Networking Assignments

Last Updated: 5/24/2020 12:13 PM

Networking Technology Assignments

 

Email Instructor: Mr. Thomas

Email Learning Support: Mr. Harr

Email Learning Support: Ms. Hudak

Guidance Support: Mrs. Wurm

Learning Support Assistance

 

Career Foundation Scholarship Opportunity

 

Assignments will be posted on Mondays by noon for the week.   All Assignments are due before Fridays at noon.   Please email your instructor with the link above to turn in weekly assignment.   If you have questions or problems with the work please email the instructor or the learning support personnel that would normally assist you with your work with the links above.

 

PLEASE REVIEW THIS END OF YEAR INFORMATION including schedule on when you can pick up your things from your locker and last day of school:    http://www.ap.tec.pa.us/News/eoyinfo

 

 

Students: For those of you that have completed assignments, good job and well done. If you have not yet turned in prior assignments, you still have time to complete them.

Mr. Thomas

Week of May 25th Assignments

Please complete all previous assignments and return to me with your name and the assignment # so you can get credit for them.   Thank You!

 

Networking Technology Online Assignment for week of  May 18, 2020

First Year Students:

 

This assignment is a review of chapter 7

Please answer the following questions and send them to my email listed above.

Please include your name on the email so I can properly identify who belongs to which email.

This week’s assignment aligns with Pennsylvania Department of Education CIP 11.0901 Task List ID 503

 

Let’s have some fun with binary and decimal conversions…

Feel free to use your calculator!!!!

 

  1. If I have an 8-bit binary number that begins with 111, then the conversion number must be between:
    1. 0 and 127
    2. 128 and 191
    3. 192 and 223
    4. 224 and 239

 

  1. Which of the following is 192.168.10.3 converted to binary?
    1. 11100000.10101000.00001010.00000011
    2. 11000000.10101000.10000000.00000111
    3. 11000000.10101000.00001010.00000011
    4. 10000001.11000000.10100000.11000000

 

  1. After reading page 7.1.2.2, what three items must be configured on a host in order for it to access the Internet?
    1. IP address, MAC address, ARP address
    2. IP address, ARP address, DNS address
    3. IP address, DNS address, Web Server address
    4. IP address, Subnet Mask, Default Gateway

 

  1. According to page 7.1.3.1 and 7.1.3.2, what are two ways for a host device to obtain an IP address?
    1. Manual and Unmanual
    2. Static and Dynamic
    3. Routed and Unrouted
    4. Dynamic and Un-dynamic

 

  1. After reading page 7.1.3.3, A host that is successfully connected to a network can communicate with other devices in one of three ways. Which of the following are those three ways?
    1. Unicast, Broadcast, Multicast
    2. Straight, Modified, Angular
    3. Acknowledged, Undocumented, Privileged
    4. Synchronized, Acknowledged, Privileged

 

Second- and Third-Year Students:

 

This assignment we’re taking a look at chapter 6 (a new chapter for us)

Please answer the following questions and send them to my email listed above.

Please include your name on the email so I can properly identify who belongs to which email.

This week’s assignment aligns with Pennsylvania Department of Education CIP 11.0901 Task List ID 703

 

  1.  After reading page 6.2.1.2, use the Syntax Checker in Figure 3 to create a VLAN and use the show vlan brief command to display the contents of the vlan.dat file.
    1. Done
    2. Did NOT do

 

  1. After reading page 6.2.1.3 from chapter 6, what two commands are used to assign switch interfaces to specific vlans on a Cisco switch?
    1. Switchport mode access and switchport access vlan x
    2. Switchport mode trunk and swtichport access trunk x
    3. VLAN switch and VLAN trunk
    4. It can’t be done

 

  1. After reading page 6.2.1.3 from chapter 6, what command is used to simultaneously configure multiple interface?
    1. Interface VLAN 1
    2. Interface Range
    3. Show VLAN
    4. VLAN Connect Interface
  2. After reading page 6.2.1.3, Use the Syntax Checker in Figure 5 to assign a data VLAN and voice VLAN
    1. Done
    2. Did NOT do

 

  1. After reading page 6.2.1.4, what VLAN will the interface be associated with after issuing the No switchport access VLAN 20?
    1. VLAN 0
    2. VLAN 1
    3. VLAN 20
    4.  None

 

 

Networking Technology Online Assignment for week of  May 11, 2020

Students: For those of you that have completed assignments, good job and well done. If you have not yet turned in prior assignments, you still have time to complete them. Just so you know, I miss the classroom comradery and I hope you all stay safe and good luck.

Mr. Thomas

 

****ATTENTION****

Students please be advised Mrs. Wurm is accepting applications for the Admiral Peary Career Foundation Essay Contest (two $250 scholarships) and the $500 Rotary Scholarship.

Please see the link on Admiral Peary’s website home page for more information.

 

 

First Year Students:

 

This assignment is a review of chapter 9

Please answer the following questions and send them to my email listed above.

Please include your name on the email so I can properly identify who belongs to which email.

This week’s assignment aligns with Pennsylvania Department of Education CIP 11.0901 Task List ID 502, and 901

 

  1. According to the graphic on page 9.1.2.8; Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) both use port numbers; well known, Registered, and Private ports. Which group uses port numbers between 1024 and 49,151?
    1. Private
    2. Registered
    3. Well known
    4. Dual rate

 

  1. According to page 9.1.2.8, Some applications may use both TCP and UDP. From the choices below, choose one application that uses both.
    1. FTP
    2. DNS
    3. TFTP
    4. HTTPS

 

  1. On page 9.1.2.9, By default, what command will attempt to resolve IP addresses to domain names and port numbers to well-known applications?
    1. NETSTAT
    2. NSLOOKUP
    3. IPCONFIG
    4. CMD

 

  1. According to page 9.2.1.1, True or False:  A host running a web server application and a file transfer application can both be configured to use the same port (for example, TCP port 80).
    1. True
    2. False

 

  1. According to page 9.2.1.4, what does TCP use to establish a connection between a source and destination host?
    1. 4-way handshake
    2. 3-way handshake
    3. SYN, SYYN, SYN
    4. ACK, ACK, ACK

 

 

Second- and Third-Year Students:

 

This assignment we’re taking a look at chapter 6 (a new chapter for us)

Please answer the following questions and send them to my email listed above.

Please include your name on the email so I can properly identify who belongs to which email.

This week’s assignment aligns with Pennsylvania Department of Education CIP 11.0901 Task List ID 703

 

  1. On page 6.1.1.1, what allows administrators to segment networks based on factors such as function, project team, or application, without regard for the physical location of the user or device?
    1. Packet Sniffer
    2. Broadcast Domain
    3. Collision Domain
    4. VLAN (Virtual Local Area Network)

 

  1. On page 6.1.1.1, what happens if a device in one VLAN sends a broadcast Ethernet frame?
    1. Nothing
    2. VLANS block all broadcasts
    3. Every host responds to it
    4. All devices in the VLAN receive the frame, but devices in other VLANs do not.
  2. On page 6.1.1.2, there are six (6) benefits of VLANS listed. Give me three of them.
  3. On page 6.1.1.3, there are different types of VLANS listed. By default, all switch ports on a Cisco switch are assigned to which VLAN from the factory?
    1. VLAN 1
    2. VLAN 10
    3. VLAN 100
    4. VLAN 1000

 

 

Networking Technology Online Assignment for week of  May 4, 2020

Students: For those of you that have completed assignments, good job and well done. If you have not yet turned in prior assignments, you still have time to complete them. Just so you know, I miss the classroom comradery and I hope you all stay safe and good luck.

Mr. Thomas

 

First Year Students:

This assignment is a review of chapter 5

Please answer the following questions and send them to my email listed above.

Please include your name on the email so I can properly identify who belongs to which email.

This week’s assignment aligns with Pennsylvania Department of Education CIP 11.0901 Task List ID 901

 

  1. From page 5.2.3.2. What is the technology that allows a switch to detect the type of cable attached and configure the interfaces accordingly?
    1. ARP
    2. MDIX
    3. DHCP
    4. RIP

 

  1. From page 5.3.2.1. When a sending device knows the IP address of the destination but does not know the destination’s MAC address, it formulates a specific request. Name this request.
    1. MSC
    2. ARP
    3. MAC
    4. DHCP

 

  1. From page 5.2.3.7, what command is used in Windows command prompt to view the host ARP table?
    1. Show IP ARP
    2. NSLookup
    3. ARP-a
    4. IPCONFIG

 

  1. From page 5.3.3.2, What is the process called that is used by an attacker to reply to an ARP request for an IPv4 address belonging to another device, such as the default gateway.
    1. Spoofing
    2. Spanning Tree
    3. Matching
    4. Requesting

 

Second- and Third-Year Students:

This assignment we’re taking a look at chapter 5 (a new chapter for us)

Please answer the following questions and send them to my email listed above.

Please include your name on the email so I can properly identify who belongs to which email.

This week’s assignment aligns with Pennsylvania Department of Education CIP 11.0901 Task List ID 702

 

  1. From page 5.1.2.2, What command is used to specify the bandwidth on a switch port?
    1. Speed
    2. Throughput allowed
    3. Bandwidth allowed
    4. BASE

 

  1. From page 5.1.2.3, what technology is used that allows a switch to detect the type of cable attached and configure the interfaces accordingly?
    1. ARP
    2. MDIX
    3. DHCP
    4. RIP

 

  1. From page 5.2.1.1 What is a protocol that provides a secure (encrypted) management connection to a remote device?
    1. STP
    2. DHP
    3. EIGRP
    4. SSH

 

  1. From page 5.2.1.1, Why is SSH a better option for remote access that TELNET?
    1. It provides a faster connection
    2. It provides a graphical user interface (GUI)
    3. It provides a secure connection
    4. It eliminates the need for a network connection

 

 

Networking Technology Online Assignment for week of April 27, 2020

Students: For those of you that have completed assignments, good job and well done. If you have not yet turned in prior assignments, you still have time to complete them. Just so you know, I miss the classroom comradery and I hope you all stay safe and good luck.

Mr. Thomas

 

For All Students: 1st , 2nd , and 3rd year

 

This assignment is one of our favorites

It’s ……. Subnetting!!!

It aligns with Pennsylvania Department of Education CIP 11.0901 Task List ID 501, 503, and 504

Please use your curriculum and any online resource or subnet calculator if necessary.

 

Please select the correct answer from the options provided.

 

  1. If a PC has an IP address of 192.168.1.21 with a subnet mask of 255.255.255.240, which of the following might be it’s default gateway’s IP address in order for the PC to access the Internet?
    1. 192.168.1.17
    2. 192.168.1.33
    3. 192.168.1.1
    4. 192.168.1.15

 

  1. What is the subnet mask of a host device that has an IP address of 165.33.45.102/23?
    1. 255.255.255.0
    2. 255.255.254.0
    3. 255.255.255.128
    4. 255.255.0.0

 

  1. How many bits were borrowed for subnetting from IP address 145.15.200.0 with subnet mask of 255.255.255.128?
    1. 7
    2. 8
    3. 9
    4. 10

 

  1. If I have an IPv6 address of 2001:CAFÉ:5000:A:0:0:0:1/64, what subnet number is this on?
    1. 1
    2. 10
    3. 100
    4. 1000

 

  1. How many subnets are available on an IPv6 address with a prefix length of 64?
    1. 0
    2. 64
    3. 255
    4. 65536

        

        

 

Networking Technology Online Assignment for week of April 20, 2020

Students: For those of you that have completed assignments, good job and well done. If you have not yet turned in prior assignments, you still have time to complete them. Just so you know, I miss the classroom comradery and I hope you all stay safe and good luck.

Mr. Thomas

 

First Year Students:

This assignment is purely review of past chapter 4

Please answer the following questions and send them to my email listed above.

Please include your name on the email so I can properly identify who belongs to which email.

From NETACAD INTRO21 Chapter 4 Page 4.1.3.3

 

1. What is the measure of the transfer of actual bits across the media over a given period of time?

a. Throughput

b. Speed

c. Attenuation

d. Disbursement

2. Throughput usually does not match the specified bandwidth in physical layer implementations. Please identify three things that effect throughput.

a.

b.

c.

 

3. From NETACAD INTRO21 Chapter 4 Page 4.2.1.1. The timing and voltage values of the electrical pulses are also susceptible to interference from two sources. Name these two sources.

a.

b.

 

4. From NETACAD INTRO21 Chapter 4 Page 4.2.1.2. What are the three main types of copper media used in today’s networks?

a.

b.

c.

 

Second- and Third-Year Students:

 

This assignment is purely review of past Chapter 3

Please answer the following questions and send them to my email listed above.

Please include your name on the email so I can properly identify who belongs to which email.

 

1. From NETACAD R&S2020 Chapter 3 Page 3.2.1.1. To enable RIP routing protocol on a Cisco router, use the “Router RIP” command. What command is used to disable Router RIP?

a. Un RIP

b. Disable RIP

c. No Router RIP

d. Router RIP disable

 

2. From NETACAD R&S2020 Chapter 3, Page 3.2.1.4. True of False: When RIP process is configured on a Cisco router, its running RIPv1. With this configuration, the router can interpret both RIPv1 and RIPv2 updates.

a. True

b. False

 

3. From NETACAD R&S2020 Chapter 3, Page 3.2.1.6, Which router configuration command is used to prevent the transmission of routing updates through a router interface, but still allow that network to be advertised to other routers?

a. No Update

b. Default Information Originate

c. Passive-Interface

d. No IP Route

 

4. From NETACAD R&S2020 Chapter 3 Page 3.3.1.3, What part of the routing table entry identifies the trustworthiness of the route source?

a. Route Source

b. Destination Network

c. Administrative Distance

d. Metric

 

 

Networking Technology Online Assignment for week of April 13, 2020

First Year Students:

This assignment is purely review of past chapter 3

Please answer the following questions and send them to my email listed above.

Please include your name on the email so I can properly identify who belongs to which email.

From NETACAD INTRO21 Chapter 3 page 3.2.4.3

1. Using the TCP/IP Reference Model, which layer supports communication between various devices across diverse networks?

a. Application

b. Transport

c. Internet

d. Network Access

2. From NETACAD INTRO21 Chapter 3 Page 3.2.4.4, Which layer(s) of the OSI Reference model are included in the TCP/IP model’s Network Access Layer?

a. Application, Presentation, Session

b. Network, Transport

c. Physical, Data Link

d. Data Link, Network

3. From NETACAD INTRO21 Chapter 3 page 3.3.1.1, What is the process of dividing the data into smaller, more manageable pieces to send over the network?

a. Segmentation

b. CSMACD

c. Multi-Mode Sending

d. Data Participation

4. From NETACAD INTRO21 Chapter 3 page 3.3.1.2, what is the correct order of the protocol data units (PDU) during encapsulation?

a. Data, frame, bit, segment, packet

b. Data, packet, frame, bit, segment

c. Data, segment, packet, frame, bit

d. Bit, data, packet, segment, frame

 

 

Second- and Third-Year Students:

This assignment is purely review of past Chapter 2

Please answer the following questions and send them to my email listed above.

Please include your name on the email so I can properly identify who belongs to which email.

From NETACAD R&S2020 Chapter 2

 

1. From Page 2.1.2.1 As shown in the figure, static routes are most often used to connect to a specific network or to provide a Gateway of Last Resort for a stub network. Please list four types of IPv4 and IPv6 static routes.

a.

b.

c.

d.

2. From Page 2.1.1.5, What must be configured to qualify a static route to be a “fully specified static route”?

a. The gateway of last resort

b. Exit interface and next hop address

c. Exit interface and time stamp

d. Next hop address and password

3. From page 2.2.2.1, what address is used when configuring an IPv4 default static route?

a. 255.255.255.255 255.255.255.255

b. 1.1.1.1 1.1.1.1

c. 1.1.1.1 255.255.255.255

d. 0.0.0.0 0.0.0.0

4. From page 2.2.4.1, what address is used when configuring an IPv6 default static route?

a. 1:1:1:1:1:1:1:1/0

b. ::/0

c. F:F:F:F:F:F:F:F/128

d. ::1/64

 

 

Networking Technology Online Assignment for week of April 6 – 10, 2020

1ST YEAR STUDENTS:

From the NETACAD class INTRO21

Staying with Chapter 11, answer the following from page 11.2.1.3 and email me the answers:

 

Identify and explain in detail three primary vulnerabilities or weaknesses in networks:

· Technological, as shown in Figure 1

· Configuration, as shown in Figure 2

· Security policy, as shown in Figure 3

 

2ND AND 3RD YEAR STUDENTS After watching the video https://www.youtube.com/watch?v=K3yMX3izzUo

Answer the following questions and email me the answers;

 

1. Why is it important to configure a layer 3 address and default gateway on a layer 2 switch?

2. What is the purpose of configuring an exec timeout of 10 minutes on console command?

3. What command is used to encrypt all current and future VTY, console, and enable passwords, and why is it important to use?

4. How can you test the passwords that have been configured on a switch?

 

Week of March 30 Assignments

 

All 1st year students:

Class INTRO21:

www.netacad.com to login to your Cisco Academy account

Finish reading chapter 11 and complete all embedded activities

The Online assessment will be activated from Friday April 3rd at 8:00AM until Sunday April 5th at 11:59 PM. (Note: assessment will be a Pass or Fail only)

*Remember I can see what days and what pages you have visited on the Academy website

 

Please respond using Mr. Thomas e-mail to confirm understanding and/or any questions

 

All 2nd and 3rd year students:

Class R&S2020:

www.netacad.com to login to your Cisco Academy account

Continue reading chapter 4 and complete all embedded activities

Complete all Packet Tracer activities (Packet Tracer is available for download from the Cisco Academy web site

The Online assessment will be activated from Friday April 3rd at 8:00AM until Sunday April 5th at 11:59 PM. (Note: assessment will be a Pass or Fail only)

*Remember I can see what days and what pages you have visited on the Academy website

 

Please respond using Mr. Thomas e-mail to confirm understanding and/or any questions

Contact Us
Admiral Peary Area Vocational Technical School
948 Ben Franklin Hwy
Ebensburg, PA 15931
View Map & Directions
Phone: (814) 472-6490
Fax: (814) 472-6494