1 Implementing the Installation of the Network
1.1 Demonstrate awareness that administrative and test accounts, passwords, IP addresses, IP configurations, relevant SOPs, etc., must be obtained prior to network implementation.
1.2 Explain the impact of environmental factors on computer networks. Given a network installation scenario, identify unexpected or atypical conditions that could either cause problems for the network or signify that a problem condition already exists, including
1.1 Demonstrate awareness that administrative and test accounts, passwords, IP addresses, IP configurations, relevant SOPs, etc., must be obtained prior to network implementation.
1.2 Explain the impact of environmental factors on computer networks. Given a network installation scenario, identify unexpected or atypical conditions that could either cause problems for the network or signify that a problem condition already exists, including
· room conditions (e.g., humidity, heat, etc.)
· it's important to setup the room with normal humidity to prevent electrostatic discharge (ESD), air conditioning to prevent CPU overheating and system shutdown
· put the equipment in a secured cabinet in a secured room to prevent someone from tampering with unsupervised equipment during off hours
· the placement of building contents and personal effects (e.g., space heaters, TVs, radios, etc.)
· consider the effects of heat on electrical signals, electromagnetic interference (EMI) from power lines or unshielded power cables as well as TV and radio interference. Common sources of EMI are fluorescent lights, elevator motors, large generators, and refrigerator magnets.
· basements are often the best places to store computer equipment because the ground can absorb most air waves
· computer equipment
· other computer equipment can effect the unshielded data cables because of EMI, such as monitor radiation or CPU power supplies
· if the computer equipment is faulty then the network components may appear to have problems
· sometimes diagnostic software may point out faulty computer parts without wasting time guessing at the problem
· error messages.
· These are clues to help boil down the problem to the least common denominator. Once isolated, the proper remedy can be applied without too much guess work.
· Some error messages are misleading and additional diagnostic software may be required to make a more educated guess.
· it's important to setup the room with normal humidity to prevent electrostatic discharge (ESD), air conditioning to prevent CPU overheating and system shutdown
· put the equipment in a secured cabinet in a secured room to prevent someone from tampering with unsupervised equipment during off hours
· the placement of building contents and personal effects (e.g., space heaters, TVs, radios, etc.)
· consider the effects of heat on electrical signals, electromagnetic interference (EMI) from power lines or unshielded power cables as well as TV and radio interference. Common sources of EMI are fluorescent lights, elevator motors, large generators, and refrigerator magnets.
· basements are often the best places to store computer equipment because the ground can absorb most air waves
· computer equipment
· other computer equipment can effect the unshielded data cables because of EMI, such as monitor radiation or CPU power supplies
· if the computer equipment is faulty then the network components may appear to have problems
· sometimes diagnostic software may point out faulty computer parts without wasting time guessing at the problem
· error messages.
· These are clues to help boil down the problem to the least common denominator. Once isolated, the proper remedy can be applied without too much guess work.
· Some error messages are misleading and additional diagnostic software may be required to make a more educated guess.
1.3 Recognize visually, or by description, common peripheral ports, external SCSI (especially DB-25 connectors), and common network componentry, including
· print servers
· peripherals
· hubs
· routers
· brouters
1.4 Given an installation scenario, demonstrate awareness of the following compatibility and cabling issues:
· the consequences of trying to install an analog modem in a digital jack
· when an analog modem is installed into a digital jack, such as a PBX, you take the risk of burning out your modem
· that the uses of RJ-45 connectors may differ greatly depending on the cabling
· if you are cabling for 10BASE-T then the use of 2 pairs of CAT 3 wires is sufficient, but if you plan to upgrade to 100BASE-TX in the future then you will need CAT 5 and 2 pairs of wires.
· that patch cables contribute to the overall length of the cabling segment.
· when an analog modem is installed into a digital jack, such as a PBX, you take the risk of burning out your modem
· that the uses of RJ-45 connectors may differ greatly depending on the cabling
· if you are cabling for 10BASE-T then the use of 2 pairs of CAT 3 wires is sufficient, but if you plan to upgrade to 100BASE-TX in the future then you will need CAT 5 and 2 pairs of wires.
· that patch cables contribute to the overall length of the cabling segment.
2 Administering the Change Control System
2.1 Demonstrate awareness of the need to document the current status and configuration of the workstation (i.e., providing a baseline) prior to making any changes.
2.2 Given a configuration scenario, select a course of action that would allow the return of a system to its original state.
2.1 Demonstrate awareness of the need to document the current status and configuration of the workstation (i.e., providing a baseline) prior to making any changes.
2.2 Given a configuration scenario, select a course of action that would allow the return of a system to its original state.
Do a full restore from the previous day tape backup. Wipe out the partition information and rebuild the operating system and server services from scratch.
2.3 Given a scenario involving workstation backups, select the appropriate backup technique from among the following
· tape backup
· folder replication to a network drive
· removable media,
· multi-generation.
2.4 Demonstrate awareness of the need to remove outdated or unused drivers, properties, etc. when an upgrade is successfully completed.
2.5 Identify the possible adverse effects on the network caused by local changes (e.g., version conflicts, overwritten DLLs, etc.).
2.6 Explain the purpose of drive mapping, and (given a scenario) identify the mapping that will produce the desired results using Universal Naming Convention (UNC) or an equivalent feature. Explain the purpose of printer port capturing and identify properly formed capture commands, given a scenario.
2.7 Given a scenario where equipment is being moved or changed, decide when and how to verify the functionality of the network and critical applications.
2.8 Given a scenario where equipment is being moved or changed, decide when and how to verify the functionality of that equipment.
2.9 Demonstrate awareness of the need to obtain relevant permissions before adding, deleting, or modifying users.
2.10 Identify the purpose and function of the following networking elements
2.5 Identify the possible adverse effects on the network caused by local changes (e.g., version conflicts, overwritten DLLs, etc.).
2.6 Explain the purpose of drive mapping, and (given a scenario) identify the mapping that will produce the desired results using Universal Naming Convention (UNC) or an equivalent feature. Explain the purpose of printer port capturing and identify properly formed capture commands, given a scenario.
2.7 Given a scenario where equipment is being moved or changed, decide when and how to verify the functionality of the network and critical applications.
2.8 Given a scenario where equipment is being moved or changed, decide when and how to verify the functionality of that equipment.
2.9 Demonstrate awareness of the need to obtain relevant permissions before adding, deleting, or modifying users.
2.10 Identify the purpose and function of the following networking elements
· profiles
· rights
· procedures/policies,
· administrative utilities,
· login accounts, groups, and passwords.
3 Maintaining and Supporting the Network
3.1 Identify the kinds of test documentation that are usually available regarding a vendor's patches, fixes, upgrades, etc.
3.2 Given a network maintenance scenario, demonstrate awareness of the following issues:
3.1 Identify the kinds of test documentation that are usually available regarding a vendor's patches, fixes, upgrades, etc.
3.2 Given a network maintenance scenario, demonstrate awareness of the following issues:
· standard backup procedures and backup media storage practices
· the need for periodic application of software patches and other fixes to the network
· the need to install anti-virus software on the server and workstations
· the need to frequently update virus signatures.
4 Identifying, Assessing, and Responding to Problems 4.1 Given an apparent network problem, determine the nature of the action required (i.e., information transfer vs. handholding vs. technical service).
4.2 Given a scenario involving several network problems, prioritize them based on their seriousness.
No comments:
Post a Comment