DOC PREVIEW
Study Guide

This preview shows page 1-2 out of 5 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 5 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 5 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 5 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

study_guide8.doc Page 1 June 2000 INTERNETWORKING III CHAPTER 8 STUDY GUIDE Network Management includes Network Documentation, Network Security, Network Maintenance, Server Administration, and Server Maintenance. This is not an all-inclusive list. 1. The first and most critical component for a good network is __________ It is the most talked about and least performed task in a network. It includes: • diagrams that indicate the path of the physical wiring __________ • the __________ of cable; • the __________ of each cable; • the type of __________ for the cable; • physical location of each __________or __________and; • a __________for easy identification of each wire. 2. In your documentation, you will include the following: • A physical and logical layout of the __________ and all of the __________s in the network. It includes: ⇒ the physical layout of rack mounts, Aux. equipment, and servers in the facility ⇒ patch panel labels to identify cable terminations ⇒ identification and configuration details of all equipment located in the distribution facility • __________ and __________configuration details are to be filled out about each host attached to the network. It includes: ⇒ make and model of computer ⇒ serial number ⇒ floppy drives ⇒ hard drives ⇒ DVD/CD-ROM drive ⇒ sound and network cards ⇒ RAM amount ⇒ IRQ information ⇒ DMA information ⇒ base memory address configuration ⇒ physical location ⇒ user ⇒ network identification (IP address, MAC address, Subnet, Topology) ⇒ purchase date ⇒ warranty information • A listing of standard and special __________ used on each machine in the network. The standard configuration installation detail of each software package. This list includes __________and __________software.study_guide8.doc Page 2 June 2000 • It is also valuable to keep a list of all __________ that have been done to all equipment included in the network. This will help an administrator predict possible future problems with existing hardware and software. • “Soft” and “hard” (physical) __________ needs to be documented. It includes: ⇒ user rights ⇒ password definition ⇒ firewall support ⇒ identifying how the MDF and IDF's are locked ⇒ identifying who has access to these rooms and why ⇒ how the hosts are protected (security cables - alarms) ⇒ who has physical access to the system • __________are documents that can be the most important and beneficial to the network administrator. They contain how the users can interact with the network. These policies include: ⇒ what is and what is not permissible on the network ⇒ what the consequences of violation ⇒ what minimum user ID and password length should be ⇒ the rules for the content of passwords ⇒ maximum password age ⇒ unique passwords (not allowing the same password repeated) ⇒ restricted logon times As a network administrator, you want to create the most secure and functional network possible for your company, but make sure network policies don't conflict with company policies or limit the users access to necessary resources. 3. Network security involves two major components. The first is keeping your network safe from __________and the second is the ability to __________from catastrophic events. 4. There are multiple methods to prevent data from being lost. List the three popular data protection methods below. • __________ • __________ • __________ 5. List the five types of back up operations • __________ backup. All files on the disk are stored to tape and the archive bit for all files is set to off. • __________ backup. Backs up all the files that have been created or modified since the last full backup. It only works in conjunction with a full backup and any file created or modified has its archive bit turned back on so it will be saved to tape during the next incremental backup. • __________ backup. Backs up all the files that have been created or modified since the last full backup. This sounds the same as an incremental backup, but the difference is that even though the file is saved to tape, the archive bit is not reset.study_guide8.doc Page 3 June 2000 • __________ backup. Backs up user selected files to tape. This backup also does not reset the archive bit to off. • __________ backup. Backs up only the files that are modified on the day of the backup. This backup also does not reset the archive bit to off. 6. At the __________the backup is the responsibility of the user. Users need to know that any information that they keep locally will not be backed up and that they are responsible for this. 7. Many workstation backups are copy backups. This is usually done to a __________or __________disk drive. 8. RAID (Redundant Array of Inexpensive Disks) is an example of __________storage devices. 9. Disk mirroring and disk duplexing writes data to two identical partitions on separate hard disks thus creating an automatic backup. This is known as RAID __________protection. 10. There are other RAID levels but they are beyond what is needed for the level of understanding we need. In fact, not all network operating systems support the RAID levels mentions above. The three RAID levels that are supported by most operating systems are RAID __________RAID__________ and RAID __________. 11. RAID 5 requires a minimum of __________ disks (in a WinNT system, four because the system and boot partitions cannot be on the RAID set) and the partition size must be the same on each disk. One last important point about RAID 5 and Windows NT, to have full redundancy, this must be done. You need at least five disks, the first two will be set up as RAID 1(disk mirroring) for the system and boot partitions, and the last three data disk will be set up with RAID 5. This will provide full redundancy, with the speed advantage that RAID 5 will provide. 12. Another part of good network management is dealing with the __________factors such as static, dust, dirt, and heat. Controlling these factors will create a more stable and reliable network. 13. Power conditioning includes protecting your equipment from __________in your building's electrical wiring. The easiest way to protect your network and computer equipment is to put it on separate circuits in your building. This will solve some but not all power-related problems. Other devices are listed below. •


Study Guide

Download Study Guide
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Study Guide and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Study Guide 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?