Determine & Action Network Problems Flashcards
What can be done to prevent credentials from being obtained through packet sniffers?
Encryption.
What are some good network policies?
- User Permissions
- User Agreements
- Data Protectoin
- Qualified Network Managers
- Staff Training Polciy
What impacts can a poor network policy have on the network?
Can lead to exploits because anyone would be able to access and edit the data as they wish.
What are the essential items that should be included in an SLA between a SOHO business and Network Support Company?
Essential items to be included on an SLA include:
- Security of data, therefore trust between the clients and business.
- Maintaining networking devices. Most likely with the use of a checklist or schedule.
- Implementing and acting upon a backup routine.
- Covering for compromises to data.
What are 2 benefits of documenting the initial hardware and software setup of a SOHO network?
- Able to use it as a benchmark for how devices should function.
- Able to refer to it in the future in case of warranty purposes.
Explain how the possibility of data loss can be minimised on a SOHO network.
You can prevent the possibility of data loss by having a backup routine. This may mean that you have a full backup at the end of the end of the week, and then incremental/differential backups leading up to that day.
Describe the differences between phishing, social engineering, and a brute-force attack.
The main difference is how the victim is approached.
For phishing, they’re led in by an untrustworthy sites, social engineering uses media to influence them, and brute-force has no interaction.
Describe how SQL Injection would be carried out on your school’s website.
Need to be carried out by entering commands into the fields of websites, and thus damaging the database and credentials.
Describe what a Dos attack is and how a network responds to one.
An attack where a network is flooded with useless requests and becomes overloaded. As a result, it becomes unresponsive and can crash.
What is a botnet?
Computers around the world with different IP addresses with the purpose of flooding networks.
Explain the dangers in somebody intercepting your data.
Having your credentials and personal data compromised, and thus less privacy.
What procedures are in place to prevent the interception of data?
Encryption, data protection & network managers.
What’s the effect and how do you solve bad NICs?
Intermittent network errors.
Visually inspect the card’s LED link lights.
What’s the effect and how do you solve failing switches/routers?
Network slowdowns and strange occurrences such as attempts to connect to secure (HTTPS) sites fail.
Complete a power cycle for the switches/routers.
What’s the effect and how do you solve daisy chaining?
Where network expansion has been plugging another switch into an existing switch
Slow network.
Replace daisy chained switches with single switches having enough ports.