5.7 Assignment The Troubleshooting Process

docx

School

ECPI University, Virginia Beach *

*We aren’t endorsed by this school

Course

CIS142

Subject

Computer Science

Date

Apr 3, 2024

Type

docx

Pages

3

Uploaded by CorporalStarEel5762

Report
The Troubleshooting Process 1 5.7 Assignment: The Troubleshooting Process Ashley Brown 202401E OL CIS142 AO Introduction to Cloud Solutions C. Heinen February 25, 2024
The Troubleshooting Process 2 5.7 Assignment: The Troubleshooting Process The divide and conquer approach in troubleshooting offers several advantages over top- down or bottom-up methods by breaking down the problem into smaller components, it allows for focused investigation and targeted solutions, reducing the time needed to identify and resolve the issue and it provides a structured framework for troubleshooting, making it easier to track progress and ensure thorough examination of all potential causes. Users may encounter difficulties in accurately describing technical issues due to lack of technical knowledge, users may struggle to articulate technical details or use incorrect terminology, leading to misunderstandings or misdiagnosis. Users may overlook crucial details or symptoms, making it challenging to assess the scope and severity of the problem. In the past, when troubleshooting a user’s access to a share, the user requested access to the share and complained that after the permissions were granted, they still received the access denied message. I first confirmed what username the user was using and then requested that user log out of her account and then log back in to trust her permission. After confirming username, I notice that the user was using the appropriate account and that wasn’t the issue, we troubleshot and then I asked if the user was working in the building or from home and the user stated that they were working from home and I asked about the VPN connection and that’s when we determined that the user was not logged into the VPN which lead to her not getting access to the share even though she was using the correct account. I informed the user that when working from home it is a requirement that she uses the VPN to make the connection to the corporate network. After the user logged into the VPN she was granted access and I documented to my team to have user check VPN connections if they are working from home and can’t access a share that the user account has access to.
The Troubleshooting Process 3 Steps for unreachable VM through the network I would first confirm the VM's network settings, Ping the VM's IP address from another device on the same network to check for connectivity, determine if there's a misconfiguration in the VM's network settings, adjust the VM's network settings, and then confirm the VM's accessibility through the network, implement any necessary changes, and document the troubleshooting process and outcomes. If I was having connections issues with specific traffic I would check the firewall, review firewall rules and security configurations to identify any restrictions or filtering applied to specific types of traffic. Even if confident in the encryption strength of an expired server certificate, it's essential to replace it immediately due to expired certificates may violate regulatory requirements and expired certificates erode trust and confidence in the server's identity and integrity, potentially leading to user skepticism or reluctance to engage with the service.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help