f

studied byStudied by 1 Person
0.0(0)
Get a hint
hint

Basic Troubleshooting Steps

1/350

Tags & Description

Studying Progress

New cards
350
Still learning
0
Almost done
0
Mastered
0
350 Terms
New cards

Basic Troubleshooting Steps

  1. Disconnect any new hardware (disconnect the device, restart Windows XP)

  2. Search the Microsoft Knowledge Base (cop error message, visit site, write error message in "start" box, find article that will help)

  3. Disable automatic restart on system failure (restart computer, press F8 key repeatedly while restarting, use arrow keys to select "disable automatic restart on system failure", press "enter")

  4. Use system restore feature

New cards
New cards

Evaluate outcomes to determine whether problem was solved as intended and to determine needed follow-up actions

  1. Restart, press F8 key, safe mode with command prompt, then run

New cards
New cards

Impact of changes that affect interfaces

Delay in audio

New cards
New cards

File Organization

Stored in hard drive. Accessibility can be maintained through a password or file permission in the form of permission bits, access control lists, or capabilities. Also can rely on encryption but an attacker can copy the data and use brute force to decrypt the data.

New cards
New cards

Naming Conventions for Networks, Files, Accounts, and Services

All files have a base file name and an optional extension, separated by a period. Use a backlash () to separate the components of a path. It divides the file name from the path to it. Use two periods (..) as a directory component in a path to represent the parent of the current directory (i.e. ..\temp.txt.)

New cards
New cards

Determine methods for increasing performance (balancing network load)

  1. Balance load requests across the NLB cluster for individual TCP/IP services

  2. Support up to 32 computers in a single cluster

  3. Balance multiple server load requests (from either same client or several).

New cards
New cards

This balances network sessions like Web or email over multiple connections in order to spread out amount of bandwidth used by each LAN user, thus increasing total amount of bandwidth available

New cards
New cards

Role of Network Manager and Basic Principles of Network Management

Network Manager: responsible for installing and maintaining company's computer networks. Also, you must train staff to provide first rate technical support.

New cards
New cards

Basic Principles of Network Management:

Operation, administration, maintenance, and provisioning of networked systems. Essential to command and control practices and is generally carried out of a network operation center.

New cards
New cards

Procedures for Network Optimization and Tuning

Tuning:

  1. Have enough physical memory to load InnoDB file

  2. Avoid Swap at all costs (slows down)

  3. Use battery-Backed RAM

  4. Use advanced RAID (RAID 10 or higher)

  5. Avoid RAID5

  6. More disks that are fast

  7. Smaler disks

  8. Avoid software raids

New cards
New cards

Optimization:

  1. Keep database trim

  2. put indexes on data

  3. archive old data

  4. compress text and blob data types

  5. check and optimize tables

  6. use different storage engines for different needs

  7. use linking tables rather than extending rows

  8. make schema changes incrementally

  9. use MySQL config file

New cards
New cards

Procedures for managing network assets

  1. Identify assets in system.

  2. Clean up information in the CMDB. Remove info that is obsolete or invalid. Ensure that all remaining info is accurate and complete

  3. Create categories of asset models such as computers, servers, printers, and software.

  4. Create asset models.

  5. Create individual assets, such as hardware, consumables, and software licenses.

  6. Manage assets by counting software licenses, viewing assets that are in stock, setting asset states and substates, and analyzing unallocated software.

New cards
New cards

Install and monitor server software applications

  1. located installation program.

  2. Follow installation wizard instructions.

  3. Restart the server if it does not restart automatically

New cards
New cards

System Analysis and Bandwidth Optimization

Enables one to capture data from continuous streams of network traffic.

New cards
New cards

Perform Resource Management

  1. Resource leveling- aims at smoothing stock of resources and reduce both excess inventories and shortages

  2. Invest in resources as stored capabilities, then unleash them as demanded

  3. Minimize cost as much as possible

New cards
New cards

Respond to system messages

Through adaptive server

New cards
New cards

Document actions taken (backups, virus prevention, software distribution)

How to backup: Bring to alternate medium (like blank CD-R or DVD-R). Store backups online or another location. Have a computer with RAID that makes backups as data changes to make sure data is protected and updated=ongoing backup.

New cards
New cards

How to have virus protection: Download security software. Run scan after.

New cards
New cards

Software distribution:

Process of delivering software to end user. Include: floppy disks, compact disks, DVDs, HTTP and related protocols, etc. LANDesk Management Suite provides software distribution for Windows, OS X, and Linux.

New cards
New cards

Evaluate software activities and execute network diagnostic program for software and hardware

Software peer reviews (by author of product), software management reviews (by management representatives to evaluate status of work done), software audit reviews (by personnel external to software project).

New cards
New cards

Types of reviews:

-code review (systematic examination) -pair programming (type of code review where two persons develop code together at same workstation) -inspection (formal type, reviewers follow well-defined process to find defects) -walkthrough (author leads members of development team. Participants ask questions and comments about defects) -Technical review (peer review in which team identifies discrepancies from specs and standards)

New cards
New cards

How resources are shared by setting up and admin rights (permissions and quotas)

Shared resource/network share is comp resource made available fro one host to another on comp networl. Most common protocols are TCP, UDP, NBT, and NBF.

New cards
New cards

Technical support and orientation to network system

System administrator offer technical support for projects

New cards
New cards

Configure Internet access for network

LAN provide internet access via upstream link to internet service provider, although internet speed is limited by upstream link.

New cards
New cards

Purpose of network services and protocols

Provides backbone services to Internet service provider (ISP). It provides dialup connectivity for their customers.

New cards
New cards

Identify/Monitor network perimeter

Rogue devices: (how to prevent on network) 1. create baseline inventory of wireless devices 2. classify all discovered devices and configure your tool 3. monitor your wireless and wired network for new devices 4. Stem potential damage during investigation 5. investigate new devices to determine threat 6. update device inventory to reflect outcome

New cards
New cards

how to monitor VPN connection: NPS server can be used to track remote access network usage and create log file for auditing and billing purposes. Also can use NAP/IAS API to program disconnections and modify users' dial-in session and permission with specified value.

New cards
New cards

Impact of modifying, adding, or removing network services

(using a DHCP for example) adding benefits: can reconfigure entire IP address system without users noticing negatives: all client systems need to be configured to use DHCP. if not, then they will not be able to access the network. removed: significant impact on network users. All clients require valid IP address to get on network. So, if it is unavailable, each client system would need to be configured with a static IP address.

New cards
New cards

Design remote connectivity

WAN technologies and WAN transport media must be utilized. WAN remote access choices include cable and DSL technologies that are used with VPN.

New cards
New cards

Network cards and settings

Network card acts as interface between computer and network cable. Purpose is to prepare, send, and control data on network. Paths taken by data moving with a computer are called "buses"

New cards
New cards

Settings: IRQ:

network cards use IRQ3 and 5 I/O base address: each device must have a different address Memory address: designates a RAM location in computer. Use slot to buffer for data for entering and leaving.

New cards
New cards

Purpose/benefits of proxy service

Purpose: -server that is in-between real server and application -intercepts all requests to real server

New cards
New cards

Benefits: -network pass through proxy and it can alter -replace user agent -accept all cookies (bit not pass them to you) -proxy connects to server, not you, so your IP is not disclosed -set up to work system-wide, so systems cannot bypass it

New cards
New cards

Emerging networks and technologies

MPTCP (can use different connection paths). Can also break mostly every security control.

New cards
New cards

Configure VLAN to map an IP network

Admins often configure CLAN to map IP network which gives it the appearance of involving :ayer 3 (the network layer)

New cards
New cards

Tracking/monitoring of VLAN

New cards
New cards

MAC or DAC (security controls)

Types of access control by which operating system constrains ability of subject to access or perform operation on object or target.

New cards
New cards

Common Routing Protocols

How routers communicate with one another (routed protocols examples are IP and IPX). Three major classes: Interior gateway protocols type 1, type 2, and exterior gateway protocols

New cards
New cards

Windows NT

Which network operating system was developed from the VMS platform?

New cards
New cards

UNIX

Which operating system was originally developed by Bell Labs and has multitasking, multiuser, and built in networking capabilities?

New cards
New cards

Novell NetWare

Which of the following are network operating systems and not simply operating systems that will communicate on a network?

New cards
New cards

Protocol

What do networks use to communicate with each other that is sometimes known as a language that networked computers use?

New cards
New cards

IPX

Which network protocol was developed by Novell for use in its network operating system?

New cards
New cards

TCP/IP

Which protocol is used on the Internet to give each computer a unique address?

New cards
New cards

Disk Duplexing

When multiple disk controllers are used in a drive mirroring scenario, it is known as which of the following?

New cards
New cards

Data Transmission

Which of the following is NOT a layer in the OSI model?

New cards
New cards

RJ-45

Which of the following is NOT a common type of medium used in networking?

New cards
New cards

185 Meters

What is the distance limitation on 10Base2, or Thinnet?

New cards
New cards

Full Duplex

When data is able to travel in both directions on a cable, it is known as which of the following?

New cards
New cards

Peer-to-Peer

In what type of network is there no dedicated server and each mode on the network is an equal resource for sharing and receiving information?

New cards
New cards

Gateway

In order for differing networks to communicate with each other, we need to use which of the following to translate between the networks?

New cards
New cards

Passive

Which of the following types of hubs does NOT regenerate the signal when transmitting over the normal specified distance?

New cards
New cards

Repeater

What network component is used to extend the distance of the signal when transmitting over the normal specified distance?

New cards
New cards

DMA

Which of the following must be set to enable a device to directly access memory on the system, without the CPU's intervention.

New cards
New cards

Erasable Programmable Read Only Memory

What does EPROM stand for?

New cards
New cards

.C.G.

If you are configuring a NIC in DOS, which of the following is the most likely extension for the file that determines the settings for the interface card?

New cards
New cards

Add a network card that has a remote boot PROM chip

If you have a workstation that has no diskette drive or hard drive and you want to put the workstation on your network, what do you have to do?

New cards
New cards

A 15-pin D female connector

What is an AUI connector?

New cards
New cards

Switching Hub

What type of network component enables each device to have the full bandwidth of the medium when transmitting?

New cards
New cards

Multistation Access Unit

What does MAU stand for?

New cards
New cards

Hybrid

What type of hub enables more than one type of cable or media to connect to it?

New cards
New cards

The route with the fewest number of hops will be used

What will happen if we have a routing table with the same route to the same destination network?

New cards
New cards

They cannot be configured with static routes

Which of the following is NOT true regarding dynamic routers?

New cards
New cards

The packet will not be sent

What will happen if the default gateway is not specified on your computer and you try to reach another network?

New cards
New cards

It is responsible for encrypting session information

Which of the following is NOT true of the transport layer of the OSI model?

New cards
New cards

Datagrams

Which of the following is NOT a characteristic of connection-oriented communication?

New cards
New cards

Connection-oriented data transfer is NOT quicker than connectionless-oriented data transfer

Why is connection-oriented data delivery faster?

New cards
New cards

A bulletin board and an answering machine

Which of the following are the best examples of a mailslot?

New cards
New cards

NetBIOS

The LMHOSTS file is a static file to resolve what types of names?

New cards
New cards

ARP

Which utility can be used to display and modify the table that maintains the TCP/IP address to Mac address translation?

New cards
New cards

ARP

Which protocols do NOT have statistics available with the Netstat utility?

New cards
New cards

Telnet

Which utility enables you to execute console commands remotely at a virtual terminal?

New cards
New cards

NBTSTAT

Which protocol uses a 16-character name, with the last digit reserved as a resource identifier?

New cards
New cards

NBTSTAT

Which utility can be used to troubleshoot NetBIOS over TCP/IP connectivity issues?

New cards
New cards

-c

Which NBTSTAT switch enables you to display the computer's local NetBT name cache?

New cards
New cards

Broadcast and WINS server

In what ways can a computer with a NetBIOS name register its services on the network?

New cards
New cards

Tracert

Which utility is used to determine the path that data takes during transport to a remote host?

New cards
New cards

Netstat

Which utility is used to display TCP/IP specific protocol and interface statistics?

New cards
New cards

FTP

Which utility is used to facilitate file transfers between two remote hosts?

New cards
New cards

Ping

Which utility is used to verify network connectivity of a remote host?

New cards
New cards

NSLOOKUP

Which utility is used to verify the DNA database on a DNS server?

New cards
New cards

IPX

Which network layer protocols can Serial Line Internet Protocol use during a dial-up session?

New cards
New cards

network control protocol and link control protocol

Which components are part of Point-to-Point Protocol?

New cards
New cards

CHAP and PAP

Which forms of validation can PPP use to authenticate users against a remote server?

New cards