Preview

NETW202 W7 Lab

Satisfactory Essays
Open Document
Open Document
916 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
NETW202 W7 Lab
Enhancing the Security of Initial Switch Configuration iLab (17 points)
Write a paragraph (a minimum of five college-level sentences) below that summarizes what was accomplished in this iLab; what you learned by performing it; how it relates to this week’s TCOs and other course material; and, just as importantly, how you feel it will benefit you in your academic and professional career. (7 points)
This iLab allowed me to practice setting up the initial switch configuration and enhancing its security. I believe that it allows me to see the importance of this weeks TCO’s and work with other coruse materials well enough to get a better understanding of them. I believe this will allow me to set up security protocols in my future career and my academic life.
Copy and paste the following screenshots from your Enhancing the Security of Initial Switch Configuration iLab below.
Task 1, Step 7: Paste a screenshot after you use a show command on NYCORE1 to verify the SSH settings. (1 point)

Question: Why is SSH a better choice for remote access compared to the use of Telnet?
Hint: Read and study the explanations within the iLab for assistance. (1.5 points)
SSH is a better choice for remote access over Telnet because it allows for direct access into the system, and is more accessable. However if someone were to try to login via SSH, they would also need to know the password for Telnet, so it is a good idea to configure them together.
Task 1, Step 12: Console into NYCORE1. Check the ARP cache to find the MAC address that is mapped to: 10.1.1.1 (the second address value varies depending on which pod you were assigned for your iLab). (1 point)

Question: What is the purpose of the ARP cache, and how is it populated?
Hint: Read and study the explanations within the iLab for assistance. (1.5 points)
The purpose of the ARP cache is to adapt layer 2 to layer 3 and it is populated in most cases dynamically in order to update the ARP table.
Task 1, Step 18: Paste a screenshot

You May Also Find These Documents Helpful

  • Good Essays

    Nt1310 Unit 1 Question Paper

    • 4923 Words
    • 20 Pages

    allowed on all trunk links. An ARP request is sent by computer 5. Which device…

    • 4923 Words
    • 20 Pages
    Good Essays
  • Satisfactory Essays

    Documents NETW240 Wk4 Lab

    • 1983 Words
    • 10 Pages

    Configure static networking on a Linux PC (host11) so that it can communicate with the other server (host12) in your lab environment.…

    • 1983 Words
    • 10 Pages
    Satisfactory Essays
  • Satisfactory Essays

    LAB8.1.1) Network ID is 110| Host id is 10.10.1|Network ID binary is 01101110 Host ID is 00001010.00001010.00000001…

    • 367 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 5 Lab JM

    • 625 Words
    • 5 Pages

    3. All hosts receive and process request. If forwarding address matches device ARP cache is updated with address map to sender. If no match, request is discarded.…

    • 625 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    Week 4 B IP Subnetting Lab

    • 2462 Words
    • 19 Pages

    configuration, there are 5 segments which need to be addressed: three Ethernet interfaces and two…

    • 2462 Words
    • 19 Pages
    Powerful Essays
  • Satisfactory Essays

    IT255 Project 1

    • 663 Words
    • 2 Pages

    A priority to the LAN domain is proper security of physical equipment. Only authorized personnel are allowed to gain access into...…

    • 663 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1430

    • 285 Words
    • 1 Page

    i. Both are text-based protocols: mouse movements cannot be transferred only keystrokes. Both are connection-oriented and are client-server protocols. The main difference is in security. SSH offers security mechanisms that protect the user against anyone with malicious intent while Telnet has no security measures whatsoever.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    In this lab I was able to accomplish by using the show commands I learned how to investigate the network status. Not only will the benefit my professional career but it will also help me in the course on how to trouble shoot and learn the basics.…

    • 1117 Words
    • 6 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 3253 Words
    • 14 Pages

    After entering all the details you need to restart networking services using the following command…

    • 3253 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    Task 2, Step 4: Paste a screenshot showing the route table of the Tokyo router. (2 points)…

    • 570 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    week 3

    • 311 Words
    • 2 Pages

    Write a paragraph (minimum five college-level sentences) below that summarizes what was accomplished in this lab, what you learned by performing it, how it relates to this week’s TCOs and other course material, and (just as important) how you feel it will benefit you in your academic and professional career. (8 points)…

    • 311 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Netw202 Week 2 Ilab

    • 579 Words
    • 3 Pages

    Write a paragraph (minimum five college-level sentences) below that summarizes what was accomplished in this lab, what you learned by performing it, how it relates to this week’s TCO’s and other course material; and just as important, how you feel it will benefit you in your academic and professional career. (10 points)…

    • 579 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Netstat

    • 481 Words
    • 2 Pages

    15. What command is used to log on to a remote server, computer, or router?…

    • 481 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The Department of Homeland Security are wide-ranging, and their goal is clear: “A safer, more secure America, which is resilient against terrorism and other potential threats.” The three key concepts form the foundation of our national homeland security strategy designed to achieve this vision: The three are as follows 1) Security 2), Resilience 3), Custom and Exchange. These concepts drive broad areas of activity that the Quadrennial Homeland Security Review (QHSR) process defines as homeland security missions. It prevent, to protect, to respond, and recover, as well as to build in security, to ensure resilience, and to facilitate customs and exchange. The responsibility falls on hundreds of thousands of people from across the federal government, state, local, tribal, and territorial…

    • 1767 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Assignment 3.1 Ccna Labs 2

    • 1221 Words
    • 5 Pages

    5. AUS(config)#line vty 04, AUS(config-line)#password cisco, AUS(config-line)#login, AUS(config-line)#exec-timeout 30 0 < - - optional, AUS(config-line)#logging synchronous < - - optional.…

    • 1221 Words
    • 5 Pages
    Powerful Essays