How each of commands can be use when troubleshooting problem


Assignment

Part 1:

Prior to beginning work on this interactive assignment, review Chapter 10 in the textbook, and review any relevant information in this lecture. Access the MISM Credible Resource Guide for assistance with finding additional sources and information on this topic. For this interactive assignment access your virtual lab environment and follow the instructions provided within the lab.

As a network administrator of a company, you are faced with many networking problems that occur on a daily basis. Having an arsenal of tools and the knowledge to use them as part of your troubleshooting effort is critical. The following are common network troubleshooting commands. Be aware that many of these have useful switches that expand the command's capabilities.

• IPConfig
• Tracert
• Ping
• Nslookup
• GetMac
• Netstat
• Tasklist
• Taskkill
• Netsh
• Netuse
• Dnslookup
• Arp
• Route
• Shutdown

Within your virtual lab environment you will follow the instructions provided. In the virtual lab, create a PDF with a screenshot of each complete step of the instructions. (Be sure to include two screenshots per page in your PDF.) Once you have completed the exercise within the virtual lab, download the PDF and attach it to your initial post.

In the body of your initial post, provide an explanation of each command. Using what you completed in the virtual lab, provide examples or use scenarios that demonstrate where or how each of the commands can be used when troubleshooting network problems.

Part 2: Security in Networking

Prior to beginning work on this assignment read Chapter 3 in the textbook, the Granville (2015) and Iglaur (2015) online articles, and review any relevant information in this week's lecture.

It has become common to hear about data breaches and cyberattacks on companies, institutions, and governments.

For this assignment, research a recent data breach or cyber attack on a company, institution, or government. Once you have chosen your data breach, research a minimum of two professional sources on this topic. (Access the MISM Credible Resource Guide for assistance with finding appropriate credible professional resources.)

In your paper, evaluate the telecommunication and network practices that were in place and describe what contributed to the security breach including the vulnerability exploited. Apply telecommunication and network technical knowledge to create a plan of action that will alleviate these contributing factors. Explain a minimum of three preventive measures that will help to avoid this situation in the future. Support your recommendations with evidence from at least two professional sources. Apply standard principles of design to the implementation of your action plan by outlining the steps the organization would use to execute the action plan.

Format your assignment according to the following formatting requirements:

1. The answer should be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.

2. The response also includes a cover page containing the title of the assignment, the student's name, the course title, and the date. The cover page is not included in the required page length.

3. Also include a reference page. The Citations and references should follow APA format. The reference page is not included in the required page length.

Solution Preview :

Prepared by a verified Expert
Computer Networking: How each of commands can be use when troubleshooting problem
Reference No:- TGS03008818

Now Priced at $65 (50% Discount)

Recommended (96%)

Rated (4.8/5)