ROLLBACK PLAN
.pdf
keyboard_arrow_up
School
Western Governors University *
*We aren’t endorsed by this school
Course
C846
Subject
Computer Science
Date
Jan 9, 2024
Type
Pages
4
Uploaded by camylikobe
•
ROLLBACK PLAN
Explanation
OBJ-3.2: The purpose of a rollback plan is to document at every point during the deployment of
a change or upgrade where you can stop the deployment and return to a known good state.
Question 25:
Correct
Dion Training is adding a new screen subnet that will host a large number of VDIs and
wants to assign them a small portion of their public Class C IPv4 address space. Dion
Training has been assigned a Class C scope of 187.15.3.0/24. There will be a total of 105
VDI clients that will each need an IP address assigned. What is the correct CIDR notation
for the new subnet in order to accommodate the 105 VDI clients while allocating the
minimum number of addresses?
•
/25
Explanation
OBJ-1.4: To answer this question, you must be able to perform a basic subnetting calculation.
First, you need to determine the number of IP addresses that will be needed. In this scenario, you
have 105 clients that will each need an IP address, but you also need one IP address for the
network and a second IP for the broadcast. This means you need 107 IP addresses total. IP
addresses are assigned in multiples of 2 (1, 2, 4, 8, 16, 32, 64, 128, 256). Since we need 107 IP
addresses, we need to round up to a block of 128. To symbolize a CIDR block with 128 IP
addresses, we would use /25, which is 2^7 =128.
Question 26:
Correct
What device is used to configure various hypervisor guests to use different VLANs in the
same virtualization environment?
•
virtual switch
Explanation
OBJ-1.2: A virtual switch (vSwitch) is a software application that allows communication
between virtual machines. A vSwitch does more than just forward data packets, it intelligently
directs the communication on a network by checking data packets before moving them to a
destination.
Question 27:
Correct
A technician is setting up a new network and wants to create redundant paths through the
network. Which of the following should be implemented to prevent performance
degradation within the network?
•
Spanning Tree
Explanation
OBJ-2.3: The Spanning Tree Protocol (STP) is a network protocol that builds a logical loop-free
topology for Ethernet networks. The basic function of STP is to prevent bridge loops and the
broadcast radiation that results from them. If you have redundant links set up, it is important to
utilize STP to prevent loops within the network. If a loop occurs, the performance of the entire
network can be degraded due to broadcast storms. Port mirroring is used on a network switch to
send a copy of network packets seen on one switch port to a network monitoring connection on
another switch port. Dynamic ARP Inspection (DAI) is a security feature that validates Address
Resolution Protocol (ARP) packets in a network. DAI allows a network administrator to
intercept, log, and discard ARP packets with invalid MAC address to IP address bindings. A
virtual LAN (VLAN) is any broadcast domain that is partitioned and isolated in a computer
network at the data link layer (OSI layer 2). Port mirroring, ARP inspection, and VLANs do not
add any redundancy to the network.
Question 28:
Correct
Which of the following is a security concern with using a cloud service provider and could
result in a data breach caused by data remnants?
•
Rapid elasticity
Explanation
OBJ-1.8: Rapid elasticity can be a security threat to your organization's data due to data
remanences. Data remanence is the residual representation of digital data that remains even after
attempts have been made to remove or erase it. So, when a cloud resource is deprovisioned and
returned to the cloud service provider, it can be issued to another organization for use. If the data
was not properly erased from the underlying storage, it could be exposed to the other
organization. For this reason, all cloud-based storage drives should be encrypted by default to
prevent data remanence from being read by others. Metered services are pre-paid, a-la-carte, pay-
per-use, or committed offerings. A metered service like a database may charge its users based on
the actual usage of the service resources on an hourly or monthly basis. For example, Dion
Training used the AWS Lambda serverless product in some of our automation. This service
charges us $0.20 for every 1 million requests processed. Resource pooling refers to the concept
that allows a virtual environment to allocate memory and processing capacity for a VMs use. On-
demand refers to the fact that a consumer can unilaterally provision computing capabilities, such
as server time and network storage, as needed automatically without requiring human interaction
with each service provider.
Question 29:
Correct
(This is a simulated Performance-Based Question. On the real exam, you may be given a
chart with numerous ports and protocols and be asked to drag and drop them to match the
ports with the protocols.) What ports do SMTP and SNMP utilize?
•
25,161
Explanation
OBJ-1.5: SMTP (Simple Mail Transfer Protocol) uses port 25. SNMP (Simple Network
Management Protocol) uses port 161. Port 23 is used by Telnet. Port 445 is used by the Server
Message Block (SMB) protocol. Port 3389 is used by the Remote Desktop Protocol (RDP). Port
443 is used by the Hypertext Transfer Protocol Secure (HTTPS). If this were a question on the
real exam, you would see a list of ports on one side and a list of protocols on the other, and you
would drag and drop each one to match them up.
Question 30:
Correct
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Consider an IP datagram with the following characteristics:
Length of IP header:
20 bytes
Total length of IP datagram:
1000 bytes
DF flag
0
MF flag
0
Fragment offset
0
Suppose this datagram must be transmitted on a network where the
(a) Explain why this IP datagram must be fragmented. How many fragments will be created?
(b) After the fragmentation is performed, provide the value of the following fields for each of the
fragments: (12 M)
-Total length (in bytes)
- Value of DF flag
- Value of MF flag
- Value of Fragment offset (as a decimal number)
(c) What does a router do, if the value of the DF flag of an IP datagram is set to one? (4)
arrow_forward
Detailed assessment involves scanning all 65,536 TCP and SCTP ports for each IP address withinscope, along with testing of common UDP ports (to save time). I have yet to find a UDP servicerunning on a nonstandard port during testing, and so running a UDP scan with Nmap’s default serviceslist is sufficient
arrow_forward
Cloud Computing:
arrow_forward
Assignment Module 11
For the following Ips, write the network name, give 2 Ips in the same network,
find the number of the possible Ips
Net name
1" ip
2nd IP
no. of valid IPs
• 11.45.3.5 →
• 180.90.27.89-→
• 190.35.177.98 →
• 192.76.19.1
• 200.30.50.90>
• 100.100.100.100>
107.39.50.20→
arrow_forward
It is important to keep in mind that the reordering and reassembly of packets takes place during the transport step of the TCP/IP protocol suite. The Internet or the data layer are two examples of lower levels of abstraction that a firewall is able to function at. If a traffic stream is either out of order or has been deleted, a firewall that uses stateful inspection will be unable to determine anything about the stream's contents.
arrow_forward
Assignment 5:
Both TCP and UDP are widely used IP transfer layer protocols. For applications requiring reliable transfers, TCP is generally preferred, while applications that value throughput more than reliability are best served using UDP. Most TCP/IP stacks provide both protocols, so the application can use whichever transfer protocol is more appropriate, even changing from one to the other as desired. Rather than rely solely on TCP, the network system developer might want to investigate the trade-offs related to use of UDP. Based upon the analysis list out why Some TCP/IP Applications Use UDP?
arrow_forward
Given an original class B IPv4 public address, design a subnetted (subnet, sub-subnet, sub sub-subnet) computer network with three levels of subnetting.
Find out the aggregated route at each level and the aggregated route for thewhole network through which it would connect to the internet. Write downthe necessary details and IP addresses.
arrow_forward
For a thorough analysis, each IP address included in the scope must have all 65,536 TCP and SCTP ports scanned, as well as common UDP ports tested (to save time). Operating a UDP scan with Nmap's default services list is adequate because after testing I have yet to uncover a UDP service running on an unrecommended port.
arrow_forward
An ISP allocates the 3000:FACE:6/48 block of IPV6 addresses to an enterprise. The
entrprise assigns a the subnet id = 2B with an interface id = 2. Using the 3+1+4
address rule, what is the most compressed IPV6 representation of the address?
3000:FACE:6:2:2B/64
3000:FACE:6:0:2:2B/64
3000:FACE:6:2000::2B/64
3000:FACE:6:2:2B/64
arrow_forward
Determine whether or not the following IPv6 address notations are correct:•::0F53:6382:AB00:67DB:BB27:7332•7803:42F2:::88EC:D4BA:B75D:11CD•::4BA8:95CC::DB97:4EAB•74DC::02BA•::00FF:128.112.92.116
arrow_forward
The secure socket layer (SSL) protocol allows for secure communication between a client and a server.
There are known flaws in the SSLv2 protocol. A man-in-the-middle attacker can force the communication to a less secure level and then attempt break the encryption. The attacker can also truncate encrypted messages.
These flaws have been fixed in SSLv3 (TLSv1). Most servers and clients support both SSLv2 and SSLv3. However, SSLv2 is enabled by default for backward compatibility.
Answer the following questions,
a) Find out the impact in the above statement.
b) What is the solution?
c) Do you think SSLv3 is more secure? Justify your answer.
arrow_forward
Task 2: Access Control Lists
You will need to work out which interface on which router this needs to be applied to. Each ACL must work and be seen to work.
Stop any IP address from 10.0.0.128 to 10.0.0.191 from pinging 123.123.123.123 - yet allow all other addresses
Creating an ACL that meets the above 'selected' criteria
Proving that a change of IP address, other than those allocated to the PC's also demonstrates the operation of the ACL. Also prove that you are still able to ping to 99.0.0.2 irrespective of device IP address
arrow_forward
Q#3: Suppose you are the network security administrator of a well-known company. Your boss has established a deal with another company in another city and now a VPN is setup between the headquarters of two companies for secure communication. Your boss requires you to guarantee a minimum download and uploading speed. Answer the following questions:
Do you think it is feasible to implement a VPN between the two companies having multiple sites?
Which layer VPN would you prefer to implement? Why?
Which type of VPN would you prefer to implement? Why?
Which protocol would you use to implement the VPN? Why?
arrow_forward
The given IPV6 subnet address is 2001:0DA7:FF00:FAF8: :/64.
• Use the above IPV6 address for Subnet 0.
• Increment the subnet field by 1 and find the IPV6 address for the remaining subnets.
• Write simplified IPV6 address.
Subnet
IPV6 network address (Write simplified IPV6 address)
Number
1
3.
Complete
the
2
following
IPV6
addressing
table
3
using
IPV6
subnetting. Follow the instructions given below and write the IPV6 address in the table.
arrow_forward
A UDP packet is to be sent to a network with MTU=1460 Bytes. The size
of UDP data field is 2992 Bytes. Assume this packet is fragmented when
traversing the network. Please give the values for the following IP header fields in
each IP fragments: Total Length, MF and Offset.
Note: Assume IPV4 is used. There is no option field in IP header, i.e., the size of IP
header is 20 Bytes. The size of UDP header is 8 Bytes. All numbers are in decimal.
arrow_forward
"Explain the concept of subnetting in computer networking and its role in IP address
allocation. Describe the process of subnetting a given IP address space into smaller
subnetworks with varying sizes. Discuss the benefits of subnetting, such as efficient
address allocation, improved network management, and enhanced security.
Additionally, explore subnetting strategies, such as classful and classless
addressing, and their implications for network design and scalability."
arrow_forward
VLSM
Create a IP Address scheme using VLSM. You are told to create the following 8 subnets using
10.10.0.0/22.
8. Network H has 59 hosts
Complete all the fields in the following table. Make sure to show your work.
Network Subnet
Netmask CIDR Broadcast Address
A
B
C
D
E
1. Network A has 50 hosts
2. Network B has 90 hosts
3. Network C has 36 hosts
4. Network D has 190 hosts
5. Network E has 15 hosts
6. Network F has 20 hosts
7. Network G has 100 hosts
FGH
Number of Hosts
arrow_forward
Part 1: Develop an IP Addressing Scheme
You have been assigned an IPv4 network in the table below. You will subnet it to provide IP addresses to two subnets that will support the required number of hosts. All work must be shown using the IP Addressing worksheet below.
Network
Number of Hosts in Subnet A
Number of Hosts in Subnet B
172.16.1.0/25
48
36
IP Addressing Worksheet (Use this to show your calculations)
Specification
Subnet A
Subnet B
Number of bits in the subnet
IP mask (binary)
New IP mask (decimal)
Maximum number of usable subnets obtained from 172.16.1.0/25
Number of usable hosts per subnet
IP Subnet
First IP Host address
Last IP Host address
arrow_forward
An IP address can be written as a 32-bit number. For a class B network, the two most significant bits are set to 10. The 16 most signi cant bits are used as a network ID, and the 16 least signi cant bits are used as a host ID. However, the host ID cannot be all 0's or all 1's.
How many hosts (i.e., host IDs) can there be on a class B network?
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education
Related Questions
- Consider an IP datagram with the following characteristics: Length of IP header: 20 bytes Total length of IP datagram: 1000 bytes DF flag 0 MF flag 0 Fragment offset 0 Suppose this datagram must be transmitted on a network where the (a) Explain why this IP datagram must be fragmented. How many fragments will be created? (b) After the fragmentation is performed, provide the value of the following fields for each of the fragments: (12 M) -Total length (in bytes) - Value of DF flag - Value of MF flag - Value of Fragment offset (as a decimal number) (c) What does a router do, if the value of the DF flag of an IP datagram is set to one? (4)arrow_forwardDetailed assessment involves scanning all 65,536 TCP and SCTP ports for each IP address withinscope, along with testing of common UDP ports (to save time). I have yet to find a UDP servicerunning on a nonstandard port during testing, and so running a UDP scan with Nmap’s default serviceslist is sufficientarrow_forwardCloud Computing:arrow_forward
- Assignment Module 11 For the following Ips, write the network name, give 2 Ips in the same network, find the number of the possible Ips Net name 1" ip 2nd IP no. of valid IPs • 11.45.3.5 → • 180.90.27.89-→ • 190.35.177.98 → • 192.76.19.1 • 200.30.50.90> • 100.100.100.100> 107.39.50.20→arrow_forwardIt is important to keep in mind that the reordering and reassembly of packets takes place during the transport step of the TCP/IP protocol suite. The Internet or the data layer are two examples of lower levels of abstraction that a firewall is able to function at. If a traffic stream is either out of order or has been deleted, a firewall that uses stateful inspection will be unable to determine anything about the stream's contents.arrow_forwardAssignment 5: Both TCP and UDP are widely used IP transfer layer protocols. For applications requiring reliable transfers, TCP is generally preferred, while applications that value throughput more than reliability are best served using UDP. Most TCP/IP stacks provide both protocols, so the application can use whichever transfer protocol is more appropriate, even changing from one to the other as desired. Rather than rely solely on TCP, the network system developer might want to investigate the trade-offs related to use of UDP. Based upon the analysis list out why Some TCP/IP Applications Use UDP?arrow_forward
- Given an original class B IPv4 public address, design a subnetted (subnet, sub-subnet, sub sub-subnet) computer network with three levels of subnetting. Find out the aggregated route at each level and the aggregated route for thewhole network through which it would connect to the internet. Write downthe necessary details and IP addresses.arrow_forwardFor a thorough analysis, each IP address included in the scope must have all 65,536 TCP and SCTP ports scanned, as well as common UDP ports tested (to save time). Operating a UDP scan with Nmap's default services list is adequate because after testing I have yet to uncover a UDP service running on an unrecommended port.arrow_forwardAn ISP allocates the 3000:FACE:6/48 block of IPV6 addresses to an enterprise. The entrprise assigns a the subnet id = 2B with an interface id = 2. Using the 3+1+4 address rule, what is the most compressed IPV6 representation of the address? 3000:FACE:6:2:2B/64 3000:FACE:6:0:2:2B/64 3000:FACE:6:2000::2B/64 3000:FACE:6:2:2B/64arrow_forward
- Determine whether or not the following IPv6 address notations are correct:•::0F53:6382:AB00:67DB:BB27:7332•7803:42F2:::88EC:D4BA:B75D:11CD•::4BA8:95CC::DB97:4EAB•74DC::02BA•::00FF:128.112.92.116arrow_forwardThe secure socket layer (SSL) protocol allows for secure communication between a client and a server. There are known flaws in the SSLv2 protocol. A man-in-the-middle attacker can force the communication to a less secure level and then attempt break the encryption. The attacker can also truncate encrypted messages. These flaws have been fixed in SSLv3 (TLSv1). Most servers and clients support both SSLv2 and SSLv3. However, SSLv2 is enabled by default for backward compatibility. Answer the following questions, a) Find out the impact in the above statement. b) What is the solution? c) Do you think SSLv3 is more secure? Justify your answer.arrow_forwardTask 2: Access Control Lists You will need to work out which interface on which router this needs to be applied to. Each ACL must work and be seen to work. Stop any IP address from 10.0.0.128 to 10.0.0.191 from pinging 123.123.123.123 - yet allow all other addresses Creating an ACL that meets the above 'selected' criteria Proving that a change of IP address, other than those allocated to the PC's also demonstrates the operation of the ACL. Also prove that you are still able to ping to 99.0.0.2 irrespective of device IP addressarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education