http://www.free-online-training-courses.com/configuring-tcpip/ The Place For Free Online Training Courses Improve Your Career Prospects Configuring TCP/IP This free lesson will teach you how to configure TCP/IP in windows and how to use the ipconfig command. Use the buttons below to navigate through the lesson To configure TCP/IP click on Start. Right-click on My Network Places. Select Properties. 1 of 5 Please purchase 'docPrint PDF Driver' on http://www.verypdf.com/artprint/index
Words: 682 - Pages: 3
server asking for an IP address. The server then automatically assigns one to the client out of the existing pool. Being that this is done automatically there is no need for the administrator to manually configure each client. Once the request is sent the client is assigned an IP address for an allotted time period, once the lease has expired a new request has to be sent and either the same or a new IP address will be assigned to that client. The server ensures that while an IP address is in use no
Words: 331 - Pages: 2
03 May 2014 Networking Basics NETWORKS Networks are made up of a basic personal computer, network interface card (NIC), hub, switch, or router. NIC card communicates to the rest of the computer. The NIC card connects the modem to the computer electrically. The NIC has a logic board that relays information to the computer. The NIC card figures out the speed at which information is sent from the computer to the internet. The network can potentially use a hub. Although a hub is rarely
Words: 1141 - Pages: 5
respond in detail with clarifying questions, suggested approaches and/or possible solutions. Dear IT Admin: I am working at a branch office and have been tasked with changing out the DHCP scope to match the overall corporate IP address scheme. The main office assigned me an IP address range of 192.168.0.200 through 192.168.0.225. I changed the scope on Friday afternoon and came in on Monday morning to discover that only some of the workstations had picked up new leases from the new DHCP scope. Any
Words: 276 - Pages: 2
|Chapter |Task |Commands | |11.02: Command-Line Interface |Privilege EXCE Mode (Enable & Disable)|IOS> enable | |(CLI) | |IOS# | | | |
Words: 2715 - Pages: 11
SNIFFING What is Sniffing? * Sniffing is a technique for gaining access through Network-Based attack. * A sniffer is a program that gathers traffic from the local network, and is useful for attackers looking to swipe data as well as network administrator trying to troubleshoot problems. * Using sniffer, an attacker can read data passing by a given machine in real time or store the data. What does one sniff? A sniffer can grab anything sent across the LAN, Including
Words: 266 - Pages: 2
Make a screen capture showing the details in the Host Details tab and paste it in your Lab Report file. Repeat steps 12 and 13 for each host in the scan. In the Command box, highlight -O, type -sV and press Enter to run a software version scan. In the SYN scan from earlier in the lab, Zenmap identified the services running on the machines, but not the versions. This scan will discover the versions of the software on open TCP ports and will make a guess at the OS based on the
Words: 1764 - Pages: 8
Lab #1 – Assessment Worksheet Assessing and Securing Systems on a Wide Area Network (WAN) IT-387 Ethical Hacking Course Name and Number: _____________________________________________________ Emmanuel Garcia Student Name: ________________________________________________________________ Jacob Boaheng Instructor Name: ______________________________________________________________ 09/29/2014 Lab Due Date: ________________________________________________________________ Overview In this lab, a
Words: 373 - Pages: 2
Question 1 of 20 | 5.0 Points | Which of the following refers to a piece of code designed to cause harm that is intentionally inserted into a software system and will activate upon the occurrence of some predetermined data, time, or event? | | A.Logic bomb | | | B.Trojan horse | | | C.Cracker | | | D.Denial of service (DoS) attack | | Answer Key: A | | | Question 2 of 20 | 5.0 Points | Denial of service (DoS) and distributed denial of service (DDoS) attacks have the
Words: 925 - Pages: 4
differences between ZeNmap GUI (Nmap) and Nessus? ZeNmap is used to map a network and Nessus is used to Test a network for vulnerabilities. 2. Which scanning application is better for performing a network discovery reconnaissance probing of an IP network infrastructure? Nmaps sole purpose is just that, network probing and recon. 3. Which scanning application is better for performing a software vulnerability assessment with suggested remediation steps? Nessus would be a better tool for
Words: 870 - Pages: 4