1. Trang chủ
  2. » Công Nghệ Thông Tin

A+ NETWORK+ SECURITY+ EXAMSIN A NUTSHELL phần 6 pptx

82 309 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 82
Dung lượng 472,99 KB

Nội dung

398 | Chapter 6: Prep and Practice for the A+ Exams 220-602, 220-603, and 220-604 Resolving printing problems • You must gather information about a problem before reaching a conclusion. • Printing problems can be due to hardware, software, or user errors. • A user may not have sufficient permissions, his computer may not be con- nected to the network, or he may be sending the print job to a wrong printer. • You must verify that the printer is online and not out of paper. • Try printing from a different computer or using a different application. • Use test patterns to test the quality of the printed image. Preventive maintenance of printers and scanners • Scheduled maintenance helps prevent several problems and improves the life and performance of printers and scanners. • Printers and scanners should be located in environments where temperature and humidity are controlled. • The area around these devices should be kept clean. • Manufacturer-recommended paper supplies only should be used. • Refilled inkjet and toner cartridges do not produce good quality images. • When required, use only recommended replacement spares. Networks This subsection covers a summary of highlights from the “Networks” section in the A+ Exams Study Guide. Installing and configuring a network adapter • Ensure that the adapter is compatible with computer hardware and the OS. • Check whether the adapter is PnP-compatible. • Obtain the adapter driver if the OS does not automatically install it. • Manual configuration includes setting parameters such as IRQ, I/O, and DMA. • You can use the Add Hardware Wizard to install the network adapter. • The Device Manager can be used to install or upgrade a driver for the installed adapter. Joining a Windows workgroup or domain • You can join a workgroup or a domain during installation of the OS. • After installation, the computer can be joined to a workgroup or a domain from the System tab inside the Control Panel. • You will need administrative privileges to join a domain. • The DNS name of the domain is required. • A DNS server and a domain controller must be available to validate your credentials. Highlighters Index | 399 Prep and Practice Joining a NetWare network • You need supervisor rights to join a computer to a NetWare network. • You must know the internal network number, directory context, and the name of the directory tree. • Configure the user’s desktop with context and tree names, as a user may find these difficult to remember. NTFS permissions • File and folder permissions are assigned from the Properties window. • NTFS permissions are available only on NTFS partitions. • FAT partitions support only share permissions. • Permissions can be set to Allow or Deny an object. • Administrators and owners of an object have full control permissions on an object. Configuring script settings • JavaScript, ActiveX controls, and cookies are client-side components of Inter- net services. • These components are downloaded from the web server and run on the cli- ent computer. • Support for scripts is configured on a Windows computer from the Security tab available in Internet Options. • Custom level security settings allow you to configure settings as required. Configuring proxy settings • Internet browsers can be configured to connect to the Internet directly or through a proxy server. • A proxy server is used to share a single Internet connection among multiple network users. • It provides better performance by caching frequently visited web pages. • Open the Connections tab in Internet Options to configure the computer to use a proxy server. • Click the LAN settings button and enter the IP address of the proxy server. Network troubleshooting utilities • ipconfig is used to test the TCP/IP configuration of a computer. • ping is used to test connectivity between two hosts. • tracert is used to trace the route taken by a data packet from the source to the destination. • nslookup is used to resolve name resolution problems. Troubleshooting tools • Cable testers are used to test whether the cable is working properly. • Tone generators and tone locators are used to test cables by means of audio signals. 400 | Chapter 6: Prep and Practice for the A+ Exams 220-602, 220-603, and 220-604 • Loopback connectors are used to test functionality of network ports. • An optical time domain reflectometer (OTDR) is used to test fiber optic cables. Adapter configuration problems • Improperly configured protocol or port settings cause networking problems. • Network adapters use system resources such as IRQ, I/O address and DMA. • These resources must not be in conflict with other devices. • Use the System Information utility to find out resource conflicts. • Driver problems can be resolved using the Device Manager. • The Device Manager allows you to update, uninstall, or rollback drivers. TCP/IP configuration problems • The network adapter must have a valid IP address, subnet mask, and gate- way address. • The chance of assigning an incorrect IP address increases when clients are configured with static addresses. • A DHCP server can prevent the duplication of IP addresses by automatically allocating IP addresses. • DNS and WINS addresses must also be correct to prevent name resolution problems. • You can ping the loopback address of the adapter to verify TCP/IP protocol. IPX/SPX configuration problems • The internal network number must be unique for every host. • The network number must be the same for all hosts in a network. • A correct frame type must be configured on every host that needs manual configuration. Problems with resource access permissions • A user who wants to access a resource must be granted sufficient permissions. • Reading and executing a file needs the Read and Execute permission. • Saving files or folders requires at least the Write permission. • Changing file ownership or modifying permissions needs Full Control permissions. • Conflicting group permissions can also prevent access to resources. • Conflicts in share and NTFS permissions can also deny access to a user who otherwise should have it. Electrical interference • Electrical interference degrades signal quality as it travels on network cables. • Degradation of signals is called attenuation. • UTP cables should not be run in areas of high electromagnetic interference (EMI). Highlighters Index | 401 Prep and Practice • Wireless signals are affected by both electromagnetic and radio frequency interference (RFI). • Signal boosters can be used for extending the area of wireless coverage. Preventive maintenance for networks • Network cables should be run through secure routes. • Cable connectors must be securely attached to devices. • Physical access to network equipment should be restricted to authorized per- sonnel. • Apply security for servers and desktops by using permissions. • Install the latest software updates on servers and desktops. • Data backup and recovery procedures should be implemented. • Clean power supply should be provided for equipment, and it must be redundant. Security This subsection covers a summary of highlights from the “Security” section in the A+ Exams Study Guide. Access control • Access control is the method of granting or denying access to system or net- work resources. • It is applied on files, folders, or other shared resources by assigning permis- sions. • Mandatory access control is hardcoded into devices and is universally applied. • Discretionary access control is applied through the operating system by means of permissions. • Role-based access control is implemented on objects for roles of users and groups. User accounts • A user account allows a user to log on to the system and access resources. • A local user account allows users to log on locally to a computer and access local resources. • A domain user account allows users to log on to the network from any com- puter in the network and access network-wide resources. • The administrator account has full control over the system. • The guest account is meant for occasional users. • Normal user accounts are created for users to access resources for which they have permissions. 402 | Chapter 6: Prep and Practice for the A+ Exams 220-602, 220-603, and 220-604 Using groups to control access • A group is a collection of user accounts. • Users are grouped based on their job roles; permissions are assigned to groups. • Groups simplify the administration of resources. Permissions • File permissions are configured on individual files. • File permissions are applied to both local and network access. • Folder permissions are configured on folders. • Shared folder permissions are applied only for network access. • Printer permissions are applied only for accessing and managing printers. Levels of access • The level of access is defined in the Access Control List (ACL) for each object. • The Read permission allows users to read the contents of a file or folder. • The Write permission allows users to create new files and subfolders in fold- ers and to write data to files. • The Read and Execute permission allows users to read the contents of a file and execute the file. • The Modify permission allows users to modify the contents of a file or a folder. • The Full Control permission allows users to change permissions on a file or folder and perform all actions permitted by other permissions. • The List Folder Contents (Folder Only) permission allows users to navigate through the folder and subfolders. Restricted spaces • Restricted physical access ensures the safety and security of expensive and critical network equipment, servers, and cabling systems. • Physical access to restricted spaces is granted to authorized personnel only. • Restricted spaces are equipped with alarm systems to prevent theft. • Logbooks are maintained to keep record of the persons entering the restricted rooms. Auditing and event logging • Auditing is the process of tracking system usage resource access. • It also helps diagnose application failures. • Account management includes events related to the creation, modification, and deletion of user accounts by administrators. • Log Off and Log On includes events related to users logging on or off the local computer. • Process Tracking includes events related to actions performed by software applications. Highlighters Index | 403 Prep and Practice • Object Access includes events related to the access of files and folders by users. • Privilege Use includes events related to a user exercising her rights, such as changing the system time. • System Events includes events related to system processes such as shutting down or restarting the computer. These events also relate to system security. • The audit entries are written to log files. • Log files can be analyzed to track security breaches and troubleshoot prob- lems related to application processes. Enabling and disabling auditing • Auditing on Windows XP and Windows 2000 is available only on NTFS drives. • The Auditing policy has to be enabled from the Local Security Policies snap-in. • Auditing for individual files is enabled from its properties. Authentication technologies • The username and password is the most basic form of authentication. • Hardware tokens or security tokens are the most trusted means of authentication. • Biometric devices authenticate a user by his physical characteristics. • Wireless authentication methods include open system, shared key, 802.1x, and WPA. Software firewalls • A software firewall is an application or a part of the operating system. • A personal firewall is installed on an individual PC. • Windows XP includes a firewall feature that can be turned on from the Con- trol Panel. Data access security • Data access security is configured using NTFS and share permissions. • Permissions are assigned to users and groups. • The most restrictive of share and NTFS permissions takes effect. • NTFS permissions for a user in multiple groups are combined to grant the highest level of access. Troubleshooting software firewall issues • Firewall rules or settings should be checked for proper configuration. • Access can be allowed or denied based on the source and destination IP address, port, and protocols. • Improperly configured firewall settings can deny access to legitimate users. • It can also allow access to external attacks. 404 | Chapter 6: Prep and Practice for the A+ Exams 220-602, 220-603, and 220-604 Troubleshooting security issues • The Service Set Identifier (SSID) configuration on wireless clients is a com- mon problem. • Improperly configured or insufficient permissions can also deny access to users. • Conflicts in share and NTFS permissions create access problems. • Mismatching or unsupported encryption protocols will not allow a user to log on. Preventive maintenance for security • Account policies define how user accounts are handled when someone tries to log on using an incorrect password. • Password policies define how users maintain their passwords. • Audit policies can track logon attempts and reject access by unauthorized users. • Software restriction policies define which applications are not allowed to run on a system. • Security policies for the Windows Registry help prevent unauthorized modification. Social engineering • Social engineering is the process of acquiring personal or confidential infor- mation about someone. • Social engineering attacks are usually launched over the phone or through email and chatting. • Social engineering can also be launched during face-to-face interactions between a user and an attacker. • Phishing attacks are a form of social engineering. • The best protection against social engineering is to educate users about the security policies of the organization. Practice Questions for the A+ Exams 1. You have been asked to install an IDE disk to a personal computer. This will be the only disk in the computer connected to the primary channel. How would you set the jumper? ❍ A. Master ❍ B. Slave ❍ C. Cable Select ❍ D. Auto Answer A is correct. A single disk is connected to the primary channel and acts as a master disk. Practice Questions for the A+ Exams | 405 Prep and Practice 2. Which of the following is the most important factor when selecting a memory module to upgrade memory in a personal computer? ❍ A. The module has the highest memory available in the market. ❍ B. The module is built with state-of-the art technology. ❍ C. The module is compatible with the system bus. ❍ D. The module can double the system memory. Answer C is correct. The most important factor when selecting a memory module is to verify that the module is compatible with the system bus on the motherboard. 3. Which of the following is the name for the diagnostic process built into motherboards? ❍ A. POST ❍ B. CMOS ❍ C. BIOS ❍ D. DHCP Answer A is correct. The POST is the diagnostics program built into all moth- erboards. POST checks the functionality of all the hardware components of the motherboard. 4. You have just disconnected a hard disk from a computer and detected a red stripe on the data cable. What is the purpose of this red stripe? ❍ A. It indicates the last pin of the cable. ❍ B. It indicates the first pin of the cable. ❍ C. It indicates that the cable was tested by the manufacturer. ❍ D. It indicates the top end of the cable. Answer B is correct. The red marking on the data cable indicates pin number 1. 5. Which of the following is the most important precaution you should take while working on internal parts of the computer? Select two answers. ❏ A. Turn off the power supply. ❏ B. Disconnect the power cables from all drives. ❏ C. Disconnect the power cable from the motherboard. ❏ D. Wear a properly grounded antistatic wrist strap. Answers A and D are correct. You must turn off power to prevent shocks and wear a properly grounded antistatic wrist strap when working on internal parts of a computer. Semiconductor devices on the motherboard and adapter cards are very sensitive to static electricity. 6. You have just replaced a malfunctioning motherboard in a computer with a brand new one. You want to make sure that the new motherboard is func- tioning well before you connect other components such as the network 406 | Chapter 6: Prep and Practice for the A+ Exams 220-602, 220-603, and 220-604 adapter and graphics card. Which of the following methods can be used to test the basic functionality of the motherboard? ❍ A. POST ❍ B. Beep codes ❍ C. Successful boot ❍ D. BIOS Answer B is correct. Beep codes will usually indicate whether there is any problem with the basic functionality of the motherboard. Different manufac- turers of BIOS software have different beep codes, and you must refer to the motherboard user manual for the exact meaning of a particular beep code. 7. Which of these methods can be used to test a 10/100 Mbps network port built on the motherboard without connecting it to the network? ❍ A. Multimeter ❍ B. Loopback adapter ❍ C. Visual indicators ❍ D. Beep codes Answer B is correct. A loopback adapter can be used to test the network port built onto a motherboard or onto a separate network adapter. The loopback tester usually works with accompanying software to send and receive data signals to test whether the port is working. 8. Which of the following components ensure that thermally sensitive devices do not overheat during the normal operation of a personal computer? Select all correct answers. ❏ A. UPS ❏ B. Heat sink ❏ C. Fans ❏ D. Ribbon cables ❏ E. Ventilation slots Answers B, C, and E are correct. Heat sinks are used to dissipate heat from the surface of semiconductor devices such as the CPU. The exhaust fans blow the hot air away from internal components. Ventilation slots ensure proper flow of air inside the computer case. 9. During the POST you can hear only a single beep. What does this beep usually indicate? ❍ A. A problem with on-board memory. ❍ B. A problem with expanded memory. ❍ C. An audio problem. ❍ D. A successful POST. Answer D is correct. In most motherboards, the BIOS is programmed to sound a single beep during a POST to indicate that the POST has success- fully completed. Practice Questions for the A+ Exams | 407 Prep and Practice 10. Which of the following is considered to be the fastest port and is commonly used on laptops? ❍ A. PS/2 ❍ B. USB ❍ C. Serial ❍ D. Parallel Answer B is correct. USB ports are commonly used on laptop computers and are relatively faster than all other ports. 11. Which of the following wireless IEEE standards uses a radio frequency of 2.4 GHz with a data transfer speed of 11 Mbps? ❍ A. 802.11b ❍ B. 802.11c ❍ C. 802.11e ❍ D. 802.11g Answer A is correct. The 802.11b standard specifies a radio frequency band of 2.4 GHz with a data transmission speed of 11 Mbps. The frequency speci- fied for 802.11g is also 2.4 GHz but with a data transmission speed of 54 Mbps. 12. The laptop used by your manager is having video problems. What should you do to find out whether there is a problem with the LCD screen? Select two answers. ❏ A. Connect an external monitor. ❏ B. Change the LCD screen. ❏ C. Remove the LCD screen cable and reconnect it. ❏ D. Recycle power on the laptop. ❏ E. Toggle the video function key. Answers A and E are correct. You can try connecting to an external monitor to find out whether the problem is with the LCD screen or the video card. You will also need to use the video toggle key to use the external monitor. 13. Which of the following is not a recommended method to enhance the life and performance of a laptop battery? ❍ A. Fully discharge and recharge the battery every day. ❍ B. Fully discharge and recharge the battery every two to three weeks. ❍ C. Use only NiCd batteries. ❍ D. Use the power management features available in the operating system. Answer B is correct. The laptop battery should be fully discharged and recharged every two or three weeks. It is not a good idea to fully discharge the battery and recharge it every day. [...]... Antistatic bag ❏ B Antistatic wrist strap ❏ C Antistatic table mat ❏ D Antistatic body wrap ❏ E Antistatic head cover Answers A, B, and C are correct Antistatic bags, antistatic wrist straps, and antistatic table and floor mats all help reduce the effects of static electricity 414 | Chapter 6: Prep and Practice for the A+ Exams 220 -60 2, 220 -60 3, and 220 -60 4 III Network+ This is the Title of the Book, eMatter... (MAU) acts as the central device or hub to process circulation of a special data packet called a Token The MSAU has Ring In (RI) and Ring Out (RO) ports that facilitate connection of one MSAU to another MSAU for expanding the network The last MSAU is connected to the first MSAU to complete the ring Figure 8 -6 shows a ring network, and the advantages and disadvantages are described next Figure 8 -6 A. .. that are connected using a wireless or a wired network A mobile phone connected to a computer, or a few laptops connected to each other in an ad-hoc fashion are examples of personal area networks Similarly, two or more computers sharing an Internet connection in a home network is another example of a PAN 4 26 | Chapter 8: Network+ Exam Study Guide Metropolitan area network (MAN) A metropolitan area... incremental backup on Friday, and differential backups from Monday to Thursday ❍ D A full backup every Friday Answer A is correct When you want to restore data from a single backup tape, full backup needs to be performed on a daily basis A full backup stores complete data on a single tape 39 Which of the following safety measures help reduce the effects of static discharge? Select all correct answers ❏ A Antistatic... The area covered by a LAN is usually restricted to a single location The function of a LAN is to provide high-speed connectivity to all computers and network devices The data transfer speed achieved in a LAN is significantly higher than its counter part, the wide area network (WAN) Figure 8-1 shows a local area network Concentrator/Hub Nodes Figure 8-1 Local area network Wide area network (WAN) A wide... printer | Chapter 6: Prep and Practice for the A+ Exams 220 -60 2, 220 -60 3, and 220 -60 4 26 27 28 Practice Questions for the A+ Exams | 411 Prep and Practice 29 Answer A is correct A dot matrix printer is suitable for use with multipart forms such as invoices This is because a dot matrix printer is an impact printer that makes a good impression on multiple sheets of paper Which of the following ports cannot... the A+ exams The combination of A+ and Network+ certifications qualify you to get an exemption for one elective exam in Microsoft’s MCSA/MCSE track 418 | Chapter 7: Overview of the Network+ Exam Areas of Study for the Network+ Exam Media and Topologies Areas of Study for the Network+ Exam | 419 Network+ Overview • Recognize the following logical or physical network topologies given a diagram, a schematic,... in an office, or as big as a corporate network at multiple locations spanning across the globe The following sections describe different types of networks and the concept of centralized and decentralized computing Local area network (LAN) Media and Topologies | 425 Network+ Study Guide A local area network is a network of computers joined together in a local area such as a small office, a home, or a. .. wide area network is a network that connects two or more local area networks A WAN typically connects separate LANs at different geographic locations A third party such as an Internet service provider (ISP) or a local telephone company is responsible for providing the required dedicated hardware and/or connectivity lines to implement a WAN These hardware devices include modems or routers that are required... is a good idea to have studied a Network+ certification exam self-paced study guide or attended a training course before you attempt to take this exam You will then be ready to use this section of the book for your final exam preparation CompTIA’s Network+ Exam N10-003 is fairly easy If you are wellprepared, you will easily get through this exam It is recommended that you take this exam after passing . security protocols are used for data confidentiality and integrity. 414 | Chapter 6: Prep and Practice for the A+ Exams 220 -60 2, 220 -60 3, and 220 -60 4 38. You have been asked to work out a backup plan for. body wrap ❏ E. Antistatic head cover Answers A, B, and C are correct. Antistatic bags, antistatic wrist straps, and antistatic table and floor mats all help reduce the effects of static electricity. This. important regarding downloading and installing software updates? ❍ A. All systems should be configured for automatic download and installation. ❍ B. All updates should be installed as soon as they

Ngày đăng: 09/08/2014, 07:20