What plan will you follow to assign printers to all the user

Assignment Help Computer Network Security
Reference no: EM13528141

You are a Network Administrator in Net Ambit Inc. The company has one External IP, five servers (Static). One of them handles DHCP (2k3), 12 printers (Static), 175 wired personal computers (PCs) or users (DHCP). This is a new facility or set up and no IPs have been assigned to you.

You''re logged on locally to a user's computer and your mapping batch file didn''t run and you need to get a file from one of your servers. You have been told that your Internet connection has been set-up and ready for use. You already know how many devices will be connected to your network in the beginning so it''s now time to lay out a plan.

Based on your understanding of the above scenario, create a report in a Microsoft Word document answering the following:

- What plan will you layout in terms of your proposal for listing IP addresses if your first IP is 192.167.1.0 and your last is 192.167.1.255?

You have ten printers that will be used by multiple users.

- What plan will you follow to assign printers to all the users in the organization?

While learning how to read a DHCP Log File, there are various event IDs which detail events.

- Discuss a minimum of five event types found in a DHCP log and describe what they refer to.

Finally, you have 175 PCs that will all be hardwired to the LAN and will each need an IP.

- How will you use your network administrator skills and knowledge in assigning IPs to each user?

Reference no: EM13528141

Questions Cloud

How many grams of ticl4 are required for complete reaction : How many grams of TiCl4 are needed for complete reaction with 125L of H2 at 440Celsius and 800 mm Hg pressure. 2TiCl4+H2=2TiCl3+2HCl
Obtain the charge on the outer surface of the conductor : An isolated conductor of arbitrary shape has a net charge of +1.10×10-5 C. Inside the conductor is a cavity within which is a point charge q = +4.40×10-6 C. obtain the charge on the outer surface of the conductor
The expectations hypothesis : (a) According to the Expectations Hypothesis, what is the expected one-year rate in the marketplace for year 2?
Homotypic fusion of yeast vacuolar vesicles : In the assay for the homotypic fusion of yeast vacuolar vesicles it was necessary to incubate the vesicles from two strains with NSF and ATP before they were mixed together. If they were not pre-treated in this way, the vesicles would not fuse
What plan will you follow to assign printers to all the user : What plan will you follow to assign printers to all the users in the organization and how will you use your network administrator skills and knowledge in assigning IPs to each user?
How to calculate the ph of the solution for acetic acid : A flask containing 36.8 mL of 0.138 M sodium acetate (NaC2H3O2) is titrated with 24.9 mL of 0.128 M HNO3. Calculate the pH of the solution. pKa for acetic acid = 4.757.
New system for merchants to accept electronic payments : Recently Apple Inc. announced a new system for merchants to accept electronic payments (credit and debit cards). Almost immediately several large corporations announced that they would not accept the Apple system. Please give us an update on t..
Obtain the charge on the outer surface of the outer shell : A thin, metallic, spherical shell of radius a = 7.0 cm has a charge qa = 2.00×10-6 C. What is the charge on the outer surface of the outer shell
Mitosis are able to shrink or eliminate tumors : In any given time the amount of cells undergoing mitosis, even in the cancer cells, are not more than 5% of the total cells. Why do you think that drugs that interferes with mitosis are able to shrink or eliminate tumors?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Methods to combat technical-nontechnical attacks in wan

Explain a security strategy for a corporate WAN. Be sure to include methods to combat both technical and nontechnical attacks.

  How to set up or improve their cybersecurity

How should government justify telling private industry how to set up or improve their cybersecurity?

  Is there a significance to caribbean island of nevis

Does it have the characteristic of being one way or can this number be end result of some other rule if so which rule?

  Recognize all the potential security threats on a personal

computer security is not an issue for organizations alone. anyone whose personal computer is connected to a network or

  How can this deficiency be addressed

How can this deficiency be addressed? What suggestions would you offer to make more users security competent?

  Secure communication if organization uses symmetric cipher

An organization has 300 members. It is desired that each member of the organization be able to communicate securely with any other member. The organization uses a symmetric cipher.

  Protocol stack for wap2

WAP protocol, cellular network infrastructure, SSL protect against eavesdropping, network datagrams (packets) be protected at the network layer, pin and fingerprint, Certificate Revocation, Public Key Infrastructure, modern symmetric algorithm bl..

  What is the resulting cipher

What is the resulting cipher - Given your answer, is security of the a!ne cipher with a given modulus m increased if one encryption is followed by a second encryption with a different key?

  Cyber terrorism

competitive intelligenc, information safekeeping governance, administration, ISO/IEC 27002, Conceptual Framework

  What is the total number of public key

An organization has 100 members. It is desired that each member of the organization be able to communicate securely with any other member, without any other member being able to decrypt their messages.

  You may use various sources be sure to cite any sources

create a 7-10 slide presentation on information systems security and it infrastructure. you may use various sources. be

  List three key things employees remember on data privacy

List at three key things employees should remember on data privacy, security practices, and the legal implications of data privacy. The document should be something which draws someone to look at it while still maintaining professional appearan..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd