Identify best practices for incident response and disaster

Assignment Help Computer Networking
Reference no: EM133505569

Network Fundamentals

Exercise 1 - Performance & Disaster Recovery

Learning Objective 1: Use appropriate tools to collect data about the network.
Learning Objective 2: Identify methods to optimize network performance.
Learning Objective 3: Identify best practices for incident response and disaster recovery.

Description:
This exercise will explore the concepts of network performance & monitoring as well as the fundamentals of disaster recovery and business continuity planning.
Required Resources:
• Text: West, J. (2021). CompTIA Network+ Guide to Networks. (9th Edition.) Boston, MA: Cengage Learning.
• Paper & Pen/Pencil
• Internet-enabled Windows PC computer system
• Cisco Packet Tracer
• Microsoft Office

Lab Steps:
Part I: Network Monitoring

In this exercise, you will practice filtering the information contained in the log. You need a computer running Windows 10. Ideally, it should be a computer that has been used for a while, so that the event log contains several entries. It need not be connected to a network. However, you must be logged on to the computer as a user with administrator privileges.

1. Open Event Viewer. In the left pane, click the custom views arrow and then click Administrative events. A list of Administrative Events appears in the center pane of the Event Viewer window. This log lists Critical, Error, and Warning events.
2. Suppose you want to find out whether your workstation has ever experienced trouble obtaining a DHCP-assigned IP address. In the Actions pane (the pane on the right), in the Administrative Events section, click Find. The Find dialog box opens.
3. Type dhcp and then click Find Next.
4. What is the first DHCP-related event you find? When did it occur? What was the source of this event? Read the description of the event in the General tab to learn more about it. Note: If the computer did not find a DHCP event, first make sure the topmost record is selected before beginning your search to ensure that all the records are searched. If a DHCP event is still not found, search for a different kind of event such as DNS or Service Control Manager. Otherwise, choose another event at random.
5. Click Cancel to close the Find dialog box. Keep the event listing that you found highlighted.
6. Now suppose you want to be notified each time your workstation experiences this error. In the Actions pane, click Attach Task To This event. The Create Basic Task Wizard dialog box opens.
7. In the Name text box, replace the default text with DHCP_my_computer. Click Next to continue.
8. You're prompted to confirm the Log, Source, and Event ID for this error. Click Next to continue.
9. You're prompted to indicate the type of action the operating system should take when this error occurs. start a program is the only option not deprecated and should be selected by default. Click Next to continue.
10. Now you are asked to provide information about the program you want the system to open. Click the Browse button and find the cmd.exe file. The default location for cmd.exe is C:\windows\system32\cmd.exe, although your location path might be different. Select the file and click open. Click Next to continue.
11. A summary of your notification selections appears. Take a screensnip of your task configuration; save it as filename dhcp-notify-task.png.
12. Click Finish to create the task and add it to the actions your operating system will perform.
13. An Event Viewer dialog box opens, alerting you that the task has been created. Click ok
to confirm.
14. You can see the task you just created by opening Task Scheduler. Press WIN+R and enter taskschd.msc. (or click Start and type task scheduler and press enter.
15. In the Task Scheduler window, click the down arrow next to Task scheduler Library and then click event viewer Tasks. Select the task you just created and answer the following questions:
a. In the lower pane, check the Security options section. Which user account will be used when the task runs?
b. Click run in the Actions pane. What happens?
c. What command would keep this task from running without removing it from Task Scheduler?
16. Capture a screen snip of your scheduled task as shown in the task scheduler and save it as scheduled-task.png.
17. You can now delete this task if you want. Close all open windows.

Part II: Disaster Recovery and Business Continuity

No organization can ever prepare "too much" to avoid the devastating results of a poorly planned backup and recovery strategy. In this lab exercise, you will develop a disaster recovery plan.

Using your reading from the textbook, answer the following items for the planning of a disaster recovery and business continuity plan. (***Note: The correct answers are in your book***)

Step 1: Form a disaster recovery response team. Name and describe the important roles of a disaster recovery team.

Step 2: Research an online vendor that will provide a compliant data backup solution for a medical billing organization that handles patient medical records. Your response must address the following questions. What are the compliance regulations related to the handling of said medical records that must be observed? What are the features of the vendor's offering with regards to the strict compliance requirements? What is the Vendor name and the URL from which you obtained your facts? Your response should be at least 150 words.

Step 3: Describe the differences between hot, warm, and cold backup sites. Detail what is included in each AND detail what it would take to resume business operations when using each of them as part of your disaster recovery and BCP (business continuity plan). Your response should be at least 150 words.

Step 4: Please list 4 concepts that you found interesting and informative about this week's topics. Explain how these concepts can be applied in your personal and/or professional life.

QUESTIONS
Transfer the answers for the questions answered in the exercise to the Week 5.1: Hands-On Grade Sheet assignment in Canvas.

1. Part I, Step 15
a. In the lower pane, check the Security options section. Which user account will be used when the task runs?
b. Click run in the Actions pane. What happens?
c. What command would keep this task from running without removing it from Task Scheduler?
2. Part II, Step 1
3. Part II, Step 3
4. Part II, Step 4

Create a WordPad (or Word) file and embed the saved snips
a) dhcp-notify-task.png
b) scheduled-task.png

Exercise 5.2 - Hands-On Project

Description:
In this lab, you will develop your knowledge related to mobile networking technologies.

Required Resources:
• Text: West, J. (2021). CompTIA Network+ Guide to Networks. (9th Edition.) Boston, MA: Cengage Learning.
• Paper & Pen/Pencil
• Internet-enabled Windows PC computer system
• Cisco Packet Tracer
• Microsoft Office
• Wireless Network Device provided by CIAT.

Setup:
• Log into an Internet-enabled computer system
• Open Cisco Packet Tracer
Lab Steps:

Part I: Network Design
Design a Class-C network that will contain 5 wired workstations, 5 wireless laptops, a router, a wireless router, a switch, three networked printers, a print server, and a file server. Your network will appear similar to the one shown below. The sample only uses 3 PCs and Laptops in the interest of space and fostering originality. Your network will contain all 5 PCs and laptops.

You will use your own separate network IP address scheme, different from the one shown in the example. You may use the same 12.12.12.x scheme for the remote server connection.

There should be separate blocks of IP addresses for the following categories to allow for future expansion:
• Wired workstations (i.e. 192.168.39.100-119)
• Wireless devices (i.e. 192.168.39.200-219)
• Printers (i.e. 192.168.39.50-59)
• Network hardware such as servers, switches, routers, printers, etc. (i.e. 192.168.39.1-19 and 192.168.39.250-254)

For the wireless component:
• Remember to add the wireless NIC to the laptops as you did in a previous lab exercise.
• Connect the wireless router to the switch using an Ethernet LAN port. (E0/1)
• Ensure you use an IP addressing scheme that is in the same subnet as your wired network.
• Issue an IP address to the wireless router's LAN that is consistent with the overall Network IP address.
• Limit the wireless DHCP to 20 IP addresses in the scope.
• Issue a wireless security passphrase using WPA2-Personal AES Encryption
• Connect the laptops to the wireless network using the PC Wireless option in the Desktop tab of the laptops.
• Open the properties box for the wireless router and from the GUI tab, save screen snips of the following pages.
• Setup Tab: Basic Setup (Save as filename WiFi-BasicSetup.png)
• Wireless Tab: Basic Wireless Settings (Save as filename WiFi-WirelessSetup.png)
• Wireless Tab: Wireless Security (Save as filename WiFi-Security.png)

Part II: Network Documentation

Apply a Class-C IP Scheme to the network that is DIFFERENT from the one shown here.
• Select a network IP
• Select a subnet mask

Apply a DNS naming scheme to the network that is DIFFERENT from the one shown.
• Select a TLD (other than .edu)
• Select a domain name to go with your TLD (other than ciat.edu)

Fill in the IP addresses and the FQDNs in the table that follows. This table can be found in a document that you can download and fill out. It is in the Student Files section of Canvas. (Files
> Student Files > Lab Support Files) from the links on the left side of your Canvas CIS102B Home Page.

The file you will download is named Lab52.rtf. Please download it and fill out the table so you can upload it later. To download the file, click the file name to view it in Canvas, then click Download at the top of the page.

Label the IP addresses with CIDR notations and the FQDNs on your network diagram in Packet Tracer. Capture a screen snip of your entire, fully documented and labeled, network and save it with a filename of Network.png

Part III: Network Connectivity
Confirm network connectivity. Perform the following ping tests and save each as a screen snip using the filename in the parenthesis ( ). Remember initial connectivity may time out for the first or second packets as the routing tables are built.
• Ping from PC0 to File Server (PingPC0-FS.png)
• Ping from PC0 to Printer 2 (PingPC0-Prt2.png)
• Ping from PC1 to Laptop 1 (PingPC1-Lap1.png)
• Ping from Laptop 1 to Laptop 2 (PingLap1-Lap2.png)
• Ping from Laptop 0 to Print Server (PingLap0-PrtSvr.png)
• Ping from Laptop 1 to Printer 1 (PingLap1-Prt1.png)
• Ping from PC2 to the Default Gateway (PingPC2-DG.png)
• Ping from Laptop2 to the Edge Router (PingLap2-DG.png)
• Ping from PC2 to Remote Server (PingPC2-RSRV.png)

From Part 2:
• Select a network IP
• Select a subnet mask
• Select a TLD
• Select a sub-domain name

Fill out the table that you download from Canvas Files and save the file as filename
LastName_Table52.rtf. Upload it to Canvas.

Create a WordPad (or Word) document and embed the following saved snip files in the exact order shown.
1. Network.png
2. WiFi-BasicSetup.png
3. WiFi-WirelessSetup.png
4. WiFi-Security.png
5. PingPC0-FS.png
6. PingPC0-Prt2.png
7. PingPC1-Lap1.png
8. PingLap1-Lap2.png
9. PingLap0-PrtSvr.png
10. PingLap1-Prt1.png
11. PingPC2-DG.png
12. PingLap2-DG.png
13. PingPC2-RSRV.png

Attachment:- Network Fundamentals.rar

Reference no: EM133505569

Questions Cloud

How william andrew paton contribute for accountancy : How William Andrew Paton (1889 - 1991) contribute for accountancy ? How are those contributions beneficial to the accounting industry?
Compare the potential positive and negative influences : Compare the potential positive and negative influences of different relationships on the health and wellbeing of individuals.
Determine the amount of u.s. taxable income for each entity : Determine the amount of U.S. taxable income for each entity. Calculate the foreign tax credit allowed in the United States, by basket (branch income
Costs high enough to represent budgetary issues : Are their weaknesses associated with the costs? In other words, are the costs high enough to represent budgetary issues?
Identify best practices for incident response and disaster : Identify methods to optimize network performance and Identify best practices for incident response and disaster recovery.
List down strategies to incorporate cultural safety : List down strategies to incorporate cultural safety while caring for a client from Aboriginal and Torres Strait Islander culture.
How different generations naturally communicate help : How can considering how different generations naturally communicate help you better communicate with members of your team?
How do your smm goals support your overall business goals : What are your SMART goals for your venture in the context of social media? How do your SMM goals support your overall business goal(s)?
Clinical presentation of person with abnormal pathology : Describe the clinical presentation of a person with an abnormal pathology related to Serotonin.

Reviews

Write a Review

Computer Networking Questions & Answers

  Write a paper analyzing the wan and suggested enhancements

creating a model of the existing WAN using Visio. Write a paper analyzing the WAN and suggested enhancements. Revised model with enhancements included.

  Explain how is data transmitted across from his local

data transmission can occur by way of analog signal or digital signal.bullin your own words discuss digital data signal

  Describe three advantages of moving your corporate e-mail

1.describe three advantages of moving your corporate e-mail to the cloud. what are three risks involved in moving to

  How many times a week is the project repository updated

Label each question as either closed-ended (CE) question or open-ended (OE) question. a. How many times a week is the project repository updated?

  Open systems interconnection (osi) protocol mode

Describe the Open Systems Interconnection (OSI) protocol model.

  Comparing both client-server and peer-to-peer networks

Assignment - Comparative Study. Write a 2 page report providing a study comparing both client-server and peer-to-peer networks

  Develop a logical design for this enterprise campus

Develop a logical design for this enterprise campus that considers the seven network architecture components. There are no other campuses, so you can omit WAN access. You will need to make some assumptions, so be sure to document your assumptions ..

  Based on the barr 2010 article how does ibms cloud

question 1 based on the barr 2010 article how does ibms cloud computing services compare with those provided by

  Write down a 2 page research paper excluding the title page

write a 2 page research paper excluding the title page on the five layers of tcpip protocol suite. in addition to

  Discussion of any five variants of ransomware

MN502 Overview of Network Security Assessment - Potential threats and mitigation tools for ransomware. Melbourne Institute of Technology, Australia

  Develop a presentation demonstrating countermeasures

Develop a PowerPoint presentation demonstrating the countermeasures and strategies that should be utilised to stop or reduce the impact of malware on a home computer network.

  Part-11 generalize the basic approaches we used for making

part-11 generalize the basic approaches we used for making the best out of best effort service for real-time

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd