You are a junior network administrator at Servitek. Your manager has asked you t
ID: 3853079 • Letter: Y
Question
You are a junior network administrator at Servitek. Your manager has asked you to configure and verify that a recently purchased brand new personal computer (PC) is able to connect to the company's wired network. What are four items that need to be configured on the PC in order for it to be connected to the network? What Windows command would you use to verify the network configurations have been implemented correctly? The Pro-Link Company wants to protect its intranet and DMZ from unauthorized access. Describe two network security devices/appliances that need to be installed in the network Where in the network should these security devices be installed?Explanation / Answer
1.
While troubleshooting a TCP/IP organizing issue, start by checking the TCP/IP arrangement on the PC encountering the issue. Utilize the ipconfig charge to get the host PC design data, including the IP address, subnet cover, and default portal.
At the point when Ipconfig is utilized with the/all switch, it creates a definite arrangement report for all interfaces, including any designed remote get to connectors. Ipconfig output might be diverted to a record and glued into different archives. To do as such, sort ipconfig > < directory file name> .
The output is set in the registry you indicated with the document name you determined.
The output of Ipconfig can be assessed to discover any issues in the PC organize design.
For Example:if a PC has been arranged with an IP address that is a copy of a current IP address that has as of now been distinguished, the subnet cover shows up as 0.0.0.0.
The accompanying case represents the consequences of an ipconfig/all order on a PC that is arranged to utilize a DHCP server for programmed TCP/IP setup, and WINS and DNS servers for name determination:
Windows NT IP Configuration as shown below
host name . . . . . . . . . : testingpc1.mallic.com
node Type . . . . . . . . . : hybrid
IP Routing Enabled. . . . . : No
WINS Proxy Enabled. . . . . : No
ethernet adapter Local Area Connection:
adapter Domain Name . . . . : dns.reskit.com
DNS Servers . . . . . . . . : 172.16.14.119
description . . . . . . . . : mss Ethernet Adapter.
physical Address. . . . . . : 00-21-MK-1A-2B-91
dhcp Enabled. . . . . . . . : Yes
ip address. . . . . . . . . : 192.15.36.11
subnet mask . . . . . . . . : 255.255.248.0
default Gateway . . . . . . : 192.15.36.03
DHCP Server . . . . . . . . : 192.15.36.03
Primary WINS Server . . . . : 172.16.48.04
Secondary WINS Server . . . : 172.16.48.05
Lease Obtained. . . . . . . : TUESDAY, JAN 3, 2000 10:56:10 AM
Lease Expires . . . . . . . : MONDAY, JAN 3, 2000 10:74:10 AM
On the off chance that no issues show up in the TCP/IP design, the following stage is to test the capacity to interface with other host PCs on the TCP/IP organize.
2. intrusion prevention system is need to installed in ypur network
An intrusion prevention system (IPS) identifies organize interruption endeavors and controls access to the system for the gatecrashers. An IPS is a change over an interruption discovery framework (IDS) in light of the fact that an IPS really counteracts interruption.
A firewall is a gadget that is arranged to permit or keep certain correspondence in view of preconfigured channels. A firewall can shield a PC or system from undesirable interruption utilizing these channels. In any case, any correspondence not particularly characterized in the channels is either permitted or denied. Firewalls are not used to recognize and avert arrange interruption.
An IDS just identifies the interruption and logs the interruption or advises the suitable work force.
A virtual private system (VPN) is a private system that clients can interface with over an open system.
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.