Download Chapter 8 - Chabot College

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Document related concepts

Cracking of wireless networks wikipedia, lookup

Distributed firewall wikipedia, lookup

Computer security wikipedia, lookup

Network tap wikipedia, lookup

Unix security wikipedia, lookup

Cybercrime countermeasures wikipedia, lookup

Mobile security wikipedia, lookup

Computer and network surveillance wikipedia, lookup

Transcript
Chabot College
Chapter 8 Review
Semester III
ELEC 99.09
Documentation
• Documentation is the most critical component of
good network administration.
• Documentation is the least implemented
component of network administration.
• A maintenance record is used to keep a list of
equipment repairs.
• Rack mount location is included in MDF and IDF
documentation.
• Software listings would NOT be found on security
documentation.
Documentation
• A software report would be used to determine what
programs are installed on a particular computer.
• Network policy should be used to select network
passwords.
• User policies refer to documentation that outlines
what is and what is not permissible on the network.
• Configuration error is NOT used as a baseline
measure.
Network Operating Systems
• Network operating system (NOS) controls
the resources and management of a clientserver network.
• The Unix network operating system
supports multi-user, multitasking, primarily
uses NFS security, and is kernel based.
Peer-to-Peer Networks
• The recommended maximum number of
users in a peer-to-peer network is 10.
• A dedicated server is NOT associated with a
peer-to-peer network.
• A peer-to-peer network is also known as a
workgroup network.
Troubleshooting
• Network troubleshooting is defined as a
systematic process.
• Your first step in the troubleshooting
process is to gather data.
• A possible solution to the problem of
EMI/RFI effecting performance on your
network is using STP cable.
Troubleshooting
• The ping 127.0.0.1 command will test the
loopback function on the NIC.
• An isolating transformer controls voltage
spikes and HF noise.
• A grounding strap reduces the static
discharge risks associated with working on
the inside of a computer.
Infections
• A worm is a program that spreads across
computers and usually reproduces copies of
itself in a computer's memory.
• A virus is a program that usually has a
negative effect on executable programs.
Backup and Storage
• Incremental backup stores all files that have
been created and modified since the last full
backup.
• Magnetic tape is used to backup data
because the tape is inexpensive.
• RAID 5 is a redundancy technique that uses
disk striping with parity and requires a
minimum of three disks.