Podcast
Questions and Answers
What is the primary solution to minimize the effects of electrostatic discharge (ESD)?
What is the primary solution to minimize the effects of electrostatic discharge (ESD)?
Which of the following contributes to electrical problems in a network environment?
Which of the following contributes to electrical problems in a network environment?
What is the primary difference between EMI and RFI?
What is the primary difference between EMI and RFI?
What is the primary purpose of using shielded twisted pair (STP) cable in a network environment?
What is the primary purpose of using shielded twisted pair (STP) cable in a network environment?
Signup and view all the answers
What type of software can be used to prevent viruses, worms, and Trojan horses from infecting a network?
What type of software can be used to prevent viruses, worms, and Trojan horses from infecting a network?
Signup and view all the answers
Which backup method backs up all selected files, whether or not they have changed since they were last backed up?
Which backup method backs up all selected files, whether or not they have changed since they were last backed up?
Signup and view all the answers
Which backup method only backs up files modified that day?
Which backup method only backs up files modified that day?
Signup and view all the answers
Which backup method backs up all selected files and marks them as backed up, but only if they have changed since they were last backed up?
Which backup method backs up all selected files and marks them as backed up, but only if they have changed since they were last backed up?
Signup and view all the answers
Which backup method backs up selected files only if they have changed since they were last backed up, but does not mark them as backed up?
Which backup method backs up selected files only if they have changed since they were last backed up, but does not mark them as backed up?
Signup and view all the answers
What is the primary data security measure mentioned in the text?
What is the primary data security measure mentioned in the text?
Signup and view all the answers
Which of the following is NOT mentioned as a factor to consider when setting password security policies?
Which of the following is NOT mentioned as a factor to consider when setting password security policies?
Signup and view all the answers
Which of the following is NOT a guideline for establishing resource access?
Which of the following is NOT a guideline for establishing resource access?
Signup and view all the answers
What is the primary purpose of establishing security policies for a network?
What is the primary purpose of establishing security policies for a network?
Signup and view all the answers
What is the primary purpose of Virus Definition Files?
What is the primary purpose of Virus Definition Files?
Signup and view all the answers
What is a key difference between 'pre-emptive troubleshooting' and 'troubleshooting'?
What is a key difference between 'pre-emptive troubleshooting' and 'troubleshooting'?
Signup and view all the answers
Which of the following components should be included in a comprehensive network plan?
Which of the following components should be included in a comprehensive network plan?
Signup and view all the answers
What is the purpose of establishing network policies and procedures?
What is the purpose of establishing network policies and procedures?
Signup and view all the answers
Which of the following is NOT considered a critical aspect of a comprehensive network backup program?
Which of the following is NOT considered a critical aspect of a comprehensive network backup program?
Signup and view all the answers
What is the most common type of virus on campus?
What is the most common type of virus on campus?
Signup and view all the answers
Which type of virus is commonly associated with a 'payload'?
Which type of virus is commonly associated with a 'payload'?
Signup and view all the answers
Why are Macintosh computers typically considered immune to certain virus types?
Why are Macintosh computers typically considered immune to certain virus types?
Signup and view all the answers
Which of the following is NOT a characteristic of a hoax?
Which of the following is NOT a characteristic of a hoax?
Signup and view all the answers
Which of the following options is a method of spreading a virus?
Which of the following options is a method of spreading a virus?
Signup and view all the answers
What is the purpose of a backdoor program?
What is the purpose of a backdoor program?
Signup and view all the answers
How do worms spread?
How do worms spread?
Signup and view all the answers
What is the primary way that anti-virus software works?
What is the primary way that anti-virus software works?
Signup and view all the answers
Flashcards
Physical Environment Issues
Physical Environment Issues
Problems in temperature, air quality, and magnetism affecting networks.
Crosstalk
Crosstalk
Interference occurring in unshielded twisted pairs (UTP) causing data corruption.
Static Electricity
Static Electricity
Build-up of electric charge that can harm electronic equipment when discharged.
Transients
Transients
Signup and view all the flashcards
Virus
Virus
Signup and view all the flashcards
Virus Definition Files
Virus Definition Files
Signup and view all the flashcards
Pre-emptive Troubleshooting
Pre-emptive Troubleshooting
Signup and view all the flashcards
Network Management
Network Management
Signup and view all the flashcards
Comprehensive Backup Program
Comprehensive Backup Program
Signup and view all the flashcards
Network Policies and Procedures
Network Policies and Procedures
Signup and view all the flashcards
Macro Viruses
Macro Viruses
Signup and view all the flashcards
Executable Viruses
Executable Viruses
Signup and view all the flashcards
Backdoor Programs
Backdoor Programs
Signup and view all the flashcards
Boot Sector Viruses
Boot Sector Viruses
Signup and view all the flashcards
Worms
Worms
Signup and view all the flashcards
Trojan Horses
Trojan Horses
Signup and view all the flashcards
Hoaxes
Hoaxes
Signup and view all the flashcards
Anti-Virus Software
Anti-Virus Software
Signup and view all the flashcards
Full Backup
Full Backup
Signup and view all the flashcards
Copy Backup
Copy Backup
Signup and view all the flashcards
Incremental Backup
Incremental Backup
Signup and view all the flashcards
Daily Copy Backup
Daily Copy Backup
Signup and view all the flashcards
Differential Backup
Differential Backup
Signup and view all the flashcards
Security Policies
Security Policies
Signup and view all the flashcards
Username and Password Security
Username and Password Security
Signup and view all the flashcards
Access Guidelines
Access Guidelines
Signup and view all the flashcards
Study Notes
Network Troubleshooting Basics
- Network troubleshooting involves two main approaches: pre-emptive planning and reactive troubleshooting.
- Pre-emptive troubleshooting focuses on preventing problems through careful planning and management of the network.
- Reactive troubleshooting addresses existing network issues.
Preventing Problems
- Physical Environment: Factors like temperature, air quality, and magnetism can affect network performance.
- Electrical Environment: Crosstalk (noise between wires), EMI (electromagnetic interference), RFI (radio frequency interference), and static (ESD - electrostatic discharge) are potential problems.
- Crosstalk can be mitigated by using Shielded Twisted Pair (STP) cables instead of Unshielded Twisted Pair (UTP).
- EMI and RFI can be reduced by avoiding placing cables near potential sources and using shielding.
- Properly grounding equipment and using antistatic bags can help prevent ESD.
- Software Threats: Viruses, worms, and Trojan horses are malicious programs that can damage or disrupt a network.
Viruses, Worms, and Trojans
- Definition of a Virus: A self-replicating program that inserts copies of itself into other executable code or documents.
- What Viruses Do: Damage files, slow systems, display messages, and gain control.
- Types of Viruses:
- Macro viruses: Common, mostly affecting Microsoft Office documents.
- Executable viruses: Second most common, compiled into executable files.
- Backdoor programs: Allow remote control of an infected computer.
- Boot sector viruses: Rare, reside in the boot sector instead of files.
- Macintosh viruses: Often target Macro vulnerabilities; executables and backdoors don't typically work.
- Hoaxes: Warnings about non-existent viruses.
- Methods of Spreading:
- Parasites: Embed themselves into programs or data files and spread when the infected file is opened.
- Worms: Attempt to spread to other computers independently. Recent worms often use email attachments.
- Trojan Horses: Disguise themselves as useful programs, modifying system files while running.
- Booting: Boot sector viruses copy themselves to the boot sector of a disk and load into memory when the computer boots, enabling the virus to infect other disks.
Anti-Virus Software
- Anti-virus software automatically loads at startup and monitors all interactions with files, searching for hexadecimal patterns defined in Virus Definition Files.
- Virus Definition Files need regular updates to detect new viruses.
Network Management and Planning
- Preventative measures are essential, and combining network management with troubleshooting leads to a more effective plan.
- Include things like cable diagrams, network capacity, protocols, standards, documentation on device configuration, software, and important files.
Backing Up Network Data
- Comprehensive backup programs are crucial to prevent data loss.
- Key components of a backup program include:
- Determining what data to back up and how frequently.
- Specifying the backup type and schedule.
- Identifying who is responsible for backups.
- Regularly testing the backup system and verifying logs are complete.
- Defining where backups are stored and if offsite options exist.
Setting Security Policies
- Security policies are an essential component of a network plan and include both data and hardware security.
- Critical aspects of security policies, specifically for user accounts, include:
- Password change frequency.
- Password reuse restrictions.
- Password character restrictions and policy standards.
- Procedures for defining and documenting exceptions.
- Access guidelines should be in place to grant access to those who require it and establish minimum levels.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz covers the fundamentals of network troubleshooting, focusing on both pre-emptive planning and reactive strategies. It discusses environmental factors that can impact network performance and offers solutions to common issues such as crosstalk and interference. Perfect for anyone looking to strengthen their network management skills.