CIS 125 Lab 6 Casey Diaz Winter 2024
.docx
keyboard_arrow_up
School
Edmonds Community College *
*We aren’t endorsed by this school
Course
172
Subject
Computer Science
Date
Apr 28, 2024
Type
docx
Pages
6
Uploaded by CaptainGoosePerson1118 on coursehero.com
CIS 125 – Lab 6 – 100 points
Winter 2024 – Online
Student Name: (2pts)
Casey Diaz Save this document as CIS 125 Lab 6 YourName
(2pts)
Managing the network Chapter 8
1.
Login to server 1 (SRV1)
2.
Login to Workstation 1 (WS1) as Administrator for the domain
3.
On WS1, Click the start button
4.
Select Control Panel
5.
At the top right select Small Icons
6.
Select Windows Firewall
7.
Select turn Windows Firewall on or off
8.
Use the administrator credentials to authorize the change.
9.
Be sure to turn off all three firewalls
10. As the administrator on SRV1
, use the GetMAC command to get the MAC address of workstation 1. You will need to modify this command to your environment. My Domain is Berntson, yours will be different
Example
: (GetMAC /S ws1.
berntson
.local /U administrator /P Pa55w0rd)
11.
What is your MAC address? 00-0C-29-FF-3E-56
12.
Place a screenshot of the output below. Be sure to include the command and the results. net
13. Login to SRV1
14. Use the command on page 142 to create a user that must change their password on next login.
15.
Write your command to perform this action. 16. Login as that user on the workstation (WS1 or WS2). A message will appear telling you that the user must change their password. Click OK. Place a screenshot below showing the screen where the user must change their password (username, old password, new password should be visible).
17. On SRV1, use the Net User command to show the user statistics for the user you just created. There is an example on page 142.
18.
Place a screen shot below
19. Use the Net Accounts command to show the password policy for the users.
a.
What is the:
Minimum password age? 1 day
Maximum Password Age? 42 days
Minimum Password Length? 7 20. Use the Net Accounts command to set the minimum password length to 10.
21.
What would that command netlook like? Net accounts /MinPWLen:10
22. Create a group on the server SRV1 called TEST. Page 146 (This will require a slight modification on your part: Net Group
TEST Domain /Add – note this is NOT a local group)
23.
Verify: View the statistics of the TEST group using the Net command. Page 147 (
Hint: include the group name in your command
)
24.
Place a screen shot below.
25. Add the user Bill to the group you just created. Page 148
26.
Verify: Run the net group TEST command to verify that bill is a member of the group.
27.
Place a screenshot below.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
A customer visit the online shopping portal, a customer may buy item or just visit the page and
logout. The customer can select the desired brand, the customer can select the product for
purchasing, the process can be repeated for more items, once the customer finishes selecting the
product the carts can be viewed, if the customer wants to edit the final cart it can be done here, for
final payment the customer has to login the portal, if the customer is visiting for first time he must
register with the site, else the customer must use the login page to proceed, final cart is submitted
for payment and card details and address (where shipment has to be made) are be confirmed by the
customer .Customer is confirmed with a shipment Id and delivery of goods within 15 days.
Show the above scenario in activity diagram
arrow_forward
Details on how to perform these tasks in Microsoft Office Word The document should now have a title.You may also include a hyperlink pointing to an external file that will be used as a connection.
arrow_forward
Laboratory Exercise Party Planner Objective: At the end of the exercise, the students should be able to: Create a menu bar with multiple user options. Apply event. Software Requirements: Latest version of NetBeans IDE Java Development Kit (JDK) 8 Procedure: 1. Create a folder named LastName_FirstName (ex. Reyes_Mark) in your local drive. 2. Create a new project named LabExer8. Set the project location to your own folder. 3. Construct import statements to use the packages listed below: javax.swing java.awt java.awt.event 4. Extend the JFrame class and implement the ActionListener interface. 5. Create a JMenuBar named mainBar and two (2) Menu objects named menut and menu2. Set the text of menu 1 as File and the text of menu2 as Event Type. 6. Create the items that will appear in the menus. The File menu shall contain an Exit submenu. Name the object exit. The Event Types menu shall contain two (2) submenus: Adult and Child. Name the objects adult and hild, respectively. The bmenu consist…
arrow_forward
Transcribed Image Text
RunRoutr is a fitness tracking application for smartphones that creates suggested running routes so that users can run with each other. Upon downloading the application, each user creates a username, a personal profile, and a contact list of friends who also use the application. The application uses the smartphone's GPS unit to track a user's location, running speed, and distance traveled. Users can use the application to review information and statistics about their previous runs. At the beginning of a run, users indicate the distance they want to run from their current location, and the application suggests a running route. Once a user accepts a suggested route, the application share the suggested route with other compatible users in the area so that they can run together. Users are considered compatible if they are on each other's contact lists or if they typically run at similar speeds. A basic RunRoutr account is free, but it displays advertisements that are…
arrow_forward
Deluxe Bath Controller (This scenario is used by questions 14 and 15.)
At a touch of the Fill button the bath automatically fills with water. When it reaches the overflow point it automatically stops unless the user has already touched the Fill button again to stop the flow of water. There is also an Empty button to empty the bath.
What is the name given to the security attack when an opponent prevents messages from reaching a destination?
Denial of service
Masquerading
Modification of messages
Eavesdropping
Which of these is the highest-level part of the directory structure on Linux?
Directory
Topmost Directory
File Allocation Table
Superblock
Which security goal aims to protect information from disclosure?
Integrity
Confidentiality
Authenticity
Accountability
What does a network switch do?
It broadcasts messages to all the computers that are connected to it
It job is to disable part of the network
It collects all the network cables in one place
Routes a message…
arrow_forward
Identify what each of the commands should be doing. These will require you to do some research on the commands in question.
4. lsof -i :80
arrow_forward
The application is capable of the following functions:
(1) ADD a new contact.
(2) DELETE one or more contacts.
(3) SEARCH contacts by substring match on name.
(4) LIST all contacts.
The initial Web page
Address Book
Add
Delete
Welcome to the Addressbook App
Search
List All
arrow_forward
How to use Microsoft Word Title your document.As a connection, you might provide a hyperlink to an external file.
arrow_forward
How to use Microsoft Word Title your document.
As a connection, you might provide a hyperlink to an external file.
arrow_forward
question
Create a test case for a web application that enables clients to access material seamlessly from local storage.
Test Case ID:Test Case Description:Test Steps:Test Data:Expected Results:Actual Results:Pass/ Fail:
arrow_forward
System Sequence Diagram
Photo Gallery Scenario
Develop a System Sequence Diagram for the scenario below:
1. A user enters a website's address to the system.
2. If the address is correct, the system takes the user to the main
page.
3. If the user enters an incorrect address the system displays an
error message.
4. The user selects the photo gallery option from the main page.
5. From the photo gallery page, the user selects a photo by the
photo's name.
6. According to the website's configuration, it takes 5 seconds for
the system to display any selected photo.
7. If the time limit is not exceeded, the system displays the photo.
8. If the time limit is exceeded, the system displays photo not
available.
Note:
The photo selection process can be repeated.
Make your assumptions clear.
DIAGRAM
arrow_forward
The _____ folder is a subfolder of the Local Settings folder.
desktop
temp
recent
favorites
arrow_forward
You are going to create a Login and Registration page using CodeIgniter 4.
Login
Email Address
Password
Require to have validation of user input
Valid email address
Validate the email address and password before showing home page
(Picture as example)
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Microsoft Windows 10 Comprehensive 2019
Computer Science
ISBN:9780357392607
Author:FREUND
Publisher:Cengage
Programming with Microsoft Visual Basic 2017
Computer Science
ISBN:9781337102124
Author:Diane Zak
Publisher:Cengage Learning
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage
COMPREHENSIVE MICROSOFT OFFICE 365 EXCE
Computer Science
ISBN:9780357392676
Author:FREUND, Steven
Publisher:CENGAGE L
New Perspectives on HTML5, CSS3, and JavaScript
Computer Science
ISBN:9781305503922
Author:Patrick M. Carey
Publisher:Cengage Learning
Related Questions
- A customer visit the online shopping portal, a customer may buy item or just visit the page and logout. The customer can select the desired brand, the customer can select the product for purchasing, the process can be repeated for more items, once the customer finishes selecting the product the carts can be viewed, if the customer wants to edit the final cart it can be done here, for final payment the customer has to login the portal, if the customer is visiting for first time he must register with the site, else the customer must use the login page to proceed, final cart is submitted for payment and card details and address (where shipment has to be made) are be confirmed by the customer .Customer is confirmed with a shipment Id and delivery of goods within 15 days. Show the above scenario in activity diagramarrow_forwardDetails on how to perform these tasks in Microsoft Office Word The document should now have a title.You may also include a hyperlink pointing to an external file that will be used as a connection.arrow_forwardLaboratory Exercise Party Planner Objective: At the end of the exercise, the students should be able to: Create a menu bar with multiple user options. Apply event. Software Requirements: Latest version of NetBeans IDE Java Development Kit (JDK) 8 Procedure: 1. Create a folder named LastName_FirstName (ex. Reyes_Mark) in your local drive. 2. Create a new project named LabExer8. Set the project location to your own folder. 3. Construct import statements to use the packages listed below: javax.swing java.awt java.awt.event 4. Extend the JFrame class and implement the ActionListener interface. 5. Create a JMenuBar named mainBar and two (2) Menu objects named menut and menu2. Set the text of menu 1 as File and the text of menu2 as Event Type. 6. Create the items that will appear in the menus. The File menu shall contain an Exit submenu. Name the object exit. The Event Types menu shall contain two (2) submenus: Adult and Child. Name the objects adult and hild, respectively. The bmenu consist…arrow_forward
- Transcribed Image Text RunRoutr is a fitness tracking application for smartphones that creates suggested running routes so that users can run with each other. Upon downloading the application, each user creates a username, a personal profile, and a contact list of friends who also use the application. The application uses the smartphone's GPS unit to track a user's location, running speed, and distance traveled. Users can use the application to review information and statistics about their previous runs. At the beginning of a run, users indicate the distance they want to run from their current location, and the application suggests a running route. Once a user accepts a suggested route, the application share the suggested route with other compatible users in the area so that they can run together. Users are considered compatible if they are on each other's contact lists or if they typically run at similar speeds. A basic RunRoutr account is free, but it displays advertisements that are…arrow_forwardDeluxe Bath Controller (This scenario is used by questions 14 and 15.) At a touch of the Fill button the bath automatically fills with water. When it reaches the overflow point it automatically stops unless the user has already touched the Fill button again to stop the flow of water. There is also an Empty button to empty the bath. What is the name given to the security attack when an opponent prevents messages from reaching a destination? Denial of service Masquerading Modification of messages Eavesdropping Which of these is the highest-level part of the directory structure on Linux? Directory Topmost Directory File Allocation Table Superblock Which security goal aims to protect information from disclosure? Integrity Confidentiality Authenticity Accountability What does a network switch do? It broadcasts messages to all the computers that are connected to it It job is to disable part of the network It collects all the network cables in one place Routes a message…arrow_forwardIdentify what each of the commands should be doing. These will require you to do some research on the commands in question. 4. lsof -i :80arrow_forward
- The application is capable of the following functions: (1) ADD a new contact. (2) DELETE one or more contacts. (3) SEARCH contacts by substring match on name. (4) LIST all contacts. The initial Web page Address Book Add Delete Welcome to the Addressbook App Search List Allarrow_forwardHow to use Microsoft Word Title your document.As a connection, you might provide a hyperlink to an external file.arrow_forwardHow to use Microsoft Word Title your document. As a connection, you might provide a hyperlink to an external file.arrow_forward
- question Create a test case for a web application that enables clients to access material seamlessly from local storage. Test Case ID:Test Case Description:Test Steps:Test Data:Expected Results:Actual Results:Pass/ Fail:arrow_forwardSystem Sequence Diagram Photo Gallery Scenario Develop a System Sequence Diagram for the scenario below: 1. A user enters a website's address to the system. 2. If the address is correct, the system takes the user to the main page. 3. If the user enters an incorrect address the system displays an error message. 4. The user selects the photo gallery option from the main page. 5. From the photo gallery page, the user selects a photo by the photo's name. 6. According to the website's configuration, it takes 5 seconds for the system to display any selected photo. 7. If the time limit is not exceeded, the system displays the photo. 8. If the time limit is exceeded, the system displays photo not available. Note: The photo selection process can be repeated. Make your assumptions clear. DIAGRAMarrow_forwardThe _____ folder is a subfolder of the Local Settings folder. desktop temp recent favoritesarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Microsoft Windows 10 Comprehensive 2019Computer ScienceISBN:9780357392607Author:FREUNDPublisher:CengageProgramming with Microsoft Visual Basic 2017Computer ScienceISBN:9781337102124Author:Diane ZakPublisher:Cengage LearningNp Ms Office 365/Excel 2016 I NtermedComputer ScienceISBN:9781337508841Author:CareyPublisher:Cengage
- COMPREHENSIVE MICROSOFT OFFICE 365 EXCEComputer ScienceISBN:9780357392676Author:FREUND, StevenPublisher:CENGAGE LNew Perspectives on HTML5, CSS3, and JavaScriptComputer ScienceISBN:9781305503922Author:Patrick M. CareyPublisher:Cengage Learning
Microsoft Windows 10 Comprehensive 2019
Computer Science
ISBN:9780357392607
Author:FREUND
Publisher:Cengage
Programming with Microsoft Visual Basic 2017
Computer Science
ISBN:9781337102124
Author:Diane Zak
Publisher:Cengage Learning
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage
COMPREHENSIVE MICROSOFT OFFICE 365 EXCE
Computer Science
ISBN:9780357392676
Author:FREUND, Steven
Publisher:CENGAGE L
New Perspectives on HTML5, CSS3, and JavaScript
Computer Science
ISBN:9781305503922
Author:Patrick M. Carey
Publisher:Cengage Learning