Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

The same employee from Scenario #3 has now called back a few days later with the same issue. You thought you had solved their

  

The same employee from Scenario #3 has now called back a few days later with the same issue. You thought you had solved their issue a few days ago, as their computer had immediately started running faster after you implemented your solution. While on your way to their office to check on their issue, you receive a call from your IT helpdesk supervisor saying they're now receiving multiple calls from employees in the same department complaining of their computers running very slowly. When you arrive in their office, you find their computer locked with a message saying their data is now encrypted and can only be unlocked by sending some form of cryptocurrency to an account number on the screen. Several key details: -Each department has their own physical switch for their IT resources -Your company recently installed an IDS (Intrusion Detection System) for their border router. -The employee with the locked computer tells you the only link they've clicked on was an email from their online bank, but that the link must've been broken because it took them to a blank page that never loaded so they just logged in using Chrome. -As of now, no other departments have any complaints about slow computers and no other employees within the same department have received a locked computer message. Please submit this file as a Word (.doc, .docx) or PDF document, making sure to include your first and last name as part of the file name. OVERVIEW - The following five scenarios require your networking troubleshooting expertise. These scenarios vary in length and complexity. This exercise is a test of your critical thinking skills; ou're being graded on how well you explain your troubleshooting process for each of the scenarios. Each scenario is worth 10 points. DIRECTIONS -You may use the guides in the Chapter 14 slides that explain possible troubleshooting methods and the troubleshooting process; OR you may just talk through your problem-solving process for each scenario. -You don't need to solve the problem in the scenarios, but you may talk about what you think the problem is as part of the troubleshooting process. You may also propose a solution(s) you'd implement if you think it applies. -Please add space between each scenario if you need more space to explain your process The same employee from Scenario #3 has now called back a few days later with the same issue. You thought you had solved their issue a few days ago, as their computer had immediately started running faster after you implemented your solution. While on your way to their office to check on their issue, you receive a call from your IT helpdesk supervisor saying they're now receiving multiple calls from employees in the same department complaining of their computers running very slowly. When you arrive in their office, you find their computer locked with a message saying their data is now encrypted and can only be unlocked by sending some form of cryptocurrency to an account number on the screen. Several key details: -Each department has their own physical switch for their IT resources -Your company recently installed an IDS (Intrusion Detection System) for their border router. -The employee with the locked computer tells you the only link they've clicked on was an email from their online bank, but that the link must've been broken because it took them to a blank page that never loaded so they just logged in using Chrome. -As of now, no other departments have any complaints about slow computers and no other employees within the same department have received a locked computer message. Please submit this file as a Word (.doc, .docx) or PDF document, making sure to include your first and last name as part of the file name. OVERVIEW - The following five scenarios require your networking troubleshooting expertise. These scenarios vary in length and complexity. This exercise is a test of your critical thinking skills; ou're being graded on how well you explain your troubleshooting process for each of the scenarios. Each scenario is worth 10 points. DIRECTIONS -You may use the guides in the Chapter 14 slides that explain possible troubleshooting methods and the troubleshooting process; OR you may just talk through your problem-solving process for each scenario. -You don't need to solve the problem in the scenarios, but you may talk about what you think the problem is as part of the troubleshooting process. You may also propose a solution(s) you'd implement if you think it applies. -Please add space between each scenario if you need more space to explain your process The same employee from Scenario #3 has now called back a few days later with the same issue. You thought you had solved their issue a few days ago, as their computer had immediately started running faster after you implemented your solution. While on your way to their office to check on their issue, you receive a call from your IT helpdesk supervisor saying they're now receiving multiple calls from employees in the same department complaining of their computers running very slowly. When you arrive in their office, you find their computer locked with a message saying their data is now encrypted and can only be unlocked by sending some form of cryptocurrency to an account number on the screen. Several key details: -Each department has their own physical switch for their IT resources -Your company recently installed an IDS (Intrusion Detection System) for their border router. -The employee with the locked computer tells you the only link they've clicked on was an email from their online bank, but that the link must've been broken because it took them to a blank page that never loaded so they just logged in using Chrome. -As of now, no other departments have any complaints about slow computers and no other employees within the same department have received a locked computer message. Please submit this file as a Word (.doc, .docx) or PDF document, making sure to include your first and last name as part of the file name. OVERVIEW - The following five scenarios require your networking troubleshooting expertise. These scenarios vary in length and complexity. This exercise is a test of your critical thinking skills; ou're being graded on how well you explain your troubleshooting process for each of the scenarios. Each scenario is worth 10 points. DIRECTIONS -You may use the guides in the Chapter 14 slides that explain possible troubleshooting methods and the troubleshooting process; OR you may just talk through your problem-solving process for each scenario. -You don't need to solve the problem in the scenarios, but you may talk about what you think the problem is as part of the troubleshooting process. You may also propose a solution(s) you'd implement if you think it applies. -Please add space between each scenario if you need more space to explain your process The same employee from Scenario #3 has now called back a few days later with the same issue. You thought you had solved their issue a few days ago, as their computer had immediately started running faster after you implemented your solution. While on your way to their office to check on their issue, you receive a call from your IT helpdesk supervisor saying they're now receiving multiple calls from employees in the same department complaining of their computers running very slowly. When you arrive in their office, you find their computer locked with a message saying their data is now encrypted and can only be unlocked by sending some form of cryptocurrency to an account number on the screen. Several key details: -Each department has their own physical switch for their IT resources -Your company recently installed an IDS (Intrusion Detection System) for their border router. -The employee with the locked computer tells you the only link they've clicked on was an email from their online bank, but that the link must've been broken because it took them to a blank page that never loaded so they just logged in using Chrome. -As of now, no other departments have any complaints about slow computers and no other employees within the same department have received a locked computer message. Please submit this file as a Word (.doc, .docx) or PDF document, making sure to include your first and last name as part of the file name. OVERVIEW - The following five scenarios require your networking troubleshooting expertise. These scenarios vary in length and complexity. This exercise is a test of your critical thinking skills; ou're being graded on how well you explain your troubleshooting process for each of the scenarios. Each scenario is worth 10 points. DIRECTIONS -You may use the guides in the Chapter 14 slides that explain possible troubleshooting methods and the troubleshooting process; OR you may just talk through your problem-solving process for each scenario. -You don't need to solve the problem in the scenarios, but you may talk about what you think the problem is as part of the troubleshooting process. You may also propose a solution(s) you'd implement if you think it applies. -Please add space between each scenario if you need more space to explain your process The same employee from Scenario #3 has now called back a few days later with the same issue. You thought you had solved their issue a few days ago, as their computer had immediately started running faster after you implemented your solution. While on your way to their office to check on their issue, you receive a call from your IT helpdesk supervisor saying they're now receiving multiple calls from employees in the same department complaining of their computers running very slowly. When you arrive in their office, you find their computer locked with a message saying their data is now encrypted and can only be unlocked by sending some form of cryptocurrency to an account number on the screen. Several key details: -Each department has their own physical switch for their IT resources -Your company recently installed an IDS (Intrusion Detection System) for their border router. -The employee with the locked computer tells you the only link they've clicked on was an email from their online bank, but that the link must've been broken because it took them to a blank page that never loaded so they just logged in using Chrome. -As of now, no other departments have any complaints about slow computers and no other employees within the same department have received a locked computer message. Please submit this file as a Word (.doc, .docx) or PDF document, making sure to include your first and last name as part of the file name. OVERVIEW - The following five scenarios require your networking troubleshooting expertise. These scenarios vary in length and complexity. This exercise is a test of your critical thinking skills; ou're being graded on how well you explain your troubleshooting process for each of the scenarios. Each scenario is worth 10 points. DIRECTIONS -You may use the guides in the Chapter 14 slides that explain possible troubleshooting methods and the troubleshooting process; OR you may just talk through your problem-solving process for each scenario. -You don't need to solve the problem in the scenarios, but you may talk about what you think the problem is as part of the troubleshooting process. You may also propose a solution(s) you'd implement if you think it applies. -Please add space between each scenario if you need more space to explain your process

Step by Step Solution

3.38 Rating (157 Votes )

There are 3 Steps involved in it

Step: 1

Troubleshooting is a method of locating the source of a computer system malfunction and correcting the efficient hardware issues A rational and thorou... blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Accounting Information Systems

Authors: Marshall B. Romney, Paul J. Steinbart

13th edition

133428532, 978-0133428537

More Books

Students also viewed these Accounting questions