logo Use CA10RAM to get 10%* Discount.
Order Nowlogo
(5/5)

Select one of the seven network problems and develop a troubleshooting and tool report

INSTRUCTIONS TO CANDIDATES
ANSWER ALL QUESTIONS

Please review work instruction. Select one of the seven network problems and develop a troubleshooting and tool report that details the solution.

.

For your next project, due in Week 6, you must select one of the seven network problems and develop a troubleshooting and tool report that details the solution. 

1. On Day 2 of full operational capability (FOC), our connection to the internet was becoming intermittent. We could establish connections to our globally hosted servers some of the time. The connection would drop at seemingly random periods and we don't know why. We have experienced this day and night, and it has been consistent for the past three days. 

2. When our connection to the internet is working, we seemingly cannot reach out to our globally dispersed servers from our hosts. We use the globally dispersed servers for command and control and must be able to connect to them. We need a method to determine where the packets are going and why they are not reaching their destination. Because these servers are globally distributed, we can't just pick up and deploy to them. 

3. Our internal network servers are also spotty. Sometimes they are up, and sometimes they are down. For example, the DHCP server appears to provide IP addresses to hosts that are turned on sometimes, but other times when the host is turned on, it receives an Automatic Private IP Address (APIPA). These hosts can communicate with our networked hosts locally, but they can't reach out to our global servers. These hosts enable our persistent engagement capability, so they must be functional, and we need to determine the problem ASAP! 

4. We have a team that can troubleshoot from afar, but the members are located 25 miles west of this location. We have one of the tech support personnel deployed on site, but there are just too many issues for one person. The support team that is 25 miles west is centrally located to support multiple operational outfits. That team has a virtual private network (VPN) and secure access to our internal servers. At times, support team members need to determine which of our hosts are functioning. We use both Microsoft Windows and Linux operating systems, but we don't know what tool will help determine host functionality from afar. 

5. This next part is classified, but I need your help, and I need it fast. Bottom line, we believe there may be an insider threat. At times, we have reason to believe a nonapproved device is connecting to the network and reaching out to the internet. We need a method to determine what devices exist on the same subnet of our network. What can help us do that? 

6. When we begin operations in 72 hours, it will be of utmost importance for us to know what device name is associated with what IP address. This will allow us to know what exists internally and what we need to defend should the adversary begin operations against us. We need to understand what options exist to achieve this task.

7. When we first arrived and established our connection to the internet, we noticed inbound connection requests. What tool can we use to determine if any adversary is reaching into our systems through a particular port or protocol?

Your report should be about a page in length and address the following: 

Choose and restate one of the problems identified as you understand it and explain why it is a problem.

State the steps in the Network+ troubleshooting methodology.

Name and provide a brief overview of the tool that could solve this problem (refer to Lesson 17 in uCertify).

Describe how the tool can be used to solve similar problems in the future.

Provide a detailed overview of the tool's functionality and options.

Include a screenshot of your selected tool from the appropriate uCertify lab. 

Use the Troubleshooting and Tool Report Template to record your work. This assignment is due at the end of Week 6.

The SITREP (Situation Report) Sample Report is provided so that you can understand what Cyber Command is expecting in your report. Your report will vary depending on the problem and tool selected.

 

Looking for affordable and reliable assignment help? Look no further! Our assignment help service offers top-notch assistance at the lowest prices you can find. We understand the importance of academic success and are committed to helping you achieve it without breaking the bank. Trust us to provide you with exceptional support every step of the way.

Computer network homework help

 

(5/5)
Attachments:

Expert's Answer

2099 Times Downloaded

Related Questions

. Introgramming & Unix Fall 2018, CRN 44882, Oakland University Homework Assignment 6 - Using Arrays and Functions in C

DescriptionIn this final assignment, the students will demonstrate their ability to apply two ma

. The standard path finding involves finding the (shortest) path from an origin to a destination, typically on a map. This is an

Path finding involves finding a path from A to B. Typically we want the path to have certain properties,such as being the shortest or to avoid going t

. Develop a program to emulate a purchase transaction at a retail store. This program will have two classes, a LineItem class and a Transaction class. The LineItem class will represent an individual

Develop a program to emulate a purchase transaction at a retail store. Thisprogram will have two classes, a LineItem class and a Transaction class. Th

. SeaPort Project series For this set of projects for the course, we wish to simulate some of the aspects of a number of Sea Ports. Here are the classes and their instance variables we wish to define:

1 Project 1 Introduction - the SeaPort Project series For this set of projects for the course, we wish to simulate some of the aspects of a number of

. Project 2 Introduction - the SeaPort Project series For this set of projects for the course, we wish to simulate some of the aspects of a number of Sea Ports. Here are the classes and their instance variables we wish to define:

1 Project 2 Introduction - the SeaPort Project series For this set of projects for the course, we wish to simulate some of the aspects of a number of

2099 Times Downloaded

Ask This Question To Be Solved By Our ExpertsGet A+ Grade Solution Guaranteed

expert
Husnain SaeedComputer science

754 Answers

Hire Me
expert
Atharva PatilComputer science

699 Answers

Hire Me
expert
Chrisantus MakokhaComputer science

573 Answers

Hire Me
expert
AyooluwaEducation

802 Answers

Hire Me

Get Free Quote!

379 Experts Online