Determine & Action Network Problems Flashcards

1
Q

What can be done to prevent credentials from being obtained through packet sniffers?

A

Encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are some good network policies?

A
  • User Permissions
  • User Agreements
  • Data Protectoin
  • Qualified Network Managers
  • Staff Training Polciy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What impacts can a poor network policy have on the network?

A

Can lead to exploits because anyone would be able to access and edit the data as they wish.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the essential items that should be included in an SLA between a SOHO business and Network Support Company?

A

Essential items to be included on an SLA include:

  • Security of data, therefore trust between the clients and business.
  • Maintaining networking devices. Most likely with the use of a checklist or schedule.
  • Implementing and acting upon a backup routine.
  • Covering for compromises to data.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are 2 benefits of documenting the initial hardware and software setup of a SOHO network?

A
  1. Able to use it as a benchmark for how devices should function.
  2. Able to refer to it in the future in case of warranty purposes.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Explain how the possibility of data loss can be minimised on a SOHO network.

A

You can prevent the possibility of data loss by having a backup routine. This may mean that you have a full backup at the end of the end of the week, and then incremental/differential backups leading up to that day.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe the differences between phishing, social engineering, and a brute-force attack.

A

The main difference is how the victim is approached.
For phishing, they’re led in by an untrustworthy sites, social engineering uses media to influence them, and brute-force has no interaction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe how SQL Injection would be carried out on your school’s website.

A

Need to be carried out by entering commands into the fields of websites, and thus damaging the database and credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe what a Dos attack is and how a network responds to one.

A

An attack where a network is flooded with useless requests and becomes overloaded. As a result, it becomes unresponsive and can crash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a botnet?

A

Computers around the world with different IP addresses with the purpose of flooding networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Explain the dangers in somebody intercepting your data.

A

Having your credentials and personal data compromised, and thus less privacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What procedures are in place to prevent the interception of data?

A

Encryption, data protection & network managers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What’s the effect and how do you solve bad NICs?

A

Intermittent network errors.

Visually inspect the card’s LED link lights.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What’s the effect and how do you solve failing switches/routers?

A

Network slowdowns and strange occurrences such as attempts to connect to secure (HTTPS) sites fail.

Complete a power cycle for the switches/routers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What’s the effect and how do you solve daisy chaining?

Where network expansion has been plugging another switch into an existing switch

A

Slow network.

Replace daisy chained switches with single switches having enough ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What’s the effect and how do you solve NetBIOS conflicts?

A

Shared files become inaccessible, increased network congestion.

Ensure older OS’s all receive the most recent service packs.

17
Q

What’s the effect and how do you solve IP conflicts?

A

Network slowdowns or computers not able to access network.

Configure IP addresses.
assigning IP address, subnet mask etc.

18
Q

What’s the effect and how do you solve excessive network based applications?

A

Slow network.

Implement hardware-based web filtering tools to prevent application from overwhelming available network bandwidth.

19
Q

What’s the effect and how do you solve spyware infestation?

A

Security breached.

Detect anti-spyware application and gateway-based protection.

20
Q

What’s the effect and how do you solve virus infestation?

A

Slow network and corrupted data.

Firewalls, OS updates and ensuring that antivirus programs are properly configured and maintained.

21
Q

What’s the effect and how do you solve insufficient bandwidth?

A

Slow network.

Upgrade existing NICs, improve NTM from WiFi to wired and use 10/100/1000 Mbps equipment.

22
Q

What’s the effect and how do you solve DNS errors?

A

This is a result of URLs not being able to be converted to IP addresses probably and is usually a result of user error or the DNS servers have failed.

You could try to check the URL again to ensure there are no user errors.

23
Q

What does a domain controller refer to?

A

Network Operating System (NOS)

24
Q

What are some tasks that come under network maintenance?

A
  • Backing up data and such as servers (using RAIDs)
  • Installing antivirus software, firewalls etc.
  • Ensuring that drivers for network-related software such as servers are up to date.
25
Q

Explain and contrast the different components you might find in a SOHO and Large Scale Network.

A
  • Different forms of NTM depending on the number of users and bandwidth needed.
  • Routers, modems, switches
  • Different forms of servers. Where a SOHO may use a single computer for a file sharing/print server, the large scale network would have multiple dedicated to the job and many more such as application servers.
26
Q

Briefly explain the purpose of having a network preventative maintenance plan.

A

The purpose of this is so that you ensure that the network is running efficiently and effectively as possible without running the risk of compromises to data or service loss.

27
Q

What tasks might be included as part of a network’s preventative maintenance plan?

A

Some tasks include:

  • Regularly checking physical security
  • Backing up
  • Antivirus software
  • Checking cables
  • Running benchmarks for software/hardware
  • Testing cables
  • Changing passwords
28
Q

Explain an efficient and effective method of backing up network data.

A

You can do a full backup one day, and incremental/differential leading up to that day.

You could also backup onto a cloud, or duplicate your drives/server using a RAID.

29
Q

Give an example of a network-related client problem and suggest a suitable solution to the problem.

A

Someone is having issues with connecting a to a network.
Reasons for this occurring could be that there are permissions set on the network which don’t allow for the user to connect.
The way to resolve this would be to contact the network administrator.

30
Q

If a ransomware attack does succeed, what can a user do to minimise the impact of the attack?

A

To encrypt and protect all other files to prevent further ransomware attacks.

31
Q

Identify an issue with the misuse of smart home voice assistants, and suggest a solution.

A

Someone could impersonate or record the voice used to access the door.

A way to solve this would be to include a secondary security solution, such as a pin code or key.

32
Q

How can an antivirus program deal with malware?

A

It can quarantine or delete the file.

33
Q

What’s one activity that’s USUALLY PERMITTED in an internet conditions of use policy?

A

Accessing company emails.

34
Q

What’s one activity that’s USUALLY NOT PERMITTED in an internet conditions of use policy?

A

Playing games, watching YouTube, online gambling.

35
Q

How can admins on a network check to see if users are/aren’t following policies?

A

Check server/proxy logs.

36
Q

What’s an example of the type of vulnerability that hackers will look for?

A

Loopholes, easy access point of the website/firewall.