Network Troubleshooting Basics
26 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary solution to minimize the effects of electrostatic discharge (ESD)?

  • Employing cable shielding for improved data transmission
  • Regularly updating antivirus software
  • Using high-speed internet connections
  • Ensuring proper grounding of both equipment and personnel (correct)
  • Which of the following contributes to electrical problems in a network environment?

  • Presence of a fire suppression system
  • Excessive humidity levels (correct)
  • Use of antistatic bags for components
  • Proper cable shielding
  • What is the primary difference between EMI and RFI?

  • EMI is typically external to a network, while RFI is internal.
  • EMI is more detrimental to network performance than RFI.
  • EMI is a type of noise, while RFI is a type of interference.
  • EMI is caused by radio waves, while RFI is caused by electrical currents. (correct)
  • What is the primary purpose of using shielded twisted pair (STP) cable in a network environment?

    <p>To prevent signal interference from external sources (A)</p> Signup and view all the answers

    What type of software can be used to prevent viruses, worms, and Trojan horses from infecting a network?

    <p>Antivirus software (B)</p> Signup and view all the answers

    Which backup method backs up all selected files, whether or not they have changed since they were last backed up?

    <p>Full backup (C)</p> Signup and view all the answers

    Which backup method only backs up files modified that day?

    <p>Daily copy (C)</p> Signup and view all the answers

    Which backup method backs up all selected files and marks them as backed up, but only if they have changed since they were last backed up?

    <p>Incremental (D)</p> Signup and view all the answers

    Which backup method backs up selected files only if they have changed since they were last backed up, but does not mark them as backed up?

    <p>Differential (C)</p> Signup and view all the answers

    What is the primary data security measure mentioned in the text?

    <p>Username and passwords (C)</p> Signup and view all the answers

    Which of the following is NOT mentioned as a factor to consider when setting password security policies?

    <p>Whether users need to use a password manager (C)</p> Signup and view all the answers

    Which of the following is NOT a guideline for establishing resource access?

    <p>Limit the number of users who can use the network at any given time (B)</p> Signup and view all the answers

    What is the primary purpose of establishing security policies for a network?

    <p>To prevent unauthorized access to the network (B)</p> Signup and view all the answers

    What is the primary purpose of Virus Definition Files?

    <p>To update existing antivirus software with new virus signatures. (B)</p> Signup and view all the answers

    What is a key difference between 'pre-emptive troubleshooting' and 'troubleshooting'?

    <p>Pre-emptive troubleshooting focuses on identifying and fixing problems before they occur. (A)</p> Signup and view all the answers

    Which of the following components should be included in a comprehensive network plan?

    <p>A diagram showing the physical layout of the network infrastructure. (C)</p> Signup and view all the answers

    What is the purpose of establishing network policies and procedures?

    <p>To ensure consistent and reliable network operations. (B)</p> Signup and view all the answers

    Which of the following is NOT considered a critical aspect of a comprehensive network backup program?

    <p>Establishing a budget for purchasing backup hardware and software. (C)</p> Signup and view all the answers

    What is the most common type of virus on campus?

    <p>Macro Viruses (C)</p> Signup and view all the answers

    Which type of virus is commonly associated with a 'payload'?

    <p>Trojan Horses (C)</p> Signup and view all the answers

    Why are Macintosh computers typically considered immune to certain virus types?

    <p>Macintosh computers use a different operating system than Windows computers, making them difficult for viruses to infect. (A)</p> Signup and view all the answers

    Which of the following is NOT a characteristic of a hoax?

    <p>Details the specific executable file the virus uses and the specific way the virus attempts to spread. (B)</p> Signup and view all the answers

    Which of the following options is a method of spreading a virus?

    <p>The use of a Trojan horse. (D)</p> Signup and view all the answers

    What is the purpose of a backdoor program?

    <p>To allow a malicious actor to remotely control an infected computer. (B)</p> Signup and view all the answers

    How do worms spread?

    <p>They attempt to send copies of themselves to other computers. (B)</p> Signup and view all the answers

    What is the primary way that anti-virus software works?

    <p>By looking for unique hexadecimal patterns within files. (C)</p> Signup and view all the answers

    Flashcards

    Physical Environment Issues

    Problems in temperature, air quality, and magnetism affecting networks.

    Crosstalk

    Interference occurring in unshielded twisted pairs (UTP) causing data corruption.

    Static Electricity

    Build-up of electric charge that can harm electronic equipment when discharged.

    Transients

    High voltage bursts (spikes) that can damage equipment.

    Signup and view all the flashcards

    Virus

    Self-replicating programs that spread by inserting themselves into other files.

    Signup and view all the flashcards

    Virus Definition Files

    Files containing data that define known viruses and how to detect them.

    Signup and view all the flashcards

    Pre-emptive Troubleshooting

    Preventive measures to avoid networking problems before they occur.

    Signup and view all the flashcards

    Network Management

    The organization and administration of network resources to ensure optimal performance.

    Signup and view all the flashcards

    Comprehensive Backup Program

    A detailed plan outlining what data to back up and how often, and who is responsible.

    Signup and view all the flashcards

    Network Policies and Procedures

    Guidelines for maintaining network security, standards, and upgrade protocols.

    Signup and view all the flashcards

    Macro Viruses

    Common viruses that affect Microsoft Office documents, written in Visual Basic for Applications.

    Signup and view all the flashcards

    Executable Viruses

    Viruses written in programming languages, compiled into executable files; can be very destructive.

    Signup and view all the flashcards

    Backdoor Programs

    Sub-type of executable viruses allowing remote control of infected computers.

    Signup and view all the flashcards

    Boot Sector Viruses

    Rare and destructive viruses that reside in the boot sector of a disk.

    Signup and view all the flashcards

    Worms

    Viruses that spread themselves to other computers, often via email attachments.

    Signup and view all the flashcards

    Trojan Horses

    Malicious programs disguised as useful tools or applications.

    Signup and view all the flashcards

    Hoaxes

    False warnings about non-existent viruses, misleading users.

    Signup and view all the flashcards

    Anti-Virus Software

    Programs that monitor file interactions and look for virus patterns.

    Signup and view all the flashcards

    Full Backup

    Backs up all selected files and marks them as backed up regardless of changes.

    Signup and view all the flashcards

    Copy Backup

    Backs up all selected files without marking them as backed up.

    Signup and view all the flashcards

    Incremental Backup

    Backs up files that have changed since the last backup and marks them as backed up.

    Signup and view all the flashcards

    Daily Copy Backup

    Backs up files modified that day without marking them as backed up.

    Signup and view all the flashcards

    Differential Backup

    Backs up changed files since the last full backup without marking them as backed up.

    Signup and view all the flashcards

    Security Policies

    Guidelines that govern data and hardware security in a network plan.

    Signup and view all the flashcards

    Username and Password Security

    Primary data security method involving usernames and strict password guidelines.

    Signup and view all the flashcards

    Access Guidelines

    Rules for granting minimum access levels to users who need it.

    Signup and view all the flashcards

    Study Notes

    Network Troubleshooting Basics

    • Network troubleshooting involves two main approaches: pre-emptive planning and reactive troubleshooting.
    • Pre-emptive troubleshooting focuses on preventing problems through careful planning and management of the network.
    • Reactive troubleshooting addresses existing network issues.

    Preventing Problems

    • Physical Environment: Factors like temperature, air quality, and magnetism can affect network performance.
    • Electrical Environment: Crosstalk (noise between wires), EMI (electromagnetic interference), RFI (radio frequency interference), and static (ESD - electrostatic discharge) are potential problems.
      • Crosstalk can be mitigated by using Shielded Twisted Pair (STP) cables instead of Unshielded Twisted Pair (UTP).
      • EMI and RFI can be reduced by avoiding placing cables near potential sources and using shielding.
      • Properly grounding equipment and using antistatic bags can help prevent ESD.
    • Software Threats: Viruses, worms, and Trojan horses are malicious programs that can damage or disrupt a network.

    Viruses, Worms, and Trojans

    • Definition of a Virus: A self-replicating program that inserts copies of itself into other executable code or documents.
    • What Viruses Do: Damage files, slow systems, display messages, and gain control.
    • Types of Viruses:
      • Macro viruses: Common, mostly affecting Microsoft Office documents.
      • Executable viruses: Second most common, compiled into executable files.
      • Backdoor programs: Allow remote control of an infected computer.
      • Boot sector viruses: Rare, reside in the boot sector instead of files.
      • Macintosh viruses: Often target Macro vulnerabilities; executables and backdoors don't typically work.
      • Hoaxes: Warnings about non-existent viruses.
    • Methods of Spreading:
      • Parasites: Embed themselves into programs or data files and spread when the infected file is opened.
      • Worms: Attempt to spread to other computers independently. Recent worms often use email attachments.
      • Trojan Horses: Disguise themselves as useful programs, modifying system files while running.
      • Booting: Boot sector viruses copy themselves to the boot sector of a disk and load into memory when the computer boots, enabling the virus to infect other disks.

    Anti-Virus Software

    • Anti-virus software automatically loads at startup and monitors all interactions with files, searching for hexadecimal patterns defined in Virus Definition Files.
    • Virus Definition Files need regular updates to detect new viruses.

    Network Management and Planning

    • Preventative measures are essential, and combining network management with troubleshooting leads to a more effective plan.
    • Include things like cable diagrams, network capacity, protocols, standards, documentation on device configuration, software, and important files.

    Backing Up Network Data

    • Comprehensive backup programs are crucial to prevent data loss.
    • Key components of a backup program include:
      • Determining what data to back up and how frequently.
      • Specifying the backup type and schedule.
      • Identifying who is responsible for backups.
      • Regularly testing the backup system and verifying logs are complete.
      • Defining where backups are stored and if offsite options exist.

    Setting Security Policies

    • Security policies are an essential component of a network plan and include both data and hardware security.
    • Critical aspects of security policies, specifically for user accounts, include:
      • Password change frequency.
      • Password reuse restrictions.
      • Password character restrictions and policy standards.
      • Procedures for defining and documenting exceptions.
    • Access guidelines should be in place to grant access to those who require it and establish minimum levels.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    This quiz covers the fundamentals of network troubleshooting, focusing on both pre-emptive planning and reactive strategies. It discusses environmental factors that can impact network performance and offers solutions to common issues such as crosstalk and interference. Perfect for anyone looking to strengthen their network management skills.

    More Like This

    Use Quizgecko on...
    Browser
    Browser