Kamis, 28 Oktober 2010

Chapter 9

Lab 9.2.7

Step 1 : Build the network and configure the hosts

Step 2 : Record the baseline IP address information for computers and intergrated router

a. IP address : 192.168.1.2
   Subnet mask : 255.255.255.0
   Default gateway : 192.168.1.1
   DNS :
   DHCP :
 
b. Internal IP address : 192.168.1.3
    Subnet mask : 255.255.255.0
    Enabled.
    External (internet) IP address : 10.1.1.5
    Subnet mask : 255.0.0.0
    Default gateway IP address : 10.1.1.1
    DNS server :


c.IP address : 192.168.2.2
   Subnet mask : 255.255.255.0
   Default gateway :  192.168.2.1
   Web server 1 protocol and name : 
   Web server 2 protocol and name :
    FTP server 1 protocol and name :
    FTP server 2 protocol and name :

Step 3, 4, 5, 6, 7, 8

Masalah yang biasanya terjadi yaitu masalah routing.
Perintah - perintah yang bisa digunakan untuk menyelesaikan masalah ini :
- show ip route, untuk mengeluarkan isi dari tabel routing. Contoh nya : 
     - show ip route connected,
     - ip default network.
     - show ip route database
     - show ip route protocols
     - show ip route address
- Lakukan perintah ping dan telnet.
- Gunakan teknik top-down, bottom-up, dan divide and conquer.

Step 9 : Refelection

a. Divide and conquer.
b. Divide and conquer

Chapter 8

Lab 8.4.2


Part 1 : Configuring access policies

Step 1 : Build The Network and Configure The Hosts

c. Host-A : IP address : 192.168.2.1
                  Subnet Mask : 255.255.255.0
                  Default Gateway : 192.168.2.2
   Host-B(DMZ Server) : IP address : 192.168.189.202
                                   Subnet Mask : 255.255.255.0
                                   Default Gateway : 192.168.189.1
   External Server : IP address : 192.168.10.1
                            Subnet Mask : 255.255.255.0
                            Default Gateway : 192.168.10.2

Step 2 : Log in to the user interface

c. Tipe koneksi internet nya : wireless internet connection.
d. Default router (internal) : IP address : 192.168.1.1
                                         Subnet mask : 255.255.255.0
f. Default router (external) : IP address : 192.168.2.1
                                          Subnet mask : 255.255.255.0

Step 3 :  View Multi Function device Firewall settings

b. Status SPI firewall protection : enabled.
c. Internet filter yang digunakan : filter anonymous internet request, filter IDENT (port 113). 
d. Keuntungan memfilter IDENT Provide :  mencegah penyusup dari luar menyerang router melalui internet.
    
Step 4 : Set up Internet Access Restrictions based on IP Address 

d. Ya.
e. Tidak.
f. Menggunakan proxy.

Step 5 : Set up an Internet Access Policy based on Application

c. 
f. Ya.
g. Tidak.


Part 2 : Configuring a DMZ on the multi-function device

Step 1 : Set up simple DMZ
c. Karena DMZ berguna untuk menambahkan lapisan keamanan untuk LAN.
e. Ya.
f. Ya.
g. Tidak.

Step 2 : Set up a host with single port forwarding

d. Ya.
e. Tidak.

Lab 8.4.3

Step 1 : Download and install MBSA
b. MBSA versi 2.2
c. Fitur MBSA :
         -Command-line and Graphical User Interface (GUI) options
         - Scan local computer, remote computer, or groups of computer
         -Scan against Microsoft's maintained list of updates (on Microsoft.com) or local server running Software Update Services 1.0
         - Scan for common security configuration vulnerabilitie
         - Scan for missing security updates
         - View reports in MBSA Graphical User Interface or Command Line Interface
         - Compatibility with SMS 2.0 and 2003 Software Update Services Feature Pack
         - Support for single processor and multiprocessor configurations
         - Localized to English, French, German, and Japanese although MBSA 1.2.1 can scan a machine of any local

f. Antara 1.5 MB - 1.7 MB


Step 2 : Build the network and configure the hosts

c. IP address : 192.168.1.1
    Subnet mask : 255.255.255.0


Step 3 : Run MBSA on a Host

a. Options yang muncul :
    - Welcome
    - Pick a computer to scan
    - Pick multiple computer to scan
    - Pick a security report to view
    - Help
    - About
    - Microsoft Security Web Site


Step 4 : Select a computer to scan

b. 2 cara spesifik untuk men-scan komputer : 
    - Scan using assign Update Services servers only
    - Scan using Microsoft Update only


Step 5 : View Security Update scan Results
a. 
b.


Step 6 : View Windows Scan Results in the Security Report

a. Local Account Password Test, Automatic Update, Guest Account, File system.

b. 


Step 7 : View Desktop Application Scan Results in the security report

a. Macro security

b. 4

c. Tidak.


Step 8 : Scan a server, if avaible


Step 10 : Refelction

a.  Tools :
        - Client versions of Windows, including Windows
        - Windows Server, including Windows Server 2008
        - SQL Server
        - Internet Information Server (IIS)
        - Internet Explorer
        - Microsoft Office

b. SQL server

c. Step 8.

Quiz Chapter 9


  1. a small office uses a wireless ISR to connect to a cable modem for internet access. The networl administrator receives a call tahat one office computer cannot access external website. The first troubleshooting step that the network administrator performs is to ping the ISR. While troubleshooting technique does this represent?
D. divide-and-conquer.

  1. Select three items that should be documented after troubleshooting an internal web server crash (choose three)
      a. when the problem occurred
      e. steps that were performed to identify the cause of the problem
      f. steps that were performed that failed to identify the cause of the problem

  1. A user calls the help desk  to report a workstation problem. While three questions would the most helpful information for troubleshooting? (choose three)
a.       A.if you received an error message, what was it?
b.      B.Have there been any changes to your workstation recently?
c.       D.what version of operationg system is running on your workstation?

  1. A user wants to lest connectivity between host 3 and 8 on a network. Which command can be used to verify a connection?
      b. ping

  1. Ipconfig = displays IP settings on host
Netstat = display network connections
Ping = tests connections to other IP host
Tracert = displays route taken to destination
Nslookup = asks name server for into on destination domain

  1. Which three pieces of information are revealed by yhe config command? (choose three)
b. Ip address
e. subnet mask
f. default gateway

  1. How does an activity LED indicate that traffic is moving through a port?
a. by flashing

  1. What is one of the most common reasons why hosts could be unable to connect?
b. cabling problems

  1. Which three factors can affect the ability of host to connect to an AP using radio frequency signals? (choose three)
      b. The 802.11A is not compatible with the 802.11 B/G standars
      c. The avalaible bandwith between devices is shared with APs
      e. Mulitple devices running on the same frequency causes interference

  1. what step should be taken once a problem is resolved?
      c. update the documentation

Quiz Chapter 8


1.       Drag the network threat on the left to the definition on the right.
a.       Data loss à destroying data on a hard drive
b.      Data manipulation à changing data for personal gain
c.       Disruption of service à overloading a server to reduce its performance
d.      Information theft à stealing data on a hard drive to gain a competitive advantage
e.      Identity à stealing information to impersonate someone and usually to obtain credit.

2.       How does a phisher typically contact a victim?
by  E-mail

3.       A file is downloaded from the internet. After the user opens the downloaded file, the user’s hard drive crashes and all information on the computer is lost. What type of attack occurred?
Virus

4.       In rapid succession, an intruder tries a large number of possibilities to guess passwords. As a result, other users on the network are locked out. What type of attack occurred?
Brute force

5.       What type of program installs and gathers personal information, including password and account information, from a computer without permission or knowledge of the user?
Spyware

6.       A network administration is troubleshooting a computer that is operating strangely. It boots slowly, programs will not load, and the keyboard responds very slowly. What is the best action for the administrator to take?
Boot the PC and Run anti-virus and anti-spyware applications from an external drive.

7.       Drag the term on left to the best description on the right.
a.       Stateful packet inspection à can look inside the packet up through layer 7
b.      Website filtering à allows or denies access based on a URL
c.       Simple packet filtering à allows or denies access based on an IP or MAC address
d.      NAT à keeps external users from knowing the IP Address used inside the network

8.       Drag the term on left to the definition on the right.
a.       Integrated à a feature of a network device such as a router.
b.      Personal firewall à an application designed to protect a home PC
c.       Appliance-based firewall à a device that has the sole function of being a firewall
d.      Server-based firewall à an application designed to protect the enterprise network

9.       What are three security features commonly found on an ISR? (Choose Three)
-          DMZ
-          NAT
-          SPI

10.   What are two purposes of a DMZ? (Choose two)
-          To create a network area that allows internal resources, such as a web server, to be accessed by external users.
-          To establish a network area where network resources can be shared by both internal and external users.

CCNA Discovery 1 Module 9 Exam Answers Version 4.0


1. What should a network administrator do first after receiving a call from a user who cannot access the company web server?
• Ask the user what URL has been typed and what error message displays.

2. A customer called the cable company to report that the Internet connection is unstable. After trying several configuration changes, the technician decided to send the customer a new cable modem to try. What troubleshooting technique does this represent?
• substitution

3. Only one workstation on a particular network cannot reach the Internet. What is the first troubleshooting step if the divide-and-conquer method is being used?
• Check the workstation TCP/IP configuration.

4. Which two troubleshooting techniques are suitable for both home networks and large corporate networks? (Choose two.)
• documenting the troubleshooting process
• keeping a record of system upgrades and software versions

5. Identify two physical-layer network problems. (Choose two.)
• hardware failure
• loose cable connections

6. Which ipconfig command requests IP configuration from a DHCP server?
• ipconfig /renew

7. What command is used to determine the location of delay for a packet traversing the Internet?
• tracert

8. What command is used to determine if a DNS server is providing name resolution?
• nslookup

9. Which troubleshooting method begins by examining cable connections and wiring issues?
• bottom-up

10. A technician suspects that a Linksys integrated router is the source of a network problem. While troubleshooting, the technician notices a blinking green activity LED on some of the ports. What does this indicate?
• The ports are operational and are receiving traffic.

11. A PC is plugged into a switch and is unable to connect to the network. The UTP cable is suspected. What could be the problem?
• A crossover cable is being used.

12. Refer to the graphic. What configuration is incorrect in the network shown?

13. Which three settings must match on the client and access point for a wireless connection to occur? (Choose three.)
• SSID
• authentication
• encryption key

14. A technician is troubleshooting a security breach on a new wireless access point. Which three configuration settings make it easy for hackers to gain access? (Choose three.)
• configuring NAT
• broadcasting the SSID
• using open authentication
• using the default internal IP address

15. Refer to the graphic. The wireless host cannot access the Internet, but the wired host can. What is the problem?

16. Refer to the graphic. What configuration is incorrect in the network shown?

17. When acting as a DHCP server, what three types of information can an ISR provide to a client? (Choose three.)
• default gateway
• dynamic IP address
• DNS server address

18. What two items could be checked to verify connectivity between the router and the ISP? (Choose two.)
• router status page
• connectivity status as indicated by LEDs

19. A technician is unsuccessful in establishing a console session between a PC and a Linksys integrated router. Both devices have power, and a cable is connected between them. Which two troubleshooting steps could help to diagnose this problem? (Choose two.)
• Ensure the correct cable is used.
• Ensure the link status LED on the integrated router is lit.

20. Network baselines should be performed in which two situations? (Choose two.)
• after the network is installed and running optimally
• after major changes are implemented on the network

21. Typically, help desk personnel assist end users in which two tasks? (Choose two.)
• identifying when the problem occurred
• implementing the solution to the problem

22. How does remote-access software help in the troubleshooting process?
• Diagnostics can be run without a technician being present at the site.

23. Which two items should be added to the documentation following a troubleshooting event? (Choose two.)
• final resolution
• results of successful and unsuccessful troubleshooting steps