Term
Identify the problem: Anti-Virus software has found infected files. |
|
Definition
A virus has been downloaded to the computer from removable flash media, the internet, or an e-mail |
|
|
Term
Identify the problem: Computer runs slowly at the same time everyday. |
|
Definition
Anti-virus software is set up to scan at the same time everyday. |
|
|
Term
Identify the problem: Computer runs more slowly than normal, stops responding, or locks up often. |
|
Definition
The computer is infected with a virus. |
|
|
Term
Identify the problem: Windows Start button does not display. |
|
Definition
The computer is infected with a virus. |
|
|
Term
Identify the problem: Computer reports less memory than the amount of memory installed. |
|
Definition
The computer is infected with a virus. |
|
|
Term
Identify the problem: Computer powers off by itself. |
|
Definition
The computer is infected with a virus. |
|
|
Term
Identify the problem: Installed programs are corrupted or missing. |
|
Definition
The computer is infected with a virus. |
|
|
Term
Identify the problem: Internet browser displays an incorrect home page. |
|
Definition
The computer has been infected with spyware. |
|
|
Term
Identify the problem: Software firewall and anti-virus programs are turned off automatically. |
|
Definition
The computer has been infected with spyware. |
|
|
Term
Implement a solution: A virus has been downloaded to the computer from removable flash media, the internet, or an e-mail. |
|
Definition
Repair, delete, or quarantine te infected files. Enable real-time scanning. Enable auromatic updates for anti-virus software. |
|
|
Term
Implement a solution: The computer is infected with a virus. |
|
Definition
Repair, delete, or quarantine te infected files. Enable real-time scanning. Enable auromatic updates for anti-virus software. |
|
|
Term
Implement a solution: Anti-virus software is set up to scan at the same time everyday. |
|
Definition
Configure the anti-virus software to scan the computer when it is not in use. |
|
|
Term
Implement a solution: The computer has been infected with spyware. |
|
Definition
Run anti-spyware software and remove any spyware infections. |
|
|
Term
Identify the problem: Message "MBR has been changed or modified" appears at boot up. |
|
Definition
A boot sector virus has changed the master boot record. |
|
|
Term
Implement a solution: A boot sector virus has changed the master boot record. |
|
Definition
Boot the computer with a bootable floppy or flash drive and run anti-virus software to remove the boot sector virus. |
|
|
Term
Identify the problem: Windows XP computer will not boot. |
|
Definition
A virus damaged the master boot record. |
|
|
Term
Implement a solution: A virus damaged the master boot record on an XP computer. |
|
Definition
Boot the computer from the XP installation media. At the setup screen, select R - Recovery Console. At the command prompt, use fixmbr command. |
|
|
Term
Identify the problem: Windows Vista computer starts with the error message "Error Loading Operating System." |
|
Definition
A virus damaged the master boot record. |
|
|
Term
Implement a solution: A virus damaged the master boot record on a Vista computer. |
|
Definition
Boot the computer from the Vista installation media. At the Install Windows screen, select Repair your computer. At the command prompt, type bootrec.exe /fixmbr |
|
|
Term
Identify the problem: Windows Vista computer starts with the error message "Caution: this hard disk may be infected." |
|
Definition
A virus damaged the master boot record. |
|
|
Term
Identify the problem: System administrator's assistant is not able to create and modify user accounts. |
|
Definition
The system administrator's assistant does not have the correct permissions. |
|
|
Term
Implement a solution: The system administrator's assistant does not have the correct permissions. |
|
Definition
Add the administrator's assitant to the Power Users group. |
|
|
Term
Identify the problem: Guest user cannot log on to the domain. |
|
Definition
The username or password has been spelled incorrectly. The Guest user account is disabled. |
|
|
Term
Implement a solution: The username or password has been spelled incorrectly. |
|
Definition
Re-enter the username and the password correctly. |
|
|
Term
Identify the problem: User working with Windows Vista is able to install unatuthoized software. |
|
Definition
The user knows the administrator login information. UAC is disabled on the computer. |
|
|
Term
Implement a solution: The user knows the administrator login information. UAC is disabled on the computer. |
|
Definition
Change the administrator login information. Enable UAC on the computer. |
|
|
Term
Identify the problem: Temporary user was able to login last month but is unable to login now. |
|
Definition
The username or password has been spelled incorrectly. The user's account is disabled. |
|
|
Term
Implement a solution: The Guest user account is disabled |
|
Definition
Enable the Guest user account. |
|
|
Term
Implement a solution: The temporary user's account is disabled. |
|
Definition
Re-enable the temporary user account. |
|
|
Term
Identify the problem: User can log on but cannot access some folders and files. |
|
Definition
The user is not a member of the group that has access to the folders and files. |
|
|
Term
Implement a solution: The user is not a member of the group that has access to the folders and files. |
|
Definition
Add the user to the correct group. Add the correct user's permissions to the folders and files. |
|
|
Term
Identify the problem: User can locate a file on the server but cannot download the file. |
|
Definition
The user permissions are not correct. |
|
|
Term
Implement a solution: The user permissions are not correct. |
|
Definition
Change the user's permissions on the file. |
|
|
Term
Identify the problem: User is gaining access to a subfolder that should be inaccessible. |
|
Definition
The subfolder inherited permissions from the upper level folder. |
|
|
Term
Implement a solution: The subfolder inherited permissions from the upper level folder. |
|
Definition
Change the subfolder permission settings so it does not inherit the permissions from the parent folder. Set the proper permissions for the subfolder. |
|
|
Term
Identify the problem: Users of a group cannot see one folder to which they are supposed to have access. |
|
Definition
The folder permissions are set to deny. |
|
|
Term
Implement a solution: The folder permissions are set to deny. |
|
Definition
Change the folder permissions to allow. |
|
|
Term
Identify the problem: Encrypted files that are moved over the network to a new computer are no longer encrypted. |
|
Definition
The new computer does not have an NTFS partition. |
|
|
Term
Implement a solution: The new computer does not have an NTFS partition. |
|
Definition
Convert the partition on the new computer to NTFS and re-encrypt the file. |
|
|
Term
Identify the problem: User complains that the computer BIOS settings keep changing. |
|
Definition
The BIOS password is not set, allowing others to change the BIOS settings. |
|
|
Term
Implement a solution: The BIOS password is not set, allowing others to change the BIOS settings. |
|
Definition
Set a password to protect access to the BIOS settings. |
|
|
Term
Identify the problem: TPM does not show up in Device Manager. |
|
Definition
|
|
Term
Implement a solution: The TPM is disabled. |
|
Definition
Enable the TPM in the BIOS. |
|
|
Term
Identify the problem: Computer cannot ping another computer on the network. |
|
Definition
The Windows Firewall is blocking ping requests. A router is blocking ping requests. |
|
|
Term
Implement a solution: The Windows Firewall is blocking ping requests. A router is blocking ping requests. |
|
Definition
Configure the Windows Firewall to allow ping requests. Configure the router to allow ping requests. |
|
|
Term
Identify the problem: Computer cannot telnet to another computer. |
|
Definition
The Windows Firewall blocks port 23 by default. The router is blocking port 23. |
|
|
Term
Implement a solution: The Windows Firewall blocks port 23 by default. The router is blocking port 23. |
|
Definition
Configure the Windows Firewall to open port 23. Configure the router to allow port 23. |
|
|
Term
Identify the problem: E-mail program is properly configured but cannot connect to the e-mail server. |
|
Definition
The e-mail server is down. The Windows Firewall is blocking the e-mail software. |
|
|
Term
Implement a solution: The e-mail server is down. The Windows Firewall is blocking the e-mail software. |
|
Definition
Verify that the e-mail sever is operational. Create a Windows Firewall exception for your e-mail software. |
|
|
Term
Identify the problem: Computer can ping outside the local network but cannot access the World Wide Web. |
|
Definition
The Windows Firewall is blocking port 80. The Router is blocking port 80. |
|
|
Term
Implement a solution: The Windows Firewall is blocking port 80. |
|
Definition
Configure Windows Firewall to allow ping requests. |
|
|
Term
Implement a solution: The Router is blocking port 80. |
|
Definition
Configure the router to allow ping requests. |
|
|
Term
Identify the problem: Laptop firewall exceptions are allowing unauthorized connections from rogue computers. |
|
Definition
The Windows Firewall settings are incorrect. The Windows Firewall is disabled. |
|
|
Term
Implement a solution: The Windows Firewall settings are incorrect. |
|
Definition
Set the Windows Firewall to Do not allow exceptions when using a public network. |
|
|
Term
Implement a solution: The Windows Firewall is disabled. |
|
Definition
Enable the Windows Firewall. |
|
|
Term
Identify the problem: Computer can ping the proxy server, but cannot access web pages. |
|
Definition
The browser proxy server settings are incorrect. The proxy server is offline. |
|
|
Term
Implement a solution: The browser proxy server settings are incorrect. |
|
Definition
Re-enter the proxy server settings, including the IP address and port of the proxy server, and any exceptions that should be defined. |
|
|
Term
Implement a solution: The proxy serer is offline. |
|
Definition
|
|
Term
Identify the problem: A computer can connect to a network device by the IP address but not by the host name. |
|
Definition
Incorrect host name. Incorrect DNS settings. DNS server is not operational. |
|
|
Term
Implement a solution: Incorrect host name. |
|
Definition
|
|
Term
Implement a solution: Incorrect DNS settings. |
|
Definition
Re-enter the IP address of the DNS server. |
|
|
Term
Implement a solution: DNS server is not operational. |
|
Definition
|
|
Term
Identify the problem: The computer does not obtain or renew the IP address. |
|
Definition
The computer is using a static IP address. Loose network cable. Firewall is blocking DHCP. |
|
|
Term
Implement a solution: The computer is using a static IP address. |
|
Definition
Enable the computer to obtain an IP adress automatically. |
|
|
Term
Implement a solution: Loose network cable. |
|
Definition
Check the cable connections. |
|
|
Term
Implement a solution: Firewall is blocking DHCP. |
|
Definition
Change the firewall settings to allow DHCP traffic. |
|
|
Term
Identify the problem: An IP adress conflict message displays when connecting a new computer to the network. |
|
Definition
The same IP address is assigned to two different devices on the network. |
|
|
Term
Implement a solution: The same IP address is assigned to two different devices on the network. |
|
Definition
Configure each device with a unique IP address |
|
|
Term
Identify the problem: A computer has network access but does not have Internet access. |
|
Definition
The gateway IP address is incorrect. A router is not operational or is configured incorrectly. |
|
|
Term
Implement a solution: The gateway IP address is incorrect. |
|
Definition
Reboot the router and reconfigure the router settings. |
|
|
Term
Implement a solution: A router is not operational or is configured incorrectly. |
|
Definition
Reboot the router and examine the router settings. |
|
|
Term
Identify the problem: The computer automatically obtained the IP address 169.254.x.x, but cannot connect to the network. |
|
Definition
The DHCP server is not on. The computer is not connected to the network. |
|
|
Term
Implement a solution: The DHCP server is not on. |
|
Definition
|
|
Term
Implment a solution: The computer is not connected to the network. |
|
Definition
Reconnect the network cables. |
|
|
Term
Identify the problem: A computer cannot ping the loopback address. |
|
Definition
The TCP/IP suite is corrupted. The NIC is damaged. |
|
|
Term
Implement a solution: The TCP/IP address is corrupted. |
|
Definition
Uninstall and reinstall the TCP/IP suite. |
|
|
Term
Implement a solution: The NIC is damaged. |
|
Definition
|
|
Term
Identify the problem: The computer cannot send or recieve e-mail. |
|
Definition
The computer has incorrect e-mail client settings. The e-mail server is down. There is a loose or disconnected network cable. |
|
|
Term
Implement a solution: The computer has incorrect e-mail client settings. |
|
Definition
Re-configure the e-mail client settings. |
|
|
Term
Implement a solution: The e-mail server is down. |
|
Definition
Re-boot the e-mail server or notify your e-mail service provider. |
|
|
Term
Implement a solution: There is a loose or disconnected network cable. |
|
Definition
Re-connect the network cables. |
|
|
Term
Identify the problem: The computer can send e-mail, but not recieve e-mail. |
|
Definition
|
|
Term
Implement a solution: The inbox is full. |
|
Definition
Archive or delete e-mails to create space. |
|
|
Term
Identify the problem: The computer cannot recieve a certain e-mail attachment. |
|
Definition
The e-mail attachment is too large. The e-mail attachment contains a virus and has been blocked by virus protection. |
|
|
Term
Implement a solution: The e-mail attachment is too large. |
|
Definition
Ask the sender to spilt the attachment into smaller parts and resend them in individual e-mails. |
|
|
Term
Implement a solution: The e-mail attachment contains a virus and has been blocked by virus protection. |
|
Definition
Ask the sender to scan the attachment before sending it. |
|
|
Term
Identify the problem: The computer cannot authenticate to the e-mail server. |
|
Definition
The username or password is not correct. |
|
|
Term
Implement a solution: The username or password is not correct. |
|
Definition
Enter the correct username or password. |
|
|
Term
Identify the problem: A user cannot access the FTP server. |
|
Definition
Port forwarding is not enabled in the router. The maximum number of users has been reached. |
|
|
Term
Implement a solution: Port forwarding is not enabled in the router. |
|
Definition
Enable port forwarding on the router to forward port 21 to the IP address of the FTP server. |
|
|
Term
Implement a solution: The maximum number of users has been reached. |
|
Definition
Increase the maximum number of simultaneous FTP users on the FTP server. |
|
|
Term
Identify the problem: The FTP client softare cannot find the FTP server. |
|
Definition
The FTP client has an incorrect IP address or port setting. The FTP server is not running. |
|
|
Term
Implement a solution: The FTP client has an incorrect IP address or port setting. |
|
Definition
Enter the correct IP address and port settings in the FTP client. |
|
|
Term
Implement a solution: The FTP server is not running. |
|
Definition
|
|
Term
Identify the problem: The FTP server disconnects the client after a short period of inactivity. |
|
Definition
The FTP server does not allow connected clients to remain connected when commands are being sent to the FTP server. |
|
|
Term
Implement a solution: The FTP server does not allow connected clients to remain connected when no commands are being sent to the FTP server. |
|
Definition
Increase the amount of time an FTP client is allowed to remain connected without performing any actions. |
|
|
Term
Identify the problem: A user cannot log on to the FTP server. |
|
Definition
The username or password is incorrect. |
|
|
Term
Identify the problem: Unauthorized users discover authentication information during a telnet session. |
|
Definition
Telenet connect is not secured. |
|
|
Term
Implement a solution: Telnet connect is not secured. |
|
Definition
Use SSH protocol to log on to a remote host. |
|
|
Term
Identify the problem: A computer cannot access a specific HTTPS site. |
|
Definition
The browser certificate SSSL setting is incorrect. |
|
|
Term
Implement a solution: The browser certificate SSL setting is incorrect. |
|
Definition
Clear the SSL state. Add the trusted root certificate. Select Tools > Internet Options > Advanced tab and ensure the SSL checkbox is enabled. |
|
|
Term
Identify the problem: Computer can ping an IP address but not a host name. |
|
Definition
The host name is incorrect. The DNS settings of the computer are incorrect. The DNS server is not operational. NetBIOS over TCP/IP is not enabled. |
|
|
Term
Implement a solution: The host name is incorrect. |
|
Definition
Enter the correct host name. |
|
|
Term
Implement a solution: The DNS settings of the computer are incorrect. |
|
Definition
Enter the correct DNS settings. |
|
|
Term
Implement a solution: The DNS server is not operational. |
|
Definition
|
|
Term
Implement a solution: NetBIOS over TCP/IP is not enabled. |
|
Definition
Enable NetBIOS over TCP/IP |
|
|
Term
Identify the problem: A computer on one network cannot ping a computer on another network. |
|
Definition
There is a bad connection or broken device between the two networks. ICMP echo request is disabled. |
|
|
Term
Implement a solution: There is a bad connection or broken device between the two networks. |
|
Definition
Use tracert to locate which link is down and fix the broken link. |
|
|
Term
Implement a solution: ICMP echo request is disabled. |
|
Definition
Ensure that the ICMP echo request is enabled. |
|
|
Term
Identify the problem: Nslookup repors "Can't find server name for address 127.0.0.0: timed out". |
|
Definition
The DNS IP address is not configured on the local computer. |
|
|
Term
Implement a solution: The DNS IP address is not configured on the local computer. |
|
Definition
Add the IP address of a valid DNS server to the TCP/IP properties of the LAN adapter. |
|
|
Term
Identify the problem: A computer cannot connect to a shared network folder using the net use command. |
|
Definition
The folder is not shared. The computer is not in the same workgroup. |
|
|
Term
Implement a solution: The folder is not shared. |
|
Definition
Make sure the network folder is shared using the netshare command. |
|
|
Term
Implement a solution: The computer is not in the same workgroup. |
|
Definition
Set the computer to the same workgroup as the computer with the shared network folder. |
|
|
Term
Identify the problem: When attempting to use the ipconfig /release or ipconfig /renew command, you recieve the message: "No operation can be performed on the adapter while its media is disconnected." |
|
Definition
The network cable is unplugged. No NIC is installed. The computer has been configured with a static IP address. |
|
|
Term
Implement a solution: The network cable is unplugged. |
|
Definition
Reconnect the network cable. |
|
|
Term
Implement a solution: No NIC is installed. |
|
Definition
|
|
Term
Implement a solution: The computer has been configured with a static IP address. |
|
Definition
Change the TCP/IP properties of the LAN adapter to use DHCP. |
|
|
Term
Identify the problem: The computer cannot telnet into a remote computer. |
|
Definition
The telnet service has stopped. The remote computer has not been configured to accept telnet connections. |
|
|
Term
Implement a solution: The telnet service has stopped. |
|
Definition
Start the telnet service on the remote computer. |
|
|
Term
Implement a solution: The remote computer has not been configured to accept telnet connections. |
|
Definition
Configure the remote computer to accept telnet connections. |
|
|