Windows operating systems allows remote control of a computer and uses the RDP secure protocol for transmissions?
- A network consists of seven computers and a network printer, all connected directly to one switch. Which network topology does this network use?
- Which two encryption protocols might be used to provide secure transmissions for browser and web server communications?
- Which email protocol allows an email client to read mail stored on the mail server?
NTC/362 Wk 1 – MindTap Unit 12 Quiz
Your instructor wants you to submit your work offline, but you can view your grade online.
Use the MindTap Access link to access this assignment.
Complete the MindTap Unit 12 Quiz (Unit 12: Wide Area Networks > Unit 12 Apply > Unit 12 Quiz).
- What specifications define the standards for cable broadband?
- What kind of network is the PSTN?
- What method does a GSM network use to separate data on a channel?
- What is the lowest layer of the OSI model at which LANs and WANs support the same protocols?
- ______________ in SONET are analogous to the ________________ of T-carriers.
- How many channels are in an ISDN PRI connection?
- Which DSL standard has the fastest speeds immediately outside the CO?
- What kind of device can monitor a connection at the demarc but cannot interpret data?
- An organization can lease a private _________________ that is not shared with other users, or a _________________ that can be physically configured over shared lines in the carrier’s cloud.
- Where does an MPLS label go in a PDU?
Additional Class Tutorials Included with Week 1 Purchase:
Individual Networking: Practice Lab
Screenshot of completion of Ping.
Screenshot of completion of Traceroute.
OSI Model Presentation
Includes 3 Full Presentations with speaker notes
Individual: Cable Replacement Recommendation
Includes Option #1 and Option #2
References:
• Table 2-2 Different Categories for Twisted-pair Cable, Based on
TIA568B
• NTC362r5 Table Template Week One
• Mayberry Satellite Campus Network Diagram
Review the Network Configuration Visio® document of the Mayberry
Satellite Campus contained in the assignment instructions (located on
the right hand side of this assignment page). Note: the Mayberry
Satellite Campus diagram will be used throughout the course.
Scenario: As an IT networking trainee for your organization, your
supervisor has given you an assignment to review and evaluate ways
for improving the network at the Mayberry Satellite Campus. Your task,
as detailed below, includes reviewing the existing network cabling and
providing a recommendation to improve the speed of the network.
Use the Microsoft® Word template file (NTC362r5 Table Template Week
One) to build a table that indicates the specifications of two possible
hard-wired solutions that would improve the speed of the network. Note:
remove the table instructions prior to submitting. Points will be
penalized if the instructions are included in the document.
Include, in the same document, a 150- to 300- word explanation that
identifies how a wireless solution with wireless access points could also
improve the speed of the network. Reference and cite, in APA format,
at least one valid Internet source. Note 1: word count and APA table
formatting are graded items. Note 2: zipping the file before submitting is
not necessary and points will be penalized for doing so.
Submit your assignment using the Assignment Files tab.
WEEK 1 Discussion Question Questions & Answers (Included)
NOTE: Discussion Questions may be different, depending on Instructor.
Discussion Question: Introduction to the OSI Protocol Model Format
After reviewing the concepts in Ch. 1, "Introduction to Computer Networks," of Networking Essentials, compare and
contrast the TCP/IP network model and the 7-layer OSI network model. When would you use one over the other?
Which model is more important for network analysis?
Discussion Question: Fiber Maps
Compare and contrast how alogical fiber map differs from a physical fiber map as depicted in Figures 3-19 and 3-20 of
Ch. 3, "Physical Layer Cabling: Fiber Optics," of Networking Essentials. Why are both necessary for illustrating the
logical and physical layouts of the network? Are they useful for documenting and planning the fiber network?
Discussion Question: Network Diagrams
Throughout the course you will be working with network diagrams.
Research free network diagraming programs, such as Lucidchart and Gliffy on the Internet.
Discuss your findings on programs you may use in this course and the common symbols that are used in network diagrams in the attached Visio® files.
Discussion Question: Networks
What are the 5 things that come to your mind when you hear the term “networks” & why?
Discussion Question: Network Characteristics
What are some of the things/attributes that you expect from a network?
Discussion Question: Standards Organizations
Standards are important in any industry. Discuss the various standards organizations utilized in the telecom & data networking industry. Do they have conflicting charters or have they worked in different areas to form a coordinated industry overview?
Discussion Question:: VOIP vs. POTS
What are some of the tradeoffs one needs to consider when planning on switching over from POTS to VOIP service. Does your organization use POTS or VOIP. If VOIP, please share your organization’s experience on this.
Discussion Question: Introduction to Telecommunications
What are the advantages and disadvantages of the various modulation techniques of analog signals?
Discussion Question: Introduction to Voice Telecommunications
Discuss the history and progression of the voice telecommunications industry. What are the current voice network standards?
Discussion Question: VOIP
What are some considerations an organization should look at when moving from a traditional phone system to VoIP? Explain the impact on an organization when using VoIP.
Discussion Question: Introduction to Telecommunications Network Structures
Standards are important in any industry. Discuss the various standards organizations utilized in this industry. Do they have conflicting charters or have they worked in different areas to form a coordinated industry overview?
Discussion Question: ATT Break-up
What effect did the AT&T breakup have on the eventual growth of the digital network we have today?
Discussion Question: ISO
The ISO is the international parent standards organization. What are some lower-level standards organizations? What part of telecommunications are they responsible for?
Discussion Question: PBX vs Centrex
How does a PBX’s method of handling internal calls differ from Centrex service? What does the local exchange carrier provide? What does your company use?
|
|
|
|
|
|
NTC/362 Week 2
Includes Everything listed below for Week 2! A+ Work!
NTC/362 Wk 2 - MindTap Unit 2 Quiz (with Answers!)
Your instructor wants you to submit your work offline, but you can view your grade online.
1. Use the MindTap Access link to access this assignment.
Complete MindTap Unit 2 Quiz (Unit 2: Network Infrastructure and Documentation > Unit 2 Apply > Unit 2 Quiz).
Note: You will have only one attempt at completing this assignment.
- Which of the following devices are you likely to find in the MDF? Choose all that apply.
- Which device converts signals from a campus’s analog phone equipment into IP data that can travel over the Internet?
- What type of diagram shows a graphical representation of a network’s wired infrastructure?
- A transceiver was recently damaged by a lightning strike during a storm. How might you decide whether the ISP is responsible for replacing this device, or whether your company must foot the bill?
- You need to connect a new network printer to a nearby wall jack. What kind of cable should you use?
- You’ve decided to run an Nmap scan on your network. What app could you open to perform this task? Choose all that apply.
- If you’re shopping for a rack switch, what component on the switch tells you it can be mounted to a rack?
- A technician from your ISP has arrived to help you troubleshoot a weak WAN connection. To what location do you take her?
- What is the first step of inventory management?
- Which of these is considered a secure place to store a list of documented network passwords?
Wk 2 – MindTap Unit 5 Quiz (with Answers!)
Your instructor wants you to submit your work offline, but you can view your grade online.
Use the MindTap Access link to access this assignment.
Complete MindTap Unit 5 Quiz (Unit 5: Network Cabling > Unit 5 Apply > Unit 5 Quiz).
- What kind of cable uses BNC connectors? Which connector is likely to be used by cable TV?
- Which part of a toner and probe kit emits an audible tone when it detects electrical activity on a wire pair?
- Which fiber connector contains two strands of fiber in each ferrule?
- Which transmission characteristic is never fully achieved?
- What is the earliest twisted-pair cabling standard that meets the minimum requirements for 10GBase-T transmissions?
- Which kind of multiplexing assigns slots to nodes according to priority and need?
- What type of fiber cable problem is caused when pairing a 50-micron core cable with a 62.5-micron core cable?
- Suppose you’re creating patch cables to be used in a government office. What color wire goes in the first pin?
- Which of these categories of twisted-pair cable can support Gigabit Ethernet?
- Which kind of crosstalk occurs between wire pairs near the source of the signal?
Additional Class Tutorials Included with Week 2 Purchase:
Individual: Understand Network Protocols - HTTP, HTTPS, NetBIOS,
TCP, and UDP
Complete the module "Understand Network Protocols - HTTP, HTTPS,
NetBIOS, TCP, and UDP" in the Practice Lab "N10-006 CompTIA
Network+."
Note: In this module, you will look at the Wireshark tool and learn how
to capture network traffic.
Capture screenshots after completing each Wireshark capture. Paste
screenshots in a Word document.
Submit your assignment using the Assignment Files tab.
Individual: Expansion of the Mayberry Satellite
Includes both Microsoft Word and Microsoft Visio Files! A+ Work!
Review the Network Configuration Visio® document of the Mayberry
Satellite Campus. This diagram will be used throughout the course.
Scenario: As an IT networking trainee for your organization, your
supervisor has given you an assignment to extend the Mayberry
Network to an additional space (see existing diagram). The organization
has obtained a space to create a 20-station learning center and two
classrooms at the existing location. Each classroom will have one
computer for the instructor and a wireless access point for the students.
Typically, your supervisor has used computers with an Intel Core i5
processor, 16 GB of RAM, a 500 GB hard drive and a 10/100/1000
Ethernet NIC, but wonders if a better solution is available and would like
you to recommend a solution.
Develop a 1-page network diagram using Microsoft® Visio®, or one of
the free network diagramming programs you researched in Week One,
to create a drawing of the learning center. The diagram should include:
• 22 computers that you specify
• Detailed specification for cabling, routing and switching, and wireless
or VLAN options to connect to the existing network
Submit your assignment using the Assignment Files tab.
Learning Team: Diagram Current Local Campus Network
Includes both Microsoft Word and Microsoft Visio Files! A+ Work!
Before reading the following team instructions, it is vital to visit the
Library tab and examine all the materials in the Learning Team Toolkit
(right-hand side of the page). As well, specific requirements for
individual team members is stated in the Instructor Policies document
under the Learning Teams section. The Instructor Policies document
can be found on the Class Home page of the course under Policies
(right-hand side of the page).
Throughout the course you will be working with improvements to the
Bedford Campus and its satellite campus in Mayberry. The Bedford
Campus with its 12 full-time employees and two classrooms has
recently increased its online enrollment to 1500 students working
asynchronously. The increase in student population has had a
significant slowdown in the network connectivity in the classroom.
Reports have stated that it can take up to twenty minutes, sometimes
longer, to get connected to the online classroom or to get to the
Internet.
Your team has been tasked with determining the root cause of this
problem. The analysis should begin by taking a holistic view of the
Bedford Campus network diagram to understand the topology. Then,
progress through the OSI model to find the problem. Also, look for
potential choke points that could cause a significant network slowdown.
After locating the potential cause of the problem, design a network with
a proposed solution.
Develop a 1-page network diagram using Microsoft® Visio®, or one of
the free network diagramming programs you researched in Week One,
of improvements that could be made to the current configuration,
include the following:
• Routers and Switches
• Wireless Access Point solutions
• VLAN solutions
• Possible resolutions to potential choke points you have identified
WEEK 2 Discussion Question Questions & Answers
NOTE: Discussion Questions may be different, depending on Instructor.
Discussion Question: Lab Debrief
Discuss with the class what issues you may have had with the labs you completed in Week One and how you
overcame them. Share what you learned, what to watch for in the future, and if there are any additional questions you
may have that your facilitator can answer.
Discussion Question: Topologies of Computer Systems
Discuss issues that may arise in distributed versus centralized computer systems. What topologies can be used to
best serve a distributed computer system using wireless communication? How can a VLAN help manage the
communication in the network?
Discussion Question: TCPdump
Using the course learning materials, valid internet sources, and related personal experience, research TCPdump.
When you run the TCPdump command it will capture all the packets for specified interface, until you hit the cancel
button. Typically this command is used in Linux-based networks.
Discuss how to control the amount of traffic you capture and the device you capture it from.
Discussion Question: Fundamentals of Digital Signals
Discuss the nature of digital signals, binary, and other multilevel signal types. What are the advantages of digital
signals over analog signals? Cover noise suppression in your explanation.
Discussion Question: Transmission Media
In designing a network what are some of the factors that should be considered before selecting the transmission media to use & why?
Discussion Question: Network Designs
Why is it useful to have both a logical design and a physical design of a network?
Discussion Question: Wireless Networks
What are the most appropriate uses for wireless? and Why?
What are the least appropriate uses for wireless? and Why?
Would you recommend a wireless only network solution for large enterprises? Justify your recommendation.
Discussion Question: Transmission Media Security
Which transmission media is the most secure? and why?
Discussion Question: Digitization of Analog Signals
Provide a specific example of digitizing analog signals in the telephone system. Explain band limiting and quantization noise. Explain the µ law and the A law conversion in the coder-decoder.
Discussion Question: Digital Systems and the Digital Hierarchy
Explain digital multiplexing, the digital T(X), and SONET hierarchy. Explain the differences between the American and European systems.
Discussion Question: Digital Services
Explain digital services such as Integrated Services Digital Network, Switched Multimegabit Data System, and Switch 56.
Discussion Question: Introduction to Modems
What are the various modulation techniques? Begin your explanation with frequency-shift keying and move to multilevel QAM.
Discussion Question: Voice and Data Network
What are some of the challenges being faced by organizations when they implement voice and data into a network?
Discussion Question: Ubiquitous integration challenges
Organizations today are attempting to integrate voice, data, e-mail, and collaboration software. What are some things they should considerate when they do this?
Discussion Question: Mediums
Explain the differences between, UTP, STP, Coax, Wireless and Fiber. (speeds, cost, types, when you would use one verses the other).
Discussion Question: Asynch Vs. Synch
How do asynchronous and synchronous transmissions differ? Which is better suited to large blocks of data, and why?
|
|
|
|
|
NTC/362 Week 3
Includes Everything listed below for Week 3! A+ Work!
NTC/362 Wk 3 - MindTap Unit 3 Quiz
Use the MindTap Access link to access this assignment.
Complete the MindTap Unit 3 Quiz (Unit 3: Addressing on Networks > Unit 3 Apply > Unit 3 Quiz).
- What decimal number corresponds to the binary number 11111111?
- When your computer first joins an IPv6 network, what is the prefix of the IPv6 address the computer first configures for itself?
- You have just brought online a new secondary DNS server and notice your network-monitoring software reports a significant increase in network traffic. Which two hosts on your network are likely to be causing the increased traffic and why?
- Suppose you send data to the 11111111 11111111 11111111 11111111 IP address on an IPv4 network. To which device(s) are you transmitting?
- Which computers are the highest authorities in the Domain Name System hierarchy?
- If you are connected to a network that uses DHCP, and you need to terminate your Windows workstation’s DHCP lease, which command would you use?
- What type of device does a computer turn to first when attempting to make contact with a host with a known IP address on another network?
- Which type of DNS record identifies an email server?
- Which of these commands is available only in Linux?
- Which part of a MAC address is unique to each manufacturer?
Additional Class Tutorials Included with Week 3 Purchase:
Individual: Understand How Software as a Service (SaaS) Works
Complete the module "Understand How Software as a Service (SaaS)
Works" in the Practice Lab "N10-006 CompTIA Network+."
Note: In this module, you will look at SaaS. This will help with your
additional assignments for the week.
Capture screenshots after completing each step. Paste screenshots in
a Word document.
Submit your assignment using the Assignment Files tab.
Learning Team: Process Storyboard
Includes 2 Options and Microsoft Visio file to make your own changes! A+ Work
Before reading the following team instructions, it is vital to visit the
Library tab and examine all the materials in the Learning Team Toolkit
(right-hand side of the page). As well, specific requirements for
individual team members is stated in the Instructor Policies document
under the Learning Teams section. The Instructor Policies document
can be found on the Class Home page of the course under Policies
(right-hand side of the page).
Throughout the course you will be working with improvements to the
Bedford Campus and its satellite campus in Mayberry. The Bedford
Campus with its 12 full-time employees, Learning Center, and two
classrooms has recently increased its online enrollment to 1500
students working asynchronously. The increase in student population
has had a significant slowdown in the network connectivity in the
classroom. Reports have stated that it can take up to twenty minutes,
sometimes longer, to get connected to the online classroom or to get to
the Internet.
Based on your Week Two diagram and this week's
discussions, develop a 6- to 8-slide storyboard document using
Microsoft® PowerPoint®.Your storyboard should depict a timeline for
improvements to the Bedford Campus and its Mayberry Satellite. The
storyboard should include the following:
• Current issues identified and how they were identified
• Wireless and cloud-based solutions to connectivity issues
• A possible timeline for implementing your solutions
• Personnel resources needed to implement your solution
• Costs that need to be considered for your solution and timeline
Submit your assignment using the Assignment Files tab.
Individual: Hosting in the Cloud
Includes Option #1, Option #2, and Option #3
Scenario: In analyzing the network performance at the Bedford
Campus, one issue that has come to light is the insufficient network and
server infrastructure that is in place to support delivery of the school's
Learning Management System (LMS) and Exchange email service over
the public internet to a growing student body. One possible solution to
this issue is migration of the LMS and Exchange email to a cloud
computing provider.
Your task is to prepare a 2- to 3-page table (using Microsoft® Word) to
help the leadership decide on a cloud-based solution. Note: page count
and APA table formatting is required.
Research the following types of services:
• Platform-as-a-Service (PaaS) - as examples: Amazon, Rackspace
• Infrastructure-as-a-Service (IaaS) - as examples: Microsoft® Azure®
• Software-as-a-Service (SaaS) - as examples: Office 365®,
Blackboard Learn™
Your table should compare the offering for the following criteria:
• Cost
• Availability of service to students
• Security
• Administrative burden on the school's IT department
Use the Microsoft® Word template file (NTC362r4 Table Template Week
Three) to build the table and remove the instructions prior to
submitting. Points will be penalized if the instructions are included in the
document.
Include, in the same document, a 350-word executive brief or summary
using Microsoft® Word that answers the following questions:
• Based on your table, what service would you recommend and why?
• How would you implement a cloud solution into the existing campus
network structure?
• What elements of the existing network could be eliminated if cloudbased
hosting is used?
• Would this cloud structure work regardless of how many students
enroll?
Reference/Cite at least two different sources for this assignment.
Format your document consistent with APA guidelines. Note: APA
formatting, table page count (2-3 pages minimum), and the executive
brief word count (350 words minimum) are graded items.
Submit your assignment using the Assignment Files tab.
WEEK 3 Discussion Questions & Answers
NOTE: Discussion Questions may be different, depending on Instructor.
Discussion Question: Switches and Routers
Using the course learning materials, valid internet sources, and related personal experience, research the advantages
and disadvantages of routers and switches in a LAN.
Discuss specific situations when you would use a switch versus a router and how each can address such issues as
response time, jitter, and latency.
Discussion Question: Cloud-based Architecture
When organizations need to modernize their existing network by moving to a cloud-based architecture, leadership has to determine if this structure is viable for the organization.
Discuss the advantages and disadvantages in adopting a cloud structure compared to an existing structure.
Discussion Question: Router/Switch Commands
After completing the lab assignments this week, or after conducting further research on router/switch commands, list at least three commands used in the setup of switches and/or routers, provide a coded example, and explain how the commands work.
Discussion Question: Introduction to Circuit Switching
What are the basic concepts of circuit switching? What are the advantages and disadvantages of circuit switching?
Discussion Question:TCP/IP vs OSI Protocol Stacks
Pictorially model the TCP/IP protocol against the 7-layer OSI model.
In your depiction, include the common protocols that fit in the various levels
Discussion Question: TCP vs. UDP Layer 4 Protocols
What is the difference between UDP and TCP? When would you use one over the other?
Discussion Question: Connectionless vs. Connection Oriented packet networks
What are some of the advantages & disadvantages of connection oriented networks over connectionless networks? Give one example of each.
Discussion Question: LAN vs. WAN
How do LANs and WANs compare in terms of reach, bandwidth, complexity, scalability and reliability? Justify your answer?
Discussion Question: Introduction to Packet Switching
What is a packet? What is packet switching? How would you explain the concept of packet switching? What are the advantages and disadvantages of packet switching over circuit switching? What is a packet?
Discussion Question: Introduction to Network Channels, Processors, and Media
What are the advantages and disadvantages of network processors, such as hubs, switches, routers, and gateways? What are the three main types of network media? What is their performance in terms of reliability, speed capabilities, and nominal distance for reliable spans?
Discussion Question: VCs what are they?
What is a virtual Circuit in a packet switched network? What types of VC are available and how are they different? Why is it beneficial to use VCs?
Discussion Question: TCP/IP 4 Vs. 6
Describe the difference between TCP/IP V4 and V6. What happened to V5?
Discussion Question: What is CIDR
Define what CIDR means and how it works.
Discussion Question: Network Congestion
What are some methods to resolve network congestion? Determine what the traffic is.
|
|
|
|
|
NTC/362 Week 4
Includes Everything listed below for Week 4! A+ Work!
NTC/362 Wk 4 - MindTap Unit 4 Quiz
Use the MindTap Access link to access this assignment.
Complete the MindTap Unit 4 Quiz (Unit 4: Network Protocols and Routing > Unit 4 Apply > Unit 4 Quiz).
- Which OSI layer is responsible for directing data from one LAN to another?
- At which OSI layer does IP operate?
- What kind of route is created when a network administrator configures a router to use a specific path between nodes?
- Which two protocols manage neighbor discovery processes on IPv4 networks?
- Which routing protocol does an exterior router use to collect data to build its routing tables?
- What field in a TCP segment is used to determine if an arriving data unit exactly matches the data unit sent by the source?
- A routing protocol’s reliability and priority are rated by what measurement?
- When a router can’t determine a path to a message’s destination, where does it send the message?
- Which protocol’s header would a Layer 4 device read and process?
- What is the Internet standard MTU?
NTC/362 Wk 4 - MindTap Unit 8 Quiz
Use the MindTap Access link to access this assignment.
Complete the MindTap Unit 8 Quiz (Unit 8: Subnets and VLANs > Unit 8 Apply > Unit 8 Quiz).
- Which formulas can be used to calculate the magic number? Choose two.
- How many bits of a Class A IP address are used for host information?
- Which IEEE standard determines how VLANs work on a network?
- Which port mode on a switch enables that port to manage traffic for multiple VLANs?
- What is the formula for determining the number of possible hosts on a network?
- Which of the following is not a good reason to segment a network?
- What do well-chosen subnets accomplish?
- Which hexadecimal block in an IPv6 address is used for the Subnet ID?
- What is the least number of bits you would need to borrow from the network portion of a Class B subnet mask to get at least 130 hosts per subnet?
- While designing your network’s VLAN topology, your team has decided to use a centrally managed DHCP server rather than creating a separate DHCP server for each VLAN. What software will you need to make the central DHCP server accessible across VLANs?
NTC/362 Wk 4 MindTap Unit 11 Quiz
Use the MindTap Access link to access this assignment.
Complete the MindTap Unit 11 Quiz (Unit 11: Network Performance and Recovery > Unit 11 Apply > Unit 11 Quiz).
- When shopping for a new router, what does the MTBF tell you?
- While troubleshooting a recurring problem on your network, you will want to examine the TCP messages being exchanged between a server and a client. Which tool should you use?
- One of your coworkers downloaded several, very large video files for a special project she’s working on for a new client. When you run your network monitor later this afternoon, what list will your coworker’s computer likely show up on?
- Which power backup method will continually provide power to a server if the power goes out during a thunderstorm?
- What port do SNMP agents listen on?
- Your roommate has been hogging the bandwidth on your router lately. What feature should you configure on the router to limit the amount of bandwidth his computer can utilize at any one time?
- What command requests the next record in an SNMP log?
- Which of the following features of a network connection between a switch and server is not improved by link aggregation?
- What field in an IPv4 packet is altered to prioritize video streaming traffic over web surfing traffic?
- Which type of disaster recovery site contains all the equipment you would need to get up and running again after a disaster, and yet would require several weeks to implement?
Additional Class Tutorials Included with Week 4 Purchase:
Learning Team: Adding Another Satellite Campus
Includes Option #1, Option #2, and Option #3
Before reading the following team instructions, it is vital to visit the
Library tab and examine all the materials in the Learning Team Toolkit
(right-hand side of the page). As well, specific requirements for
individual team members is stated in the Instructor Policies document
under the Learning Teams section. The Instructor Policies document
can be found on the Class Home page of the course under Policies
(right-hand side of the page).
Scenario: The IT leadership team has determined that the college will
add another satellite campus.
Students will be allowed to connect to the network from personallyowned
mobile devices. Troubleshooting services will be limited for the
students so you must provide a Bring Your Own Device (BYOD) best
practice guideline for students to help them manage their personal
mobile devices. Your task, as a team, is to create a single (1) document
demonstrating how to configure the mobile device settings for an
Android OR Apple device (not both). Include the following with
screenshots to demonstrate your knowledge:
1. Update your operating system and applications
2. Back up your data
3. Limit ad tracking under "Privacy, Advertising"
4. Set up SIM card lock
5. Disable Bluetooth and/or WIFI when not in use
6. Set up email on your mobile device
Paste the screenshots into a Microsoft® Word document to demonstrate
the appropriate configurations and provide a 350-word narrative using
Microsoft®Word to assist the student in applying appropriate settings to
their device. Note: word count is a graded item.
Reference/Cite at least one source per team member for this
assignment.
Format your document consistent with APA guidelines.
Submit your assignment using the Assignment Files tab.
Individual: Troubleshooting Tool Guide for the Installation of the New
Satellite Campus
Includes Option #1 and Option #2
Scenario: The IT leadership team has determined that the college will
add another satellite campus that will have a Learning Center with 20
computers and 10 classrooms. Each classroom will have one computer
for the instructor and a wireless access point for the students. In
anticipation of issues that may arise when installing new hardware and
software, you have been asked to create a Troubleshooting Tool Guide
that identifies tools, including some of the free tools that you discovered
in your research, that can be used to troubleshoot the following:
• Connection to the ISP
• Routers and Switches
• Wireless access points
• Any new hardware
• Any new network cabling
• IP addressing problems
• VLAN problems
Your task is to prepare a 2- to 3-page table using Microsoft® Word with
the table column heading of Troubleshooting Tool and Example. The
rows are bulleted above. In the cells identify what tool could be used
and give an example from the labs, videos, or readings of how to use
the tool. Note: page count, APA table formatting, and the inclusion of
APA reference(s)/citation(s) are graded items.
Use the provided Microsoft® Word template file (NTC362r4 Table
Template Week Four) to build the table and remove the instructions
prior to submitting. Points will be penalized if the instructions are
included in the document.
Submit your assignment using the Assignment Files tab.
Individual: Understanding Common Ports and Protocols
Complete the module "Understanding Common Ports and Protocols" in
the Practice Lab "CompTIA Security+."
Note: This modules uses Wireshark to analyze traffic through some of
the common ports. In Week Two, you started working with this tool.
This week you can practice to feel more comfortable with the tool that
you will use in your upcoming security course.
Capture screenshots after each Wireshark capture. Paste screenshots
in a Word document.
Submit your assignment using the Assignment Files tab.
WEEK 4 Discussion Questions & Answers
NOTE: Discussion Questions may be different, depending on Instructor.
Discussion Question: Network Management Tools
Discuss network management tools that can be used with LAN, WAN, and wireless technologies. Can a similar
approach be used in wired versus wireless approaches?
Discussion Question: Packet Capture
Using the course learning materials, valid internet sources, and related personal experience, research packet capture
analysis tools like TCPdump and Wireshark, and free network management tools, like Capsa Free and Pandora FMS.
Provide an example of how an individual would use TCPdump as a troubleshooting tool.
Discuss how to choose a packet analysis or network management tool given various network configurations.
Discussion Question: Troubleshooting
After completing the lab assignments this week, explain how Wireshark can be applied as a troubleshooting tool and provide an example of how the application of Wireshark could be used in industry. As an optional response, if you have experience using an alternate tool (or have researched other tools), explain how the tool can be applied and provide an example of how the alternative can be used in industry
Discussion Question: Network Operating Systems
What are the predominant network operating systems in use today? What are the differences between LAN and WAN operating systems?
Discussion Question: Introduction to Wireless
Differentiating among the protocols used in wireless (Media Access Control layer, FDMA, TDMA, and CDMA), what are the problems with existing protocols with satellite communications?
Class Discussion: Network Segmentation
What is network segmentation? Why would a network administrator want to segment a network? What are some of the techniques for segmenting a network?
Class Participation Activity: Network Processors
What are the advantages and disadvantages of network processors, such as hubs, switches, routers, and gateways?
Discussion Question: Virtual LAN
What are Virtual LANs (VLANs) and what are the advantages of using them?
Discussion Question: IP Addressing
What is class-based IP Addressing & what are some of the problems with it?
Discussion Question: OSI and Internet
What layers of the OSI are used when you access the Internet? What protocols are used?
Discussion Question: SMTP & MIME
What is SMTP designated for? What additional capabilities are included in MIME?
Discussion Question: Satellite Delays
If I have an application where the maximum allowed end-to-end delay is 150 milliseconds, why can’t I use a geosynchronous orbit satellite as a communication link?
Discussion Question: Monitoring and Troubleshooting LANs
What should be considered when monitoring and troubleshooting a network?
Discussion Question: Wireless Security Issues
What type of security issues need to be considered when implementing a Wireless LAN?
Discussion Question: Why Go Wireless?
What are some of the reason an organization might consider using a Wireless LAN?
|
|
|
|
|
NTC/362 Week 5
Includes Everything listed below for Week 5! A+ Work!
NTC/362 Wk 5 - Network Security Assignment
You are in networking at a large international company. Your company recently decided to implement a cross-training initiative, and you have been selected to give a presentation to an audience of non-networking professionals working at various departments in your company. Your presentation must be clear and concise enough to convey technical information to professionals who have a limited understanding of how networking actually works. However, it must also be accurate enough that your audience can understand how their company roles (such as scheduling resource-hogging reports, allowing contractors access to the system, and setting the hours international customers can place orders on your company’s system) can impact the company’s network, particularly in terms of security.
You decide to answer the following questions before handing off the material to an assistant to turn into a graphic-rich presentation. Each of your answers should be about 150 to 250 words long.
- You decide to begin your presentation by providing your audience an overview of networking, with an emphasis on security and why it is important for all company roles to assist in securing the company’s network. You decide to use the OSI model to explain the fundamental characteristics and components of networks because it is visual and presents the complexity of network communication in just 7 steps.
- Next, you plan to describe basic routing and switching in the context of the OSI model (i.e., in which layer routing, switching, and cabling occur). To underscore your department’s commitment to achieving 24/7 availability, you describe some strategies your department follows to ensure the availability of network access in switched and routed networks.
- Then, you describe at least three characteristics of an effective security policy, emphasizing the ways in which all departments in the company are responsible for helping secure the company network.
- To reassure your audience of your network’s security, you list some strategies your department used to build security directly into the design of your company network.
- Finally, malware has been in the news a lot lately, and you know you will be asked some questions about it. To answer them, you come up with a layperson-friendly definition of malware and identify at least two strategies your department has put into place for protecting your company’s network against malware.
NTC/362 Wk 5 - MindTap Unit 10 Quiz
Complete the MindTap Unit 10 Quiz (Unit 10: Security in Network Design > Unit 10 Apply > Unit 10 Quiz). Note: You will have only one attempt at completing this assignment.
- What kind of firewall blocks traffic based on application data contained within the packets?
- What feature of Windows Server allows for agentless authentication?
- Which of the following features is common to both an NGFW and traditional firewalls?
- Which NGFW feature allows a network admin to restrict traffic generated by a specific game?
- Which command on an Arista switch would require an SNMP notification when too many devices try to connect to a port?
- At what layer of the OSI model do proxy servers operate?
- What software might be installed on a device to authenticate it to the network?
- Active Directory and 389 Directory Server are both compatible with which directory access protocol?
- Which of the following is not one of the three AAA services provided by RADIUS and TACACS+?
- Which of the following ACL commands would permit web-browsing traffic from any IP address to any IP address?
NTC/362 Wk 5 - MindTap Lab 10-1: Implement a Host-based Firewall
Your instructor wants you to submit your work offline, but you can view your grade online. Use the MindTap Access link to access this assignment.
Complete MindTap Lab 10-1: Implement a Host-based Firewall (Unit 10: Security in Network Design > Unit 10 Live Virtual Machine Labs > Lab 10-1: Implement a Host-based Firewall).
Additional Class Tutorials Included with Week 5 Purchase:
Learning Team: Additional Satellite Presentation
Includes Option #1, Option #2, and Option #3
Before reading the following team instructions, it is vital to visit the
Library tab and examine all the materials in the Learning Team Toolkit
(right-hand side of the page). As well, specific requirements for
individual team members is stated in the Instructor Policies document
under the Learning Teams section. The Instructor Policies document
can be found on the Class Home page of the course under Policies
(right-hand side of the page).
Scenario: The IT leadership team has determined that the college will
add another satellite campus that will have a Learning Center with 20
computers and 10 classrooms. Each classroom will have one computer
for the instructor and a wireless access point for the students.
Create a 14- to 16-slide Microsoft® PowerPoint® presentation, including
Introduction, Conclusion, and Reference slides, that contains the
following:
• Specifications for the new satellite campus to include:
• Connection for the ISP
• Routers and Switches
• Wireless access points
• Any new hardware
• Any new network cabling
• IP addressing strategy
• VLAN strategy
• Network diagram of the proposed solution
• A description of how you will assure your design will providing robust
telecommunication services, including security, privacy, reliability, and
performance
Note: Other applications like Adobe® Spark or Microsoft® Sway® or Mix
can be used instead of PowerPoint®.
Be sure to include supportive graphics and appropriate backgrounds
and styles. All references need to adhere to APA guidelines, and
images should not be copied unless author permission is obtained or
copyright free images are used.
Submit your assignment using the Assignment Files tab.
Individual: Networking Training Guide
Includes 3 FAQ Word Docs and 3 Full Presentations with Speaker Notes!
Throughout the course you have been working with improvements to
the Bedford Campus and its satellite campus in Mayberry and an
additional satellite. Because of your work, you have been promoted
from IT networking trainee to IT networking technician. A new trainee
will be starting next week and your boss has asked you to provide a
training guide for the new trainee highlighting the knowledge and skills
you have developed.
Using Individual and Learning Team assignments and discussions as
reference, compile your guide as follows:
As a reference, compile the final network diagrams (1 page each) for all
campuses with all of the improvements you and your team have made.
Create a 1- to 2-page Frequently Asked Questions (FAQ) in the form of
a table in Microsoft® Word including the following questions:
• What is the difference between a distributed and a centralized
computer system? Describe the underlying principles and issues of
distributed versus centralized computer systems and how cloud-based
solutions have altered current networking solutions. Refer to the
network diagrams you created as an illustration of a distributed network.
• What are the major network topologies? Refer to the network
diagrams you created as an illustration of the logical and physical
topology you employed.
• Why are standards bodies essential in networking and the Internet?
• Why are the OSI and TCP/IP network models important in
networking? Provide an example from one of the labs that illustrates the
performance of one of the protocols you used.
• What are the major TCP/IP protocols in use today? Provide an
example from one of the labs that illustrates troubleshooting an issue
with a protocol you used.
• What is the difference between a LAN and a WAN?
• What is meant by the terms latency, response time, and jitter, and
what tools could you use to measure these?
• What is VOIP, and what older technologies does it replace?
Create a 14- to 16-slide Microsoft® PowerPoint® presentation, including
Introduction, Conclusion, and Reference slides, that contains thefollowing:
• An accurate description of the "building blocks" of today's data
communication networks, such as switches, routers, and cabling.
Provide examples from your network diagram of each building block.
• A concise strategy to ensure the availability of network access in
switched and routed networks. Provide illustrations from your
improvements to the original campus networks.
• An explanation of how firewalls mitigate some network attack
scenarios. Give at least two examples from your solutions to the
campus network that illustrates how you mitigated network attacks.
• A list of at least five security concerns inherent to wired, wireless,
and mobile networking.
• A description of at least 3 responsibilities networking teams face in
providing networking services, including security, privacy, reliability, and
performance.
Note: Other applications like Adobe® Spark or Microsoft® Sway® or Mix
can be used instead of PowerPoint®.
Be sure to include supportive graphics and appropriate backgrounds
and styles. All references need to adhere to APA guidelines, and
images should not be copied unless author permission is obtained or
copyright free images are used.
Submit your assignment using the Assignment Files tab.
Individual: Threats – Trojan and Malware Protection – Activating a
Trojan
Includes Option #1 and Option #2 with Screenshots
Complete the module "Threats - Trojan and Malware Protection -
Activating a Trojan" in the Practice Lab "CompTIA Security+."
Note: This modules shows the activation and removal of a Trojan.
Capture a screenshot after Step 8. Paste screenshot in a Word
document.
Submit your assignment using the Assignment Files tab.
WEEK 5 Discussion Question Questions & Answers
NOTE: Discussion Questions may be different, depending on Instructor.
Discussion Question: Security Concerns
Discuss the security concerns inherent to wired, wireless, and mobile networking. How must the different "building
blocks" of data communication networks such as switches, routers, and cabling be secured?
Discussion Question: Firewalls
Discuss how firewalls can be used to mitigate some network attack scenarios and how they may effect availability
Discussion Question: Discussion Question
What are the predominant electronic and physical threats to communications networks?
Discussion Question: Risks and Mitigations
What are the most probable risks and the most destructive risks for your environment and how would you suggest to mitigate them?
Discussion Question: Discussion Question: Policies & Procedures
What is the importance of explicit enterprise security policies, procedures, enforcement and training?
Discussion Question: Discussion Question: Components of the DRP
What are the main components of a disaster recovery plan for the enterprise?
Discussion Question: Discussion Question: Evaluations of Networks
What are some things we need to evaluate when protecting our network?
|