CIS246 Connectivity with Lab


CIS246 Connectivity with Lab
The internet layer defines the protocols used for addressing and routing the data packets which includes IP…


SKU: CIS 246 Connectivity with Lab Course Categories: , , , Tags: , , , , ,


CIS246 Connectivity with Lab

CIS246 Connectivity with Lab

A+ Quiz Week 1-7| Discussions Week 1-7

Quiz Week 1-7 

Click Here: CIS246 Quiz Week 1-7

Quiz Week 1

Click Here: CIS246 Quiz Week 1

(TCO 1) Which statement describes an advantage of networks?

Networks require decentralized management

Isolating network devices decreases costs

Isolating network devices allows implementation of the sneakernet file sharing method

Networks enable multiple users to share devices

(TCO 1) A(n) _____ is a network of computers and other devices that is confined to a relatively small space, such as one building or even one office





(TCO 1) Which of the following enables resource sharing by other computers on the same network?





(TCO 1) _____ are standard methods or formats for communication between networked devices


Data packets



(TCO 1) A(n) _____ is a computer installed with the appropriate software to supply web pages to many different clients upon demand

Web server




(TCO 2) _____ is an organization composed of more than a thousand representatives from industry and government who together determine standards for the electronics industry and other fields, such as chemical and nuclear engineering, health and safety, and construction





(TCO 2) _____ is a technical advisory group of researchers and technical professionals interested in overseeing the Internet’s design and management





(TCO 2) The top, or seventh, layer of the OSI model is the _____ layer





(TCO 2) Protocols at the _____ layer accept application layer data and format them so that one type of application and host can understand data from another type of application and host

Data link




(TCO 2) The _____ layer is the lowest, or first, layer of the OSI model




Data link

CIS246 Connectivity with Lab

Quiz Week 2 

Click Here: CIS246 Quiz Week 2

(TCO 3) A signal’s _____ is the amount of signal strength loss as it moves down a wire or fiber strand





(TCO 3) A patch cable in which the termination locations of the transmit and receive wires on one end of the cable are reversed is known as a(n) _____.

media converter

multimode fiber


crossover cable

(TCO 3) One of the most common transmission flaws affecting UTP data signals is _____.





(TCO 3) _____ signals are composed of pulses of non-visible light





(TCO 3) The motherboard contains _____, or openings with multiple electrical contacts, that allow devices such as NICs, modems, or sound cards to connect to the computer’s expanded bus

Connector pins


Expansion slots

Transceiver placement slots

(TCO 4) _____ are devices that connect two network segments by analyzing incoming frames and making decisions about where to direct them based on each frame’s MAC address

Multistation access units

PC cards



(TCO 4) To determine the path to a network address, routers use the _____.




Routing table

(TCO 4) _____ are combinations of networking hardware and software that connect two kinds of networks





(TCO 4) The loss of a signal’s strength as it travels away from its source is known as _____.





(TCO 4) A complex combination of pure topologies is known as a _____ topology





CIS246 Connectivity with Lab

Quiz Week 3 

Click Here: CIS246 Quiz Week 3

(TCO 7) _____ provides information about where data should be delivered, including the data’s source and destination addresses





(TCO 7) _____ is an application layer protocol used to retrieve messages from a mail server





(TCO 7) _____ is a mail retrieval protocol that was developed as a more sophisticated alternative to POP3




(TCO 8) _____ is a network layer protocol that reports on the success or failure of data delivery





(TCO 8) _____ is a network layer protocol that obtains the MAC (physical) address of a host, or node, and then creates a database that maps the MAC address to the host’s IP (logical) address





(TCO 8) _____ is an automated means of assigning a unique IP address to every device on a network





(TCO 8) _____ is a utility that can verify that TCP/IP is installed, bound to the NIC, configured correctly, and communicating with the network





(TCO 8) In classful addressing, the Class B IPv4 address network ID is located in the _____.

Last 8 bits

Last 16 bits

First 8 bits

First 16 bits

(TCO 8) Filesharing in a Windows domain is known as _____.




Map Drive

(TCO 8) A command-line utility that provides information about a network adapter’s IP address, subnet mask, and default gateway is _____.





CIS246 Connectivity with Lab

Quiz Week 4 

Click Here: CIS246 Quiz Week 4

(TCO 9) The term _____ memory refers to the RAM chips that are installed on the computer’s system board and whose sole function is to provide memory to that machine.





(TCO 9) Sun Microsystems’ _____ is a popular remote file system type supported by UNIX and Linux.





(TCO 10) The printer queue is a _____ representation of the printer’s input and output.





(TCO 9) Every UNIX and Linux system contains full documentation of UNIX commands in the _____ pages.





(TCO 10) A _____ is a group of users, servers, and other resources that share a centralized database of account and security information.




Leaf object

(TCO 10) The primary function of the UNIX _____ is to coordinate access to all your computer’s hardware, such as the disks, memory, keyboard, and monitor.



Directory system

Pipe system

(TCO 9) In LDAP-compatible directories, a _____ is the set of definitions of the kinds of objects and object-related information that the database can contain.





(TCO 9) _____ is stored on the hard disk as a page file, the use of which is managed by the operating system.

Virtual memory



Physical memory

(TCO 9) The _____ account is a predefined user account that has the most extensive privileges for resources both on the computer and on the domain that it controls (if it is a domain controller).





(TCO 10) The relationship between two domains in which one domain allows another domain to authenticate its users is known as _____.

An object relationship

Time sharing

A file relationship

A trust relationship

CIS246 Connectivity with Lab

Quiz Week 5 

Click Here: CIS246 Quiz Week 5

(TCO 11) The most popular WLAN standard is _____.





(TCO 11) In _____, a wireless signal splits into secondary waves when it encounters an obstruction.




Bounce back

(TCO 11) The purpose of a _____ is to advertise the presence of a WiFi network.





(TCP 11) The command-line function _____ is for viewing and setting wireless interface parameters and is common to nearly all versions of Linux and UNIX.





(TCO 11) If intermittent and difficult-to-diagnose wireless communication errors occur, _____ might be the culprit.

Incorrect encryption

SSID mismatch


Incorrect antenna placement

(TCO 12) When a caller uses an IP telephone, his or her voice is immediately digitized and issued from the telephone to the network in _____ form.





(TCO 12) A(n) _____ messaging strategy that makes several forms of communication available from a single user interface.





(TCO 12) _____ is the use of one network to simultaneously carry voice, video, and data communications.





(TCO 12) SIP and H.323 regulate _____ for VoIP or video-over-IP clients and servers.

Call signaling only

Control only

Call signaling and control

Communication between media gateways

(TCO 12) Skype, the popular Internet telephony software, is a type of _____.

IP telephone




CIS246 Connectivity with Lab

Quiz Week 6 

Click Here: CIS246 Quiz Week 6

(TCO 6) A _____ attack occurs when a hacker tries numerous possible character combinations to find the key that will decrypt encrypted data.




Brute force

(TCO 6) An NOS that contains a “back door” is an example of a risk associated with _____.


Transmission and hardware

Protocols and software

Internet access

(TCO 6) The use of certificate authorities to associate public keys with certain users is known as _____.





(TCO 6) A _____ attack occurs when a system becomes unable to function because it has been deluged with data transmissions or otherwise disrupted.



war driving


(TCO 6) RADIUS and TACACS belong to a category of protocols known as _____ (AAA).

access, authorization, and accounting

authentication, authorization, and accounting

authentication, authorization, and authority

authentication, authorization, and access

(TCO 6) _____ is intended to eliminate single points of failure.





(TCO 6) _____ is where one server continually duplicates the transactions and data storage of another.


Server mirroring



(TCO 6) _____ detects malware by comparing current characteristics of files and disks against an archived version of these characteristics to discover any changes.

Integrity checking

Polymorphic scanning

Signature scanning

Heuristic scanning

(TCO 6) A _____ attack occurs when a hacker uses programs that try a combination of a user ID and every word in a dictionary to gain access to the network.

Brute force




(TCO 6) _____ is a specialized storage device or group of storage devices that provides centralized fault-tolerant data storage for a network.




Optical media

CIS246 Connectivity with Lab

Quiz Week 7 

Click Here: CIS246 Quiz Week 7

(TCO 5) The individual geographic locations connected by a WAN are known as _____.

WAN sites

WAN links

Network service providers

Central offices

(TCO 5)  _____ is when computing resources are available and charged to the customer on an as needed basis.





(TCO 5) _____ is an updated, digital version of X.25 that also relies on packet switching.



Frame Relay


(TCO 5) The speed of a T-carrier depends on its _____

Signal capacity

Data rate



(TCO 5) A WAN point-to-point technology is _____


Broadband cable



(TCO 5) A SONET ring could use the _____ data standard.





(TCO 13) _____ is the preferred communications protocol for connecting to remote access servers.





(TCO 13) In a _____ VPN, tunnels connect multiple sites on a WAN.





(TCO 5) Delivering hosted services over the Internet is known as _____.

On-demand hosting

Remote hosting

Cloud computing

Provider manager services

(TCO 5) _____ is responsible for IP addressing and domain name management.





CIS246 Connectivity with Lab

Course Discussions Week 1-7 All Students Posts – 364 Pages 

Click Here: CIS246 Course Discussions Week 1-7

Week 1 All Students Posts – 56 Pages

Click Here: CIS246 Course Discussions Week 1

Networking in Society – 30 Pages 

Click Here: CIS246 Networking in Society

Explain ways that networking has changed society in the past 10 years. Do you feel that computer networking has impacted your life? Please explain. Identify some pros and cons to the virtual classroom environment as compared to the traditional face-to-face classroom environment?
Pros of virtual classroom include being able to attend class at anyplace with an internet connection. You can attend class in the comfort of your own home and you wouldn’t have to worry about students in class distracting you like in a face-to-face classroom environment.

The cons of virtual classroom can include flaws in network connection which disconnects you from class. Teaching can also be more effective in a face-to-face classroom environment when compared to a virtual classroom…

Peer-to-Peer and Client-Server Environments – 26 Pages 

Click Here: CIS246 Peer to Peer and Client Server Environments

What kind of network does your current or former workplace have: peer to peer or client-server? What problems does it have? What are some ideas to improve it? If you don’t know which, explain what you think would have worked best and describe the circumstances.

The way our networking is set up here is a little complicated. There are devices that are on MAC lists that have authorization to access the access point. There is layer 3 through 7 filtering. So yes… a little complicated. We have a LAN and wireless network in the house, with a domain controller, and a centralized Symantec EndPoint Protection (SEP) server. We also have a file share server with Access Controls List (ACLs) with permissions down to the file level. The client server aspect would be the SEP, the file share server, and the domain controller. The problems, is that there aren’t any redundancies for SEP or the domain controller so the if there is any maintenance that needs to be done that requires a reboot, the network can be unavailable. One of the good things is that the file share server is at RAID level 5, so we can lose up to, 2 hard-drives without losing data…

CIS246 Connectivity with Lab

Week 2 All Students Posts – 51 Pages 

Click Here: CIS246 Course Discussions Week 2

Transmission Basics – 28 Pages

Click Here: CIS 246 Transmission Basics

The lecture covers several standards. Which ones are most common? Which ones are more or less obsolete? What can you find out about the future of transmission and media types? What is happening with 10 Gbps? What about 100 Gbps? What environmental factors would you commonly take into account when choosing which media to implement in a given situation?

Most common transmission media today is fiber optics and the many variables of twisted pair copper cable. When discussing environmental factors everything is in risk mitigation. What I mean by this is that you really wouldn’t connect two routers together with copper cable, the amount of data and the speed required to have a good network just isn’t there with copper cable, thus you would use fiber optics. Then we discuss copper cable or twisted pair as it is most commonly know these days; coax is more for just your cable TV these days. So for twisted pair you have to know where the cable is being placed, do you need plenum cable or not. If you are running cable through the floor or wall then it is mostly required to be plenum, plenum means the space between the floor and walls and in cable terms it also means the cable is fire rated. Then you could use non-plenum cable to hook up the computer to the wall socket for connection. Are you concerned with security, then you would use shielded twisted pair and if security isn’t a large concern you can use un-shielded twisted pair. There are price challenges with each cable selection and possible training issue with the installation of a particular cable. Will CAT 5 cable suit your needs or should you purchase the CAT 6 cable. CAT 6 is certified for Gigabit networking and will show better performance within longer distances…

Networking Hardware and Topologies – 23 Pages 

Click Here: CIS246 Networking Hardware and Topologies

Let’s figure out what kind of networking equipment an organization would need to buy. You can make assumptions on size and budget. What do we need to purchase? Why do we need to purchase it? That is, what will it do for us? How do we hook them together? That is, how do we cable them (or not cable them) together? Why is there such a big difference in price with the brands? How do network topologies figure into our selections and designs?  Hubs were used frequently in the 1980s. Why don’t we incorporate hubs into our networks as much anymore? Can you name some additional network devices or cabling that have become obsolete? Why is that the case?

I believe that the reason hubs have become obsolete is because the switch box does more or less the same thing, but is actually faster at doing it. This is because with a hub, every device connected will always be communicating to every other device connected simultaneously. This creates a lot of unneeded traffic that slows down the overall process of data. The switch box, on the other hand, sends data directly between the devices that are involved with the exchange. This switch box is superior in speed and by relation it is also superior in security/privacy. As for obsolete cabling, the very first thing that comes to mind is the phone line. The telephone poles, as we still call them, seem to have just about everything BUT telephone lines on them now days. I believe this is because companies such as Verizon have actually integrated the internet, cable, and phone transmissions all into the same line. It’s not until these lines enter the individual house that they are divided into their respective functions…

CIS246 Connectivity with Lab

Week 3 All Students Posts – 54 Pages 

Click Here: CIS246 Course Discussions Week 3

TCP/IP – 30 Pages 

Click Here: CIS246 TCP IP Course Discussions

There is an alphabet soup of protocols in TCP/IP: HTTP, FTP, SMTP, POP3, TCP, UDP, IP, ARP, ICMP, and others. What are the characteristics of these protocols? What are they used for? Has there been an evolution in any of these protocols? Are there any weaknesses or disadvantages? What exactly is TCP/IP, and what are the four layers that TCP/IP can be broken down into?

TCP stands for transmission control protocol. IP stands for Internet protocol. TCP/IP is the basic communication language (or protocol) of the internet. There are four layers: application, transport, Internet, and network interface. The application layer provides user access to network resources. It basically ensures a connection is made to an appropriate port. It also defines the rules, commands, and procedures that client software uses to talk to a service running on a server. The lecture has a good example: The HTTP protocol defines how Web browsers and Web servers communicate…

Network Servers – 24 Pages

Click Here: CIS 246 Network Servers

Search the Internet for Windows servers by Dell, IBM, HP, and others. What are the features and prices? Which ones do you think would be appropriate for the various Windows Server 2008 editions? It is okay not to understand all of the specifications. When you find something you don’t know, ask the class. Server virtualization is the way forward for many organizations today. What is server virtualization all about? Why is it beneficial? When would it not be useful?

Server Virtualization is the masking of server resources such as the number and identity of individual physical servers, processors, etc. With the rising costs of technology, virtual servers allow people/companies to keep having to have physical servers at every worksite, you can virtualize that server and thus save some cash and also reduces service interruptions. One of the drawbacks to server virtualization is when one server fails, they all do. Another drawback is that virtual servers require a lot of space/hardware to run effectively…

CIS246 Connectivity with Lab

Week 4 All Students Posts – 52 Pages 

Click Here: CIS246 Course Discussions Week 4

Understanding and Applying Active Directory – 24 Pages 

Click Here: CIS246 Understanding and Applying Active Directory

Active Directory (AD) is arguably the most critical component of Windows Server 2008, certainly for larger organizations. It enables corporations to manage and secure their resources from a single directory service and with a common interface—a very powerful tool. Because it is so powerful and offers so many features and capabilities, it sometimes can be complex to those looking at it for the first time. This week, we are going to learn about AD in detail, starting with the fundamentals. As we progress during the week, you will begin to see it’s not that intimidating after all. First, though, let’s get the fundamentals down. What exactly is a directory service and what are some examples in industry? Next, let’s get the definition of Active Directory down—what exactly is it and what benefits does it provide? After this, we’ll look at the details on how it is implemented in the business environment.

AD is basically a database.  It’s a directory that stores information about objects that are used within a network.  It provides hierarchical organization and management access to those objects.  Another aspect to AD is login and authentication services, and also the ability to delegate administrative control.  A couple examples of information it holds are available services, user accounts, and group accounts.  Using an AD makes it easier to manage the network…

Linux Versus Windows Administration – 28 Pages 

Click Here: CIS246 Linux Versus Windows Administration

In what ways do you think administering Linux is better than Windows? In what ways is Windows better than Linux? This can be with regard to having to manage a single server or multiple servers.  Do Linux administrators make more money than those with only Windows experience?

It seems that familiarity and support are some of the biggest issues, especially for entry level businesses. I know that Linux seems to be a better performer in many aspects such as security and stability, but not nearly as many people are familiar with it. I am one of those people. Maybe companies with deeper pockets can really capitalize on Linux because they can hire Linux trained people to provide the necessary support and customized development needed, as is the case with Amazon. I think over the long term, using Linux can be a huge performance cost advantage over Windows systems if a company can overcome the initial hurdles. For turn-key systems with plenty of sales and tech support, Windows is hard to beat…

CIS246 Connectivity with Lab

Week 5 All Students Posts – 52 Pages 

Click Here: CIS246 Course Discussions Week 5

Wireless Networks – 27 Pages 

Click Here: CIS 246 Wireless Networks

Today, wireless transmission media are commonplace in business as well as residential applications, and their application is growing. This week, we will learn about wireless technology by starting with the fundamentals. How are wireless signals carried? What are the obstacles to successful transmissions and their repercussions? What standards govern wireless transmissions? How do we secure our wireless networks?

WPA2 has started to replace WPA, as it is more secure. WEP is also a wireless method that is another option. WEP is part of the IEEE 802.11 wireless networking standard and was designed to provide the same level of security as that of a wired LAN. WEP provides security by encrypting data over radio waves so that it is protected as it is transmitted from one end point to another. However, recently it has proven to not be as secure as originally thought. WEP is used at the two lowest layers of the OSI model – the data link and physical layers; it therefore does not offer end-to-end security…

VoIP – 25 Pages 

Click Here: CIS 246 VOIP Discussions

Traditionally, packet-switched networks carried primarily data and the public switched telephone network (PSTN) carried telephone calls and fax transmissions. Convergence is the use of one network to carry data, voice, and video communications simultaneously. Let’s begin this discussion by identifying and discussing key terms such as IP telephony or VoIP, VoATM, VoDSL, Internet telephony, FoIP, and video over IP.

The biggest problem I have found with VoIP is the call quality and the fact that switching to VoIP is not always a savings. Just recently I canceled my home phone service and just use cell phones and internet. Since the only internet provider in my area was my phone company, they wanted to charge nearly the same amount for just internet as they did for a phone/internet package. They just recently changed their pricing to where it made sense to drop my phone service. I was already aware that I would lose internet during a power outage, and therefore would lose phone service if I was using VoIP. I have used a VoIP service in the past called MagicJack and it seemed fine. You could take it anywhere you had internet and make and receive calls. I just rarely used it because I rely predominantly on my cell phone. I would definitely use it for my business phone and drop the land line if the prices were any different. The phone company still abuses you if you are a business…

CIS246 Connectivity with Lab

Week 6 All Students Posts – 52 Pages

Click Here:  CIS246 Course Discussions Week 6

Network Security – 27 Pages 

Click Here: CIS 246 Network Security

In this topic please discuss security measures you see in everyday life that you could adopt in a network environment. You can also include security implementations of places you have worked. How does physical security contribute to network security?

Network security is a large chunk of security for systems. If you can stop an attacker from entering the network then the host security will withstand the attacks. For most systems the worst attack you can receive is from the insider, a disgruntled employee. Network security has to not only think of attacks from the outside but from the inside as well. One of the basic ways to secure the network is with a firewall, every system has one by default but a firewall is a basic network security principle. You can set up firewalls in a number of various ways to protect your network and the systems that reside on the network. You can restrict ports, protocols, and specific IPs from your network. You can setup a zone based firewall to ensure a computer from the warehouse zone (warehouse IP range) can’t enter your HR zone (HR IP space) and such examples.

Another way to defend from outside threats is to incorporate an DMZ into your outside facing network to trick malicious people from attacking your local network by making them think they are in the local network when they are actually not. A DMZ can be the best initial roadblock for unwanted network traffic…

Network Integrity and Availability – 25 Pages 

Click Here: CIS246 Network Integrity and Availability

In this topic, we will discuss measures that can be taken to ensure that a network’s programs, data, services, devices, and connections are sound and protected from anything that might render them unusable. What situations can compromise integrity and availability and what, specifically, can we do to protect our networks?  What is fault tolerance, and what network aspects must be monitored and managed to ensure fault tolerance?

Network integrity can mean different things to different people within an organization. Integrity means that the network is stable and available at almost all times, it also means that every transmission on the network is secure and has a high reliability of not becoming hijacked and changed. The first thing to look at in a security department is redundant connections to the outside world. This means not only multiple connections to the outside world but multiple ISPs to support those connections. There is a story of an airport that had multiple connections to the outside world and was service by two different ISPs. One day while a construction crew was digging they accidently cut the lines from the airport to both ISPs. This happened because even though the airport had good security with multiple connections to the outside world both connections ran through the same location. The airport failed to have a large separation between the redundant connections to the ISPs.

Wireless overlapping is also a great way to have redundant connections for wireless users in a company. If one wireless access point fails then there are redundant access points to pick up the slack. Anti-Virus, Anti-spyware, Anti-mailware, firewalls, are just a few things to help keep the network safe from outsider threats. Job rotation, mandatory leave, using least privilege, account administration, and active scanning are ways to help prevent insider threats to the network and the software and systems that reside on the network…

CIS246 Connectivity with Lab

Week 7 All Students Posts – 47 Pages

Click Here:  CIS246 Course Discussions Week 7

Using a WAN – 24 Pages 

Click Here: CIS 246 Using Wan

Find WAN organizations (ISPs) that will connect you to the Internet or connect your offices. What services do they offer? What costs are involved? Explain and compare X.25 and its updated, digital version which is Frame Relay.

DSL, which stands for digital subscriber line, provides an internet connection using your home phone line. It does this without affecting the normal use of your home phone. This is not to be confused with a dial up connection, which prevents you from using your phone while an internet connection is established. Some advantages of using a DSL are the speed, and also a reliable connection isn’t impacted when many users in the same are are on the internet at the same time. Some disadvantages are you have to install filters on all your phone lines, which can be costly. Another issue with DSL is that it cannot match the speed you get with a broadband cable connection…

Linux and Windows Integration – 23 Pages 

Click Here: CIS246 Linux and Windows Integration

What are some ways you could integrate Linux servers into a Windows network to share information? What would be the advantages and disadvantages? Feel free to get into the details of Samba, which is covered in the lab. Are there any other products out there? You can get creative on this one. You could also offer scenarios for FTP, Web, or even Telnet. Samba is a great product. However, what other ways can we communicate? Linux servers can be very cheap to set up. What things would we need Linux to store cheaply, and how would we get the information when we need it?

Integrating Fedora Linux into Windows network as long as SAMBA utilities.  Linux serve looks and acts exactly like any other server on Windows intranet. You can drag and drop files view server contents and directories when using Windows File Manager. SAMBA is an open-source program that provides server message block/common internet file systems. SAMBA acts just like windows file and printer servers to all your desktop clients…

CIS246 Connectivity with Lab