meta data for this page
  •  

Unterschiede

Hier werden die Unterschiede zwischen zwei Versionen der Seite angezeigt.

Link zu der Vergleichsansicht

Beide Seiten, vorherige ÜberarbeitungVorherige Überarbeitung
Nächste Überarbeitung
Vorherige Überarbeitung
guide:its11:wekan-board_klonen [2023/09/14 09:20] juergenhaasguide:its11:wekan-board_klonen [2024/09/09 23:35] (aktuell) juergenhaas
Zeile 1: Zeile 1:
 ====== Wekan-Board klonen ====== ====== Wekan-Board klonen ======
  
-für das Fach **ITS** in den Klassen **ITT11** +Das Wekan-Board für ITS11 wird ab dem Schuljahr 2024/25 durch einen Kurs auf der ByCS-Lernplattform ersetzt.
- +
-===== Vorgehensweise ===== +
- +
-==== Import ==== +
-  - Melde dich beim [[http://wekan.fachinformatiker.schule|Wekan-Board]] an und verwende die Schaltfläche **neues Board**, um dein ITS11-Board anzulegen. +
-    - Falls du noch keinen Wekan-Zugang hast, registriere dich neu. Verwende bitte einen Benutzernamen nach dem Schema **22.//Nachname//.//Vorname//** +
-  - Wähle im Pop-Up-Menü den Link **Importieren** und dann die Option **Aus vorherigem Export**. +
-  - Kopiere dir den JSON-Code der Boardvorlage entweder aus den unten stehenden Textfeld oder indem du dir die JSON-Datei herunterlädst und den Code im Editor mit [Strg] + [A] markierst und dann kopierst. +
-  - Füge den kopierten JSON-Code in das Import-Feld in Wekan ein und klicke **Importieren**. +
-  - Drücke auf der folgenden Seite **EINMAL** auf **Erledigt** und warte danach ab, bis der Import erfolgreich abgeschlossen ist. +
- +
-==== Einstellungen ==== +
-  - Wähle oben links das Bearbeiten-Symbol für den **Board-Namen** aus und passe deine Klasse und deinen Namen entsprechend an. +
-  - Öffne mit dem Hamburger-Menü rechts oben die **Boardeinstellungen** und wähle **Karten-Einstellungen**. +
-  - Entferne alle nicht benötigten Haken, so dass zur besseren Übersicht nur diese 4 Punkte übrigbleiben: +
-    * Labels +
-    * Beschreibung Titel +
-    * Beschreibung Text +
-    * Checklisten +
-  - Klicke auf eine der ersten Kompetenzkarten und stelle sicher, dass die Ansicht **Karte maximieren** ausgewählt ist, damit du auch die Karten weiter unten korrekt angezeigt bekommst. +
- +
-===== Board-Code ===== +
- +
-<file json Boardvorlage.json> +
- +
-+
- "_format": "wekan-board-1.0.0", +
- "_id": "NHa4TCdKvR5zGJQjn", +
- "archived": false, +
- "color": "limegreen", +
- "createdAt": "2023-09-13T09:07:39.398Z", +
- "labels":+
-+
- "_id": "S4sbKt", +
- "color": "gray", +
- "name": "Basis" +
- }, +
-+
- "_id": "RbLyKq", +
- "color": "magenta", +
- "name": "Anwender" +
- }, +
-+
- "_id": "a3KKBT", +
- "color": "navy", +
- "name": "Problemlöser" +
- }, +
-+
- "_id": "xpMvEE", +
- "color": "green", +
- "name": "Fertig" +
-+
- ], +
- "members": [], +
- "presentParentTask": "no-parent", +
- "modifiedAt": "2023-09-13T09:18:50.267Z", +
- "permission": "private", +
- "slug": "its11-itt11x-nachname-vorname", +
- "title": "ITS11 ITT11x Nachname Vorname", +
- "allowsCardCounterList": false, +
- "allowsBoardMemberList": false, +
- "subtasksDefaultBoardId": null, +
- "subtasksDefaultListId": null, +
- "dateSettingsDefaultBoardId": null, +
- "dateSettingsDefaultListId": null, +
- "allowsSubtasks": true, +
- "allowsAttachments": true, +
- "allowsChecklists": true, +
- "allowsComments": true, +
- "allowsDescriptionTitle": true, +
- "allowsDescriptionText": true, +
- "allowsDescriptionTextOnMinicard": false, +
- "allowsCoverAttachmentOnMinicard": false, +
- "allowsBadgeAttachmentOnMinicard": false, +
- "allowsCardSortingByNumberOnMinicard": false, +
- "allowsCardNumber": false, +
- "allowsActivities": true, +
- "allowsLabels": true, +
- "allowsCreator": true, +
- "allowsAssignee": true, +
- "allowsMembers": true, +
- "allowsRequestedBy": true, +
- "allowsCardSortingByNumber": true, +
- "allowsShowLists": true, +
- "allowsAssignedBy": true, +
- "allowsReceivedDate": true, +
- "allowsStartDate": true, +
- "allowsEndDate": true, +
- "allowsDueDate": true, +
- "isOvertime": false, +
- "type": "board", +
- "sort": -1, +
- "cards":+
-+
- "_id": "C2LbzSQGNnuXDA6MP", +
- "archived": false, +
- "createdAt": "2023-09-13T09:07:48.758Z", +
- "dateLastActivity": "2023-09-13T09:18:50.273Z", +
- "description": "https://wiki.fachinformatiker.schule/doku.php?id=guide:its11:tcp_und_udp", +
- "listId": "M435iKAZGj2zb8nqC", +
- "swimlaneId": "4sLSykGyRcWGMedzq", +
- "sort": -1, +
- "title": "02.1 TCP-Verkehr verstehen", +
- "userId": "XfB5mQfBf3feMeceF", +
- "isOvertime": false, +
- "startAt": null, +
- "dueAt": null, +
- "spentTime": null, +
- "labelIds":+
- "S4sbKt" +
- ], +
- "members": [], +
- "customFields": [], +
- "parentId": "", +
- "coverId": "", +
- "modifiedAt": "2023-09-13T09:18:50.272Z", +
- "requestedBy": "", +
- "assignedBy": "", +
- "assignees": [], +
- "subtaskSort": -1, +
- "type": "cardType-card", +
- "linkedId": "", +
- "vote":+
- "question": "", +
- "positive": [], +
- "negative": [], +
- "end": null, +
- "public": false, +
- "allowNonBoardMembers": false +
- }, +
- "poker":+
- "question": false, +
- "one": [], +
- "two": [], +
- "three": [], +
- "five": [], +
- "eight": [], +
- "thirteen": [], +
- "twenty": [], +
- "forty": [], +
- "oneHundred": [], +
- "unsure": [], +
- "end": null, +
- "allowNonBoardMembers": false +
- }, +
- "targetId_gantt": [], +
- "linkType_gantt": [], +
- "linkId_gantt": [], +
- "cardNumber":+
- }, +
-+
- "_id": "4gqLe6wS3KisAPDkr", +
- "archived": false, +
- "createdAt": "2023-09-13T09:07:48.507Z", +
- "dateLastActivity": "2023-09-13T09:18:50.273Z", +
- "description": "https://wiki.fachinformatiker.schule/doku.php?id=guide:its11:tcp_und_udp", +
- "listId": "fAcFYDCuxohtJJFRy", +
- "swimlaneId": "4sLSykGyRcWGMedzq", +
- "sort": 0, +
- "title": "02.2 TCP-Verkehr kontrollieren und analysieren", +
- "userId": "XfB5mQfBf3feMeceF", +
- "isOvertime": false, +
- "startAt": null, +
- "dueAt": null, +
- "spentTime": null, +
- "labelIds":+
- "RbLyKq" +
- ], +
- "customFields": [], +
- "parentId": "", +
- "coverId": "", +
- "modifiedAt": "2023-09-13T09:18:50.272Z", +
- "requestedBy": "", +
- "assignedBy": "", +
- "members": [], +
- "assignees": [], +
- "subtaskSort": -1, +
- "type": "cardType-card", +
- "linkedId": "", +
- "vote":+
- "question": "", +
- "positive": [], +
- "negative": [], +
- "end": null, +
- "public": false, +
- "allowNonBoardMembers": false +
- }, +
- "poker":+
- "question": false, +
- "one": [], +
- "two": [], +
- "three": [], +
- "five": [], +
- "eight": [], +
- "thirteen": [], +
- "twenty": [], +
- "forty": [], +
- "oneHundred": [], +
- "unsure": [], +
- "end": null, +
- "allowNonBoardMembers": false +
- }, +
- "targetId_gantt": [], +
- "linkType_gantt": [], +
- "linkId_gantt": [], +
- "cardNumber":+
- }, +
-+
- "_id": "dAjTXTJqcRhMc9f6a", +
- "archived": false, +
- "createdAt": "2023-09-13T09:07:48.252Z", +
- "dateLastActivity": "2023-09-13T09:18:50.273Z", +
- "description": "Besuche diese Wiki-Seite und analysiere den dort angebotenen Wireshark-Mitschnitt. Finde heraus, wieso die beschriebenen Verbindungen fehlgeschlagen sind.\n\nhttps://wiki.fachinformatiker.schule/doku.php?id=guide:tcp_und_udp_troubleshooting", +
- "listId": "Pzpg5HamWmeBWMttZ", +
- "swimlaneId": "4sLSykGyRcWGMedzq", +
- "sort": 0, +
- "title": "02.3 Fehler in TCP-Kommunikation finden und lösen", +
- "userId": "XfB5mQfBf3feMeceF", +
- "isOvertime": false, +
- "startAt": null, +
- "dueAt": null, +
- "spentTime": null, +
- "labelIds":+
- "a3KKBT" +
- ], +
- "customFields": [], +
- "parentId": "", +
- "coverId": "", +
- "modifiedAt": "2023-09-13T09:18:50.272Z", +
- "requestedBy": "", +
- "assignedBy": "", +
- "members": [], +
- "assignees": [], +
- "subtaskSort": -1, +
- "type": "cardType-card", +
- "linkedId": "", +
- "vote":+
- "question": "", +
- "positive": [], +
- "negative": [], +
- "end": null, +
- "public": false, +
- "allowNonBoardMembers": false +
- }, +
- "poker":+
- "question": false, +
- "one": [], +
- "two": [], +
- "three": [], +
- "five": [], +
- "eight": [], +
- "thirteen": [], +
- "twenty": [], +
- "forty": [], +
- "oneHundred": [], +
- "unsure": [], +
- "end": null, +
- "allowNonBoardMembers": false +
- }, +
- "targetId_gantt": [], +
- "linkType_gantt": [], +
- "linkId_gantt": [], +
- "cardNumber":+
- }, +
-+
- "_id": "tDqzrsqtojGwuFBxA", +
- "archived": false, +
- "createdAt": "2023-09-13T09:07:48.063Z", +
- "dateLastActivity": "2023-09-13T09:18:50.273Z", +
- "description": "https://wiki.fachinformatiker.schule/doku.php?id=guide:its11:tcp_und_udp", +
- "listId": "M435iKAZGj2zb8nqC", +
- "swimlaneId": "4sLSykGyRcWGMedzq", +
- "sort": 0, +
- "title": "03.1 UDP-Verkehr verstehen", +
- "userId": "XfB5mQfBf3feMeceF", +
- "isOvertime": false, +
- "startAt": null, +
- "dueAt": null, +
- "spentTime": null, +
- "labelIds":+
- "S4sbKt" +
- ], +
- "customFields": [], +
- "parentId": "", +
- "coverId": "", +
- "modifiedAt": "2023-09-13T09:18:50.272Z", +
- "requestedBy": "", +
- "assignedBy": "", +
- "members": [], +
- "assignees": [], +
- "subtaskSort": -1, +
- "type": "cardType-card", +
- "linkedId": "", +
- "vote":+
- "question": "", +
- "positive": [], +
- "negative": [], +
- "end": null, +
- "public": false, +
- "allowNonBoardMembers": false +
- }, +
- "poker":+
- "question": false, +
- "one": [], +
- "two": [], +
- "three": [], +
- "five": [], +
- "eight": [], +
- "thirteen": [], +
- "twenty": [], +
- "forty": [], +
- "oneHundred": [], +
- "unsure": [], +
- "end": null, +
- "allowNonBoardMembers": false +
- }, +
- "targetId_gantt": [], +
- "linkType_gantt": [], +
- "linkId_gantt": [], +
- "cardNumber":+
- }, +
-+
- "_id": "aEX2fvNjyDRjCGK87", +
- "archived": false, +
- "createdAt": "2023-09-13T09:07:47.833Z", +
- "dateLastActivity": "2023-09-13T09:18:50.273Z", +
- "description": "https://wiki.fachinformatiker.schule/doku.php?id=guide:its11:tcp_und_udp", +
- "listId": "fAcFYDCuxohtJJFRy", +
- "swimlaneId": "4sLSykGyRcWGMedzq", +
- "sort": 1, +
- "title": "03.2 UDP-Verkehr kontrollieren und analysieren", +
- "userId": "XfB5mQfBf3feMeceF", +
- "isOvertime": false, +
- "startAt": null, +
- "dueAt": null, +
- "spentTime": null, +
- "labelIds":+
- "RbLyKq" +
- ], +
- "customFields": [], +
- "parentId": "", +
- "coverId": "", +
- "modifiedAt": "2023-09-13T09:18:50.272Z", +
- "requestedBy": "", +
- "assignedBy": "", +
- "members": [], +
- "assignees": [], +
- "subtaskSort": -1, +
- "type": "cardType-card", +
- "linkedId": "", +
- "vote":+
- "question": "", +
- "positive": [], +
- "negative": [], +
- "end": null, +
- "public": false, +
- "allowNonBoardMembers": false +
- }, +
- "poker":+
- "question": false, +
- "one": [], +
- "two": [], +
- "three": [], +
- "five": [], +
- "eight": [], +
- "thirteen": [], +
- "twenty": [], +
- "forty": [], +
- "oneHundred": [], +
- "unsure": [], +
- "end": null, +
- "allowNonBoardMembers": false +
- }, +
- "targetId_gantt": [], +
- "linkType_gantt": [], +
- "linkId_gantt": [], +
- "cardNumber":+
- }, +
-+
- "_id": "tqMD52onDTTs3Pnsi", +
- "archived": true, +
- "createdAt": "2023-09-13T09:07:47.601Z", +
- "dateLastActivity": "2023-09-13T09:18:50.273Z", +
- "listId": "Pzpg5HamWmeBWMttZ", +
- "swimlaneId": "4sLSykGyRcWGMedzq", +
- "sort": 1, +
- "title": "03.3 Fehler in UDP-Kommunikation finden und lösen", +
- "userId": "XfB5mQfBf3feMeceF", +
- "isOvertime": false, +
- "startAt": null, +
- "dueAt": null, +
- "spentTime": null, +
- "labelIds":+
- "a3KKBT" +
- ], +
- "customFields": [], +
- "parentId": "", +
- "coverId": "", +
- "modifiedAt": "2023-09-13T09:18:50.272Z", +
- "description": "", +
- "requestedBy": "", +
- "assignedBy": "", +
- "members": [], +
- "assignees": [], +
- "subtaskSort": -1, +
- "type": "cardType-card", +
- "linkedId": "", +
- "vote":+
- "question": "", +
- "positive": [], +
- "negative": [], +
- "end": null, +
- "public": false, +
- "allowNonBoardMembers": false +
- }, +
- "poker":+
- "question": false, +
- "one": [], +
- "two": [], +
- "three": [], +
- "five": [], +
- "eight": [], +
- "thirteen": [], +
- "twenty": [], +
- "forty": [], +
- "oneHundred": [], +
- "unsure": [], +
- "end": null, +
- "allowNonBoardMembers": false +
- }, +
- "targetId_gantt": [], +
- "linkType_gantt": [], +
- "linkId_gantt": [], +
- "cardNumber":+
- }, +
-+
- "_id": "ZgRLZ2SQmwEmHwf2M", +
- "archived": false, +
- "createdAt": "2023-09-13T09:07:47.359Z", +
- "dateLastActivity": "2023-09-13T09:18:50.273Z", +
- "description": "Versuche dich mit der Verwendung von Netstat vertraut zu machen und einen Netzwerkmitschnitt mit Wireshark zu starten.\n\nhttps://wiki.fachinformatiker.schule/doku.php?id=netzwerk-tools", +
- "listId": "M435iKAZGj2zb8nqC", +
- "swimlaneId": "4sLSykGyRcWGMedzq", +
- "sort": -2, +
- "title": "01.1 Grundlegende Werkzeuge", +
- "userId": "XfB5mQfBf3feMeceF", +
- "isOvertime": false, +
- "startAt": null, +
- "dueAt": null, +
- "spentTime": null, +
- "labelIds":+
- "S4sbKt" +
- ], +
- "customFields": [], +
- "parentId": "", +
- "coverId": "", +
- "modifiedAt": "2023-09-13T09:18:50.272Z", +
- "requestedBy": "", +
- "assignedBy": "", +
- "members": [], +
- "assignees": [], +
- "subtaskSort": -1, +
- "type": "cardType-card", +
- "linkedId": "", +
- "vote":+
- "question": "", +
- "positive": [], +
- "negative": [], +
- "end": null, +
- "public": false, +
- "allowNonBoardMembers": false +
- }, +
- "poker":+
- "question": false, +
- "one": [], +
- "two": [], +
- "three": [], +
- "five": [], +
- "eight": [], +
- "thirteen": [], +
- "twenty": [], +
- "forty": [], +
- "oneHundred": [], +
- "unsure": [], +
- "end": null, +
- "allowNonBoardMembers": false +
- }, +
- "targetId_gantt": [], +
- "linkType_gantt": [], +
- "linkId_gantt": [], +
- "cardNumber":+
- }, +
-+
- "_id": "EyrjHmcPWyJH5iu5g", +
- "archived": false, +
- "createdAt": "2023-09-13T09:07:47.110Z", +
- "dateLastActivity": "2023-09-13T09:18:50.273Z", +
- "description": "Versuche mit Hilfe von netcat TCP- und UDP-Sockets zu erzeugen und darüber Nachrichten auszutauschen. Beobachte diesen Verkehr mit Wireshark.\n\nhttps://wiki.fachinformatiker.schule/doku.php?id=netzwerk-tools", +
- "listId": "Pzpg5HamWmeBWMttZ", +
- "swimlaneId": "4sLSykGyRcWGMedzq", +
- "sort": -1, +
- "title": "01.3 Vertiefter/kombinierter Einsatz der Werkzeuge", +
- "userId": "XfB5mQfBf3feMeceF", +
- "isOvertime": false, +
- "startAt": null, +
- "dueAt": null, +
- "spentTime": null, +
- "labelIds":+
- "a3KKBT" +
- ], +
- "customFields": [], +
- "parentId": "", +
- "coverId": "", +
- "modifiedAt": "2023-09-13T09:18:50.272Z", +
- "requestedBy": "", +
- "assignedBy": "", +
- "members": [], +
- "assignees": [], +
- "subtaskSort": -1, +
- "type": "cardType-card", +
- "linkedId": "", +
- "vote":+
- "question": "", +
- "positive": [], +
- "negative": [], +
- "end": null, +
- "public": false, +
- "allowNonBoardMembers": false +
- }, +
- "poker":+
- "question": false, +
- "one": [], +
- "two": [], +
- "three": [], +
- "five": [], +
- "eight": [], +
- "thirteen": [], +
- "twenty": [], +
- "forty": [], +
- "oneHundred": [], +
- "unsure": [], +
- "end": null, +
- "allowNonBoardMembers": false +
- }, +
- "targetId_gantt": [], +
- "linkType_gantt": [], +
- "linkId_gantt": [], +
- "cardNumber":+
- }, +
-+
- "_id": "32ZBMXLmkfZWaHAgv", +
- "archived": false, +
- "createdAt": "2023-09-13T09:07:46.841Z", +
- "dateLastActivity": "2023-09-13T09:18:50.273Z", +
- "description": "Versuche mit tcpdump einen Mitschnitt auf der Linux-Kommandozeile zu machen und diesen in Wireshark zu öffnen.\nVersuche dich außerdem mit Nmap grundlegend vertraut zu machen.\n\nVerwende einige der Statistiken in Wireshark um dir einen Überblick über deinen Netzwerkmitschnitt zu verschaffen.\n\nhttps://wiki.fachinformatiker.schule/doku.php?id=netzwerk-tools", +
- "listId": "fAcFYDCuxohtJJFRy", +
- "swimlaneId": "4sLSykGyRcWGMedzq", +
- "sort": -1, +
- "title": "01.2 Weitere Werkzeuge", +
- "userId": "XfB5mQfBf3feMeceF", +
- "isOvertime": false, +
- "startAt": null, +
- "dueAt": null, +
- "spentTime": null, +
- "labelIds":+
- "RbLyKq" +
- ], +
- "customFields": [], +
- "parentId": "", +
- "coverId": "", +
- "modifiedAt": "2023-09-13T09:18:50.272Z", +
- "requestedBy": "", +
- "assignedBy": "", +
- "members": [], +
- "assignees": [], +
- "subtaskSort": -1, +
- "type": "cardType-card", +
- "linkedId": "", +
- "vote":+
- "question": "", +
- "positive": [], +
- "negative": [], +
- "end": null, +
- "public": false, +
- "allowNonBoardMembers": false +
- }, +
- "poker":+
- "question": false, +
- "one": [], +
- "two": [], +
- "three": [], +
- "five": [], +
- "eight": [], +
- "thirteen": [], +
- "twenty": [], +
- "forty": [], +
- "oneHundred": [], +
- "unsure": [], +
- "end": null, +
- "allowNonBoardMembers": false +
- }, +
- "targetId_gantt": [], +
- "linkType_gantt": [], +
- "linkId_gantt": [], +
- "cardNumber":+
- }, +
-+
- "_id": "dkhrS3jkxCuT2zXnX", +
- "archived": false, +
- "createdAt": "2023-09-13T09:07:46.630Z", +
- "dateLastActivity": "2023-09-13T09:18:50.273Z", +
- "description": "IPv6 ist eine Technologie, die in den letzten 2 Dekaden immer wichtiger und letztendlich unentbehrlich für das Internet geworden ist. Informiere dich über IPv6-Adressen anhand dieses Guides:\nhttps://wiki.fachinformatiker.schule/doku.php?id=guide:its11:ipv6-adressen", +
- "listId": "M435iKAZGj2zb8nqC", +
- "swimlaneId": "hA9GKokxEcaJ8sJ2T", +
- "sort": 0, +
- "title": "01.1 IPv6-Adressen verstehen", +
- "userId": "XfB5mQfBf3feMeceF", +
- "isOvertime": false, +
- "startAt": null, +
- "dueAt": null, +
- "spentTime": null, +
- "labelIds":+
- "S4sbKt" +
- ], +
- "customFields": [], +
- "parentId": "", +
- "coverId": "", +
- "modifiedAt": "2023-09-13T09:18:50.272Z", +
- "requestedBy": "", +
- "assignedBy": "", +
- "members": [], +
- "assignees": [], +
- "subtaskSort": -1, +
- "type": "cardType-card", +
- "linkedId": "", +
- "vote":+
- "question": "", +
- "positive": [], +
- "negative": [], +
- "end": null, +
- "public": false, +
- "allowNonBoardMembers": false +
- }, +
- "poker":+
- "question": false, +
- "one": [], +
- "two": [], +
- "three": [], +
- "five": [], +
- "eight": [], +
- "thirteen": [], +
- "twenty": [], +
- "forty": [], +
- "oneHundred": [], +
- "unsure": [], +
- "end": null, +
- "allowNonBoardMembers": false +
- }, +
- "targetId_gantt": [], +
- "linkType_gantt": [], +
- "linkId_gantt": [], +
- "cardNumber":+
- }, +
-+
- "_id": "H62fLAs7QjD7zYv9o", +
- "archived": false, +
- "createdAt": "2023-09-13T09:07:46.393Z", +
- "dateLastActivity": "2023-09-13T09:18:50.273Z", +
- "description": "IPv6 ist eine Technologie, die in den letzten 2 Dekaden immer wichtiger und letztendlich unentbehrlich für das Internet geworden ist. Informiere dich über IPv6-Adressen anhand dieses Guides:\nhttps://wiki.fachinformatiker.schule/doku.php?id=guide:its11:ipv6-adressen", +
- "listId": "fAcFYDCuxohtJJFRy", +
- "swimlaneId": "hA9GKokxEcaJ8sJ2T", +
- "sort": 0, +
- "title": "01.2 IPv6-Adressen verstehen", +
- "userId": "XfB5mQfBf3feMeceF", +
- "isOvertime": false, +
- "startAt": null, +
- "dueAt": null, +
- "spentTime": null, +
- "labelIds":+
- "RbLyKq" +
- ], +
- "customFields": [], +
- "parentId": "", +
- "coverId": "", +
- "modifiedAt": "2023-09-13T09:18:50.272Z", +
- "requestedBy": "", +
- "assignedBy": "", +
- "members": [], +
- "assignees": [], +
- "subtaskSort": -1, +
- "type": "cardType-card", +
- "linkedId": "", +
- "vote":+
- "question": "", +
- "positive": [], +
- "negative": [], +
- "end": null, +
- "public": false, +
- "allowNonBoardMembers": false +
- }, +
- "poker":+
- "question": false, +
- "one": [], +
- "two": [], +
- "three": [], +
- "five": [], +
- "eight": [], +
- "thirteen": [], +
- "twenty": [], +
- "forty": [], +
- "oneHundred": [], +
- "unsure": [], +
- "end": null, +
- "allowNonBoardMembers": false +
- }, +
- "targetId_gantt": [], +
- "linkType_gantt": [], +
- "linkId_gantt": [], +
- "cardNumber":+
- }, +
-+
- "_id": "Eq7xcPjrWzy7aBs9m", +
- "archived": false, +
- "createdAt": "2023-09-13T09:07:46.092Z", +
- "dateLastActivity": "2023-09-13T09:18:50.273Z", +
- "description": "Nicht nur bei IPv4 sondern auch bei IPv6 gibt es das Konzept der Subnetze. Allerdings fällt dieses ein wenig anders aus als bei IPv4. Informiere dich mit Hilfe dieses Guides:\n\nhttps://wiki.fachinformatiker.schule/doku.php?id=guide:its11:ipv6-subnetting", +
- "listId": "M435iKAZGj2zb8nqC", +
- "swimlaneId": "hA9GKokxEcaJ8sJ2T", +
- "sort": 1, +
- "title": "02.1 IPv6-Präfixe und -Subnetze verstehen", +
- "userId": "XfB5mQfBf3feMeceF", +
- "isOvertime": false, +
- "startAt": null, +
- "dueAt": null, +
- "spentTime": null, +
- "labelIds":+
- "S4sbKt" +
- ], +
- "customFields": [], +
- "parentId": "", +
- "coverId": "", +
- "modifiedAt": "2023-09-13T09:18:50.272Z", +
- "requestedBy": "", +
- "assignedBy": "", +
- "members": [], +
- "assignees": [], +
- "subtaskSort": -1, +
- "type": "cardType-card", +
- "linkedId": "", +
- "vote":+
- "question": "", +
- "positive": [], +
- "negative": [], +
- "end": null, +
- "public": false, +
- "allowNonBoardMembers": false +
- }, +
- "poker":+
- "question": false, +
- "one": [], +
- "two": [], +
- "three": [], +
- "five": [], +
- "eight": [], +
- "thirteen": [], +
- "twenty": [], +
- "forty": [], +
- "oneHundred": [], +
- "unsure": [], +
- "end": null, +
- "allowNonBoardMembers": false +
- }, +
- "targetId_gantt": [], +
- "linkType_gantt": [], +
- "linkId_gantt": [], +
- "cardNumber":+
- }, +
-+
- "_id": "RrdzdWojBfMPFwQh2", +
- "archived": false, +
- "createdAt": "2023-09-13T09:07:45.833Z", +
- "dateLastActivity": "2023-09-13T09:18:50.273Z", +
- "description": "IPv6-Netzbereiche werden oft in größeren Abschnitten, z. B. mit einem 48er Präfix zugewiesen. Einzelne Netze haben jedoch stets ein 64er Präfix. Die zweckmäßige Aufteilung eines Site-Präfixes ist eine wichtige Fertigkeit für die Planung von IPv6-Netzwerken. Informiere dich deshalb mit Hilfe dieses Guides dazu:\n\nhttps://wiki.fachinformatiker.schule/doku.php?id=guide:its11:ipv6-subnetting", +
- "listId": "fAcFYDCuxohtJJFRy", +
- "swimlaneId": "hA9GKokxEcaJ8sJ2T", +
- "sort": 1, +
- "title": "02.2 IPv6-Subnetze planen", +
- "userId": "XfB5mQfBf3feMeceF", +
- "isOvertime": false, +
- "startAt": null, +
- "dueAt": null, +
- "spentTime": null, +
- "labelIds":+
- "RbLyKq" +
- ], +
- "customFields": [], +
- "parentId": "", +
- "coverId": "", +
- "modifiedAt": "2023-09-13T09:18:50.272Z", +
- "requestedBy": "", +
- "assignedBy": "", +
- "members": [], +
- "assignees": [], +
- "subtaskSort": -1, +
- "type": "cardType-card", +
- "linkedId": "", +
- "vote":+
- "question": "", +
- "positive": [], +
- "negative": [], +
- "end": null, +
- "public": false, +
- "allowNonBoardMembers": false +
- }, +
- "poker":+
- "question": false, +
- "one": [], +
- "two": [], +
- "three": [], +
- "five": [], +
- "eight": [], +
- "thirteen": [], +
- "twenty": [], +
- "forty": [], +
- "oneHundred": [], +
- "unsure": [], +
- "end": null, +
- "allowNonBoardMembers": false +
- }, +
- "targetId_gantt": [], +
- "linkType_gantt": [], +
- "linkId_gantt": [], +
- "cardNumber":+
- }, +
-+
- "_id": "3EapdQjSYiSAP7hzy", +
- "archived": false, +
- "createdAt": "2023-09-13T09:07:45.561Z", +
- "dateLastActivity": "2023-09-13T09:18:50.273Z", +
- "description": "Hosts ohne großen Konfigurationsaufwand automatisch mit gültigen IPv6-Adressen versehen zu können, ist einer der großen Vorteile von IPv6. Informiere dich darüber, wie SLAAC und NDP hierzu beitragen.\n\nhttps://wiki.fachinformatiker.schule/doku.php?id=guide:its11:ipv6-adresskonfiguration", +
- "listId": "M435iKAZGj2zb8nqC", +
- "swimlaneId": "hA9GKokxEcaJ8sJ2T", +
- "sort": 2, +
- "title": "03.1 SLAAC, NDP und DHCPv6 verstehen", +
- "userId": "XfB5mQfBf3feMeceF", +
- "isOvertime": false, +
- "startAt": null, +
- "dueAt": null, +
- "spentTime": null, +
- "labelIds":+
- "S4sbKt" +
- ], +
- "customFields": [], +
- "parentId": "", +
- "coverId": "", +
- "modifiedAt": "2023-09-13T09:18:50.272Z", +
- "requestedBy": "", +
- "assignedBy": "", +
- "members": [], +
- "assignees": [], +
- "subtaskSort": -1, +
- "type": "cardType-card", +
- "linkedId": "", +
- "vote":+
- "question": "", +
- "positive": [], +
- "negative": [], +
- "end": null, +
- "public": false, +
- "allowNonBoardMembers": false +
- }, +
- "poker":+
- "question": false, +
- "one": [], +
- "two": [], +
- "three": [], +
- "five": [], +
- "eight": [], +
- "thirteen": [], +
- "twenty": [], +
- "forty": [], +
- "oneHundred": [], +
- "unsure": [], +
- "end": null, +
- "allowNonBoardMembers": false +
- }, +
- "targetId_gantt": [], +
- "linkType_gantt": [], +
- "linkId_gantt": [], +
- "cardNumber":+
- }, +
-+
- "_id": "ydTdHvedNDekxra7e", +
- "archived": true, +
- "createdAt": "2023-09-13T09:07:45.311Z", +
- "dateLastActivity": "2023-09-13T09:18:50.273Z", +
- "listId": "fAcFYDCuxohtJJFRy", +
- "swimlaneId": "hA9GKokxEcaJ8sJ2T", +
- "sort": 2, +
- "title": "03.2 DHCPv6 verstehen und erklären", +
- "userId": "XfB5mQfBf3feMeceF", +
- "isOvertime": false, +
- "startAt": null, +
- "dueAt": null, +
- "spentTime": null, +
- "labelIds":+
- "RbLyKq" +
- ], +
- "customFields": [], +
- "parentId": "", +
- "coverId": "", +
- "modifiedAt": "2023-09-13T09:18:50.272Z", +
- "description": "", +
- "requestedBy": "", +
- "assignedBy": "", +
- "members": [], +
- "assignees": [], +
- "subtaskSort": -1, +
- "type": "cardType-card", +
- "linkedId": "", +
- "vote":+
- "question": "", +
- "positive": [], +
- "negative": [], +
- "end": null, +
- "public": false, +
- "allowNonBoardMembers": false +
- }, +
- "poker":+
- "question": false, +
- "one": [], +
- "two": [], +
- "three": [], +
- "five": [], +
- "eight": [], +
- "thirteen": [], +
- "twenty": [], +
- "forty": [], +
- "oneHundred": [], +
- "unsure": [], +
- "end": null, +
- "allowNonBoardMembers": false +
- }, +
- "targetId_gantt": [], +
- "linkType_gantt": [], +
- "linkId_gantt": [], +
- "cardNumber":+
- }, +
-+
- "_id": "LC6WXx8SsktyaN4Zz", +
- "archived": false, +
- "createdAt": "2023-09-13T09:07:45.037Z", +
- "dateLastActivity": "2023-09-13T09:18:50.273Z", +
- "description": "Zum besseren Verständnis der IPv6-Adresskonfiguration sollte man nicht nur theoretische Kenntnisse darüber haben sondern diese auch einmal selber angewandt haben. Auch in der Lage zu sein, die Vorgänge mit Hilfe eines Netzwerkmitschnittes zu analysieren, kann bei Fehlerszenarien von Nutzen sein.\n\nhttps://wiki.fachinformatiker.schule/doku.php?id=guide:its11:ipv6-adresskonfiguration#anwender", +
- "listId": "fAcFYDCuxohtJJFRy", +
- "swimlaneId": "hA9GKokxEcaJ8sJ2T", +
- "sort": 2, +
- "title": "03.2 Neighbor und Router Solicitation auswerten und Hosts per Autokonfiguration adressieren", +
- "userId": "XfB5mQfBf3feMeceF", +
- "isOvertime": false, +
- "startAt": null, +
- "dueAt": null, +
- "spentTime": null, +
- "labelIds":+
- "RbLyKq" +
- ], +
- "customFields": [], +
- "parentId": "", +
- "coverId": "", +
- "modifiedAt": "2023-09-13T09:18:50.272Z", +
- "requestedBy": "", +
- "assignedBy": "", +
- "members": [], +
- "assignees": [], +
- "subtaskSort": -1, +
- "type": "cardType-card", +
- "linkedId": "", +
- "vote":+
- "question": "", +
- "positive": [], +
- "negative": [], +
- "end": null, +
- "public": false, +
- "allowNonBoardMembers": false +
- }, +
- "poker":+
- "question": false, +
- "one": [], +
- "two": [], +
- "three": [], +
- "five": [], +
- "eight": [], +
- "thirteen": [], +
- "twenty": [], +
- "forty": [], +
- "oneHundred": [], +
- "unsure": [], +
- "end": null, +
- "allowNonBoardMembers": false +
- }, +
- "targetId_gantt": [], +
- "linkType_gantt": [], +
- "linkId_gantt": [], +
- "cardNumber":+
- }, +
-+
- "_id": "GNPaxDiwM9T4by4LC", +
- "archived": false, +
- "createdAt": "2023-09-13T09:07:44.846Z", +
- "dateLastActivity": "2023-09-13T09:18:50.273Z", +
- "description": "Neben der Konfiguration von einfachen Hosts als IPv6-Netzwerkteilnehmer ist es auch wichtig, einen Router so konfigurieren zu können, dass hinter diesem ein eigenes IPv6-Subnetz betrieben werden kann.\n\nhttps://wiki.fachinformatiker.schule/doku.php?id=guide:its11:ipv6-adresskonfiguration#problemloeser", +
- "listId": "Pzpg5HamWmeBWMttZ", +
- "swimlaneId": "hA9GKokxEcaJ8sJ2T", +
- "sort": 0, +
- "title": "03.3 IPv6 Subnetz konfigurieren und Routing anpassen", +
- "userId": "XfB5mQfBf3feMeceF", +
- "isOvertime": false, +
- "startAt": null, +
- "dueAt": null, +
- "spentTime": null, +
- "labelIds":+
- "a3KKBT" +
- ], +
- "customFields": [], +
- "parentId": "", +
- "coverId": "", +
- "modifiedAt": "2023-09-13T09:18:50.272Z", +
- "requestedBy": "", +
- "assignedBy": "", +
- "members": [], +
- "assignees": [], +
- "subtaskSort": -1, +
- "type": "cardType-card", +
- "linkedId": "", +
- "vote":+
- "question": "", +
- "positive": [], +
- "negative": [], +
- "end": null, +
- "public": false, +
- "allowNonBoardMembers": false +
- }, +
- "poker":+
- "question": false, +
- "one": [], +
- "two": [], +
- "three": [], +
- "five": [], +
- "eight": [], +
- "thirteen": [], +
- "twenty": [], +
- "forty": [], +
- "oneHundred": [], +
- "unsure": [], +
- "end": null, +
- "allowNonBoardMembers": false +
- }, +
- "targetId_gantt": [], +
- "linkType_gantt": [], +
- "linkId_gantt": [], +
- "cardNumber":+
- }, +
-+
- "_id": "yhinc6cNqEYK5onzW", +
- "archived": false, +
- "createdAt": "2023-09-13T09:07:44.665Z", +
- "dateLastActivity": "2023-09-13T09:18:50.273Z", +
- "description": "Verwende geeignete Kommandozeilen-Tools um selbst DNS-Anfragen zu stellen und so Informationen aus dem DNS zu erhalten.\n\nhttps://wiki.fachinformatiker.schule/doku.php?id=guide:its11:dns_anfragen_machen", +
- "listId": "fAcFYDCuxohtJJFRy", +
- "swimlaneId": "73q8tWu73oczqaxrM", +
- "sort": 0, +
- "title": "01.2 DNS-Anfragen machen", +
- "userId": "XfB5mQfBf3feMeceF", +
- "isOvertime": false, +
- "startAt": null, +
- "dueAt": null, +
- "spentTime": null, +
- "labelIds":+
- "RbLyKq" +
- ], +
- "customFields": [], +
- "parentId": "", +
- "coverId": "", +
- "modifiedAt": "2023-09-13T09:18:50.272Z", +
- "requestedBy": "", +
- "assignedBy": "", +
- "members": [], +
- "assignees": [], +
- "subtaskSort": -1, +
- "type": "cardType-card", +
- "linkedId": "", +
- "vote":+
- "question": "", +
- "positive": [], +
- "negative": [], +
- "end": null, +
- "public": false, +
- "allowNonBoardMembers": false +
- }, +
- "poker":+
- "question": false, +
- "one": [], +
- "two": [], +
- "three": [], +
- "five": [], +
- "eight": [], +
- "thirteen": [], +
- "twenty": [], +
- "forty": [], +
- "oneHundred": [], +
- "unsure": [], +
- "end": null, +
- "allowNonBoardMembers": false +
- }, +
- "targetId_gantt": [], +
- "linkType_gantt": [], +
- "linkId_gantt": [], +
- "cardNumber":+
- }, +
-+
- "_id": "F5uKhSx66wwDSrzgn", +
- "archived": false, +
- "createdAt": "2023-09-13T09:07:44.489Z", +
- "dateLastActivity": "2023-09-13T09:18:50.273Z", +
- "description": "Um Fehler bei der DNS-Auflösung untersuchen zu können, einen DNS-Server bereitstellen oder ggf. eine eigene DNS-Zone pflegen zu können, benötigt man ein gewisses Grundverständnis zum Aufbau und den Begriffen im DNS sowie zu den Abläufen bei der Namensauflösung.\n\nhttps://wiki.fachinformatiker.schule/doku.php?id=guide:its11:dns_grundlagen", +
- "listId": "M435iKAZGj2zb8nqC", +
- "swimlaneId": "73q8tWu73oczqaxrM", +
- "sort": 0, +
- "title": "01.1 DNS-Grundlagen", +
- "userId": "XfB5mQfBf3feMeceF", +
- "isOvertime": false, +
- "startAt": null, +
- "dueAt": null, +
- "spentTime": null, +
- "labelIds":+
- "S4sbKt" +
- ], +
- "customFields": [], +
- "parentId": "", +
- "coverId": "", +
- "modifiedAt": "2023-09-13T09:18:50.272Z", +
- "requestedBy": "", +
- "assignedBy": "", +
- "members": [], +
- "assignees": [], +
- "subtaskSort": -1, +
- "type": "cardType-card", +
- "linkedId": "", +
- "vote":+
- "question": "", +
- "positive": [], +
- "negative": [], +
- "end": null, +
- "public": false, +
- "allowNonBoardMembers": false +
- }, +
- "poker":+
- "question": false, +
- "one": [], +
- "two": [], +
- "three": [], +
- "five": [], +
- "eight": [], +
- "thirteen": [], +
- "twenty": [], +
- "forty": [], +
- "oneHundred": [], +
- "unsure": [], +
- "end": null, +
- "allowNonBoardMembers": false +
- }, +
- "targetId_gantt": [], +
- "linkType_gantt": [], +
- "linkId_gantt": [], +
- "cardNumber":+
- }, +
-+
- "_id": "ZpQzTpz5Ad3yFxART", +
- "archived": false, +
- "createdAt": "2023-09-13T09:07:44.295Z", +
- "dateLastActivity": "2023-09-13T09:18:50.273Z", +
- "description": "https://wiki.fachinformatiker.schule/doku.php?id=guide:its11:dns-zone_verwalten_und_delegieren", +
- "listId": "Pzpg5HamWmeBWMttZ", +
- "swimlaneId": "73q8tWu73oczqaxrM", +
- "sort": 0, +
- "title": "01.2 DNS-Server bereitstellen und DNS-Zone verwalten", +
- "userId": "XfB5mQfBf3feMeceF", +
- "isOvertime": false, +
- "startAt": null, +
- "dueAt": null, +
- "spentTime": null, +
- "labelIds":+
- "a3KKBT" +
- ], +
- "customFields": [], +
- "parentId": "", +
- "coverId": "", +
- "modifiedAt": "2023-09-13T09:18:50.272Z", +
- "requestedBy": "", +
- "assignedBy": "", +
- "members": [], +
- "assignees": [], +
- "subtaskSort": -1, +
- "type": "cardType-card", +
- "linkedId": "", +
- "vote":+
- "question": "", +
- "positive": [], +
- "negative": [], +
- "end": null, +
- "public": false, +
- "allowNonBoardMembers": false +
- }, +
- "poker":+
- "question": false, +
- "one": [], +
- "two": [], +
- "three": [], +
- "five": [], +
- "eight": [], +
- "thirteen": [], +
- "twenty": [], +
- "forty": [], +
- "oneHundred": [], +
- "unsure": [], +
- "end": null, +
- "allowNonBoardMembers": false +
- }, +
- "targetId_gantt": [], +
- "linkType_gantt": [], +
- "linkId_gantt": [], +
- "cardNumber":+
- }, +
-+
- "_id": "Z8E6vGCuonzpkwSjv", +
- "archived": false, +
- "createdAt": "2023-09-13T09:07:44.074Z", +
- "dateLastActivity": "2023-09-13T09:18:50.273Z", +
- "description": "Um DHCP zu verstehen, solltest du darüber Bescheid wissen, welche Informationen bei einre DHCP-Anfrage ausgetauscht werden können, welche Nachrichtentypen dazu verwendet werden und wie der Ablauf einer solchen Anfrage und Adresszuteilung ist. Außerdem ist es nützlich zu wissen, welche Adressen und Ports bei einer DHCP-Anfrage verwendet werden.\n\nhttps://wiki.fachinformatiker.schule/doku.php?id=guide:its11:dhcp-grundlagen", +
- "listId": "M435iKAZGj2zb8nqC", +
- "swimlaneId": "73q8tWu73oczqaxrM", +
- "sort": 1, +
- "title": "02.1 DHCP-Grundlagen", +
- "userId": "XfB5mQfBf3feMeceF", +
- "isOvertime": false, +
- "startAt": null, +
- "dueAt": null, +
- "spentTime": null, +
- "labelIds":+
- "S4sbKt" +
- ], +
- "customFields": [], +
- "parentId": "", +
- "coverId": "", +
- "modifiedAt": "2023-09-13T09:18:50.272Z", +
- "requestedBy": "", +
- "assignedBy": "", +
- "members": [], +
- "assignees": [], +
- "subtaskSort": -1, +
- "type": "cardType-card", +
- "linkedId": "", +
- "vote":+
- "question": "", +
- "positive": [], +
- "negative": [], +
- "end": null, +
- "public": false, +
- "allowNonBoardMembers": false +
- }, +
- "poker":+
- "question": false, +
- "one": [], +
- "two": [], +
- "three": [], +
- "five": [], +
- "eight": [], +
- "thirteen": [], +
- "twenty": [], +
- "forty": [], +
- "oneHundred": [], +
- "unsure": [], +
- "end": null, +
- "allowNonBoardMembers": false +
- }, +
- "targetId_gantt": [], +
- "linkType_gantt": [], +
- "linkId_gantt": [], +
- "cardNumber":+
- }, +
-+
- "_id": "prkm4so6C36rGj3nR", +
- "archived": false, +
- "createdAt": "2023-09-13T09:07:43.843Z", +
- "dateLastActivity": "2023-09-13T09:18:50.273Z", +
- "description": "https://wiki.fachinformatiker.schule/doku.php?id=guide:its11:dhcp-server_bereitstellen", +
- "listId": "Pzpg5HamWmeBWMttZ", +
- "swimlaneId": "73q8tWu73oczqaxrM", +
- "sort": 1, +
- "title": "02.3 DHCP-Server bereitstellen", +
- "userId": "XfB5mQfBf3feMeceF", +
- "isOvertime": false, +
- "startAt": null, +
- "dueAt": null, +
- "spentTime": null, +
- "labelIds":+
- "a3KKBT" +
- ], +
- "customFields": [], +
- "parentId": "", +
- "coverId": "", +
- "modifiedAt": "2023-09-13T09:18:50.272Z", +
- "requestedBy": "", +
- "assignedBy": "", +
- "members": [], +
- "assignees": [], +
- "subtaskSort": -1, +
- "type": "cardType-card", +
- "linkedId": "", +
- "vote":+
- "question": "", +
- "positive": [], +
- "negative": [], +
- "end": null, +
- "public": false, +
- "allowNonBoardMembers": false +
- }, +
- "poker":+
- "question": false, +
- "one": [], +
- "two": [], +
- "three": [], +
- "five": [], +
- "eight": [], +
- "thirteen": [], +
- "twenty": [], +
- "forty": [], +
- "oneHundred": [], +
- "unsure": [], +
- "end": null, +
- "allowNonBoardMembers": false +
- }, +
- "targetId_gantt": [], +
- "linkType_gantt": [], +
- "linkId_gantt": [], +
- "cardNumber":+
- }, +
-+
- "_id": "FHHQKzaNsKdhpPoAq", +
- "archived": false, +
- "createdAt": "2023-09-13T09:07:43.656Z", +
- "dateLastActivity": "2023-09-13T09:18:50.273Z", +
- "description": "Wirklich tiefes Verständnis für die Funktion von DHCP und Kompetenz für das Trouble Shooting erhältst du erst, wenn du in der Lage bist, DHCP-Verkehr zu analysieren und zu verstehen.\n\nhttps://wiki.fachinformatiker.schule/doku.php?id=guide:its11:dhcp-verkehr_analysieren", +
- "listId": "fAcFYDCuxohtJJFRy", +
- "swimlaneId": "73q8tWu73oczqaxrM", +
- "sort": 1, +
- "title": "02.2 DHCP-Verkehr analysieren", +
- "userId": "XfB5mQfBf3feMeceF", +
- "isOvertime": false, +
- "startAt": null, +
- "dueAt": null, +
- "spentTime": null, +
- "labelIds":+
- "RbLyKq" +
- ], +
- "customFields": [], +
- "parentId": "", +
- "coverId": "", +
- "modifiedAt": "2023-09-13T09:18:50.272Z", +
- "requestedBy": "", +
- "assignedBy": "", +
- "members": [], +
- "assignees": [], +
- "subtaskSort": -1, +
- "type": "cardType-card", +
- "linkedId": "", +
- "vote":+
- "question": "", +
- "positive": [], +
- "negative": [], +
- "end": null, +
- "public": false, +
- "allowNonBoardMembers": false +
- }, +
- "poker":+
- "question": false, +
- "one": [], +
- "two": [], +
- "three": [], +
- "five": [], +
- "eight": [], +
- "thirteen": [], +
- "twenty": [], +
- "forty": [], +
- "oneHundred": [], +
- "unsure": [], +
- "end": null, +
- "allowNonBoardMembers": false +
- }, +
- "targetId_gantt": [], +
- "linkType_gantt": [], +
- "linkId_gantt": [], +
- "cardNumber":+
- }, +
-+
- "_id": "ZPfMYKGXgXswdF7GY", +
- "archived": false, +
- "createdAt": "2023-09-13T09:07:43.466Z", +
- "dateLastActivity": "2023-09-13T09:18:50.273Z", +
- "description": "https://wiki.fachinformatiker.schule/doku.php?id=guide:its11:web-server_http", +
- "listId": "M435iKAZGj2zb8nqC", +
- "swimlaneId": "73q8tWu73oczqaxrM", +
- "sort": 2, +
- "title": "03.1 Web-Server / HTTP", +
- "userId": "XfB5mQfBf3feMeceF", +
- "isOvertime": false, +
- "startAt": null, +
- "dueAt": null, +
- "spentTime": null, +
- "labelIds":+
- "S4sbKt" +
- ], +
- "customFields": [], +
- "parentId": "", +
- "coverId": "", +
- "modifiedAt": "2023-09-13T09:18:50.272Z", +
- "requestedBy": "", +
- "assignedBy": "", +
- "members": [], +
- "assignees": [], +
- "subtaskSort": -1, +
- "type": "cardType-card", +
- "linkedId": "", +
- "vote":+
- "question": "", +
- "positive": [], +
- "negative": [], +
- "end": null, +
- "public": false, +
- "allowNonBoardMembers": false +
- }, +
- "poker":+
- "question": false, +
- "one": [], +
- "two": [], +
- "three": [], +
- "five": [], +
- "eight": [], +
- "thirteen": [], +
- "twenty": [], +
- "forty": [], +
- "oneHundred": [], +
- "unsure": [], +
- "end": null, +
- "allowNonBoardMembers": false +
- }, +
- "targetId_gantt": [], +
- "linkType_gantt": [], +
- "linkId_gantt": [], +
- "cardNumber":+
- }, +
-+
- "_id": "DzaL7cCnfQFKvGKZ5", +
- "archived": false, +
- "createdAt": "2023-09-13T09:07:43.318Z", +
- "dateLastActivity": "2023-09-13T09:18:50.273Z", +
- "description": "https://wiki.fachinformatiker.schule/doku.php?id=guide:its11:web-server_in_betrieb_nehmen", +
- "listId": "fAcFYDCuxohtJJFRy", +
- "swimlaneId": "73q8tWu73oczqaxrM", +
- "sort": 2, +
- "title": "03.2 Web-Server in Betrieb nehmen", +
- "userId": "XfB5mQfBf3feMeceF", +
- "isOvertime": false, +
- "startAt": null, +
- "dueAt": null, +
- "spentTime": null, +
- "labelIds":+
- "RbLyKq" +
- ], +
- "customFields": [], +
- "parentId": "", +
- "coverId": "", +
- "modifiedAt": "2023-09-13T09:18:50.272Z", +
- "requestedBy": "", +
- "assignedBy": "", +
- "members": [], +
- "assignees": [], +
- "subtaskSort": -1, +
- "type": "cardType-card", +
- "linkedId": "", +
- "vote":+
- "question": "", +
- "positive": [], +
- "negative": [], +
- "end": null, +
- "public": false, +
- "allowNonBoardMembers": false +
- }, +
- "poker":+
- "question": false, +
- "one": [], +
- "two": [], +
- "three": [], +
- "five": [], +
- "eight": [], +
- "thirteen": [], +
- "twenty": [], +
- "forty": [], +
- "oneHundred": [], +
- "unsure": [], +
- "end": null, +
- "allowNonBoardMembers": false +
- }, +
- "targetId_gantt": [], +
- "linkType_gantt": [], +
- "linkId_gantt": [], +
- "cardNumber":+
- }, +
-+
- "_id": "ZcpMmL6quGsKd9PS5", +
- "archived": false, +
- "createdAt": "2023-09-13T09:07:43.135Z", +
- "dateLastActivity": "2023-09-13T09:18:50.273Z", +
- "description": "https://wiki.fachinformatiker.schule/doku.php?id=guide:its11:verschluesselung", +
- "listId": "M435iKAZGj2zb8nqC", +
- "swimlaneId": "SJdJaCmxcBjL3ARXy", +
- "sort": 0, +
- "title": "01.1 Verschlüsselung", +
- "userId": "XfB5mQfBf3feMeceF", +
- "isOvertime": false, +
- "startAt": null, +
- "dueAt": null, +
- "spentTime": null, +
- "labelIds":+
- "S4sbKt" +
- ], +
- "customFields": [], +
- "parentId": "", +
- "coverId": "", +
- "modifiedAt": "2023-09-13T09:18:50.272Z", +
- "requestedBy": "", +
- "assignedBy": "", +
- "members": [], +
- "assignees": [], +
- "subtaskSort": -1, +
- "type": "cardType-card", +
- "linkedId": "", +
- "vote":+
- "question": "", +
- "positive": [], +
- "negative": [], +
- "end": null, +
- "public": false, +
- "allowNonBoardMembers": false +
- }, +
- "poker":+
- "question": false, +
- "one": [], +
- "two": [], +
- "three": [], +
- "five": [], +
- "eight": [], +
- "thirteen": [], +
- "twenty": [], +
- "forty": [], +
- "oneHundred": [], +
- "unsure": [], +
- "end": null, +
- "allowNonBoardMembers": false +
- }, +
- "targetId_gantt": [], +
- "linkType_gantt": [], +
- "linkId_gantt": [], +
- "cardNumber":+
- }, +
-+
- "_id": "iWbHXHe4QXAxjXWXe", +
- "archived": false, +
- "createdAt": "2023-09-13T09:07:42.934Z", +
- "dateLastActivity": "2023-09-13T09:18:50.273Z", +
- "description": "https://wiki.fachinformatiker.schule/doku.php?id=guide:its11:hashfunktionen", +
- "listId": "M435iKAZGj2zb8nqC", +
- "swimlaneId": "SJdJaCmxcBjL3ARXy", +
- "sort": 1, +
- "title": "02.1 Hash-Funktionen", +
- "userId": "XfB5mQfBf3feMeceF", +
- "isOvertime": false, +
- "startAt": null, +
- "dueAt": null, +
- "spentTime": null, +
- "labelIds":+
- "S4sbKt" +
- ], +
- "customFields": [], +
- "parentId": "", +
- "coverId": "", +
- "modifiedAt": "2023-09-13T09:18:50.272Z", +
- "requestedBy": "", +
- "assignedBy": "", +
- "members": [], +
- "assignees": [], +
- "subtaskSort": -1, +
- "type": "cardType-card", +
- "linkedId": "", +
- "vote":+
- "question": "", +
- "positive": [], +
- "negative": [], +
- "end": null, +
- "public": false, +
- "allowNonBoardMembers": false +
- }, +
- "poker":+
- "question": false, +
- "one": [], +
- "two": [], +
- "three": [], +
- "five": [], +
- "eight": [], +
- "thirteen": [], +
- "twenty": [], +
- "forty": [], +
- "oneHundred": [], +
- "unsure": [], +
- "end": null, +
- "allowNonBoardMembers": false +
- }, +
- "targetId_gantt": [], +
- "linkType_gantt": [], +
- "linkId_gantt": [], +
- "cardNumber":+
- }, +
-+
- "_id": "jXRLQuqr7FYXSC2En", +
- "archived": false, +
- "createdAt": "2023-09-13T09:07:42.809Z", +
- "dateLastActivity": "2023-09-13T09:18:50.273Z", +
- "description": "https://wiki.fachinformatiker.schule/doku.php?id=guide:its11:vpn", +
- "listId": "M435iKAZGj2zb8nqC", +
- "swimlaneId": "EWaFL63KpqjCBPpJn", +
- "sort": 0, +
- "title": "01.1 VPN", +
- "userId": "XfB5mQfBf3feMeceF", +
- "isOvertime": false, +
- "startAt": null, +
- "dueAt": null, +
- "spentTime": null, +
- "labelIds":+
- "S4sbKt" +
- ], +
- "customFields": [], +
- "parentId": "", +
- "coverId": "", +
- "modifiedAt": "2023-09-13T09:18:50.272Z", +
- "requestedBy": "", +
- "assignedBy": "", +
- "members": [], +
- "assignees": [], +
- "subtaskSort": -1, +
- "type": "cardType-card", +
- "linkedId": "", +
- "vote":+
- "question": "", +
- "positive": [], +
- "negative": [], +
- "end": null, +
- "public": false, +
- "allowNonBoardMembers": false +
- }, +
- "poker":+
- "question": false, +
- "one": [], +
- "two": [], +
- "three": [], +
- "five": [], +
- "eight": [], +
- "thirteen": [], +
- "twenty": [], +
- "forty": [], +
- "oneHundred": [], +
- "unsure": [], +
- "end": null, +
- "allowNonBoardMembers": false +
- }, +
- "targetId_gantt": [], +
- "linkType_gantt": [], +
- "linkId_gantt": [], +
- "cardNumber":+
- }, +
-+
- "_id": "gD4mYdFaNpRuwfAKQ", +
- "archived": false, +
- "createdAt": "2023-09-13T09:07:42.605Z", +
- "dateLastActivity": "2023-09-13T09:18:50.273Z", +
- "description": "https://wiki.fachinformatiker.schule/doku.php?id=guide:its11:vpn-server_betreiben", +
- "listId": "fAcFYDCuxohtJJFRy", +
- "swimlaneId": "EWaFL63KpqjCBPpJn", +
- "sort": 0, +
- "title": "02.1 VPN-Server betreiben", +
- "userId": "XfB5mQfBf3feMeceF", +
- "isOvertime": false, +
- "startAt": null, +
- "dueAt": null, +
- "spentTime": null, +
- "labelIds":+
- "RbLyKq" +
- ], +
- "customFields": [], +
- "parentId": "", +
- "coverId": "", +
- "modifiedAt": "2023-09-13T09:18:50.272Z", +
- "requestedBy": "", +
- "assignedBy": "", +
- "members": [], +
- "assignees": [], +
- "subtaskSort": -1, +
- "type": "cardType-card", +
- "linkedId": "", +
- "vote":+
- "question": "", +
- "positive": [], +
- "negative": [], +
- "end": null, +
- "public": false, +
- "allowNonBoardMembers": false +
- }, +
- "poker":+
- "question": false, +
- "one": [], +
- "two": [], +
- "three": [], +
- "five": [], +
- "eight": [], +
- "thirteen": [], +
- "twenty": [], +
- "forty": [], +
- "oneHundred": [], +
- "unsure": [], +
- "end": null, +
- "allowNonBoardMembers": false +
- }, +
- "targetId_gantt": [], +
- "linkType_gantt": [], +
- "linkId_gantt": [], +
- "cardNumber":+
- }, +
-+
- "_id": "LisNL8zvENpAoDxQY", +
- "archived": false, +
- "createdAt": "2023-09-13T09:07:42.403Z", +
- "dateLastActivity": "2023-09-13T09:18:50.273Z", +
- "description": "https://wiki.fachinformatiker.schule/doku.php?id=guide:its11:authentifizierung_autorisierung", +
- "listId": "M435iKAZGj2zb8nqC", +
- "swimlaneId": "SJdJaCmxcBjL3ARXy", +
- "sort": 2, +
- "title": "03.1 Begriffsbedeutungen Authentifizierungen und Autorisierung", +
- "userId": "XfB5mQfBf3feMeceF", +
- "isOvertime": false, +
- "startAt": null, +
- "dueAt": null, +
- "spentTime": null, +
- "labelIds":+
- "S4sbKt" +
- ], +
- "customFields": [], +
- "parentId": "", +
- "coverId": "", +
- "modifiedAt": "2023-09-13T09:18:50.272Z", +
- "requestedBy": "", +
- "assignedBy": "", +
- "members": [], +
- "assignees": [], +
- "subtaskSort": -1, +
- "type": "cardType-card", +
- "linkedId": "", +
- "vote":+
- "question": "", +
- "positive": [], +
- "negative": [], +
- "end": null, +
- "public": false, +
- "allowNonBoardMembers": false +
- }, +
- "poker":+
- "question": false, +
- "one": [], +
- "two": [], +
- "three": [], +
- "five": [], +
- "eight": [], +
- "thirteen": [], +
- "twenty": [], +
- "forty": [], +
- "oneHundred": [], +
- "unsure": [], +
- "end": null, +
- "allowNonBoardMembers": false +
- }, +
- "targetId_gantt": [], +
- "linkType_gantt": [], +
- "linkId_gantt": [], +
- "cardNumber":+
- }, +
-+
- "_id": "bAL8H7BiCzpQPaTud", +
- "archived": false, +
- "createdAt": "2023-09-13T09:07:42.249Z", +
- "dateLastActivity": "2023-09-13T09:18:50.273Z", +
- "listId": "M435iKAZGj2zb8nqC", +
- "swimlaneId": "SJdJaCmxcBjL3ARXy", +
- "sort": 3, +
- "title": "04.1 PKI-Authentifizierung", +
- "userId": "XfB5mQfBf3feMeceF", +
- "isOvertime": false, +
- "startAt": null, +
- "dueAt": null, +
- "spentTime": null, +
- "labelIds":+
- "S4sbKt" +
- ], +
- "customFields": [], +
- "parentId": "", +
- "coverId": "", +
- "modifiedAt": "2023-09-13T09:18:50.272Z", +
- "description": "", +
- "requestedBy": "", +
- "assignedBy": "", +
- "members": [], +
- "assignees": [], +
- "subtaskSort": -1, +
- "type": "cardType-card", +
- "linkedId": "", +
- "vote":+
- "question": "", +
- "positive": [], +
- "negative": [], +
- "end": null, +
- "public": false, +
- "allowNonBoardMembers": false +
- }, +
- "poker":+
- "question": false, +
- "one": [], +
- "two": [], +
- "three": [], +
- "five": [], +
- "eight": [], +
- "thirteen": [], +
- "twenty": [], +
- "forty": [], +
- "oneHundred": [], +
- "unsure": [], +
- "end": null, +
- "allowNonBoardMembers": false +
- }, +
- "targetId_gantt": [], +
- "linkType_gantt": [], +
- "linkId_gantt": [], +
- "cardNumber":+
- }, +
-+
- "_id": "iX83qJ6YLZ3MfXnCK", +
- "archived": false, +
- "createdAt": "2023-09-13T09:07:42.063Z", +
- "dateLastActivity": "2023-09-13T09:18:50.273Z", +
- "description": "https://www.thomas-krenn.com/de/wiki/OpenSSH_Public_Key_Authentifizierung_unter_Ubuntu", +
- "listId": "fAcFYDCuxohtJJFRy", +
- "swimlaneId": "SJdJaCmxcBjL3ARXy", +
- "sort": 2, +
- "title": "04.2 PKI-Authentifizierung mit SSH", +
- "userId": "XfB5mQfBf3feMeceF", +
- "isOvertime": false, +
- "startAt": null, +
- "dueAt": null, +
- "spentTime": null, +
- "labelIds":+
- "RbLyKq" +
- ], +
- "customFields": [], +
- "parentId": "", +
- "coverId": "", +
- "modifiedAt": "2023-09-13T09:18:50.272Z", +
- "requestedBy": "", +
- "assignedBy": "", +
- "members": [], +
- "assignees": [], +
- "subtaskSort": -1, +
- "type": "cardType-card", +
- "linkedId": "", +
- "vote":+
- "question": "", +
- "positive": [], +
- "negative": [], +
- "end": null, +
- "public": false, +
- "allowNonBoardMembers": false +
- }, +
- "poker":+
- "question": false, +
- "one": [], +
- "two": [], +
- "three": [], +
- "five": [], +
- "eight": [], +
- "thirteen": [], +
- "twenty": [], +
- "forty": [], +
- "oneHundred": [], +
- "unsure": [], +
- "end": null, +
- "allowNonBoardMembers": false +
- }, +
- "targetId_gantt": [], +
- "linkType_gantt": [], +
- "linkId_gantt": [], +
- "cardNumber":+
- }, +
-+
- "_id": "Th93hWD6EgJpurt3s", +
- "archived": false, +
- "createdAt": "2023-09-13T09:07:41.882Z", +
- "dateLastActivity": "2023-09-13T09:18:50.273Z", +
- "description": "https://wiki.fachinformatiker.schule/doku.php?id=uebung:its11:https_selbstsigniertes_zertifikat", +
- "listId": "fAcFYDCuxohtJJFRy", +
- "swimlaneId": "SJdJaCmxcBjL3ARXy", +
- "sort": 0, +
- "title": "01.2 TLS-Verschlüsselung mit HTTPS", +
- "userId": "XfB5mQfBf3feMeceF", +
- "isOvertime": false, +
- "startAt": null, +
- "dueAt": null, +
- "spentTime": null, +
- "labelIds":+
- "RbLyKq" +
- ], +
- "customFields": [], +
- "parentId": "", +
- "coverId": "", +
- "modifiedAt": "2023-09-13T09:18:50.272Z", +
- "requestedBy": "", +
- "assignedBy": "", +
- "members": [], +
- "assignees": [], +
- "subtaskSort": -1, +
- "type": "cardType-card", +
- "linkedId": "", +
- "vote":+
- "question": "", +
- "positive": [], +
- "negative": [], +
- "end": null, +
- "public": false, +
- "allowNonBoardMembers": false +
- }, +
- "poker":+
- "question": false, +
- "one": [], +
- "two": [], +
- "three": [], +
- "five": [], +
- "eight": [], +
- "thirteen": [], +
- "twenty": [], +
- "forty": [], +
- "oneHundred": [], +
- "unsure": [], +
- "end": null, +
- "allowNonBoardMembers": false +
- }, +
- "targetId_gantt": [], +
- "linkType_gantt": [], +
- "linkId_gantt": [], +
- "cardNumber":+
- }, +
-+
- "_id": "5DerDsG8ezbcnp9eL", +
- "archived": false, +
- "createdAt": "2023-09-13T09:07:41.750Z", +
- "dateLastActivity": "2023-09-13T09:18:50.273Z", +
- "listId": "fAcFYDCuxohtJJFRy", +
- "swimlaneId": "SJdJaCmxcBjL3ARXy", +
- "sort": 1, +
- "title": "02.2 Passwort-Cracking", +
- "userId": "XfB5mQfBf3feMeceF", +
- "isOvertime": false, +
- "startAt": null, +
- "dueAt": null, +
- "spentTime": null, +
- "labelIds":+
- "RbLyKq" +
- ], +
- "customFields": [], +
- "parentId": "", +
- "coverId": "", +
- "modifiedAt": "2023-09-13T09:18:50.272Z", +
- "description": "", +
- "requestedBy": "", +
- "assignedBy": "", +
- "members": [], +
- "assignees": [], +
- "subtaskSort": -1, +
- "type": "cardType-card", +
- "linkedId": "", +
- "vote":+
- "question": "", +
- "positive": [], +
- "negative": [], +
- "end": null, +
- "public": false, +
- "allowNonBoardMembers": false +
- }, +
- "poker":+
- "question": false, +
- "one": [], +
- "two": [], +
- "three": [], +
- "five": [], +
- "eight": [], +
- "thirteen": [], +
- "twenty": [], +
- "forty": [], +
- "oneHundred": [], +
- "unsure": [], +
- "end": null, +
- "allowNonBoardMembers": false +
- }, +
- "targetId_gantt": [], +
- "linkType_gantt": [], +
- "linkId_gantt": [], +
- "cardNumber":+
- }, +
-+
- "_id": "xBKgNgtDkK5RDk4c8", +
- "archived": true, +
- "createdAt": "2023-09-13T09:07:41.605Z", +
- "dateLastActivity": "2023-09-13T09:18:50.273Z", +
- "listId": "M435iKAZGj2zb8nqC", +
- "swimlaneId": "SJdJaCmxcBjL3ARXy", +
- "sort": 4, +
- "title": "05.1 RADIUS", +
- "userId": "XfB5mQfBf3feMeceF", +
- "isOvertime": false, +
- "startAt": null, +
- "dueAt": null, +
- "spentTime": null, +
- "labelIds":+
- "S4sbKt" +
- ], +
- "customFields": [], +
- "parentId": "", +
- "coverId": "", +
- "modifiedAt": "2023-09-13T09:18:50.272Z", +
- "description": "", +
- "requestedBy": "", +
- "assignedBy": "", +
- "members": [], +
- "assignees": [], +
- "subtaskSort": -1, +
- "type": "cardType-card", +
- "linkedId": "", +
- "vote":+
- "question": "", +
- "positive": [], +
- "negative": [], +
- "end": null, +
- "public": false, +
- "allowNonBoardMembers": false +
- }, +
- "poker":+
- "question": false, +
- "one": [], +
- "two": [], +
- "three": [], +
- "five": [], +
- "eight": [], +
- "thirteen": [], +
- "twenty": [], +
- "forty": [], +
- "oneHundred": [], +
- "unsure": [], +
- "end": null, +
- "allowNonBoardMembers": false +
- }, +
- "targetId_gantt": [], +
- "linkType_gantt": [], +
- "linkId_gantt": [], +
- "cardNumber": 0, +
- "archivedAt": "2023-09-13T09:17:08.186Z" +
- }, +
-+
- "_id": "eb545yjkwEMBuFTff", +
- "archived": true, +
- "createdAt": "2023-09-13T09:07:41.449Z", +
- "dateLastActivity": "2023-09-13T09:18:50.273Z", +
- "listId": "M435iKAZGj2zb8nqC", +
- "swimlaneId": "SJdJaCmxcBjL3ARXy", +
- "sort": 5, +
- "title": "06.1 2-Faktor-Authentifizierung", +
- "userId": "XfB5mQfBf3feMeceF", +
- "isOvertime": false, +
- "startAt": null, +
- "dueAt": null, +
- "spentTime": null, +
- "labelIds":+
- "S4sbKt" +
- ], +
- "customFields": [], +
- "parentId": "", +
- "coverId": "", +
- "modifiedAt": "2023-09-13T09:18:50.272Z", +
- "description": "", +
- "requestedBy": "", +
- "assignedBy": "", +
- "members": [], +
- "assignees": [], +
- "subtaskSort": -1, +
- "type": "cardType-card", +
- "linkedId": "", +
- "vote":+
- "question": "", +
- "positive": [], +
- "negative": [], +
- "end": null, +
- "public": false, +
- "allowNonBoardMembers": false +
- }, +
- "poker":+
- "question": false, +
- "one": [], +
- "two": [], +
- "three": [], +
- "five": [], +
- "eight": [], +
- "thirteen": [], +
- "twenty": [], +
- "forty": [], +
- "oneHundred": [], +
- "unsure": [], +
- "end": null, +
- "allowNonBoardMembers": false +
- }, +
- "targetId_gantt": [], +
- "linkType_gantt": [], +
- "linkId_gantt": [], +
- "cardNumber": 0, +
- "archivedAt": "2023-09-13T09:17:13.959Z" +
- }, +
-+
- "_id": "WSNGiKxvGWMHkvnpt", +
- "archived": true, +
- "createdAt": "2023-09-13T09:07:41.294Z", +
- "dateLastActivity": "2023-09-13T09:18:50.273Z", +
- "listId": "M435iKAZGj2zb8nqC", +
- "swimlaneId": "SJdJaCmxcBjL3ARXy", +
- "sort": 6, +
- "title": "07.1 LDAP", +
- "userId": "XfB5mQfBf3feMeceF", +
- "isOvertime": false, +
- "startAt": null, +
- "dueAt": null, +
- "spentTime": null, +
- "labelIds":+
- "S4sbKt" +
- ], +
- "customFields": [], +
- "parentId": "", +
- "coverId": "", +
- "modifiedAt": "2023-09-13T09:18:50.272Z", +
- "description": "", +
- "requestedBy": "", +
- "assignedBy": "", +
- "members": [], +
- "assignees": [], +
- "subtaskSort": -1, +
- "type": "cardType-card", +
- "linkedId": "", +
- "vote":+
- "question": "", +
- "positive": [], +
- "negative": [], +
- "end": null, +
- "public": false, +
- "allowNonBoardMembers": false +
- }, +
- "poker":+
- "question": false, +
- "one": [], +
- "two": [], +
- "three": [], +
- "five": [], +
- "eight": [], +
- "thirteen": [], +
- "twenty": [], +
- "forty": [], +
- "oneHundred": [], +
- "unsure": [], +
- "end": null, +
- "allowNonBoardMembers": false +
- }, +
- "targetId_gantt": [], +
- "linkType_gantt": [], +
- "linkId_gantt": [], +
- "cardNumber": 0, +
- "archivedAt": "2023-09-13T09:17:18.915Z" +
- }, +
-+
- "_id": "kotQYZbMT82WdGLwk", +
- "archived": false, +
- "createdAt": "2023-09-13T09:07:41.134Z", +
- "dateLastActivity": "2023-09-13T09:18:50.273Z", +
- "description": "https://wiki.fachinformatiker.schule/doku.php?id=guide:its11:vpn-server_betreiben", +
- "listId": "Pzpg5HamWmeBWMttZ", +
- "swimlaneId": "EWaFL63KpqjCBPpJn", +
- "sort": 0, +
- "title": "03.1 Site-to-Site-VPN implementieren", +
- "userId": "XfB5mQfBf3feMeceF", +
- "isOvertime": false, +
- "startAt": null, +
- "dueAt": null, +
- "spentTime": null, +
- "labelIds":+
- "a3KKBT" +
- ], +
- "customFields": [], +
- "parentId": "", +
- "coverId": "", +
- "modifiedAt": "2023-09-13T09:18:50.272Z", +
- "requestedBy": "", +
- "assignedBy": "", +
- "members": [], +
- "assignees": [], +
- "subtaskSort": -1, +
- "type": "cardType-card", +
- "linkedId": "", +
- "vote":+
- "question": "", +
- "positive": [], +
- "negative": [], +
- "end": null, +
- "public": false, +
- "allowNonBoardMembers": false +
- }, +
- "poker":+
- "question": false, +
- "one": [], +
- "two": [], +
- "three": [], +
- "five": [], +
- "eight": [], +
- "thirteen": [], +
- "twenty": [], +
- "forty": [], +
- "oneHundred": [], +
- "unsure": [], +
- "end": null, +
- "allowNonBoardMembers": false +
- }, +
- "targetId_gantt": [], +
- "linkType_gantt": [], +
- "linkId_gantt": [], +
- "cardNumber":+
- }, +
-+
- "_id": "b5obF335HjBwcTocq", +
- "archived": false, +
- "createdAt": "2023-09-13T09:07:40.942Z", +
- "dateLastActivity": "2023-09-13T09:18:50.273Z", +
- "listId": "M435iKAZGj2zb8nqC", +
- "swimlaneId": "EmCvogNwNSXGXLeWN", +
- "sort": 0, +
- "title": "01.1 VoIP-Grundbegriffe und Zusammenhänge", +
- "userId": "XfB5mQfBf3feMeceF", +
- "isOvertime": false, +
- "startAt": null, +
- "dueAt": null, +
- "spentTime": null, +
- "labelIds":+
- "S4sbKt" +
- ], +
- "customFields": [], +
- "parentId": "", +
- "coverId": "", +
- "modifiedAt": "2023-09-13T09:18:50.272Z", +
- "description": "", +
- "requestedBy": "", +
- "assignedBy": "", +
- "members": [], +
- "assignees": [], +
- "subtaskSort": -1, +
- "type": "cardType-card", +
- "linkedId": "", +
- "vote":+
- "question": "", +
- "positive": [], +
- "negative": [], +
- "end": null, +
- "public": false, +
- "allowNonBoardMembers": false +
- }, +
- "poker":+
- "question": false, +
- "one": [], +
- "two": [], +
- "three": [], +
- "five": [], +
- "eight": [], +
- "thirteen": [], +
- "twenty": [], +
- "forty": [], +
- "oneHundred": [], +
- "unsure": [], +
- "end": null, +
- "allowNonBoardMembers": false +
- }, +
- "targetId_gantt": [], +
- "linkType_gantt": [], +
- "linkId_gantt": [], +
- "cardNumber":+
- }, +
-+
- "_id": "W7hZzbARTyRSASWf9", +
- "archived": false, +
- "createdAt": "2023-09-13T09:07:40.728Z", +
- "dateLastActivity": "2023-09-13T09:18:50.273Z", +
- "description": "https://wiki.fachinformatiker.schule/doku.php?id=guide:its11:pbx_mit_asterisk", +
- "listId": "fAcFYDCuxohtJJFRy", +
- "swimlaneId": "EmCvogNwNSXGXLeWN", +
- "sort": 0, +
- "title": "01.2 VoIP-PBX in Betrieb nehmen", +
- "userId": "XfB5mQfBf3feMeceF", +
- "isOvertime": false, +
- "startAt": null, +
- "dueAt": null, +
- "spentTime": null, +
- "labelIds":+
- "RbLyKq" +
- ], +
- "customFields": [], +
- "parentId": "", +
- "coverId": "", +
- "modifiedAt": "2023-09-13T09:18:50.272Z", +
- "requestedBy": "", +
- "assignedBy": "", +
- "members": [], +
- "assignees": [], +
- "subtaskSort": -1, +
- "type": "cardType-card", +
- "linkedId": "", +
- "vote":+
- "question": "", +
- "positive": [], +
- "negative": [], +
- "end": null, +
- "public": false, +
- "allowNonBoardMembers": false +
- }, +
- "poker":+
- "question": false, +
- "one": [], +
- "two": [], +
- "three": [], +
- "five": [], +
- "eight": [], +
- "thirteen": [], +
- "twenty": [], +
- "forty": [], +
- "oneHundred": [], +
- "unsure": [], +
- "end": null, +
- "allowNonBoardMembers": false +
- }, +
- "targetId_gantt": [], +
- "linkType_gantt": [], +
- "linkId_gantt": [], +
- "cardNumber":+
- }, +
-+
- "_id": "GJYAoxAoxfkY7nThQ", +
- "archived": false, +
- "createdAt": "2023-09-13T09:07:40.572Z", +
- "dateLastActivity": "2023-09-13T09:18:50.273Z", +
- "description": "Für diese Kompetenzkarte gibt es keine eigene Wiki-Seite. Verwende die dir bekannten Server und Telefon-Applikationen um VoIP-Verkehr zu erzeugen und zeichne diesen mit Hilfe von Wireshark auf. Versuche den Verkehr nach u. a. Gesichtspunkten zu analysieren.", +
- "listId": "Pzpg5HamWmeBWMttZ", +
- "swimlaneId": "EmCvogNwNSXGXLeWN", +
- "sort": 0, +
- "title": "01.3 VoIP-Troubleshooting", +
- "userId": "XfB5mQfBf3feMeceF", +
- "isOvertime": false, +
- "startAt": null, +
- "dueAt": null, +
- "spentTime": null, +
- "labelIds":+
- "a3KKBT" +
- ], +
- "customFields": [], +
- "parentId": "", +
- "coverId": "", +
- "modifiedAt": "2023-09-13T09:18:50.272Z", +
- "requestedBy": "", +
- "assignedBy": "", +
- "members": [], +
- "assignees": [], +
- "subtaskSort": -1, +
- "type": "cardType-card", +
- "linkedId": "", +
- "vote":+
- "question": "", +
- "positive": [], +
- "negative": [], +
- "end": null, +
- "public": false, +
- "allowNonBoardMembers": false +
- }, +
- "poker":+
- "question": false, +
- "one": [], +
- "two": [], +
- "three": [], +
- "five": [], +
- "eight": [], +
- "thirteen": [], +
- "twenty": [], +
- "forty": [], +
- "oneHundred": [], +
- "unsure": [], +
- "end": null, +
- "allowNonBoardMembers": false +
- }, +
- "targetId_gantt": [], +
- "linkType_gantt": [], +
- "linkId_gantt": [], +
- "cardNumber":+
- }, +
-+
- "_id": "zfRsdGYBiacj7Y9p8", +
- "archived": false, +
- "createdAt": "2023-09-13T09:07:40.437Z", +
- "dateLastActivity": "2023-09-13T09:18:50.273Z", +
- "description": "Bevor du dich mit den technischen Details beschäftigst, solltest du dir erst einmal vor Augen führen, wozu man VLAN einsetzt:\nhttps://wiki.fachinformatiker.schule/doku.php?id=guide:its11:vlan-einsatzmoeglichkeiten", +
- "listId": "M435iKAZGj2zb8nqC", +
- "swimlaneId": "QDtwTrc63AHcrymv9", +
- "sort": 0, +
- "title": "01.1 Einsatzmöglichkeiten für VLANs", +
- "userId": "XfB5mQfBf3feMeceF", +
- "isOvertime": false, +
- "startAt": null, +
- "dueAt": null, +
- "spentTime": null, +
- "labelIds":+
- "S4sbKt" +
- ], +
- "members": [], +
- "customFields": [], +
- "parentId": "", +
- "coverId": "", +
- "modifiedAt": "2023-09-13T09:18:50.272Z", +
- "requestedBy": "", +
- "assignedBy": "", +
- "assignees": [], +
- "subtaskSort": -1, +
- "type": "cardType-card", +
- "linkedId": "", +
- "vote":+
- "question": "", +
- "positive": [], +
- "negative": [], +
- "end": null, +
- "public": false, +
- "allowNonBoardMembers": false +
- }, +
- "poker":+
- "question": false, +
- "one": [], +
- "two": [], +
- "three": [], +
- "five": [], +
- "eight": [], +
- "thirteen": [], +
- "twenty": [], +
- "forty": [], +
- "oneHundred": [], +
- "unsure": [], +
- "end": null, +
- "allowNonBoardMembers": false +
- }, +
- "targetId_gantt": [], +
- "linkType_gantt": [], +
- "linkId_gantt": [], +
- "cardNumber":+
- }, +
-+
- "_id": "KX76cybdPJx4GLqMG", +
- "archived": false, +
- "createdAt": "2023-09-13T09:07:40.253Z", +
- "dateLastActivity": "2023-09-13T09:18:50.273Z", +
- "description": "https://wiki.fachinformatiker.schule/doku.php?id=guide:its11:switch_fuer_vlan_konfigurieren", +
- "listId": "M435iKAZGj2zb8nqC", +
- "swimlaneId": "QDtwTrc63AHcrymv9", +
- "sort": 1, +
- "title": "02.1 Switch für VLAN konfigurieren", +
- "userId": "XfB5mQfBf3feMeceF", +
- "isOvertime": false, +
- "startAt": null, +
- "dueAt": null, +
- "spentTime": null, +
- "labelIds":+
- "S4sbKt" +
- ], +
- "customFields": [], +
- "parentId": "", +
- "coverId": "", +
- "modifiedAt": "2023-09-13T09:18:50.272Z", +
- "requestedBy": "", +
- "assignedBy": "", +
- "members": [], +
- "assignees": [], +
- "subtaskSort": -1, +
- "type": "cardType-card", +
- "linkedId": "", +
- "vote":+
- "question": "", +
- "positive": [], +
- "negative": [], +
- "end": null, +
- "public": false, +
- "allowNonBoardMembers": false +
- }, +
- "poker":+
- "question": false, +
- "one": [], +
- "two": [], +
- "three": [], +
- "five": [], +
- "eight": [], +
- "thirteen": [], +
- "twenty": [], +
- "forty": [], +
- "oneHundred": [], +
- "unsure": [], +
- "end": null, +
- "allowNonBoardMembers": false +
- }, +
- "targetId_gantt": [], +
- "linkType_gantt": [], +
- "linkId_gantt": [], +
- "cardNumber":+
- }, +
-+
- "_id": "AXBxReCNRrnQ3SztH", +
- "archived": false, +
- "createdAt": "2023-09-13T09:07:40.154Z", +
- "dateLastActivity": "2023-09-13T09:18:50.273Z", +
- "description": "https://wiki.fachinformatiker.schule/doku.php?id=uebung:its11:vlan_trunk_ports", +
- "listId": "fAcFYDCuxohtJJFRy", +
- "swimlaneId": "QDtwTrc63AHcrymv9", +
- "sort": 0, +
- "title": "02.2 VLAN über mehrere Switches hinweg konfigurieren.", +
- "userId": "XfB5mQfBf3feMeceF", +
- "isOvertime": false, +
- "startAt": null, +
- "dueAt": null, +
- "spentTime": null, +
- "labelIds":+
- "RbLyKq" +
- ], +
- "customFields": [], +
- "parentId": "", +
- "coverId": "", +
- "modifiedAt": "2023-09-13T09:18:50.272Z", +
- "requestedBy": "", +
- "assignedBy": "", +
- "members": [], +
- "assignees": [], +
- "subtaskSort": -1, +
- "type": "cardType-card", +
- "linkedId": "", +
- "vote":+
- "question": "", +
- "positive": [], +
- "negative": [], +
- "end": null, +
- "public": false, +
- "allowNonBoardMembers": false +
- }, +
- "poker":+
- "question": false, +
- "one": [], +
- "two": [], +
- "three": [], +
- "five": [], +
- "eight": [], +
- "thirteen": [], +
- "twenty": [], +
- "forty": [], +
- "oneHundred": [], +
- "unsure": [], +
- "end": null, +
- "allowNonBoardMembers": false +
- }, +
- "targetId_gantt": [], +
- "linkType_gantt": [], +
- "linkId_gantt": [], +
- "cardNumber":+
- }, +
-+
- "_id": "85K3g7uRhw5AxJ2ze", +
- "archived": false, +
- "createdAt": "2023-09-13T09:07:39.918Z", +
- "dateLastActivity": "2023-09-13T09:18:50.273Z", +
- "description": "https://wiki.fachinformatiker.schule/doku.php?id=guide:its11:vlan-technische-grundlagen", +
- "listId": "fAcFYDCuxohtJJFRy", +
- "swimlaneId": "QDtwTrc63AHcrymv9", +
- "sort": -1, +
- "title": "01.2 technische Realisierung der VLAN-Technologie", +
- "userId": "XfB5mQfBf3feMeceF", +
- "isOvertime": false, +
- "startAt": null, +
- "dueAt": null, +
- "spentTime": null, +
- "labelIds":+
- "RbLyKq" +
- ], +
- "customFields": [], +
- "parentId": "", +
- "coverId": "", +
- "modifiedAt": "2023-09-13T09:18:50.272Z", +
- "requestedBy": "", +
- "assignedBy": "", +
- "members": [], +
- "assignees": [], +
- "subtaskSort": -1, +
- "type": "cardType-card", +
- "linkedId": "", +
- "vote":+
- "question": "", +
- "positive": [], +
- "negative": [], +
- "end": null, +
- "public": false, +
- "allowNonBoardMembers": false +
- }, +
- "poker":+
- "question": false, +
- "one": [], +
- "two": [], +
- "three": [], +
- "five": [], +
- "eight": [], +
- "thirteen": [], +
- "twenty": [], +
- "forty": [], +
- "oneHundred": [], +
- "unsure": [], +
- "end": null, +
- "allowNonBoardMembers": false +
- }, +
- "targetId_gantt": [], +
- "linkType_gantt": [], +
- "linkId_gantt": [], +
- "cardNumber":+
- }, +
-+
- "_id": "py4e3krthSj9YF272", +
- "archived": false, +
- "createdAt": "2023-09-13T09:07:39.874Z", +
- "dateLastActivity": "2023-09-13T09:18:50.273Z", +
- "description": "https://wiki.fachinformatiker.schule/doku.php?id=uebung:its11:vlan_traffic_analysieren", +
- "listId": "Pzpg5HamWmeBWMttZ", +
- "swimlaneId": "QDtwTrc63AHcrymv9", +
- "sort": 0, +
- "title": "01.3 VLAN-Traffic analysieren (Wireshark)", +
- "userId": "XfB5mQfBf3feMeceF", +
- "isOvertime": false, +
- "startAt": null, +
- "dueAt": null, +
- "spentTime": null, +
- "labelIds":+
- "a3KKBT" +
- ], +
- "customFields": [], +
- "parentId": "", +
- "coverId": "", +
- "modifiedAt": "2023-09-13T09:18:50.272Z", +
- "requestedBy": "", +
- "assignedBy": "", +
- "members": [], +
- "assignees": [], +
- "subtaskSort": -1, +
- "type": "cardType-card", +
- "linkedId": "", +
- "vote":+
- "question": "", +
- "positive": [], +
- "negative": [], +
- "end": null, +
- "public": false, +
- "allowNonBoardMembers": false +
- }, +
- "poker":+
- "question": false, +
- "one": [], +
- "two": [], +
- "three": [], +
- "five": [], +
- "eight": [], +
- "thirteen": [], +
- "twenty": [], +
- "forty": [], +
- "oneHundred": [], +
- "unsure": [], +
- "end": null, +
- "allowNonBoardMembers": false +
- }, +
- "targetId_gantt": [], +
- "linkType_gantt": [], +
- "linkId_gantt": [], +
- "cardNumber":+
- }, +
-+
- "_id": "bRcGso8nqA98yYD8L", +
- "archived": false, +
- "createdAt": "2023-09-13T09:07:39.819Z", +
- "dateLastActivity": "2023-09-13T09:18:50.273Z", +
- "listId": "Pzpg5HamWmeBWMttZ", +
- "swimlaneId": "QDtwTrc63AHcrymv9", +
- "sort": 1, +
- "title": "02.3 VLAN-Trunks mit mehreren Switch-Ports", +
- "userId": "XfB5mQfBf3feMeceF", +
- "isOvertime": false, +
- "startAt": null, +
- "dueAt": null, +
- "spentTime": null, +
- "labelIds":+
- "a3KKBT" +
- ], +
- "customFields": [], +
- "parentId": "", +
- "coverId": "", +
- "modifiedAt": "2023-09-13T09:18:50.272Z", +
- "description": "", +
- "requestedBy": "", +
- "assignedBy": "", +
- "members": [], +
- "assignees": [], +
- "subtaskSort": -1, +
- "type": "cardType-card", +
- "linkedId": "", +
- "vote":+
- "question": "", +
- "positive": [], +
- "negative": [], +
- "end": null, +
- "public": false, +
- "allowNonBoardMembers": false +
- }, +
- "poker":+
- "question": false, +
- "one": [], +
- "two": [], +
- "three": [], +
- "five": [], +
- "eight": [], +
- "thirteen": [], +
- "twenty": [], +
- "forty": [], +
- "oneHundred": [], +
- "unsure": [], +
- "end": null, +
- "allowNonBoardMembers": false +
- }, +
- "targetId_gantt": [], +
- "linkType_gantt": [], +
- "linkId_gantt": [], +
- "cardNumber":+
-+
- ], +
- "lists":+
-+
- "_id": "M435iKAZGj2zb8nqC", +
- "archived": false, +
- "createdAt": "2023-09-13T09:07:39.450Z", +
- "title": "Basis", +
- "sort": 0, +
- "starred": false, +
- "swimlaneId": "", +
- "updatedAt": "2023-09-13T09:18:50.422Z", +
- "modifiedAt": "2023-09-13T09:18:50.422Z", +
- "wipLimit":+
- "value": 1, +
- "enabled": false, +
- "soft": false +
- }, +
- "type": "list" +
- }, +
-+
- "_id": "fAcFYDCuxohtJJFRy", +
- "archived": false, +
- "createdAt": "2023-09-13T09:07:39.471Z", +
- "title": "Anwender", +
- "sort": 1, +
- "starred": false, +
- "swimlaneId": "", +
- "updatedAt": "2023-09-13T09:18:50.422Z", +
- "modifiedAt": "2023-09-13T09:18:50.422Z", +
- "wipLimit":+
- "value": 1, +
- "enabled": false, +
- "soft": false +
- }, +
- "type": "list" +
- }, +
-+
- "_id": "Pzpg5HamWmeBWMttZ", +
- "archived": false, +
- "createdAt": "2023-09-13T09:07:39.538Z", +
- "title": "Problemlöser", +
- "sort": 2, +
- "starred": false, +
- "swimlaneId": "", +
- "updatedAt": "2023-09-13T09:18:50.422Z", +
- "modifiedAt": "2023-09-13T09:18:50.422Z", +
- "wipLimit":+
- "value": 1, +
- "enabled": false, +
- "soft": false +
- }, +
- "type": "list" +
- }, +
-+
- "_id": "jaaLrJ8exb77TcLBB", +
- "archived": true, +
- "createdAt": "2023-09-13T09:07:39.606Z", +
- "title": "In Arbeit", +
- "sort": 3, +
- "starred": false, +
- "swimlaneId": "", +
- "updatedAt": "2023-09-13T09:18:50.422Z", +
- "modifiedAt": "2023-09-13T09:18:50.422Z", +
- "wipLimit":+
- "value": 1, +
- "enabled": false, +
- "soft": false +
- }, +
- "type": "list" +
- }, +
-+
- "_id": "z73g4th9D3kprfkiS", +
- "archived": true, +
- "createdAt": "2023-09-13T09:07:39.663Z", +
- "title": "Erledigt", +
- "sort": 4, +
- "starred": false, +
- "swimlaneId": "", +
- "updatedAt": "2023-09-13T09:18:50.422Z", +
- "modifiedAt": "2023-09-13T09:18:50.422Z", +
- "wipLimit":+
- "value": 1, +
- "enabled": false, +
- "soft": false +
- }, +
- "type": "list" +
-+
- ], +
- "swimlanes":+
-+
- "_id": "4sLSykGyRcWGMedzq", +
- "archived": false, +
- "createdAt": "2023-09-13T09:07:39.714Z", +
- "title": "Grundlagen", +
- "sort": 0, +
- "updatedAt": "2023-09-13T09:07:39.729Z", +
- "modifiedAt": "2023-09-13T09:07:39.729Z", +
- "type": "swimlane" +
- }, +
-+
- "_id": "zfjwabp6GptHM8BMw", +
- "archived": true, +
- "createdAt": "2023-09-13T09:07:39.741Z", +
- "title": "Segmentierung, Subnetting, CIDR", +
- "sort": 1, +
- "updatedAt": "2023-09-13T09:07:39.759Z", +
- "modifiedAt": "2023-09-13T09:07:39.759Z", +
- "type": "swimlane" +
- }, +
-+
- "_id": "QDtwTrc63AHcrymv9", +
- "archived": false, +
- "createdAt": "2023-09-13T09:07:39.769Z", +
- "title": "VLAN, ACL, Segmentierung und Subnetting, CIDR", +
- "sort": 4, +
- "updatedAt": "2023-09-13T09:07:39.773Z", +
- "modifiedAt": "2023-09-13T09:07:39.773Z", +
- "type": "swimlane" +
- }, +
-+
- "_id": "hA9GKokxEcaJ8sJ2T", +
- "archived": false, +
- "createdAt": "2023-09-13T09:07:39.775Z", +
- "title": "IPV6", +
- "sort": 3, +
- "updatedAt": "2023-09-13T09:07:39.776Z", +
- "modifiedAt": "2023-09-13T09:07:39.776Z", +
- "type": "swimlane" +
- }, +
-+
- "_id": "hyJ4anA3PnoSyYtAu", +
- "archived": true, +
- "createdAt": "2023-09-13T09:07:39.778Z", +
- "title": "Autorisierung und Authentifizierung", +
- "sort": 4, +
- "updatedAt": "2023-09-13T09:07:39.782Z", +
- "modifiedAt": "2023-09-13T09:07:39.782Z", +
- "type": "swimlane" +
- }, +
-+
- "_id": "73q8tWu73oczqaxrM", +
- "archived": false, +
- "createdAt": "2023-09-13T09:07:39.785Z", +
- "title": "Services", +
- "sort": 5, +
- "updatedAt": "2023-09-13T09:07:39.789Z", +
- "modifiedAt": "2023-09-13T09:07:39.789Z", +
- "type": "swimlane" +
- }, +
-+
- "_id": "SJdJaCmxcBjL3ARXy", +
- "archived": false, +
- "createdAt": "2023-09-13T09:07:39.791Z", +
- "title": "Kryptografie: Verschlüsselung, Hashfunktionen, Autorisierung und Authentifizierung", +
- "sort": 6, +
- "updatedAt": "2023-09-13T09:07:39.793Z", +
- "modifiedAt": "2023-09-13T09:07:39.793Z", +
- "type": "swimlane" +
- }, +
-+
- "_id": "EWaFL63KpqjCBPpJn", +
- "archived": false, +
- "createdAt": "2023-09-13T09:07:39.795Z", +
- "title": "VPN (IPSec, SSH, TLS)", +
- "sort": 7, +
- "updatedAt": "2023-09-13T09:07:39.796Z", +
- "modifiedAt": "2023-09-13T09:07:39.796Z", +
- "type": "swimlane" +
- }, +
-+
- "_id": "EmCvogNwNSXGXLeWN", +
- "archived": false, +
- "createdAt": "2023-09-13T09:07:39.798Z", +
- "title": "VoIP, QoS", +
- "sort": 8, +
- "updatedAt": "2023-09-13T09:07:39.799Z", +
- "modifiedAt": "2023-09-13T09:07:39.799Z", +
- "type": "swimlane" +
- }, +
-+
- "_id": "4mt8YsCZDoky3DBMc", +
- "archived": true, +
- "createdAt": "2023-09-13T09:07:39.802Z", +
- "title": "RADIUS, 2FA, LDAP", +
- "sort": 9, +
- "updatedAt": "2023-09-13T09:07:39.805Z", +
- "modifiedAt": "2023-09-13T09:07:39.805Z", +
- "type": "swimlane" +
- }, +
-+
- "_id": "wdAiwJwaScRwTpFyL", +
- "archived": false, +
- "createdAt": "2023-09-13T09:07:39.809Z", +
- "title": "Leitungsqualität", +
- "sort": 10, +
- "updatedAt": "2023-09-13T09:07:39.812Z", +
- "modifiedAt": "2023-09-13T09:07:39.812Z", +
- "type": "swimlane" +
-+
- ], +
- "activities": [], +
- "customFields": [], +
- "attachments": [], +
- "comments": [], +
- "rules":+
-+
- "_id": "HKuE6xWY8G7smFskN", +
- "title": "fertig Farbe", +
- "triggerId": "uvvJjtHtHyZweRziv", +
- "actionId": "6TfuBjcfxjfsAWSan", +
- "createdAt": "2023-09-13T09:08:03.707Z", +
- "modifiedAt": "2023-09-13T09:08:03.708Z" +
- }, +
-+
- "_id": "v8BtySz68BTGDjWf9", +
- "title": "fertig Label", +
- "triggerId": "DqK6sMj6uKzrRGz4k", +
- "actionId": "rJhz2EFasKbfPNxbJ", +
- "createdAt": "2023-09-13T09:08:03.728Z", +
- "modifiedAt": "2023-09-13T09:08:03.728Z" +
- }, +
-+
- "_id": "k4HqNoMBfFGPNTLDB", +
- "title": "unfertig Farbe", +
- "triggerId": "QQYBQ5Z3Kmj5Q6Krw", +
- "actionId": "sahAfEgyGJDFYZ2s8", +
- "createdAt": "2023-09-13T09:08:03.731Z", +
- "modifiedAt": "2023-09-13T09:08:03.731Z" +
- }, +
-+
- "_id": "38yuv4sf7XQyLQMya", +
- "title": "unfertig Label", +
- "triggerId": "hMkmiWWggnYGmpAWd", +
- "actionId": "ZE7aKvewuZ8LH7ABc", +
- "createdAt": "2023-09-13T09:08:03.734Z", +
- "modifiedAt": "2023-09-13T09:08:03.735Z" +
-+
- ], +
- "checklists":+
-+
- "_id": "cqaRmc2GyAthuFqpZ", +
- "cardId": "C2LbzSQGNnuXDA6MP", +
- "title": "Ich kann...", +
- "createdAt": "2023-09-13T09:07:49.776Z", +
- "sort": 1, +
- "modifiedAt": "2023-09-13T09:07:49.776Z" +
- }, +
-+
- "_id": "KR3vps7iWwDGu3r2N", +
- "cardId": "4gqLe6wS3KisAPDkr", +
- "title": "Ich kann...", +
- "createdAt": "2023-09-13T09:07:49.775Z", +
- "sort": 39, +
- "modifiedAt": "2023-09-13T09:07:49.775Z" +
- }, +
-+
- "_id": "qvLSo9nFTQJq2GtoS", +
- "cardId": "dAjTXTJqcRhMc9f6a", +
- "title": "Ich kann...", +
- "createdAt": "2023-09-13T09:07:49.774Z", +
- "sort": 38, +
- "modifiedAt": "2023-09-13T09:07:49.774Z" +
- }, +
-+
- "_id": "aYutGa2cmxTqESTxY", +
- "cardId": "tDqzrsqtojGwuFBxA", +
- "title": "Ich kann...", +
- "createdAt": "2023-09-13T09:07:49.772Z", +
- "sort": 37, +
- "modifiedAt": "2023-09-13T09:07:49.772Z" +
- }, +
-+
- "_id": "LyNdAhJvwxcg5753m", +
- "cardId": "aEX2fvNjyDRjCGK87", +
- "title": "Ich kann...", +
- "createdAt": "2023-09-13T09:07:49.771Z", +
- "sort": 36, +
- "modifiedAt": "2023-09-13T09:07:49.771Z" +
- }, +
-+
- "_id": "Yt7ZuS73sduXoZ7xy", +
- "cardId": "ZgRLZ2SQmwEmHwf2M", +
- "title": "Ich kann...", +
- "createdAt": "2023-09-13T09:07:49.769Z", +
- "sort": 35, +
- "modifiedAt": "2023-09-13T09:07:49.769Z" +
- }, +
-+
- "_id": "KFXLa9sWMiCe4xroi", +
- "cardId": "EyrjHmcPWyJH5iu5g", +
- "title": "Ich kann", +
- "createdAt": "2023-09-13T09:07:49.768Z", +
- "sort": 34, +
- "modifiedAt": "2023-09-13T09:07:49.768Z" +
- }, +
-+
- "_id": "AA7kWbjdt4SKPyiWh", +
- "cardId": "32ZBMXLmkfZWaHAgv", +
- "title": "Ich kann...", +
- "createdAt": "2023-09-13T09:07:49.766Z", +
- "sort": 33, +
- "modifiedAt": "2023-09-13T09:07:49.766Z" +
- }, +
-+
- "_id": "NjKnjT3FPKksgdSuv", +
- "cardId": "dkhrS3jkxCuT2zXnX", +
- "title": "Ich kann...", +
- "createdAt": "2023-09-13T09:07:49.765Z", +
- "sort": 32, +
- "modifiedAt": "2023-09-13T09:07:49.765Z" +
- }, +
-+
- "_id": "Wa5y2XDS8AG8eaZKz", +
- "cardId": "H62fLAs7QjD7zYv9o", +
- "title": "Ich kann...", +
- "createdAt": "2023-09-13T09:07:49.763Z", +
- "sort": 31, +
- "modifiedAt": "2023-09-13T09:07:49.763Z" +
- }, +
-+
- "_id": "kB8rAKk62oq9aLqh9", +
- "cardId": "Eq7xcPjrWzy7aBs9m", +
- "title": "Ich kann...", +
- "createdAt": "2023-09-13T09:07:49.761Z", +
- "sort": 30, +
- "modifiedAt": "2023-09-13T09:07:49.761Z" +
- }, +
-+
- "_id": "23a3wTfeP84bKuchL", +
- "cardId": "RrdzdWojBfMPFwQh2", +
- "title": "Ich kann...", +
- "createdAt": "2023-09-13T09:07:49.758Z", +
- "sort": 29, +
- "modifiedAt": "2023-09-13T09:07:49.758Z" +
- }, +
-+
- "_id": "L6543Zx5336rSvpuE", +
- "cardId": "3EapdQjSYiSAP7hzy", +
- "title": "Ich kann...", +
- "createdAt": "2023-09-13T09:07:49.753Z", +
- "sort": 28, +
- "modifiedAt": "2023-09-13T09:07:49.753Z" +
- }, +
-+
- "_id": "BYxPmuCLYwp7kWq9A", +
- "cardId": "LC6WXx8SsktyaN4Zz", +
- "title": "Ich kann...", +
- "createdAt": "2023-09-13T09:07:49.737Z", +
- "sort": 27, +
- "modifiedAt": "2023-09-13T09:07:49.737Z" +
- }, +
-+
- "_id": "f83NWeAKDE6ZTKGYe", +
- "cardId": "GNPaxDiwM9T4by4LC", +
- "title": "Ich kann...", +
- "createdAt": "2023-09-13T09:07:49.729Z", +
- "sort": 26, +
- "modifiedAt": "2023-09-13T09:07:49.729Z" +
- }, +
-+
- "_id": "YGct2D6dMiJnFi73S", +
- "cardId": "yhinc6cNqEYK5onzW", +
- "title": "Ich kann...", +
- "createdAt": "2023-09-13T09:07:49.728Z", +
- "sort": 25+
- "modifiedAt": "2023-09-13T09:07:49.728Z" +
- }, +
-+
- "_id": "ufHxbz86x8m7tXZ2t", +
- "cardId": "F5uKhSx66wwDSrzgn", +
- "title": "Ich kann...", +
- "createdAt": "2023-09-13T09:07:49.725Z", +
- "sort": 24, +
- "modifiedAt": "2023-09-13T09:07:49.725Z" +
- }, +
-+
- "_id": "bzy5qMznhicmzpNLH", +
- "cardId": "ZpQzTpz5Ad3yFxART", +
- "title": "Ich kann ...", +
- "createdAt": "2023-09-13T09:07:49.724Z", +
- "sort": 23, +
- "modifiedAt": "2023-09-13T09:07:49.724Z" +
- }, +
-+
- "_id": "P9htSyazjy7sW68cB", +
- "cardId": "Z8E6vGCuonzpkwSjv", +
- "title": "Ich kann...", +
- "createdAt": "2023-09-13T09:07:49.722Z", +
- "sort": 22, +
- "modifiedAt": "2023-09-13T09:07:49.722Z" +
- }, +
-+
- "_id": "JQt8noKGPdKF66iKk", +
- "cardId": "prkm4so6C36rGj3nR", +
- "title": "Ich kann ...", +
- "createdAt": "2023-09-13T09:07:49.720Z", +
- "sort": 21, +
- "modifiedAt": "2023-09-13T09:07:49.720Z" +
- }, +
-+
- "_id": "Xz8AjJanmSEwLvMfb", +
- "cardId": "FHHQKzaNsKdhpPoAq", +
- "title": "Ich kann ...", +
- "createdAt": "2023-09-13T09:07:49.716Z", +
- "sort": 20, +
- "modifiedAt": "2023-09-13T09:07:49.716Z" +
- }, +
-+
- "_id": "nxKjjzFpM26dMiPAE", +
- "cardId": "ZPfMYKGXgXswdF7GY", +
- "title": "Ich kann ...", +
- "createdAt": "2023-09-13T09:07:49.690Z", +
- "sort": 19, +
- "modifiedAt": "2023-09-13T09:07:49.691Z" +
- }, +
-+
- "_id": "Mz7MnLW6JbscmWrtE", +
- "cardId": "DzaL7cCnfQFKvGKZ5", +
- "title": "Ich kann ...", +
- "createdAt": "2023-09-13T09:07:49.679Z", +
- "sort": 18, +
- "modifiedAt": "2023-09-13T09:07:49.679Z" +
- }, +
-+
- "_id": "f2TfFDHbaG6J37e4D", +
- "cardId": "ZcpMmL6quGsKd9PS5", +
- "title": "Ich kann ...", +
- "createdAt": "2023-09-13T09:07:49.677Z", +
- "sort": 17, +
- "modifiedAt": "2023-09-13T09:07:49.677Z" +
- }, +
-+
- "_id": "qtRnt5tXrERM6kDKw", +
- "cardId": "iWbHXHe4QXAxjXWXe", +
- "title": "Ich kann ...", +
- "createdAt": "2023-09-13T09:07:49.675Z", +
- "sort": 16, +
- "modifiedAt": "2023-09-13T09:07:49.676Z" +
- }, +
-+
- "_id": "wi94Rbi44fA46QgDD", +
- "cardId": "jXRLQuqr7FYXSC2En", +
- "title": "Ich kann ...", +
- "createdAt": "2023-09-13T09:07:49.674Z", +
- "sort": 15, +
- "modifiedAt": "2023-09-13T09:07:49.674Z" +
- }, +
-+
- "_id": "yjyrCxYtecgnnhHJr", +
- "cardId": "gD4mYdFaNpRuwfAKQ", +
- "title": "Ich kann ...", +
- "createdAt": "2023-09-13T09:07:49.672Z", +
- "sort": 14, +
- "modifiedAt": "2023-09-13T09:07:49.672Z" +
- }, +
-+
- "_id": "SfAzvK6iyimn4sssT", +
- "cardId": "LisNL8zvENpAoDxQY", +
- "title": "Ich kann ...", +
- "createdAt": "2023-09-13T09:07:49.671Z", +
- "sort": 13, +
- "modifiedAt": "2023-09-13T09:07:49.671Z" +
- }, +
-+
- "_id": "zFhrbi2BFNSwe3o4x", +
- "cardId": "bAL8H7BiCzpQPaTud", +
- "title": "Ich kann ...", +
- "createdAt": "2023-09-13T09:07:49.667Z", +
- "sort": 12, +
- "modifiedAt": "2023-09-13T09:07:49.667Z" +
- }, +
-+
- "_id": "kfhM3ntzprmXnWp8Y", +
- "cardId": "iX83qJ6YLZ3MfXnCK", +
- "title": "Ich kann ...", +
- "createdAt": "2023-09-13T09:07:49.664Z", +
- "sort": 11, +
- "modifiedAt": "2023-09-13T09:07:49.664Z" +
- }, +
-+
- "_id": "a3P9PL65JtTtTdifm", +
- "cardId": "Th93hWD6EgJpurt3s", +
- "title": "Ich kann ...", +
- "createdAt": "2023-09-13T09:07:49.660Z", +
- "sort": 10, +
- "modifiedAt": "2023-09-13T09:07:49.660Z" +
- }, +
-+
- "_id": "3Eu4nijMqNfiDPPzk", +
- "cardId": "5DerDsG8ezbcnp9eL", +
- "title": "Ich kann ...", +
- "createdAt": "2023-09-13T09:07:49.635Z", +
- "sort": 9, +
- "modifiedAt": "2023-09-13T09:07:49.635Z" +
- }, +
-+
- "_id": "ExcrRCMyao5m47ypB", +
- "cardId": "kotQYZbMT82WdGLwk", +
- "title": "Ich kann ...", +
- "createdAt": "2023-09-13T09:07:49.629Z", +
- "sort": 8, +
- "modifiedAt": "2023-09-13T09:07:49.629Z" +
- }, +
-+
- "_id": "hnQNW2pGq3qH5Xz3G", +
- "cardId": "b5obF335HjBwcTocq", +
- "title": "Ich kann ...", +
- "createdAt": "2023-09-13T09:07:49.627Z", +
- "sort": 7, +
- "modifiedAt": "2023-09-13T09:07:49.627Z" +
- }, +
-+
- "_id": "J5X3waFc9ohdPKhgW", +
- "cardId": "W7hZzbARTyRSASWf9", +
- "title": "Ich kann ...", +
- "createdAt": "2023-09-13T09:07:49.626Z", +
- "sort": 6, +
- "modifiedAt": "2023-09-13T09:07:49.626Z" +
- }, +
-+
- "_id": "Qh5uC4gdJfPbTCpQn", +
- "cardId": "GJYAoxAoxfkY7nThQ", +
- "title": "Ich kann ...", +
- "createdAt": "2023-09-13T09:07:49.625Z", +
- "sort": 5, +
- "modifiedAt": "2023-09-13T09:07:49.625Z" +
- }, +
-+
- "_id": "cA2JECgGa6ptzzv8W", +
- "cardId": "zfRsdGYBiacj7Y9p8", +
- "title": "Ich kann ...", +
- "createdAt": "2023-09-13T09:07:49.623Z", +
- "sort": 4, +
- "modifiedAt": "2023-09-13T09:07:49.623Z" +
- }, +
-+
- "_id": "uaqiD4gSSycDGtG4R", +
- "cardId": "KX76cybdPJx4GLqMG", +
- "title": "Ich kann ...", +
- "createdAt": "2023-09-13T09:07:49.616Z", +
- "sort": 3, +
- "modifiedAt": "2023-09-13T09:07:49.616Z" +
- }, +
-+
- "_id": "JXXdNd2uPo9EBBGhF", +
- "cardId": "AXBxReCNRrnQ3SztH", +
- "title": "Ich kann ...", +
- "createdAt": "2023-09-13T09:07:49.592Z", +
- "sort": 2, +
- "modifiedAt": "2023-09-13T09:07:49.593Z" +
- }, +
-+
- "_id": "t4iqoxfc7XtKN3WRa", +
- "cardId": "85K3g7uRhw5AxJ2ze", +
- "title": "Ich kann ...", +
- "createdAt": "2023-09-13T09:07:49.580Z", +
- "sort": 1, +
- "modifiedAt": "2023-09-13T09:07:49.580Z" +
- }, +
-+
- "_id": "nSQN9P8J8e9G8vjGp", +
- "cardId": "py4e3krthSj9YF272", +
- "title": "Ich kann ...", +
- "createdAt": "2023-09-13T09:07:49.546Z", +
- "sort": 0, +
- "modifiedAt": "2023-09-13T09:07:49.546Z" +
-+
- ], +
- "checklistItems":+
-+
- "_id": "LEpocp7nffLCBZTJ7", +
- "title": "die Grundzüge von TCP-Verkehr erläutern", +
- "checklistId": "cqaRmc2GyAthuFqpZ", +
- "cardId": "C2LbzSQGNnuXDA6MP", +
- "sort": 1, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:08:02.818Z", +
- "modifiedAt": "2023-09-13T09:08:02.818Z" +
- }, +
-+
- "_id": "hi4tBZm9Wnjrm6GDF", +
- "title": "TCP-Verkehr live beobachten", +
- "checklistId": "KR3vps7iWwDGu3r2N", +
- "cardId": "4gqLe6wS3KisAPDkr", +
- "sort": 168, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:08:02.689Z", +
- "modifiedAt": "2023-09-13T09:08:02.689Z" +
- }, +
-+
- "_id": "JiPWrLNficrPTzqZK", +
- "title": "TCP-Verkehr zwischen zwei Hosts gezielt erzeugen", +
- "checklistId": "KR3vps7iWwDGu3r2N", +
- "cardId": "4gqLe6wS3KisAPDkr", +
- "sort": 1, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:08:02.747Z", +
- "modifiedAt": "2023-09-13T09:08:02.747Z" +
- }, +
-+
- "_id": "mZJootskTTCw6XQvz", +
- "title": "erklären wieso die Verbindung zu Port 1234 fehlgeschlagen ist.", +
- "checklistId": "qvLSo9nFTQJq2GtoS", +
- "cardId": "dAjTXTJqcRhMc9f6a", +
- "sort": 164, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:08:02.418Z", +
- "modifiedAt": "2023-09-13T09:08:02.418Z" +
- }, +
-+
- "_id": "NhgpHtLzoR8cxCohs", +
- "title": "erklären wieso die Verbindung zu Port 2345 fehlgeschlagen ist.", +
- "checklistId": "qvLSo9nFTQJq2GtoS", +
- "cardId": "dAjTXTJqcRhMc9f6a", +
- "sort": 1, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:08:02.478Z", +
- "modifiedAt": "2023-09-13T09:08:02.478Z" +
- }, +
-+
- "_id": "4CTtJxAbWxy5FqvYh", +
- "title": "erklären wieso die Verbindung zu Port 3456 fehlgeschlagen ist.", +
- "checklistId": "qvLSo9nFTQJq2GtoS", +
- "cardId": "dAjTXTJqcRhMc9f6a", +
- "sort": 2, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:08:02.552Z", +
- "modifiedAt": "2023-09-13T09:08:02.552Z" +
- }, +
-+
- "_id": "9TPGBcYZpAZx2E43i", +
- "title": "erklären wieso die Verbindung zu Port 4567 fehlgeschlagen ist.", +
- "checklistId": "qvLSo9nFTQJq2GtoS", +
- "cardId": "dAjTXTJqcRhMc9f6a", +
- "sort": 3, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:08:02.601Z", +
- "modifiedAt": "2023-09-13T09:08:02.602Z" +
- }, +
-+
- "_id": "XdKARh9PWPEGCMd2r", +
- "title": "die Grundzüge von UDP-Verkehr erläutern", +
- "checklistId": "aYutGa2cmxTqESTxY", +
- "cardId": "tDqzrsqtojGwuFBxA", +
- "sort": 163, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:08:02.349Z", +
- "modifiedAt": "2023-09-13T09:08:02.349Z" +
- }, +
-+
- "_id": "vqJi4pBbofnyeXn5e", +
- "title": "UDP-Verkehr live beobachten", +
- "checklistId": "LyNdAhJvwxcg5753m", +
- "cardId": "aEX2fvNjyDRjCGK87", +
- "sort": 161, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:08:02.235Z", +
- "modifiedAt": "2023-09-13T09:08:02.235Z" +
- }, +
-+
- "_id": "KFh9WQtrHnyAsvkkr", +
- "title": "UDP-Verkehr gezielt zwischen zwei Hosts erzeugen", +
- "checklistId": "LyNdAhJvwxcg5753m", +
- "cardId": "aEX2fvNjyDRjCGK87", +
- "sort": 1, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:08:02.301Z", +
- "modifiedAt": "2023-09-13T09:08:02.301Z" +
- }, +
-+
- "_id": "e2qhdG95ZkrZAh2fp", +
- "title": "offene Ports (Listening Ports) auf dem jeweiligen System überprüfen", +
- "checklistId": "Yt7ZuS73sduXoZ7xy", +
- "cardId": "ZgRLZ2SQmwEmHwf2M", +
- "sort": 158, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:08:02.013Z", +
- "modifiedAt": "2023-09-13T09:08:02.013Z" +
- }, +
-+
- "_id": "hN7ndkRsvDosT9ZNq", +
- "title": "verwendete Ports aktiver Verbindungen auf dem jeweiligen System überprüfen", +
- "checklistId": "Yt7ZuS73sduXoZ7xy", +
- "cardId": "ZgRLZ2SQmwEmHwf2M", +
- "sort": 1, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:08:02.103Z", +
- "modifiedAt": "2023-09-13T09:08:02.103Z" +
- }, +
-+
- "_id": "2wauuRPuzKpij44S6", +
- "title": "Wireshark verwenden um Netzwerkverkehr mitzuschneiden", +
- "checklistId": "Yt7ZuS73sduXoZ7xy", +
- "cardId": "ZgRLZ2SQmwEmHwf2M", +
- "sort": 2, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:08:02.176Z", +
- "modifiedAt": "2023-09-13T09:08:02.176Z" +
- }, +
-+
- "_id": "8aNYDk2XFoD6Znghd", +
- "title": "TCP- und UDP-Verkehr mit Hilfe von netcat (nc) erzeugen um mich bei der Fehlersuche zu unterstützen", +
- "checklistId": "KFXLa9sWMiCe4xroi", +
- "cardId": "EyrjHmcPWyJH5iu5g", +
- "sort": 156, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:08:01.798Z", +
- "modifiedAt": "2023-09-13T09:08:01.798Z" +
- }, +
-+
- "_id": "QBs5rkWFzhTiDrpnP", +
- "title": "Netzwerkmitschnitte in Wireshark auswerten um Fehler in der TCP- und UDP-Kommunikation zu identifizieren", +
- "checklistId": "KFXLa9sWMiCe4xroi", +
- "cardId": "EyrjHmcPWyJH5iu5g", +
- "sort": 1, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:08:01.927Z", +
- "modifiedAt": "2023-09-13T09:08:01.927Z" +
- }, +
-+
- "_id": "DG7kNK5piqRXchXHk", +
- "title": "tcpdump auf Rechnern mit Linux-Konsole verwenden um Netzwerkverkehr mitzuschneiden", +
- "checklistId": "AA7kWbjdt4SKPyiWh", +
- "cardId": "32ZBMXLmkfZWaHAgv", +
- "sort": 152, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:08:01.368Z", +
- "modifiedAt": "2023-09-13T09:08:01.368Z" +
- }, +
-+
- "_id": "mjTzcSsDGBp2BAtKk", +
- "title": "tcpdump-Mitschnitte in Wireshark analysieren", +
- "checklistId": "AA7kWbjdt4SKPyiWh", +
- "cardId": "32ZBMXLmkfZWaHAgv", +
- "sort": 1, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:08:01.479Z", +
- "modifiedAt": "2023-09-13T09:08:01.479Z" +
- }, +
-+
- "_id": "PQa5fMNDLHe3Xsfrh", +
- "title": "Wireshark-Filter und die Statistik-Übersichten in Wireshark für meine Analyse nutzen", +
- "checklistId": "AA7kWbjdt4SKPyiWh", +
- "cardId": "32ZBMXLmkfZWaHAgv", +
- "sort": 2, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:08:01.591Z", +
- "modifiedAt": "2023-09-13T09:08:01.591Z" +
- }, +
-+
- "_id": "b2Y8os6CW2Xbnronf", +
- "title": "einen Portscanner (z. B. nmap) verwenden um offene Ports auf entfernten Rechnern zu überprüfen", +
- "checklistId": "AA7kWbjdt4SKPyiWh", +
- "cardId": "32ZBMXLmkfZWaHAgv", +
- "sort": 3, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:08:01.694Z", +
- "modifiedAt": "2023-09-13T09:08:01.694Z" +
- }, +
-+
- "_id": "q4rES4AbCDHrNxgqG", +
- "title": "erläutern, wieso IPv6 dringend notwendig ist.", +
- "checklistId": "NjKnjT3FPKksgdSuv", +
- "cardId": "dkhrS3jkxCuT2zXnX", +
- "sort": 147, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:08:00.913Z", +
- "modifiedAt": "2023-09-13T09:08:00.913Z" +
- }, +
-+
- "_id": "FitPhyyL9yiMdqJpj", +
- "title": "die wesentlichen Vorteile von IPv6 gegenüber IPv4 nennen.", +
- "checklistId": "NjKnjT3FPKksgdSuv", +
- "cardId": "dkhrS3jkxCuT2zXnX", +
- "sort": 1, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:08:01.008Z", +
- "modifiedAt": "2023-09-13T09:08:01.008Z" +
- }, +
-+
- "_id": "Dy4jNZhqBurSAjrPt", +
- "title": "den Aufbau einer IPv6-Adresse erklären.", +
- "checklistId": "NjKnjT3FPKksgdSuv", +
- "cardId": "dkhrS3jkxCuT2zXnX", +
- "sort": 2, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:08:01.116Z", +
- "modifiedAt": "2023-09-13T09:08:01.116Z" +
- }, +
-+
- "_id": "4s56d9ws45JeNr9WF", +
- "title": "eine IPv6-Adresse von der Langform in die Kurzschreibweise überführen und umgekehrt.", +
- "checklistId": "NjKnjT3FPKksgdSuv", +
- "cardId": "dkhrS3jkxCuT2zXnX", +
- "sort": 3, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:08:01.187Z", +
- "modifiedAt": "2023-09-13T09:08:01.187Z" +
- }, +
-+
- "_id": "uGzwYfx5ghRiDNhH8", +
- "title": "die Begriffe Network Prefix und Interface Identifier in Bezug auf IPv6-Adressen erklären.", +
- "checklistId": "NjKnjT3FPKksgdSuv", +
- "cardId": "dkhrS3jkxCuT2zXnX", +
- "sort": 4, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:08:01.279Z", +
- "modifiedAt": "2023-09-13T09:08:01.279Z" +
- }, +
-+
- "_id": "Eet4PeZxBd9w26KTr", +
- "title": "erklären was eine IPv6-Global Unicast-Adresse ist.", +
- "checklistId": "Wa5y2XDS8AG8eaZKz", +
- "cardId": "H62fLAs7QjD7zYv9o", +
- "sort": 142, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:08:00.585Z", +
- "modifiedAt": "2023-09-13T09:08:00.585Z" +
- }, +
-+
- "_id": "n5TrEG4HdbEX9iBA5", +
- "title": "erklären, was eine IPv6-Link Local Unicast-Adresse ist.", +
- "checklistId": "Wa5y2XDS8AG8eaZKz", +
- "cardId": "H62fLAs7QjD7zYv9o", +
- "sort": 1, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:08:00.665Z", +
- "modifiedAt": "2023-09-13T09:08:00.665Z" +
- }, +
-+
- "_id": "dsBNjAhi9thcbcwMM", +
- "title": "erklären, was eine IPv6-Multicast-Adresse ist.", +
- "checklistId": "Wa5y2XDS8AG8eaZKz", +
- "cardId": "H62fLAs7QjD7zYv9o", +
- "sort": 2, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:08:00.703Z", +
- "modifiedAt": "2023-09-13T09:08:00.703Z" +
- }, +
-+
- "_id": "ErJYHpcyDJxoC24Kk", +
- "title": "nachschlagen, welche Teile des IPv6-Adressraumes für die drei oben genannten Adresstypen reserviert sind.", +
- "checklistId": "Wa5y2XDS8AG8eaZKz", +
- "cardId": "H62fLAs7QjD7zYv9o", +
- "sort": 3, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:08:00.765Z", +
- "modifiedAt": "2023-09-13T09:08:00.765Z" +
- }, +
-+
- "_id": "dsRSQNzZxPv6B3yFe", +
- "title": "die IPv6-Loopback-Adresse benennen.", +
- "checklistId": "Wa5y2XDS8AG8eaZKz", +
- "cardId": "H62fLAs7QjD7zYv9o", +
- "sort": 5, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:08:00.830Z", +
- "modifiedAt": "2023-09-13T09:08:00.830Z" +
- }, +
-+
- "_id": "Wxr9M4jPBdqSfBnxR", +
- "title": "die Bedeutung der Präfixlängenangabe (wie z. B. /48 oder /64) bei IPv6-Adressen erläutern.", +
- "checklistId": "kB8rAKk62oq9aLqh9", +
- "cardId": "Eq7xcPjrWzy7aBs9m", +
- "sort": 139, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:08:00.295Z", +
- "modifiedAt": "2023-09-13T09:08:00.295Z" +
- }, +
-+
- "_id": "FYNED6PLtXDSakuBs", +
- "title": "erläutern, was die Begriffe Site Prefix, Subnet ID und Interface ID bedeuten.", +
- "checklistId": "kB8rAKk62oq9aLqh9", +
- "cardId": "Eq7xcPjrWzy7aBs9m", +
- "sort": 1, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:08:00.368Z", +
- "modifiedAt": "2023-09-13T09:08:00.368Z" +
- }, +
-+
- "_id": "tuv4aSCvKNQAdDgdG", +
- "title": "für ein gegebenes Präfix (z. B. /52 oder /54) das kleinste und das größte darin enthaltene 64er-Präfix benennen.", +
- "checklistId": "kB8rAKk62oq9aLqh9", +
- "cardId": "Eq7xcPjrWzy7aBs9m", +
- "sort": 2, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:08:00.483Z", +
- "modifiedAt": "2023-09-13T09:08:00.483Z" +
- }, +
-+
- "_id": "fhizMH8KvXbhb6apj", +
- "title": "die Notwendigkeit von Präfix-Angaben kleiner als 64 begründen, obwohl IPv6-Netze stets ein 64er Präfix haben.", +
- "checklistId": "23a3wTfeP84bKuchL", +
- "cardId": "RrdzdWojBfMPFwQh2", +
- "sort": 136, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:08:00.085Z", +
- "modifiedAt": "2023-09-13T09:08:00.085Z" +
- }, +
-+
- "_id": "z7EtgyQJKeksXgxAr", +
- "title": "erläutern, wieso Präfixangaben in der Regel ein Vielfaches von 4 sind und wieso dies nützlich ist.", +
- "checklistId": "23a3wTfeP84bKuchL", +
- "cardId": "RrdzdWojBfMPFwQh2", +
- "sort": 1, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:08:00.149Z", +
- "modifiedAt": "2023-09-13T09:08:00.149Z" +
- }, +
-+
- "_id": "kAFCLKnvdKwGqSAg7", +
- "title": "einen gegebenen 48er Adressbereich entsprechend der genannten Anforderungen zu Anzahl und Größe der Subnetze in kleinere Subnetz-Bereiche unterteilen.", +
- "checklistId": "23a3wTfeP84bKuchL", +
- "cardId": "RrdzdWojBfMPFwQh2", +
- "sort": 2, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:08:00.228Z", +
- "modifiedAt": "2023-09-13T09:08:00.228Z" +
- }, +
-+
- "_id": "fhLEaxJxFWYs3vudR", +
- "title": "benennen wofür die Abkürzung SLAAC steht.", +
- "checklistId": "L6543Zx5336rSvpuE", +
- "cardId": "3EapdQjSYiSAP7hzy", +
- "sort": 130, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:59.643Z", +
- "modifiedAt": "2023-09-13T09:07:59.643Z" +
- }, +
-+
- "_id": "ksRB6YJNBx4YWaFHm", +
- "title": "benennen wofür die Abkürzung NDP steht.", +
- "checklistId": "L6543Zx5336rSvpuE", +
- "cardId": "3EapdQjSYiSAP7hzy", +
- "sort": 1, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:59.741Z", +
- "modifiedAt": "2023-09-13T09:07:59.741Z" +
- }, +
-+
- "_id": "NBusi2cgCFpBFQraS", +
- "title": "erklären was Neighbor Solicitation und Neighbor Advertisement sind.", +
- "checklistId": "L6543Zx5336rSvpuE", +
- "cardId": "3EapdQjSYiSAP7hzy", +
- "sort": 2, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:59.794Z", +
- "modifiedAt": "2023-09-13T09:07:59.794Z" +
- }, +
-+
- "_id": "B994FcFbqsznHC6a2", +
- "title": "erklären was Router Solicitation und Router Advertisement sind.", +
- "checklistId": "L6543Zx5336rSvpuE", +
- "cardId": "3EapdQjSYiSAP7hzy", +
- "sort": 3, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:59.882Z", +
- "modifiedAt": "2023-09-13T09:07:59.882Z" +
- }, +
-+
- "_id": "7m5CYyY2WWSDkooet", +
- "title": "erklären wie mittels SLAAC ein unkonfigurierter IPv6-fähiger Host zu einer Global Unicast-Adresse kommt.", +
- "checklistId": "L6543Zx5336rSvpuE", +
- "cardId": "3EapdQjSYiSAP7hzy", +
- "sort": 4, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:59.960Z", +
- "modifiedAt": "2023-09-13T09:07:59.960Z" +
- }, +
-+
- "_id": "4R3RvKKKuHQWhcSPA", +
- "title": "erklären wie die Konfiguration eines Hosts über DHCPv6 abläuft", +
- "checklistId": "L6543Zx5336rSvpuE", +
- "cardId": "3EapdQjSYiSAP7hzy", +
- "sort": 5, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:08:00.015Z", +
- "modifiedAt": "2023-09-13T09:08:00.015Z" +
- }, +
-+
- "_id": "At38gKSzyt6DbpFbs", +
- "title": "Informationen aus einem Neighbor Advertisement auswerten.", +
- "checklistId": "BYxPmuCLYwp7kWq9A", +
- "cardId": "LC6WXx8SsktyaN4Zz", +
- "sort": 5, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:59.210Z", +
- "modifiedAt": "2023-09-13T09:07:59.210Z" +
- }, +
-+
- "_id": "j56YnCTt8Ze6xW5Kf", +
- "title": "Informationen aus einem Router Advertisement auswerten.", +
- "checklistId": "BYxPmuCLYwp7kWq9A", +
- "cardId": "LC6WXx8SsktyaN4Zz", +
- "sort": 6, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:59.270Z", +
- "modifiedAt": "2023-09-13T09:07:59.270Z" +
- }, +
-+
- "_id": "rwDCXxPjn5spGcWCY", +
- "title": "DHCPv6-Verkehr identifizieren, analysieren und die enthaltenen Informationen daraus ableiten.", +
- "checklistId": "BYxPmuCLYwp7kWq9A", +
- "cardId": "LC6WXx8SsktyaN4Zz", +
- "sort": 7, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:59.363Z", +
- "modifiedAt": "2023-09-13T09:07:59.363Z" +
- }, +
-+
- "_id": "ehYu8hmcYsA7M5Jyk", +
- "title": "dafür sorgen, dass meine beiden Linux-Clients gültige IPv6 Global Unicast-Adressen aus dem richtigen Subnetz erhalten.", +
- "checklistId": "BYxPmuCLYwp7kWq9A", +
- "cardId": "LC6WXx8SsktyaN4Zz", +
- "sort": 8, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:59.430Z", +
- "modifiedAt": "2023-09-13T09:07:59.430Z" +
- }, +
-+
- "_id": "HJvRKfM6bheaYn5rb", +
- "title": "dafür sorgen, dass meine PFsense-VM auf dem WAN-Interface eine gültige IPv6-Konfiguration hat.", +
- "checklistId": "BYxPmuCLYwp7kWq9A", +
- "cardId": "LC6WXx8SsktyaN4Zz", +
- "sort": 9, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:59.518Z", +
- "modifiedAt": "2023-09-13T09:07:59.518Z" +
- }, +
-+
- "_id": "k6WjYr4LDpXznRqMa", +
- "title": "mit meinen Linux-VMs oden anderen aus meiner Klasse per IPv6 kommunizieren. (z. B. Webseite aufrufen oder SSH-Zugriff)", +
- "checklistId": "BYxPmuCLYwp7kWq9A", +
- "cardId": "LC6WXx8SsktyaN4Zz", +
- "sort": 10, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:59.564Z", +
- "modifiedAt": "2023-09-13T09:07:59.564Z" +
- }, +
-+
- "_id": "tKnxijtkp7nyhQC8d", +
- "title": "auf meiner PFsense eine Global Unicast Adresse für das LAN-Interface konfigurieren.", +
- "checklistId": "f83NWeAKDE6ZTKGYe", +
- "cardId": "GNPaxDiwM9T4by4LC", +
- "sort": 122, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:59.052Z", +
- "modifiedAt": "2023-09-13T09:07:59.052Z" +
- }, +
-+
- "_id": "Q5dJ6nqDaiASQsaaY", +
- "title": "auf meiner PFsense ein IPv6-Subnetz für mein LAN-Netzwerk konfigurieren.", +
- "checklistId": "f83NWeAKDE6ZTKGYe", +
- "cardId": "GNPaxDiwM9T4by4LC", +
- "sort": 1, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:59.127Z", +
- "modifiedAt": "2023-09-13T09:07:59.127Z" +
- }, +
-+
- "_id": "LdoqiubznPq5WNoci", +
- "title": "unter Windows DNS-Anfragen stellen.", +
- "checklistId": "YGct2D6dMiJnFi73S", +
- "cardId": "yhinc6cNqEYK5onzW", +
- "sort": 117, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:58.697Z", +
- "modifiedAt": "2023-09-13T09:07:58.697Z" +
- }, +
-+
- "_id": "5zDzAvJpr9kZv7ihd", +
- "title": "unter Linux DNS-Anfragen stellen.", +
- "checklistId": "YGct2D6dMiJnFi73S", +
- "cardId": "yhinc6cNqEYK5onzW", +
- "sort": 1, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:58.750Z", +
- "modifiedAt": "2023-09-13T09:07:58.750Z" +
- }, +
-+
- "_id": "NTmZQ4JDXpeQS4ZHs", +
- "title": "DNS-Anfragen stellen, die zu einem Hostnamen eine IPv4- oder IPv6-Adresse ermitteln.", +
- "checklistId": "YGct2D6dMiJnFi73S", +
- "cardId": "yhinc6cNqEYK5onzW", +
- "sort": 2, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:58.822Z", +
- "modifiedAt": "2023-09-13T09:07:58.822Z" +
- }, +
-+
- "_id": "bySwbBR9S77YS2TYx", +
- "title": "DNS-Anfragen stellen, die zu einer IP-Adresse einen Hostnamen ermitteln.", +
- "checklistId": "YGct2D6dMiJnFi73S", +
- "cardId": "yhinc6cNqEYK5onzW", +
- "sort": 3, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:58.900Z", +
- "modifiedAt": "2023-09-13T09:07:58.900Z" +
- }, +
-+
- "_id": "7SPjxtPGZPiFdtguG", +
- "title": "DNS-Anfragen stellen, die zu einem Domainnamen den zuständigen Name-Server und Mail Exchanger ermitteln.", +
- "checklistId": "YGct2D6dMiJnFi73S", +
- "cardId": "yhinc6cNqEYK5onzW", +
- "sort": 4, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:58.984Z", +
- "modifiedAt": "2023-09-13T09:07:58.984Z" +
- }, +
-+
- "_id": "A2RyD9FN2JsXAPjW3", +
- "title": "allgemein erklären, was ein Resource Record ist.", +
- "checklistId": "ufHxbz86x8m7tXZ2t", +
- "cardId": "F5uKhSx66wwDSrzgn", +
- "sort": 101, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:57.550Z", +
- "modifiedAt": "2023-09-13T09:07:57.550Z" +
- }, +
-+
- "_id": "gnDNQgBNDLthHhscC", +
- "title": "erklären, wie ein Resource Record aufgebaut ist.", +
- "checklistId": "ufHxbz86x8m7tXZ2t", +
- "cardId": "F5uKhSx66wwDSrzgn", +
- "sort": 1, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:57.661Z", +
- "modifiedAt": "2023-09-13T09:07:57.661Z" +
- }, +
-+
- "_id": "cWXvtpvEKY5B7g7Q3", +
- "title": "die Funktion eines A-Records erklären.", +
- "checklistId": "ufHxbz86x8m7tXZ2t", +
- "cardId": "F5uKhSx66wwDSrzgn", +
- "sort": 2, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:57.745Z", +
- "modifiedAt": "2023-09-13T09:07:57.745Z" +
- }, +
-+
- "_id": "J57JEoGcDas7xeDq3", +
- "title": "die Funktion eines AAAA-Records erklären.", +
- "checklistId": "ufHxbz86x8m7tXZ2t", +
- "cardId": "F5uKhSx66wwDSrzgn", +
- "sort": 3, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:57.814Z", +
- "modifiedAt": "2023-09-13T09:07:57.814Z" +
- }, +
-+
- "_id": "jS6NchNpq5iGgWnDN", +
- "title": "die Funktion eines PTR-Records erklären.", +
- "checklistId": "ufHxbz86x8m7tXZ2t", +
- "cardId": "F5uKhSx66wwDSrzgn", +
- "sort": 4, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:57.861Z", +
- "modifiedAt": "2023-09-13T09:07:57.861Z" +
- }, +
-+
- "_id": "9NxmBSmNyMRuNpfMr", +
- "title": "die Funktion eines NS-Records erklären.", +
- "checklistId": "ufHxbz86x8m7tXZ2t", +
- "cardId": "F5uKhSx66wwDSrzgn", +
- "sort": 5, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:57.920Z", +
- "modifiedAt": "2023-09-13T09:07:57.920Z" +
- }, +
-+
- "_id": "s3MAo8qEZ43qD36HX", +
- "title": "die Funktion eines MX-Records erklären.", +
- "checklistId": "ufHxbz86x8m7tXZ2t", +
- "cardId": "F5uKhSx66wwDSrzgn", +
- "sort": 6, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:57.981Z", +
- "modifiedAt": "2023-09-13T09:07:57.981Z" +
- }, +
-+
- "_id": "fkCskcjXoavo3HNNt", +
- "title": "die Funktion eines CNAME-Records erklären.", +
- "checklistId": "ufHxbz86x8m7tXZ2t", +
- "cardId": "F5uKhSx66wwDSrzgn", +
- "sort": 7, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:58.033Z", +
- "modifiedAt": "2023-09-13T09:07:58.033Z" +
- }, +
-+
- "_id": "togLErDoRrBg85TQ9", +
- "title": "erklären, was ein FQDN ist.", +
- "checklistId": "ufHxbz86x8m7tXZ2t", +
- "cardId": "F5uKhSx66wwDSrzgn", +
- "sort": 8, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:58.089Z", +
- "modifiedAt": "2023-09-13T09:07:58.089Z" +
- }, +
-+
- "_id": "MvkPn8Mp8yjDFca8h", +
- "title": "erklären, was ein Domain-Name ist.", +
- "checklistId": "ufHxbz86x8m7tXZ2t", +
- "cardId": "F5uKhSx66wwDSrzgn", +
- "sort": 9, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:58.164Z", +
- "modifiedAt": "2023-09-13T09:07:58.164Z" +
- }, +
-+
- "_id": "tKtrC83iHu68DEkjf", +
- "title": "erklären, was eine TLD ist.", +
- "checklistId": "ufHxbz86x8m7tXZ2t", +
- "cardId": "F5uKhSx66wwDSrzgn", +
- "sort": 10, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:58.237Z", +
- "modifiedAt": "2023-09-13T09:07:58.237Z" +
- }, +
-+
- "_id": "T4uinu4HsCqT7qbsE", +
- "title": "erklären, was eine Second-Level-Domain ist.", +
- "checklistId": "ufHxbz86x8m7tXZ2t", +
- "cardId": "F5uKhSx66wwDSrzgn", +
- "sort": 11, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:58.298Z", +
- "modifiedAt": "2023-09-13T09:07:58.298Z" +
- }, +
-+
- "_id": "bnsc8awMGKAx7Mz8P", +
- "title": "erklären, was DNS-Zonen sind.", +
- "checklistId": "ufHxbz86x8m7tXZ2t", +
- "cardId": "F5uKhSx66wwDSrzgn", +
- "sort": 12, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:58.390Z", +
- "modifiedAt": "2023-09-13T09:07:58.390Z" +
- }, +
-+
- "_id": "xnLSJnJwLgYgt3Ad5", +
- "title": "erklären, wie eine rekursive DNS-Abfrage abläuft.", +
- "checklistId": "ufHxbz86x8m7tXZ2t", +
- "cardId": "F5uKhSx66wwDSrzgn", +
- "sort": 13, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:58.481Z", +
- "modifiedAt": "2023-09-13T09:07:58.481Z" +
- }, +
-+
- "_id": "CJmff24Z4xEJiP2WJ", +
- "title": "erklären, was autoritativ im Zusammenhang mit DNS bedeutet.", +
- "checklistId": "ufHxbz86x8m7tXZ2t", +
- "cardId": "F5uKhSx66wwDSrzgn", +
- "sort": 12.5, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:58.563Z", +
- "modifiedAt": "2023-09-13T09:07:58.563Z" +
- }, +
-+
- "_id": "JK3owyCRvTComez76", +
- "title": "erklären, was Delegation im Zusammenhang mit DNS bedeutet.", +
- "checklistId": "ufHxbz86x8m7tXZ2t", +
- "cardId": "F5uKhSx66wwDSrzgn", +
- "sort": 12.75, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:58.622Z", +
- "modifiedAt": "2023-09-13T09:07:58.622Z" +
- }, +
-+
- "_id": "4rTvJ9Gywa5EzZJkP", +
- "title": "eine DNS-Server-Sorftware installieren, um darauf eine eigene DNS-Zone zu verwalten.", +
- "checklistId": "bzy5qMznhicmzpNLH", +
- "cardId": "ZpQzTpz5Ad3yFxART", +
- "sort": 94, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:56.949Z", +
- "modifiedAt": "2023-09-13T09:07:56.949Z" +
- }, +
-+
- "_id": "ELiiPwzKuMBmAcmNb", +
- "title": "festlegen, an wen mein DNS-Server Anfragen weiterleitet, die er selbst nicht beantworten kann.", +
- "checklistId": "bzy5qMznhicmzpNLH", +
- "cardId": "ZpQzTpz5Ad3yFxART", +
- "sort": 1, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:57.054Z", +
- "modifiedAt": "2023-09-13T09:07:57.054Z" +
- }, +
-+
- "_id": "kWn5NKcwz3RDF6vJp", +
- "title": "festlegen, ob und für wen mein DNS-Server für Anfragen zur Verfügung steht.", +
- "checklistId": "bzy5qMznhicmzpNLH", +
- "cardId": "ZpQzTpz5Ad3yFxART", +
- "sort": 2, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:57.129Z", +
- "modifiedAt": "2023-09-13T09:07:57.129Z" +
- }, +
-+
- "_id": "g6PdHRaM8RmjZSNXf", +
- "title": "festlegen, ob mein DNS-Server rekursive Abfragen für Clients durchführt und welche Clients dies sein dürfen.", +
- "checklistId": "bzy5qMznhicmzpNLH", +
- "cardId": "ZpQzTpz5Ad3yFxART", +
- "sort": 3, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:57.217Z", +
- "modifiedAt": "2023-09-13T09:07:57.217Z" +
- }, +
-+
- "_id": "xuFL5kkX8jSK2kujn", +
- "title": "eine eigene DNS-Zone auf meinem Server verwalten.", +
- "checklistId": "bzy5qMznhicmzpNLH", +
- "cardId": "ZpQzTpz5Ad3yFxART", +
- "sort": 4, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:57.293Z", +
- "modifiedAt": "2023-09-13T09:07:57.293Z" +
- }, +
-+
- "_id": "JwRtuhznzoWtMG4xM", +
- "title": "eine Subdomain aus meiner DNS-Zone an einen anderen DNS-Server delegieren.", +
- "checklistId": "bzy5qMznhicmzpNLH", +
- "cardId": "ZpQzTpz5Ad3yFxART", +
- "sort": 5, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:57.383Z", +
- "modifiedAt": "2023-09-13T09:07:57.383Z" +
- }, +
-+
- "_id": "pmpRwcS3gBLFcxyjs", +
- "title": "eine Sub-Zone, die ich von einem anderen DNS-Server delegiert bekommen habe, auf meinem DNS-Server verwalten.", +
- "checklistId": "bzy5qMznhicmzpNLH", +
- "cardId": "ZpQzTpz5Ad3yFxART", +
- "sort": 6, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:57.445Z", +
- "modifiedAt": "2023-09-13T09:07:57.445Z" +
- }, +
-+
- "_id": "5R97qRmeDnqrfyM2A", +
- "title": "den Ablauf einer normalen DHCP-Anforderung anhand der 4 Nachrichtentypen DISCOVER, OFFER, REQUEST und ACK beschreiben.", +
- "checklistId": "P9htSyazjy7sW68cB", +
- "cardId": "Z8E6vGCuonzpkwSjv", +
- "sort": 88, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:56.561Z", +
- "modifiedAt": "2023-09-13T09:07:56.561Z" +
- }, +
-+
- "_id": "joWxTxwEGZkj5vzxb", +
- "title": "die Ports herausfinden, die für die DHCP-Kommunikation unter IPv4 und IPv6 verwendet werden.", +
- "checklistId": "P9htSyazjy7sW68cB", +
- "cardId": "Z8E6vGCuonzpkwSjv", +
- "sort": -0.5, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:56.621Z", +
- "modifiedAt": "2023-09-13T09:07:56.621Z" +
- }, +
-+
- "_id": "HkbMajNKRswREeaTK", +
- "title": "erläutern welchen Zweck DHCP im Netzwerk zu erfüllen hat.", +
- "checklistId": "P9htSyazjy7sW68cB", +
- "cardId": "Z8E6vGCuonzpkwSjv", +
- "sort": -1, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:56.676Z", +
- "modifiedAt": "2023-09-13T09:07:56.676Z" +
- }, +
-+
- "_id": "f8aHj8pp5rC8foJFq", +
- "title": "die Adressen herausfinden, welche bei einer DHCP-Anforderung und -Zuteilung verwendet werden.", +
- "checklistId": "P9htSyazjy7sW68cB", +
- "cardId": "Z8E6vGCuonzpkwSjv", +
- "sort": -0.25, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:56.732Z", +
- "modifiedAt": "2023-09-13T09:07:56.732Z" +
- }, +
-+
- "_id": "pdHjHCbYPZLFu5KNf", +
- "title": "mindestens 4 verschiedene Informationen benennen, die einem DHCP-Client vom DHCP-Server bei einer Zuteilung zur Verfügung gestellt werden können.", +
- "checklistId": "P9htSyazjy7sW68cB", +
- "cardId": "Z8E6vGCuonzpkwSjv", +
- "sort": -0.125, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:56.781Z", +
- "modifiedAt": "2023-09-13T09:07:56.781Z" +
- }, +
-+
- "_id": "o7Y6gdYJJ7LhgDmKd", +
- "title": "erklären was die Lease-Dauer bei DHCP ist und wieso sie bei der Vergabe eines DHCP-Leases gesetzt wird.", +
- "checklistId": "P9htSyazjy7sW68cB", +
- "cardId": "Z8E6vGCuonzpkwSjv", +
- "sort": 1, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:56.870Z", +
- "modifiedAt": "2023-09-13T09:07:56.870Z" +
- }, +
-+
- "_id": "QRQ9TjAcpXgNnc5uf", +
- "title": "einen einfachen DHCP-Server installieren und in Betrieb nehmen.", +
- "checklistId": "JQt8noKGPdKF66iKk", +
- "cardId": "prkm4so6C36rGj3nR", +
- "sort": 84, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:56.204Z", +
- "modifiedAt": "2023-09-13T09:07:56.204Z" +
- }, +
-+
- "_id": "kBSCt4dBTKSqh7mho", +
- "title": "einen DHCP-Server so konfigurieren, dass er für ein von mir gewähltes Subnetz IPv4-Adressen und -Gatewayeinstellungen vergibt.", +
- "checklistId": "JQt8noKGPdKF66iKk", +
- "cardId": "prkm4so6C36rGj3nR", +
- "sort": 1, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:56.291Z", +
- "modifiedAt": "2023-09-13T09:07:56.291Z" +
- }, +
-+
- "_id": "3CygL5AtLEHQcTyhs", +
- "title": "einen DHCP-Server so konfigurieren, dass er für ein von mir gewähltes Subnetz spezifische Einstellungen für DNS und Lease-Time verwendet.", +
- "checklistId": "JQt8noKGPdKF66iKk", +
- "cardId": "prkm4so6C36rGj3nR", +
- "sort": 2, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:56.387Z", +
- "modifiedAt": "2023-09-13T09:07:56.387Z" +
- }, +
-+
- "_id": "AcJNHtRfjnK5aBpJ9", +
- "title": "einen DHCP-Server so konfigurieren, dass bestimmte Hosts anhand ihrer MAC-Adresse immer die gleiche IPv4-Adresse bekommen.", +
- "checklistId": "JQt8noKGPdKF66iKk", +
- "cardId": "prkm4so6C36rGj3nR", +
- "sort": 3, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:56.487Z", +
- "modifiedAt": "2023-09-13T09:07:56.487Z" +
- }, +
-+
- "_id": "AqTttGocc2QkK8r9T", +
- "title": "anhand eines Netzwerkmitschnittes herausfinden, mit welchen Adressen und Ports Client und Server bei einer DHCP-Anfrage miteinander kommunizieren.", +
- "checklistId": "Xz8AjJanmSEwLvMfb", +
- "cardId": "FHHQKzaNsKdhpPoAq", +
- "sort": 78, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:55.778Z", +
- "modifiedAt": "2023-09-13T09:07:55.778Z" +
- }, +
-+
- "_id": "dMrCZW9TfgtYCgDMX", +
- "title": "anhand eines Netzwerkmitschnittes bestimmen, ob alle notwendigen Schritte bei einer DHCP-Anfrage vorhanden sind, damit es zu einer erfolgreichen Adresszuteilung kommt.", +
- "checklistId": "Xz8AjJanmSEwLvMfb", +
- "cardId": "FHHQKzaNsKdhpPoAq", +
- "sort": 1, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:55.835Z", +
- "modifiedAt": "2023-09-13T09:07:55.835Z" +
- }, +
-+
- "_id": "NnGa3GpTB9bachFoS", +
- "title": "anhand eines Netzwerkmitschnittes bestimmen, welche DHCP-Parameter der Client beim DHCP-Server angefordert hat.", +
- "checklistId": "Xz8AjJanmSEwLvMfb", +
- "cardId": "FHHQKzaNsKdhpPoAq", +
- "sort": 2, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:55.923Z", +
- "modifiedAt": "2023-09-13T09:07:55.923Z" +
- }, +
-+
- "_id": "KofWSK7hzhHpLQaYZ", +
- "title": "anhand eines Netzwerkmitschnittes den Unterschied zwischen einem erstmaligen DHCP-Lease und einem DHCP-Release beschreiben.", +
- "checklistId": "Xz8AjJanmSEwLvMfb", +
- "cardId": "FHHQKzaNsKdhpPoAq", +
- "sort": 3, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:56.007Z", +
- "modifiedAt": "2023-09-13T09:07:56.007Z" +
- }, +
-+
- "_id": "EqDp6pRvcRvfAumFL", +
- "title": "in einem Netzwerkmitschnitt mit einer DHCP-NAK-Nachricht die Ursache für diese Nachricht identifizieren und erläutern.", +
- "checklistId": "Xz8AjJanmSEwLvMfb", +
- "cardId": "FHHQKzaNsKdhpPoAq", +
- "sort": 4, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:56.081Z", +
- "modifiedAt": "2023-09-13T09:07:56.081Z" +
- }, +
-+
- "_id": "Ww2LSTzvLHa9YrBzF", +
- "title": "in einem Fehlerszenario mit einer Ursache im Umfeld DHCP die Ursache identifizieren und einen Vorschlag zur Abhilfe machen.", +
- "checklistId": "Xz8AjJanmSEwLvMfb", +
- "cardId": "FHHQKzaNsKdhpPoAq", +
- "sort": 5, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:56.147Z", +
- "modifiedAt": "2023-09-13T09:07:56.147Z" +
- }, +
-+
- "_id": "FQH2fseAdLwezTYxE", +
- "title": "beschreiben, wie die Kommunikation zwischen Client und Server bei HTTP in Form von Request und Response abläuft.", +
- "checklistId": "nxKjjzFpM26dMiPAE", +
- "cardId": "ZPfMYKGXgXswdF7GY", +
- "sort": 71, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:55.324Z", +
- "modifiedAt": "2023-09-13T09:07:55.324Z" +
- }, +
-+
- "_id": "ZdHvp4qqWgXrY8oW4", +
- "title": "den Unterschied zwischen den beiden Request-Methoden GET und POST erläutern.", +
- "checklistId": "nxKjjzFpM26dMiPAE", +
- "cardId": "ZPfMYKGXgXswdF7GY", +
- "sort": 1, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:55.377Z", +
- "modifiedAt": "2023-09-13T09:07:55.377Z" +
- }, +
-+
- "_id": "grBXeSiS7trf5Ayet", +
- "title": "erläutern, wie Argumente bei HTTP-Requests übertragen werden.", +
- "checklistId": "nxKjjzFpM26dMiPAE", +
- "cardId": "ZPfMYKGXgXswdF7GY", +
- "sort": 2, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:55.444Z", +
- "modifiedAt": "2023-09-13T09:07:55.444Z" +
- }, +
-+
- "_id": "2aeTb7NPyZY4FPFyc", +
- "title": "den Zweck von HTTP-Status-Codes und die grundlegende Aufteilung in die 5 Untergruppen erklären.", +
- "checklistId": "nxKjjzFpM26dMiPAE", +
- "cardId": "ZPfMYKGXgXswdF7GY", +
- "sort": 3, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:55.500Z", +
- "modifiedAt": "2023-09-13T09:07:55.500Z" +
- }, +
-+
- "_id": "ESyENr7kbg82ocK9y", +
- "title": "mit Hilfe einer von mir gewählten Vorlage erläutern, wie sich HTTP über die verschiedenen Protokollversionen verändert hat.", +
- "checklistId": "nxKjjzFpM26dMiPAE", +
- "cardId": "ZPfMYKGXgXswdF7GY", +
- "sort": 4, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:55.599Z", +
- "modifiedAt": "2023-09-13T09:07:55.599Z" +
- }, +
-+
- "_id": "25jYSECsp6nGLt7r4", +
- "title": "benennen, worum es sich beim QUIC handelt.", +
- "checklistId": "nxKjjzFpM26dMiPAE", +
- "cardId": "ZPfMYKGXgXswdF7GY", +
- "sort": 5, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:55.670Z", +
- "modifiedAt": "2023-09-13T09:07:55.670Z" +
- }, +
-+
- "_id": "CthA3hWSFQunsWwFv", +
- "title": "die zwei gängigsten Webserver-Lösungen benennen.", +
- "checklistId": "nxKjjzFpM26dMiPAE", +
- "cardId": "ZPfMYKGXgXswdF7GY", +
- "sort": 6, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:55.728Z", +
- "modifiedAt": "2023-09-13T09:07:55.728Z" +
- }, +
-+
- "_id": "g6ZkLCvbeGReuHuu8", +
- "title": "einen Apache 2- oder nginx-Webserver installieren.", +
- "checklistId": "Mz7MnLW6JbscmWrtE", +
- "cardId": "DzaL7cCnfQFKvGKZ5", +
- "sort": 67, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:55.049Z", +
- "modifiedAt": "2023-09-13T09:07:55.049Z" +
- }, +
-+
- "_id": "awbJfbPKqfrbkuonT", +
- "title": "den Ort der Konfigurationsdateien ausfindig machen, falls ich etwas anpassen muss.", +
- "checklistId": "Mz7MnLW6JbscmWrtE", +
- "cardId": "DzaL7cCnfQFKvGKZ5", +
- "sort": 1, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:55.114Z", +
- "modifiedAt": "2023-09-13T09:07:55.114Z" +
- }, +
-+
- "_id": "ypCxNJ9kcqgf6usfQ", +
- "title": "eine eigene Webseite auf meinem Web-Server platzieren.", +
- "checklistId": "Mz7MnLW6JbscmWrtE", +
- "cardId": "DzaL7cCnfQFKvGKZ5", +
- "sort": 2, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:55.212Z", +
- "modifiedAt": "2023-09-13T09:07:55.212Z" +
- }, +
-+
- "_id": "CXnquqMtR6Adk88Zv", +
- "title": "die von mir erstellte Webseite im Browser aufrufen.", +
- "checklistId": "Mz7MnLW6JbscmWrtE", +
- "cardId": "DzaL7cCnfQFKvGKZ5", +
- "sort": 3, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:55.258Z", +
- "modifiedAt": "2023-09-13T09:07:55.258Z" +
- }, +
-+
- "_id": "FfCdMADzqrRuN2iXA", +
- "title": "den grundlegenden Unterschied zwischen Verschlüsselung und Passwortschutz erläutern.", +
- "checklistId": "f2TfFDHbaG6J37e4D", +
- "cardId": "ZcpMmL6quGsKd9PS5", +
- "sort": 61, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:54.453Z", +
- "modifiedAt": "2023-09-13T09:07:54.453Z" +
- }, +
-+
- "_id": "HCv6voa768TjgwnnH", +
- "title": "3 Anwendungsfälle für Verschlüsselung in unterschiedlichen Einsatzbereichen darlegen.", +
- "checklistId": "f2TfFDHbaG6J37e4D", +
- "cardId": "ZcpMmL6quGsKd9PS5", +
- "sort": 1, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:54.513Z", +
- "modifiedAt": "2023-09-13T09:07:54.513Z" +
- }, +
-+
- "_id": "Ffv5gLsJxnyeQ6uiq", +
- "title": "die grundsätzliche Funktionsweise von symmetrischen Verschlüsselungsverfahren erläutern.", +
- "checklistId": "f2TfFDHbaG6J37e4D", +
- "cardId": "ZcpMmL6quGsKd9PS5", +
- "sort": 2, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:54.607Z", +
- "modifiedAt": "2023-09-13T09:07:54.607Z" +
- }, +
-+
- "_id": "TBAcevsTbKQkHEyeX", +
- "title": "den entscheidenden Vorteil und den entscheidenden Nachteil beim Einsatz symmetrischer Verschlüsselung darlegen.", +
- "checklistId": "f2TfFDHbaG6J37e4D", +
- "cardId": "ZcpMmL6quGsKd9PS5", +
- "sort": 3, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:54.715Z", +
- "modifiedAt": "2023-09-13T09:07:54.715Z" +
- }, +
-+
- "_id": "JMPDf3QkbaXwSW8xu", +
- "title": "die grundsätzliche Funktionsweise von asymmetrischen Verschlüsselungsverfahren erläutern.", +
- "checklistId": "f2TfFDHbaG6J37e4D", +
- "cardId": "ZcpMmL6quGsKd9PS5", +
- "sort": 4, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:54.831Z", +
- "modifiedAt": "2023-09-13T09:07:54.831Z" +
- }, +
-+
- "_id": "eWNATFAGcZfYeg5Ne", +
- "title": "den entscheidenden Vorteil und den entscheidenden Nachteil beim Einsatz asymmetrischer Verschlüsselung darlegen.", +
- "checklistId": "f2TfFDHbaG6J37e4D", +
- "cardId": "ZcpMmL6quGsKd9PS5", +
- "sort": 5, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:54.904Z", +
- "modifiedAt": "2023-09-13T09:07:54.904Z" +
- }, +
-+
- "_id": "vjMzCBRPwmENzJ62C", +
- "title": "die grundsätzliche Funktionsweise von Hash-Verfahren erklären.", +
- "checklistId": "qtRnt5tXrERM6kDKw", +
- "cardId": "iWbHXHe4QXAxjXWXe", +
- "sort": 57, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:54.167Z", +
- "modifiedAt": "2023-09-13T09:07:54.167Z" +
- }, +
-+
- "_id": "h5hLYLEHmXLxfT4NS", +
- "title": "mindestens 3 zeitgemäße Hash-Verfahren und je einen typischen Einsatzzweck dafür benennen.", +
- "checklistId": "qtRnt5tXrERM6kDKw", +
- "cardId": "iWbHXHe4QXAxjXWXe", +
- "sort": 1, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:54.218Z", +
- "modifiedAt": "2023-09-13T09:07:54.218Z" +
- }, +
-+
- "_id": "XN9muNo9MPe5s84Kh", +
- "title": "2 noch im breiten Einsatz befindliche aber kryptografisch unsichere Hash-Verfahren benennen.", +
- "checklistId": "qtRnt5tXrERM6kDKw", +
- "cardId": "iWbHXHe4QXAxjXWXe", +
- "sort": 2, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:54.286Z", +
- "modifiedAt": "2023-09-13T09:07:54.286Z" +
- }, +
-+
- "_id": "EXsCZkX8HNGv8u9Ep", +
- "title": "mindestens 2 typische Einsatzszenarien für Hash-Verfahren benennen.", +
- "checklistId": "qtRnt5tXrERM6kDKw", +
- "cardId": "iWbHXHe4QXAxjXWXe", +
- "sort": 3, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:54.363Z", +
- "modifiedAt": "2023-09-13T09:07:54.363Z" +
- }, +
-+
- "_id": "QDP5Dn3JytjGgWEJY", +
- "title": "den Unterschied zwischen einem Site-to-Site-VPN und End-to-Site-VPN erkläutern.", +
- "checklistId": "wi94Rbi44fA46QgDD", +
- "cardId": "jXRLQuqr7FYXSC2En", +
- "sort": 50, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:53.609Z", +
- "modifiedAt": "2023-09-13T09:07:53.609Z" +
- }, +
-+
- "_id": "aqLWv4qFfumexLqLh", +
- "title": "den Unterschied zwischen Routed und Bridged VPN erläutern.", +
- "checklistId": "wi94Rbi44fA46QgDD", +
- "cardId": "jXRLQuqr7FYXSC2En", +
- "sort": 1, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:53.716Z", +
- "modifiedAt": "2023-09-13T09:07:53.716Z" +
- }, +
-+
- "_id": "Huupk3ahXpuAc6NY7", +
- "title": "IPsec im Kontext von VPN einordnen und dessen Vor- und Nachteile nennen.", +
- "checklistId": "wi94Rbi44fA46QgDD", +
- "cardId": "jXRLQuqr7FYXSC2En", +
- "sort": 5, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:53.793Z", +
- "modifiedAt": "2023-09-13T09:07:53.793Z" +
- }, +
-+
- "_id": "tEfue2rKgh8EPkm7o", +
- "title": "WireGuard im Kontext von VPN einordnen und dessen Vor- und Nachteile nennen.", +
- "checklistId": "wi94Rbi44fA46QgDD", +
- "cardId": "jXRLQuqr7FYXSC2En", +
- "sort": 3, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:53.863Z", +
- "modifiedAt": "2023-09-13T09:07:53.863Z" +
- }, +
-+
- "_id": "mE7vxrhdj4HfWjZsc", +
- "title": "OpenVPN im Kontext von VPN einordnen und dessen Vor- und Nachteile nennen.", +
- "checklistId": "wi94Rbi44fA46QgDD", +
- "cardId": "jXRLQuqr7FYXSC2En", +
- "sort": 4, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:53.922Z", +
- "modifiedAt": "2023-09-13T09:07:53.922Z" +
- }, +
-+
- "_id": "TCxYiLqAnfodW8cGJ", +
- "title": "die Herausforderungen beim Einsatz von VPN im Unternehmen benennen und erläutern.", +
- "checklistId": "wi94Rbi44fA46QgDD", +
- "cardId": "jXRLQuqr7FYXSC2En", +
- "sort": 6, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:54.009Z", +
- "modifiedAt": "2023-09-13T09:07:54.009Z" +
- }, +
-+
- "_id": "jJX2YFKjmg9ZijLyj", +
- "title": "PPTP im Kontext von VPN einordnen und dessen Nachteil nennen.", +
- "checklistId": "wi94Rbi44fA46QgDD", +
- "cardId": "jXRLQuqr7FYXSC2En", +
- "sort": 5.5, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:54.087Z", +
- "modifiedAt": "2023-09-13T09:07:54.087Z" +
- }, +
-+
- "_id": "33dtwjPr9Ho8XstF8", +
- "title": "einen VPN-Server einer VPN-Lösung meiner Wahl in Betrieb nehmen.", +
- "checklistId": "yjyrCxYtecgnnhHJr", +
- "cardId": "gD4mYdFaNpRuwfAKQ", +
- "sort": 47, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:53.302Z", +
- "modifiedAt": "2023-09-13T09:07:53.302Z" +
- }, +
-+
- "_id": "bWznND5THBMoXxgEo", +
- "title": "eine Verbindung von einem Client meiner Wahl zu diesem VPN-Server herstellen.", +
- "checklistId": "yjyrCxYtecgnnhHJr", +
- "cardId": "gD4mYdFaNpRuwfAKQ", +
- "sort": 1, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:53.390Z", +
- "modifiedAt": "2023-09-13T09:07:53.390Z" +
- }, +
-+
- "_id": "rmP6QzRJjwWpGfhPq", +
- "title": "die VPN-Verbindung nutzen, um darüber auf weitere Netze (Intranet oder Internet) zuzugreifen.", +
- "checklistId": "yjyrCxYtecgnnhHJr", +
- "cardId": "gD4mYdFaNpRuwfAKQ", +
- "sort": 2, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:53.492Z", +
- "modifiedAt": "2023-09-13T09:07:53.492Z" +
- }, +
-+
- "_id": "AdmRCzqjoq6dae4Sp", +
- "title": "erläutern, was man unter Authentifizierung versteht.", +
- "checklistId": "SfAzvK6iyimn4sssT", +
- "cardId": "LisNL8zvENpAoDxQY", +
- "sort": 44, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:53.114Z", +
- "modifiedAt": "2023-09-13T09:07:53.114Z" +
- }, +
-+
- "_id": "AiRbG2T8MD5nxFfMG", +
- "title": "erläutern, was man unter Autorisierung versteht.", +
- "checklistId": "SfAzvK6iyimn4sssT", +
- "cardId": "LisNL8zvENpAoDxQY", +
- "sort": 1, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:53.185Z", +
- "modifiedAt": "2023-09-13T09:07:53.185Z" +
- }, +
-+
- "_id": "RPpzvkcJBwGXqSatR", +
- "title": "ein Beispiel skizzieren, bei dem der Einsatz der beiden oben genannten Begriffe und die Abgrenzung zwischen Ihnen deutlich wird.", +
- "checklistId": "SfAzvK6iyimn4sssT", +
- "cardId": "LisNL8zvENpAoDxQY", +
- "sort": 2, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:53.236Z", +
- "modifiedAt": "2023-09-13T09:07:53.236Z" +
- }, +
-+
- "_id": "jYmSunZZz3WyeAzyQ", +
- "title": "erläutern, wie Public-Key-Verfahren dazu verwendet werden können, um in Kombination mit den entsprechenden infrastrukturellen Voraussetzungen zur Authentifizierung von Kommunikationspartnern verwendet werden können.", +
- "checklistId": "zFhrbi2BFNSwe3o4x", +
- "cardId": "bAL8H7BiCzpQPaTud", +
- "sort": 42, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:52.959Z", +
- "modifiedAt": "2023-09-13T09:07:52.959Z" +
- }, +
-+
- "_id": "pKp7jJmTuMWrRE7JL", +
- "title": "erläutern, wieso das \"I\" in \"PKI\" die größte Herausforderung für den Einsatz dieser Technologie darstellt.", +
- "checklistId": "zFhrbi2BFNSwe3o4x", +
- "cardId": "bAL8H7BiCzpQPaTud", +
- "sort": 1, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:53.037Z", +
- "modifiedAt": "2023-09-13T09:07:53.037Z" +
- }, +
-+
- "_id": "A8Wt8kMAPjgB4Foxx", +
- "title": "einen SSH-Server so konfigurieren, dass ich mich dort passwortlos mit Hilfe eines Zertifikats dort anmelden kann.", +
- "checklistId": "kfhM3ntzprmXnWp8Y", +
- "cardId": "iX83qJ6YLZ3MfXnCK", +
- "sort": 41, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:52.871Z", +
- "modifiedAt": "2023-09-13T09:07:52.871Z" +
- }, +
-+
- "_id": "MRWbQt9n6ooXjkP8v", +
- "title": "Zertifikate für die Verwendung mit einem Web-Server meiner Wahl erzeugen.", +
- "checklistId": "a3P9PL65JtTtTdifm", +
- "cardId": "Th93hWD6EgJpurt3s", +
- "sort": 38, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:52.641Z", +
- "modifiedAt": "2023-09-13T09:07:52.641Z" +
- }, +
-+
- "_id": "aYyjW6mRqkv8dDTtK", +
- "title": "einen Web-Server meiner Wahl für die Verwendung der von mir erzeugten Zertifikate konfigurieren.", +
- "checklistId": "a3P9PL65JtTtTdifm", +
- "cardId": "Th93hWD6EgJpurt3s", +
- "sort": 1, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:52.730Z", +
- "modifiedAt": "2023-09-13T09:07:52.730Z" +
- }, +
-+
- "_id": "Q8bojAmhy5XvWCWfL", +
- "title": "sichere, TLS-verschlüsselte Kommunikation mit dem von mir konfigurierten Web-Server aufnehmen.", +
- "checklistId": "a3P9PL65JtTtTdifm", +
- "cardId": "Th93hWD6EgJpurt3s", +
- "sort": 2, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:52.798Z", +
- "modifiedAt": "2023-09-13T09:07:52.798Z" +
- }, +
-+
- "_id": "NKhYTjSct2ap2QRSD", +
- "title": "erläutern, wie Hashwerte zur sicheren Speicherung von Passwortinformationen verwendet werden, um eine Passwortüberprüfung durchführen zu können.", +
- "checklistId": "3Eu4nijMqNfiDPPzk", +
- "cardId": "5DerDsG8ezbcnp9eL", +
- "sort": 35, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:52.442Z", +
- "modifiedAt": "2023-09-13T09:07:52.442Z" +
- }, +
-+
- "_id": "2jSesKTDSszSBcGy2", +
- "title": "ein Angriffsszenario auf passwortbasierte Authentifizierungsverfahren skizzieren, das auf dem Brechen von Hash-Werten basiert.", +
- "checklistId": "3Eu4nijMqNfiDPPzk", +
- "cardId": "5DerDsG8ezbcnp9eL", +
- "sort": 1, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:52.512Z", +
- "modifiedAt": "2023-09-13T09:07:52.512Z" +
- }, +
-+
- "_id": "wJBKvvFkmTEiWgn9W", +
- "title": "ein Passwort-Cracking-Tool einsetzen um das oben skizzierte Szenario als Proof of Concept umzusetzen.", +
- "checklistId": "3Eu4nijMqNfiDPPzk", +
- "cardId": "5DerDsG8ezbcnp9eL", +
- "sort": 2, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:52.573Z", +
- "modifiedAt": "2023-09-13T09:07:52.573Z" +
- }, +
-+
- "_id": "o8DaFSzp3b7W4XZvX", +
- "title": "mit einer VPN-Lösung meiner Wahl ein Site-to-Site-VPN mit funktionierendem Routing einrichten und nutzen.", +
- "checklistId": "ExcrRCMyao5m47ypB", +
- "cardId": "kotQYZbMT82WdGLwk", +
- "sort": 34, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:52.368Z", +
- "modifiedAt": "2023-09-13T09:07:52.368Z" +
- }, +
-+
- "_id": "wa8LTXjHE4LTwWwj2", +
- "title": "VoIP in seinen Grundzügen erklären und von der herkömmlichen Telefonie abgrenzen.", +
- "checklistId": "hnQNW2pGq3qH5Xz3G", +
- "cardId": "b5obF335HjBwcTocq", +
- "sort": 25, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:51.820Z", +
- "modifiedAt": "2023-09-13T09:07:51.820Z" +
- }, +
-+
- "_id": "qZb8YfAyTX6JuNJBc", +
- "title": "mindestens 3 Vorteile benennen und erläutern, die mit der Umstellung von herkömmlicher Telefonie auf SIP einhergehen.", +
- "checklistId": "hnQNW2pGq3qH5Xz3G", +
- "cardId": "b5obF335HjBwcTocq", +
- "sort": 1, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:51.881Z", +
- "modifiedAt": "2023-09-13T09:07:51.881Z" +
- }, +
-+
- "_id": "44jvwD6wAzPzqrSSz", +
- "title": "erklären, was ein Sprach- bzw. Audio-Codec ist und erklären, wie er bei VoIP eingesetzt wird.", +
- "checklistId": "hnQNW2pGq3qH5Xz3G", +
- "cardId": "b5obF335HjBwcTocq", +
- "sort": 2, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:51.949Z", +
- "modifiedAt": "2023-09-13T09:07:51.949Z" +
- }, +
-+
- "_id": "46G86TDMgx76bia4j", +
- "title": "erklären, wieso der Einsatz von QoS im Zusammenhang mit VoIP sinnvoll ist.", +
- "checklistId": "hnQNW2pGq3qH5Xz3G", +
- "cardId": "b5obF335HjBwcTocq", +
- "sort": 3, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:52.013Z", +
- "modifiedAt": "2023-09-13T09:07:52.013Z" +
- }, +
-+
- "_id": "coentA62ySZTkNHqm", +
- "title": "die für VoIP relevanten Protokolle und Standards (TCP, UDP, SIP, SDP, RTP, RTCP, G.711, G.723, G.729, H.323) identifizieren und ins Gesamtbild einordnen.", +
- "checklistId": "hnQNW2pGq3qH5Xz3G", +
- "cardId": "b5obF335HjBwcTocq", +
- "sort": 4, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:52.070Z", +
- "modifiedAt": "2023-09-13T09:07:52.070Z" +
- }, +
-+
- "_id": "M6KeMJYYRup2iguPX", +
- "title": "den Effekt von Verzögerungen im Netzwerk und deren Auswirkungen auf die Sprachqualität sowie den Zusammenhang mit dem Einsatz von UDP erläutern.", +
- "checklistId": "hnQNW2pGq3qH5Xz3G", +
- "cardId": "b5obF335HjBwcTocq", +
- "sort": 5, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:52.143Z", +
- "modifiedAt": "2023-09-13T09:07:52.143Z" +
- }, +
-+
- "_id": "SmexCqK7faRuyqmcQ", +
- "title": "den Ablauf eines VoIP-Telefonats mit Rufauf- und -abbau grob skizzieren und erläutern.", +
- "checklistId": "hnQNW2pGq3qH5Xz3G", +
- "cardId": "b5obF335HjBwcTocq", +
- "sort": 6, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:52.190Z", +
- "modifiedAt": "2023-09-13T09:07:52.190Z" +
- }, +
-+
- "_id": "pC8W2jDxKns7PodwD", +
- "title": "erklären, was ein Hard- und ein Soft-Phone ist.", +
- "checklistId": "hnQNW2pGq3qH5Xz3G", +
- "cardId": "b5obF335HjBwcTocq", +
- "sort": 7, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:52.259Z", +
- "modifiedAt": "2023-09-13T09:07:52.259Z" +
- }, +
-+
- "_id": "WA7zJTS2MAQubPnan", +
- "title": "den Begriff IP-PBX im Zusammenhang mit VoIP einordnen.", +
- "checklistId": "hnQNW2pGq3qH5Xz3G", +
- "cardId": "b5obF335HjBwcTocq", +
- "sort": 8, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:52.301Z", +
- "modifiedAt": "2023-09-13T09:07:52.301Z" +
- }, +
-+
- "_id": "3Lb7Hhv2BAS89eaeE", +
- "title": "meine eigene PBX in Form eines Asterisk-Servers installieren.", +
- "checklistId": "J5X3waFc9ohdPKhgW", +
- "cardId": "W7hZzbARTyRSASWf9", +
- "sort": 20, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:51.355Z", +
- "modifiedAt": "2023-09-13T09:07:51.355Z" +
- }, +
-+
- "_id": "6bvsRmRfmMRZSMwdu", +
- "title": "Benutzerkonten für mich und weitere Personen auf meiner PBX erstellen.", +
- "checklistId": "J5X3waFc9ohdPKhgW", +
- "cardId": "W7hZzbARTyRSASWf9", +
- "sort": 1, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:51.457Z", +
- "modifiedAt": "2023-09-13T09:07:51.457Z" +
- }, +
-+
- "_id": "37Ebnazgf4euHW6Fu", +
- "title": "Rufnummern für mich und weitere Konten in meinem Dialplan festlegen und Anrufe an diese Nummern durchführen.", +
- "checklistId": "J5X3waFc9ohdPKhgW", +
- "cardId": "W7hZzbARTyRSASWf9", +
- "sort": 2, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:51.573Z", +
- "modifiedAt": "2023-09-13T09:07:51.573Z" +
- }, +
-+
- "_id": "FJsQLEvb6HorGPEWF", +
- "title": "eine Rufnummer im Dialplan festlegen, die eine vorgefertigte Audio-Nachricht abspielt und diese Nachricht anhören.", +
- "checklistId": "J5X3waFc9ohdPKhgW", +
- "cardId": "W7hZzbARTyRSASWf9", +
- "sort": 3, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:51.666Z", +
- "modifiedAt": "2023-09-13T09:07:51.666Z" +
- }, +
-+
- "_id": "y8jATQEgdZbAq9dAE", +
- "title": "eine Rufnummer im Dialplan festlegen, unter der man einen Echo-Test-Anruf durchführen kann und diese Nummer verwenden.", +
- "checklistId": "J5X3waFc9ohdPKhgW", +
- "cardId": "W7hZzbARTyRSASWf9", +
- "sort": 4, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:51.765Z", +
- "modifiedAt": "2023-09-13T09:07:51.765Z" +
- }, +
-+
- "_id": "ktYgWj5jhXKXYsB9w", +
- "title": "VoIP-Verkehr mit Hilfe von Wireshark aufzeichnen.", +
- "checklistId": "Qh5uC4gdJfPbTCpQn", +
- "cardId": "GJYAoxAoxfkY7nThQ", +
- "sort": 14, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:50.860Z", +
- "modifiedAt": "2023-09-13T09:07:50.861Z" +
- }, +
-+
- "_id": "Yv4MoXpRDqhYR7TdG", +
- "title": "die Anrufsignalisierung (SIP) in Wireshark identifizieren und die Vorgänge (z. B. INVITE, TRYING, RINGING, etc.) nachvollziehen.", +
- "checklistId": "Qh5uC4gdJfPbTCpQn", +
- "cardId": "GJYAoxAoxfkY7nThQ", +
- "sort": 1, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:50.927Z", +
- "modifiedAt": "2023-09-13T09:07:50.927Z" +
- }, +
-+
- "_id": "5dmfxzZPyWZdiakML", +
- "title": "die SIP-Pakete identifizieren, in denen der SDP-Payload enthalten ist.", +
- "checklistId": "Qh5uC4gdJfPbTCpQn", +
- "cardId": "GJYAoxAoxfkY7nThQ", +
- "sort": 2, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:51.010Z", +
- "modifiedAt": "2023-09-13T09:07:51.010Z" +
- }, +
-+
- "_id": "6BASJ8Y2925Q2gHS5", +
- "title": "den Inhalt des SDP-Payloads analysieren und interpretieren, z. B. hinsichtlich verwendbarer Codecs und Identität der Gegenstelle.", +
- "checklistId": "Qh5uC4gdJfPbTCpQn", +
- "cardId": "GJYAoxAoxfkY7nThQ", +
- "sort": 3, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:51.090Z", +
- "modifiedAt": "2023-09-13T09:07:51.091Z" +
- }, +
-+
- "_id": "22becEhFd6jCs4KxC", +
- "title": "aufgezeichneten VoIP-Verkehr in Wireshark isolieren und das aufgezeichnete Gespräch abspielen.", +
- "checklistId": "Qh5uC4gdJfPbTCpQn", +
- "cardId": "GJYAoxAoxfkY7nThQ", +
- "sort": 4, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:51.190Z", +
- "modifiedAt": "2023-09-13T09:07:51.190Z" +
- }, +
-+
- "_id": "6v7DJ8vPLBBMr997B", +
- "title": "die oben genannten Kompetenzen einsetzen um Fehler bei der Verbindungsaufnahme oder der Medienübertragung zu identifizieren und analysieren.", +
- "checklistId": "Qh5uC4gdJfPbTCpQn", +
- "cardId": "GJYAoxAoxfkY7nThQ", +
- "sort": 5, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:51.284Z", +
- "modifiedAt": "2023-09-13T09:07:51.284Z" +
- }, +
-+
- "_id": "3sLsFb4YovZhpjAjd", +
- "title": "erläutern, wie man VLANs einsetzen kann, um die Anzahl an benötigten Geräten zu reduzieren, wenn man ein Netzwerk mit mehreren LAN-Segmenten betreibt.", +
- "checklistId": "cA2JECgGa6ptzzv8W", +
- "cardId": "zfRsdGYBiacj7Y9p8", +
- "sort": 11, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:50.622Z", +
- "modifiedAt": "2023-09-13T09:07:50.622Z" +
- }, +
-+
- "_id": "DaoJ2vwzRBDnvkT24", +
- "title": "erläutern, inwiefern es von Vorteil sein kann, wenn man auf mehreren im Gebäude verteilten Switches die gleichen VLANs einrichtet.", +
- "checklistId": "cA2JECgGa6ptzzv8W", +
- "cardId": "zfRsdGYBiacj7Y9p8", +
- "sort": 1, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:50.707Z", +
- "modifiedAt": "2023-09-13T09:07:50.707Z" +
- }, +
-+
- "_id": "HgaBkMR9yjXAtit8w", +
- "title": "die Begriffe Tagged VLAN und Trunk erklären und anhand eines Beispiels darlegen, wie diese Technik eingesetzt wird.", +
- "checklistId": "cA2JECgGa6ptzzv8W", +
- "cardId": "zfRsdGYBiacj7Y9p8", +
- "sort": 2, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:50.784Z", +
- "modifiedAt": "2023-09-13T09:07:50.784Z" +
- }, +
-+
- "_id": "zH4wGQv6rof9yzaKP", +
- "title": "auf einem unkonfigurierten Managed Switch über die serielle Konsole eine Grundkonfiguration vornehmen.", +
- "checklistId": "uaqiD4gSSycDGtG4R", +
- "cardId": "KX76cybdPJx4GLqMG", +
- "sort": 8, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:50.370Z", +
- "modifiedAt": "2023-09-13T09:07:50.370Z" +
- }, +
-+
- "_id": "q6YHcep4hiKuWrD8K", +
- "title": "über das CLI Switch Ports statisch einem VLAN zuordnen.", +
- "checklistId": "uaqiD4gSSycDGtG4R", +
- "cardId": "KX76cybdPJx4GLqMG", +
- "sort": 1, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:50.442Z", +
- "modifiedAt": "2023-09-13T09:07:50.442Z" +
- }, +
-+
- "_id": "nSb2RHre52DnG9qeo", +
- "title": "Endgeräte mit den konfigurierten Ports verbinden und überprüfen, dass die Trennung in VLANs tatsächlich funktioniert (Geräte sehen sich, bzw. sehen sich nicht).", +
- "checklistId": "uaqiD4gSSycDGtG4R", +
- "cardId": "KX76cybdPJx4GLqMG", +
- "sort": 2, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:50.556Z", +
- "modifiedAt": "2023-09-13T09:07:50.556Z" +
- }, +
-+
- "_id": "gT9wFbgXrZuRHo5Hs", +
- "title": "zwei Switches, auf denen ein bestimmtes VLAN konfiguriert ist, so miteinander verbinden, dass angeschlossene Hosts in diesem VLAN switchübergreifend kommunizieren können.", +
- "checklistId": "JXXdNd2uPo9EBBGhF", +
- "cardId": "AXBxReCNRrnQ3SztH", +
- "sort": 6, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:50.199Z", +
- "modifiedAt": "2023-09-13T09:07:50.199Z" +
- }, +
-+
- "_id": "Gxrc9isz5WageFFrQ", +
- "title": "die Verbindung zwischen den beiden Switches so gestalten, dass für die Übertragung mehrerer VLANs zwischen den Switches nur eine Netzwerkleitung benötigt wird (Trunk).", +
- "checklistId": "JXXdNd2uPo9EBBGhF", +
- "cardId": "AXBxReCNRrnQ3SztH", +
- "sort": 1, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:50.273Z", +
- "modifiedAt": "2023-09-13T09:07:50.273Z" +
- }, +
-+
- "_id": "eZFHjjJFWeN8vonMc", +
- "title": "erklären, was die VLAN-ID ist.", +
- "checklistId": "t4iqoxfc7XtKN3WRa", +
- "cardId": "85K3g7uRhw5AxJ2ze", +
- "sort": 2, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:49.904Z", +
- "modifiedAt": "2023-09-13T09:07:49.904Z" +
- }, +
-+
- "_id": "2BbJDLwEkjukmrWxX", +
- "title": "erklären, was ein VLAN-Tag (nach IEEE 802.1Q) ist.", +
- "checklistId": "t4iqoxfc7XtKN3WRa", +
- "cardId": "85K3g7uRhw5AxJ2ze", +
- "sort": 1, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:49.969Z", +
- "modifiedAt": "2023-09-13T09:07:49.969Z" +
- }, +
-+
- "_id": "z7HLuwQFEkq9JRAwp", +
- "title": "Aufbau und Funktionsweise des VLAN-Tags bei der Verarbeitung durch ein Netzwerkgerät erläutern.", +
- "checklistId": "t4iqoxfc7XtKN3WRa", +
- "cardId": "85K3g7uRhw5AxJ2ze", +
- "sort": 2, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:50.052Z", +
- "modifiedAt": "2023-09-13T09:07:50.052Z" +
- }, +
-+
- "_id": "k69X8WLvXzwRYntRs", +
- "title": "den Unterschied zwischen einem Tagged Port und einem Untagged Port an einem Switch erläutern.", +
- "checklistId": "t4iqoxfc7XtKN3WRa", +
- "cardId": "85K3g7uRhw5AxJ2ze", +
- "sort": 3, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:50.105Z", +
- "modifiedAt": "2023-09-13T09:07:50.105Z" +
- }, +
-+
- "_id": "ZGtMSHQKzCciMgXeT", +
- "title": "VLAN-getaggten Netzwerkverkehr an einen Switch mitschneiden.", +
- "checklistId": "nSQN9P8J8e9G8vjGp", +
- "cardId": "py4e3krthSj9YF272", +
- "sort": 0, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:49.778Z", +
- "modifiedAt": "2023-09-13T09:07:49.778Z" +
- }, +
-+
- "_id": "Eanc6kZviJhctrRxW", +
- "title": "VLAN-getaggten Netzwerkverkehr mit Hilfe von Wireshark analysieren und dabei die verwendeten VLANs und die beteiligten Kommunikationspartner identifizieren.", +
- "checklistId": "nSQN9P8J8e9G8vjGp", +
- "cardId": "py4e3krthSj9YF272", +
- "sort": 1, +
- "isFinished": false, +
- "createdAt": "2023-09-13T09:07:49.896Z", +
- "modifiedAt": "2023-09-13T09:07:49.896Z" +
-+
- ], +
- "subtaskItems": [], +
- "triggers":+
-+
- "_id": "uvvJjtHtHyZweRziv", +
- "activityType": "completeChecklist", +
- "checklistName": "*", +
- "desc": "wenn eine checkliste wird abgeschlossen  durch * ", +
- "userId": "*", +
- "createdAt": "2022-09-22T15:37:36.704Z", +
- "updatedAt": "2022-09-22T15:37:36.704Z" +
- }, +
-+
- "_id": "DqK6sMj6uKzrRGz4k", +
- "activityType": "completeChecklist", +
- "checklistName": "*", +
- "desc": "wenn eine checkliste wird abgeschlossen  durch * ", +
- "userId": "*", +
- "createdAt": "2022-09-22T15:37:57.256Z", +
- "updatedAt": "2022-09-22T15:37:57.256Z" +
- }, +
-+
- "_id": "QQYBQ5Z3Kmj5Q6Krw", +
- "activityType": "uncompleteChecklist", +
- "checklistName": "*", +
- "desc": "wenn eine checkliste wird unvollständig gemacht  durch * ", +
- "userId": "*", +
- "createdAt": "2022-09-22T15:38:17.180Z", +
- "updatedAt": "2022-09-22T15:38:17.180Z" +
- }, +
-+
- "_id": "hMkmiWWggnYGmpAWd", +
- "activityType": "uncompleteChecklist", +
- "checklistName": "*", +
- "desc": "wenn eine checkliste wird unvollständig gemacht  durch * ", +
- "userId": "*", +
- "createdAt": "2022-09-22T15:38:41.960Z", +
- "updatedAt": "2022-09-22T15:38:41.960Z" +
-+
- ], +
- "actions":+
-+
- "_id": "6TfuBjcfxjfsAWSan", +
- "actionType": "setColor", +
- "selectedColor": "green", +
- "desc": "farbe festlegen auf\ngrün ", +
- "createdAt": "2022-09-22T15:37:36.740Z", +
- "modifiedAt": "2022-09-22T15:37:36.740Z" +
- }, +
-+
- "_id": "rJhz2EFasKbfPNxbJ", +
- "actionType": "addLabel", +
- "labelId": "xpMvEE", +
- "desc": "hinzufügen label fertig ", +
- "createdAt": "2022-09-22T15:37:57.262Z", +
- "modifiedAt": "2022-09-22T15:37:57.262Z" +
- }, +
-+
- "_id": "sahAfEgyGJDFYZ2s8", +
- "actionType": "setColor", +
- "selectedColor": "white", +
- "desc": "farbe festlegen auf\nweiß ", +
- "createdAt": "2022-09-22T15:38:17.187Z", +
- "modifiedAt": "2022-09-22T15:38:17.187Z" +
- }, +
-+
- "_id": "ZE7aKvewuZ8LH7ABc", +
- "actionType": "removeLabel", +
- "labelId": "xpMvEE", +
- "desc": "entfernen label fertig ", +
- "createdAt": "2022-09-22T15:38:41.980Z", +
- "modifiedAt": "2022-09-22T15:38:41.980Z" +
-+
- ], +
- "users": [] +
-+
- +
-</file>+