Subnetting | Default Subnet Mask | CIDR | Up to usable # Hosts | Default Network/Host | Typical Use | Class A: 1 - 126 | 255.0.0.0 11111111.00000000.00000000.00000000 | /8 | 16,777,214 224 -2 | N.H.H.H | Largest block allocation made by IANA | Class B: 128 - 191 | 255.255.0.0 11111111.11111111.00000000.00000000 | /16 | 65,524 216 -2 | N.N.H.H | ISP/Small ISP/large business | Class C: 192 - 223 | 255.255.255.0 11111111.11111111.11111111.00000000 | /24 | 254 28 -2 | N.N.N.H | Large
Words: 275 - Pages: 2
Chapter 10 Concept Question 1-6 1) If an ACL is not configured on an interface, what happens to all routable traffic entering or exiting that interface? Why does this happen? Traffic entering the interface is accepted for processing, and traffic exiting the interface is forwarded. By default, all traffic is permitted on an operational interface that has no access control. 2) A packet is evaluated against the statements in an ACLs. It matches none of the statements. What happens to the packet
Words: 632 - Pages: 3
File Transfer Protocol File Transfer Protocol (FTP) is a standard network protocol used to transfer files from one host or to another host over a TCP-based network, such as the Internet. FTP is built on a client-server architecture and uses separate control and data connections between the client and the server. FTP users may authenticate themselves using a clear-text sign-in protocol, normally in the form of a username and password, but can connect anonymously if the server is configured to
Words: 1088 - Pages: 5
network. 3.0 Documentation The network structure and configuration shall be documented and provide the following information: 1. IP addresses of all devices on the network with static IP addresses. 2. Server documentation on all servers as outlined in the "Server Documentation" document. 3. Network drawings showing: 1. The locations and IP addresses of all hubs, switches, routers, and firewalls on the network. 2. The various security zones on the network and devices
Words: 1654 - Pages: 7
Suffix, Link-Local IPv6 Address, and Default Gateway. It also states no operation can be performed on Local Area Connection while it has its media disconnected. After typing the command ipconfig/renew both the IP address and default gateway entries went back to what they were before. 5.3.2 The IP address returned as local host is 192.168.0.112 and the ping message is sent by default times. 5.3.3 The average time it took for the ping response to come back from the default gateway was 2ms. On average
Words: 339 - Pages: 2
use this address to uniquely identify themselves on the network. B- This address is used when routing communications between different network segments. D- This address is set at layer 3 of the OSI model. E- An example of this type of address is an IP address. A- Reliable C- Unreliable B- Reliable C- Connection oriented E- Data conversion B- Segment header added D- Packet creation and network header A- Frame header and trailers added C- Bit transmission B- A network spread over multiple
Words: 305 - Pages: 2
in one host to interact with a corresponding entity at the same layer in another host. 3. The TCP dates back into the 1960s on the DOD sponsored ARPANET. In 1973 the TCP/IP came to be and consisted of dozens of different protocols. Of these key protocols, two are usually considered the most important. The Internet Protocol (IP) is the primary OSI network layer (layer three) protocol that provides addressing, datagram routing and other functions in an internetwork. EX. 3.2 Review 1. The composition
Words: 719 - Pages: 3
Capture For this investigation, we have decided to use NetWitness Investigator to examine the packets captured from the computers in question. NetWitness Investigator is a software used to examine packets and list login information, transferred data, and IP addresses used, among others. For the purpose of this investigation, we are primarily concerned with the FTP (File Transfer Protocol) sessions and the file names they contained. We can use this information to identify the persons responsible for the
Words: 1241 - Pages: 5
Server question Ques 1 :-Which of the following is not a benefit of DHCP? 1. centralized administration of IP configuration 2. dynamic host configuration 3. seamless IP host configuration 4. portability of workstations ques 2:- Which of the following is not a component of DNS? 1. DNS namespace 2. DNS zones 3. DNS resource records 4. DNS relay agent Ques 3:- A starting address of 192.0.0.0 and an ending address of 223.255.255.255 is a member of which
Words: 4583 - Pages: 19
Tutorial/Practical 2 (Week 3) – CP3302/CP5603 Remarks: • This tutorial/practical consists of some tutorial-type questions that are chosen from ‘Review Questions’ in Chapters 2 and 3 of the textbook, as well as some practical-type questions that are chosen from: Michael E. Whitman and Herbert J. Mattord, Hands-On Information Security Lab Manual, (third edition), Course Technology, Cengage Learning, USA, 2011. • This tutorial/practical may not be completed in the scheduled practical session for this
Words: 3431 - Pages: 14