The SITREP (Situation Report) Sample Report is provided so that

 

The SITREP (Situation Report) Sample Report is provided so that you can understand what Cyber Command is expecting in your report. Your report will vary depending on the problem and tool selected.

Select one of the seven network problems and develop a troubleshooting and tool report that details the solution.

  1. On Day 2 of full operational capability (FOC), our connection to the internet was becoming intermittent. We could establish connections to our globally hosted servers some of the time. The connection would drop at seemingly random periods and we don’t know why. We have experienced this day and night, and it has been consistent for the past three days.
  2. When our connection to the internet is working, we seemingly cannot reach out to our globally dispersed servers from our hosts. We use the globally dispersed servers for command and control and must be able to connect to them. We need a method to determine where the packets are going and why they are not reaching their destination. Because these servers are globally distributed, we can’t just pick up and deploy to them.
  3. Our internal network servers are also spotty. Sometimes they are up, and sometimes they are down. For example, the DHCP server appears to provide IP addresses to hosts that are turned on sometimes, but other times when the host is turned on, it receives an Automatic Private IP Address (APIPA). These hosts can communicate with our networked hosts locally, but they can’t reach out to our global servers. These hosts enable our persistent engagement capability, so they must be functional, and we need to determine the problem ASAP!
  4. We have a team that can troubleshoot from afar, but the members are located 25 miles west of this location. We have one of the tech support personnel deployed on site, but there are just too many issues for one person. The support team that is 25 miles west is centrally located to support multiple operational outfits. That team has a virtual private network (VPN) and secure access to our internal servers. At times, support team members need to determine which of our hosts are functioning. We use both Microsoft Windows and Linux operating systems, but we don’t know what tool will help determine host functionality from afar.
  5. This next part is classified, but I need your help, and I need it fast. Bottom line, we believe there may be an insider threat. At times, we have reason to believe a nonapproved device is connecting to the network and reaching out to the internet. We need a method to determine what devices exist on the same subnet of our network. What can help us do that?
  6. When we begin operations in 72 hours, it will be of utmost importance for us to know what device name is associated with what IP address. This will allow us to know what exists internally and what we need to defend should the adversary begin operations against us. We need to understand what options exist to achieve this task.
  7. When we first arrived and established our connection to the internet, we noticed inbound connection requests. What tool can we use to determine if any adversary is reaching into our systems through a particular port or protocol?

Your report should be about a page in length and address the following:

  • Choose and restate one of the problems identified as you understand it and explain why it is a problem.
  • Describe how you would apply the steps in the Network+ troubleshooting model to this problem.
  • Name and provide a brief overview of the tool that could solve this problem (refer to Lesson 17 in uCertify).
  • Describe how the tool can be used to solve similar problems in the future.
  • Provide a detailed overview of the tool’s functionality and options.
  • Include a screenshot of your selected tool from the appropriate uCertify lab.

How Will My Work Be Evaluated?

Troubleshooting refers to the process of identifying problems with a network through a rigorous and repeatable process and then solving those problems using testable methods. An important part of your duties in the networking field will be to troubleshoot and solve problems. In fact, most of your time will be spent with this focus to include optimizing performance. Networks are dynamic in implementation and are built to be resilient, but problems arise due to many unforeseen reasons. Developing the knowledge, skills, and experience to successfully troubleshoot and recommend solutions will show you are value-added to the organization.

For this assignment, you are asked to review a scenario, understand the problems, apply your knowledge and skills gained in this class, and propose a solution. Use the template provided and complete the assignment. An example solution is provided for you.

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

  • 1.2.3: Explain specialized terms or concepts to facilitate audience comprehension.
  • 1.3.5: Adhere to required attribution and citation standards.
  • 1.4.1: Produce grammatically correct material in standard academic English that supports the communication.
  • 2.1.1: Identify the issue or problem under consideration.
  • 2.3.1: State conclusions or solutions clearly and precisely.
  • 10.1.1: Identify the problem to be solved.
  • 13.1.1: Create documentation appropriate to the stakeholder.

When you are finished, delete the instructional text from the template before you submit. Click “add a file” to upload your work, then click the Submit button.

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

C77 Gantt chart

Gantt Chart Refer to Gantt chart resources in the topic readings. Create a Gantt chart that displays 36 months, using the Office Timeline tool or any other tool to produce a Gantt chart. Be sure to include rational 1-36 months Create a Gantt chart that outlines multiple critical milestones. Summary

(Keep in mind that the SDLC can be applied to

  (Keep in mind that the SDLC can be applied to almost any activity you encounter, either at work or outside of work.)One of the biggest problem areas in the SDLC appears during the requirements analysis stage and relates to communication problems between the software developer and the end-user. If

Human Rights & Trading Rights Do you think governments should

  Human Rights & Trading Rights Do you think governments should consider human rights when granting preferential trading rights to countries? What are the arguments for and against taking such a position? Submission Instructions: Your initial post should be at least 200 words with at least 2 academic sources

Read Case Study Conifer Corp. (Chapter 8, pp. 315-316) in

  Read Case Study Conifer Corp. (Chapter 8, pp. 315-316) in your textbook and answer the following questions:   What symptom(s) in this case suggest(s) that something has gone wrong? What are the main causes of the symptom(s)? What actions should executives take to correct the problem(s)? (Remember, this is

How do the sampling methods and sample sizes vary for

   How do the sampling methods and sample sizes vary for the different types of quantitative and qualitative research? Hypothetically, what sampling method would you use to conduct a study of your selected evidence-based practice problem/topic? Why? How would you determine the sample type and size?  For my proposed PICOT

Please reply to each student post with a post with

Please reply to each student post with a post with 3 refences APA format no older than 5 years.   Student 1Erica Simplice, I thoroughly enjoyed reading your post on artificial intelligence (AI). I agree that being able to manage big data using AI is a benefit in healthcare. A benefit

1: Personal Response: Please post a substantive comment, observation or

1: Personal Response: Please post a substantive comment, observation or question regarding Ed Roberts and the Independent Living Movement. This could be about the Zames reading, the podcast about Ed Roberts, the video lecture, or your observation on the role of PCAs as seen in the Sessions. Basically show me

Diagnostic Statistical Manual

 Biographical inventory, cumulative records, anecdotal information, autobiography, journals and diaries, and genograms are types of records and personal documents that can be useful in the assessment process. Describe how each one can be used in a clinical setting and what information it might be able to yield for the clinician.

Each presentation should be 10-12 slides in length (excluding title

Each presentation should be 10-12 slides in length (excluding title and reference slides, for 20 minutes duration).  Presentation should include an overview of the problem identified, information related to the needs of the patient and/or family (or the chosen topic for nursing education or nursing leadership students)  related to the

1-1 Career Advising Feedback Context: NLU’s Career Bridge advisors can

  1-1 Career Advising Feedback Context:  NLU’s Career Bridge advisors can provide you with critical support and feedback to ensure that you maximize your internship opportunity and leverage this experience into a next accelerating position, be it another internship, graduate school, or full-time employment. Your assigned career advisor will continue

1. As a general rule, the law says that a

1.   As a general rule, the law says that a minor, a person under the age of 18 in most states, can disaffirm or cancel a contract they have made because anyone under the age of 18 is presumed to lack the knowledge and experience necessary to understand the obligations

number and show work for all problems problem pages and

number and show work for all problems problem pages and problem numbers provided below  Pg 191 – problems: 43, 47, 49, 53, 61, 63 Pg 250 – problems: 13, 15, 17, 19, 31, 37, 39, 41, 43 47 Pg 251 – problems: 53, 55, 71, 77 Pg 252 – problems:

Some environmental regulations seem to stand alone whereas others act

  Some environmental regulations seem to stand alone whereas others act like add-ons. Research the Clean Water Act (CWA) regulations under Section 402, Section 403, and Section 405. Explain how each of these relates to other types of environmental regulations. How did these relationships come about? Why do you think

TOPIC: Why are certain factors such as age, region, class,

TOPIC: Why are certain factors such as age, region, class, race, religion, and education so salient in terms of voting predictability? Explore these factors to explain what about each of these factors would make an individual vote in any particular way, and discuss whether these categories have changed over time.  

read “Designation of North American Emission Control Area to Reduce

  read “Designation of North American Emission Control Area to Reduce Emissions from Ships,” attached a report published by the EPA. Write a two- to three-page paper in APA format describing the environmental impact of shipboard emissions and the potential impact and restrictions of the Emission Control Area. Discuss the

Objectives To practice the formal procedure of system/network security analysis

  Objectives To practice the formal procedure of system/network security analysis and planning. To examine the vulnerability and security needs of a private organization. To devise strategies to overcome potential malicious attacks, threats, and risks. Target Network You have just been hired as an Information Security Officer (ISO) for a