f

0.0(0)
studied byStudied by 1 person
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/349

flashcard set

Earn XP

Description and Tags

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

350 Terms

1
New cards
Basic Troubleshooting Steps
1. Disconnect any new hardware (disconnect the device, restart Windows XP)
2. Search the Microsoft Knowledge Base (cop error message, visit site, write error message in "start" box, find article that will help)
3. Disable automatic restart on system failure (restart computer, press F8 key repeatedly while restarting, use arrow keys to select "disable automatic restart on system failure", press "enter")
4. Use system restore feature
2
New cards
Evaluate outcomes to determine whether problem was solved as intended and to determine needed follow-up actions
1. Restart, press F8 key, safe mode with command prompt, then run
3
New cards
Impact of changes that affect interfaces
Delay in audio
4
New cards
File Organization
Stored in hard drive. Accessibility can be maintained through a password or file permission in the form of permission bits, access control lists, or capabilities. Also can rely on encryption but an attacker can copy the data and use brute force to decrypt the data.
5
New cards
Naming Conventions for Networks, Files, Accounts, and Services
All files have a base file name and an optional extension, separated by a period. Use a backlash (\) to separate the components of a path. It divides the file name from the path to it. Use two periods (..) as a directory component in a path to represent the parent of the current directory (i.e. ..\temp.txt.)
6
New cards
Determine methods for increasing performance (balancing network load)
1. Balance load requests across the NLB cluster for individual TCP/IP services
2. Support up to 32 computers in a single cluster
3. Balance multiple server load requests (from either same client or several).
7
New cards
This balances network sessions like Web or email over multiple connections in order to spread out amount of bandwidth used by each LAN user, thus increasing total amount of bandwidth available

8
New cards
Role of Network Manager and Basic Principles of Network Management
Network Manager: responsible for installing and maintaining company's computer networks. Also, you must train staff to provide first rate technical support.
9
New cards
Basic Principles of Network Management:
Operation, administration, maintenance, and provisioning of networked systems. Essential to command and control practices and is generally carried out of a network operation center.
10
New cards
Procedures for Network Optimization and Tuning
Tuning:
1. Have enough physical memory to load InnoDB file
2. Avoid Swap at all costs (slows down)
3. Use battery-Backed RAM
4. Use advanced RAID (RAID 10 or higher)
5. Avoid RAID5
6. More disks that are fast
7. Smaler disks
8. Avoid software raids
11
New cards
Optimization:

1. Keep database trim
2. put indexes on data
3. archive old data
4. compress text and blob data types
5. check and optimize tables
6. use different storage engines for different needs
7. use linking tables rather than extending rows
8. make schema changes incrementally
9. use MySQL config file
12
New cards
Procedures for managing network assets
1. Identify assets in system.
2. Clean up information in the CMDB. Remove info that is obsolete or invalid. Ensure that all remaining info is accurate and complete
3. Create categories of asset models such as computers, servers, printers, and software.
4. Create asset models.
5. Create individual assets, such as hardware, consumables, and software licenses.
6. Manage assets by counting software licenses, viewing assets that are in stock, setting asset states and substates, and analyzing unallocated software.
13
New cards
Install and monitor server software applications
1. located installation program.
2. Follow installation wizard instructions.
3. Restart the server if it does not restart automatically
14
New cards
System Analysis and Bandwidth Optimization
Enables one to capture data from continuous streams of network traffic.
15
New cards
Perform Resource Management
1. Resource leveling- aims at smoothing stock of resources and reduce both excess inventories and shortages
2. Invest in resources as stored capabilities, then unleash them as demanded
3. Minimize cost as much as possible
16
New cards
Respond to system messages
Through adaptive server
17
New cards
Document actions taken (backups, virus prevention, software distribution)
How to backup: Bring to alternate medium (like blank CD-R or DVD-R). Store backups online or another location. Have a computer with RAID that makes backups as data changes to make sure data is protected and updated\=ongoing backup.
18
New cards
How to have virus protection: Download security software. Run scan after.

19
New cards
Software distribution:
Process of delivering software to end user. Include: floppy disks, compact disks, DVDs, HTTP and related protocols, etc. LANDesk Management Suite provides software distribution for Windows, OS X, and Linux.
20
New cards
Evaluate software activities and execute network diagnostic program for software and hardware
Software peer reviews (by author of product), software management reviews (by management representatives to evaluate status of work done), software audit reviews (by personnel external to software project).
21
New cards
Types of reviews:
\-code review (systematic examination) -pair programming (type of code review where two persons develop code together at same workstation) -inspection (formal type, reviewers follow well-defined process to find defects) -walkthrough (author leads members of development team. Participants ask questions and comments about defects) -Technical review (peer review in which team identifies discrepancies from specs and standards)
22
New cards
How resources are shared by setting up and admin rights (permissions and quotas)
Shared resource/network share is comp resource made available fro one host to another on comp networl. Most common protocols are TCP, UDP, NBT, and NBF.
23
New cards
Technical support and orientation to network system
System administrator offer technical support for projects
24
New cards
Configure Internet access for network
LAN provide internet access via upstream link to internet service provider, although internet speed is limited by upstream link.
25
New cards
Purpose of network services and protocols
Provides backbone services to Internet service provider (ISP). It provides dialup connectivity for their customers.
26
New cards
Identify/Monitor network perimeter
Rogue devices: (how to prevent on network) 1. create baseline inventory of wireless devices
2. classify all discovered devices and configure your tool
3. monitor your wireless and wired network for new devices
4. Stem potential damage during investigation
5. investigate new devices to determine threat
6. update device inventory to reflect outcome
27
New cards
how to monitor VPN connection: NPS server can be used to track remote access network usage and create log file for auditing and billing purposes. Also can use NAP/IAS API to program disconnections and modify users' dial-in session and permission with specified value.

28
New cards
Impact of modifying, adding, or removing network services
(using a DHCP for example)
adding benefits: can reconfigure entire IP address system without users noticing
negatives: all client systems need to be configured to use DHCP. if not, then they will not be able to access the network.
removed: significant impact on network users. All clients require valid IP address to get on network. So, if it is unavailable, each client system would need to be configured with a static IP address.
29
New cards
Design remote connectivity
WAN technologies and WAN transport media must be utilized. WAN remote access choices include cable and DSL technologies that are used with VPN.
30
New cards
Network cards and settings
Network card acts as interface between computer and network cable. Purpose is to prepare, send, and control data on network. Paths taken by data moving with a computer are called "buses"
31
New cards
Settings: IRQ:
network cards use IRQ3 and 5 I/O base address: each device must have a different address Memory address: designates a RAM location in computer. Use slot to buffer for data for entering and leaving.
32
New cards
Purpose/benefits of proxy service
Purpose:
-server that is in-between real server and application
-intercepts all requests to real server
33
New cards
Benefits:
-network pass through proxy and it can alter
-replace user agent
-accept all cookies (bit not pass them to you)
-proxy connects to server, not you, so your IP is not disclosed
-set up to work system-wide, so systems cannot bypass it

34
New cards
Emerging networks and technologies
MPTCP (can use different connection paths). Can also break mostly every security control.
35
New cards
Configure VLAN to map an IP network
Admins often configure CLAN to map IP network which gives it the appearance of involving :ayer 3 (the network layer)
36
New cards
Tracking/monitoring of VLAN

37
New cards
MAC or DAC (security controls)
Types of access control by which operating system constrains ability of subject to access or perform operation on object or target.
38
New cards
Common Routing Protocols
How routers communicate with one another (routed protocols examples are IP and IPX).
Three major classes: Interior gateway protocols type 1, type 2, and exterior gateway protocols
39
New cards
Windows NT
Which network operating system was developed from the VMS platform?
40
New cards
UNIX
Which operating system was originally developed by Bell Labs and has multitasking, multiuser, and built in networking capabilities?
41
New cards
Novell NetWare
Which of the following are network operating systems and not simply operating systems that will communicate on a network?
42
New cards
Protocol
What do networks use to communicate with each other that is sometimes known as a language that networked computers use?
43
New cards
IPX
Which network protocol was developed by Novell for use in its network operating system?
44
New cards
TCP/IP
Which protocol is used on the Internet to give each computer a unique address?
45
New cards
Disk Duplexing
When multiple disk controllers are used in a drive mirroring scenario, it is known as which of the following?
46
New cards
Data Transmission
Which of the following is NOT a layer in the OSI model?
47
New cards
RJ-45
Which of the following is NOT a common type of medium used in networking?
48
New cards
185 Meters
What is the distance limitation on 10Base2, or Thinnet?
49
New cards
Full Duplex
When data is able to travel in both directions on a cable, it is known as which of the following?
50
New cards
Peer-to-Peer
In what type of network is there no dedicated server and each mode on the network is an equal resource for sharing and receiving information?
51
New cards
Gateway
In order for differing networks to communicate with each other, we need to use which of the following to translate between the networks?
52
New cards
Passive
Which of the following types of hubs does NOT regenerate the signal when transmitting over the normal specified distance?
53
New cards
Repeater
What network component is used to extend the distance of the signal when transmitting over the normal specified distance?
54
New cards
DMA
Which of the following must be set to enable a device to directly access memory on the system, without the CPU's intervention.
55
New cards
Erasable Programmable Read Only Memory
What does EPROM stand for?
56
New cards
.C.G.
If you are configuring a NIC in DOS, which of the following is the most likely extension for the file that determines the settings for the interface card?
57
New cards
Add a network card that has a remote boot PROM chip
If you have a workstation that has no diskette drive or hard drive and you want to put the workstation on your network, what do you have to do?
58
New cards
A 15-pin D female connector
What is an AUI connector?
59
New cards
Switching Hub
What type of network component enables each device to have the full bandwidth of the medium when transmitting?
60
New cards
Multistation Access Unit
What does MAU stand for?
61
New cards
Hybrid
What type of hub enables more than one type of cable or media to connect to it?
62
New cards
The route with the fewest number of hops will be used
What will happen if we have a routing table with the same route to the same destination network?
63
New cards
They cannot be configured with static routes
Which of the following is NOT true regarding dynamic routers?
64
New cards
The packet will not be sent
What will happen if the default gateway is not specified on your computer and you try to reach another network?
65
New cards
It is responsible for encrypting session information
Which of the following is NOT true of the transport layer of the OSI model?
66
New cards
Datagrams
Which of the following is NOT a characteristic of connection-oriented communication?
67
New cards
Connection-oriented data transfer is NOT quicker than connectionless-oriented data transfer
Why is connection-oriented data delivery faster?
68
New cards
A bulletin board and an answering machine
Which of the following are the best examples of a mailslot?
69
New cards
NetBIOS
The LMHOSTS file is a static file to resolve what types of names?
70
New cards
ARP
Which utility can be used to display and modify the table that maintains the TCP/IP address to Mac address translation?
71
New cards
ARP
Which protocols do NOT have statistics available with the Netstat utility?
72
New cards
Telnet
Which utility enables you to execute console commands remotely at a virtual terminal?
73
New cards
NBTSTAT
Which protocol uses a 16-character name, with the last digit reserved as a resource identifier?
74
New cards
NBTSTAT
Which utility can be used to troubleshoot NetBIOS over TCP/IP connectivity issues?
75
New cards
-c
Which NBTSTAT switch enables you to display the computer's local NetBT name cache?
76
New cards
Broadcast and WINS server
In what ways can a computer with a NetBIOS name register its services on the network?
77
New cards
Tracert
Which utility is used to determine the path that data takes during transport to a remote host?
78
New cards
Netstat
Which utility is used to display TCP/IP specific protocol and interface statistics?
79
New cards
FTP
Which utility is used to facilitate file transfers between two remote hosts?
80
New cards
Ping
Which utility is used to verify network connectivity of a remote host?
81
New cards
NSLOOKUP
Which utility is used to verify the DNA database on a DNS server?
82
New cards
IPX
Which network layer protocols can Serial Line Internet Protocol use during a dial-up session?
83
New cards
network control protocol and link control protocol
Which components are part of Point-to-Point Protocol?
84
New cards
CHAP and PAP
Which forms of validation can PPP use to authenticate users against a remote server?
85
New cards
NI-1
What was the first Integrated Services Digital Network standard to be published by the ITU?
86
New cards
20
How many B channels are available in a typical ISDN PRI?
87
New cards
NetWare Connect, Point-to-Point Protocol, and Serial Line Internet Protocol
What line protocols are available with Microsoft's Dial Up Networking?
88
New cards
3
What is the default IRQ setting for COM2?
89
New cards
V.42
Which modem standard defines error-checking standards?
90
New cards
RDP and ICA
What two terminal service protocols can be used in terminal services environment?
91
New cards
Circuit
Which switching technology is used by the telephone company?
92
New cards
Analog
How are the signals sent on an ATM network?
93
New cards
1
How many streams does the SONET network transfer?
94
New cards
Scrambler
What can be used in a SONET network to allow user's data to remain private?
95
New cards
192
What is the highest OC level?
96
New cards
By the protocol used
How is error checking managed on a Frame Relay network?
97
New cards
A portion of the primary ring that has not failed, and a part of the secondary ring that is equal to the primary ring that has not failed
If the primary ring fails, what is used for redundancy?
98
New cards
24
How many channels make up a TI?
99
New cards
Local Security Authority (LSA)
What portion of the Windows NT security subsystem handles both local security policies and user authentication, and generates audit log messages?
100
New cards
Discretionary Access Control List (DACL)
What access control object determines what users and groups have permission to this object?