Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 24

9

Technical Vocational
Education
Computer Systems Servicing
Quarter 2-Week 8 - Module 5
Inspect and Test the Configured
Computer Networks
SPTVE_CSYS9- SUCNIIg-h-8

GOVERNMENT PROPE
NOT FOR SAL

English – Grade 7
Technical Vocational Education Computer Systems Servicing – Grade 9
Alternative Delivery Mode
Quarter 2 Week 8 Module 5 Inspect and Test the Configured
Computer Networks
First Edition, 2020

Republic Act 8293, section 176 states that: No copyright shall subsist in any work of
the Government of the Philippines. However, prior approval of the government agency or
office wherein the work is created shall be necessary for exploitation of such work for profit.
Such agency or office may, among other things, impose as a condition the payment of
royalties.

Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names,
trademarks, etc.) included in this book are owned by their respective copyright holders.
Every effort has been exerted to locate and seek permission to use these materials from
their respective copyright owners. The publisher and authors do not represent nor claim
ownership over them.

Published by the Department of Education


Secretary : Leonor Magtolis Briones
Undersecretary : Diosdado M. San Antonio
Development Team of the Module

Author: Jocelyn M. Gamo


Language Reviewer: Melgee A. Canare
Content Editor: Joel G. Castillo
Illustrator: Jocelyn M. Gamo
Layout Artist: Jocelyn M. Gamo

Management Team:

Gregorio C. Quinto, Jr., EdD


Chief, Curriculum Implementation Division

Rainelda M. Blanco, PhD


Education Program Supervisor – LRMDS

Agnes R. Bernardo, PhD


EPS-Division ADM Coordinator

Glenda S. Constantino
Project Development Officer II

Joel I. Vasallo, PhD


EPS – Technology and Livelihood Education

Joannarie C. Garcia
Librarian II

Department of Education, Schools Division of Bulacan


Curriculum Implementation Division
Learning Resource Management and Development System (LRMDS)
9

Capitol Compound, Guinhawa St., City of Malolos, Bulacan


Email address: lrmdsbulacan@deped.gov.ph

Technical Vocational
Education
Computer Systems Servicing
Quarter 2-Week 8 - Module 5
Inspect and Test the Configured
Computer Networks
SPTVE_CSYS9- SUCNIIg-h-8
Introductory Message
For the Facilitator:

Welcome to the Technical Vocational Education-Computer Systems Servicing 9 Project


CAP-LRE Alternative Delivery Mode (ADM) Module 5 on Inspect and Test the Configured
Computer Networks.

This module was collaboratively designed, developed and reviewed by educators both from
public and private institutions to assist you, the teacher or facilitator in helping the learners
meet the standards set by the K to 12 Curriculum while overcoming their personal, social,
and economic constraints in schooling.

This learning resource hopes to engage the learners into guided and independent learning
activities at their own pace and time. Furthermore, this also aims to help learners acquire the
needed 21st century skills while taking into consideration their needs and circumstances.

In addition to the material in the main text, you will also see this box in the body of the
module:

Notes to the Teacher


This contains helpful tips or strategies that will
help you in guiding the learners

As a facilitator, you are expected to orient the learners on how to use this module. You also
need to keep track of the learners’ progress while allowing them to manage their own
learning. Furthermore, you are expected to encourage and the learners as they do the tasks
included in the module.

For the Learner:


Welcome to the Technical Vocational Education-Computer Systems Servicing 9 Project
CAP-LRE Alternative Delivery Mode (ADM) Module 5 on Inspect and Test the Configured
Computer Networks.

This module was designed to provide you with fun and meaningful opportunities for guided
and independent learning at your own pace and time. You will be enabled to process the
contents of the learning resource while being an active learner

This module has the following parts and corresponding icons:


This will give you an idea of the skills or
competencies you are expected to learn in the
module.
This part includes an activity that aims to check
what you already know about the lesson to take. If
you get all the answers correctly (100%), you may
decide to skip this module.

1
This is a brief drill or review to help you link the
current lesson with the previous one.
In this portion, the new lesson will be introduced to
you in various ways; a story, a song, a poem, a
problem opener, an activity
or a situation.
This section provides a brief discussion of the
lesson. This aims to help you discover and
understand new concepts and skills.
This comprises activities for independent practice
to solidify your understanding and skills of the
topic. You may check the answers to the exercises
using the Answer Key at the end of the module.
This includes questions or blank
sentence/paragraph to be filled in to process what
you learned from the lesson.
This section provides an activity which will help you
transfer your new knowledge or skill into real life
situations or concerns.
This is a task which aims to evaluate your level of
mastery in achieving the learning competency.
In this portion, another activity will be given to you
to enrich your knowledge or skill of the lesson
learned.
This contains answers to all activities in the
module.

At the end of this module, you will also find:

References- This is a list of all sources used in developing this module.

The following are some reminders in using this module:

1. Use the module with care. Do not put unnecessary mark/s on any part of the
module. Use a separate sheet of paper in answering the exercises.
2. Don’t forget to answer What I Know before moving on to the other activities
included in the module.
3. Read the instruction carefully before doing each task.
4. Observe honesty and integrity in doing the tasks and checking your answers.
5. Finish the task at hand before proceeding to the next.
6. Return this module to your teacher/facilitator once you are through with it.
If you encounter any difficulty in answering the tasks in this module, do not hesitate to
consult your teacher or facilitator. Always bear in mind that you are not alone.

We hope that through this material, you will experience meaningful learning and gain deep
2
understanding of the relevant competencies. You can do it!

This module encourages you to be familiar on how to validate


one’s work for quality improvement work. Different activities are
provided for you to be able to:
1. Enumerate how to undertake final inspection of the
.
configuration to conform to the manufacturer‘s
instructions/manual
2. Determine how to ensure the configuration conforms to the
manufacturer‘s instructions/manual
3. Check computer networks to ensure safe operation
4. Prepare reports according to company requirements
5. Complete reports according to company requirements

‘’

Pre-Test:
Direction: Choose the letter of the correct answer. Write your answer in your
answer sheet.

1. A set of computers connected to share resources.


a. Computer Network. c. Testing Process
b. Host Servers d. Workstation

2. It is the most important phase in inspecting and diagnosing computer networks.


a. Computer Network. c. Testing Process
b. Host Servers d. Workstation

3. A separate PC or network terminals; where the users’ automated work


environment are realized.
a. Computer Network. c. Testing Process
b. Host Servers d. Workstation

4. The high-performance computers are intended for the implementation of


functions of storage of the data, access, and other operations.
a. Computer Network. c. Testing Process
b. Host Servers d. Workstation

3
5. Casual threats are called errors in network designing, errors in the software,
personal errors.
a. Artificial threats c. Natural threats
b. Deliberate Threats d. Unintentional Threats

6. Artificial threats are called mercenary, ideological, or other aspirations of people.


a. Artificial threats c. Natural threats
b. Deliberate Threats d. Unintentional Threats

7. Test that needs to conduct to check that the Link light — the little red or green
light next to the RJ-45 port — is lit on every computer.
a. Check the network configuration
b. Check the physical connections
c. Verify that the computers can ping each other
d. Verify that you can log in

8. A network-level IDS/IPS system that uses the Generic Application-level Protocol


Analyzer (GAPA) language to enable fast development of NIS signatures
a. Adapter resources
b. Generic Application-level Protocol Analyzer
c. Network Inspection System
d. Threat Management Gateway

9. It is an integral part of the learning process, student’s outputs are being recorded
not just graded, to determine the process of their work.
a. Documentation c. Reports
b. Findings d. Results

10. These are set of step-by-step instructions compiled by an organization to help


workers carry out routine operations.
a. guidelines c. reports
b. procedures d. standard procedures

11. It inspects network traffic for a collection of the most commonly used protocols on
both the Internet and the intranet and assesses that traffic for potentially
malicious code.
a. Network Inspection Service c. New Inspection Service
b. Network Inspection System d. New Inspection System

12. Which of the following are you going to do If after waiting a few minutes, you still
have problems, and you have not already disconnected the power to your router
and modem?
a. close the windows command line
b. open the windows command line
c. close the windows
d. open the windows

4
13. When connecting to most wireless networks, you need to enter the proper
___________ password to connect to the network.
a. DNS c. IP
b. Gateway d. SSID

14. Which of the following should be done if your Internet has been working but recently
stopped working, and after waiting a few minutes, you still have problems
a. Leave the power cables disconnected for 10-15 seconds, plug in your modem
again,
and then plug in your router again.
b. Turn off the power to the computer and leave it off
d. Unplug the power cable to your router and cable modem or DSL modem.
d. All of the above.

15. IPCONFIG is for Windows Operating system, while _________________ is for


Linux.
a. ifcnfig c. iscnfig
b. ifconfig d. isconfig

Directions: Write FACT if the statement is true and BLUFF if it is false. Write your
answer in your answer sheet.

1. _______ Due to the nature of wireless communications, on the other hand, it is


possible for users to connect to a network without having physical access to a
building.
2. _______ Enabling their wireless network adapters, it is impossible to view network
activity originating from other computers.
3. _______ Key lengths are typically measured in the byte.
4. _______ LAN connection is required when you want to share your pc with others in
your Home Group.
5. _______ The potential for intercepting data is low.

A computer network is a set of computers connected together for the


purpose of sharing resources. The most common resource shared
today is connection to the internet. Other shared resources can include
a printer or a file server.

Directions: Arrange the jumbled letters to form the correct word base on the given
descriptions. Write your answer in your answer sheet.
5
1. N G I T E S T O C S E S P R - The most important phase in inspecting and diagnosing
computer networks
2. K O S N R W S I O N A T - A separate PCs or network terminals; where the users’
automated work environment are realized
3. T O H S R S V E R E S - The high-performance computers intended for
implementation of functions of storage of the data, access, and other operations
4. R N U T A L A S T R H A E T - The threats called by the effects on the computer’s
networks of objective physical processes or the spontaneous natural phenomena or
disasters, independent of human.
5. N I T E N U N O L A T I N - casual threats called by errors in network designing,
errors in the software, personal errors.

A computer network or data network is a digital


telecommunications network which allows nodes to share resources. In
computer networks, computing devices exchange data with each other
using connection between nodes. These data links are established
over cable media such as wires or optic cables, or wireless media.

Testing process
 the most important phase in inspecting and diagnosing computer networks
 this phase allows the user to check all of the possible situations that may appear as
the network is being used.
 In this phase, the security of the network will also be put to a test.

Functional Units in the Network


 Workstation – separate PCs or network terminals; where the users’ automated work
environment are realized;
 Host servers – the high-performance computers intended for implementation of
functions of storage of the data, access, and other operations;
 The network devices providing connection of several data networks and;
 Data lines (broadband).

Sources of safety threats of computer networks:


 Natural disasters and accidents
 Failure of the equipment
 Development errors of computer networks components
 Operation errors
 Deliberate operations of infringers

Classification of threats
 Natural threats are the threats called by the effects on the computer’s networks of
6
objective physical processes or the spontaneous natural phenomena or disasters,
independent of humans.
 Artificial threats are called by the activity of the person.
 Unintentional, casual threats called by errors in network designing, errors in the
software, personal errors.
 Deliberate, called by mercenary, ideological or other aspirations of people

The most common artificial threats of the computer networks:


1. The unintentional operations that lead to partial system crash or corruption of
hardware, program, informational system resources;
2. Unsafe disconnecting of the equipment or change of operating mode of devices and
programs;
3. Unintentional damage of information source;
4. The system software which is capable of incompetent usage to call system failure or
carrying out irreversible changes in the system;
5. Illegal implantation and usage of the off-the-books programs with subsequent
unreasonable expending of resources;
6. Infection of the computer viruses;
7. The careless operations leading to share and disclosure of confidential information;
8. Disclosure, transmission, or loss of access information (passwords, encryption keys,
identification cards, digital certificates);
9. Development of the architecture of the system, development of data processing
technology, development of applications, with the possibilities of danger to the
system and safety of the information;
10. Loading of the extraneous operating system from replaceable storage devices;
11. Ignorance of the company’s/ industry’s limitations;
12. Incompetent usage, customization, or disconnecting of protection system by security
staff;
13. Transfer of the data to the incorrect address;
14. Incorrect data input;
15. Unintentional damage of data channels

Guidelines for Testing Configured Computer System and Network


1. Check the physical connections.
 Check that the Link light — the little red or green light next to the RJ-45 port
— is lit on every computer.
2. Verify that you can log in.
 When you're sure the physical connections are good, you should attempt to
log in to each of your network computers using a valid domain user account.
3. Check the network configuration.
a. Click the Start button, type cmd
b. press Enter.
c. Then, enter the command ipconfig /all
d. press Enter.

7
This command will spit out numerous lines of information. The line you're
looking for should resemble this:

IPv4 Address. . . . . . . . . . . : 192.168.1.125 (Preferred) If this part of the


output does not show a valid IP address, you need to check that your IP
configuration is set correctly and that your DHCP server is working.

4. Verify that the computers can ping each other.


 use the ping command from a command prompt to make sure that the
computers on your network can contact one another. Do several ping tests.
a. First, make sure that TCP/IP is up and running by having the computer try
to ping itself.
b. Open a command prompt
c. Type ping localhost.

NOTE:
The output from this command will indicate whether or not the ping was
successful. Next, try to ping your servers by name.
For example, if your file server is named FileServer01, use the
command ping FileServer01.

Network Inspection System


 a network-level IDS/IPS system that uses the Generic Application-level Protocol
Analyzer (GAPA) language to enable fast development of NIS signatures.
 NIS inspects network traffic for a collection of the most commonly used protocols on
both the Internet and the intranet and assesses that traffic for potentially malicious
code.
 NIS is currently available with the Threat Management Gateway (TMG) firewall,
where it inspects traffic to and from the Internet, and with Microsoft Security
Essentials, where it inspects traffic moving into or out of Windows hosts.
 NIS depends on the Windows Filtering Platform, which means it's available for
Windows Server 2008 and above and Windows Vista and above.
 NIS focuses on Windows-based vulnerabilities, which makes it the ideal IDS/IPS for
Windows hosts.

Network Inspection procedures


1. Adapter resources - Verify that the network
adapter is properly installed and detected by
the computer with no conflicts.
HOW:
a. search for DEVICE MANAGER
b. verify that there are no errors, by making sure that all network adapters are present
8
in your computer.
2. Verify connections
a. Wired Network
 A network card with a solid green LED or light usually indicates that the card is
either connected or receiving a signal and with that, one LED will light up if
connected properly and the other will flash when transmitting data.
 If there are no lights or the lights are orange or red, the card may be bad, not
connected properly, or may not be receiving a signal from the network.

SOLUTION
 If you are on a small or local network and have the capability of
checking a hub, switch, or router, verify that the cables are properly
connected and that it has power

b. Wireless Network
 If you're using a laptop with a wireless network, look for the laptop's Wireless
Fidelity (Wi-Fi) button and make sure it is turned on.
 If the button is turned on, make sure you're using the correct Wi-Fi hotspot
1. right-click on the Network icon in the Windows Notification Area
2. clicking "Connect to a network"
3. enter the proper SSID password to connect to the network

3. Adapter functionality
a. Verify that the network card is capable of pinging itself by using the ping
command. Windows users can ping the computer from a Windows command
line. Unix and Linux users can ping from the shell.
To ping the card or the localhost, type either of the following commands:
”ping 127.0.0.1 or ping localhost”
NOTE
Executing either of the commands above should get replies from the
network card. If you receive an error, or the transmission fails, the
network card is not physically installed into the computer correctly, has
the incorrect or outdated drivers installed, or is defective.

SOLUTION
Make sure the network card is physically installed in the computer
correctly by removing it and re-inserting it again. Check the network
card manufacturer's website for the latest drivers and install those
drivers. If the network card is defective, it needs to be replaced.

4. Connect to the router


If all of the above steps have been checked, and your network has a router, make
sure the computer can connect to the router by performing the below commands.

Determine the address of the router


Using the ipconfig command (or ifconfig command for Linux), determine the router's
9
address by looking at the Gateway address.
a. Open the Windows command line.
b. At the command prompt, type ipconfig and press Enter. You should see output
similar to the example below.
Ethernet adapter Local Area Connection:
Connection-specific DNS Suffix . : computerhope.com.
IP Address. . . . . . . . . . . . : 192.168.1.103
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Default Gateway . . . . . . . . . : 192.168.1.1
c. Attempt to ping the router to see if it can send and receive information by running
the command ping 192.168.1.1.

NOTE

If you get replies back from the router, the connection between your
router and computer are good, and you can skip to the next step.

SOLUTION
If you do not receive any replies back from the router, either the
router is not set up properly, or your connection between the router
and the computer is not

STEPS ON HOW TO RESET ROUTER:


1. Turn off the power to the computer and leave it off.
2. Unplug the power to your router and cable modem or DSL(Digital Subscriber
Line) modem.
3. Leave the power cables disconnected for 10-15 seconds and then plug in your
modem and then your router again.
4. Finally, turn on your computer again and repeat this step to see if you can ping
your router.

NOTE
If you have a wireless network and followed the above steps, but cannot
ping the router, turn the computer off again and connect the computer to
the router using a network cable instead of wirelessly. If a wire also does
not work, contact the manufacturer of the router for additional support or
replacement.

5. Firewall
 If your computer network utilizes a firewall, make sure all required ports are
open, especially port 80, which is the HTTP(Hypertext Transfer Protocol) port. If
possible, disable the firewall software or disconnect the computer from the
firewall to make sure it is not causing network problems.

6. The Internet is not working


 If you're able to ping the router, but are still unable to connect to the Internet,
either your router is improperly configured, or the Internet Service Provider (ISP)
10
is having issues.
NOTE
Some ISPs, such as Comcast, require special software to be installed.
Make sure any software included with your Modem or other hardware has
been installed on at least one computer if you are setting up a new Internet
connection.

SOLUTION
If your Internet has been working but recently stopped working, give it a
few minutes to make sure it is not a temporary outage. If after waiting a
few minutes, you still have problems, and you have not already
disconnected the power to your router and modem, follow the steps
below.
a. Turn off the power to the computer and leave it off.
b. Unplug the power cable to your router and cable modem or DSL modem.
c. Leave the power cables disconnected for 10-15 seconds, plug in your modem
again, and then plug in your router again.
d. Finally, turn on your computer and see if you can ping your router.

SOLUTION
If after following the above steps, the Internet is still not working,
open the Windows command line and run the command ping
google.com.
Running the command should get a reply from Google.
 If you get a reply, this is an indication that the Internet is working, but you may be
encountering a problem with the Internet browser you are using to browse the
Internet. Try an alternative browser, such as Firefox or Chrome.
 If you're getting no reply from Google, your router or modem is not reaching the
Internet. If you have a router, make sure your router has DHCP(Dynamic Host
Configuration Protocol) enabled and that the WAN or Gateway address is the
proper ISP address.
 Finally, if trying the above steps has not helped, contact your ISP to make sure
there is no problem on their end and to assist you further with any special
configurations.
STANDARD PROCEDURE
 set of step-by-step instructions compiled by an organization to help workers carry out
routine operations.
 aim to achieve efficiency, quality output, and uniformity of performance while
reducing miscommunication and failure to comply with industry regulations
 key factors in having a correct outcome on every activity

Importance of Documentation Reports of the Results/ Findings


 the act or instance of furnishing or authenticating with documents; usually printed
instructions, comments, and information for using a particular piece or system of
computer software or hardware
 an integral part of the learning process, student’s outputs are being recorded not just
graded, to determine the process of their work.
 it will also reflect on the effectiveness of the teaching strategy of the teacher as the
11
discussion goes on the semester
Activity:
Directions: Write FACT if the stated common threats of the computer networks are
true and BLUFF if it is false. Write your answer in your answer sheet.

1. _______ Development of the architecture of the system, development of data


processing technology, development of applications, with the possibilities of danger
to the system and safety of the information
2. _______ Disclosure, transmission, or loss of access information (passwords,
encryption keys, identification cards, digital certificates)
3. _______ Ignorance of the company’s/ industry’s limitations.
4. _______ Legal implantation and usage of the off-the-books programs with
subsequent unreasonable expending of resources.
5. _______ Competent usage, customization, or disconnecting of protection system by
security staff.
6. _______ Correct data input.
7. _______ Infection of the computer viruses.
8. _______ Loading of the extraneous operating system from irreplaceable storage
devices.
9. _______ The careless operations leading to share and disclosure of confidential
information.
10. _______ The system software which is capable of incompetent usage to call system
failure or carrying out irreversible changes in the system.

1.

Independent Activity 1:
Instructions: Please refer to page 27 for the rubrics

1. Perform the steps on how to connect to a Wireless Network.


2. Take a picture/Screenshot of every step that you're going to perform.
3. Transfer the picture to MS Powerpoint, then type the steps below the picture.
4. Save your PowerPoint presentation using the filename: your fullname_Wireless
Network.

Independent Assessment 1:
Directions: Arrange the steps chronologically using the numbers. Write your
answer in your answer sheet.

How To Reset A Router


1. ___ Leave the power cables disconnected for 10-15 seconds.
2. ___ Plug in your modem and then your router again.
3. ___ Turn off the power to the computer and leave it off.
4. ___ Turn on your computer again and repeat this step to see if you can ping
your router.
5. ___ Unplug the power to your router and cable modem or DSL(Digital
Subscriber Line) modem.

12
Independent Activity 2:
Instructions: Please refer to page 23 for the rubrics

1. Please watch this video: https://youtu.be/Max1IEqdQH4


2. Identify the steps chronologically.

Independent Assessment 2:
Directions: Write T if the underlined word(s) is correct and F if it is incorrect. Write
your answer in your answer sheet.

1. ___ Aim to achieve efficiency, quality output, and uniformity of performance while
maximizing miscommunication and failure to comply with industry regulations.
2. ___ If your computer network utilizes a firewall, make sure all required ports are
open, especially port 80, which is the HTTP(Hypertext Transmission Protocol) port.
3. ___ If there are no lights or the lights are orange or green, the card may be bad, not
connected properly, or may not be receiving a signal from the network.
4. ___ A set of step-by-step instructions compiled by an organization to help workers
carry out routine operations.
5. ___ Some ISPs, such as Comcast, require special software to be installed.

Independent Activity 3:
Directions: Write CS if the given guidelines are to test the Computer System, and
NS if it is for Network System. Write your answer in your answer sheet.

1. _____ Adapter functionality


2. _____ Adapter resources
3. _____ Check the network configuration
13
4. _____ Check the physical connections
5. _____ Determine the address of the router
6. _____ Reset Router
7. _____ Verify that the computers can ping each other
8. _____ Verify that you can log in
9. _____ Wired Network
10. _____ Wireless Network

Independent Assessment 3:
Directions Supply a missing word(s) in the paragraph below to complete the
network inspection systems’ description. Choose your answer inside the box.

hosts IDS/IPS inspects


traffic Windows

NIS(Network Inspection System) is currently available with the Threat Management


Gateway (TMG) firewall, where it inspects 1.___________________ to and from the
Internet, and with Microsoft Security Essentials, where it 2._________________ traffic
moving into or out of Windows 3. __________________. NIS depends on the Windows
Filtering Platform, which means it's available for Windows Server 2008 and above and
Windows Vista and above. NIS focuses on 4. __________________ based vulnerabilities,
which makes it the ideal 5. ___________________ for Windows hosts.

Direction: Answer the following questions correctly. Please refer to page 23 for
the rubrics

1. I Have Learned that NIS (Network Inspection System)


_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
2. Testing Process is the most important phase in inspecting and diagnosing computer
networks for ____________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________

14
Instructions: Please refer to page 23 for the rubrics

1. Watch this video: https://youtu.be/N-nG2TtD7gc


2. Observe the procedures that have been performed.
3. Write down the steps that have been performed chronologically.

\
Post Test:
Direction: Choose the letter of the correct answer. Write your answer in your
answer sheet.

1. A set of computers connected to share resources.


a. Computer Network. c. Testing Process
b. Host Servers d. Workstation

2. It is the most important phase in inspecting and diagnosing computer networks.


a. Computer Network. c. Testing Process
b. Host Servers d. Workstation

3. A separate PC or network terminals; where the users’ automated work


environment are realized.
a. Computer Network. c. Testing Process
b. Host Servers d. Workstation

4. The high-performance computers are intended for the implementation of


functions of storage of the data, access, and other operations.
a. Computer Network. c. Testing Process

15
b. Host Servers d. Workstation

5. Casual threats are called errors in network designing, errors in the software,
personal errors.
a. Artificial threats c. Natural threats
b. Deliberate Threats d. Unintentional Threats

6. Artificial threats are called mercenary, ideological, or other aspirations of people.


a. Artificial threats c. Natural threats
b. Deliberate Threats d. Unintentional Threats

7. Test that needs to conduct to check that the Link light — the little red or green
light next to the RJ-45 port — is lit on every computer.
a. Check the network configuration
b. Check the physical connections
c. Verify that the computers can ping each other
d. Verify that you can log in

8. A network-level IDS/IPS system that uses the Generic Application-level Protocol


Analyzer (GAPA) language to enable fast development of NIS signatures
a. Adapter resources
b. Generic Application-level Protocol Analyzer
c. Network Inspection System
d. Threat Management Gateway

9. It is an integral part of the learning process, student’s outputs are being recorded
not just graded, to determine the process of their work.
a. Documentation c. Reports
b. Findings d. Results

10. These are set of step-by-step instructions compiled by an organization to help


workers carry out routine operations.
a. guidelines c. reports
b. procedures d. standard procedures

11. It inspects network traffic for a collection of the most commonly used protocols on
both the Internet and the intranet and assesses that traffic for potentially
malicious code.
a. Network Inspection Service c. New Inspection Service
b. Network Inspection System d. New Inspection System

12. Which of the following are you going to do If after waiting a few minutes, you still
have problems, and you have not already disconnected the power to your router
and modem?
a. close the windows command line
b. open the windows command line
c. close the windows
d. open the windows
16
13. When connecting to most wireless networks, you need to enter the proper
___________ password to connect to the network.
a. DNS c. IP
b. Gateway d. SSID

14. Which of the following should be done if your Internet has been working but
recently stopped working, and after waiting a few minutes, you still have
problems
a. Leave the power cables disconnected for 10-15 seconds, plug in your modem
again,
and then plug in your router again.
b. Turn off the power to the computer and leave it off
d. Unplug the power cable to your router and cable modem or DSL modem.
d. All of the above.

15. IPCONFIG is for Windows Operating system, while _________________ is for


Linux.
a. ifcnfig c. iscnfig
b. ifconfig d. isconfig

Instructions: Please refer to page 23 for the rubrics

1. Create a vlog on how to Inspect Adapter Resources.


2. Share the video link with your teacher.

17
What I Know: What’s In: What’s New:
1. A 1. B 11. B 1. Fact 1. Testing Process
2. C 2. B 12. B 2. Bluff 2. Workstation
3. D 3. C 13. D 3. Bluff 3. Host Servers
4. B 4. A 14. D 4. Fact 4. Natural Threats
5. D 5. D 15. B 5. Bluff 5. Unintentional

What Is It: Activity 1: Independent Assessment 1:


1. Fact 6. Bluff 1. 3
2. Fact 7. Fact 2. 4
: 3. Fact 8. Bluff 3. 1
4. Bluff 9. Fact 4. 5
5. Bluff 10. Fact 5. 2

Independent Assessment 2: Independent Activity 3:


1. F 1. NS 6. NS
2. F 2. NS 7. CS
3. F 3. CS 8. CS
4. T 4. CS 9. NS
5. T 5. NS 10. NS

Independent Assessment 3: Assessment:


1. traffic 1. A 6. B 11. B
2. inspects 2. C 7. B 12. B
3. hosts 3. D 8. C 13. D
4. Windows 4. B 9. A 14. D
5. IDS/IPS5 5. D 10. D 15. B

18
References

Building up for Ultimate Learner’s Advancement thru Capable and Active Nurturing, “1st
Quarter - Lesson 9 Setting-Up Computer Networks (SUCN)”, pp: 84-104

19
Appendices

What I Have Learned

RUBRICS
CRITERIA 10 8 5 3 1
Quality of Answer The students The students The students The students The students
with Correct can can can can can answer
Usage of understand understand understand understand questions but
Grammar and answer and and answer and answer the has a
the answer the the questions questions difficulty in
questions questions slightly correct slightly constructing
correctly and correctly correct with a ideas
clearly minimal error in
explained usage grammar

Ideas and The students The students The students The students The students
Explanation can can can can explain have the
explain and explain his/her explain his/her his/her idea hardship to
expand his/her ideas ideas slightly explain his/her
ideas thoroughly idea
extremely

Independent Activity 1-3/What I Can Do/Additional Activity

20
20 15 8 1
Student spent Student spent
Student spent
Student spent too an adequate an adequate
too much time
much time and/or amount of time amount of time
Adequate Time and/or too little
too little time on on computer on computer ____
Spent on Activity time on parts of
entire computer lab lab activity to lab activity to
computer lab
activity. ensure good ensure the best
activity.
results. results.
Student put a Student put a
Student put little to Student put little
good amount of great deal of
no effort towards effort towards
Effort effort towards effort towards ____
computer lab computer lab
computer lab computer lab
activity. activity.
activity. activity.
Student Student
Student completed Student
completed about completed
less than 1/2 of the completed all of
Completion of 1/2 of the about 80% of
computer lab the computer ____
Task computer lab the computer
activity by the due lab activity by
activity by the lab activity by
date. the due date.
due date. the due date.
Responses and
Responses and Responses and Responses and
information
information given information information
Reasonable given are
are entirely given are given are very
Response and reasonable ____
unreasonable unreasonable in reasonable
Information throughout
throughout the some areas of throughout all
most of the
activity. the activity. of the activity.
activity.
Responses and
Responses and Responses and
Responses and information
information information
information given given are neat,
Neatness, given are given are very
are entirely readable, and
Readability, and unreadable and neat, readable, ____
unreadable and legible
Legibility illegible and legible
illegible throughout throughout
throughout most throughout all
the activity. most of the
of the activity. of the activity.
activity.
Total----> _

21

You might also like