A Certification Study Group (PowerPoint)

Document Sample
A Certification Study Group (PowerPoint) Powered By Docstoc
					A+ Certification Study
  Group – Week 9
      Mark McCoy
    MCSE, CNE, CISSP
                Agenda
   Review Week 8 Discussion
   Chapter 15 & 16 Test Objectives
   Key Points from the Reading
   Questions/Show & Tell
   Week 10 Reading Assignment
Review of Week 8 Chapter 13 & 14
       A+ Test Objectives
   Chapter 13 – Installing Networks
    • 601: 5.2 602: 5.2 603: 5.2 Install, configure,
      and upgrade networks
   Chapter 14 – Troubleshooting
    Networks
    • 601: 5.3 603: 4.3 Identify tools, diagnostic
      procedures, and troubleshooting techniques for
      networks
    • 602: 5.3 Use tools and diagnostic procedures
      to troubleshoot network problems
        Review of Week 8 (Cont)
   Chapter 13 – Installing Networks
    • When installing a USB NIC what do you install first? The NIC or the
      Driver SW
         Driver Software

    • What two devices, in addition to the 802.11g Wireless NIC, use the
      2.4GHZ frequency band?
         Microwave and Cordless Phone

    • What is the range of a WiFi Signal (in meters)?
         75m – 125m

    • What does SSID stand for?
         Service Set ID

    • What are the two wireless network modes?
         Infrastructure & Ad-Hoc

    • What vender uses the NWLINK protocol?
         NOVELL

    • What is the maximum number of connections to a Windows XP Share?
         10
        Review of Week 8 (Cont)
   Chapter 14 – Troubleshooting
    Networks
    • What is the first thing to check when a user can’t get to the internet?
        The physical connection to the network/NIC

    • According to the CompTia 602 Exam Objectives, Remote Desktop is a:
        System Management Tool

    • What are the three ways to request Remote Assistance?
        Windows Messenger, Email, a File

    • How can you reduce the amount of IPX/SPX Broadcasts?
        Specify the Frame Type: 802.2, 802.3, Ether_Snap…

    • What are three useful Network Troubleshooting Utilities?
        Ping, Tracert, Netstat

    • What does Netstat do?
        Gives you statistical information about the TCP/IP protocols and
         network connections involving your computer
      Week 9 A+ Test Objectives
        Security (Ch 15 & 16)
   Chapter 15, Computer Security
    Fundamentals, A+ Objectives
    • 601: 6.1 602: 6.1 603: 5.1 Identify
      the fundamental principles of security
    • 604: 4.1 Identify the names, purposes,
      and characteristics of physical security
      devices and processes
        Week 9 A+ Test Objectives
          Security (Ch 15 & 16)
   Chapter 16, Implementing and
    troubleshooting Security, A+ Objectives
    •   601: 6.2 602: 6.2 603: 5.2 Install,
        configure, upgrade, and optimize security
    •   604: 4.2 Install hardware security
    •   601:6.3 602:6.3 603:5.3 Identify tools,
        diagnostic procedures, and troubleshooting
        techniques for security
    •   601:6.4 Perform preventive maintenance for
        computer security
    •   602:6.4 603:5.4 Perform preventive
        maintenance for security
Obscure Facts From Chapter 15
   The CompTIA A+ exams require that you be able to identify the various
    types of threats to computers and networks
     •   Computer Hardware Theft
     •   Identity Theft
     •   Fraud
     •   Accidents, Mistakes, Natural, and Unnatural Disasters
     •   Malicious Software Attacks (Viruses, Worms, Trojan Horses, Keystroke Loggers,
         Password Crackers, etc)
     •   Greyware (Spyware, Adware, Spam, SPIM – Spam via IM)
     •   Social Engineering
     •   Phishing: http://www.sonicwall.com/phishing .
     •   Etc
   Be sure that you understand the importance of incident reporting
     •   Efficient Incident reporting is critical to the quick resolution of the incident
   Know the Difference between Security Policy the Windows Local Security
    Policy (can substitute Domain Security Policy).
     •   Security Policy is a set of rules and practices defined for an organization
     •   Local Security Policy is an option in Administrative Tools that opens up the Local
         Security Settings applied to an individual PC.
Obscure Facts From Chapter 15
   EXERCISE 15-2: Enabling or Disabling the CTRL-ALT-
    DELETE Requirement
    • An administrator can enable or disable the ctrl-alt-delete
      requirement for an interactive logon by making a change in
      Local Security Settings. You must log on as the Administrator
      account or as a member of the Administrators group.
    • Select Start | Control Panel. In Control Panel double-click
      Administrative Tools.
    • In Administrative Tools double-click Local Security Policy.
    • In the Local Security Settings console expand Security
      Settings | Local Policies | Security Options.
    • In the details pane double-click Interactive Logon: Do Not
      Require CTRL+ALT+DEL. In the Setting dialog box click the
      radio button for the setting you want to use, Enabled or
      Disabled, as shown here.
Obscure Facts From Chapter 15
   The Comp TIA A+ exams require that you understand the
    difference between auditing logon events and auditing
    account logon events.
   Turning on auditing for logon events and for account logon
    events for a Windows XP computer.
    • Select Start | Control Panel. In Control Panel double-click
      Administrative Tools.
    • In Administrative Tools double-click Local Security Policy.
    • In the Local Security Settings console expand Security
      Settings | Local Policies | Audit Policy.
    • In the details pane double-click Audit Account Logon Events.
      In the Audit Account Logon Events Properties place a check
      mark in the box next to Success and place another one in the
      box labeled Failure, as shown here, and then click OK. You do
      not have to choose both of these, and can audit just success
      or just failure.
Obscure Facts From Chapter 15
   File and Folder Auditing.
    • This is a two-step procedure. First you enable the
      auditing of object access, and then you select the files or
      folders to audit.
    • Select Start | Control Panel. In Control Panel double-
      click Administrative Tools.
    • In Administrative Tools double-click Local Security
      Policy.
    • In the Local Security Settings console expand Security
      Settings | Local Policies | Audit Policy.
    • In the details pane, double-click Audit Object Access,
      and in the Audit Object Access Properties dialog box,
      place a check mark in the box next to Success and place
      another one in the box labeled Failure, as shown here.
      You can choose to audit just success or failure.
Obscure Facts From Chapter 16
   Be sure that you understand the
    differences between key fobs and smart
    cards.
    • As described in Chapter 15, a key fob only
      requires that a user remember a PIN number,
      which identifies that person as the owner of
      the key fob
    • Before smart cards can be used a special
      device called a smart card reader must be
      connected to the computer where the smart
      card will be used. Further, a special service,
      called Certificate Services, must be installed on
      the domain controllers for the Windows
      domain
Obscure Facts From Chapter 16
   NTFS File Encryption
    • NTFS encryption only applies to files while they
      are saved in the encrypted folder, and when
      they are moved or copied into unencrypted
      folders on NTFS volumes that support
      encryption.
    • This is true, even if the folder to which the files
      are moved does not have encryption turned
      on.
    • The files are not encrypted if they are copied
      to non-NTFS volumes or if they are e-mailed to
      someone.
Obscure Facts From Chapter 16
   Files and Settings Transfer Wizard
    • The Files and Settings Transfer Wizard must be
      run on both the old and new computer.
    • It can be started from Start | All Programs |
      Accessories | System Tools on a Windows XP
      computer, or from the main menu of the
      Windows XP CD on an old computer running
      Windows 95, Windows 98, Windows 98SE,
      Windows ME, Windows NT 4.0, Windows 2000,
      or Windows XP.
    • When the wizard runs on any version of
      Windows other than Windows XP, the only role
      available is that of Old Computer.
Obscure Facts From Chapter 16
   Permanently Removing Data when Storage is
    taken out of Service
    • To protect your data from malicious attempts to recover
      it, use programs that remove the data from the hard
      drive. The most recent name for this class of program is
      "shredder."
    • A shredder overwrites deleted files using random data.
      It overwrites the same space multiple times, and you
      can choose to shred an entire disk or any one or more
      documents.
    • Microsoft Windows XP comes with a command-line utility
      for encrypting files and folders.
          One option of this command can be used to permanently
           remove all deleted files from a folder or an entire volume.
           When you enter the command
          cipher /w:drive:\folder
Obscure Facts From Chapter 16
   Securing Wireless Networks
    •   Disable DHCP
    •   Disable SSID Broadcast
    •   Change SSID Default Name
    •   Encrypt Wireless Access
           WEP
           WPA
           WPA Enterprize
    • Implement MAC Filtering
    • CHANGE DEFAULT ADMIN PASSWORD
    • Update Firmware
Obscure Facts From Chapter 16
   Converting a FAT32 volume to NTFS for more Security
    Options
    • convert c: /fs:ntfs
   Keep System and Application Software up to date.
    • Apply vendor patches, which apply, regularly
    • Monthly Updates are normally sufficient
    • Urgent (Security Bulletin) patches should be applied as soon
      as possible after notification by the vendor or security
      organization.
    • CompTIA A+ exams stress the importance of keeping your
      operating system and security software up-to-date with
      service packs and patches and training of users.
   TRAIN USERS – Security Policies and Procedures
    • User Training is the Foundation on which Every Security Policy,
      Procedure, or Countermeasure is built.
      Questions/Show and Tell
   In addition to what we have already
    discussed, what other “interesting
    things” did you learn from Chapters
    15 & 16
   It’s your turn….
           Chapter 15 & 16
           Two-Minute Drill
   Chapter 15 Two-Minute Drill
   Chapter 16 Two-Minute Drill
Week 8 Homework Assignment
   Reading for Next Session (2 weeks)
    • Read Chapter 17
    • Read Chapter 18
   Study for End of Course Review and
    “Final Exam” in 3 weeks
   IT Professionals Group will meet Next
    Week

				
DOCUMENT INFO