chabot college chapter 8 review semester iiielec 99.09 semester iii elec 99.09
TRANSCRIPT
Chabot CollegeChabot College
Chapter 8 ReviewChapter 8 Review
Semester IIISemester III ELEC 99.09ELEC 99.09
DocumentationDocumentation
• Documentation is the most critical component of good network administration.
• Documentation is the least implemented component of network administration.
• A maintenance record is used to keep a list of equipment repairs.
• Rack mount location is included in MDF and IDF documentation.
• Software listings would NOT be found on security documentation.
DocumentationDocumentation
• A software report would be used to determine what programs are installed on a particular computer.
• Network policy should be used to select network passwords.
• User policies refer to documentation that outlines what is and what is not permissible on the network.
• Configuration error is NOT used as a baseline measure.
Network Operating SystemsNetwork Operating Systems
• Network operating system (NOS) controls the resources and management of a client-server network.
• The Unix network operating system supports multi-user, multitasking, primarily uses NFS security, and is kernel based.
Peer-to-Peer NetworksPeer-to-Peer Networks
• The recommended maximum number of users in a peer-to-peer network is 10.
• A dedicated server is NOT associated with a peer-to-peer network.
• A peer-to-peer network is also known as a workgroup network.
TroubleshootingTroubleshooting
• Network troubleshooting is defined as a systematic process.
• Your first step in the troubleshooting process is to gather data.
• A possible solution to the problem of EMI/RFI effecting performance on your network is using STP cable.
TroubleshootingTroubleshooting
• The ping 127.0.0.1 command will test the loopback function on the NIC.
• An isolating transformer controls voltage spikes and HF noise.
• A grounding strap reduces the static discharge risks associated with working on the inside of a computer.
InfectionsInfections
• A worm is a program that spreads across computers and usually reproduces copies of itself in a computer's memory.
• A virus is a program that usually has a negative effect on executable programs.
Backup and StorageBackup and Storage
• Incremental backup stores all files that have been created and modified since the last full backup.
• Magnetic tape is used to backup data because the tape is inexpensive.
• RAID 5 is a redundancy technique that uses disk striping with parity and requires a minimum of three disks.