CYB 210, Joshua Crowley, Professor Siddiqi Network Configuration Scavenger Hunt (2)
.docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
210
Subject
Computer Science
Date
Dec 6, 2023
Type
docx
Pages
3
Uploaded by ColonelOryx2298
CYB 210 Network Configuration Scavenger Hunt Template
Joshua Crowley
CYB 210
Professor Siddiqi
07/23/2023
Reminder
: Make sure that you are going into the devices and using the command line to find your objectives, not just hovering over the devices
with your mouse.
WIRELESS ROUTING
#
Objective
Response
1
What is the IP address of the wireless router?
192.168.0.1
2
What is the starting IP address of the DHCP scope?
192.168.0.115
3
How many IP addresses are available for the wireless network?
25
4
What are the IP addresses of the three wireless computers?
192.168.0.11
9
, 192.168.0.116, 198.168.0.117
5
What is the name of the wireless network?
Free_wireless
6
What is the authentication method used for the wireless
network?
It is disabled
LAN ROUTING
#
Objective
Response
7
What interfaces do you see configured on the main router and
what IP is assigned to each interface?
10.0.0.1, 20.0.0.1
8
List the IP address of one of the LAN computers on the
network.
192.168.65.5
9
Certain ports on the two switches, connecting to the
computers and connecting to the IP phones, have been
“administratively” turned off. Can you identify them?
The phone
s
witch
(Switch0)
: port fast ethernet 0/14, 0/15,
0/16 and
0/20
Th
e computer switch
(Switch)
: port fast ethernet 0/14, 0/15, 0/16 and
0/20
#
Objective
Response
10
The main router connects to four different network devices.
Can you name the types of devices connected to the router
and the specific port interface each device is connected to on
the router?
The main router connects to 3
Switches (
Switch,
Switch0 and Switch1)
and a firewall
5505 ASA0
.
Firewall switch:
connected to fast ethernet 0/0/1
Phone Switch: connected to gigabit ethernet 0/1
Wireless router: connected to fast ethernet 0/0/0
Computer
switch: connected to gigabit ethernet 0/0
VLAN ROUTING
#
Objective
Response
11
List all VLANs on the network.
Note: You must list all VLANs for full credit.
1,
2,
35, 65, 99, 1002, 1003, 1004, 1005.
12
What are the names (tags) of each listed VLAN? List the
number and name in your response.
1: Default
2: Outside
35: VOIP
65: Data
99
: Future Use
1002: fddi-default
1003: token-ring
-
default
1004: fddinet-default
1005: trnet
-default
13
What is the intended use of VLANs 1, 35, 65, and 99?
The intended use is to allow the network admin to limit access to the
specific Vlans based on users role
or group.
14
How many ports in total for each switch are used for VLAN
traffic? List the VLAN and the total number of ports assigned
to that VLAN.
Switch: total of 26 ports
with 14 assigned to 1
(default), 8 assigned to
65(data) and 4 assigned to 99(futureuse)
Switch0: total of 26 ports
with 14 assigned to 1(default), 8 assigned to
35
(VOIP) and 4 assigned to 99(futureuse)
Switch1: total of 26 ports
all assigned to 1(default)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
True or False
1. IEEE 802.11i is the standard for wireless LAN security.
arrow_forward
Question 14 papa .Full explain this question and text typing work only We should answer our question within 2 hours takes more time then we will reduce Rating Dont ignore this line
arrow_forward
ARP Protocol is used to map between 32-bit IPv4 addresses and Ethernet-style 48-
bit MAC addresses
True
False
Question 27
A centralized Model involves having a centralized authority responsible for creating
revoking, distributing, and updating key pairs and certificates
PKI
O TCP/IP layering
O Digital certificate
OCryptographic Cipher Suite
arrow_forward
There is a chance that MAC addresses will be used by more than one network interface. Why are you making the decision not to do it? Does utilizing several network interfaces make it more likely that IP address disputes may occur? Is this action justified in some way?
arrow_forward
QUESTION 4
A smurf attack occurs when
an oversized ICMP packet is sent
the host is the recipient of repeated ICMP packets
there are repeated SYN packets sent
a user accesses the computer via Telnet
QUESTION 5
A(n)
converts a private IP to a public IP.
firewall
subnet mask
SNMP
NAT device
QUESTION 6
is a tool that allows you to capture raw data on a network.
A(n) -
interceptor
network manager
packet sniffer
security scanner
arrow_forward
100
It is an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.
a) security exploit
b) vulnerability scanner
c) packet sniffer
d) rootkit
arrow_forward
In network security, it is important to understand port scanning. Hackers use tools to scan a network and determine if there are open ports and if they contain some sort of vulnerability. To scan ports, you first have to find active hosts on a network. Once you find active hosts and discover a list of IP addresses for those hosts, a port scan can be performed to gather information about open ports and analyze services running on those ports. A port scan is the process of sending packets to an active host's ports and learning details that can help you gain access to that host or to discover open vulnerabilities on your network.
Some common ports are:Port 20 - File Transfer Protocol or FTPPort 22 - Secure Shell protocol or SSHPort 23 - Telnet protocol for unencrypted transferPort 80 - HyperText Transfer Protocol or HTTPPort 443 - HyperText Transfer Protocol Secure or HTTPS
The Well Known Ports are those from 0 through 1023
We are going to simulate a port scan by filling a list with 100…
arrow_forward
In network security, it is important to understand port scanning. Hackers use tools to scan a network and determine if there are open ports and if they contain some sort of vulnerability. To scan ports, you first have to find active hosts on a network. Once you find active hosts and discover a list of IP addresses for those hosts, a port scan can be performed to gather information about open ports and analyze services running on those ports. A port scan is the process of sending packets to an active host's ports and learning details that can help you gain access to that host or to discover open vulnerabilities on your network.
Some common ports are:Port 20 - File Transfer Protocol or FTPPort 22 - Secure Shell protocol or SSHPort 23 - Telnet protocol for unencrypted transferPort 80 - HyperText Transfer Protocol or HTTPPort 443 - HyperText Transfer Protocol Secure or HTTPS
The Well Known Ports are those from 0 through 1023
We are going to simulate a port scan by filling a list with 100…
arrow_forward
In network security, it is important to understand port scanning. Hackers use tools to scan a network and determine if there are open ports and if they contain some sort of vulnerability. To scan ports, you first have to find active hosts on a network. Once you find active hosts and discover a list of IP addresses for those hosts, a port scan can be performed to gather information about open ports and analyze services running on those ports. A port scan is the process of sending packets to an active host's ports and learning details that can help you gain access to that host or to discover open vulnerabilities on your network.
Some common ports are: Port 20 - File Transfer Protocol or FTPPort 22 - Secure Shell protocol or SSHPort 23 - Telnet protocol for unencrypted transferPort 80 - HyperText Transfer Protocol or HTTPPort 443 - HyperText Transfer Protocol Secure or HTTPS
The Well Known Ports are those from 0 through 1023
We are going to simulate a port scan by filling a list with 100…
arrow_forward
Addressing Schemes – SubnettingThe Iconic Production is a company newly established in the vicinity of Midrand in the city of Tshwane. The company has just hired you as their network engineer. You are told that the company currently has three departments: HR, Marketing and Operations. You are given the IP address: 192.168.5.0/24. You are required to subnet it as efficiently as possible in order to meet the requirements for the following number of hosts in the company’s network:• HR department: 13 hosts• Marketing department: 61 hosts• Operations department: 28 hosts• Link HR-M: 2 addresses• Link HR-O: 2 addresses• Link M-O: 2 addresses
For each of the subnets, determine:• The Network ID• The subnet mask• The total number of hosts addresses• The number of usable host addresses• The range of usable host addresses• The broadcast addressShow all your steps and calculations and for each subnet populate the following table:Name of subnet (LAN)Network IDSubnet mask (/notation)Total number of…
arrow_forward
Just what is a Class C IP address, and how can you make use of one?
arrow_forward
IPv6 tunnels IPv4 routers as link-layer protocols. Are these claims correct? Why? Why not?
arrow_forward
HTTPS is increasing in popularity and is rapidly replacing HTTP as a security protocol for web traffic. What are the advantages of HTTPS? How would you deploy it on your organization’s website? Are there any disadvantages? Would HTTPS protect you when using a public WiFi connection? Why or why not?
arrow_forward
What are the basic flaws if TCP/IP that allows IP spoofing
arrow_forward
Alert: Don't submit AI generated answer and please submit a step by step solution and detail explanation for each steps.
arrow_forward
How would HTTPS protect you using a public Wi-Fi connection at a local coffee shop? Should all web traffic be required to use HTTPS?
arrow_forward
please help with these csc networking questions
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
A+ Guide to Hardware (Standalone Book) (MindTap C...
Computer Science
ISBN:9781305266452
Author:Jean Andrews
Publisher:Cengage Learning
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning
Related Questions
- True or False 1. IEEE 802.11i is the standard for wireless LAN security.arrow_forwardQuestion 14 papa .Full explain this question and text typing work only We should answer our question within 2 hours takes more time then we will reduce Rating Dont ignore this linearrow_forwardARP Protocol is used to map between 32-bit IPv4 addresses and Ethernet-style 48- bit MAC addresses True False Question 27 A centralized Model involves having a centralized authority responsible for creating revoking, distributing, and updating key pairs and certificates PKI O TCP/IP layering O Digital certificate OCryptographic Cipher Suitearrow_forward
- There is a chance that MAC addresses will be used by more than one network interface. Why are you making the decision not to do it? Does utilizing several network interfaces make it more likely that IP address disputes may occur? Is this action justified in some way?arrow_forwardQUESTION 4 A smurf attack occurs when an oversized ICMP packet is sent the host is the recipient of repeated ICMP packets there are repeated SYN packets sent a user accesses the computer via Telnet QUESTION 5 A(n) converts a private IP to a public IP. firewall subnet mask SNMP NAT device QUESTION 6 is a tool that allows you to capture raw data on a network. A(n) - interceptor network manager packet sniffer security scannerarrow_forward100 It is an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. a) security exploit b) vulnerability scanner c) packet sniffer d) rootkitarrow_forward
- In network security, it is important to understand port scanning. Hackers use tools to scan a network and determine if there are open ports and if they contain some sort of vulnerability. To scan ports, you first have to find active hosts on a network. Once you find active hosts and discover a list of IP addresses for those hosts, a port scan can be performed to gather information about open ports and analyze services running on those ports. A port scan is the process of sending packets to an active host's ports and learning details that can help you gain access to that host or to discover open vulnerabilities on your network. Some common ports are:Port 20 - File Transfer Protocol or FTPPort 22 - Secure Shell protocol or SSHPort 23 - Telnet protocol for unencrypted transferPort 80 - HyperText Transfer Protocol or HTTPPort 443 - HyperText Transfer Protocol Secure or HTTPS The Well Known Ports are those from 0 through 1023 We are going to simulate a port scan by filling a list with 100…arrow_forwardIn network security, it is important to understand port scanning. Hackers use tools to scan a network and determine if there are open ports and if they contain some sort of vulnerability. To scan ports, you first have to find active hosts on a network. Once you find active hosts and discover a list of IP addresses for those hosts, a port scan can be performed to gather information about open ports and analyze services running on those ports. A port scan is the process of sending packets to an active host's ports and learning details that can help you gain access to that host or to discover open vulnerabilities on your network. Some common ports are:Port 20 - File Transfer Protocol or FTPPort 22 - Secure Shell protocol or SSHPort 23 - Telnet protocol for unencrypted transferPort 80 - HyperText Transfer Protocol or HTTPPort 443 - HyperText Transfer Protocol Secure or HTTPS The Well Known Ports are those from 0 through 1023 We are going to simulate a port scan by filling a list with 100…arrow_forwardIn network security, it is important to understand port scanning. Hackers use tools to scan a network and determine if there are open ports and if they contain some sort of vulnerability. To scan ports, you first have to find active hosts on a network. Once you find active hosts and discover a list of IP addresses for those hosts, a port scan can be performed to gather information about open ports and analyze services running on those ports. A port scan is the process of sending packets to an active host's ports and learning details that can help you gain access to that host or to discover open vulnerabilities on your network. Some common ports are: Port 20 - File Transfer Protocol or FTPPort 22 - Secure Shell protocol or SSHPort 23 - Telnet protocol for unencrypted transferPort 80 - HyperText Transfer Protocol or HTTPPort 443 - HyperText Transfer Protocol Secure or HTTPS The Well Known Ports are those from 0 through 1023 We are going to simulate a port scan by filling a list with 100…arrow_forward
- Addressing Schemes – SubnettingThe Iconic Production is a company newly established in the vicinity of Midrand in the city of Tshwane. The company has just hired you as their network engineer. You are told that the company currently has three departments: HR, Marketing and Operations. You are given the IP address: 192.168.5.0/24. You are required to subnet it as efficiently as possible in order to meet the requirements for the following number of hosts in the company’s network:• HR department: 13 hosts• Marketing department: 61 hosts• Operations department: 28 hosts• Link HR-M: 2 addresses• Link HR-O: 2 addresses• Link M-O: 2 addresses For each of the subnets, determine:• The Network ID• The subnet mask• The total number of hosts addresses• The number of usable host addresses• The range of usable host addresses• The broadcast addressShow all your steps and calculations and for each subnet populate the following table:Name of subnet (LAN)Network IDSubnet mask (/notation)Total number of…arrow_forwardJust what is a Class C IP address, and how can you make use of one?arrow_forwardIPv6 tunnels IPv4 routers as link-layer protocols. Are these claims correct? Why? Why not?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- A+ Guide to Hardware (Standalone Book) (MindTap C...Computer ScienceISBN:9781305266452Author:Jean AndrewsPublisher:Cengage LearningEnhanced Discovering Computers 2017 (Shelly Cashm...Computer ScienceISBN:9781305657458Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. CampbellPublisher:Cengage Learning
A+ Guide to Hardware (Standalone Book) (MindTap C...
Computer Science
ISBN:9781305266452
Author:Jean Andrews
Publisher:Cengage Learning
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning