Professional Documents
Culture Documents
CBLM Coc2 CSS
CBLM Coc2 CSS
Unit of
Competency : SET-UP COMPUTER NETWORKS
SETTING-UP COMPUTER
Module Title : NETWORKS
HOW TO USE THIS COMPETENCY –BASED LEARNING MATERIAL
Welcome!
Remember to:
Work through all the information and complete the activities in each
section.
When you feel confident that you have had sufficient practice, ask your
Trainer to evaluate you. The results of your assessment will be
recorded in your Progress Chart and Accomplishment Chart.
You need to complete this module before you can perform the next
module, Inspect and test the configured computer networks.
COMPETENCY-BASED LEARNING MATERIALS
List of Competencies
MODULE DESCRIPTOR:
This module covers the outcomes required in
Setting-up computers networks for LANs and
Small-office home-office (SOHO) systems. It
Consists of competencies to install Ethernet
Cables, set network configuration, set router/Wi-
Fi/ wireless access point/repeater configuration
As well as to inspect and test the configured
Computer networks.
LEARNING OUTCOMES:
At the end of this module you MUST be able to:
ASSESSMENT CRITERIA:
MODULE DESCRIPTOR:
This module covers the outcomes required in
Setting-up computers networks for LANs and
Small-office home-office (SOHO) systems. It
Consists of competencies to install Ethernet
Cables, set network configuration, set router/Wi-
Fi/ wireless access point/repeater configuration
As well as to inspect and test the configured
Computer networks.
CONTENTS:
ASSESSMENT CRITERIA:
1. Cable routes are determined and planned in accordance with network design
and actual installation site.
2. Network materials necessary to complete the work are identified and obtained
in accordance with established procedures and checked against systems
requirements
3. Tools, equipment and testing devices needed to carry out the installation work
are obtained in accordance with established procedures and checked for correct
operation and safety
4. Appropriate personal protective equipment is used and OHS policies and
procedures are followed
5. Copper cable splicing is performed based on Electronic Industries
Alliance/Telecommunications Industry Association (EIA/TIA) standards
6. Network cables and cable raceway are installed in accordance with
established procedures and installation requirements
7. Installation work is performed and is checked to ensure no unnecessary damage
has occurred and complies with requirements
8. OHS standards and 5S principles are followed according to enterprise requirements
Excess components and materials are disposed of based on WEEE directives and 3Rs waste
management program
RESOURCES:
METHODOLOGIES:
Lecture /discussion
Demonstration
Self-learning
INFORMATION SHEET 1.1-1
NETWORK MATERIALS,TOOLS AND EQUIPMENT
LEARNING OBJECTIVES:
An IT network connects all your devices, plus other peripheral equipment such as
printers
To build a network you will need a range of equipment including the following:
• Cables and connectors. These link together the computers, printers, servers and
other equipment on your network.
• A router. This manages network traffic, ensuring devices can communicate with
each other via both wired and wireless connections, and provides internet
connectivity.
• A wireless access point (optional). This will extend your wireless network if the
router is incapable of offering coverage in certain parts of the building.
• An internet connection. This could be a faster fibre connection or dedicated
leased line.
• A hardware firewall. This creates a secure barrier between your network and the
internet, blocking security threats. Networks sometimes include an on-site network
server which runs central applications, acts as an email server and provides file
storage.
Network hardware building blocks
Some businesses still build their network with cables because they're very reliable
and fast. The most common type is Ethernet cable, which is rated for speed. Cat 6
cables can carry data fast enough for any business purpose.
When building their network most businesses install network sockets at convenient
locations in their premises, so computers and other devices can be plugged into the
network. The sockets cost about £3 each.
Going wireless
Routers also include Wi-Fi capability, enabling people to connect
laptops, smartphones, tablets and other devices to the network wirelessly.
Wi-Fi is ideal for providing network access to staff with mobile devices and in meeting
rooms or common areas. It's also useful for offering internet access to visitors, with
many routers including a separate 'guest' network for the purpose. Wireless routers
start at around £70.
UTP CABLE
The cheapest cable use in computer in
networking is the UTP
(Unshielded Twisted Pair) cable.
Other use the STP (Shielded Twisted Pair)
cable which is cost much than UTP but more reliable.
CRIMPER
Crimping tool is used to join the
RJ-45 and RJ-11 connectors to
the both ends of either phone
or CAT5 cable.
WIRE STRIPPER
ROUTER
BAY RACK
PATCH PANEL
RACEWAY or SLOTTED
COMPUTER TABLE
1.what are the Equipment, tools and materials needed in Connecting two
computers using wired connection?
Steps / Procedure:
Assessment Method:
Demonstration
INFORMATION SHEET 1.1-2
CREATING A NETWORK CABLE DEVICE
LEARNING OBJECTIVES:
Networking cables are networking hardware used to connect one network device to
other network devices or to connect two or more computers to share printers,
scanners etc.Electrical connections using twisted pair or coaxial cable are used
within a building.
STRAIGHT THROUGH
TYPE A TYPE B
Materials Needed:
2 RJ45
1 meter Network Cable – UTP cable
Tools Needed:
Crimping Tool
Wire Stripper
LAN Tester
Equipment Needed:
2 Working computers with Network Adapter (LAN port)
Position all eight wires according to its assigned pins in the RJ45
Position all wires. Make sure that all are in proper pin assignment
Make sure that the cut is even and small enough for the RJ45
Put all wires inside the RJ45.
POSSIBLE ISSUES:
Connection between server and computer(s) is weak
Outside interference causing data loss or decreased signal strength
Faulty cable
ENUMERATION: Write the correct answer in your whole sheet of pad paper
Steps / Procedure:
CRITERIA YES NO
Did you……
Wear your ppe
Unroll the required length of network cable and add a little extra wire,
just in case.
Carefully remove the outer jacket of the cable
Inspect the newly revealed wires for any cuts or scrapes that expose the
Untwist the pairs so they will lay flat between your fingers.
Arrange the wires based on the wiring specifications you are following.
Keep the wires flat and in order as you push them into the RJ-45 plug
with the flat surface of the plug on top
Place the wired plug into the crimping tool
Repeat all of the above steps with the other end of the cable
CONTENTS:
ASSESSMENT CRITERIA:
RESOURCES:
METHODOLOGIES:
Lecture /discussion
Demonstration
Self-learning
INFORMATION SHEET 2.1-1
CONFIGURE A WIRELESS ROUTER
LEARNING OBJECTIVES:
Purchase a wireless router. Routers come in all shapes and sizes. Compare
features to find the router that is right for you. If you have more area that you need
to cover, or have lots of walls in your home, you’ll need a router that offers the
option of upgrading antenna(s) with high gain types - if not supplied in the box. If
more than one wireless device will be connecting at the same time at different
speeds, a MiMo type router is recommended, otherwise the speed for all devices will
drop the highest supported by all at that time.
• All modern routers should support 802.11n, or Wireless-N). This is the most
stable, offers the fastest speeds and is backwards compatible with older
standards such as 802.11g.
2.Connect your router to your modem.[2] Routers and wireless
routers enable you to share your broadband internet connection with
multiple devices. To do so, you will need to connect your broadband modem
to the router. For best results, place your router near your modem.
• Connect the router and the modem with an Ethernet cable. Most routers
come packaged with a short Ethernet cable that you can use for this.
• Connect the modem to the WAN / Internet Port on your router. It is usually
offset, and may be a different color from the LAN Ports. WAN stands for
"Wide Area Network" which is what the internet actually is. LAN stands for
"Local Area Network". The router will assign a local or "private" IP address to
any device connected to its LAN Ports or WiFi signal from a pool of private
addresses (listed further below).
3.Connect any devices you want to hard wire with CAT 5 (or better) Ethernet
cables. If you have computers that are close, or a video game console or TV, you
can connect them to the router via Ethernet.[3] This will result in a more stable
and faster connection, and doesn’t require any extra configuration.
4.Connect at least one computer via Ethernet. You will need at least one
computer connecting via Ethernet cable in order to adjust your router settings. You
can disconnect this computer afterwards if you want to connect wirelessly. You can
also connect your laptop wirelessly for the first time, the wifi network name and the
default password will be printed on the router's label
PART 2 SET-UP :
1.When you power on the router, it will only create its wi-fi network, and the
device will be connected to the router's wi-fi connection, not the internet. To
connect the router to the internet, with some internet providers (i.e. GTPL in India),
it is required to register router's MAC address to the internet service provider's
website.
• MAC of the router can be found printed on router or in the documents etc.
2.Go to the internet service provider's website. Type ip address Log in with the
username and password provided by the internet service provider and go to MAC
address update option. one can see their existing laptop / computers MAC address
there. Add the router's MAC address there and save it. This process means that the
router is authorized to use the internet provide by the broadband company.
1.Find the IP address of the router. If this is a new installation or new router,
determine the default IP address that may be printed on a label affixed to the
router or in the documentation.[4] If you can’t find the router’s IP address
anywhere, you can do a web search for the router model to see what the default
address is.
2.Enter your username and password. In order to access the configuration page,
you will need to be on the router's IP address and enter a valid username and
password at the prompt. Most routers have a basic account set up that you will
need to use to log on. This varies from model to model, but should be printed on
the router or in the documentation.
• The most typical username is “admin”.
• The most typical passwords are “admin” and “password”.
• Many routers will only require a username and a blank password, and some
allow you to leave all fields blank.
• If you can’t figure out the correct IP address, your username or password,
search for your router model online to see what the default login is. If it has
been changed, press the Reset button on the back of the router for 10 (to
30+ seconds as dictated in the instructions for the router model) to restore
factory defaults and try again.
3.Open the Wireless Settings. When you log in to your router, you will be taken to
the router’s main menu or status screen. There will be several options to choose
from. The Internet section can usually be left at default settings, unless you
received specific instructions from your internet service provider. The Wireless
section will allow you to set up your wireless network.
4.Enter a name for your wireless network. In the Wireless section, you should
see a field labeled SSID or Name. Enter a unique name for your wireless network.
This is what other devices will see when scanning for networks.
• Check the box to enable SSID broadcast. This will essentially “turn on” the
wireless network so that it may be readily seen by anyone in range of the
signal. *See the Tips section below for additional information on the SSID
setting.
• For detailed instructions on selecting and joining a wireless network for your
specific computer, tablet, or smartphone, follow this guide.
3.Connect your other devices. Besides other computers and tablets, you can
connect other devices as well, such as printers, game consoles, TVs and more. See
the following guides for instructions for your specific device.
SELF-CHECK 2.1-1
Steps / Procedure:
1.Wear your ppe
2.Observe safety and proper sanitation
3.Gather the necessary materrials and equipment
Assessment Method:
Demonstration
PERFORMANCE CRITERIA CHECKLIST 2.1-1
CRITERIA YES NO
Did you……
Wear your ppe
LEARNING OBJECTIVES:
Network Connectivity
What is a Network?
You may also see references to a Metropolitan Area Networks (MAN), a Wireless
LAN (WLAN), or a Wireless WAN (WWAN).
Computers connected to a
network are broadly
categorized as servers or
workstations. Servers are
generally not used by humans directly, but rather run continuously to provide
"services" to the other computers (and their human users) on the network. Services
provided can include printing and faxing, software hosting, file storage and
sharing, messaging, data storage and retrieval, complete access control (security)
for the network's resources, and many others.
Workstations are called such because they typically do have a human user which
interacts with the network through them. Workstations were traditionally
considered a desktop, consisting of a computer, keyboard, display, and mouse, or a
laptop, with with integrated keyboard, display, and touchpad. With the advent of
the tablet computer, and the touch screen devices such as iPad and iPhone, our
definition of workstation is quickly evolving to include those devices, because of
their ability to interact with the network and utilize network services.
Nearly always servers will be connected by cables to the network, because the cable
connections remain the fastest. Workstations which are stationary (desktops) are
also usually connected by a cable to the network, although the cost of wireless
adapters has dropped to the point that, when installing workstations in an existing
facility with inadequate wiring, it can be easier and less expensive to use wireless
for a desktop.
See the Topology, Cabling, and Hardware sections of this tutorial for more
information on the configuration of a LAN.
Wide Area Networks (WANs) connect networks in larger geographic areas, such as
Florida, the United States, or the world. Dedicated transoceanic cabling or satellite
uplinks may be used to connect this type of global network.
Using a WAN, schools in Florida can communicate with places like Tokyo in a
matter of seconds, without paying enormous phone bills. Two users a half-world
apart with workstations equipped with microphones and a webcams might
teleconference in real time. A WAN is complicated. It uses multiplexers, bridges,
and routers to connect local and metropolitan networks to global communications
networks like the Internet. To users, however, a WAN will not appear to be much
different than a LAN.
After the installation of your network driver, you are ready to configure your
network. To configure the network of your PC, Right-click on your network
connection. You'll see this in your System Tray. If you are connecting your
computers through a switch with no router, you'll need to assign each computer
on the network its own individual IP address. This process is handled
automatically if you're using a router. Think of an IP address as a mailing
address. Each computer on the network needs a unique IP address so that
information sent across the network reaches the correct destination.
CONNECT TO ASSIGN AN IP ADDRESS TO THE CLIENT:
Click Internet Protocol Version 4 (TCP/IPv4). Make sure you don't uncheck it,
just highlight it.Click Properties.
Click the Use the following IP address radio button.
A. Click Start
B. Right-click Network and click Properties
C. Click Local Area Connection
D. Click Details. Make note (on a piece of paper) of the address on the
right side of IPv4 Address:
(For our example, we are building a small network and we will just use a small
range of IP addresses. In the real world or for a large network, you would need to
actually know TCP/IP, design a range of IP addresses you plan to use, then assign
those IP addresses, or design a way to assign the IP addresses to the computers)
E. Click Close
F. In the Local Area Connection Status dialog box, click Properties
G. In the checked list box, click Internet Protocol Version 4 (TCP/IPv4)
Click Properties
H. Click Use the Following IP Address
I. Type the IP address you want the server to use. For our example,
and based on the above dialog box, we type 192.168.001.001
J. Press Tab
K. Type the subnet mask (normally, it should be added automatically
when you press Tab from the previous IP address text box) and
press Tab
L. Type the default gateway address (use the first and the second octets
of the IP address you had provided (such as 192.168) and use
001.001 for the other two bytes)
M. Provide the Preferred DNS server address (we use 127.0.0.1 for our
example) and the Alternate DNS Server address (we leave ours
empty)
N. Click Advanced to check the values that were put in the IP Settings
and DNS property pages
O. Click OK
P. Click OK
Q. Click Close
R. Click Close
INFORMATION SHEET 2.1-2
CONFIGURE NETWORK CONNECTIVITY
ESSAY: write the correct definition in your whole sheet of pad paper
Steps / Procedure:
1.Wear your ppe
2.Observe safety and proper sanitation
3.Gather the necessary materrials and equipment
2.Click Internet Protocol Version 4 (TCP/IPv4). Make sure you don't uncheck it,
just highlight it.Click Properties.
7.Click OK. This will save the settings for that computer. This computer is now
configured on your network with a unique IP address.
Assessment Method:
Demonstration
CRITERIA YES NO
Did you……
Wear your ppe
Click the Ethernet link at the top of the window. You'll see this next to
"Connections." Click Properties.
Click OK. This will save the settings for that computer. This computer
is now configured on your network with a unique IP address.
➢ LEARNING OUTCOME NO.3
CONTENTS:
ASSESSMENT CRITERIA:
RESOURCES:
METHODOLOGIES:
Lecture /discussion
Demonstration
Self-learning
LEARNING OBJECTIVES:
What is network testing, really? Since I am not very good at explaining things,
I went to the Wikipedia article on software testing and found this:
“Software testing is an investigation conducted to provide stakeholders with
information about the quality of the product or service under test. Software
testing can also provide an objective, independent view of the software to allow
the business to appreciate and understand the risks of software
implementation.” –
That sounds pretty good to me. But if we take that passage and replace
“software” with “network”, we get:
“Network testing is an
investigation conducted to provide
stakeholders with information about
the quality of the product or service
under test. Network testing can also
provide an objective, independent
view of the network to allow the
business to appreciate and
understand the risks of network
implementation.”
Couldn’t be further from the truth.
Network testing is, in the end,
making sure that your network
configuration works as designed. Network testing is very similar to software
testing, with one exception: in contrast to software testing, network testing
often has to happen in a production environment, after the configuration
change was made. In fact, it is sometimes very difficult, or almost impossible,
to model a complex system like a large enterprise network, or the Internet
itself, in a lab environment. Thus, network testing is a MUST-HAVE step in the
network implementation process.
Use Case Testing is a software testing technique that helps to identify test
cases that cover entire system on a transaction by transaction basis from start
to end. Test cases are the interactions between users and software application.
Use case testing helps to identify gaps in software application that might not be
found by testing individual software components.
Ping
ping is a fundamental tool for testing TCP/IP network connectivity. Because
most networks today use the Internet (TCP/IP) protocol for file and printer
sharing services, as well as for Internet access, most Windows users can use
the ping test to confirm that their network cabling, hardware, and the TCP/IP
protocol are all functioning correctly. Ping sends several data packets to a
specified computer and waits for the other computer to send the packets back.
By default, it sends four packets and prints the results of the four tests.
To see whether the network can carry data between a pair of computers, use
the ipconfig command (described previously) to find the IP address of the two
computers. Then, on one computer, open a command prompt window by
choosing Start, All Programs, Accessories, Command Prompt.
Next, type the following command:
Ping 127.0.0.1
This command tests the networking software of the computer itself by sending
packets to the special internal IP address 127.0.0.1. This test has the computer
send data to itself. It should print the following:
If your computer can send data to itself, try another computer on your LAN.
Find its IP address by running ipconfig on that computer and then issue
the ping command again on the first computer, as in this example:
Ping 192.168.0.23
Of course, you should use the other computer's real IP address in place of
192.168.0.23. You should get four replies as before:
These replies indicate that you have successfully sent data to the other
machine and received it back.
If, on the other hand, the ping command returns Request timed out, the
packets either didn't make it to the other computer or they were not returned.
In either case, you have a problem with your cabling, network adapter, or the
TCP/IP protocol setup.
You can use ping to determine which computers can send to which other
computers on your LAN or across wide area networks (WANs) or the
Internet. ping works when given a computer's IP address or its network name.
NOTE
If you enter a computer name, and ping can't determine the computer's IP
address, the problem isn't necessarily a wiring problem—it could be that the
DNS or WINS name lookup systems are not working correctly. Try using an IP
address with ping in this case to help determine what the problem really is.
How to Use the Ping Command to Test Your Network
Connectivity
Ping comes from a term used in sonar technology that sends out pulses of
sound, and then listens for the echo to return. On a computer network, a ping
tool is built into most operating systems that works in much the same way.
You issue the ping command along with a specific URL or IP address. Your
computer sends several packets of information out to that device, and then
waits for a response. When it gets the response, the ping tool shows you how
long each packet took to make the round trip—or tells you there was no reply.
It sounds simple, and it is. But you can use it to good effect. You can test
whether your computer can reach another device—like your router—on your
local network, or whether it can reach a device on the Internet. This can help
you determine if a network problem is somewhere on your local network, or
somewhere beyond. The time it takes packets to return to you can help you
identify a slow connection, or if you’re experiencing packet loss.
And it pretty much doesn’t matter what operating system you’re using. Pull up
a terminal or Command Prompt window, and you can use ping on macOS,
Linux, or any version of Windows.
How to Use Ping
We’re going to use the Windows Command Prompt in our example here. But
you can also use the ping command in Windows PowerShell, or in the Terminal
app on macOS or any Linux distro. Once you get to using the actual command,
it works the same everywhere.
In Windows, hit Windows+R. In the Run window, type “cmd” into the search
box, and then hit Enter.
At the prompt, type “ping” along with the URL or IP address you want to ping,
and then hit Enter. In the image below, we’re pinging www.howtogeek.com and
getting a normal response.
That response shows the URL you’re pinging, the IP address associated with
that URL, and the size of the packets being sent on the first line. The next four
lines show the replies from each individual packet, including the time (in
milliseconds) it took for the response and the time-to-live (TTL) of the packet,
which is the amount of time that must pass before the packet is discarded.
At the bottom, you’ll see a summary that shows how many packets were sent
and received, as well as the minimum, maximum, and average response time.
And in the next image, we’re pinging the router on our local network using its
IP address. We’re also getting a normal response from it.
When the ping tool does not get a response from whatever devices you’re
And that’s how to use ping at its most basic. Of course, like most commands,
there are some advanced switches you can use to make it behave a bit
differently. For example, you can have it keep pinging a destination until you
stop the command, specify the number of times you want it to ping, set how
often it should ping, and more. But unless you’re doing some very specific
types of troubleshooting, you won’t need to worry much about those advanced
switches.
If you’re curious about them, though, just type “ping /?” at the Command
Prompt to see a list.
Now that you know how to use the command, here are some interesting things
you can do with it:
• Ping a URL (like www.howtogeek.com) or IP address to see if you can reach
an internet destination. If you get a successful response, you know that all
the networking devices between you and that destination are working,
including the network adapter in your computer, your router, and whatever
devices exist on the internet between your router and the destination. And if
you’re interested in exploring those routes further, you can use
another networking tool named tracert to do just that.
• Ping a URL to resolve its IP address. If you want know the IP address for a
particular URL, you can ping the URL. The ping tool shows you right at the
top the IP address it’s working with.
• Ping your router to see if you can reach it. If you can’t successfully ping an
internet location, you can then try pinging your router. A successful
response lets you know that your local network is working okay, and that
the problem reaching the internet location is somewhere out of your control.
• Ping your loopback address (127.0.0.1). If you can’t successfully ping your
router, but your router appears to be turned on and working, you can try
pinging what’s known as a loopback address. That address is always
127.0.0.1, and pinging it successfully lets you know that the network
adapter on your computer (and the networking software in your OS) is
working properly.
Note: You may not get a ping response from other computers on your local
network because the built-in firewalls on those devices prevent them from
responding to ping requests. If you want to be able to ping those devices, you’ll
need to turn off that setting to allow pings through the firewall.
The list above uses a kind of outside-in approach, where you ping the furthest
destination first, and then work your way in to the more local devices. Some
people like to work inside-out by pinging the loopback address first, then their
router (or another local device), and then an internet address.
And of course, what we’re talking about in this article is mostly about using
ping to perform troubleshooting on a home or small business network. On
larger networks, there’s a lot more complexity to worry about. Plus, if you’re
tasked with troubleshooting larger networks, you probably already know how
to use ping and many other networking tools.
Steps / Procedure:
1.Wear your ppe
2.Observe safety and proper sanitation
3.Gather the necessary materrials and equipment
CRITERIA YES NO
Did you……
Wear your ppe
Check the physical connections. Check that the Link light — the little
red or green light next to the RJ-45 port — is lit on every computer
ipconfig
If your computer can't communicate with others on your LAN, after you check
the Event Log and Device Manager, use the ipconfig command-line utility to see
whether your computer has a valid IP address. Check other computers on the
LAN, too, to ensure that they do as well.
At the command prompt (which you open by choosing Start, All Programs,
Accessories, Command Prompt), type the following command:
ipconfig /all
Windows IP Configuration
Host Name . . . . . . . . . . . . : myvpc-hb
(Unless you're troubleshooting IPv6 Teredo connections, ignore the parts that
mention Tunnel adapters.)
• Host name—This should be set to the desired name for each computer. If
you can correspond with some computers but not others, be sure that the
ones that don't work are turned on and correctly named. Make sure that
you don't have two computers with the same name, and that none of the
computer names is the same as the workgroup name.
• IP address—This should be set appropriately for your network. If your LAN
uses Internet Connection Sharing, the address will be a number in the
range 192.168.0.1 through 192.168.0.254. If your LAN uses DHCP for
automatic configuration, your network manager can tell you whether the IP
address is correct. Networks with cable/DSL sharing routers usually use
numbers starting with 192.168.x where x is a number from 0 to 15.
Each computer on the same LAN should have a similar valid IP address and
the same network mask. If they don't, check your network configuration. The
built-in Windows "Repair" function may also be used to help fix problems with
DHCP-based (automatic) IP address assignment.
NOTE
Computer
You can check your computer's identification and workgroup or domain
membership setup from the Computer window. To do so, click Start,
Computer. Look in the Details pane at the bottom of the screen for the
computer name and domain or workgroup name, as shown in
NOTE
None of your computers can use the workgroup or domain name as its
computer name. For example, if your workgroup is MSHOME, you can't also
name a computer MSHOME. If you find this on one of your computers, change
that computer's name.
Network Connections
You can manually check all installed network protocols and services and their
configuration by viewing Network Connections and viewing the properties for
Local Area Connection. To view this screen, click Start, Network. At the top of
the Network window, click Network and Sharing Center. In the left pane of that
window, click Manage Network Settings. Then, right-click your Local Area
Connection icon (or the appropriate wireless connection icon) and select
Properties.
So, how do you protect devices from the prying eyes of the hackers?
All the wireless networks and secretive information should be well encrypted
with unique username and passwords making it difficult for the hackers to
break into the system. Using a WPA2 encryption is more secure way than any
other encryption protocol as it is not easily hacked into.
If the CCTV hooked up with the system is not encrypted strongly than hackers
can easily view your updates of home or office and steal prime information.
Hackers could get all the insights of your office and household and can make a
right move at the right time.So it is very important to keep it secure with
username and password which may not be guessed. You can have an alarm
and security features if any unknown device hacks into it to keep your system
safe.
SELF-CHECK 3.1-2
SECURED THE CONFIGURED COMPUTER NETWORKS
2. Gives the Secure & check your Computer System And Network?
Assessment Method:
Demonstration
CRITERIA YES NO
Did you……
Wear your ppe