Final Exam: Wednesday, October 18

Slides:



Advertisements
Similar presentations
Module 4: Configuring Network Connectivity
Advertisements

11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
CS/IS 190 Final Review Final Exam: Wednesday, April 8.
1 Chapter Overview Using Remote Connections SLIP and PPP WAN Technologies.
1 Chapter 12 Remote Network Access Using Remote Connections SLIP and PPP WAN Technologies.
Basic Computer Network
IS Network and Telecommunications Risks
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
Chapter 8: Configuring Network Connectivity. Installing Network Adapters Network adapter cards connect a computer to a network. Installation –Plug and.
1 Chapter Overview Network devices. Hubs Broadcast For star topology Same as a repeater Operate at the physical layer 2.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
IT in Business Enterprise and Personal Communications Networks Lecture – 07.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco PublicNew CCNA Jianxin Tang IT 1 V4.0 Ch8. Fundamental Networks.
WAN Technologies Dial-up modem connections
Modems Mostly used to connect PCs to the Internet Modulates and demodulates the signal Converts analog data into digital and vice versa V.90/V.92 56K standards.
Copyright ©Universalinet.Com, LLC 2009 Implementing Secure Converged Wide Area Networks ( ISCW) Take-Aways Course 1: Cable (HFC) Technologies.
 Spring 2011  CSCI 27 Computer Networking Course Overview.
Network Fundamentals. Network Devices Routers (Layer 3)
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler.
Page 1 TCP/IP Networking and Remote Access Lecture 9 Hassan Shuja 11/23/2004.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Exploring the Enterprise Network Infrastructure Introducing Routing and Switching.
CS/IS 190 Final Review Final Exam: Wednesday, Oct. 21.
CSC 116 – Computer Networks Fall 2015 Instructor: Robert Spengler.
Troubleshooting Tools Kyle Broussard and Alexandra Mikolai.
Remote Access and Long-Distance Communications. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Typical Telephone.
CompTIA Network+ Certification Exam Question Answer N
 Two wireless gateways for home use that I choose are : - Linksys Wireless-G ADSL Home Gateway WAG354G - WAG160N Wireless-N ADSL2+ Gateway  The wireless.
Ethernet Utilities & Software
Top-Down Network Design Chapter Eleven Selecting Technologies and Devices for Enterprise Networks Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Networking and firewall
CompTIA Network+ Certification Exam
Chapter 7 Introducing Wide-Area Networks
Wireless Ethernet Programming
Lab #2 NET332 By Asma AlOsaimi.
Microsoft Specialist Guide to Microsoft Windows 10 (Exam , Configuring Windows Devices) Chapter 7 Networking Microsoft Specialist Guide to Microsoft.
MTA Network Fundamental Cram Sesion
Instructor Materials Chapter 1: WAN Concepts
CompTIA Network+ N Authorized Cert Guide
Network fundamentals Unit 10
CompTIA Security+ Study Guide (SY0-401)
Click to edit Master subtitle style
Network Security Solution
Connecting Desktops and Laptops to Networks
Instructor Materials Chapter 6 Building a Home Network
Working at a Small-to-Medium Business or ISP – Chapter 8
Understand Wide Area Networks (WANs)
CONNECTING TO THE INTERNET
Network Infrastructure
Instructor Materials Chapter 9: Testing and Troubleshooting
Planning and Troubleshooting Routing and Switching
Installing and Troubleshooting Networks
Click to edit Master subtitle style
Chapter 11: It’s a Network
CompTIA Network+ Certification Exam
Welcome To : Group 1 VC Presentation
Chapter 1: WAN Concepts Connecting Networks
CompTIA Security+ Study Guide (SY0-401)
Chapter 9 Objectives Understand TCP/IP Protocol.
Computer Technology Notes #4
Wireless Networking Chapter 23.
2018 Real CompTIA N Exam Questions Killtest
Chapter 12 Communications Security & Countermeasures
Network+ Guide to Networks 6th Edition
Chapter 7 Connecting to the Internet
Unit 27: Network Operating Systems
Digital Pacman: Firewall Edition
System Models and Networking Chapter 2,3
Instructor Materials Chapter 8: Applied Networking
Presentation transcript:

Final Exam: Wednesday, October 18 CS/IS 190 Final Review Final Exam: Wednesday, October 18

Final Overview Chapters 12 through 21 Multiple Choice Similar to questions at the end of each chapter and in the homeworks 50 questions You will have the full class time to complete

Chapter 12 Client / Server Peer to Peer (P2P) Virtual Private Network (VPN) Point-to-Point Tunneling Protocol (PPTP) Routing and Remote Access Service (RRAS) Layer 2 Tunneling Protocol (L2TP) Virtual Local Area Networks (VLANs) Trunking : 802.1Q trunk standard Static VLAN vs. Dynamic VLAN

Chapter 12 Multilayer Switches DNS Load Balancing Quality of Service (QoS) Traffic shaping Intrusion detection system (IDS) Intrusion prevention system (IPS) Port Mirroring Proxy Servers

Chapter 13 IPV6 128 Bits How to write addresses and how to shorten addresses 8 groups of four hexadecimal characters Leading zeros can be dropped from any group Use double colon to show groups of zeroes Link-Local Address (always starts with FE80:)

Chapter 13 Subnet masks Unicast Multicast Anycast No subnet is ever longer than /64 Unicast Multicast Anycast Global Unicast Address (Global Address) Gets from router Required to use the Internet Aggregation

Chapter 13 DHCP in IPv6 Using tunnels for IPv6 Stateful Stateless Tunnel Broker

Chapter 14 Remote Connectivity Plain Old Telephone Service (POTS) Multiplexers Frequency Division Multiplexing (FDM) DS0 (64 Kbps) T1 Line 24 DS0 channels 1.544 Mbps

Chapter 14 T3 Line About 43 Mbps 672 DS0 channels CSU/DSU

Chapter 14 Fiber Carriers SONET and OC OC-1 51.85 Mbps The rest of the OC multiply the number to get the speed : OC-3 is 51.85 * 3 = 155.52 Mbps

Chapter 14 Packet Switching Frame Relay Asynchronous Transfer Mode (ATM) Public Switched Telephone Network (PSTN) Modems Convert analog signals to digital and vice versa Universal Asynchronous Receiver/Transmitter (UART) Baud vs. Bits Per second ISDN Basic Rate Interface (BRI) = 128 Kbps Primary Rate Interface (PRI) = 1.544 Mbps (T1 Line)

Chapter 14 DSL Cable Internet (DOCSIS protocol) Satellite Wireless SDSL ADSL VDSL Cable Internet (DOCSIS protocol) Satellite Wireless Fiber Optics Powerline

Chapter 14 Remote Access Dial – up Private Dial-up VPNs Dedicated Connections Remote Terminals, Remote Desktop Voice over IP (VoIP)

Chapter 15 Wireless Networking Modes: Link state vs. Signal strength Ad Hoc Mode (Peer to Peer mode) Infrastructure Mode Link state vs. Signal strength Channels 14 channels, only 11 allowed in U.S.A. [for the 2.4 GHz standards] CSMA/CA

Chapter 15 802.11b 802.11a 802.11g 802.11n 802.11ac Security MAC address filtering Wireless authentication 802.1X RADIUS

Chapter 15 Data Encryption Power Over Ethernet Implementing Wi-Fi Wired Equivalent Privacy (WEP) [not secure] Wi-Fi Protected Access (WPA) [not secure] WPA2 Uses AES (Advanced Encryption Standard) Power Over Ethernet Implementing Wi-Fi Placing access points Configuration Extending the Network Adding a WAP Wireless Bridge

Chapter 16 Virtualization Hypervisor Virtual Machine Manager (VMM) Guest Operating System Emulation vs. Virtualization Why? The VM that is shut down is a file or folder Power Saving Hardware Consolidation System Recovery System Duplication Research

Chapter 16 Virtual Switches Virtual NICs Virtual PBXs Network as a Service (NaaS) Storage Area Networks (SANs) Network Attached Storage (NAS)

Chapter 17 Building a real-world network List of requirements Device types/requirements Environment limitations Equipment limitations Compatibility requirements Wired/wireless considerations Security considerations

Chapter 17 Equipment Room Electrical Limits VLANs IP address scheme Power converters Change AC to DC Electrical Limits VLANs IP address scheme External Connections Gateway router Choose ISP Security Network Segmentation Layer 1 – Air gap Layer 2 – VLANs Layer 3 – subnets Above layer 3

Chapter 18 Managing Risk Security Policies Change management Acceptable Use Policy Network Access Policy Change management Patching and Updates Points of Failure Avoid single point of failure High Availability

Chapter 18 Security Preparedness Contingency Planning Vulnerability Scanning Penetration Testing (pentest) Contingency Planning Disaster Recovery Business Continuity Cold site Warm site Hot site

Chapter 18 Emergency Procedures Building Layout Fire escape plan Safety/emergency exits Fail open / Fail close Emergency alert system

Chapter 19 Protecting your Network Spoofing Packet / Protocol Abuse ARP cache poisoning Denial of Service (DoS) Distributed DoS (DDos) Man in the Middle

Chapter 19 Malware Virus Worm Macro Trojan Rootkit Adware/Spyware

Chapter 19 Social Engineering Phishing Unnecessary Running Services Unpatched / Legacy Systems Unencrypted Channels Physical Security Network Security Controlling User Accounts Principle of least privelege

Chapter 19 Firewalls Access Control Lists (ACLs) Network Zones Network based Host Based Stateful vs. Stateless Access Control Lists (ACLs) Network Zones Demilitarized Zone (DMZ) Honeypots and Honeynets

Chapter 20 Network Monitoring SNMP Packet Sniffers / Protocol Analyzers Wireshark Run in NIC in promiscuous mode Performance Monitors Windows Performance Monitor (PerfMon) Linux’s syslog

Chapter 21 Network Troubleshooting Hardware Tools Cable Testers TDR OTDR Certifiers Voltage Recorders / Temp. Monitors Protocol Analyzer Cable Strippers / Snips Multimeters Toners Butt Sets Punchdown tools

Chapter 21 Software Tools Traceroute Ipconfig / Ifconfig Ping, pathping, and ARP Ping NSLookup Hostname My Traceroute (MTR) Route (Route Print or netstat -r) Packet Sniffers Port Scanners Throughput testers

Chapter 21 Troubleshooting Process: 1. Identify the problem 2. Establish a theory of probable cause. 3. Test the theory to determine cause. 4. Establish a plan of action to resolve the problem and identify potential effects. 5. Implement the solution and escalate as necessary. 6. Verify full system functionality and, if applicable, implement preventative measures. 9. Document findings, actions, and outcomes.

Final Exam Bring a #2 pencil and eraser. Mr. Hodges will supply the scantron form. Closed book, closed notes, closed computer Focus on items which were discussed in class 5 or 6 Extra Credit Questions which may be scenario-based like the questions seen on the CompTIA Network+ Exam.