Basic Troubleshooting Steps
Disconnect any new hardware (disconnect the device, restart Windows XP)
Search the Microsoft Knowledge Base (cop error message, visit site, write error message in "start" box, find article that will help)
Disable automatic restart on system failure (restart computer, press F8 key repeatedly while restarting, use arrow keys to select "disable automatic restart on system failure", press "enter")
Use system restore feature
Evaluate outcomes to determine whether problem was solved as intended and to determine needed follow-up actions
Restart, press F8 key, safe mode with command prompt, then run
Impact of changes that affect interfaces
Delay in audio
File Organization
Stored in hard drive. Accessibility can be maintained through a password or file permission in the form of permission bits, access control lists, or capabilities. Also can rely on encryption but an attacker can copy the data and use brute force to decrypt the data.
Naming Conventions for Networks, Files, Accounts, and Services
All files have a base file name and an optional extension, separated by a period. Use a backlash () to separate the components of a path. It divides the file name from the path to it. Use two periods (..) as a directory component in a path to represent the parent of the current directory (i.e. ..\temp.txt.)
Determine methods for increasing performance (balancing network load)
Balance load requests across the NLB cluster for individual TCP/IP services
Support up to 32 computers in a single cluster
Balance multiple server load requests (from either same client or several).
This balances network sessions like Web or email over multiple connections in order to spread out amount of bandwidth used by each LAN user, thus increasing total amount of bandwidth available
Role of Network Manager and Basic Principles of Network Management
Network Manager: responsible for installing and maintaining company's computer networks. Also, you must train staff to provide first rate technical support.
Basic Principles of Network Management:
Operation, administration, maintenance, and provisioning of networked systems. Essential to command and control practices and is generally carried out of a network operation center.
Procedures for Network Optimization and Tuning
Tuning:
Have enough physical memory to load InnoDB file
Avoid Swap at all costs (slows down)
Use battery-Backed RAM
Use advanced RAID (RAID 10 or higher)
Avoid RAID5
More disks that are fast
Smaler disks
Avoid software raids
Optimization:
Keep database trim
put indexes on data
archive old data
compress text and blob data types
check and optimize tables
use different storage engines for different needs
use linking tables rather than extending rows
make schema changes incrementally
use MySQL config file
Procedures for managing network assets
Identify assets in system.
Clean up information in the CMDB. Remove info that is obsolete or invalid. Ensure that all remaining info is accurate and complete
Create categories of asset models such as computers, servers, printers, and software.
Create asset models.
Create individual assets, such as hardware, consumables, and software licenses.
Manage assets by counting software licenses, viewing assets that are in stock, setting asset states and substates, and analyzing unallocated software.
Install and monitor server software applications
located installation program.
Follow installation wizard instructions.
Restart the server if it does not restart automatically
System Analysis and Bandwidth Optimization
Enables one to capture data from continuous streams of network traffic.
Perform Resource Management
Resource leveling- aims at smoothing stock of resources and reduce both excess inventories and shortages
Invest in resources as stored capabilities, then unleash them as demanded
Minimize cost as much as possible
Respond to system messages
Through adaptive server
Document actions taken (backups, virus prevention, software distribution)
How to backup: Bring to alternate medium (like blank CD-R or DVD-R). Store backups online or another location. Have a computer with RAID that makes backups as data changes to make sure data is protected and updated=ongoing backup.
How to have virus protection: Download security software. Run scan after.
Software distribution:
Process of delivering software to end user. Include: floppy disks, compact disks, DVDs, HTTP and related protocols, etc. LANDesk Management Suite provides software distribution for Windows, OS X, and Linux.
Evaluate software activities and execute network diagnostic program for software and hardware
Software peer reviews (by author of product), software management reviews (by management representatives to evaluate status of work done), software audit reviews (by personnel external to software project).
Types of reviews:
-code review (systematic examination) -pair programming (type of code review where two persons develop code together at same workstation) -inspection (formal type, reviewers follow well-defined process to find defects) -walkthrough (author leads members of development team. Participants ask questions and comments about defects) -Technical review (peer review in which team identifies discrepancies from specs and standards)
How resources are shared by setting up and admin rights (permissions and quotas)
Shared resource/network share is comp resource made available fro one host to another on comp networl. Most common protocols are TCP, UDP, NBT, and NBF.
Technical support and orientation to network system
System administrator offer technical support for projects
Configure Internet access for network
LAN provide internet access via upstream link to internet service provider, although internet speed is limited by upstream link.
Purpose of network services and protocols
Provides backbone services to Internet service provider (ISP). It provides dialup connectivity for their customers.
Identify/Monitor network perimeter
Rogue devices: (how to prevent on network) 1. create baseline inventory of wireless devices 2. classify all discovered devices and configure your tool 3. monitor your wireless and wired network for new devices 4. Stem potential damage during investigation 5. investigate new devices to determine threat 6. update device inventory to reflect outcome
how to monitor VPN connection: NPS server can be used to track remote access network usage and create log file for auditing and billing purposes. Also can use NAP/IAS API to program disconnections and modify users' dial-in session and permission with specified value.
Impact of modifying, adding, or removing network services
(using a DHCP for example) adding benefits: can reconfigure entire IP address system without users noticing negatives: all client systems need to be configured to use DHCP. if not, then they will not be able to access the network. removed: significant impact on network users. All clients require valid IP address to get on network. So, if it is unavailable, each client system would need to be configured with a static IP address.
Design remote connectivity
WAN technologies and WAN transport media must be utilized. WAN remote access choices include cable and DSL technologies that are used with VPN.
Network cards and settings
Network card acts as interface between computer and network cable. Purpose is to prepare, send, and control data on network. Paths taken by data moving with a computer are called "buses"
Settings: IRQ:
network cards use IRQ3 and 5 I/O base address: each device must have a different address Memory address: designates a RAM location in computer. Use slot to buffer for data for entering and leaving.
Purpose/benefits of proxy service
Purpose: -server that is in-between real server and application -intercepts all requests to real server
Benefits: -network pass through proxy and it can alter -replace user agent -accept all cookies (bit not pass them to you) -proxy connects to server, not you, so your IP is not disclosed -set up to work system-wide, so systems cannot bypass it
Emerging networks and technologies
MPTCP (can use different connection paths). Can also break mostly every security control.
Configure VLAN to map an IP network
Admins often configure CLAN to map IP network which gives it the appearance of involving :ayer 3 (the network layer)
Tracking/monitoring of VLAN
MAC or DAC (security controls)
Types of access control by which operating system constrains ability of subject to access or perform operation on object or target.
Common Routing Protocols
How routers communicate with one another (routed protocols examples are IP and IPX). Three major classes: Interior gateway protocols type 1, type 2, and exterior gateway protocols
Windows NT
Which network operating system was developed from the VMS platform?
UNIX
Which operating system was originally developed by Bell Labs and has multitasking, multiuser, and built in networking capabilities?
Novell NetWare
Which of the following are network operating systems and not simply operating systems that will communicate on a network?
Protocol
What do networks use to communicate with each other that is sometimes known as a language that networked computers use?
IPX
Which network protocol was developed by Novell for use in its network operating system?
TCP/IP
Which protocol is used on the Internet to give each computer a unique address?
Disk Duplexing
When multiple disk controllers are used in a drive mirroring scenario, it is known as which of the following?
Data Transmission
Which of the following is NOT a layer in the OSI model?
RJ-45
Which of the following is NOT a common type of medium used in networking?
185 Meters
What is the distance limitation on 10Base2, or Thinnet?
Full Duplex
When data is able to travel in both directions on a cable, it is known as which of the following?
Peer-to-Peer
In what type of network is there no dedicated server and each mode on the network is an equal resource for sharing and receiving information?
Gateway
In order for differing networks to communicate with each other, we need to use which of the following to translate between the networks?
Passive
Which of the following types of hubs does NOT regenerate the signal when transmitting over the normal specified distance?
Repeater
What network component is used to extend the distance of the signal when transmitting over the normal specified distance?
DMA
Which of the following must be set to enable a device to directly access memory on the system, without the CPU's intervention.
Erasable Programmable Read Only Memory
What does EPROM stand for?
.C.G.
If you are configuring a NIC in DOS, which of the following is the most likely extension for the file that determines the settings for the interface card?
Add a network card that has a remote boot PROM chip
If you have a workstation that has no diskette drive or hard drive and you want to put the workstation on your network, what do you have to do?
A 15-pin D female connector
What is an AUI connector?
Switching Hub
What type of network component enables each device to have the full bandwidth of the medium when transmitting?
Multistation Access Unit
What does MAU stand for?
Hybrid
What type of hub enables more than one type of cable or media to connect to it?
The route with the fewest number of hops will be used
What will happen if we have a routing table with the same route to the same destination network?
They cannot be configured with static routes
Which of the following is NOT true regarding dynamic routers?
The packet will not be sent
What will happen if the default gateway is not specified on your computer and you try to reach another network?
It is responsible for encrypting session information
Which of the following is NOT true of the transport layer of the OSI model?
Datagrams
Which of the following is NOT a characteristic of connection-oriented communication?
Connection-oriented data transfer is NOT quicker than connectionless-oriented data transfer
Why is connection-oriented data delivery faster?
A bulletin board and an answering machine
Which of the following are the best examples of a mailslot?
NetBIOS
The LMHOSTS file is a static file to resolve what types of names?
ARP
Which utility can be used to display and modify the table that maintains the TCP/IP address to Mac address translation?
ARP
Which protocols do NOT have statistics available with the Netstat utility?
Telnet
Which utility enables you to execute console commands remotely at a virtual terminal?
NBTSTAT
Which protocol uses a 16-character name, with the last digit reserved as a resource identifier?
NBTSTAT
Which utility can be used to troubleshoot NetBIOS over TCP/IP connectivity issues?
-c
Which NBTSTAT switch enables you to display the computer's local NetBT name cache?
Broadcast and WINS server
In what ways can a computer with a NetBIOS name register its services on the network?
Tracert
Which utility is used to determine the path that data takes during transport to a remote host?
Netstat
Which utility is used to display TCP/IP specific protocol and interface statistics?
FTP
Which utility is used to facilitate file transfers between two remote hosts?
Ping
Which utility is used to verify network connectivity of a remote host?
NSLOOKUP
Which utility is used to verify the DNA database on a DNS server?
IPX
Which network layer protocols can Serial Line Internet Protocol use during a dial-up session?
network control protocol and link control protocol
Which components are part of Point-to-Point Protocol?
CHAP and PAP
Which forms of validation can PPP use to authenticate users against a remote server?
NI-1
What was the first Integrated Services Digital Network standard to be published by the ITU?
20
How many B channels are available in a typical ISDN PRI?
NetWare Connect, Point-to-Point Protocol, and Serial Line Internet Protocol
What line protocols are available with Microsoft's Dial Up Networking?
3
What is the default IRQ setting for COM2?
V.42
Which modem standard defines error-checking standards?
RDP and ICA
What two terminal service protocols can be used in terminal services environment?
Circuit
Which switching technology is used by the telephone company?
Analog
How are the signals sent on an ATM network?
1
How many streams does the SONET network transfer?
Scrambler
What can be used in a SONET network to allow user's data to remain private?
192
What is the highest OC level?
By the protocol used
How is error checking managed on a Frame Relay network?
A portion of the primary ring that has not failed, and a part of the secondary ring that is equal to the primary ring that has not failed
If the primary ring fails, what is used for redundancy?
24
How many channels make up a TI?
Local Security Authority (LSA)
What portion of the Windows NT security subsystem handles both local security policies and user authentication, and generates audit log messages?
Discretionary Access Control List (DACL)
What access control object determines what users and groups have permission to this object?