Follow the Excel Exam Project: Community Outreach Link for attachments. Download

Follow the Excel Exam Project: Community Outreach Link for attachments.
Download and open the Excel_Exam_Project_Instructions attachment. The instruction document will provide you with detailed instructions, requirements and points, and video links to required skill demonstrations.
Grading Rubric-Points: 118-130 Exemplary, 105-117 Proficiency, 92-104 Developing, 79-

For this project, you will apply the CompTIA 6-Step Troubleshooting Process to e

For this project, you will apply the CompTIA 6-Step Troubleshooting Process to explain how you would tackle Hudson Fisher Associates Help Desk Tickets. There are three groups of tickets, Level 1, Level 2, and Level 3. You will pick two tickets from each group. As you prepare to analyze and hopefully solve these typical IT help desk tickets, keep in mind that for this course, it is more about the process and less about finding the “correct” answer. You may not always find an exact answer from the information given. The problems are structured to approximate what you will find in the workplace. Use a logical and repeatable process (e.g., the CompTIA 6-Step Troubleshooting Process) and eliminate the improbable as you work your way through each scenario. CompTIA 6-Step Troubleshooting Process: Identify the problem. Establish a theory of probable cause. Evaluate the theory to determine the actual cause. Establish a plan of action to resolve the problem and implement the solution. Verify full system functionality and if applicable implement preventative measures. Document findings, actions, and outcomes. How Will My Work Be Evaluated? As you progress in your information technology and cybersecurity career, you may find yourself making presentations to customers, client audiences, and management. For this assignment, you should articulate your findings from the six support cases. But the challenge you face is in expressing a technical solution to a nontechnical audience. Avoid jargon and acronyms. Find a way to relay your solution (and challenges) in language that your audience will find easily relatable. Communicating in this manner will not always be easy. You may struggle to find the right analogy or metaphor. But if you can master the skill of summarizing your results and recommendations to management in an effective presentation, you will demonstrate how you use your technical knowledge to convey your ideas to others in a professional setting. You will also earn the respect and trust of your peers, your supervisor, and upper management as an effective communicator. You will be viewed as an employee ready for advancement. The following evaluation criteria aligned to the competencies will be used to grade your assignment: 1.1.1: Articulate the main idea and purpose of a communication. 1.1.3: Present ideas in a clear, logical order appropriate to the task. 1.3.3: Integrate appropriate credible sources to illustrate and validate ideas. 2.1.1: Identify the issue or problem under consideration. 2.3.1: State conclusions or solutions clearly and precisely. 12.7.2: Explain the process of analyzing IT incidents. 13.1.1: Create documentation appropriate to the stakeholder. Your deliverable for the project is an annotated PowerPoint Presentation covering the following: List of the six tickets you selected (two each from Level 1, Level 2, and Level 3) One to two slides for each ticket, in which you: State the problem. Describe the steps taken to troubleshoot/analyze the problem. Propose a brief resolution. One summary slide: What did you find challenging or interesting about one or two of the support cases (opinion-based)? One reference slide (two to six IEEE references). Include references for materials you consulted in TestOut or on the internet. If you haven’t already done it last week, download the Support Queue Case Study Presentation Template to get started. Delete the instructional text from the template before you submit. Select two help desk tickets from each level and explain in the PowerPoint template how you would solve them. Level 1.1 Ticket 1002: subject mouse not working Assignee: Open Raised by: Irene Fredericks, Human Resources, 10 min ago Category: Mouse?peripherals Priorty: Med Message: My mouse has stopped working. I checked the Windows device manager, and the mouse entry is not there. I need my mouse! Level 1.2 1003 ticket subject black computer screen Assignee: Open Raised by: Todd Schneider, Payroll, 05 min ago Category: Video issue Priority: Med Message: My computer screen is black. I turned the computer off and on and the lights are on the front PC, but that did not resolve the issue. Level 2.1 ticket subject Dell machine making clicking sounds Assignee: Open Raised by: Juan Delarosa, Human Resources, 11 min ago Category: Booting Issue Priority: Med Message: My Dell OptiPlex 9020 Mini Tower will not go to the Windows desktop. I heard a series of audible sounds, like Morse code?!? I think the pattern is one, followed by three, then two. What does that mean? Level 2.2 ticket subject cannot connect to online share drive Assignee: Open Raised by: Blake Chaudhary, Sales Inventory Analyst Category: Network Connectivity Issue Priority: High Message: I need to access my sales projections on the shared drive. I could access them yesterday afternoon, no problem. My boss is really leaning on me to get those figures in and he needs access right away. Follow-Up from Help Desk Associate Jen: When I had Blake do an IPCONFIG for me, he read his IP address as 169.254.2.8. The network address for his unit is 10.20.30.x. I am not sure why it is different. What do you think is going on? level 3.1 Ticket 3003: subject frozen computer Assignee: Open Raised by: Bettina Müller, Fashion Design Category: Computer Crashing Priority: Med Message: My computer is totally frozen. All I see is an error message that says, “controller has failed.” I have a short deadline to pitch for a new line of bags to be show at the Fashion Goods and Accessories Exposition in Osaka. I tried rebooting my machine, but the problem comes back after a few minutes. I have an OptiPlex GX240. LEVEL 3.2 Ticket subject Restart/Update Loop Assignee: Open Raised by: Marci Wallace, Buyer, Tokyo Office Category: Windows Update Priority: High Message: When I turned on my PC at the office today, it started to boot, and then started doing a Windows 10 update. But it keeps trying to reboot and update. It is on the sixth try and still won’t boot up; it’s just the same Windows update install over and over. What should I do? Follow-Up from Help Desk Associate Jen: Windows update is not completing, sending Marci’s PC into an endless loop. From my experience, there can be several underlying issues that may cause Windows Update to fail. You may need to try several different things to resolve the issue. I recommend consulting Microsoft’s knowledge base. https://www.support.com/how-to/how-to-fix-a-windows-pc-that-keeps-rebooting-12992 (File 1 : Presentation slides to use for the template of assignment)

Respond to one of the following options. Be sure to specify the option number yo

Respond to one of the following options. Be sure to specify the option number you are responding to in your post.
Option 1: Job Search
Go to a job site such as Indeed.com, Monster.com, or LinkedIn.
Search for jobs for network engineers in your area.
Start by searching for jobs using keywords like “network administrator”, or “network engineer.”
Examine the data presented.
What do you think about the salary range of this position? Did you find the salary expectations or anything surprising about the salary range?
Are you finding jobs in your area? Would you be willing to relocate?
Which parts of the course do you think helped you prepare for these job openings, demand, or roles?
Option 2: Job Demand
Go to the site https://www.cyberseek.org/pathway.html
Start by selecting Networking under Feeder Role.
Examine the data presented.
What are the common job titles in the networking field?
What are the top skills of the networking field being requested?
What of the skills being requested most interest you for continued study?

You have learned a great deal about the Internet Protocol (IP). IP is a set of r

You have learned a great deal about the Internet Protocol (IP). IP is a set of rules for how data is sent across networks and arrive at the intended destination. An IP address is a numeric identifier assigned to each device on an IP network. Unfortunately, the internet has finally run out of IPv4 addresses. The good news is that everyone knew this would eventually occur and there is a solution: IPv6.
For this discussion, compare the characteristics of IPv4 and IPv6. Discuss any benefits one provides over the other.
Both IPv4 and IPv6 have the option to subnet. Some of the reasons to subnet a network is to improve network performance and speed, reduce network congestion, control network growth, and ease administration.
Next, select a Class A, B, and C IP (v4) address for input into the subnet calculator.
Class A: 1.0.0.1 – 126.255.255.254
Class B: 128.1.0.1 – 191.255.255.254
Class C: 192.0.1.1 – 223.255.254.254
Take a screenshot and post each of your results to include in your post.
If you want to increase the number of subnets, you simply change the Maximum Subnets field input to your desired number. When you increase this number, what happens to the Host per Subnet field and why?
link
https://www.subnet-calculator.com/#google_vignette

If you haven’t already done so last week, download the Troubleshooting and Tools

If you haven’t already done so last week, download the Troubleshooting and Tools Report Template and use it to record your work.
The SITREP (Situation Report) Sample Report is provided so that you can understand what Cyber Command is expecting in your report. Your report will vary depending on the problem and tool selected.
Select one of the seven network problems and develop a troubleshooting and tool report that details the solution.
On Day 2 of full operational capability (FOC), our connection to the internet was becoming intermittent. We could establish connections to our globally hosted servers some of the time. The connection would drop at seemingly random periods and we don’t know why. We have experienced this day and night, and it has been consistent for the past three days.
When our connection to the internet is working, we seemingly cannot reach out to our globally dispersed servers from our hosts. We use the globally dispersed servers for command and control and must be able to connect to them. We need a method to determine where the packets are going and why they are not reaching their destination. Because these servers are globally distributed, we can’t just pick up and deploy to them.
Our internal network servers are also spotty. Sometimes they are up, and sometimes they are down. For example, the DHCP server appears to provide IP addresses to hosts that are turned on sometimes, but other times when the host is turned on, it receives an Automatic Private IP Address (APIPA). These hosts can communicate with our networked hosts locally, but they can’t reach out to our global servers. These hosts enable our persistent engagement capability, so they must be functional, and we need to determine the problem ASAP!
We have a team that can troubleshoot from afar, but the members are located 25 miles west of this location. We have one of the tech support personnel deployed on site, but there are just too many issues for one person. The support team that is 25 miles west is centrally located to support multiple operational outfits. That team has a virtual private network (VPN) and secure access to our internal servers. At times, support team members need to determine which of our hosts are functioning. We use both Microsoft Windows and Linux operating systems, but we don’t know what tool will help determine host functionality from afar.
This next part is classified, but I need your help, and I need it fast. Bottom line, we believe there may be an insider threat. At times, we have reason to believe a nonapproved device is connecting to the network and reaching out to the internet. We need a method to determine what devices exist on the same subnet of our network. What can help us do that?
When we begin operations in 72 hours, it will be of utmost importance for us to know what device name is associated with what IP address. This will allow us to know what exists internally and what we need to defend should the adversary begin operations against us. We need to understand what options exist to achieve this task.
When we first arrived and established our connection to the internet, we noticed inbound connection requests. What tool can we use to determine if any adversary is reaching into our systems through a particular port or protocol?
Your report should be about a page in length and address the following:
Choose and restate one of the problems identified as you understand it and explain why it is a problem.
Describe how you would apply the steps in the Network+ troubleshooting model to this problem.
Name and provide a brief overview of the tool that could solve this problem (refer to Lesson 23 in uCertify).
Describe how the tool can be used to solve similar problems in the future.
Provide a detailed overview of the tool’s functionality and options.
Include a screenshot of your selected tool from the appropriate uCertify lab.
How Will My Work Be Evaluated?
Troubleshooting refers to the process of identifying problems with a network through a rigorous and repeatable process and then solving those problems using testable methods. An important part of your duties in the networking field will be to troubleshoot and solve problems. In fact, most of your time will be spent with this focus to include optimizing performance. Networks are dynamic in implementation and are built to be resilient, but problems arise due to many unforeseen reasons. Developing the knowledge, skills, and experience to successfully troubleshoot and recommend solutions will show you are value-added to the organization.
For this assignment, you are asked to review a scenario, understand the problems, apply your knowledge and skills gained in this class, and propose a solution. Use the template provided and complete the assignment. An example solution is provided for you.
The following evaluation criteria aligned to the competencies will be used to grade your assignment:
1.2.3: Explain specialized terms or concepts to facilitate audience comprehension.
1.3.5: Adhere to required attribution and citation standards.
1.4.1: Produce grammatically correct material in standard academic English that supports the communication.
2.1.1: Identify the issue or problem under consideration.
2.3.1: State conclusions or solutions clearly and precisely.
10.1.1: Identify the problem to be solved.
13.1.1: Create documentation appropriate to the stakeholder.

Remember to be clear about what action you are recommending. Executive managemen

Remember to be clear about what action you are recommending. Executive management will want to understand not only what you discovered, but also what you propose as a solution. The company’s leaders will want to know what decisions they need to make based on your findings. Give them the actionable information they need to decide.
You may want to review these presentation resources to help you with your narrated presentation. You will provide voice annotation for all slides in the following format:
five to 10 slides maximum; limit bullets to no more than six per slide
voice annotation for every slide (excluding the reference slide)
a reference slide with one to two quality sources
How Will My Work Be Evaluated?
As you progress in your cybersecurity career, you may find yourself making presentations to customers, client audiences, and management. By summarizing your results and recommendations to management in an effective presentation, you are demonstrating how you use your technical knowledge to convey your ideas to others in a professional setting. Your ability to express your recommendations to provide information for decision makers in a format that uses the right mix of technical detail in a business context is an important workplace and career skill.
The following evaluation criteria aligned to the competencies will be used to grade your assignment:
1.2.2: Employ a format, style, and tone appropriate to the audience, context, and goal.
1.3.3: Integrate appropriate credible sources to illustrate and validate ideas.
2.1.3: Explain the significance of the issue or problem.
12.3.2: Describe the implementation of controls.
12.8.1: Recognize the process to obtain approval from the business process owner.
13.2.1: Evaluate vendor recommendations in the context of organization requirements.
If you haven’t already downloaded it last week, download the Presentation to Management Template now and follow the instructions in the document.
Remember to delete the instructional text from the template before you submit.
When you are finished, click “add a file” to upload your work, then click the Submit button.

What are the political implications that arise from the cybersecurity policy/str

What are the political implications that arise from the cybersecurity policy/strategy you have selected (from Paper 1 attached about Comprehensive National Cybersecurity Initiative CNCI)? Attention should be given to how politicians or policy makers have addressed the policy/strategy, why those politicians or policy makers came to those conclusions, and the ramifications of those decisions.