Professional Documents
Culture Documents
TVL CSS11 Q4 M16
TVL CSS11 Q4 M16
TVL CSS11 Q4 M16
Servicing 11
Quarter 4
Self-Learning Module 16
Network inspection procedures
Development Team of the Self-Learning Module
Writer: Ronald S. Bobis
Editor:
Reviewers: Felix C. Vergara Jr.
Illustrator: Name
Layout Artist: Name
Management Team: Ma. Evalou Concepcion A. Agustin
OIC-Schools Division Superintendent
Aurelio G. Alfonso EdD
OIC-Assistant Schools Division Superintendent
Victor M. Javeña EdD
Chief, School Governance and Operations Division and
OIC-Chief, Curriculum Implementation Division
PRETEST
Directions: Carefully read the following questions. Choose the letter of the best
answer and write it on your notebook.
3. Filtering Email viruses and spyware are often distributed via what?
A. Email Attachments C. Passwords
B. Harmful files D. E-mail
LESSON
You have always heard the adage that "pulling all the cables out of their
Ethernet jacks is the only way to protect your network." While such an answer is
given jokingly, and would not work in today's wireless world anyway, the idea is that
if one computer can communicate with another computer (or computing device, as
tablets and smart phones are making up a growing percentage of network connected
devices compared to PCs), there is always the risk that one of the machines will
compromise. Of course, exploits can be taken from one system to another using
disposable media, so you do not need a wired Ethernet network or even wi-fi to carry
out the compromise (CDs, DVDs, floppies, USB keys, etc.). Given the growing use of
wi-fi and mobile phone carrier-based "G" (3G, 4G) networks, network attacks are
likely to be "over the air" in the future.
To make sure your computer network keeps functioning properly, you need to follow
procedures and steps for network security.
Filtering Email - Viruses and spyware are often distributed via email attachments.
Install an email filter on your server that looks at attachments and looks for
potentially harmful files. Have a segment advising people not to open attachments in
emails from strangers.
More than just perimeter protection, network inspection devices are useful.
They can be set up to filter traffic between individual network assets, providing
protection in depth and slowing the pace at which an attack spreads through the
network.
You have installed all your network switches, connected all your cables, and set up
all your computers. You still have one task to complete before you can declare your
network complete: you must verify that it functions as intended.
Here are a few quick tests you can run to ensure your network is up and
running.
If you do not see a valid IP address in this section of the output, double-check that
your IP configuration is right and that your DHCP server is operational.
➢ Verify that the computers can ping each other.
You can also run the ping command from a command prompt to ensure that the
machines on your network can communicate with one another.
In Windows 10, go to the taskbar and type:
• To open the Command Prompt, type "cmd."
• Open a Command Prompt window.
• In the black box, type "ping" and press the space bar.
• Ping the IP address that you want to ping (e.g., 192.XXX.X.X).
• Examine the ping results that have been shown.
Figure 1.0
ACTIVITIES
A. Direction: WORD SEARCH: find the following words listed below. Encircle it.
Direction: To assess yourself about the things you have learned from the lesson, fill
in the details below.
VALUING
DIRECTION: Read and answer the following questions carefully in two to three
sentences each number.
1. How will you use the knowledge you acquired about Network inspection
Procedure?
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
Direction: Write T on the line if the statement is correct and F if the statement is
wrong.
___1. Given the growing use of wi-fi and mobile phone carrier-based "G" (3G, 4G)
networks, network attacks are likely to be "over the air" in the future.
___3. After you have confirmed that the physical connections are safe, try logging on
to each of your network computers with a legitimate domain user account.
___4. On both the Internet and the intranet, NIC inspects network traffic for a list of
the most widely used protocols and assesses the traffic for possibly malicious
programs.
___5. Do not leave your password on your desk if you need to write it down. At least
once a month, all passwords should be updated.
KEY TO CORRECTION
B 5.
T 5.
B 4.
F 4.
A 3. T 3.
C 2. T 2.
B 1. T 1.
References
• Google.” Testing your computer network” Accessed April 17, 2021.
https://www.dummies.com/programming/networking/testing-your-computer-
network/
• Google.” Procedure in network security” Accessed April 17, 2021
https://smallbusiness.chron.com/procedures-steps-network-security-2147.html
• Google.” Network inspection devices” Accessed April 18, 2021
https://www.compuquip.com/blog/why-you-need-network-inspection-devices
• Google.” Network inspection system” Accessed April 18, 2021
https://techgenix.com/network-inspection-system-enhances-security-microsoft-
security-essentials-tmg-firewall/