Network Troubleshooting Basics

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary solution to minimize the effects of electrostatic discharge (ESD)?

  • Employing cable shielding for improved data transmission
  • Regularly updating antivirus software
  • Using high-speed internet connections
  • Ensuring proper grounding of both equipment and personnel (correct)

Which of the following contributes to electrical problems in a network environment?

  • Presence of a fire suppression system
  • Excessive humidity levels (correct)
  • Use of antistatic bags for components
  • Proper cable shielding

What is the primary difference between EMI and RFI?

  • EMI is typically external to a network, while RFI is internal.
  • EMI is more detrimental to network performance than RFI.
  • EMI is a type of noise, while RFI is a type of interference.
  • EMI is caused by radio waves, while RFI is caused by electrical currents. (correct)

What is the primary purpose of using shielded twisted pair (STP) cable in a network environment?

<p>To prevent signal interference from external sources (A)</p> Signup and view all the answers

What type of software can be used to prevent viruses, worms, and Trojan horses from infecting a network?

<p>Antivirus software (B)</p> Signup and view all the answers

Which backup method backs up all selected files, whether or not they have changed since they were last backed up?

<p>Full backup (C)</p> Signup and view all the answers

Which backup method only backs up files modified that day?

<p>Daily copy (C)</p> Signup and view all the answers

Which backup method backs up all selected files and marks them as backed up, but only if they have changed since they were last backed up?

<p>Incremental (D)</p> Signup and view all the answers

Which backup method backs up selected files only if they have changed since they were last backed up, but does not mark them as backed up?

<p>Differential (C)</p> Signup and view all the answers

What is the primary data security measure mentioned in the text?

<p>Username and passwords (C)</p> Signup and view all the answers

Which of the following is NOT mentioned as a factor to consider when setting password security policies?

<p>Whether users need to use a password manager (C)</p> Signup and view all the answers

Which of the following is NOT a guideline for establishing resource access?

<p>Limit the number of users who can use the network at any given time (B)</p> Signup and view all the answers

What is the primary purpose of establishing security policies for a network?

<p>To prevent unauthorized access to the network (B)</p> Signup and view all the answers

What is the primary purpose of Virus Definition Files?

<p>To update existing antivirus software with new virus signatures. (B)</p> Signup and view all the answers

What is a key difference between 'pre-emptive troubleshooting' and 'troubleshooting'?

<p>Pre-emptive troubleshooting focuses on identifying and fixing problems before they occur. (A)</p> Signup and view all the answers

Which of the following components should be included in a comprehensive network plan?

<p>A diagram showing the physical layout of the network infrastructure. (C)</p> Signup and view all the answers

What is the purpose of establishing network policies and procedures?

<p>To ensure consistent and reliable network operations. (B)</p> Signup and view all the answers

Which of the following is NOT considered a critical aspect of a comprehensive network backup program?

<p>Establishing a budget for purchasing backup hardware and software. (C)</p> Signup and view all the answers

What is the most common type of virus on campus?

<p>Macro Viruses (C)</p> Signup and view all the answers

Which type of virus is commonly associated with a 'payload'?

<p>Trojan Horses (C)</p> Signup and view all the answers

Why are Macintosh computers typically considered immune to certain virus types?

<p>Macintosh computers use a different operating system than Windows computers, making them difficult for viruses to infect. (A)</p> Signup and view all the answers

Which of the following is NOT a characteristic of a hoax?

<p>Details the specific executable file the virus uses and the specific way the virus attempts to spread. (B)</p> Signup and view all the answers

Which of the following options is a method of spreading a virus?

<p>The use of a Trojan horse. (D)</p> Signup and view all the answers

What is the purpose of a backdoor program?

<p>To allow a malicious actor to remotely control an infected computer. (B)</p> Signup and view all the answers

How do worms spread?

<p>They attempt to send copies of themselves to other computers. (B)</p> Signup and view all the answers

What is the primary way that anti-virus software works?

<p>By looking for unique hexadecimal patterns within files. (C)</p> Signup and view all the answers

Flashcards

Physical Environment Issues

Problems in temperature, air quality, and magnetism affecting networks.

Crosstalk

Interference occurring in unshielded twisted pairs (UTP) causing data corruption.

Static Electricity

Build-up of electric charge that can harm electronic equipment when discharged.

Transients

High voltage bursts (spikes) that can damage equipment.

Signup and view all the flashcards

Virus

Self-replicating programs that spread by inserting themselves into other files.

Signup and view all the flashcards

Virus Definition Files

Files containing data that define known viruses and how to detect them.

Signup and view all the flashcards

Pre-emptive Troubleshooting

Preventive measures to avoid networking problems before they occur.

Signup and view all the flashcards

Network Management

The organization and administration of network resources to ensure optimal performance.

Signup and view all the flashcards

Comprehensive Backup Program

A detailed plan outlining what data to back up and how often, and who is responsible.

Signup and view all the flashcards

Network Policies and Procedures

Guidelines for maintaining network security, standards, and upgrade protocols.

Signup and view all the flashcards

Macro Viruses

Common viruses that affect Microsoft Office documents, written in Visual Basic for Applications.

Signup and view all the flashcards

Executable Viruses

Viruses written in programming languages, compiled into executable files; can be very destructive.

Signup and view all the flashcards

Backdoor Programs

Sub-type of executable viruses allowing remote control of infected computers.

Signup and view all the flashcards

Boot Sector Viruses

Rare and destructive viruses that reside in the boot sector of a disk.

Signup and view all the flashcards

Worms

Viruses that spread themselves to other computers, often via email attachments.

Signup and view all the flashcards

Trojan Horses

Malicious programs disguised as useful tools or applications.

Signup and view all the flashcards

Hoaxes

False warnings about non-existent viruses, misleading users.

Signup and view all the flashcards

Anti-Virus Software

Programs that monitor file interactions and look for virus patterns.

Signup and view all the flashcards

Full Backup

Backs up all selected files and marks them as backed up regardless of changes.

Signup and view all the flashcards

Copy Backup

Backs up all selected files without marking them as backed up.

Signup and view all the flashcards

Incremental Backup

Backs up files that have changed since the last backup and marks them as backed up.

Signup and view all the flashcards

Daily Copy Backup

Backs up files modified that day without marking them as backed up.

Signup and view all the flashcards

Differential Backup

Backs up changed files since the last full backup without marking them as backed up.

Signup and view all the flashcards

Security Policies

Guidelines that govern data and hardware security in a network plan.

Signup and view all the flashcards

Username and Password Security

Primary data security method involving usernames and strict password guidelines.

Signup and view all the flashcards

Access Guidelines

Rules for granting minimum access levels to users who need it.

Signup and view all the flashcards

Study Notes

Network Troubleshooting Basics

  • Network troubleshooting involves two main approaches: pre-emptive planning and reactive troubleshooting.
  • Pre-emptive troubleshooting focuses on preventing problems through careful planning and management of the network.
  • Reactive troubleshooting addresses existing network issues.

Preventing Problems

  • Physical Environment: Factors like temperature, air quality, and magnetism can affect network performance.
  • Electrical Environment: Crosstalk (noise between wires), EMI (electromagnetic interference), RFI (radio frequency interference), and static (ESD - electrostatic discharge) are potential problems.
    • Crosstalk can be mitigated by using Shielded Twisted Pair (STP) cables instead of Unshielded Twisted Pair (UTP).
    • EMI and RFI can be reduced by avoiding placing cables near potential sources and using shielding.
    • Properly grounding equipment and using antistatic bags can help prevent ESD.
  • Software Threats: Viruses, worms, and Trojan horses are malicious programs that can damage or disrupt a network.

Viruses, Worms, and Trojans

  • Definition of a Virus: A self-replicating program that inserts copies of itself into other executable code or documents.
  • What Viruses Do: Damage files, slow systems, display messages, and gain control.
  • Types of Viruses:
    • Macro viruses: Common, mostly affecting Microsoft Office documents.
    • Executable viruses: Second most common, compiled into executable files.
    • Backdoor programs: Allow remote control of an infected computer.
    • Boot sector viruses: Rare, reside in the boot sector instead of files.
    • Macintosh viruses: Often target Macro vulnerabilities; executables and backdoors don't typically work.
    • Hoaxes: Warnings about non-existent viruses.
  • Methods of Spreading:
    • Parasites: Embed themselves into programs or data files and spread when the infected file is opened.
    • Worms: Attempt to spread to other computers independently. Recent worms often use email attachments.
    • Trojan Horses: Disguise themselves as useful programs, modifying system files while running.
    • Booting: Boot sector viruses copy themselves to the boot sector of a disk and load into memory when the computer boots, enabling the virus to infect other disks.

Anti-Virus Software

  • Anti-virus software automatically loads at startup and monitors all interactions with files, searching for hexadecimal patterns defined in Virus Definition Files.
  • Virus Definition Files need regular updates to detect new viruses.

Network Management and Planning

  • Preventative measures are essential, and combining network management with troubleshooting leads to a more effective plan.
  • Include things like cable diagrams, network capacity, protocols, standards, documentation on device configuration, software, and important files.

Backing Up Network Data

  • Comprehensive backup programs are crucial to prevent data loss.
  • Key components of a backup program include:
    • Determining what data to back up and how frequently.
    • Specifying the backup type and schedule.
    • Identifying who is responsible for backups.
    • Regularly testing the backup system and verifying logs are complete.
    • Defining where backups are stored and if offsite options exist.

Setting Security Policies

  • Security policies are an essential component of a network plan and include both data and hardware security.
  • Critical aspects of security policies, specifically for user accounts, include:
    • Password change frequency.
    • Password reuse restrictions.
    • Password character restrictions and policy standards.
    • Procedures for defining and documenting exceptions.
  • Access guidelines should be in place to grant access to those who require it and establish minimum levels.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Troubleshooting IPv4 Routes Quiz
43 questions
Network Management and Structured Cabling
10 questions
Use Quizgecko on...
Browser
Browser