IT 242 Entire Course

0 items
IT 242 Entire Course
IT 242 Entire Course
$39.99
  • Description

IT/242

INTRO TO WAN TECHNOLOGIES

 

The Latest Version A+ Study Guide

 

**********************************************

IT 242 Entire Course Link

https://hwsell.com/category/it-242/

**********************************************

 

IT 242 Week 1 Individual: Viewing the MAC Address on Your System

Complete Lab 2-3, “Viewing the MAC Address on your System,” in Network Technology Associate: Student Guide.

Complete the linked worksheet, “Viewing the MAC Address on Your System.”

Submit your worksheet using the Assignment Files tab.

Viewing the MAC Address on Your System Worksheet

 

Complete Lab 2-3 in Network Technology Associate: Student Guide, and then answer the following questions.

 

  1. Is a MAC address a physical or logical address?

 

  1. Within what layer of the OSI model does the MAC address operate?

 

  1. The numbers in the MAC address are displayed using what numbering system?

 

  1. On what device is the MAC address burned? What is this device’s function?

 

  1. The physical address parameter records your system’s MAC address. Type your system’s MAC address below.

 

  1. Write your NIC’s vendor in the space below.

 

 

IT 242 Week 2 Individual: Identifying IP Configuration and MAC Address Information

Complete Lab 3-4, “Identifying IP Configuration and MAC Address Information,” in Network Technology Associate: Student Guide.

Complete the linked worksheet, “Identifying IP Configuration and MAC Address Information.”

Submit your worksheet using the Assignment Files tab.

Identifying IP Configuration and MAC Address Information Worksheet

 

Complete Lab 3-4 in Network Technology Associate, and then answer the following questions:

 

  1. Suppose your child must complete an after-school project in which she must post her work to a moderated online forum specially set up by her teacher. Your computer, which is using a newly installed NIC, is unable to access the Internet, and you suspect the problem may be in the TCP/IP configuration. You want to determine the MAC address of your network card. How would you use the ipconfig command to do so? What other configuration data can you view by using ipconfig?

 

  1. Within what layer of the OSI model does the IP address operate?

 

  1. What class is your IP address?

 

  1. Given the subnet mask, how many unique host addresses are available for a network with your IP address?

 

  1. Write your computer’s adapter address (physical address), IP address, subnet mask, and default gateway below.

 

IT 242 Week 3 Individual: Recommendation Memo

Based on your Learning Team collaborative discussion around the Recommendation Memo scenario, prepare a 1-page recommendation memo and a 1/2-page diagram with 1/4- to 1/2-page narrative for Jon’s solution. Cover:

  • Solution recommendation, including cable and device recommendations.
  • Evidence to back up your recommendation, including why you recommended what you did.
  • Installation diagrams using your recommended materials.

Each student should submit the assignment on his/her own using his/her own ideas and research.

Submit your assignment using the Assignment Files tab.

 

IT 242 Week 4 Individual: Using the nslookup Utility

Complete Lab 4-2, “Using the nslookup utility,” in Network Technology Associate: Instructors Guide.

Complete the linked worksheet, “Using the nslookup Utility.”

Submit your worksheet using the Assignment Files tab.

Using the nslookup Utility Worksheet

 

Complete Lab 4-2 in Network Technology Associate, and then answer the following questions:

 

  1. Suppose you are on the IT staff of a company that sells hair removal products through an electronic storefront and you have been asked to test the operation of the default DNS server. You also want to obtain a list of all nodes in a particular domain. How would you use the nslookup utility to perform these tasks?

 

  1. Open a command prompt. Type nslookup www.CIWcertified.com, and then press ENTER to issue a one-time command. Recorded the information you found below.

 

  1. Conduct searches for the following systems:

 

  • microsoft.com
  • ubuntu.com
  • bbc.co.uk

 

  1. What two types of servers did you get the IP addresses for in Question 3?

 

  1. What protocols discussed in the course materials does each of these two servers employ?

 

  1. How can these two types of servers be made more secure or more protected?

 

 

IT 242 Week 5 Individual: Server Concerns Memo

Based on your Learning Team collaborative discussion, prepare a 2-page memo to the helpdesk. Include:

  • Start with identifying what protocol(s) are causing the problem.
  • Be sure to cover your solution recommendation, including protocol maps and TCP/IP addresses.
  • Conclude with evidence to back up your recommendation and why you recommended what you did.

Each student should submit the assignment on his/her own using his/her own ideas and research.

Submit your memo using the Assignment Files tab.

 

IT 242 Week 6 Individual: Viewing Drive Partitions Using Disk Management

Complete Lab 5-3, “Viewing Drive Partitions using Disk Management,” in Network Technology Associate: Student Guide.

Complete the linked worksheet, “Viewing Drive Partitions Using Disk Management.”                       

Submit your worksheet using the Assignment Files tab.

Viewing Drive Partitions Using Disk Management Worksheet

 

Complete Lab 5-3 in Network Technology Associate, and then answer the following questions:

 

  1. Suppose you want to add a DVD drive to your Windows® You need to assign a logical drive ID to the device. How would you choose and assign the proper drive ID? What utility could you use to view your system’s volume and drive partition information?

 

  1. For each disk drive listed in Question 1, record the name of the file system.

 

  1. Identify the IPv4 address found in Lab 2-3 and convert it from decimal to binary numbers preserving the dots between numbers.

 

  1. Identify the subnet mask found in Lab 2-3 and convert it from decimal to binary numbers preserving the dots between numbers.

 

  1. Apply the binary AND operation to the IPv4 address and the subnet mask. Show your work. What does your answer tell you about the network and host ID?

 

  1. In what practical troubleshooting task will you need to know the numerical order of ranges of hexadecimal numbers?

 

  1. Is the IPv4 address identified in your lab private or public? What are the three nonroutable private IP address ranges listed by class?

 

IT 242 Week 7 Individual: Commands and Remote Options Assignment

Complete the “Commands and Remote Options” worksheet.

Submit your worksheet using the Assignment Files tab.

 

IT 242 Week 7 Individual: Routine Maintenance

Consider why routine file maintenance is so important.

Develop a 350-word email to send to Nevine explaining why routine file maintenance is important and how she can better protect her data. Include:

  • Who should care about routine file maintenance, and why is routine file maintenance important?
  • What routine maintenance tasks should be considered and how frequently.
  • What are the repercussions of not performing routine file system maintenance?

Submit your email using the Assignment Files tab.

 

IT 242 Week 8 Individual: Using the Netcraft Toolbar

Complete Lab 6-1, “Using the Netcraft Toolbar,” in Network Technology Associate: Student Guide.

Complete the linked worksheet, “Using the Netcraft Toolbar.”

Submit your worksheet using the Assignment Files tab.

Using the Netcraft Toolbar Worksheet

 

Complete Lab 6-1 in Network Technology Associate, and then answer the following questions:

 

  1. Suppose you receive an e-mail message from what appears to be your credit card company. You are prompted to click a link called Billing Center, and when you do, you are routed to a web page that asks for your credit card number, personal identification number (PIN), Social Security number and bank account number. How can you ensure that the web page is legitimate and avoid becoming the victim of a phisher’s scheme to commit identity theft?

 

  1. What are the typical network security threats?

 

  1. What is a social engineering attack and how can you recognize it?

 

  1. What are the attacks that may be used to steal your identity? How can you protect against them? Use information from Lab 61 to discuss these questions.

 

  1. What hardware devices are used to protect a trusted network that is connected to the Internet?

 

  1. How does a proxy server help to secure a trusted network?

 

  1. This lab demonstrated how you can use the Netcraft Toolbar to be forewarned and submit a report about possible phishing URLs. Did you find this antiphishing device useful?

 

IT 242 Week 9 Individual: Security Memo

Based on your Learning Team collaborative discussion, prepare a 2- to 3-page security memo and a 1-page diagram with 1/2- to 1-page narrative. Include:

  • Analysis of the situation that demonstrates fundamental understanding of TCP/IP protocol(s) information, insights into throughput reduction, and analysis of the issue.
  • Solution recommendation that includes cable and device recommendation and installation diagram.
  • Insights on any potential ethical issues and security threats.

Each student should submit the assignment individually using his/her own ideas and research.

Submit your assignment using the Assignment Files tab.