Question: *Part-3: Networking Essentials (Optional. You may gain 3% extra bonus points. You need to have two Windows-OS computers connected within a same subnetwork. Preferred working

*Part-3: Networking Essentials (Optional. You may gain 3% extra bonus points. You need to have two Windows-OS computers connected within a same subnetwork. Preferred working in the lab environment)

1. Logging as Administrator from a network computer. Type a command (?) to show the computer IP, and the computer name. Screenshot the results. This is your Master computer.

2. Logging as Administrator on another computer as a Client (your Client can be any Windows OS based computer). Screenshot the Client computer name, and IP. Also, to verify you can reach the Master from the Client. Stay with the Client.

3. Key-Step: Working at the Client, using a Commands (?) to map ipc$ interface with your Master computer , screenshot your result

(hint: consider the command: Net use \\your-computername\ipc$)

4. Key step: Stay with the Client, start Computer Management tool, Right click the Computer Management (Local), Select Connect to another com put er . From Select computer window Another computer then, you can either type in your Master computer name with the syntax of (\\your-master-computer) or Browse your network to find your Master computer and connect it.

5. Once the connection established, your Computer Management tool should look like Computer Management (followed by your Master computer name). If so, you should be able to show the following items:

a) Shared Folders (noted: It should show your Master compu te rs s h a re d in fo n o w!) .

b) Services (You can not only view but stop them, which is a way how hackers attack other computers!) .

c) Event Viewer > Windows logs -> Security (Youre now actually viewing the security logs

from the Master computer. You can even erase, clear any logs from your actions a very nasty hackers tip!)

You are required to provide ONE screenshot to show all the above results.

6. Disconnect all the Network connections you currently mapped, then, close all windows, logoff, and Restart both your Master and Client computers. Using commands are a plus.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!