CompTIA® Network+ Exam Notes : Explain The Network Troubleshooting Methodlogy

5. Network Troubleshooting and Tools

5.1 Explain the network troubleshooting methodology

Given below is the sequence of steps recommended to be followed while solving a network problem:

1. Information gathering - Identify symptoms and problems

2. Identify the affected areas of the network

3. Determine if anything has changed

4. Establish the most probable cause

5. Determine if escalation is necessary

6. Create an action plan and solution identifying potential effects

7. Implement and test the solution

8. Identify the results and affects of the solution

9. Document the solution and the entire process

Smart jack: A smart jack is a network interface device (NID) that is used between the service providers network and the internal network. NIDs usually have some kind of loop back mechanism that enables the wiring to be tested up to the demark point at the customer premises.

Remote Access Server: The remote access server allows users to gain access to files and print services on the LAN from a remote location. For example, a user who dials into a network from home using an analog modem or an ISDN connection will dial into a remote access server. Once the user is authenticated he can access shared drives and printers as if he were physically connected to the office LAN.

Question: In your organization, an employee has just resigned. You want to ensure that the employee will not be able to access his account henceforth. However, you want to re-assign the account to another person joined in his place so that you don't need to assign permissions to network resources again. What would you do?

Answer: The options available when an employee resigns are:

1. Keep the account as is

2. Disable the account temporarily, and re-asign after changing the password

3. Delete the account

The first option "Keep the account as is" is not recommended for security reasons.

The second option "Disable the account temporarily" is recommended, but not fully secure. This is because, though the password is changed, the account name is same. However, if you want all the security permissions to be available without losing any time, this would be the best option.

The third option "Delete account" is most secure, but may involve some overhead. When an account is deleted, the SID or UID associated with the account is deleted. Therefore, even if you create another account with the same name, you still loose all previously assigned security permissions.

SOW: A statement Of Work (SOW) is a formal document that captures and defines the work activities, deliverable, and timeline a vendor must execute in performance of specified work for a client.

Memoranda of understanding(MOU): MOU is a document that expresses mutual record on an issue between two or more parties. MOU are generally recognized as binding, even if no legal claim could be based on the rights and obligations laid down in them.

Material Safety Data Sheet (MSDS): It is a formal document containing important information about the characteristics and actual or potential hazards of a substance.

Master License Agreement (MLA): It is a document created by a software company that defines how their creation can be used .

Previous   Contents   Next

Network+ Cram Notes Contents ad