Congratulations for making it reach the final week of your course! This module will have a very practical approach to the way you actually use operating systems in IT Support. This module will teach you about remote access and subsequently troubleshooting computers remotely. You will also learn how to use virtualization tools for managing and deleting virtual instances, monitoring operations via system logs, and various OS deployment options. By that time during this module, you will be ready to demonstrate the knowledge you acquired in troubleshooting issues on both the Windows operating system and the Linux operating system on implementation.
Learning Objectives:
Master the art of remote access to Windows and Linux computers.
Learn how to read and handle troubleshooting of logs.
Use disk cloning tools to build and maintain system images.
PRACTICE QUIZ: REMOTE ACCESS
1. True or false: Windows processes can operate independently of their parents.
TRUE (CORRECT)
FALSE
Great work! In Windows, when a child process is created and inherits the parent´s environment, the parent can terminate itself and not affect the child process. The child goes on to run itself. In contrast with Linux, this event occurs.
PRACTICE QUIZ: MANAGING PROCESSES
1. Which portion of the PuTTY package allows you to perform file transfers using the SCP (Secure Copy) protocol?
pscp.exe (CORRECT)
psftp.exe
pageant.exe
Great work! PSCP. exe (PuTTY Secure Copy Client) is a tool that enables the user to internally secure files to and from an external computer by means of an SCP (Secure Copy Protocol).
PRACTICE QUIZ: LOGGING
1. If you were investigating login issues on a Windows computer, which portion of the Event Viewer logs would be a good place to start your investigation?
System
Application and Services
Security (CORRECT)
Indeed, the Security log is the first place to check when troubleshooting login issues, as it logs user authentication events, logon attempts, and other security-related activities.
2. In what log files can you find information about bootup errors? Check all that apply.
/var/log/syslog (CORRECT)
/var/log/auth.log
/var/log/kern.log (CORRECT)
/var/log/mail.log
Thanks! You’re spot on—bootup issues are usually captured in kern.log and syslog because they log messages generated by the kernel and events taking place so that any potential issues with the starting process can be analyzed.
3. In what log files can you find information about authentication errors?
/var/log/syslog
/var/log/auth.log (CORRECT)
/var/log/kern.log
/var/log/mail.log
Indeed! The auth.log file holds the log messages related to authentication operations, such as login attempts, authentication success or failure, and many events related to security. Monitoring these logs is important to ensure that users have accessed the system and to detect any possible security issues.
4. For an ssh connection to work, which of the following need to be true? Check all that apply.
SSH is installed on client. (CORRECT)
The SSH server is running on the host you want to connect to. (CORRECT)
VPN needs to be set up.
You need to specify a hostname to SSH into. (CORRECT)
Great job! To you, SSH the main host at home with the following preparation: