Professor Messer

How can you recover from a bad driver installation?

You’ve just updated the driver for your video card, but you notice that it is having problems when it plays any videos. You’d now like to reinstall the older device driver, but you can’t find a copy of the original driver on your system or the manufacturer’s web site. What would be your best next step?

Will this computer run Windows 2000 Professional?

Your organization maintains a group of Windows 2000 systems that are used for client access to an important corporate application. You need to build five more Windows 2000 Professional systems, and you’ve been given a set of computers that have 300 MHz processors, have 64 MB of RAM, support video up to 1024×768 resolution, and include 20 GB hard drives. Which one of these specifications meets the minimum requirements but not the recommended requirements for a new installation of Windows 2000 Professional?

CompTIA Network+ N10-004: 6.6 – Common Security Threats

The security of the network is a never-ending struggle against the bad guys. In this video, you’ll learn about the most common security threats and what you can do to protect your network resources. We’ll discuss denial of service attacks, viruses, worms, man in the middle attacks, rogue access points, social engineering, and phishing. We’ll also show you how policies and procedures, user training, and patching can help mitigate these security problems in your network.

CompTIA Network+ N10-004: 6.5 – Device Security

The security of the devices on our network must be managed through both physical and technological means. In this video, you’ll learn the importance of good physical security, methods to restrict local and remote access to our devices, and the applications and protocols that you can use to build a more secure networking environment.

CompTIA Network+ N10-004: 6.4 – User Authentication

During a normal day, we are constantly authenticating our user credentials to web sites, file servers, and other network resources. As with most technologies, there’s more than one way to perform these authentications. In this video, you’ll learn what’s happening over the wire and become familiar with PKI, Kerberos, AAA, network access control technologies, CHAP, EAP, and much more.

CompTIA Network+ N10-004: 6.3 – Network Access Security

The network is a wide-open space, but there are a number of technologies that network and security professionals can use to help control access to critical parts of the network. In this modules, you’ll learn about filtering technologies, tunneling and encryption methods, and remote access applications and protocols.