Download as pps, pdf, or txt
Download as pps, pdf, or txt
You are on page 1of 16

Contact Session: CompTIA Network+ (Protocols and

Installing Windows XP Professional Using Attended Installation


Internetworking Standards)
Objectives

In this session, you will learn to:


Identify the implementation of network security
Identify the common threats in a network
Identify the need for remote networking
Plan for disaster recovery
Identify the network operating system
Identify the need for network management

Ver. 1.0 Slide 1 of 16


Contact Session: CompTIA Network+ (Protocols and
Installing Windows XP Professional Using Attended Installation
Internetworking Standards)
Examining Windows IPSec Policies

IP Security:
IPSec Protection Mechanism
IPSec Modes
IPSec Transport Protocols
IPSec Policies
Let us examine the Windows IPSec policies:
Demo

Ver. 1.0 Slide 2 of 16


Contact Session: CompTIA Network+ (Protocols and
Installing Windows XP Professional Using Attended Installation
Internetworking Standards)
Review Quiz

What are the four A’s in a security system?


Authentication, authorization, access control, and auditing or
accounting
Which of the following passwords is a strong password?
Password
Pa$$w0rd
What is the role of a Certificate Authority (CA) in a network?
CA issues a digital certificate
Which protocol is used to open secure websites?
HTTPS
What are the different modes of IPSec?
Transport
Tunnel

Ver. 1.0 Slide 3 of 16


Contact Session: CompTIA Network+ (Protocols and
Installing Windows XP Professional Using Attended Installation
Internetworking Standards)
Wireless Security Threats

Wireless networking offers both mobility and convenience


to users, but it comes at a security cost.
Wireless devices share some of the vulnerabilities of LAN
devices and have some unique ones as well.
It is necessary to protect the wireless network from threats.
Let us identify how to secure wireless network:
Demo

Ver. 1.0 Slide 4 of 16


Contact Session: CompTIA Network+ (Protocols and
Installing Windows XP Professional Using Attended Installation
Internetworking Standards)
Review Quiz

Which service hides the internal addressing scheme from


the public Internet?
Network address translation
Which server or service is used to share Internet
connection?
Proxy server
In UNIX, which letter represents execute permission?
x
In Windows, which user has the full control permission on all
the files and folders of the computer?
Administrator
In which type of attack the attacker looks over the
shoulder of an individual as he or she enters password
information?
Shoulder surfing
Ver. 1.0 Slide 5 of 16
Contact Session: CompTIA Network+ (Protocols and
Installing Windows XP Professional Using Attended Installation
Internetworking Standards)
Remote Networking

Remote networking is a type of network communication


that enables users to access remote resources.
Some of the methods of remote networking are:
Remote Access Networking
Remote Access Services (RAS) Servers
Let us configure Windows RRAS as a Dial-up Server:
Demo

Ver. 1.0 Slide 6 of 16


Contact Session: CompTIA Network+ (Protocols and
Installing Windows XP Professional Using Attended Installation
Internetworking Standards)
Review Quiz

In which type of attack the attacker creates IP packets with a


forged source IP address and uses those packets to gain
access to a remote system?
IP Spoofing attack
Response time on the website that hosts the online version
of your product catalog is getting slower and slower.
Customers are complaining that they cannot browse the
catalog items or search for products. Which type of attack do
you suspect?
Denial of Service attack
What are the various remote access methods?
Remote access, Remote control, and Terminal services
How will you connect securely to your office network by
using the public network?
By using VPN
Ver. 1.0 Slide 7 of 16
Contact Session: CompTIA Network+ (Protocols and
Installing Windows XP Professional Using Attended Installation
Internetworking Standards)
Disaster Recovery

Most organizations create a disaster recovery plan so that


they have the data in place before any disaster occurs.
Organizations need effective fault tolerance methods in
order to lessen the impact of a disaster.
Some of the fault tolerance methods are:
UPS
RAID
Link redundancy
One of the key elements of a disaster recovery plan is
restoring data from backups.
Let us see how to back up and restore data:
Demo

Ver. 1.0 Slide 8 of 16


Contact Session: CompTIA Network+ (Protocols and
Installing Windows XP Professional Using Attended Installation
Internetworking Standards)
Review Quiz

What are the necessary components of a dedicated thin-


client?
Input device, output device, network connection, and Boot ROM
Which remote access protocol is used with cable modem
connections?
PPPoE
Which documents provide ″at hand″ information for the
network administrator when issues related to disaster
recovery arise?
Network diagram, device information, utilization statistics, policies
and procedures
Which RAID level uses striping without parity and provides
no fault-tolerance?
RAID 0

Ver. 1.0 Slide 9 of 16


Contact Session: CompTIA Network+ (Protocols and
Installing Windows XP Professional Using Attended Installation
Internetworking Standards)
Review Quiz (Contd.)

What are the common components of a disaster recovery


plan?
Contact information for key individuals, an inventory, and plans
to reconstruct the network
In a production backup system, what type of media you
may use for a small data backup?
External removable drives
Writeable CDs or DVDs
Which device is a specialized file server that is designed
and dedicated to support data storage needs?
Network attached storage
Which network is a special purpose network dedicated
to data storage?
Storage area network

Ver. 1.0 Slide 10 of 16


Contact Session: CompTIA Network+ (Protocols and
Installing Windows XP Professional Using Attended Installation
Internetworking Standards)
Network Operating Systems (NOS)

Network operating systems enable basic communication


between systems and provides primary network
administrative tools.
Some of the NOS are:
UNIX and Linux
Apple MAC OS X
MS Operating Systems (Windows 2003 and 2008)
Novel Open Enterprise Server
Let us explore the basic commands of UNIX and Linux:
Demo
Let us configure a client computer to join a domain server
of a network:
Demo

Ver. 1.0 Slide 11 of 16


Contact Session: CompTIA Network+ (Protocols and
Installing Windows XP Professional Using Attended Installation
Internetworking Standards)
Review Quiz

What are the architectural components of a UNIX operating


system?
The kernel and the shell
What are the different shells available in UNIX?
Bourne shell, C shell, and Korn shell
Which is the most popular open standard version of
UNIX?
Linux ,developed by Linus Torvalds
What is the name of the Web server in Linux?
Apache
How do we identify the Windows Server computer that
runs the Active Directory service of a network?
Domain Controller

Ver. 1.0 Slide 12 of 16


Contact Session: CompTIA Network+ (Protocols and
Installing Windows XP Professional Using Attended Installation
Internetworking Standards)
Network Management

Network analysis is the first step in managing the network


efficiently.
MS Windows operating systems provide tools to manage
the network.
Tools can be classified in the following categories:
System Performance Monitors
Network Monitoring Tools
Protocol Analyzers
Let us analyze the network data captured with Windows
Network Monitor:
Demo

Ver. 1.0 Slide 13 of 16


Contact Session: CompTIA Network+ (Protocols and
Installing Windows XP Professional Using Attended Installation
Internetworking Standards)
Review Quiz

What are the various LAN monitoring tools?


SNMP, RMON, Pathping, Solarwind ipMonitor, etc.
Which is identified as a diagnostic software that can
examine and display data packets that are being
transmitted over a network?
Protocol analyzer
What is the primary advantage of using server cluster?
Load balancing
Users on the third floor cannot connect to the Internet,
but they can log on to the local network. What should
you check first?
If users on the other floors are having the same problem.

Ver. 1.0 Slide 14 of 16


Contact Session: CompTIA Network+ (Protocols and
Installing Windows XP Professional Using Attended Installation
Internetworking Standards)
Review Quiz (Contd.)

Which utility do you use to diagnose the general network


problems?
Ping utility
What are the various network troubleshooting utilities
available?
Tracerouter, Arp, telnet, Nbtstat, Nslookup, etc.
What does the amber light on a Network Interface Card
(NIC) indicate?
Transmission collisions
A user tells you he cannot log on. You ask him to check the
back of his network adapter and he says there is one steady
light and one flashing light. What does this tell you?
That he has a network connection and is receiving data.

Ver. 1.0 Slide 15 of 16


Contact Session: CompTIA Network+ (Protocols and
Installing Windows XP Professional Using Attended Installation
Internetworking Standards)
Summary

In this session, you learnt that:


Security should be implemented on a network to protect data.
Wireless network must be secure to prevent unauthorized access.
Remote networking helps in accessing and managing remote
computers and data.
Disaster recovery planning helps an organization in protecting their
data from disasters.
Network operating system provides the tools and services to
manage the network efficiently.
Network management utilities help in analyzing the data and
managing the network for efficient working.

Ver. 1.0 Slide 16 of 16

You might also like