Ch. seventeen
maintaining the network
Summary
■ A baseline of the system should be established and then routinely collected
to predict events that may occur.
■ Monitor the network performance and do periodic comparisons between the
current indicators and the original baseline to spot trends.
■ Software programming flaws are referred to as bugs.
■ Patches or fixes are used to correct bugs and security problems as they are
discovered.
■ Microsoft periodically releases collections of fixes and patches called service
packs.
■ Software patches, fixes, and service packs should be tested before applying
them to the entire network.
■ Adding a switch to create two or more virtual LANs (VLANs) can increase
an existing network’s bandwidth.
■ The two types of UPS units are standby and continuous.
■ Data integrity is the completeness and accuracy of data stored on the
network system.
■ Ensuring system integrity requires regular data backups and protecting the
data while the server is running.
■ The three backup types are full, incremental, and differential.
■ A full backup makes a complete copy of the original data and resets the
archive bit.
■ A differential backup copies changed files since the last full backup. It does
not reset the archive bit.
■ An incremental backup copies changed files since the last incremental
backup and then resets the archive bit.
■ A good antivirus software suite and human resource training regarding
computer policies and procedures are the best defenses against malicious
software programs.
■ A virus is a self-replicating program that wastes hard disk drive space.
■ A worm is a malicious software program that automatically distributes itself
across a network system.
■ A Trojan horse is a malware program that has a deceptive or harmless
appearance as a gift.
■ There is no way to completely protect a system from malicious software
programs.
■ Caution should be used when making changes to the system registry as part
of the steps to remove a virus problem. Always back up the system registry
before making any changes.
■ System migration can be defined as combining two diverse network systems
into one or converting from one operating system to a newer version that
uses different technologies.
■ When adding equipment such as printers, use a static IP address, not a
dynamic IP address.
Review Questions
Answer the following questions on a separate sheet of paper. Please do not write in this book.
1. Why are networks monitored?
2. Why is a baseline established?
3. What are some types of information gathered for a network baseline?
4. What are some typical events that can be monitored on a server?
5. Problems in software programs are referred to as _____.
6. Software programs installed periodically to solve problems with security or
hardware are called _____ or _____.
7. Microsoft periodically releases a major collection of software patches and
fixes and refers to them as _____.
8. Why should patches be tested before installing them on a network system?
9. What should you do before installing a new software package on a network
system?
10. What should you do before installing a new hardware device on a network
server or client?
11. Explain how bandwidth is increased by installing a switch and creating two
or more virtual LANs?
12. Which RAID system does not ensure data integrity?
13. What are the three types of system data backups?
14. Which backup system takes the least amount of time to perform for a daily
backup?
15. Which backup system takes the most amount of time when restoring data?
16. Which backup system is performed using a series of individual tapes that
must be reinstalled in the exact order they were created?
17. When is the archive bit for a file reset?
18. What device is used to protect a server from power blackouts and
brownouts?
19. Will a UPS protect against voltage spikes and surges?
20. What are the two major classifications of UPS systems?
21. What is an isolation transformer?
22. All viruses and worms can be referred to as _____.
23. What is the name for a malicious software program that infects files on an
infected computer and automatically spreads to other computers?
24. What term is used to describe a malicious software program that appears as
a gift, utility, game, or an e-mail attachment?
25. What type of virus is commonly created using a simple word processing
program?
26. List seven things that a user can do and not do to help protect a system
against malware.
27. What does the term system migration mean in reference to networking
systems?
28. What precaution must be taken when combining two network systems that
are both using DHCP?
■ A baseline of the system should be established and then routinely collected
to predict events that may occur.
■ Monitor the network performance and do periodic comparisons between the
current indicators and the original baseline to spot trends.
■ Software programming flaws are referred to as bugs.
■ Patches or fixes are used to correct bugs and security problems as they are
discovered.
■ Microsoft periodically releases collections of fixes and patches called service
packs.
■ Software patches, fixes, and service packs should be tested before applying
them to the entire network.
■ Adding a switch to create two or more virtual LANs (VLANs) can increase
an existing network’s bandwidth.
■ The two types of UPS units are standby and continuous.
■ Data integrity is the completeness and accuracy of data stored on the
network system.
■ Ensuring system integrity requires regular data backups and protecting the
data while the server is running.
■ The three backup types are full, incremental, and differential.
■ A full backup makes a complete copy of the original data and resets the
archive bit.
■ A differential backup copies changed files since the last full backup. It does
not reset the archive bit.
■ An incremental backup copies changed files since the last incremental
backup and then resets the archive bit.
■ A good antivirus software suite and human resource training regarding
computer policies and procedures are the best defenses against malicious
software programs.
■ A virus is a self-replicating program that wastes hard disk drive space.
■ A worm is a malicious software program that automatically distributes itself
across a network system.
■ A Trojan horse is a malware program that has a deceptive or harmless
appearance as a gift.
■ There is no way to completely protect a system from malicious software
programs.
■ Caution should be used when making changes to the system registry as part
of the steps to remove a virus problem. Always back up the system registry
before making any changes.
■ System migration can be defined as combining two diverse network systems
into one or converting from one operating system to a newer version that
uses different technologies.
■ When adding equipment such as printers, use a static IP address, not a
dynamic IP address.
Review Questions
Answer the following questions on a separate sheet of paper. Please do not write in this book.
1. Why are networks monitored?
2. Why is a baseline established?
3. What are some types of information gathered for a network baseline?
4. What are some typical events that can be monitored on a server?
5. Problems in software programs are referred to as _____.
6. Software programs installed periodically to solve problems with security or
hardware are called _____ or _____.
7. Microsoft periodically releases a major collection of software patches and
fixes and refers to them as _____.
8. Why should patches be tested before installing them on a network system?
9. What should you do before installing a new software package on a network
system?
10. What should you do before installing a new hardware device on a network
server or client?
11. Explain how bandwidth is increased by installing a switch and creating two
or more virtual LANs?
12. Which RAID system does not ensure data integrity?
13. What are the three types of system data backups?
14. Which backup system takes the least amount of time to perform for a daily
backup?
15. Which backup system takes the most amount of time when restoring data?
16. Which backup system is performed using a series of individual tapes that
must be reinstalled in the exact order they were created?
17. When is the archive bit for a file reset?
18. What device is used to protect a server from power blackouts and
brownouts?
19. Will a UPS protect against voltage spikes and surges?
20. What are the two major classifications of UPS systems?
21. What is an isolation transformer?
22. All viruses and worms can be referred to as _____.
23. What is the name for a malicious software program that infects files on an
infected computer and automatically spreads to other computers?
24. What term is used to describe a malicious software program that appears as
a gift, utility, game, or an e-mail attachment?
25. What type of virus is commonly created using a simple word processing
program?
26. List seven things that a user can do and not do to help protect a system
against malware.
27. What does the term system migration mean in reference to networking
systems?
28. What precaution must be taken when combining two network systems that
are both using DHCP?