Unit 5 Lab

In: Computers and Technology

Submitted By zelgodastry
Words 333
Pages 2
1. What is the purpose of the address resolution protocol (ARP)? * ARP is the abbreviation for address resolution protocol. It is used to convert Internet protocol ( IP ) addresses to actual physical addresses. 2. What is the purpose of the dynamic host control protocol (DHCP)? * a protocol for assigning dynamic IP addresses to devices on a network. 3. What was the DHCP allocated source IP host address for the Student VM and Target VM? * 172.30.0.73 Student * 172.30.0.55 Target 4. When you pinged the targeted IP host, what was the source IP address and destination IP address of the ICMP echo-request packet? * Source - 172.30.0.73 * Target - 172.30.0.55 5. Did the targeted IP host respond to the ICMP echo-request packet with an ICMP echo-reply packet? If yes, how many ICMP echo-request packets were sent back to the IP source? * Yes, 4 packets 6. Find a TCP 3-way handshake for a TELNET, FTP, or SSH session. What is the significance of the TCP 3-way handshake? * The three-way handshake is needed to establish a reliable connection. The handshake allows the server and client to agree on properties that provide for security as well as reliability. 7. What was the SEQ# of the initial SYN TCP packet and ACK# of the SYN ACK TCP packet? * 1977 and 1988 8. What is the purpose of TFTP and what transport protocol does it use? * TFTP is a simple protocol for transferring files, implemented on top of the User Datagram Protocol (UDP) using port number 69. 9. Is FTP considered a “secure” file transfer protocol? * FTP was not designed to be a secure protocol 10. What other IP packets are on the Ethernet LAN segment? How can these other IP packets provide additional clues or information about the logical IP routing and IP addressing schema? * These other packet…...

Similar Documents

Lab 5

...Lab #5 Assessment Questions & Answers 1. What is the purpose of the address resolution protocol (ARP)? * ARP converts IP addresses to Ethernet addresses.. 2. What is the purpose of the dynamic host control protocol (DHCP)? * Dynamic Host Configuration Protocol (DHCP) is a method for assigning Internet Protocol (IP) addresses permanently or temporarily to individual computers in an organization's network. 3. What was the DHCP allocated source IP host address for the “Student” VM and Target VM? * 172.30.0.4 - Student VM * 172.30.0.8 – Target VM 4. When you pinged the targeted IP host, what was the source IP address and destination IP address of the ICMP echo-request packet? * Source: 172.30.0.2 * Target: 172.30.0.8 5. Did the targeted IP host respond to the ICMP echo-request packet with an ICMP echo-reply packet? If yes, how many ICMP echo-request packets were sent back to the IP source? * Yes, 8 packets. 6. Find a TCP three-way handshake for a Telnet, FTP, or SSH session. What is the significance of the TCP three-way handshake? * The three-way handshake is needed to establish a reliable connection. The handshake allows the server and client to agree on properties that provide for security as well as reliability. 7. What was the SEQ# of the initial SYN TCP packet and ACK# of the SYN ACK TCP packet? * 8. During the instructor’s Telnet session to LAN Switch 1 and LAN Switch 2, what was the captured......

Words: 342 - Pages: 2

Unit 5 Biology Lab

...Name: Date: November 10, 2013 Instructor’s Name: Assignment: SCIE207 Phase 5 Lab Report Title: Taxonomy Lab to Show Organism Relationships Instructions: You will need to fill out the data table and answer a set of questions. When your lab report is complete, post it in Submitted Assignment files. Part 1: Using the lab animation, fill in the following data tables to help you answer the questions that follow: Table 1: Samples 1–5 |Phylum/Division |Sample 1: Chrysophyta |Sample 2: Annelida |Sample 3: Arthropoda |Sample 4: Amphibia |Sample 5: Aves | |Common Feature | | | | | | |Nutrition |Autotrophic |Heterotrophic: Earthworms|Some are vegetarian, some|These are usually | | |How does the organism break down and absorb food? | |eat their way through |are carnivorous, and some|vegetarian as tadpoles | | | | |dirt, so they are ...

Words: 834 - Pages: 4

Lab 5

...reflective attack a type of computer security vulnerability it involves the web application dynamically generating a response using non-sanitized data from the client scripts, like Java scripts or VB script, in the data sent to the server will send back a page with the script 4. Based on the tests you performed in this lab, which Web application attack is more likely to extract privacy data elements out of a database? 5. If you can monitor when SQL injections are performed on an SQL database, what would you recommend as a security countermeasure to monitor your production SQL databases? Well coordinated and regularly audited security checks is the best way forward. 6. Given that Apache and Internet Information Services (IIS) are the two most popular web application servers for Linux and Microsoft Windows platforms, what would you do to identify known software vulnerabilities and exploits? 7. What can you do to ensure that your organization incorporates penetration testing and Web application testing as part of its implementation procedures? 8. What is the purpose of setting the DVWA security level to low before beginning the remaining lab steps? 9. As an ethical hacker, once you’ve determined that a database is injectable, what should you do with that inf...

Words: 296 - Pages: 2

Unit 4 Labs

...Unit 4 Labs Introduction to Programming Mr. Nguyen Lab 4.1 – Pseudocode and Modules Module main ( ) //Declare local variables 1. Declare String clientName 2. Declare Real feetUTP 3. Declare Real subtotal 4. Declare Real taxCost 5. Declare Real totalCost //Module calls 6. Module inputData ( ) 7. Module calcCosts ( ) 8. Module displayBill ( ) End Module //this module takes in the required user input There will //be a display and input for each variable Module inputData (Real Ref feetUTP, String Ref clientName) 9. Display “What is your name? “ 10. Input clientName 11. Display “How many feet of UTP do you need? “ 12. Input feetUTP End Module //this module calculates subTotal, taxCost, and totalCost //you also need feetUTP passed in to calculate subTotal Module calcCosts (13. subTotal, taxCost, and totalCost) 14. subTotal = feetUTP * 0.21 15. taxCost = 0.06 * subTotal 16. totalCost = taxCost + subTotal End Module //this module displays clientName and totalCost Module displayBill (17. clientName, and totalCost) ` 18. Display “clientName” 19. Display “totalCost” Lab 4.2 - Flowcharts and Modules Lab 4.3 – Visual Basic and Modules Module Module1 Sub Main() Dim clientName As String = "NO VALUE" Dim feetUTP As Double = 0 Dim subTotal As Double = 0 Dim taxCost As Double = 0 Dim totalCost As Double = 0 ......

Words: 491 - Pages: 2

Unit 5 Lab 5.1

...Nicholas Culp PT1420: Introduction to Programming Unit 2 Research Assignment 1 1. What are the variable naming rules of Visual Basic, Python, and Java? Visual Basic: You must use a letter as the first character. You can't use a space, period (.), exclamation mark (!), or the characters @, &, $, # in the name. Name can't exceed 255 characters in length. Generally, you shouldn't use any names that are the same as the functions, statements and methods in Visual Basic. You end up shadowing the same keywords in the language. To use an intrinsic language function, statement, or method that conflicts with an assigned name, you must explicitly identify it. Python: Must begin with a letter (a - z, A - B) or underscore (_) Other characters can be letters, numbers or _ Case Sensitive Can be any (reasonable) length There are some reserved words, which you cannot use as a variable name because Python uses them for other things. Java: All variable names must begin with a letter of the alphabet, an underscore, or ( _ ), or a dollar sign ($). The convention is to always use a letter of the alphabet. The dollar sign and the underscore are discouraged. After the first initial letter, variable names may also contain letters and the digits 0 to 9. No spaces or special characters are allowed. The name can be of any length. Uppercase characters are distinct from lowercase characters. Using ALL uppercase letters are primarily used to identify constant......

Words: 318 - Pages: 2

Lab 5

...Lab 5.1 The Condition | True or False | attAverage >= verizonAverage | True | tmobileAverage == 868 | True | verizonAverage < sprintAverage | False | sprintAverage != attAverage | True | Lab 5.2 The Condition | Expected Output | If tmobileAverage > 800 AND verizonAverage> 800 ThenDisplay “Both have average downloadrates over 800”ElseDisplay “One or both of the averagesare less”End If | Both average download Rates over 800 | If sprintAverage == 800 ThenDisplay “Sprints download rate is 800”End If | No display | If attAverage >= 1300 OR tmobileAverage>=900Display “Select either carrier”End If | Select either carrier | Lab 5.3 Main Module() //Declare variables on the next 3 lines Declare Integer testScore = 0 Declare String category = “ “ Declare String interview = “ “ //Make Module calls and pass necessary variables on the next 4 lines Call getScore(testScore) Call employCat(testScore, category) Call interviewPoss(testScore, interview) Call displayInfo(testScore, category, interview) End Main Module getScore(Integer Ref testScore) //Ask user to test score Display “Please enter test score” Input testScore End Module Module employCat(Integer testScore, String ref category) //Determine what employment category they are in based on their test score //Similar to if the score is less than 60, then category is “No” //Otherwise, if score is less than 70, then category is “Maybe” //…and so on if testScore => 85 then Set...

Words: 288 - Pages: 2

Et1220 Unit 5 Lab Report

...the counter Test Procedure: 4. Record the observed values from Lab 5 Table 5-1. Record the state number, the value of QDQCQBQA, the hexadecimal and decimal values. StateNumber | DataLine 7 | DataLine 6 | DataLine 5 | DataLine 4 | Hexadecimal | Decimal | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 1 | 1 | 1 | 2 | 0 | 0 | 1 | 0 | 2 | 2 | 3 | 0 | 0 | 1 | 1 | 3 | 3 | 4 | 0 | 1 | 0 | 0 | 4 | 4 | 5 | 0 | 1 | 0 | 1 | 5 | 5 | 6 | 0 | 1 | 1 | 0 | 6 | 6 | 7 | 0 | 1 | 1 | 1 | 7 | 7 | 8 | 1 | 0 | 0 | 0 | 8 | 8 | 9 | 1 | 0 | 0 | 1 | 9 | 9 | 10 | 1 | 0 | 1 | 0 | A | 10 | 11 | 1 | 0 | 1 | 1 | B | 11 | 12 | 1 | 1 | 0 | 0 | C | 12 | 13 | 1 | 1 | 0 | 1 | D | 13 | 14 | 1 | 1 | 1 | 0 | E | 14 | 15 | 1 | 1 | 1 | 1 | F | 15 | | | | | | | | | | | | | | | ------------------------------------------------- Part 2- Implement Synchronous Counters Theory: 5. What makes a counter synchronous? Because its clock is applied to each of the flip-flops. 6. What is the purpose of the ~U/D control signal for the 74191 Synchronous Counter? when low, counts up, when high, counts down Test Procedure: 7. Provide the wiring diagram that converts this Mod16 counter into a Mod 10 counter. Us Microsoft Paint to draw the wire connections. ------------------------------------------------- Part 3- Semiconductor Memory Theory: 8. Using Lab Figure 5-7, which memory cells are addressed if 1001 is applied to A0-A3? the......

Words: 591 - Pages: 3

Unit 5 Lab 5.1-5.4

...Unit 5. LAB 5 Ethernet LANs LAB 5.1: LAN Standard Exercise 5.1.1 Briefly define the 802.1 standard: Keeper of the LAN architecture – IEEE standard 802. Describes the 802 family of standards. Describes the LAN Architecture. Defines some useful things, such as the LAN address format, the SNAP protocol, the Playpen Ethertypes, and the OID registration arcs. The higher Layer Interface working group in 802. Defines the bridging and security glue that interconnects the LANs define by the 802 MAC groups. Exercise 5.1.2 What 802.3 standard originally define PoE functionality? When was the standard enhanced, and what was the new standard name given for the enhancement? The standard that originally defines PoE functionality was the IEEE 802.3af. The new standard is known as IEEE 802.3at it, and it was enhanced in 2012. Exercise 5.1.3 Complete Table Standard | Cabling | Maximum Length | 10BASE5 | Coaxial(Thicknet) | 500m | 10BASE2 | Coaxial (Thinnet) | 185m | 10BASE-T | UTP (Cat3, 5, 5e, 6) | 100m | 100BASE-FX | Multi-mode fiber optic cable (SC or ST) | 400m | 100BASE-T | UTP (Cat3, 5, 5e, 6) | 100m | 100BASE-T4 | STP Twisted Cable | 100m | 100BASE-TX | Single-mode fiber optic cable | 20km | 1000BASE-LX | SMF and MMF | 550m | 1000BASE-SX | MM fiber-optic | 220m or 550m (dependent upon fiber thickness | 1000BASE-ZX | MM fiber-optic | 550m | 1000BASE-T | UTP (Cat3, 5, 5e, 6) | 100m | Exercise 5.1.4 What does the numeric prefix before BASE in the......

Words: 1936 - Pages: 8

Lab 5

...must be overcome depends on the normal force as and the normal force is given by . When the surface becomes an inclined plane, the normal force changes and when the normal force changes, so does the friction. In this lab, you will change the angle of an inclined plane and observe how weight is resolved into its components (Fn and F//) using the basic trig functions. Procedure: Play with the Sims  Motion  The Ramp • Be sure to stay in the part of the simulation. More features will be used later when we investigate energy. Start by playing with the cabinet some. • Move the cabinet up and down the ramp by dragging it with your mouse. • Move the ramp to an angle of zero (horizontal) and draw a free body diagram of the cabinet here: 1. On a horizontal plane, the normal force is Perpendicular to the weight. 2. The cabinet has a mass of 100kg. It therefore has a normal force of -100 N and a friction force (on the horizontal plane) of ___2.22___ μ = 0.30 • the ramp and draw a free body diagram of the cabinet in the box here: 3. The force down the plane and normal force are components of Force Diagrams. 4. Before we add an applied force on the ramp, there is a force of Gravity that acts against the force down the plane( Force parallel). 5. When we apply a force to get the cabinet moving, the friction force acts in the Opposite direction as movement of the cabinet. 6. Slowly increase angle (0.1 degrees at a time) of the ramp until the cabinet starts to......

Words: 666 - Pages: 3

Nt1210 Unit 5 Lab 5.1-2-3-4

...Networking Lab Manual Page: 96. No part of any book may be reproduced or transmitted by any means without the publisher's prior permission. Use (other than qualified fair use) in violation of the law or Terms of Service is prohibited. Violators will be prosecuted to the full extent of the law. http://itt.coursesmart.com/print?__displaygrbooks=1&xmlid=9781269219389%2F96&__pagestoprint=17 1/17 2/24/2015 ITT Technical Institute ­ Print User name: Cordoba, Fabian Cordoba, Fabian Book: Introduction to Networking Lab Manual Page: 97. No part of any book may be reproduced or transmitted by any means without the publisher's prior permission. Use (other than qualified fair use) in violation of the law or Terms of Service is prohibited. Violators will be prosecuted to the full extent of the law. The 802.1 standards provide LAN/MAN management. The 802.1 standards where created by the close of the 1970’s. IEEE 802.1 handles the architecture, security, management and internetworking of local area networks (LAN), metropolitan area networks (MAN) and wide area area networks (WAN) standardized by IEEE 802. 802.3af is the standard that originally defined PoE functionality. The standard was enhanced in 2009 and was called 802.3at. http://itt.coursesmart.com/print?__displaygrbooks=1&xmlid=9781269219389%2F96&__pagestoprint=17 2/17 2/24/2015 ITT Technical Institute ­ Print User name: Cordoba, Fabian Cordoba, Fabian Book: Introduction to Networking Lab Manual......

Words: 2482 - Pages: 10

Unit 5 Lab 1

...Physical Networking Unit 5 Lab 1 Wired and Wireless Networks The biggest difference between these two types of networks is one uses network cables and one uses radio frequencies. A wired network allows for a faster and more secure connection and can only be used for distances shorter than 2,000 feet. Several other disadvantage of a wired network such as the “need to run cables in difficult environments through walls, floors and ceilings. Cables need to be run from computer to computer and switch to switch. Process can be time consuming. Loose cables likely remain the single most common and annoying source of failure in a wired network.” (PACE University, n.d.) While a wireless network is a very useful and convenient networking device, however these types of networks a lot less secure and transmission speeds can suffer from outside interference. Although wireless networking is a lot more mobile than wired networking the range of the network is usually 150- 300 indoors and up to 1000 feet outdoors depending on the terrain. The cost for wired networking has become rather inexpensive. Ethernet cables, hubs and switches are very inexpensive. Broadband routers cost more, but these are optional components of a wired network, and their higher cost is offset by the benefit of easier installation and built-in security features. The primary parts of a wired network are the cables, network adapters, and routers.......

Words: 315 - Pages: 2

Lab 5

...Name: Date: Instructor’s Name: Assignment: SCI103 Phase 1 Lab Report Title: Measuring pH Levels Instructions: Enter the Virtual Lab, and conduct the experiments provided before going out into the virtual field for additional research. Please type your answers on this form. When your lab report is complete, submit it to the Submitted Assignments area of the Virtual Classroom. Part I: Answer the following questions while in the Phase 1 lab environment. Section 1: You will be testing 4 known solutions for pH levels using a standard wide-range indicator. Based off of the results obtained in the lab room, fill in the following table: |Solution Number |pH from Lab |Acid, Base or Neutral? |Solution Name (what was in the test tube?) | |Solution 1 |6 |Acid |Pure Water | |Solution 2 |1 |Acid |Lemon Juice | |Solution 3 |12 |Base |Bleach | |Solution 4 |5 |Acid |Coffee | 1. How many drops of wide range indicator will you use for each test, based on industry standards......

Words: 696 - Pages: 3

Networking Labs for Unit 6

...Brandon Hellbach Unit 6 Labs Lab 6.1: Wireless Broadcast Domains Exercise 6.1.1 – A Basic Service Set does exactly what its name says; basic wireless service, one and only one AP creates the wireless LAN. Extended Service Set extends the wireless functions of a Basic Service Set. The difference is that in a BBS uses one AP to create one wireless LAN while an ESS uses more than one AP to create one wireless LAN. Exercise 6.1.2 – IEEE 802.11 Standards Standard | Frequency (GHz) | Maximum Transmission Rate (Mbps) | Standard Indoor Transmission Range (m) | Standard Outdoor Transmission Range (m) | 802.11a | 5 | 54 | 40 | 100 | 802.11b | 2.4 | 11 | 70 | 150 | 802.11g | 2.4 | 54 | 38 | 140 | 802.11n | 2.4 or 2.5 | 600 | 75 | | Lab 6.1 Review 1. It uses a beacon like transmission to find other devices on IBSS mode and on the same SSID to connect and share. 2. Infrared has a very short range and cannot penetrate walls and other objects making radio frequency superior. 3. Although WLANs have a lower speed they are more convenient than wired LANs. So the trade-off is speed for convenience of not having wires everywhere which is why WLANs are more common in households. Lab 6.2: Identifying WLANs Exercise 6.2.1 - What information about the wireless networks is available using the utility? The utility provides the name, signal strength, and MAC address of the available wireless networks. What information is given on the wireless networks with the......

Words: 574 - Pages: 3

Unit 1 Labs

...ITT TECHNICAL INSTITUTE NT1210 Introduction to Networking Onsite Course GRADED ASSIGNMENTS Graded Assignment Requirements Retain all handouts issued in every unit, as well as any assignment, research, or lab documents you prepare as part of assignments and labs. Some may be used more than once in different units. NOTE: Always check with your instructor for specific due dates of assignments. Graded Assignments Unit 1 Assignment 1: Computer Basics Review Course Objectives and Learning Outcomes Identify the major needs and major stakeholders for computer networks and network applications. Describe how digital devices store data. Describe the differences between input and output devices. Assignment Requirements In the Chapter Review Activities at the end of Chapter 1 in the Odom textbook (answers can be found in the textbook): Respond to the multiple-choice questions. Complete the List the Words inside Acronyms table. Required Resources Odom textbook Computer with word processing software Internet access Printer Submission Requirements: Submit your responses as a typed document using Arial or Times New Roman 12-point font, double-spaced. Label your assignment Unit 1 Assignment 1. Unit 2 Assignment 1: Identifying Network Topologies Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Identify the classifications of networks and how they......

Words: 16182 - Pages: 65

Lab 5

... c.s. * Prepared slide of mature lily anther (pollen grains), c.s. * Mature pollen * Glass slide * Coverslip * Compound microscope * 0.5% sucrose, in dropping bottle * Prepared slide of lily ovary, c.s megaspore mother cell * Compound microscope * Bean fruits * Soaked bean seeds * Iodine solution(I2KI), in a dropping bottle * Herbarium mount of Capsella, with fruits Procedure: Refer to Biology lab manual, lab 5- pages 3-7. Results: Questions: 1. Gymnosperms | Angiosperms | | | a.cones | flowers | c.Bare, not enclosed; found on scales, leaves or as cones. | Enclosed inside an ovary, usually in a fruit. | b. seed | Endosperm | 2. Pollination is the act of transferring pollen from the male part of a flower to the female part of a flower. Fertilization occurs when the male gamete of any sexually reproducing organism combines with a female gamete to form a zygote. 3. A. receptacle B. c.ovary D. filament E. stigma 4. It is a monocotyledon. 5. A. anther pollen tetrad B. pollen sacs...

Words: 362 - Pages: 2