Objectives
• Examine the existing floor plan of a customer.
• Propose a cable upgrade plan to accommodate extra floor space.
Background / Preparation
A medium sized company has existing space on the second floor of an office tower and has just acquired the rest of the second floor. They have asked you to examine their existing floor plan and assist the the placement of a new IDF, placement of cables to support all of the new office space, and to help determine if any new devices are required. This lab can be done individually or in groups. The following resources are required:
• Existing Floor Plan (provided)
Step 1: Examine the existing floor plan
a. From the information provided on the existing floor plan, label the following items:
1) POP –Point of Presence
2) MDF – Main Distribution Facility
3) IDF – Intermediate Distribution Facility
4) vertical/Backbone Cabling
5) Horizontal Cabling
b. What type of cabling could be used for the vertical/back bone cabling? Explain your answer
kabel yang digunakan ialah vertical backbone cable, alasannya karena jaringan yang akan dibangun terletak pada lantai dua dan jika dianalogikan posisi masing masing device kerja atau bagian kerja akan bersimpangan. Oleh karena itu kabel yang digunakan ialah vertical backbone cable dangan sambungan vertical patch panel.
Step 2 :Evaluate plan for new floor space.
Any Company has just merged with a small web design group and has acquired the remaining space on the second floor to accommodate the web design team . This new space is represented on the diagram as the floor space highlighted on the right side of the floor plan. It has been decided to add a second IDF to support the work stations in the new area.
a. Suggest a possible location for the new IDF . What room / location did you choose and explain why you think it is suitable?
ruangan / lokasi yang cocok untuk memasang IDF baru ialah pada telecommunication room . karena IDF sebagai fasilitas pendistribusi merupakan perangkat yang harus tersusun dengan perangkat server.
b. What type of cable would you suggest for the vertical cabling required to connect the new IDF to the existing MDF? Explain your reasons
jenis cable yang digunakan untuk menghubungkan IDF dan MDF adalah Horizontal Cabling, alasannya IDF dan MDF dihubungkan untuk langsung terkoneksi ke area kerja (work area) sehingga harus menggunakan cabel horizontal.
c. The new space contains mostly offices. Assume that each office will be provisioned with 2 data drops. Also plan for 2 drops in the auditorium to support Internet access for presentations and training sessions. How many additional data drops need to be ordered?
dibutuhkan dua data drops lagi.
d. You have been asked to determine the number of new 24 port switches required for the new IDF. Remember to plan on approximately 25% growth. How many new switches will Company ABC need to purchase?
banyaknya switch yang dibutuhkan dengan perkembangan perusahaan yang dianalisa 25% adalah 60 buah switch dengan perhitungan. Masing – masing lantai terdiri dari 24 switch dan perlutambahan untuk perkembangan sebanyak 6 buah = 24 x 2 =48
+ 12 =60 buah switch
e. How many horizontal cables will terminate on patch panels in the new IDF?
sebanyak 32 buah kabel horizontal, termasuk pada telecommunications room.
Step3: Examine the floor space and wiring plan.
a. What equipment other than switches would you expect to find in the new IDF?
horizontal cable, switch,hub
b. What equipment other than switches would you expect to find in the MDF?
vertical cable,router.
c. Using existing cable runs, could you use UTP to connect the devices in room 2.20 or 2 .30 directly into a switch in the MDF?
ya bisa dapat langsung digunakan.
Step 4 . Reflection
a. Is it better to have an IDF in this floor space or should the company run the horizontal cables for each device directly back to the existing MDF?
lebih baik menggukan IDF dengan koneksi kabel horizontal untuk terhubung sebagai mediator untuk distribusi.
b. How many cables will be required from the MDF to the IDF to support the switches? Explain your answer
3 buah kabel, alasannya setelah terkoneksi dengan router, dibutuhkan 3 lagi alat berupa repeater. Maka agar alat itu bisa digunakan dibutuhkan 3 lagi kabel horizontal.
Kamis, 11 November 2010
Kamis, 04 November 2010
CCNA DISCOVERY 2 MODUL 3 EXAM ANSWER VERSION 4.0
CREATED BY MIKE PUTRI
06477/2008
17. What is the term for the location at the customer premise where the customer network physically connects to the Internet through a telecommunications service provider?
• backbone area
• point of presence
• network distribution facility
• intermediate distribution frame
18. to the exhibit. Which type of twisted pair cable is used between each device?
• A=console, B=straight, C=crossover, D= crossover, E=straight
• A=straight, B=straight, C=straight, D=crossover, E=console
• A=crossover, B=straight, C=straight, D=crossover, E=crossover
• A=console, B=straight, C=straight, D=crossover, E=crossover
• A=console, B=crossover, C=crossover, D=straight, E=straight
19. In what two ways will entering into a managed service agreement with an ISP for a network upgrade affect the costs that are incurred by the customer? (Choose two.)
• Customer IT training costs will increase to enable operation of the new equipment.
• The cost of hardware repairs and support will become the responsibility of the customer.
• Network upgrade and maintenance costs will become predictable.
• Staffing costs will increase because the customer will need to hire additional IT staff to complete the upgrade.
• The company will not need to spend a large amount of money to purchase the equipmentupfront.
20. Which type of cable has a solid copper core with several protective layers including PVC, braided wire shielding, and a plastic covering?
• STP
• UTP
• coaxial
• fiber optic
21. What must be added when a network expands beyond the coverage area of the current telecommunications room?
• MDF
• POP
• IDF
• IXP
06477/2008
1. Which two benefits can be gained by locating network equipment in a telecommunications closet, rather than in a user area? (Choose two.)
• faster communication speeds
• improved physical security
• more resistant to hacker attempts
• centralized cable management
• less electrical usage
2. Which three issues should be noted on the technician's site survey report? (Choose three.)
• unlabeled cables
• only two power outlets per wall in each room
• poor physical security of network devices
• horizontal cabling runs under 100 meters
• lack of UPS for critical devices
• two users sharing the same computer
3. Which two types of cable are used for initial router configuration? (Choose two.)
• serial cable
• rollover cable
• straight-through cable
• crossover cable
• patch cable
• console cable
4. In addition to the inventory sheet, what other information about the hosts and networking equipment should be documented by the on-site technician while performing the site survey?
• any obsolete office equipment being stored
• all product keys for site license software
• any planned growth anticipated in the near future
• the memory requirements for installed application software
5. Refer to the exhibit. What type of device is used to connect two networks?
• hub
• router
• switch
• access point
6. It is said that the goal for availability of a communications system is "five-9s". What is meant by this?
• A down time of .00001% is unacceptable.
• A network needs to be available 99.999% of the time.
• Five percent of all network expense covers 99% of user requirements.
• The most critical time for network availability is from 9:00 to 5:00 p.m. five days a week.
• The best time to do maintenance on a network is from 5:00 p.m. to 9:00 a.m. five days a week.
7. What three things are included in a logical topology document? (Choose three.)
• the location of cables, computers, and other peripherals
• the path that the data takes through a network
• the wireless signal coverage area
• the wiring closet and access point locations
• the device names and Layer 3 addressing information
• the location of routing, network address translation, and firewall filtering
8. Which device has the ability to break up broadcast and collision domains?
• repeater
• hub
• router
• switch
9. Why is it important to review the results of an on-site survey report with the customer before beginning the network design?
• to inform the customer of how much time the upgrade will take
• to discuss the implementation schedule for the new equipment
• to verify that the report accurately describes the current network and any plans for expansion
• to layout the new network design and discuss possible equipment upgrades and replacements
10. A client requires a networking device that is capable of expansion to suit growing network demands. What type of device will suit this requirement?
• a networking device with ports that can be activated and deactivated
• a networking device with a modular physical configuration
• a networking device with the ability to be turned off remotely
• a networking device with a cost per port that is as high as possible
11. What does the use of redundant network components supply to a network?
• scalability
• manageability
• compatibility
• reliability
12. What is the benefit for a company to use an ISR router?
• An ISR provides the functionality of a switch, router, and firewall in one device.
• ISRs use a PC operating system for routing traffic, thus simplifying configuration and management.
• An ISR is immune to security attacks by hackers and so replaces all other network security measures.
• ISRs make routing decisions at OSI Layer 7, thus providing more intelligence to the network than do other routers.
13. Which three items are typically found in an MDF? (Choose three.)
• user workstations
• switches and routers
• fax machines
• network equipment racks
• the point of presence
• copier
14. What are two advantages of having ISP-managed services? (Choose two.)
• does not require leasing costs for service
• can guarantee up to 99.999% availability
• eliminates the need for data backup
• increases availability of help desk services
• does not require a Service Level Agreement
15. A manufacturing company is in the process of a network upgrade. Which two statements are true about the phases of the upgrade process? (Choose two.)
• Phase 1 is used to determine network requirements.
• Phase 2 includes creating an analysis report.
• Phase 3 is based on an implementation schedule that allows extra time for unexpected events.
• Phase 4 is where prototypes are created and tested.
• Phase 5 includes identifying and addressing any weaknesses in the design.
16. When designing a network upgrade, which two tasks should the onsite technician perform? (Choose two.)
• configure the servers and routers prior to delivery
• upgrade the network operating system and all client operating systems
• investigate and document the physical layout of the premises
• document the final design for approval by the customer
• perform a site survey to document the existing network structure
• faster communication speeds
• improved physical security
• more resistant to hacker attempts
• centralized cable management
• less electrical usage
2. Which three issues should be noted on the technician's site survey report? (Choose three.)
• unlabeled cables
• only two power outlets per wall in each room
• poor physical security of network devices
• horizontal cabling runs under 100 meters
• lack of UPS for critical devices
• two users sharing the same computer
3. Which two types of cable are used for initial router configuration? (Choose two.)
• serial cable
• rollover cable
• straight-through cable
• crossover cable
• patch cable
• console cable
4. In addition to the inventory sheet, what other information about the hosts and networking equipment should be documented by the on-site technician while performing the site survey?
• any obsolete office equipment being stored
• all product keys for site license software
• any planned growth anticipated in the near future
• the memory requirements for installed application software
5. Refer to the exhibit. What type of device is used to connect two networks?
• hub
• router
• switch
• access point
6. It is said that the goal for availability of a communications system is "five-9s". What is meant by this?
• A down time of .00001% is unacceptable.
• A network needs to be available 99.999% of the time.
• Five percent of all network expense covers 99% of user requirements.
• The most critical time for network availability is from 9:00 to 5:00 p.m. five days a week.
• The best time to do maintenance on a network is from 5:00 p.m. to 9:00 a.m. five days a week.
7. What three things are included in a logical topology document? (Choose three.)
• the location of cables, computers, and other peripherals
• the path that the data takes through a network
• the wireless signal coverage area
• the wiring closet and access point locations
• the device names and Layer 3 addressing information
• the location of routing, network address translation, and firewall filtering
8. Which device has the ability to break up broadcast and collision domains?
• repeater
• hub
• router
• switch
9. Why is it important to review the results of an on-site survey report with the customer before beginning the network design?
• to inform the customer of how much time the upgrade will take
• to discuss the implementation schedule for the new equipment
• to verify that the report accurately describes the current network and any plans for expansion
• to layout the new network design and discuss possible equipment upgrades and replacements
10. A client requires a networking device that is capable of expansion to suit growing network demands. What type of device will suit this requirement?
• a networking device with ports that can be activated and deactivated
• a networking device with a modular physical configuration
• a networking device with the ability to be turned off remotely
• a networking device with a cost per port that is as high as possible
11. What does the use of redundant network components supply to a network?
• scalability
• manageability
• compatibility
• reliability
12. What is the benefit for a company to use an ISR router?
• An ISR provides the functionality of a switch, router, and firewall in one device.
• ISRs use a PC operating system for routing traffic, thus simplifying configuration and management.
• An ISR is immune to security attacks by hackers and so replaces all other network security measures.
• ISRs make routing decisions at OSI Layer 7, thus providing more intelligence to the network than do other routers.
13. Which three items are typically found in an MDF? (Choose three.)
• user workstations
• switches and routers
• fax machines
• network equipment racks
• the point of presence
• copier
14. What are two advantages of having ISP-managed services? (Choose two.)
• does not require leasing costs for service
• can guarantee up to 99.999% availability
• eliminates the need for data backup
• increases availability of help desk services
• does not require a Service Level Agreement
15. A manufacturing company is in the process of a network upgrade. Which two statements are true about the phases of the upgrade process? (Choose two.)
• Phase 1 is used to determine network requirements.
• Phase 2 includes creating an analysis report.
• Phase 3 is based on an implementation schedule that allows extra time for unexpected events.
• Phase 4 is where prototypes are created and tested.
• Phase 5 includes identifying and addressing any weaknesses in the design.
16. When designing a network upgrade, which two tasks should the onsite technician perform? (Choose two.)
• configure the servers and routers prior to delivery
• upgrade the network operating system and all client operating systems
• investigate and document the physical layout of the premises
• document the final design for approval by the customer
• perform a site survey to document the existing network structure
17. What is the term for the location at the customer premise where the customer network physically connects to the Internet through a telecommunications service provider?
• backbone area
• point of presence
• network distribution facility
• intermediate distribution frame
18. to the exhibit. Which type of twisted pair cable is used between each device?
• A=console, B=straight, C=crossover, D= crossover, E=straight
• A=straight, B=straight, C=straight, D=crossover, E=console
• A=crossover, B=straight, C=straight, D=crossover, E=crossover
• A=console, B=straight, C=straight, D=crossover, E=crossover
• A=console, B=crossover, C=crossover, D=straight, E=straight
19. In what two ways will entering into a managed service agreement with an ISP for a network upgrade affect the costs that are incurred by the customer? (Choose two.)
• Customer IT training costs will increase to enable operation of the new equipment.
• The cost of hardware repairs and support will become the responsibility of the customer.
• Network upgrade and maintenance costs will become predictable.
• Staffing costs will increase because the customer will need to hire additional IT staff to complete the upgrade.
• The company will not need to spend a large amount of money to purchase the equipmentupfront.
20. Which type of cable has a solid copper core with several protective layers including PVC, braided wire shielding, and a plastic covering?
• STP
• UTP
• coaxial
• fiber optic
21. What must be added when a network expands beyond the coverage area of the current telecommunications room?
• MDF
• POP
• IDF
• IXP
CCNA DISCOVERY 2 MODUL 1 EXAM ANSWER VERSION 4.0
CREATED BY MIKE PUTRI
06477/2008
1. Which two things can be determined by using the ping command? (Choose two.)
• the number of routers between the source and destination device
• the IP address of the router nearest the destination device
• the average time it takes a packet to reach the destination and for the response to return to the source
• whether or not the destination device is reachable through the network
• the average time it takes each router in the path between source and destination to respond
2. What are three main types of high-bandwidth connection options used by medium- to large-sized businesses? (Choose three.)
• DSL
• cable modem
• Ethernet
• metro Ethernet
• T1
• T3
3. What is the maximum T1 transmission speed?
• 56 kbps
• 128 kbps
• 1.544 Mbps
• 2.4 Mbps
4. Which of the following start the test of destination reachability?
• echo request issued by source
• echo reply issued by source
• echo request issued by destination
• echo reply issued by destination
5. Which statement describes a function of a Tier 1 ISP?
• peers with other similarly sized ISPs to form the global Internet backbone
• uses the services of Tier 3 ISPs to connect to the global Internet backbone
• pays Tier 2 ISPs for transit services to connect across continents
• limits the offered services to small geographic areas
6. At which point do individuals and small businesses connect directly to the ISP network to obtain Internet access?
• at a POP
• at an IXP
• at a Metro Ethernet link
• on the ISP extranet
7. What information is contained in the numbered RFCs maintained by the IETF?
• the rules for acceptable use of websites and e-mail
• the descriptions of various hardware components that connect to the Internet
• the specifications and rules for how devices communicate over an IP network
• the standards for cabling and wiring for local Ethernet networks
8. Which network support services team is responsible for testing a new customer connection and for monitoring the ongoing operation of the link?"
• customer service
• help desk
• network operations
• on-site installation
9. Which network support services team identifies whether the client site has existing network hardware and circuits installed?
• customer service
• help desk
• network operations
• planning and provisioning
10. Which ISP network support systems team will typically contact the customer once a new circuit is ready and guide the customer in setting up passwords and other account information?
• help desk
• customer service
• network operations center
• on-site installation team
• planning and provisioning
11. What feature allows network devices to be scalable?
• a fixed number of interfaces
• ease of repair
• modularity
• low maintenance requirements
• low cost
12. Which command generated this output?
• 1 12.0.0.2 4 msec 4 msec 4 msec
• 2 23.0.0.3 20 msec 16 msec 16 msec
• 3 34.0.0.4 16 msec 18 msec 16 msec
• Router# traceroute 34.0.0.4
• Router# nslookup 34.0.0.4
• Router# ping 34.0.0.4
• Router# telnet 34.0.0.4
13. Which network utility helps determine the location of network problems and identifies routers that packets travel across?
• ping
• ipconfig
• traceroute
• ixp
14. What interconnects the Internet backbone?
• gateway routers
• IXPs
• POPs
• satellite dishes
15. What units are used to measure Internet bandwidth?
• bits per second
• bytes per second
• hertz
• megabytes per second
• packets per second
16. The IT manager of a medium-sized business wishes to house the company-owned web servers in a facility that offers round-the-clock controlled access, redundant power, and high-bandwidth Internet access. Which ISP service will fulfill this need?
• web hosting
• planning and provisioning
• application hosting
• equipment colocation
• Tier 1 ISP services
17. What is the purpose of an RFC?
• to provide the connection point for multiple ISPs to the Internet
• to document the development and approval of an Internet standard
• to connect a business to an ISP
• to provide data communication services to ISP customers
• to monitor network performance and connection status of ISP clients
18. When did the Internet become available for use by businesses and consumers?
• 1979
• 1984
• 1991
• 1999
• 2000
19. What was the original purpose of the Internet?
• voice communication
• marketing
• research
• commerce
20. What three support service teams are commonly found within an ISP? (Choose three.)
• help desk
• computer support
• application readiness
• network operations center
• planning and provisioning
• implementation and documentation
06477/2008
1. Which two things can be determined by using the ping command? (Choose two.)
• the number of routers between the source and destination device
• the IP address of the router nearest the destination device
• the average time it takes a packet to reach the destination and for the response to return to the source
• whether or not the destination device is reachable through the network
• the average time it takes each router in the path between source and destination to respond
2. What are three main types of high-bandwidth connection options used by medium- to large-sized businesses? (Choose three.)
• DSL
• cable modem
• Ethernet
• metro Ethernet
• T1
• T3
3. What is the maximum T1 transmission speed?
• 56 kbps
• 128 kbps
• 1.544 Mbps
• 2.4 Mbps
4. Which of the following start the test of destination reachability?
• echo request issued by source
• echo reply issued by source
• echo request issued by destination
• echo reply issued by destination
5. Which statement describes a function of a Tier 1 ISP?
• peers with other similarly sized ISPs to form the global Internet backbone
• uses the services of Tier 3 ISPs to connect to the global Internet backbone
• pays Tier 2 ISPs for transit services to connect across continents
• limits the offered services to small geographic areas
6. At which point do individuals and small businesses connect directly to the ISP network to obtain Internet access?
• at a POP
• at an IXP
• at a Metro Ethernet link
• on the ISP extranet
7. What information is contained in the numbered RFCs maintained by the IETF?
• the rules for acceptable use of websites and e-mail
• the descriptions of various hardware components that connect to the Internet
• the specifications and rules for how devices communicate over an IP network
• the standards for cabling and wiring for local Ethernet networks
8. Which network support services team is responsible for testing a new customer connection and for monitoring the ongoing operation of the link?"
• customer service
• help desk
• network operations
• on-site installation
9. Which network support services team identifies whether the client site has existing network hardware and circuits installed?
• customer service
• help desk
• network operations
• planning and provisioning
10. Which ISP network support systems team will typically contact the customer once a new circuit is ready and guide the customer in setting up passwords and other account information?
• help desk
• customer service
• network operations center
• on-site installation team
• planning and provisioning
11. What feature allows network devices to be scalable?
• a fixed number of interfaces
• ease of repair
• modularity
• low maintenance requirements
• low cost
12. Which command generated this output?
• 1 12.0.0.2 4 msec 4 msec 4 msec
• 2 23.0.0.3 20 msec 16 msec 16 msec
• 3 34.0.0.4 16 msec 18 msec 16 msec
• Router# traceroute 34.0.0.4
• Router# nslookup 34.0.0.4
• Router# ping 34.0.0.4
• Router# telnet 34.0.0.4
13. Which network utility helps determine the location of network problems and identifies routers that packets travel across?
• ping
• ipconfig
• traceroute
• ixp
14. What interconnects the Internet backbone?
• gateway routers
• IXPs
• POPs
• satellite dishes
15. What units are used to measure Internet bandwidth?
• bits per second
• bytes per second
• hertz
• megabytes per second
• packets per second
16. The IT manager of a medium-sized business wishes to house the company-owned web servers in a facility that offers round-the-clock controlled access, redundant power, and high-bandwidth Internet access. Which ISP service will fulfill this need?
• web hosting
• planning and provisioning
• application hosting
• equipment colocation
• Tier 1 ISP services
17. What is the purpose of an RFC?
• to provide the connection point for multiple ISPs to the Internet
• to document the development and approval of an Internet standard
• to connect a business to an ISP
• to provide data communication services to ISP customers
• to monitor network performance and connection status of ISP clients
18. When did the Internet become available for use by businesses and consumers?
• 1979
• 1984
• 1991
• 1999
• 2000
19. What was the original purpose of the Internet?
• voice communication
• marketing
• research
• commerce
20. What three support service teams are commonly found within an ISP? (Choose three.)
• help desk
• computer support
• application readiness
• network operations center
• planning and provisioning
• implementation and documentation
CCNA DISCOVERY 2 MODUL 2 EXAM ANSWER VERSION 4.0
CREATED BY MIKE PUTRI
06477/2008
1. Which two functions are provided by the upper layers of the OSI model? (Choose two.)
• placing electrical signals on the medium for transmission
• initiating the network communication process
• encrypting and compressing data for transmission
• segmenting and identifying data for reassembly at the destination
• choosing the appropriate path for the data to take through the network
2. Which is a function of the transport layer of the OSI model?
• routes data between networks
• converts data to bits for transmission
• delivers data reliably across the network using TCP
• formats and encodes data for transmission
• transmits data to the next directly connected device
3. Which common Layer 1 problem can cause a user to lose connectivity?
• incorrect subnet mask
• incorrect default gateway
• loose network cable
• NIC improperly installed
4. Which three command line utilities are most commonly used to troubleshoot issues at Layer 3? (Choose three.)
• ping
• a packet sniffer
• Telnet
• ipconfig
• Traceroute
5. Which address is used by the router to direct a packet between networks?
• source MAC address
• destination MAC address
• source IP address
• destination IP address
6. What is the correct encapsulation order when data is passed from Layer 1 up to Layer 4 of the OSI model?
• bits, frames, packets, segments
• frames, bits, packets, segments
• packets, frames, segments, bits
• segments, packets, frames, bits
7. What are two goals of the ISP help desk? (Choose two.)
• conserving support resources
• network optimization
• competitive scalability
• customer retention
• sales of network services
8. In what two ways do Level 1 and Level 2 help desk technicians attempt to solve a customer's problems? (Choose three.)
• talking to the customer on the telephone
• upgrading hardware and software
• using various web tools
• making an onsite visit
• installing new equipment
• with remote desktop sharing applications
9. A customer calls the help desk about setting up a new PC and cable modem and being unable to access the Internet. What three questions would the technician ask if the bottom-up troubleshooting approach is used? (Choose three.)
• Is the NIC link light blinking?
• What is the IP address and subnet mask?
• Can the default gateway be successfully pinged?
• Is the network cable properly attached to the modem?
• Is the Category 5 cable properly connected to the network slot on the PC?
• Can you access your e-mail account?
10. A customer calls to report a problem accessing an e-commerce web site. The help desk technician begins troubleshooting using a top-down approach. Which question would the technician ask the customer first?
• Can you access other web sites?
• Is there a firewall installed on your computer?
• What is your IP address?
• Is the link light lit on your NIC card?
11. Which statement describes the process of escalating a help desk trouble ticket?
• The help desk technican resolves the customer problem over the phone and closes the trouble ticket.
• Remote desktop utilities enable the help desk technician to fix a configuration error and close the trouble ticket.
• After trying unsuccessfully to fix a problem, the help desk technician sends the trouble ticket to the onsite support staff.
• When the problem is solved, all information is recorded on the trouble ticket for future reference.
12. What are two functions of the physical layer of the OSI model? (Choose two.)
• adding the hardware address
• converting data to bits
• encapsulating data into frames
• signal generation
• routing packets
13. A customer calls the ISP help desk after setting up a new PC with a cable modem but being unable to access the Internet. After the help desk technician has verified Layer 1 and Layer 2, what are three questions the help desk technician should ask the customer? (Choose three.)
• What is your subnet mask?
• What is your IP address?
• Is the NIC link light blinking?
• Can you ping the default gateway?
• Is the network cable properly attached to the cable modem?
• Is the network cable correctly connected to the network port on the PC?
14. Which scenario represents a problem at Layer 4 of the OSI model?
• An incorrect IP address on the default gateway.
• A bad subnet mask in the host IP configuration.
• A firewall filtering traffic addressed to TCP port 25 on an email server.
• An incorrect DNS server address being given out by DHCP.
15. What are two basic procedures of incident management? (Choose two.)
• opening a trouble ticket
• using diagnostic tools to identify the problem
• surveying network conditions for further analysis
• configuring new equipment and software upgrades
• adhering to a problem-solving strategy
• e-mailing a problem resolution to the customer
16. Which level of support is supplied by an ISP when providing managed services?
• Level 1
• Level 2
• Level 3
• Level 4
17. What is the first step that is used by a help desk technician in a systematic approach to helping a customer solve a problem?
• identify and prioritize alternative solutions
• isolate the cause of the problem
• define the problem
• select an evaluation process
18. A network technician has isolated a problem at the transport layer of the OSI model. Which question would provide further information about the problem?
• Do you have a firewall that is configured on your PC?
• Do you have a link light on your network card?
• Is your PC configured to obtain addressing information using DHCP?
• What default gateway address is configured in your TCP/IP settings?
• Can you ping http://www.cisco.com?
19. An ISP help desk technician receives a call from a customer who reports that no one at their business can reach any websites, or get their e-mail. After testing the communication line and finding everything fine, the technician instructs the customer to run nslookup from the command prompt. What does the technician suspect is causing the customer's problem?
• improper IP address configuration on the host
• hardware failure of the ISR used to connect the customer to the ISP
• bad cables or connections at the customer site
• failure of DNS to resolve names to IP addresses
20. Which layers of the OSI model are commonly referred to as the upper layers?
• application, presentation, session
• application, session, network
• presentation, transport, network
• presentation, network, data link
• session, transport, network
06477/2008
1. Which two functions are provided by the upper layers of the OSI model? (Choose two.)
• placing electrical signals on the medium for transmission
• initiating the network communication process
• encrypting and compressing data for transmission
• segmenting and identifying data for reassembly at the destination
• choosing the appropriate path for the data to take through the network
2. Which is a function of the transport layer of the OSI model?
• routes data between networks
• converts data to bits for transmission
• delivers data reliably across the network using TCP
• formats and encodes data for transmission
• transmits data to the next directly connected device
3. Which common Layer 1 problem can cause a user to lose connectivity?
• incorrect subnet mask
• incorrect default gateway
• loose network cable
• NIC improperly installed
4. Which three command line utilities are most commonly used to troubleshoot issues at Layer 3? (Choose three.)
• ping
• a packet sniffer
• Telnet
• ipconfig
• Traceroute
5. Which address is used by the router to direct a packet between networks?
• source MAC address
• destination MAC address
• source IP address
• destination IP address
6. What is the correct encapsulation order when data is passed from Layer 1 up to Layer 4 of the OSI model?
• bits, frames, packets, segments
• frames, bits, packets, segments
• packets, frames, segments, bits
• segments, packets, frames, bits
7. What are two goals of the ISP help desk? (Choose two.)
• conserving support resources
• network optimization
• competitive scalability
• customer retention
• sales of network services
8. In what two ways do Level 1 and Level 2 help desk technicians attempt to solve a customer's problems? (Choose three.)
• talking to the customer on the telephone
• upgrading hardware and software
• using various web tools
• making an onsite visit
• installing new equipment
• with remote desktop sharing applications
9. A customer calls the help desk about setting up a new PC and cable modem and being unable to access the Internet. What three questions would the technician ask if the bottom-up troubleshooting approach is used? (Choose three.)
• Is the NIC link light blinking?
• What is the IP address and subnet mask?
• Can the default gateway be successfully pinged?
• Is the network cable properly attached to the modem?
• Is the Category 5 cable properly connected to the network slot on the PC?
• Can you access your e-mail account?
10. A customer calls to report a problem accessing an e-commerce web site. The help desk technician begins troubleshooting using a top-down approach. Which question would the technician ask the customer first?
• Can you access other web sites?
• Is there a firewall installed on your computer?
• What is your IP address?
• Is the link light lit on your NIC card?
11. Which statement describes the process of escalating a help desk trouble ticket?
• The help desk technican resolves the customer problem over the phone and closes the trouble ticket.
• Remote desktop utilities enable the help desk technician to fix a configuration error and close the trouble ticket.
• After trying unsuccessfully to fix a problem, the help desk technician sends the trouble ticket to the onsite support staff.
• When the problem is solved, all information is recorded on the trouble ticket for future reference.
12. What are two functions of the physical layer of the OSI model? (Choose two.)
• adding the hardware address
• converting data to bits
• encapsulating data into frames
• signal generation
• routing packets
13. A customer calls the ISP help desk after setting up a new PC with a cable modem but being unable to access the Internet. After the help desk technician has verified Layer 1 and Layer 2, what are three questions the help desk technician should ask the customer? (Choose three.)
• What is your subnet mask?
• What is your IP address?
• Is the NIC link light blinking?
• Can you ping the default gateway?
• Is the network cable properly attached to the cable modem?
• Is the network cable correctly connected to the network port on the PC?
14. Which scenario represents a problem at Layer 4 of the OSI model?
• An incorrect IP address on the default gateway.
• A bad subnet mask in the host IP configuration.
• A firewall filtering traffic addressed to TCP port 25 on an email server.
• An incorrect DNS server address being given out by DHCP.
15. What are two basic procedures of incident management? (Choose two.)
• opening a trouble ticket
• using diagnostic tools to identify the problem
• surveying network conditions for further analysis
• configuring new equipment and software upgrades
• adhering to a problem-solving strategy
• e-mailing a problem resolution to the customer
16. Which level of support is supplied by an ISP when providing managed services?
• Level 1
• Level 2
• Level 3
• Level 4
17. What is the first step that is used by a help desk technician in a systematic approach to helping a customer solve a problem?
• identify and prioritize alternative solutions
• isolate the cause of the problem
• define the problem
• select an evaluation process
18. A network technician has isolated a problem at the transport layer of the OSI model. Which question would provide further information about the problem?
• Do you have a firewall that is configured on your PC?
• Do you have a link light on your network card?
• Is your PC configured to obtain addressing information using DHCP?
• What default gateway address is configured in your TCP/IP settings?
• Can you ping http://www.cisco.com?
19. An ISP help desk technician receives a call from a customer who reports that no one at their business can reach any websites, or get their e-mail. After testing the communication line and finding everything fine, the technician instructs the customer to run nslookup from the command prompt. What does the technician suspect is causing the customer's problem?
• improper IP address configuration on the host
• hardware failure of the ISR used to connect the customer to the ISP
• bad cables or connections at the customer site
• failure of DNS to resolve names to IP addresses
20. Which layers of the OSI model are commonly referred to as the upper layers?
• application, presentation, session
• application, session, network
• presentation, transport, network
• presentation, network, data link
• session, transport, network
CCNA DISCOVERY 2 MODUL 3 EXAM ANSWER VERSION 4.0
CREATED BY :MIKE PUTRI
06477/2008
PENDIDIKAN TEKNIK INFORMATIKA
UNP
1. Which two benefits can be gained by locating network equipment in a telecommunications closet, rather than in a user area? (Choose two.)
• faster communication speeds
• improved physical security
• more resistant to hacker attempts
• centralized cable management
• less electrical usage
2. Which three issues should be noted on the technician's site survey report? (Choose three.)
• unlabeled cables
• only two power outlets per wall in each room
• poor physical security of network devices
• horizontal cabling runs under 100 meters
• lack of UPS for critical devices
• two users sharing the same computer
3. Which two types of cable are used for initial router configuration? (Choose two.)
• serial cable
• rollover cable
• straight-through cable
• crossover cable
• patch cable
• console cable
4. In addition to the inventory sheet, what other information about the hosts and networking equipment should be documented by the on-site technician while performing the site survey?
• any obsolete office equipment being stored
• all product keys for site license software
• any planned growth anticipated in the near future
• the memory requirements for installed application software
5. Refer to the exhibit. What type of device is used to connect two networks?
• hub
• router
• switch
• access point
6. It is said that the goal for availability of a communications system is "five-9s". What is meant by this?
• A down time of .00001% is unacceptable.
• A network needs to be available 99.999% of the time.
• Five percent of all network expense covers 99% of user requirements.
• The most critical time for network availability is from 9:00 to 5:00 p.m. five days a week.
• The best time to do maintenance on a network is from 5:00 p.m. to 9:00 a.m. five days a week.
7. What three things are included in a logical topology document? (Choose three.)
• the location of cables, computers, and other peripherals
• the path that the data takes through a network
• the wireless signal coverage area
• the wiring closet and access point locations
• the device names and Layer 3 addressing information
• the location of routing, network address translation, and firewall filtering
8. Which device has the ability to break up broadcast and collision domains?
• repeater
• hub
• router
• switch
9. Why is it important to review the results of an on-site survey report with the customer before beginning the network design?
• to inform the customer of how much time the upgrade will take
• to discuss the implementation schedule for the new equipment
• to verify that the report accurately describes the current network and any plans for expansion
• to layout the new network design and discuss possible equipment upgrades and replacements
10. A client requires a networking device that is capable of expansion to suit growing network demands. What type of device will suit this requirement?
• a networking device with ports that can be activated and deactivated
• a networking device with a modular physical configuration
• a networking device with the ability to be turned off remotely
• a networking device with a cost per port that is as high as possible
11. What does the use of redundant network components supply to a network?
• scalability
• manageability
• compatibility
• reliability
12. What is the benefit for a company to use an ISR router?
• An ISR provides the functionality of a switch, router, and firewall in one device.
• ISRs use a PC operating system for routing traffic, thus simplifying configuration and management.
• An ISR is immune to security attacks by hackers and so replaces all other network security measures.
• ISRs make routing decisions at OSI Layer 7, thus providing more intelligence to the network than do other routers.
13. Which three items are typically found in an MDF? (Choose three.)
• user workstations
• switches and routers
• fax machines
• network equipment racks
• the point of presence
• copier
14. What are two advantages of having ISP-managed services? (Choose two.)
• does not require leasing costs for service
• can guarantee up to 99.999% availability
• eliminates the need for data backup
• increases availability of help desk services
• does not require a Service Level Agreement
15. A manufacturing company is in the process of a network upgrade. Which two statements are true about the phases of the upgrade process? (Choose two.)
• Phase 1 is used to determine network requirements.
• Phase 2 includes creating an analysis report.
• Phase 3 is based on an implementation schedule that allows extra time for unexpected events.
• Phase 4 is where prototypes are created and tested.
• Phase 5 includes identifying and addressing any weaknesses in the design.
16. When designing a network upgrade, which two tasks should the onsite technician perform? (Choose two.)
• configure the servers and routers prior to delivery
• upgrade the network operating system and all client operating systems
• investigate and document the physical layout of the premises
• document the final design for approval by the customer
• perform a site survey to document the existing network structure
• faster communication speeds
• improved physical security
• more resistant to hacker attempts
• centralized cable management
• less electrical usage
2. Which three issues should be noted on the technician's site survey report? (Choose three.)
• unlabeled cables
• only two power outlets per wall in each room
• poor physical security of network devices
• horizontal cabling runs under 100 meters
• lack of UPS for critical devices
• two users sharing the same computer
3. Which two types of cable are used for initial router configuration? (Choose two.)
• serial cable
• rollover cable
• straight-through cable
• crossover cable
• patch cable
• console cable
4. In addition to the inventory sheet, what other information about the hosts and networking equipment should be documented by the on-site technician while performing the site survey?
• any obsolete office equipment being stored
• all product keys for site license software
• any planned growth anticipated in the near future
• the memory requirements for installed application software
5. Refer to the exhibit. What type of device is used to connect two networks?
• hub
• router
• switch
• access point
6. It is said that the goal for availability of a communications system is "five-9s". What is meant by this?
• A down time of .00001% is unacceptable.
• A network needs to be available 99.999% of the time.
• Five percent of all network expense covers 99% of user requirements.
• The most critical time for network availability is from 9:00 to 5:00 p.m. five days a week.
• The best time to do maintenance on a network is from 5:00 p.m. to 9:00 a.m. five days a week.
7. What three things are included in a logical topology document? (Choose three.)
• the location of cables, computers, and other peripherals
• the path that the data takes through a network
• the wireless signal coverage area
• the wiring closet and access point locations
• the device names and Layer 3 addressing information
• the location of routing, network address translation, and firewall filtering
8. Which device has the ability to break up broadcast and collision domains?
• repeater
• hub
• router
• switch
9. Why is it important to review the results of an on-site survey report with the customer before beginning the network design?
• to inform the customer of how much time the upgrade will take
• to discuss the implementation schedule for the new equipment
• to verify that the report accurately describes the current network and any plans for expansion
• to layout the new network design and discuss possible equipment upgrades and replacements
10. A client requires a networking device that is capable of expansion to suit growing network demands. What type of device will suit this requirement?
• a networking device with ports that can be activated and deactivated
• a networking device with a modular physical configuration
• a networking device with the ability to be turned off remotely
• a networking device with a cost per port that is as high as possible
11. What does the use of redundant network components supply to a network?
• scalability
• manageability
• compatibility
• reliability
12. What is the benefit for a company to use an ISR router?
• An ISR provides the functionality of a switch, router, and firewall in one device.
• ISRs use a PC operating system for routing traffic, thus simplifying configuration and management.
• An ISR is immune to security attacks by hackers and so replaces all other network security measures.
• ISRs make routing decisions at OSI Layer 7, thus providing more intelligence to the network than do other routers.
13. Which three items are typically found in an MDF? (Choose three.)
• user workstations
• switches and routers
• fax machines
• network equipment racks
• the point of presence
• copier
14. What are two advantages of having ISP-managed services? (Choose two.)
• does not require leasing costs for service
• can guarantee up to 99.999% availability
• eliminates the need for data backup
• increases availability of help desk services
• does not require a Service Level Agreement
15. A manufacturing company is in the process of a network upgrade. Which two statements are true about the phases of the upgrade process? (Choose two.)
• Phase 1 is used to determine network requirements.
• Phase 2 includes creating an analysis report.
• Phase 3 is based on an implementation schedule that allows extra time for unexpected events.
• Phase 4 is where prototypes are created and tested.
• Phase 5 includes identifying and addressing any weaknesses in the design.
16. When designing a network upgrade, which two tasks should the onsite technician perform? (Choose two.)
• configure the servers and routers prior to delivery
• upgrade the network operating system and all client operating systems
• investigate and document the physical layout of the premises
• document the final design for approval by the customer
• perform a site survey to document the existing network structure
17. What is the term for the location at the customer premise where the customer network physically connects to the Internet through a telecommunications service provider?
• backbone area
• point of presence
• network distribution facility
• intermediate distribution frame
18. to the exhibit. Which type of twisted pair cable is used between each device?
• A=console, B=straight, C=crossover, D= crossover, E=straight
• A=straight, B=straight, C=straight, D=crossover, E=console
• A=crossover, B=straight, C=straight, D=crossover, E=crossover
• A=console, B=straight, C=straight, D=crossover, E=crossover
• A=console, B=crossover, C=crossover, D=straight, E=straight
19. In what two ways will entering into a managed service agreement with an ISP for a network upgrade affect the costs that are incurred by the customer? (Choose two.)
• Customer IT training costs will increase to enable operation of the new equipment.
• The cost of hardware repairs and support will become the responsibility of the customer.
• Network upgrade and maintenance costs will become predictable.
• Staffing costs will increase because the customer will need to hire additional IT staff to complete the upgrade.
• The company will not need to spend a large amount of money to purchase the equipmentupfront.
20. Which type of cable has a solid copper core with several protective layers including PVC, braided wire shielding, and a plastic covering?
• STP
• UTP
• coaxial
• fiber optic
21. What must be added when a network expands beyond the coverage area of the current telecommunications room?
• MDF
• POP
• IDF
• IXP
Kamis, 21 Oktober 2010
ChaPTer 7.25
ChaPter 7
Create By MiKe putri
Nim : 06477
Teknik InforMatiKa
UniVersitas Negeri Padang
7.2.5 Configuring a Wireless Access Point
Step 1:
d)
Step 2: Log in to the multi-function device and configure the wireless network
e) SSID atau Service set identifier adalah tempat mengisikan nama dari access point yang akan disetting. Apabila klien komputer sedang mengakses kita misalnya dengan menggunakan super scan, maka nama yang akan timbul adalah nama SSID yang diisikan tersebut.
Step 3: Reflection
a) nirkabel, adalah teknologi yang menghubungkan dua piranti untuk bertukar data atau suara tanpa menggunakan media kabel.
b) Sebuah service set identifier (SSID) adalah urutan karakter yang unik nama jaringan area lokal nirkabel (WLAN). An SSID is sometimes referred to as a "network name." Sebuah SSID kadang-kadang disebut sebagai "nama jaringan." This name allows stations to connect to the desired network when multiple independent networks operate in the same physical area. Nama ini memungkinkan stasiun untuk terhubung ke jaringan yang diinginkan ketika beberapa jaringan independen beroperasi di wilayah fisik yang sama.
Each set of wireless devices communicating directly with each other is called a basic service set (BSS). Setiap set perangkat nirkabel berkomunikasi langsung satu sama lain disebut service set dasar (BSS). Several BSSs can be joined together to form one logical WLAN segment, referred to as an extended service set (ESS). Beberapa BSSs bisa bergabung bersama untuk membentuk satu segmen WLAN logis, disebut sebagai service set diperluas (ESS). A Service Set Identifer (SSID) is simply the 1-32 byte alphanumeric name given to each ESS. Service Set Identifer (SSID) adalah hanya nama alfanumerik 1-32 byte diberikan kepada setiap ESS.
For example, a departmental WLAN (ESS) may consist of several access points (APs) and dozens of stations, all using the same SSID. Misalnya, WLAN departemen (ESS) dapat terdiri dari beberapa akses point (AP) dan puluhan stasiun, semua menggunakan SSID yang sama. Another organization in the same building may operate its own departmental WLAN, composed of APs and stations using a different SSID. Organisasi lain di gedung yang sama dapat beroperasi WLAN departemen nya sendiri, terdiri dari AP dan stasiun menggunakan SSID yang berbeda. The purpose of SSID is to help stations in department A find and connect to APs in department A, ignoring APs belonging to department B. Tujuan dari SSID adalah untuk membantu stasiun di departemen A menemukan dan terhubung ke AP di Sebuah departemen, mengabaikan AP milik departemen B.
Each AP advertises its presence several times per second by broadcasting beacon frames that carry the ESS name (SSID). Setiap AP mengiklankan kehadirannya beberapa kali per detik oleh penyiaran frame suar yang membawa nama ESS (SSID). Stations can discover APs by passively listening for beacons, or they can send probe frames to actively search for an AP with the desired SSID. Stasiun dapat menemukan AP secara pasif mendengarkan beacon, atau mereka dapat mengirim frame probe untuk secara aktif mencari sebuah AP dengan SSID yang diinginkan. Once the station locates an appropriately-named AP, it can send an associate request frame containing the desired SSID. Setelah stasiun menempatkan sebuah AP tepat-nama, dapat mengirim permintaan asosiasi frame yang berisi SSID yang diinginkan. The AP replies with an associate response frame, also containing SSID. AP balasan dengan kerangka respon asosiasi, juga mengandung SSID.
Some frames are permitted to carry a null (zero length) SSID, called a broadcast SSID. Beberapa frame yang diperbolehkan untuk membawa null (nol panjang) SSID, disebut SSID broadcast. For example, a station can send a probe request that carries a broadcast SSID; the AP must return its actual SSID in the probe response. Sebagai contoh, stasiun dapat mengirim permintaan penyelidikan yang membawa SSID broadcast, AP harus kembali SSID sebenarnya dalam respon probe. Some APs can be configured to send a zero-length broadcast SSID in beacon frames instead of sending their actual SSID. Beberapa AP yang dapat dikonfigurasi untuk mengirim broadcast SSID nol-panjang dalam bingkai suar daripada mengirim SSID sebenarnya mereka. However, it is not possible to keep an SSID value secret, because the actual SSID (ESS name) is carried in several frames. Namun, tidak mungkin untuk menjaga rahasia nilai SSID, karena SSID sebenarnya (ESS nama) dilakukan dalam beberapa frame.
7.2.6 Configuring a Wireless Client
Step 1: Install the wireless NIC driver
b) NIC untuk Wireless Network
Ada 3 standar yang digunakan, yaitu:
- 802.11a wireless networking
Frekuensi 5 GHz, kecepatan 54 Mbps
Biaya mahal, untuk file-file yang besar
- 802.11b wireless networking
Frekuensi 2,4 GHz, kecepatan 11 Mbps
Interferensi dengan perangkat lain
- 802.11g wireless networking
Frekuensi 2,4 GHz, kecepatan 20 Mbps
Interferensi, throughput lebih dari 802.11b
c) Cara Install Driver Perangkat Lunak Untuk Kartu Lan Nirkabel
Komputer tanpa bekerja antena nirkabel dapat ditingkatkan dengan baik kartu LAN nirkabel internal atau eksternal. Untuk menghubungkan ke hotspot internet favorit Anda atau jaringan rumah,
Anda harus menyelesaikan instalasi dengan menginstal driver perangkat's - file yang memungkinkan perangkat untuk berkomunikasi dengan sistem operasi Anda. Anda dapat memiliki Windows menginstal driver, biarkan Windows memperbarui driver atau manual menginstal driver terbaru sendiri.
http://www.papatek.com/USB-Wireless-LAN-Adapter
Boot komputer Anda. Masukkan disk instalasi driver dan disertakan dengan kartu LAN nirkabel Anda. Klik "Mulai Instalasi," "Instal Perangkat Lunak" atau frase berjudul sama lain.
Ikuti petunjuk pada layar. Mematikan komputer dan memasang kartu ke slot yang tersedia pada motherboard Anda, jika berlaku, kemudian restart komputer. (Beberapa kartu lama seperti
Linksys WMP54G internal 'mengharuskan Anda untuk menginstal perangkat lunak awal sebelum menginstal kartu fisik) instalasi Selesai.. http://www.papatek.com/PCI-Wireless-LAN-Card
Instal Driver Windows Via
Memasang kartu internal Anda. Boot up komputer.
Hubungkan ke Internet setelah beban Windows, kemudian masukkan kartu LAN nirkabel Anda eksternal.
Biarkan Windows kesempatan untuk secara otomatis mendeteksi perangkat Anda dan untuk menginstal driver. Update secara manual Driver
Klik pada "Start" kemudian "Control Panel" klik. Pada "Classic View" pada kolom kiri, jika tersedia.
Buka "System." Klik "Device Manager" pada Windows Vista dan di Windows 7. Klik pada tab "Hardware, kemudian" Device Manager "pada Windows XP.
Double-klik "Network Adapter," kemudian klik dua kali kartu LAN nirkabel Anda diinstal sebelumnya. (Anda harus menginstal Kartu LAN Anda sebelum memperbarui driver, atau tidak terdaftar dalam Device Manager.)
Klik pada Driver "" tab. Klik "Update Driver," lalu "Cari Otomatis" atau "Browse My Computer" jika Anda download driver dari situs web produsen. Ikuti petunjuk pada layar untuk menyelesaikan instalasi driver.
Step 2: Install the wireless NIC
Step 3: Attach to the wireless network
b) SSID copas
d) kekuatan sinyalnya kuat, tidak terbatas
e) ya
g) DHCP
h) membiarkan Windows XP kontrol NIC wireless
Step 4: Determine the NIC driver version
Step 5: Determine if the NIC driver is the most current
a) www.ultimatepcrepair.com
b) Computer Repair - Identifying Home Network Components
Step 6: Verify connectivity
Step 7: Reflection
a) tidak, karena sama saja jaringan nirkabel yang ada di mana saja
b) cukup, karena jangkauan dari AP yang ada di toko makanan tidak cukup luas
Lab 7.3.5 Configuring Wireless Security
Step 1: Plan the security for your home network
a) 6 Langkah Pengamanan Dasar Jaringan :
1. Ubahlah Sistem ID (Identitas)
Biasanya suatu layanan nirkabel dilengkapi dengan suatu standart pengamanan identitas atau yang sering disebut SSID (Service Set Identifier) or ESSID (Extended Service Set Identifier). Sangat mudah bagi seorang hacker untuk mencari tahu identitas default dari suatu layanan atau jaringan, jadi sebaiknya Anda segera mengubahnya menjadi suatu identitas yang unik, yang tidak mudah ditebak orang lain.
2. Mematikan identitas pemancar1. Ubahlah Sistem ID (Identitas)
Biasanya suatu layanan nirkabel dilengkapi dengan suatu standart pengamanan identitas atau yang sering disebut SSID (Service Set Identifier) or ESSID (Extended Service Set Identifier). Sangat mudah bagi seorang hacker untuk mencari tahu identitas default dari suatu layanan atau jaringan, jadi sebaiknya Anda segera mengubahnya menjadi suatu identitas yang unik, yang tidak mudah ditebak orang lain.
Dengan mengumumkan kepada umum bahwa Anda memiliki suatu jaringan nirkabel akan membuat para hacker penasaran untuk membobol jaringan nirkabel Anda. Mempunyai suatu jaringan nirkabel bukan berarti harus memberitahukannya kepada semua orang. Periksalah secara manual perangkat keras yang Anda pakai untuk jaringan nirkabel tersebut, dan pelajarilah bagaimana cara mematikannya.
3. Sediakanlah enkripsi
WEP (Wired Equivalent Privacy) and WPA (Wi-Fi Protected Access) dapat meng-enkripsi data Anda sehingga hanya penerima saja yang diharapkan dapat membaca data tersebut. WEP (Wired Equivalent Privacy) mempunyai banyak kelemahan yang membuatnya mudah disusupi. Kunci 128-bit hanya mempunyai tingkat pencapaian yang relatif rendah tanpa peningkatan keamanan yang signifikan, sedangkan untuk 40-bit atau 64-bit pada beberapa perlengkapan lainnya, mempunyai enkripsi yang sama baiknya. Dengan cara pengamanan yang standart saja pastilah tetap akan mudah bagi hacker untuk menyusup, namun dengan cara enkripsi ini pastilah akan membuat jaringan Anda lebih aman dari hacker. Jika memungkinkan, ada baiknya untuk menggunakan enkripsi WPA (peralatan yang lebih tua dapat diupgrade terlebih dahulu agar compatible dengan WPA). WPA dapat sangat menjanjikan dalam menjamin keamanan jaringan nirkabel Anda, namun masih tetap dapat dikalahkan oleh serangan DOS (denial of services).
4. Membatasi dari penggunaan traffic yang tidak perlu
Banyak router jaringan kabel maupun nirkabel yang dilengkapi firewalls. Bukan bermaksud mengedepankan firewalls, namun firewalls telah membantu dalam pertahanan keamanan jaringan. Bacalah petunjuk manual dari perangkat keras Anda dan pelajarilah cara pengaturan konfigurasi router Anda, sehingga hanya traffic yang sudah seijin Anda saja yang dapat dijalankan.
5. Ubahlah 'kata sandi' default Administrator milik Anda
Hal ini baik untuk semua penggunaan perangkat keras maupun perangkat lunak. Kata sandi default sangat mudah disalahgunakan, terutama oleh para hacker. Oleh karena itu sebaiknya ubahlah kata sandi Anda, hindari penggunaan kata dari hal-hal pribadi Anda yang mudah diketahui orang, seperti nama belakang, tanggal lahir, dan sebagainya.
6. Kunci dan lindungilah komputer Anda
Hal ini merupakan cara pengamanan terakhir untuk komputer Anda. Gunakanlah firewall, perangkat lunak Anti Virus, Zone Alarm, dan lain sebagainya. Setidaknya setiap satu minggu perbaharuilah Anti Virus yang Anda pakai.
(dna)
b) Apa resiko akses internet nirkabel
Kita semua tahu bahwa node jaringan nirkabel dapat memancarkan ke kisaran normal sekitar 300 meter, 300 meter, sehingga pemasangan kartu jaringan nirkabel untuk komputer apapun, dapat akses ke node jaringan nirkabel, dan dapat masuk ke jaringan nirkabel, jelas bahwa jenis metode akses mudah, mudah untuk membawa kepada ancaman keamanan jaringan nirkabel. Sebagai contoh, di 300 meter di Taiwan hacker komputer juga memiliki akses ke jaringan nirkabel Anda untuk mengontrol komputer Anda "setiap tindakan"; Walaupun jaringan nirkabel di kurangnya kerahasiaan informasi sebagai ketat kabel jaringan, tetapi Anda tentu tidak ingin serangan melanggar hukum sangat mudah untuk mengetahui keberadaan Anda dalam berbagai jaringan, seperti yang situs yang Anda kunjungi teman-teman, apa yang privasi dari pesan yang dikirim teman-teman di luar negeri, dll, adalah mungkin pengunjung ilegal tahu pasti.
Lebih serius adalah pengunjung ilegal dari jauh setelah Anda masuk ke dalam jaringan nirkabel Anda, akan sangat mudah untuk mencuri semua informasi account online Anda, sehingga akan memberikan keamanan yang lebih besar mengakibatkan kerugian. Jadi ada semua jenis jaringan nirkabel menghadapi risiko keamanan, Anda harus segera mengambil tindakan untuk mengambil tindakan penanggulangan, seperti melalui enkripsi atau verifikasi menggunakan teknologi identifikasi jaringan, untuk memastikan bahwa hanya Anda sebelum ditunjuk pengguna atau peralatan jaringan bisa ke jaringan nirkabel Anda , sementara yang lain ingin memaksa melalui berbagai teknologi jaringan nirkabel untuk mengakses operator jaringan nirkabel Anda, akan ditolak.
Step 8: Reflection
a) LinkSys WRT54G harganya yang murah dan cukup bisa diandalkan.
b) cara untuk membuat jaringan komputer yang aman
Jaringan komputer merupakan kumpulan dari beberapa komputer yang memliki koneksi satu dengan yang lain. Ketika semua komputer saling terhubung dalam suatu jaringan, keamanan merupakan hal yang harus diperhatikan. Fungsi keamanan adalah membuat jaringan komputer menjadi stabil, terstruktur, kuat serta mampu mengatasi berbagai gangguan. Logikanya, bila dalam suatu jaringan komputer ternyata memiliki sisi keamanan yang lemah tentu hal ini berdampak merusak kestabilan jaringan komputer tersebut. Banyaknya gangguan yang masuk akibat lemahnya keamanan yang dibuat bisa merusak kinerja transfer data pada jaringan komputer. Oleh karena itu, gangguan menjadi parameter untuk mengukur tingkat keamanan. Logikanya, sistem tersebut memiliki tingkat keamanan berdasarkan sering tidaknya mengalami gangguan, bukan?
Setelah memahami pentingnya keamanan dalam suatu jaringan maka kita dapat mengkaji lebih detail tentang keamanan jaringan komputer itu sendiri. Prinsip keamanan pada jaringan adalah hal yang sangat kompleks. bahwa keamanan jaringan komputer terdiri dari banyak bagian atau komponen. Sedangkan Tiap komponen itu masih kompleks. Hal ini setidaknya menggambarkan bahwa keamanan jaringan komputer ibarat puzzle yang besar dan rumit. Disamping banyak sekali standar keamanan dalam jaringan komputer, ternyata jumlah dan jenis serangan terhadap keamanan ikut bertambah tiap harinya. Hal ini membuat standar yang sudah dipakai harus dipertimbangkan kembali dan diubah lagi untuk mengimbangi jumlah dan jenis serangan yang selalu bertambah dan bervariasi.
Klasifikasi keamanan menurut David Icove, bahwa 4 tingkat yang harus diperhatikan :
1. Fisik / Physical Security
2. Manusia / Personel Security
3. Data, media , teknik dan komunikasi
4. Kebijakan dan prosedur
Kamis, 14 Oktober 2010
ChaPter 6 CCNA
Chapter 6
by :Mike Putri
6.2.1
step1:
d) 60.254.176.170
e) karena itu merupakan ping dari komputer/ PC yang sedang dijalankan
step2:
b) ns3.unp.ac.id
e) cmd nslookup -> bisa jalan
msconfig nslookup -> jalan
notepad nslookup -> bisa jalan
g) 192.168.194.2
h) tidak sama, yang d command adalah 10.1.1.1
i) 64.133.161.111
step3:
f) 10.1.1.1
step4:
a) tidak bisa nyambung ke jaringan internet
b)
6.2.3
step1:
d) - Append
- Ascii
- Bell
f) Put : Untuk menyalin file ke remote computer
g) - Get : Salinan satu jauh file ke komputer lokal
- Send : Mengirim file yang berada dalam komputer lokal ke komputer server yang sedang di-remote
- Recv : Mengcopy file yang ada di remote computer ke dalam computer local
step2:
c) http://banditcode.wordpress.com/2010/02/23/perintah-ftp-windows/
d) Manfaat FTP Untuk mengambil data / file.Untuk mendownload software. Untuk menaruh data pada komputer
6.2.4
step3:
c) pop3.xyz-isp.com
d) smtp.xyz-isp.com
step5:
a) keuntungan
- pesan yang dikirim langsung kepada si penerima pesan
kelemahan
- lambat sampai pada si penerima
b) keuntungan: cepat
kelemahan : mudah terserang virus (hacker)
by :Mike Putri
6.2.1
step1:
d) 60.254.176.170
e) karena itu merupakan ping dari komputer/ PC yang sedang dijalankan
step2:
b) ns3.unp.ac.id
e) cmd nslookup -> bisa jalan
msconfig nslookup -> jalan
notepad nslookup -> bisa jalan
g) 192.168.194.2
h) tidak sama, yang d command adalah 10.1.1.1
i) 64.133.161.111
step3:
f) 10.1.1.1
step4:
a) tidak bisa nyambung ke jaringan internet
b)
6.2.3
step1:
d) - Append
- Ascii
- Bell
f) Put : Untuk menyalin file ke remote computer
g) - Get : Salinan satu jauh file ke komputer lokal
- Send : Mengirim file yang berada dalam komputer lokal ke komputer server yang sedang di-remote
- Recv : Mengcopy file yang ada di remote computer ke dalam computer local
step2:
c) http://banditcode.wordpress.com/2010/02/23/perintah-ftp-windows/
d) Manfaat FTP Untuk mengambil data / file.Untuk mendownload software. Untuk menaruh data pada komputer
6.2.4
step3:
c) pop3.xyz-isp.com
d) smtp.xyz-isp.com
step5:
a) keuntungan
- pesan yang dikirim langsung kepada si penerima pesan
kelemahan
- lambat sampai pada si penerima
b) keuntungan: cepat
kelemahan : mudah terserang virus (hacker)
Langganan:
Postingan (Atom)