Академический Документы
Профессиональный Документы
Культура Документы
1. List and describe the steps a computer goes through to obtain an IP address through DHCP:
The client broadcasts a DHCP DISCOVER packet to identify any available DHCP
servers on the Network. A DHCP server replies with a DHCP OFFER, which is a lease
offer message with an assigned IP Address, subnet mask, DNS server, and default
gateway information as well as the duration of the lease. The client will then broadcast a
DHCP REQUEST packet that identifies the DHCP server and lease offer that it is
accepting. Assuming that the IP address requested by the client, or offered by the server,
is still valid, the chosen server would return a DHCP ACKNOWLEDGMENT message.
The ACK message lets the client know that the lease is finalized.
2. List when you would want to apply static versus dynamic addressing and provide two
advantages and disadvantages of each:
Static addresses are preferred when setting up Network printers, servers, and other
Network devices that need to be accessible to clients on the network. If hosts normally
access a server at a particular IP address, it would not be good if that address changed.
Static Advantages:
Static Disadvantages:
Dynamic Advantages:
1. It reduces the burden on Network staff of having to manually assign all Network
configuration information and virtually eliminates entry errors.
2. Provides IP settings for home and small business users who may lack the
knowledge necessary to properly configure these settings manually.
Dynamic Disadvantages:
1. Can pose a security risk because any device connected to the Network can
receive IP address configuration information.
2. If assigned to servers, network printers, or other Network devices that are
frequently accessed, the IP address will change and the request will be sent to the
wrong destination.
3. What is ANDing? How does a router use ANDing?
ANDing is one of three basic binary operations used in digital logic. ANDing yields the
following results: 1 & 1 = 1, 1 & 0 = 0, 0 & 1 = 0, 0 & 0 = 0.
Routers use ANDing to determine an acceptable route for an incoming packet. The
router checks the destination address and attempts to associate this address with a next
hop. The router performs ANDing on the IP destination address in the incoming packet
and with the subnet mask of potential routes. This yields a Network address that is
compared to the route from the routing table whose subnet mask was used.
5. What is NAT and how does it correlate with private address range:
Because private addresses are not allowed on the internet, a process is needed for
translating private addresses into unique public addresses to local clients to
communicate on the Internet. The process used to convert private addresses to Internet
route-able addresses is called Network Address Translation (NAT). With NAT, a private
source IP address (local address) is translated to a public address (global address). The
process is reversed for incoming packets.
1. The initiating client sends a segment containing an initial sequence value, which
serves as a request to the server to begin a communications session.
2. The server responds with a segment containing an acknowledgment value equal
to the received sequence plus 1, plus its own synchronizing sequence value. The
acknowledgment value is 1 greater than the sequence number because there is no
data contained to be acknowledged. This acknowledgment value enables the
client to tie the response back to the original segment that it sent to the server.
3. The initiating client responds with an acknowledgment value equal to the
sequence value it received plus 1. This completes the process of establishing the
connection.
STEP 1: A TCP client sends a segment with the SYN control flag set, indicating an
initial value in the sequence number field in the header.
STEP 2: The server sends a segment back to the client with the ACK flag set,
indicating that the acknowledgment number is significant. With this flag
set in the segment, the client recognizes this as an acknowledgment that
the server received the SYN from the TCP client.
STEP 3: The TCP client responds with a segment containing an ACK that it is the
response to the TCP SYN sent by the server. This segment does not
include any user data. The value in the acknowledgment number field
contains one more than the ISN received from the server. After both
sessions are established between client and server, all additional segments
exchanged in this communication will have the ACK flag set.
7. TCP vs UDP, What are the differences:
HTTP: Port 80
FTP: Port 21 to establish, then Port 20 to transfer
SMTP: Port 25
POP3: Port 110
IMAP4: Port 143
WPA, unlike WEP, generates new, dynamic keys each time a client establishes a
connection with the AP. For this reason, WPA is considered more secure than WEP
because it is significantly more difficult to crack.
In some circumstances, stations might not be within range of the transmitting station and
are not able to detect the transmission. In cases such as this, RTS/CTS comes into play.
With RTS/CTS, a device that requires use of a specific communication channel in a BSS
asks permission from the AP. This is known as a Request To Send (RTS). If the channel
is available, the AP will respond to the device with a Clear to Send (CTS) message
indicating that the device may transmit on the channel. This method is used for collision
avoidance. (CSMA/CD Carrier Sense Multiple Access/Collision Detection).
1. Change default values for the SSID, user names and passwords
2. Disable remote management to prevent access from external networks
3. Allow communications to the device only through secure protocols
4. Disable broadcast SSID
5. Configure MAC address filtering
6. Configure encryption using WEP or WPA
14. Given a small company such as the one in Project AnyCompany, describe 5 security techniques
you would have setup for them to assure security remotely and internally:
I would use the Bottom-Up approach to solve this users problem. (This scenario is
assuming a home user on a broadband isp. Ex; Road Runner)
1. I would ask this user to look and make sure that all cables are plugged into the
proper ports.
2. If cables are plugged in, I would have them look to see if their ISP modem is
powered on and to make sure that the proper indicator lights are on.
3. I would have them reset the ISP modem by unplugging for 90 seconds.
4. In unsuccessful, I would now have the user go to run; cmd; and type in
IPCONFIG to see if they have an IP configuration.
5. If none is present, I would have them type in IPCONFIG /RENEW
6. If unsuccessful, guide them to internet settings; * never dial a connection; LAN
settings; automatically detect proxy settings. Repeat step 4.
7. If unsuccessful, guide them to Network places; NIC properties, TCP/IP
properties, and select DHCP settings. Repeat step 4.
8. If unsuccessful, I would proceed to ping their ISP modem to ensure that it is
functioning properly. If unsuccessful, set up service call.
19. List 4 software tools you would use to troubleshoot a computer accessing he Internet and how
these tools would help you diagnose problems:
a. Address Class: C
b. Default Subnet Mask: 255.255.255.0
c. Custom Subnet Mask: 255.255.255.192/26
d. Total Number of Subnets: 4
e. Total Number of Host Addresses: 64
f. Number of usable addresses: 62
g. Number of Bits Borrowed: 2