Unit 5 Assignment 2

In: Computers and Technology

Submitted By urwhatueat85225
Words 327
Pages 2
Unit 5 Assignment 2
Ethernet Local Area Networks Review
PT1210 Introduction to Networking
Christopher B. Young
ITT Tech – Tempe Campus
Instructor: Mr. Larry Douglas
Oct 16, 2015

1.C | 11.C | 2.D | 12.C | 3.B | 13.C | 4.A | 14.A | 5.B | 15.A | 6.E | 16.A | 7.D | 17.D | 8.A | 18.C | 9.A | 19.B | 10.A | 20.C |

Ethernet LAN: A collection of devices including user devices, LAN switches, routers, old hubs and cables all of which use IEEE Ethernet standards at the physical and data link layers so that the devices can send Ethernet frames to each other
802.3: The name of the original IEEE Ethernet standard as well as the overall base name of all IEEE Ethernet LAN working committees
Fast Ethernet: The informal name for one particular Ethernet standard originally defined formally as 803.3u which was the first Ethernet Standard to surpass the original 10-Mbps speed to run at 100 Mbps.
Gigabit Ethernet: The informal name for one particular Ethernet standard defined formally in 802.3z(for fiber) and 802.3ab(for UTP) with a speed of 1 Gbps
Autonegotiation: A process defined by the IEEE so that nodes on the same etherent link can exchange messages for the purpose of choosing the best speed and duplex option that both nodes support
Ethernet Frame: The bytes of data that flow in an Ethernet LAN which begins with the Ethernet header followed by data and ends with the Ethernet trailer. Ethernet LANs deliver Ethernet frames from one Etherent device to another
MAC Address: A data link layer address, 48 bits in length usually written as 12 hexadecimal digits and used to represent different devices connected to LANs.
MAC Address Table: On a LAN switch a table of MAC addresses and local switch ports that the switch uses when making its decision of where to forward Ethernet frames that arrive at the…...

Similar Documents

Unit 5 Assignment 1

...Unit 5 Assignment 1 1) Choosing a database management system requires a great deal of analysis. False. 2) When choosing a database management system, you should consider system compatibility and hardware requirements. True. 3) Only insert and update statements are part of a database transaction. True. 4) Physical design is independent of any particular database management system. False. 5) A data type is a column specification that determines what kind of data can be stored in it. True. 6) Int, decimal and money are character numeric types. True. 7) Char and NChar are variable-length character types. False. 8) Varchar and NVarchar are variable length character types. False. 9) NChar and NVarchar are based on the unicode character set. True. 10) Unicode is an expanded character set that contains non-Latin characters. False. 11) A null is the same as a 0 or an empty string. True. 12) You should not allow nulls in columns that are critical to your business rules. True. 13) Tables can only be created by SQL statements in SQL Server. False. 14) Referential integrity exists when every foreign key relates to a primary key. True. 15) When referential integrity is in effect, you cannot delete a record in the primary key table until you have first deleted all the related records in the foreign key table. False. 16) When referential integrity is in effect, you can only enter records in the foreign key side of the relation...

Words: 331 - Pages: 2

Unit 2 Assignment 2

...NT2580 Unit 2 Assignment 2 10/1/13 1. The five vulnerabilities that exist for this LAN based workgroup are 2755801, 2501696, 2588513 2639658, 2659883. 2. Yes, the vulnerability that involves privilege elevation is 2639658 (Vulnerability in TrueType Font Parsing), but it is not a high priority. 3. 2719662 Solution: Workarounds refer to a setting or configuration change that does not correct the underlying issue but would help block known attack vectors before a security update is available. Apply the Microsoft Fix it solution that blocks the attack vector for this vulnerability. Disable Sidebar in Group Policy. Disable the Sidebar in the system registry. 2737111 Solution: Workarounds refer to a setting or configuration change that does not correct the underlying issue but would help block known attack vectors before a security update is available. Disable WebReady document view for Exchange. 2755801 Solution: Workaround refers to a setting or configuration change that would help block known attack vectors before you apply the update. Prevent Adobe Flash Player from running. Prevent Adobe Flash Player from running on Internet Explorer 10 through Group Policy on Windows 8 and Windows Server 2012. Prevent Adobe Flash Player from running in Office 2010 on Windows 8 and Windows Server 2012. Prevent ActiveX controls from running in Office 2007 and Office 2010. Set Internet and Local intranet security zone settings to "High" to block ActiveX Controls and Active......

Words: 257 - Pages: 2

Unit 5 Assignment 2 Define an Acceptable Use Policy (Aup)

...Unit 5 Assignment 2: Define an Acceptable Use Policy (AUP) Acceptable Use Policy Richman Investments holds requirements for the usage of the company network including filtering policies for network traffic. LAN – WAN is where the IT infrastructure links to a wide area network and internet. For Security (Administrators and Managers) - Security monitoring controls for intrusion - Apply email server and attachment antivirus and email quadrating for unknown file types - Disablement for ping, probing, and port scanning on all exterior IP devices - Denying of outbound traffic using source IP addresses - Apply file transfer monitoring, scanning and alarming for unknown file types Web Surfing is the usage of the internet browsing a series of web browsers For Security (Administrators and Managers) - Apply domain-name content filtering at the internet entry/access point - Employees may lose productivity while searching web for no work related material Cons putting a limitation to web surfing may cause the employee to lack independence of finding information. What if they need to look up an answer to a customers’ question and has to find it on the web? Pros not using the internet could prevent a wide variety of viruses and the company is only allowed to use their company accounts to send out emails to customers. Guidelines to usage of email are covered under email usage policy Richman Investment Employees: Certain traffic is expressly forbidden: - No peer-to-peer......

Words: 339 - Pages: 2

Unit 2 Assignment 2

...Unit 1 Research Paper 1 Injectable Tissue Engineering Brand Zae GS1140 Injectable Tissue Engineering Introduction Every year more than700,000 Americans undergo a form of joint replacement surgery. The procedure-in which a knee or a hip is replaced with an artificial implant-is highly invasive, and many patients delay said surgery for as long as they can. A doctor by the name of Jennifer Elisseeff , a biomedical engineer at Johns Hopkins University, hopes to change that with a simple and quick procedure that does away with surgery entirely. Dr. Elisseeff and her colleagues have developed a way to inject joints with specially designed mixtures of polymers, cells, and growth stimulators that solidify and form healthy tissue. This form of technology can eliminate the need for many expensive and dangerous surgeries. Surgeries involving muscle development, the cardio vascular system, and even limb repair after a traumatic incident. This form of technology can improve our health care system dramatically and open new windows of opportunity for new forms of medicine. Even the possibility for new cures for diseases that we currently fight every day such as cancer and possibly even HIV, eliminating the need for long and expensive treatments. As well as repairing worn or damaged tissue, this form of engineering can also be used in the future for growing new organs or limbs to replace old damaged or missing ones. If a patient is in need of a new......

Words: 427 - Pages: 2

Unit 5 Assignment 2

...IS3340-WINDOWS SECURITY | Security Audit Procedure Guide | Unit 5 Assignment 3 | | [Type the author name] | 5/1/2014 | | This document outlines the required steps to follow, inorder to properly scan the necessary hardware (servers and workstations) in the Ken 7 Windows Limited Domain for security vulnerabilities. 1) Acquire and install MBSA •Download MBSA. Download MBSA from the MBSA home page, and then install it to the default directory. •Updates for MBSA. If both the computer you will be scanning and the computer with MBSA installed have Internet access, the latest security catalog (.cab file), authentication files, and WUA installer files will be automatically downloaded, if needed. If either the target computer or the computer with MBSA installed does not have Internet access, download the following files and place them in the C:\Documents and Settings\<username>\Local Settings\Application Data\Microsoft\MBSA\2.0\Cache\ directory on the computer that is performing the scan. 2) Scan computers Run MBSA and clear the Check for security updates check box when performing the scan. Using the Graphical Interface Tool The following procedure describes how to use the MBSA GUI tool. To use the MBSA GUI tool to scan for updates and patches 1. On the Programs menu, click Microsoft Baseline Security Analyzer. 2. Click Scan a computer. 3. Make sure that the following options are not selected, and then click Start scan. * Check for Windows......

Words: 487 - Pages: 2

Nt1210 Unit 5 Assignment 2

...Roy Mejia Introduction to Networking Week 5 Assignment 2 1. Which of the following types of LANs was a competitor of Ethernet LANs from the earliest days of wired LANs in the 1980s and into the 1990s? c. Token Ring Which of the following types of LANs is the strongest competitive option to be used instead of Ethernet LANs today? d. 802.11 LANs 3. Which of the following speeds are not defined as a speed by some Ethernet LAN standard? b. 4 Gbps 4. Think back to the information listed for Gigabit Ethernet for maximum cabling distances. Which of the answers matches the correct standard with the cabling type and maximum cable length? A. 1000BASE-LX, MM fiber, 550 meters 5. A campus LAN drawing shows hundreds of user devices cabled to LAN switches on various floors of a building. The per-floor edge switches have a cable connected to other switches that sit on the first floor of the building. All the links from the edge switches to the end-user devices use 100BASE-T. A PC on floor 2 sends an Ethernet frame to a PC on floor 3, with the frame passing through the switches on the first floor as part of the journey. Which of the following statements is true about the links between the switches in this Ethernet LAN? b. The links could use any Ethernet LAN standard. 6. Which of the following shortcut names defines an IEEE standard that runs at 10,000,000,000 bits per second, and includes some fiber cabling options? . None of the answers is correct. 7. Which of......

Words: 1244 - Pages: 5

Unit 5 Assignment

...------------------------------------------------- Unit 5 Assignment Template: Name: - Course Number: - AB224 Section Number: - 1 Unit Number: - 5 Date: - ---------------------------------- General Instructions for all Assignments----------------------------------- 1. Unless specified differently by your course instructor, save this assignment template to your computer with the following file naming format: Course number_section number_LAST_FIRST_ unit number 2. At the top of the template, insert the appropriate information: Your Name, Course Number, Section Number and Date 3. Insert your answers below, or in the appropriate space provided for in the question. Your answers should follow the APA format with citations to your sources and, at the bottom of your last page, a list of references. Your answers should also be in Standard English with correct spelling, punctuation, grammar, and style (double spaced, in Times New Roman, 12-point, black font). Respond to questions in a thorough manner, providing specific examples of concepts, topics, definitions, and other elements asked for in the questions. 4. Provide a list of references at the end of the last page of your assignment. 5. Upload the completed assignment to the appropriate dropbox. 6. Any questions about the assignment, or format questions, should be directed to your course instructor. ------------------------------------------- Career Competencies......

Words: 1389 - Pages: 6

Nt 1210 Unit 5 Assignment 2

...GS 1145 Strategies Unit 11 Assignment 1 Reflection Kelly S Draney This class has been an eye opener for me in respect that I was a real procrastinator. It has helped to open my eyes to the fact that I need to get my homework done and in on time. With the assignment on scheduling I found that I wasted a lot of time during the day, when I could be getting things done. Breaking down my schedule into blocks showed me that I had a lot of wasted time watching TV when I could be more productive. Having to juggle time for work and school was something I was not accustomed to. I have a greater respect for my students now seeing what they have to go through. The other thing this class helped me with, was learning how to use the Microsoft Office Suites programs better. I had no idea how to use Power Point before this class. Gratefully we were put into small groups to work on these projects. The good thing about these projects was it gave me a chance to learn about Power Point. I was surprised how easy it really is to use. It also helped to learn the different rules about completing a Power Point Presentation. I enjoyed being in your class. I heard a lot of good comments from students who felt you were tough, but fair. You created a fun learning environment in class. I look forward to having you again for an instructor later on in my studies. ...

Words: 259 - Pages: 2

Com 105 Unit 5 Assignment 2 Ethics and Integrity at Work Com105 Unit 5 Assignment 2 Ethics and Integrity at Work

...COM 105 Complete Course Click below link for Answer Visit www.workbank247.com http://workbank247.com/q/com-105-complete-course-com105-complete-course/11000 http://workbank247.com/q/com-105-complete-course-com105-complete-course/11000 Assignment 1: Introduction to Classmates and This Course Begin this discussion assignment by introducing yourself to classmates—giving your name, current occupation, and areas of interest that might be covered by this course. * Describe your employment type, position, and experience. * Assess your experience of conflict management: 1. How frequently do you feel conflicts arise in your place of employment? 2. How does conflict make you feel? 3. How do you deal with conflict? 4. If there is conflict at work, is your opinion sought? * From the perspective of an employee or student, describe a personal experience involving the use of negotiation skills in the workplace or a personal setting. Assignment 2: Recipe for Success! Every individual approaches life and situations differently. We all use communication as a means to express ourselves. However, communication is as much about listening as it is about talking. Communication is a mutual exchange. Everyone has had a disagreement with someone in which the other person may respond with “You aren’t listening to me!” or “You don’t understand me!” The fact is, you are not validating the other person or are perceived as someone who is not providing validation. Validation can......

Words: 2216 - Pages: 9

Unit 2 Assignment 2

...Asimo Unit 2 assignment 2 | AbstractASIMO is a humanoid Robot that was built to genuinely help people. Linda Vaughn | Asimo Unit 2 assignment 2 | AbstractASIMO is a humanoid Robot that was built to genuinely help people. Linda Vaughn | Linda Vaughn GS1145T 10/3/2015 Why Create ASIMO? ASIMO is humanoid robot created to duplicate human motion and genuinely help people. ASIMO took more than two decades of persistent study, research, trial and error before achieving a humanoid robot. ASIMO's design, development and operation rely on many different disciplines including Mathematics, Physics, Anatomy, Engineering and Computer Science. In 1986 Honda engineer’s set out to create a walking humanoid robot early models (E1, E2, and E3) focused on developing legs that could simulate the walk of a human. Models (E4, E5, and E6) focused on developing walk stabilization and climbing stairs. Then the head, arms and body were added to improve balance. Hondas first robot P1 was rather rugged standing at 6’2 and weighing at 386lbs. P2 had a more friendly design. P3 model was more compact standing at 5’2 and weighing 287lbs. ASIMO can run, walk on uneven slopes and surfaces turn smoothly and reach and grab for objects. ASIMO can also comprehend and respond to simple voice commands. It can also recognize the face of a selective group of individuals using camera eyes. It can also map environment and register stationary objects and can avoid moving objects as it moves......

Words: 598 - Pages: 3

Nt1210 Unit 5 Assignment 2

...Multiple Choice 1. C - Token Ring 2. D - 802.11 LANs 3. B – 4 Gbps 4. A – 1000BASE-LX, MM Fiber, 550 Meters 5. B – The links could use any Ethernet LAN Standard 6. E – None of the answers is correct 7. A – 802.3ab 8. C – The introduction of 1000BASE-T products into the market 9. A – Autonegotiation works on the switch-to-PC A link, causing PC A to run at 100 Mbps C – Autonegotiation fails to work on the switch-to-PC B link, causing the switch to run at 10 Mbps 10. A – PC A uses full duplex as the result of the autonegotiation process working C – Switch port G2 uses half duplex because autonegotiation fails, making the switch use the default duplex setting 11. C – UTP typically supports a maximum cable length of 100 meters across all UTP standards at all speeds. 12. A UTP link from a PC to a switch 13. C – the Type field identifies the data as an IP Packet. 14. A – Any nodes in the branch LAN that receive this frame use the FCS field to help detect errors. C – The Preamble and SFD fields both come before the Destination Address field in the header 15. A – 48 bits in length 16. B – Ethernet Vendors 17. D – The OUI 18. C – Forwards the frame out port G4 only 19. B – Floods the frame out ports G1,G2,G3 and G4 20. D – SW1 received a frame sent to MAC address 0000.1234.5678 in Port G3 Key Terms 1. Ethernet LANs – A collectoion of devices, including user devices, LAN switches, routers, old......

Words: 538 - Pages: 3

Unit 2 Assignment 2

...Unit 2 assignment 2 Legislation- Human rights act- an act of parliament of the UK- the royal assent for this act was received the 9th of November 1998 with a commencement in 2000. It is an act to give further effect to rights and freedoms guaranteed under the European convention on human rights. Rights: -Right to life -Freedom from torture and inhuman or degrading treatment -Right to liberty and security -Freedom from slavery and forced labour -Right to a fair trial -No punishment without law -Respect for your private and family life, home and correspondence -Freedom of thought, belief and religion -Freedom of expression -Freedom of assembly and association -Right to marry and start a family -Protection from discrimination in respect of these rights and freedoms -Right to peaceful enjoyment of your property -Right to education -Right to participate in free elections This act promotes anti discriminatory practice in a way that it gives everyone the rights they deserve which can’t be taken away from anyone, therefore everyone is equal in what they can do. Data protection act- The data protection act defines UK laws on processing data on identifiable living people. It covers any data which can identify a person such as address, name, Humber, email, information is to be used fairly and lawfully. It is only used for limited specific purposes and in a way that is relevant, adequate and excessive. This promotes anti discriminatory practice as it helps protect......

Words: 4206 - Pages: 17

Unit 5 Assignment

...Current Events-Unit 5 Assignment Amelia Smith MT340-01 Conflict Resolution and Team Dynamics Kaplan University May 22, 2012 After doing some research on the internet I came across an article from the Los Angeles Times Business section, regarding a sexual harassment suit. In 2007 the EEOC filed suit against ABM Industries, Inc. alleging conduct that was in violation of Title VII of the Civil Rights Act of 1964, prohibiting sexual harassment and gender discrimination within the workplace (U.S. Equal Employment Opportunity Commission, 2010, para. 3). The conduct that reportedly took place was one employee being raped by a supervisor, indecent exposure, groping, asking for sex and trading sex for promotions. Sexual harassment is not about sexual gratification but about power. The definition of power is defined as the ability to influence the behavior of others with or without resistance. When speaking of power a lot of people will confuse it with leadership. Even though the two are closely related they are not the same. Power does not have the same goal compatibility that being a leader does and leadership is concerned with the influence it has on its followers and power is not. In the case of sexual harassment within ABM, supervisors with power abused their positions over subordinates. Supervisors have formal power over employees; they are responsible for giving them their assignments, reviewing their performance, promotions, salary adjustments, and even...

Words: 540 - Pages: 3

Gb550 Unit 5 Assignment

...Unit 5 Assignment Author: Michael J. Levene, Kaplan University Date: 27th May 2012 Course: Financial Management Week Number: 5 Professor’s Name: Dr. William Hudson Problem 9-10 Page 371-372 Shelby Inc. Share price $23.00 Last dividend $2.00 Next dividend $2.14 Growth 7% Beta 1.6 rRF 9% rM 13% -A- Cost of equity using discounted cash flow approach? P0=D1/(rs – g) so rs = D1/P0 + g = 2.14/23 + 7 = 9.30 + 7.00 = 16.30% -B- Cost of equity using CAPM approach? RPM = rm - rRF = 13 – 9 = 4% Rs = rRF + (RPm)bi = 9.0 + (4)*1.6 = 9.0 + 6.4 = 15.40% -C- Cost of equity using over-own-bond-yield-plus-judgmental-risk-premium approach? Rs = 12% + RPM = 12.0 + (rM - rRF) = 12.0 + (13.0 – 9.0) = 16.00% -D- Estimate based on results in part A, B and C A fair estimate could be obtained using any specific method or an average of the methods. Taking an average of the method would give an estimated cost of capital of 16.3 + 15.4 + 16 /3 = 15.90% Problem 10-1 through 10-7 p.414 • $52,125 investment • $12,000 return for 8 years starting at the end of year 1 • 12% cost of capital 10-1 Project NPV? |Year |0 |1 |2 |3 |4 | |Project A | (15,000,000) | 5,000,000 | 10,000,000 | 20,000,000 | 20,000,000 | |5% | (15,000,000) | 4,761,905 | 9,070,295 | 17,276,752 | ......

Words: 390 - Pages: 2

Unit 2 Assignment 2

...Unit 2 Assign.2 Last 5 Published or Updated Security Advisories: Microsoft Security Advisory (2737111) Vulnerabilities in Microsoft Exchange and FAST Search Server 2010 for SharePoint Parsing Could Allow Remote Code Execution Published or Last Updated: Wednesday, July 25, 2012 Microsoft Security Advisory (2728973) Unauthorized Digital Certificates Could Allow Spoofing Published or Last Updated: Wednesday, July 11, 2012 Microsoft Security Advisory (2719662) Vulnerabilities in Gadgets Could Allow Remote Code Execution Published or Last Updated: Tuesday, July 10, 2012 Microsoft Security Advisory (2719615) Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution Published or Last Updated: Tuesday, July 10, 2012 Microsoft Security Advisory (2491888) Vulnerability in Microsoft Malware Protection Engine Could Allow Elevation of Privilege Tuesday, March 08, 2011 2. Do any vulnerability involve privilege elevation? Is this considered a high priority issue? Yes one, but its importance was not considered a high priority issue as asked 3. Identify and document at least three vulnerabilities and the solutions related to the client configurations. Advisory Number: 977981 Solution: This security update resolves four privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer.......

Words: 337 - Pages: 2