11.07.2015 Views

Summary

Summary

Summary

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 16: Advanced Security 23Step 5: Evaluate the Problem and Implement the SolutionAt this point, you will have enough information to evaluate the problem and research andimplement possible solutions. Some resources for possible solutions include■■■■■■■■■Problem-solving experienceOther techniciansInternet searchNewsgroupsManufacturer FAQsComputer manualsDevice manualsOnline forumsTechnical websitesStep 6: Close with the CustomerAfter you have solved the problem, you will close with the customer. Closing with the customerusually includes the following:■■■■■■Discuss the solution implemented with the customer.Have customer verify that the problem has been solved.Provide the customer with all paperwork.Document steps taken to solved the problem in the work order and the technician’sjournal.Document any components used in the repair.Document the time spent to resolve the problem.Identify Common Problems and SolutionsSecurity problems can be attributed to hardware, software, networks, or some combinationof the three. You will resolve some types of security problems more often than others. Table16-4 is a chart of common security problems and solutions.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!