Monitoring and eliminating system and software faults

Assignment Help Computer Networking
Reference no: EM133107317

PART A

Question 1. List two (2) quality assurance processes for monitoring and eliminating system and software faults.

Question 2. Explain three (3) network data flow collection and analyzing tools. You must include screenshots and functionality for each tool.

Question 3. List the steps you must take to resolve the following hardware and software related problems.
• Slowness of computer
• Blue screen.
• Computer not booting

Question 4. What is the process to change the automatic Windows 10 updates to the manual updates? Explain the process in 100-150 words.

Question 5. Give an example to explain how you can create and modify the environment variables systematically. Write your answer in 200-300 words.

Question 6. Explain in 200-300 words how will you rectify the internet connectivity related problems in windows 10.

Question 7. What fields must be present in the template to record the network problem. (List any three (3))

Question 8. Explain three (3) change management tools. Explain each in 100-150 words

Question 9. Write two (2) change control procedures for any ICT based organisation. Explain each procedure in 100-150 words

Question 10. Describe two (2) troubleshooting methodologies used for any hardware problem occurring due to newly installed hardware? (100-150 words for each method)

Question 11. Describe five (5) common computer problems and their possible solutions?

PART B
Question 1 What is a gateway? What function(s) does this perform?
(Write detailed answer in full sentences recommended length one paragraph)

Question 2 What are the 3 FTP transfer modes? Briefly describe each
(Write detailed answer in full sentences recommended length one paragraph)

Question 3 What is ‘Internet Control Message Protocol' (ICMP)? What are the functions of this?
(Write detailed answer in full sentences recommended length one paragraph)

Question 4 What is ‘User Datagram Protocol' used for?
(Write detailed answer in full sentences recommended length one paragraph)

Question 5 Outline the functions of the following protocols:(Write detailed answer in full sentences recommended length one sentence each)
a) BOOT Protocol
b) AARP

Question 6 What are the 3 principle categories of Ethernet?
(Write detailed answer in full sentences recommended length one sentence each)

Question 7 List 4 examples of useful data / information that can be obtained using a Network Monitoring Program

Question 8 Outline the functions of the following AppleTalk protocols:Write detailed answer in full sentences recommended length from one sentence to one paragraph each
a) AARP
b) NBP

Question 9 What is the difference between a router and a switch? Discuss
(Write detailed answer in full sentences recommended length one paragraph)

Question 10 List 3 methods of security that can be utilised for VoIP technology

Question 11 What is a firewall? What is the purpose of a firewall?
(Write detailed answer in full sentences recommended length one to two paragraphs - be sure to answer both parts of this question!)

Question 12 List 3 types of data security technologies

Question 13 What is DHCP? What are the reasons this protocol would be used?
(Write detailed answer in full sentences recommended length one to two paragraphs - be sure to answer both parts of this question!)

Question 14 Outline the structure of UTP cables. How does the number of twists affect quality?
(Write detailed answer in full sentences recommended length one to paragraph - be sure to answer both parts of this question!)

Question 15 Outline the structure of STP cables. Why would these be selected over UTP cables?
(Write detailed answer in full sentences recommended length oneparagraps - be sure to answer both parts of this question!)

Question 16 What are the 3 types of configurations of STP cables?

Question 17 Outline the structure of coaxial cables. List an advantage and disadvantage of this type of cable.
(Write detailed answer in full sentences recommended length one sentence to one paragraph)

Question 18 What are the following cables rated to:
a) CAT-5is rated to ...........
b) CAT-5eis rated to ...........
c) CAT-6is rated to approximately ...........

Question 19 List 3 advantages of wireless networks

Question 20 List 3 disadvantages of wireless networks

Question 21 Briefly outline the contracting procedures included in Assessment 1 at your simulated workplace
(Write detailed answer in full sentences recommended length one sentence to one paragraph)

The following questions relate to the Operating System: Windows 10

Question 22 List 5 software packages supported by this operating system

Question 23 List 5 features of this operating system

Question 24 List 4 requirements that must be checked prior to installing software on computer with this OS?

Question 25 Outline the procedures you would follow to install software (as part of your hardware installation) on this OS.
(Write detailed answer in full sentences recommended length one sentence to one paragraph)

Question 26 Choose one hardware component installed on this OS.
Outline the installation procedures
(Write detailed answer in full sentences recommended length one sentence to oneparagraph)

PART C
Question 1 What is a high strength password? Why would it be a good idea to have password strength requirements for user logins at a workplace?
Give an example and explain why with a full sentence answer

Question 2 List 5 specific security options that can be edited for a user when setting up their login

Question 3 List 5 specific hardware components that need to be checked to ensure compatibility when installing an operating system

Question 4 When installing a Windows operating system (e.g. Windows 2000) what file system should be selected? Why? explain your answer using full sentence/s

Question 5 List 3 methods that can be used to install operating systems

Question 6 What is software integration / cross-over software?

Question 7 List 3 diagnostic tools that are in-built in an operating system

Question 8 List 3 diagnostic tool products that can be used to diagnose operating system issues

Question 9 Discuss the principles of access control in detail. How can a business ensure access to data is restricted to personnel who are adequately authorised?

Give full sentences for answer, minimum length one paragraph

Question 10 What is a firewall? What is the purpose of a firewall?

Question 11 List 5 ways a computer can become infected with a virus

Questions 12 - 14 relate to the operating systems: Windows 10 and MAC OS Catalina

Question 12 List 5 software packages supported by this operating system

Question 13 List 5 features of this operating system

Question 14 List 4 operating system requirements that must be checked prior to installing the OS?

Question 15 What is the boot process? Full sentence answer please

Question 16 What is BIOS? Full sentence answer please

Question 17 How can you access BIOS at start-up? Full sentence answer please

Question 18 What is an Internet Protocol? Full sentence answer please

Question 19 What is an IP address and how does it work? Full sentence answer please

Question 20 What is a dynamic IP address? Full sentence answer please

Question 21 What is a subnet? Full sentence answer please

Question 22 What is print spooling? Full sentence answer please

Question 23 Why is it important to have a print queue management system in place?
Full sentence answer please

Question 24 Why is it important to have a print queue management system in place?
Full sentence answer please

Question 25 For 2 different OS, list a remote desktop product that is available.
Full sentence answer please

Question 26 List 3 common compatibility issues that face Windows 7, and how to work around them.
Compatibility Issue Work-around

Question 27 List 2 common compatibility issues that face Mac OSX Snow Leopard, and how to work around them.
Compatibility Issue Work-around

Question 28 What are the roles and responsibilities of employees relating to OH&S / WHS?
Give at least three

Question 29 Describe in detail the ergonomically correct way to sit at a computer desk.
Full sentence answer please, minimum two paragraphs

PART D
Question 1 What is PING? How and when is it used? Please provide a detailed answer using full sentences, suggested length one to two paragraphs

Question 2 What are Utility Software Programs? Please provide a detailed answer using full sentences, suggested length one paragraph

Question 3 List 4 different OS tools / utilities, and what they are used for

Question 4 Explain what log files are, their purpose, and what they do Please provide a detailed answer using full sentences, suggested length up to one paragraph

Question 5 What is divide and conquer in relation to Algorithm Design? Please provide a detailed answer using full sentences, suggested length one to two paragraphs

Question 6 What are the 5 components of Greedy Algorithms

Question 7 Describe the 4 components of functional testing listed below Please provide a detailed answer using full sentences, suggested length one or two sentences
Unit Testing
Integration Testing
Systems Testing
Acceptance Testing

Question 8 Describe the 4 components of non-functional testing listed below
short answer, dot points is adequate or sentences
Performance, Load, Stress Testing
Security, Vulnerability Testing
Usability Testing
Compatibility Testing

Question 9 Describe the following programming structuring short answer, dot points is adequate or sentences
Sequence
Selection
Iteration

PART E

Question 1a: List nine (9) essential elements of a Data Security Policy for an organisation.

Question 1b: Briefly explain the organisation structure. In 20-40 words.

Question 1c: As a network specialist, why you need to review organisational structure and functionality to implement data integrity? Answer in 50-70 words.

Question 2: a) What do you understand by security audit? Write your answer in 100-150 words.
b) What are the seven (7) factors to be considered for a security audit? Write your answer in 50-100 words.

Question 3: What do you understand from the term User Account Control (UAC)? Write your answer in 50-100 words.
b) What are the seven (7) reasons that trigger a UAC prompt in Windows?

Question 4: What are the seven (7) steps you will follow to set the permissions for file and folders to secure your data?

Question 5: Explain each of the following in 50-100 words:
a. Microsoft Software Inventory Analyzer - MSIA
b. MSINFO32
c. DxDiag
d. E-Z Audit

Question 6a: Briefly explain asset tracking. Answer in 50-100 words.

Question 6b: List six important aspects you should task prior to decide the asset management software.

Question 6c: Explain the importance of developing a system to record assets. Write your answer in 150-200 words.

Question 7a: List the five (5) factors to be considered while choosing an antivirus solution for a corporate office IT setup.

Question 7b: Briefly explain two current antivirus solutions for server security. Answer in 100-150 words.

Question 7c: Briefly explain two current antivirus techniques for server security. Answer in 100-150 words.

Question 8: How to install and activate AVG Antivirus? Explain in 100-150 words and add screenshots of the steps involved.

Question 9: a) What is the importance of testing the functionality of the antivirus? Write in 100-150 words.
b) Explain the steps involved to test the functionality of the antivirus. Write your answer in 100-150 words.

Question 10: Explain four (4) major environmental threats to data centers and computer rooms. Write your answer in 150-200 words.

Question 11: List the five (5) key elements required to be documented in regard to data center environmental concerns.

Question 12: Fire Suppression System is implemented in data centers to protect from fire. What is to be considered for implementing data center fire suppression systems? Write 150-200 words for your answer.

Question 13: a) List the ten (10) different types of backups used for data.
b) What are the seven (7) commonly used backup media options for taking the backup?

Question 14: a) What are the three (3) steps involved in implementing a backup solution?

b) List the five (5) compelling functionalities necessary for every enterprise backup solution.
c) List the four (4) different methods to restore the backed-up data.
d) What do you understand by real-time backup, synchronization and replication? Write your answer in 100-150 words.

Question 15: Read the following case study and answer the question.
You are working as an IT administrator in a small rganization. The rganization name is CCI media solution. The rganization is providing a range of online service including website design, SCO, Video creation and digital marketing for different businesses.
The organisation has 20 employees including management, marketing, account. Organisationdo not have any policies and procedures related to IT operation. The organisation is using following hardware and software:
• Windows server 2012
• Windows 10 for users
• Cisco router and switch
• Management is using the remote login to work from home

Question: You manager has asked you to create you a basic procedure for backup, restore and rollback of the data.

Question 16: a) List any five (5) network performance monitoring tools and describe any two tools including their functions.
b) What are the five (5) factors to consider while implementing network performance tool?

Question 17: List the ten (10) essential elements to be considered while developing a report on network performance.

Question 18 a: Briefly explain disaster recovery processes. Answer in 150-200 words.

Reference no: EM133107317

Questions Cloud

Explanation of routines : Develop a classroom management plan to share with your principal or leadership team. Explanation of routines. Description of behavior management plan aspect
Information serve for human resource departments : What purpose does job analysis information serve for human resource departments?
Why have the manager not made the change : An employee asked to have their training schedule adjusted and it still has not been done. The training class is supposed to start next week, and the student is
Explain the principles underlying most tax systems : Explain the principles underlying most tax systems. Explain why both are needed? Why, or should, both principles co-exist?
Monitoring and eliminating system and software faults : Explain network data flow collection and analyzing tools. You must include screenshots and functionality for each tool
How global movement of labour has an impact : 1. Explain how global movement of labour has an impact on HRM in Canada?
What are Lilys taxable income and tax liability for the year : Lily's taxable income before these transactions is $190,500. What are Lily's taxable income and tax liability for the year? Use Tax Rate Schedule
Explain the principles underlying most tax systems : Explain the principles underlying most tax systems. Explain why both are needed? Why, or should, both principles co-exist?
How traditional and differentiated classrooms differ : Compare/contrast and explain how traditional and differentiated classrooms differ. Provide a minimum of 3 examples with details and elaboration.

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd