Network Troubleshooting and Tools (5.0) study set
Which of the following protocols does the ping program never use to carry its messages? Ethernet ICMP IP UDP TCP
TCP
Which of the following commands displays the routing table on the local computer? arp -r netstat -r ifconfig -r telnet -r
netstat -r
Which of the following commands enables you to view the ARP table stored in memory? arp -c arp -d arp -a arp -s
arp -a The arp -a command displays the entries in the ARP table stored in its cache. The arp -d command is for deleting entries, and the arp -s command is for adding entries. The arp -c command is not a valid option.
Which of the following command-line utilities enables you to view the Internet Protocol (IP) configuration on a Unix or Linux host? ifconfig nslookup ipconfig netstat
ifconfig
Ralph has been advised to check his Linux web servers for open ports that attackers might be able to use to penetrate the servers' security. Which of the following utilities can Ralph use to do this? tcpdump dig iptables nmap
nmap
In which troubleshooting step is a trouble ticket created? Establish a theory of probable cause Verify full system functionality and, if applicable, implement preventive measures Implement the solution or escalate as necessary Test the theory to determine cause Identify the problem Document findings, actions, and outcomes Establish a plan of action to resolve the problem and identify potential effects
Identify the problem
Which of the following route commands displays the contents of a Windows computer's IPv6 routing table only? route print route print -6 route list -6 route list
route print -6
Which TCP/IP utility should you use to most easily identify a malfunctioning router on your network? ifconfig ping traceroute netstat
traceroute The traceroute (or tracert) utility can locate a malfunctioning router by using an Echo Request messages with incrementing TTL values. ifconfig is a network configuration utility for Unix and Linux systems; ping can test connectivity to another TCP/IP system, but it cannot locate a malfunctioning router; and netstat displays information about network connections and traffic but cannot locate a malfunctioning router.
Which Window's tool uses ICMP messages and manipulates IPv4 time-to-live values to illustrate the route packets take through an internetwork? Ping Netstat Route Tracert Nslookup
Tracert
Which of the following parameters enables you to specify the time-to-live (TTL) value of the messages ping transmits? -n -t -i -a
-i Running the ping tool with the -i parameter enables you to specify the time-to-live (TTL) value of the messages ping transmits. The -t parameter causes the ping tool to send messages to the target continuously until you manually stop it. The -n parameter enables you to specify the number of messages the ping tool should transmit. The -a parameter resolves an IP address you specify as the target to a hostname.
Which of the following parameters enables you to specify the number of messages the ping tool transmits? -n -t -i -a
-n Running the ping tool with the -n parameter enables you to specify the number of messages the ping tool should transmit with each execution. The -t parameter causes the ping tool to send messages to the target continuously until you manually stop it. The -i parameter enables you to specify the time-to-live (TTL) value of the messages ping transmits. The -a parameter resolves an IP address you specify as the target to a hostname.
Which of the following parameters causes the ping tool to transmit messages continually until manually halted? -n -t -i -a
-t
Which of the following cable installation tools is likely to be the most expensive? A crimper A cable certifier A punchdown tool A wiremap tester
A cable certifier
Which of the following statements about cable certifiers are true? (Choose all correct answers.) A cable certifier eliminates the need for tools like tone generators and wiremap testers. Cable certifiers are the most inexpensive cable testing solution. Cable certifiers must be reconfigured whenever a new cable specification is standardized. Cable certifiers can only test copper-based cables.
A cable certifier eliminates the need for tools like tone generators and wiremap testers. Cable certifiers must be reconfigured whenever a new cable specification is standardized.
Ed is a first-tier support technician. He receives the help calls listed here. His job is to assign them priorities based on their severity. Which of the following should be the problem that receives the lowest priority? A problem with an order entry or customer service call center resource that affects an entire department, with multiple local area networks (LANs) A fatal error that causes a single computer to fail A problem with a mission-critical backbone router that affects an entire network A problem with an application server that affects a single LAN
A fatal error that causes a single computer to fail
Which of the following is considered a system-wide error? A problem with an order entry or customer service call center resource A problem with a router that affects only one local area network (LAN) A fatal error that causes a single computer to fail A problem with an email server that affects all network users
A fatal error that causes a single computer to fail A system-wide error is a problem that renders an individual user's system (computer) completely unusable. All the other problems listed would affect more than one system or user.
Ed is a first-tier support technician. He receives the help calls listed here. His job is to assign them priorities based on their severity. Which of the following should be the problem that receives the highest priority? A problem with an order entry or customer service call center resource that affects an entire department, with multiple local area networks (LANs) A fatal error that causes a single computer to fail A problem with a mission-critical backbone router that affects an entire network A problem with an application server that affects a single LAN
A problem with a mission-critical backbone router that affects an entire network
Which of the following is a network-wide problem? A problem with an order entry or customer service call center resource A fatal error that causes a single computer to fail A problem with an application server that affects a single local area network (LAN) A problem with a router that connects an entire network to the Internet
A problem with a router that connects an entire network to the Internet Any problem that affects all the users on the network is a network-wide problem and should be given the highest priority. An example of this would be a problem with an Internet router. All other problems listed do not affect the entire network.
You have a problem with a server or other network component that prevents many users from working. What type of problem is this? A network-wide problem A shared resource problem A system-wide problem A user application problem
A shared resource problem If a problem lies within a specific server or other network component that prevents many users from working, it is a shared resource problem. A problem that lies within resources that provide services to the entire network is a network-wide problem. System-wide problems put a specific computer out of commission, preventing a user from getting any work done. An application problem is a problem that affects only a single user's access to a device or application.
Ralph is a new hire working on a network that uses CAT5 unshielded twisted pair cable, which was installed several years ago. Over time, some of the paper labels that the original cable installers used to identify the wall plates and patch panel connectors have worn away or fallen off. As a result, Ralph has quite a few cable runs that he is unable to identify. After checking with his supervisor, Ralph discovers that the company has no cable testing equipment and is unwilling to hire a consultant just to identify cable runs. What is the most inexpensive tool Ralph can use to associate unlabeled wall plates with the correct patch panel ports? A wiremap tester A cable certifier A tone generator and locator A time domain reflectometer
A tone generator and locator
Alice is the network administrator of her company's network. The company has just moved into a building that has existing Category 6 (CAT6) unshielded twisted pair cabling. However, none of the cable connections has been labeled, and Alice is trying to identify and document where each cable run starts and ends. Which tools can Alice use for this purpose? (Choose all correct answers.) A packet sniffer A loopback connector A tone generator and locator A wiremap tester
A tone generator and locator A wiremap tester
Which of the following are the three main categories of information that you can display by running the netstat command on a Windows computer? (Choose all correct answers.) Connection state Active connections Routing table Interface statistics
Active connections Routing table Interface statistics When you run the netstat command without any switch options, it displays the computer's active connections. Running netstat -e displays the computer's interface statistics. Running netstat -r displays the routing table. There is no netstat switch that displays the computer's connection state.
Ed has discovered that some of the twisted pair cable runs on his newly installed Ethernet network are well over 100 meters long. Which of the following problems is his network likely to experience due to cable segments that are greater than the specified length? Jitter Attenuation Crosstalk EMI
Attenuation Attenuation is the weakening of a signal as it travels long distances, whether on a wired or wireless medium. The longer the transmission distance, the more the signal weakens. Cable length specifications are designed in part to prevent signals from attenuating to the point at which they are unviable
Ed is trying to troubleshoot a problem that has caused a wired network connection to slow down noticeably. Which of the following wired network problems will cause a drastic slowdown of a network connection, without causing it to fail completely? (Choose all correct answers.) Bottleneck Speed mismatch Duplex mismatch TX/RX reversal
Bottleneck Duplex mismatch A speed mismatch or a TX/RX reversal will stop network communication completely.
Which of the following devices is an essential tool for technicians working on telephone cables but is not needed for data networking cable installations? Tone generator and locator Wiremap tester Cable certifier Butt set
Butt set
Alice has been told by a consultant that the newly installed twisted pair cable runs on her network might have split pairs. Which of the following cable testing tools can she use to detect split pairs? Tone generator and locator Wiremap tester Multimeter Cable certifier
Cable certifier Because all of the pins are connected properly, a tone generator and locator cannot detect this fault, and neither can a wiremap tester or a multimeter. However, a cable certifier is a highly sophisticated electronic device that can detect all types of cable faults, including split pairs, as well as measure cable performance characteristics.
Ralph is a new hire for a consulting firm that frequently performs cable installations. He is trying to learn more about the tools needed to install internal cable runs. To that end, which of the following statements about cable crimpers has Ralph found to be true? Cable installers use a crimper to attach keystone connectors to lengths of bulk cable. Cable installers use a crimper to attach RJ45 connectors to lengths of bulk cable. You need to purchase a separate crimper for each type of cable to which you want to attach connectors. Making your own patch cables by applying connectors yourself is always more economical than buying prefabricated patch cables.
Cable installers use a crimper to attach RJ45 connectors to lengths of bulk cable. Installers do not use a crimper to attach a cable end to a keystone connector. For this, they use a punchdown tool. Making patch cables yourself can represent a false economy. Buying bulk cable and connectors and making patch cables yourself can conceivably be cheaper than purchasing prefabricated cables. However, when you factor in the time needed to attach the connectors, the learning curve required to attach the connectors correctly, and the failure rate requiring the re-application of connectors, it might be more economical to purchase prefabricated patch cables in quantity instead.
Alice is working the help desk when a user calls and reports that she is unable to connect to the Internet. Which of the following steps is the one Alice is least likely to perform first when troubleshooting the problem? Check the configuration of the router connecting the LAN to the Internet. Ask the user if she can access resources on the local network. Check to see if anyone else is experiencing the same problem. Check the user's job title to see if she is an important person in the company.
Check the configuration of the router connecting the LAN to the Internet. There are many possible causes for the problem that are more likely than a router configuration error, so this is not something Alice would check first. Asking if the user can access the local network attempts to isolate the problem. If she cannot, the problem could be in her computer; if she can, then the problem lies somewhere in the Internet access infrastructure. If other users are experiencing the problem, then the issue should receive a higher priority, and Alice knows that the problem does not lie in the user's computer. While it might not be the first thing she checks, it is a political reality that higher ranking users get preferential treatment.
Which of the following should a troubleshooter look for when a duplex mismatch is suspected on an Ethernet network? (Choose all correct answers.) Collisions Runt frames CRC (cyclical redundancy check) errors Failed ping tests
Collisions Runt frames CRC (cyclical redundancy check) errors Ping tests do not detect a duplex mismatch because ping only transmits a small amount of data in one direction at a time. The mismatch only becomes apparent when the systems transmit large amounts of data.
Ralph is the network administrator of his company's network. He has had three users call the help desk to report that they are having problems connecting to the local application server. Comparing their stories, Ralph suspects that their Transmission Control Protocol (TCP) connections are being dropped. The users are not having problems connecting to any other hosts on the network. To troubleshoot this problem, Ralph decides to use a protocol analyzer. He wants to store and view only the traffic relating to the hosts and server that are having problems. How can Ralph do this? Configure a display filter. Configure a capture filter. Set a trap on the analyzer. Configure both a capture and a display filter.
Configure a capture filter. Capture filters determine what is stored in the buffer. Display filters only determine what is displayed from the contents of the buffer.
Alice is attempting to troubleshoot a communication problem between two hosts on the same network. She decides to use a protocol analyzer to capture traffic on the network. After finishing the capture, Alice notices that there are over 15,000 frames in the protocol analyzer's capture buffer. She is having a difficult time identifying the frames that relate to the problem because there are so many in the buffer. She wants to eliminate the extraneous frames from her view, enabling her to view only the frames transmitted by these two hosts. What does Alice have to do to accomplish this? Configure a display filter. Configure a capture filter. Delete the extraneous frames from the buffer. Configure a capture and display filter.
Configure a display filter.
Ralph has to spend the day completing a twisted pair cable installation in his office. Contractors have already pulled the cables through the walls and ceilings. Ralph only has to attach connectors to the ends of the cables, both internal cable runs and patch cables. Which of the following tools will Ralph need? (Choose all correct answers.) Telepole Crimper Punchdown tool Pigtail splicer
Crimper Punchdown tool
Which of the following tools can you use to create your own twisted pair patch cables? (Choose all correct answers.) Punchdown tool Crimper Pliers Wire stripper
Crimper Wire stripper
Which of the following types of interference on a twisted pair network are designed to be prevented by the twists in the wire pairs inside the cable? Crosstalk EMI Attenuation Latency
Crosstalk
Which step of the troubleshooting model involves identifying whether hardware or software has been recently installed or reconfigured? Identify symptoms Establish a theory of probable cause Establish a plan of action to resolve the problem and identify potential effects Determine if anything has changed. Test the theory to determine cause Document findings, actions, and outcomes
Determine if anything has changed.
In the standard troubleshooting methodology, which of the following steps appears last but must actually be practiced throughout the troubleshooting process? Test the theory to determine cause Document findings, actions, and outcomes Verify full system functionality and, if applicable, implement preventive measures Implement the solution or escalate as necessary Establish a plan of action to resolve the problem and identify potential effects Establish a theory of probable cause Identify the problem
Document findings, actions, and outcomes
Alice has recently installed some new computers onto her Gigabit Ethernet network. To ensure best possible network performance, she has configured the network adapters in the new computers to run at 1 Gbps speed and use full-duplex communication. Once the computers are in service, however, Alice begins getting reports of extremely poor network performance on those machines. She tries running some ping tests and does not see any problem. She calls in a consultant to perform a packet analysis, and the consultant detects large numbers of packet collisions, late collisions, cyclical redundancy check (CRC) errors, and runt frames. Which of the following could be the problem? Duplex mismatch TX/RX reversal Incorrect cable type Damaged cables
Duplex mismatch There should be no collisions at all on a full-duplex network, so the problem is clearly related to the duplexing of the communications. Ethernet running over twisted pair cable, in its original half-duplex mode, detects collisions by looking for data on the transmit and receive pins at the same time. In full-duplex mode, data is supposed to be transmitted and received at the same time. When one side of a connection is configured to use full duplex, as Alice's new computers are, and the other end is configured to use half duplex (as the switches must be), the full-duplex communications on the one side look like collisions to the half-duplex side. The half-duplex adapter transmits a jam signal as a result of each collision, which causes the full-duplex side to receive an incomplete frame. Both sides then start to retransmit frames in a continuing cycle, causing network performance to diminish drastically.
Ed has discovered that some of the twisted pair cables on his newly installed network are running right alongside fluorescent light fixtures in the drop ceiling. Which of the following problems is the network likely to experience due to the cables' proximity to the fixtures? Jitter Attenuation Crosstalk EMI
EMI Fluorescent light fixtures and other devices in an office environment can generate magnetic fields, resulting in electromagnetic interference (EMI). When a copper-based cable runs too near to such a device, the magnetic fields can generate an electric current on the cable that interferes with the signals exchanged by network devices. Jitter, crosstalk, and attenuation are all conditions that can affect the performance of a wired network, but they are not directly related to the cables' proximity to light fixtures.
When you troubleshoot a network problem, it is possible to introduce another problem while attempting to fix the original one. In which step of the troubleshooting process should you be aware of the residual effects that changes might have on the network? Identify the problem Establish a theory of probable cause Test the theory to determine cause Establish a plan of action to resolve the problem Implement the solution or escalate as necessary Verify full system functionality Document findings, actions, and outcomes
Establish a plan of action to resolve the problem
In which troubleshooting step do you try to duplicate a network problem to "divide and conquer" by logically and methodically eliminate elements that aren't the source of the problem? Identify the problem Establish a theory of probable cause Test the theory to determine cause Establish a plan of action to resolve the problem and identify potential effects Implement the solution or escalate as necessary Verify full system functionality and, if applicable, implement preventative measures
Establish a theory of probable cause
When troubleshooting, you begin by taking steps to identify the problem. After you do this, which of the following steps should you perform next? Implement the solution Establish a plan of action Establish a theory of probable cause Verify full system functionality
Establish a theory of probable cause After identifying the problem, the next step is to establish a theory for the probable cause of the problem. After that, you can test your theory, establish a plan of action, implement a solution, verify the functionality of the system, and document the entire process.
Which of the following statements about multitiered technical support organizations are true? (Choose all correct answers.) Help calls are always escalated to second-tier technicians when they involve mission-critical network components such as routers. First-tier technicians generally handle desktop problems. Second-tier technicians are generally less experienced than first-tier technicians. First-tier technicians are generally less experienced than second-tier technicians.
Help calls are always escalated to second-tier technicians when they involve mission-critical network components such as routers. First-tier technicians generally handle desktop problems. First-tier technicians are generally less experienced than second-tier technicians.
Which of the following troubleshooting steps involves prioritizing trouble tickets based on the severity of the problem? Identify the problem Establish a theory of probable cause Test the theory to determine cause Establish a plan of action to resolve the problem and identify potential effects Implement the solution or escalate as necessary Verify full system functionality and, if applicable, implement preventive measures Document findings, actions, and outcomes
Identify the problem The first step in troubleshooting is to identify the problem by establishing symptoms related to the network issue being reported. In this step, problems are typically reported as trouble tickets, which are prioritized based on the severity of the problem. You complete the other steps after the trouble ticket has been prioritized and is being investigated.
Which of the following terms describes a connectivity problem on wired networks that is caused by individual packets that are delayed due to network congestion, different routing, or queuing problems? Latency Attenuation Jitter Bottleneck
Jitter When individual packets in a data stream are delayed, the resulting connectivity problem is called jitter. Although this condition might not cause problems for asynchronous applications, real-time communications, such as Voice over IP or streaming video, can suffer interruptions, from which the phenomenon gets its name. Latency describes a generalized delay in network transmissions, not individual packet delays. Attenuation is the weakening of a signal as it travels through a network medium. A bottleneck is a condition in which all traffic is delayed, due to a faulty or inadequate component.
Which of the following indicators can you use to determine whether an adapter is connected to a functioning hub or switch? Speed light-emitting diode (LED) Collision LED Link pulse LED Status LED
Link pulse LED The link pulse LED indicates the adapter is connected to a functioning hub or switch. The speed LED specifies the data rate of the link. The collision LED lights up when collisions occur. There is no status LED on a network interface adapter.
Ralph has two computers that he long ago networked together by plugging one end of an Ethernet cable into each machine. He recently bought an old Ethernet hub at a garage sale and wants to use it to expand his network. The hub has four numbered ports and a fifth port marked with an X. Ralph plugs one computer into port 1 using his existing cable and buys a new cable to plug the other computer into port 4. The two computers cannot communicate, however. Which of the following solutions will not enable his computers to communicate? Move the port 4 cable to port 2. Replace the old cable with a second new one. Plug the computer with the old cable into the X port. Plug the computer with the new cable into the X port.
Move the port 4 cable to port 2. The problem is unlikely to be a bad hub port or a bad cable, so moving the cable from port 4 to port 2 will not help. The problem is the crossover circuit between the two computers. The two systems were once connected directly together, which means that Ralph was using a crossover cable. The hub also provides a crossover circuit (except in the X port), and old hubs often do not autonegotiate crossovers. Therefore, the connection has two crossovers, which is the equivalent of wiring transmit pins to transmit pins, instead of transmit pins to receive pins. All of the other options eliminate one of the crossover circuits, enabling the computers to be wired correctly.
Which of the following tools can you use to test the optical loss in a fiber-optic cable? An OLTS A TDR A light meter A wiremap tester
OLTS An optical loss test set (OLTS) identifies signal loss in fiber optic cabling. A time domain reflectometer (TDR) measures electrical signals in copper-based cabling, not light signals. A light meter measures the strength of light signals on fiber optic cable, but it cannot generate the signal needed to test optical loss. Wiremap testers are used only on copper cables, not fiber optic.
Which of the following cable testing tools are used only on fiber-optic networks? OTDR Multimeter Tone generator Punchdown tool
OTDR
Which of the following troubleshooting tools is not used to test copper cabling installations? Wiremap tester Multimeter Tone generator and locator OTDR
OTDR An optical time domain reflectometer (OTDR) is a device that transmits light pulses over a fiber-optic network
Ralph recently bought an old Ethernet hub and some twisted pair cables at a garage sale and wants to use them to build a home network. He plugs two computers into the hub using the cables but finds that the computers are unable to communicate. Then he notices that one of the ports in the hub is labeled with an X. He tries plugging one of the computers into the X port, and now they can communicate. Which of the following statements is the most likely explanation for this behavior? The hub has a bad port. One of the cables is a crossover cable. Both of the cables are crossover cables. The X port provides extra strength to the signals.
One of the cables is a crossover cable. Older Ethernet hubs do not autonegotiate crossovers. Instead, they have an X (or uplink) port that provides a connection without a crossover circuit, so you can connect one hub to another. If both of the cables had been standard straight-through Ethernet cables or if both had been crossover cables, then plugging them into two regular ports should have worked. Because plugging one cable into the X port worked, this means that only one of the cables must be a crossover cable. The problem, therefore, was the cable, not the port. The X port does not provide extra strength to the signals.
Alice is a consultant who has been hired to move a client's old 20-node coaxial Ethernet network to a new location. She disassembles all of the network cabling and other components and packs them for shipping. At the new site, she sets up all of the computers, plugs a T-connector into each network adapter, and connects the cables, running them from one computer to the next to form the bus. When Alice is finished, she starts the computers and tests their network connectivity. She finds that 12 consecutive computers can communicate with each other, and the other 8 can communicate with each other, but the 12 cannot communicate with the 8. She makes sure that all of the connectors are securely tightened, especially the ones on the 12th computer, but the problem persists. Which of the following is the most likely cause of the difficulty? Alice has forgotten to terminate the computers at each end of the bus. One of the connectors on the 12th computer has a bent pin. Alice has forgotten to ground the network. The transmit and receive pins are reversed on the 12th computer.
One of the connectors on the 12th computer has a bent pin. A bent pin on one of the twelfth computer's connections would cause a break in the bus, essentially forming two networks that operate independently. The failure to terminate or ground the network would not produce this type of fault. Reversing the transmit and receive pins is not possible on a coaxial connection, due to the architecture of the cable.
Ralph is testing a twisted pair cable run using a tone generator and locator. When he applies the tone generator to one particular wire at one end of the cable, he fails to detect a tone at the other end. Which of the following faults has Ralph discovered? Open Short Split pair Crosstalk
Open
Ed is troubleshooting some network performance problems. After exhausting many other possibilities, he is examining the twisted pair cable runs in the office's drop ceiling. He finds that some cables have been damaged, apparently by electricians working in that space. In some cases, the cable sheath has been split along its length, and some of the insulation on the wires inside has been scraped off as well. Which of the following types of faults might be caused by this damage? (Choose all correct answers.) Open circuits Short circuits Split pairs Transposed wires
Open circuits Short circuits A split pair is a connection in which two wires are incorrectly mapped in exactly the same way on both ends of the cable. Having transposed pairs is a fault in which both of the wires in a pair are connected to the wrong pins at one end of the cable. Both of these faults are the result of incorrect wiring during installation, and they are not caused by damaged cables.
Which of the following statements about prioritizing help calls are true? (Choose all correct answers.) Individual desktop problems take precedence over problems with shared resources. Problems with shared resources take precedence over individual desktop problems. Departmental problems take precedence over network-wide problems. Network-wide problems take precedence over departmental problems.
Problems with shared resources take precedence over individual desktop problems. Network-wide problems take precedence over departmental problems.
Which of the following troubleshooting tools enables you to copy all of the packets transmitted over a network to a buffer, interpret the protocols used in the packets, and display the output? Event Viewer Traffic monitor Protocol analyzer Management console
Protocol analyzer
Ralph is responsible for the network installation in a new building purchased by his company, and he has elected to have Category 6 unshielded twisted pair cable installed. The company president has asked him if it is possible to run their Gigabit Ethernet network using two of the wire pairs in the cable, while using the other two pairs for telephone connections. Ralph is not sure, so he sets up a lab network using cables with only two pairs connected. When he plugs computers into the switch and turns them on, the LEDs labeled 1000 light up, indicating that a Gigabit Ethernet connection has been established. Ralph gets excited at the thought of how much money he might save the company by using the same cable for both telephone and data. However, while the LED is lit, he can't seem to connect to another system over his test network. Which of the following describes what he must do to correct the problem? Ralph must manually configure the network adapters to use Gigabit Ethernet, rather than let them autonegotiate. Ralph is using the wrong two wire pairs for the Gigabit Ethernet connection. He must rewire the connectors. Ralph is using the wrong pinout standard on his lab network. He must use T568A. Ralph must use all four wire pairs for a Gigabit Ethernet connection.
Ralph must use all four wire pairs for a Gigabit Ethernet connection. a functional Gigabit Ethernet data connection requires all four wire pairs.
A routine test of a newly installed twisted pair cable run with a wiremap tester indicates that there is a short circuit on one of the wires. Which of the following procedures might possibly correct the fault? Use a different pinout on both ends of the cable Replace the connectors at both ends of the cable run Move the cable away from any potential sources of electromagnetic interference Use a higher grade of UTP cable
Replace the connectors at both ends of the cable run A short circuit is a wiring fault indicating that a pin at one end of a cable run is connected to two pins at the other end. To correct the problem, you must replace the connector with the faulty wiring. None of the other suggestions are solutions for a wiring fault.
A single Windows user suddenly can't connect to any hosts on the network (local or remote). Alice interviews the user and finds out that he made some changes to his computer's Internet Protocol (IP) configuration properties. What should she do next? Run the ipconfig command to view the local configuration Check the Domain Name System (DNS) server to see if it is resolving IP hostnames Check the Windows Internet Name Service (WINS) server to see if it is resolving Network Basic Input/Output System (NetBIOS) names Verify that the router is functioning
Run the ipconfig command to view the local configuration If the router, DNS server, or WINS server were causing the problem, more than one user would be experiencing the problem.
Ralph is testing a twisted pair cable run using a tone generator and locator. When he applies the tone generator to a particular pin at one end of the cable, he detects a tone on two pins at the other end. Which of the following faults has Ralph discovered? Open Short Split pair Crosstalk
Short
After connecting a tone generator to the green wire at one end of a twisted pair cable run, Ralph proceeds to the other end of the cable and touches the locator to each of the eight pins in turn. The green wire and the green striped wire both produce a tone. What type of wiring fault has Ralph discovered? Split pair Far-end crosstalk Transposed wires Short circuit Delay skew
Short circuit
Ed is trying to troubleshoot a problem with his wired network, and his research has led him to a list of possible network faults. The list is rather old, however, and Ed is wondering if some of the problems are relevant. Which of the following wired network problems no longer occur with modern Gigabit Ethernet switches and network adapters in their default configurations? (Choose all correct answers.) Bottleneck Speed mismatch Duplex mismatch TX/RX reversal
Speed mismatch Duplex mismatch The Gigabit Ethernet standards call for switches and network adapters to support autonegotiation by default, which enables devices to communicate and select the best network speed and duplex mode available to them both
Ed is trying to troubleshoot a problem that has caused a wired network connection to fail completely. Which of the following wired network problems will cause a complete failure of a network connection? (Choose all correct answers.) Bottleneck Speed mismatch Duplex mismatch TX/RX reversal
Speed mismatch TX/RX reversal A speed mismatch on a wired network only occurs when two devices are configured to use a specific transmission speed and those speeds are different. In that case, network communication stops. For network communication to occur on a twisted pair network, transmit (TX) pins must be connected to receive (RX) pins. If the connections are reversed, no communication occurs. Bottlenecks and duplex mismatches will slow down network communications, but they will not stop them dead.
Ralph is using a tone generator and locator to test some newly installed twisted pair cable runs on his network. Which of the following cable faults will he be unable to detect? Open Short Split pair Transposed pairs
Split pair A split pair is a connection in which two wires are incorrectly mapped in exactly the same way on both ends of the cable. Transposed pairs is a fault in which both of the wires in a pair are connected to the wrong pins at one end of the cable.
Which of the following types of wiring faults cannot be detected by a wiremap tester? Split pairs Open circuits Short circuits Transposed wires
Split pairs A wiremap tester consists of a main unit that connects to all eight wires of a UTP cable at once and a loopback device that you connect to the other end, enabling you to test all of the wires at once. A wiremap tester can detect opens and shorts, as well as transposed wires. However, it cannot detect split pairs because, in that fault, the pins are properly connected.
Which of the following application layer protocols includes a program that enables a user to log on to a network device and execute commands on the remote system using a command-line interface? (Choose all correct answers.) Telnet File Transfer Protocol (FTP) Simple Network Management Protocol (SNMP) Domain Name System (DNS) Nslookup
Telnet File Transfer Protocol (FTP) Both Telnet and FTP are protocols that include command-line client applications, with Telnet providing terminal emulation and FTP file transfer functionality.
Alice is troubleshooting a Windows server, and while doing so she runs the following command: ping 127.0.0.1. The command completes successfully. What has Alice proven by doing this? That the computer's network adapter is functioning properly That the computer's TCP/IP networking stack is loaded and functioning That the computer's IP address is correct for the network Nothing at all
That the computer's TCP/IP networking stack is loaded and functioning The IP address 127.0.0.1 is a dedicated loopback address that directs outgoing IP traffic directly into the incoming IP traffic buffer. A successful ping test using that address indicates that the computer's TCP/IP stack is functioning properly, but the traffic never reaches the network adapter or the network, so the test does not confirm that the adapter is functioning or that the computer has a correct IP address for the network.
Ralph is working on his company's perimeter network, which has five web servers running Linux, a Cisco router, a CSU/DSU providing a leased line connection, and a Windows-based firewall. While trying to troubleshoot a network communications failure, Ralph types the following command on one of the systems: traceroute adatum.com. Which of the following systems might Ralph be working on? (Choose all correct answers.) The Windows-based firewall The Cisco router The CSU/DSU console One of the Linux web servers
The Cisco router One of the Linux web servers Both Linux and the Cisco IOS operating systems have the traceroute utility. Windows has a version of the utility, but it's called tracert. The CSU/DSU cannot run a traceroute command.
Ralph is attempting to access a Domain Name System (DNS) server located on the other side of a router, but his attempt fails with an error stating that the destination port UDP 53 is unreachable. His first step in troubleshooting the problem is to try using the Nslookup utility to access that specific DNS server. This too fails. Next, he uses the ping utility with the DNS server's IP address. The ping test is successful, indicating that the server is up and running. Which of the following are possible causes of the problem? (Choose all correct answers.) The router connecting the networks is not running DNS and will not forward this type of datagram. The DNS process on the remote server is not running. The TCP/IP host configuration on your computer is improperly configured. The TCP/IP host configuration on the DNS server computer is improperly configured. There is a firewall blocking the DNS server's UTP 53 port.
The DNS process on the remote server is not running. There is a firewall blocking the DNS server's UTP 53 port. The TCP/IP client on the server is operating, as verified by the ping utility. This means that the IP host configurations on Ralph's computer and on the DNS server are both functioning.
Ralph is working on his company's perimeter network, which has five web servers running Linux, a Cisco router, a CSU/DSU providing a leased line connection, and a Windows-based firewall. While trying to troubleshoot a network communications failure, Ralph types the following command on one of the systems: ping 192.168.1.76. Which of the following systems might Ralph be working on? (Choose all correct answers.) The Windows-based firewall The Cisco router The CSU/DSU console One of the Linux web servers
The Windows-based firewall The Cisco router One of the Linux web servers Windows, Linux, and the Cisco IOS operating systems all include the ping utility. The CSU/DSU cannot run a ping command.
Ed is working the help desk at a local computer store, and he receives a call from a customer trying to set up a home network using Windows 10 and wired Ethernet equipment. The customer reports that, from her computer, she can see the two other computers in the house, but she cannot access the Internet. Ed asks her to run the ipconfig /all command and read the results to him. She says that her IP address is 172.16.41.2, her subnet mask is 255.255.255.0, and her default gateway is 172.16.43.1. Which of the following is most likely the cause of the customer's problem? The customer's network cable is unplugged. The customer has an incorrect subnet mask. The customer has an incorrect default gateway address. The computer's DNS record contains the wrong information.
The customer has an incorrect default gateway address. Because the customer can access the other two computers in the house, Ed knows that her IP address and subnet mask are properly configured that the network cable is plugged in and functional. Ed also knows that the computer's DNS record does not play a role in outgoing connections. The problem is most likely the default gateway because the gateway address the customer specified is on another network, 172.16.43.0, rather than on her own network, 172.16.41.0.
Ed is working the help desk at a local computer store, and he receives a call from a customer trying to set up a home network using Windows 10 and wired Ethernet equipment. The customer reports that, from her computer, she cannot access the two other computers in the house, nor can she access the Internet. Ed asks her to run the ipconfig /all command and read the results to him. She says that her IP address is 172.16.41.2, her subnet mask is 255.255.255.0, and her default gateway is 172.16.43.1. Which of the following could conceivably be the cause of the customer's problem? (Choose all correct answers.) The customer has an incorrect IP address. The customer has an incorrect subnet mask. The customer has an incorrect default gateway address. The computer's DNS record contains the wrong information.
The customer has an incorrect subnet mask. The customer has an incorrect default gateway address.
Ed is working the help desk at a local computer store, and he receives a call from a customer trying to set up a home network using Windows 10 and wired Ethernet equipment. The customer reports that she cannot access the other two computers in the house, nor can she access the Internet. Ed asks her to run the ipconfig /all command and read the results to him. She says that her IP address is 192.168.0.2, her subnet mask is 255.255.255.0, and her default gateway is 192.168.0.1. Which of the following is most likely the cause of the customer's problem? The customer's network cable is unplugged. The customer's network address cannot include a zero. The customer has an incorrect subnet mask. The customer has an incorrect default gateway address.
The customer's network cable is unplugged. The customer's IP address, subnet mask, and default gateway are appropriate for her home network. There is nothing wrong with having a zero in the network address. Therefore, of the options presented, the only logical choice is that the network cable is unplugged.
Alice has a network with a Domain Name System (DNS) server, a proxy server, and an Internet router. A user is complaining that she suddenly can't connect to hosts on her own local area network (LAN) and other internal LANs, and she can't access hosts on the Internet. What is the likeliest problem? The user's local configuration The proxy server The DNS server The router
The user's local configuration A DNS, proxy, or router problem would affect more than one user.
What is the name for a device that determines the length of a cable by transmitting a signal at one end and measuring how long it takes for a reflection of the signal to return from the other end? Fox and hound tester Wiremap tester Time domain reflectometer Voltage event recorder Butt set
Time domain reflectometer The technique that provides this capability is called time domain reflectometry (TDR). The tester transmits a signal over the cable and measures how long it takes for a reflection of the signal to return from the other end. OTDR does the same with light. Optical cable reflection.
Ralph is testing some newly installed twisted pair cable runs on his network using a wiremap tester, and he has found one run that appears to have a cable break. However, the connectors at both ends are correctly installed, so the break must be somewhere inside the cable itself, which is nearly 100 meters long. Which of the following tools can Ralph use to determine the location of the cable break? (Choose all correct answers.) Tone generator and locator Multimeter Time domain reflectometer Cable certifier
Time domain reflectometer Cable certifier
A user reports that she can't connect to a server on her network. Ed wants to identify the scope of the problem, so he tries to reproduce the problem on the user's computer. The problem still remains. No other users are reporting this problem. What is the next logical step that Ed should perform to identify the affected area? Verify that the local router is forwarding traffic Try performing the same task on a computer attached to the same segment Verify that the server is configured properly Verify that the switch the client is connected to is functioning
Try performing the same task on a computer attached to the same segment In this scenario only one user is reporting a problem. Therefore, the likeliest next step is to perform the same task on another computer attached to the same segment.
Users are having trouble connecting to Internet hosts. Alice suspects that there is a problem with the Domain Name System (DNS) server, and she wants to verify this. Which of the following steps can she take to determine whether the DNS server is resolving Internet hostnames? Issue the ipconfig command from a local workstation Try to connect to a host using the Internet Protocol (IP) address instead of the hostname Ping the DNS server to see if it is functioning Use the tracert command to test the functionality of the DNS server
Try to connect to a host using the Internet Protocol (IP) address instead of the hostname
Ralph has been asked to create some new patch cables that will be used to connect patch panel ports to the network switches. He has been told that the patch panel connectors are all wired using the T568A pinout standard. Which of the following instructions should Ralph use when creating the patch cables? Use T568A at both ends Use T567B at both ends Use T568A at one end and T568B at the other end Use either standard, as long as both ends are the same
Use either standard, as long as both ends are the same Either the T568A or the T568B pinout standard is acceptable. The patch cables will function properly as long as both ends are wired using the same pinout standard.
Which of the following are not general troubleshooting steps? (Choose all correct answers.) Identify the problem Establish a theory of probable cause Test the theory to determine cause Verify that the client's Internet Protocol (IP) configuration is correct Establish a plan of action to resolve the problem and identify potential effects Verify that the router is forwarding. Implement the solution or escalate as necessary Verify full system functionality and, if applicable, implement preventive measures Document findings, actions, and outcomes
Verify that the client's Internet Protocol (IP) configuration is correct Verify that the router is forwarding.
Which of the following network applications are most likely to be obviously affected by the wired network connectivity problem known as jitter? (Choose all correct answers.) Email VoIP Streaming video Instant messaging
VoIP Streaming video Jitter is a connectivity problem on wired networks that is caused by individual packets that are delayed due to network congestion, different routing, or queuing problems. When individual packets in a data stream are delayed, the resulting connectivity problem is called jitter. While this condition might not cause problems for asynchronous applications, such as email and instant messaging, real-time communications, such as Voice over IP (VoIP) or streaming video, can suffer intermittent interruptions, from which the phenomenon gets its name.
Which of the following Windows command-line utilities produced the output shown here? Interface: 192.168.2.24 --- 0x2 Internet Address Physical Address Type 192.168.2.2 d4-ae-52-bf-c3-2d dynamic 192.168.2.20 00-26-c7-7e-00-e0 dynamic 192.168.2.22 00-90-a9-a2-43-8f dynamic ping tracert netstat arp
arp Running the arp utility with the -a parameter on a Windows system displays the contents of the Address Resolution Protocol (ARP) cache. The cache contains records of the IP addresses on the network that arp has resolved into MAC addresses. The ping, tracert, and netstat utilities are not capable of producing this output.
Which of the following Windows commands enables you to delete the entire ARP cache? arp -c * arp -d * arp -a arp -s
arp -d *
Which of the following command-line utilities can only run on Unix and Linux systems? ping ipconfig tracert ifconfig netstat
ifconfig The ipconfig and tracert commands run only on Windows, although there is a Unix/Linux version of tracert called traceroute.
Ralph is the administrator of his company's network. He has a Dynamic Host Configuration Protocol (DHCP) server configured to supply Internet Protocol (IP) addresses and configuration information to all of the Windows computers on the network. One of the Windows users reports that she cannot connect to the network. Which of the following commands can Ralph run on her computer to verify the status of the computer's IP settings and configuration parameters? ifconfig ipconfig msinfo32 tracert
ipconfig
Which of the following command-line utilities can only run on Windows systems? ping ipconfig traceroute ifconfig netstat
ipconfig
Which of the following Windows command-line utilities produced the output shown here? Active Connections Proto Local Address Foreign Address State TCP 127.0.0.1:5327 CM412:49770 ESTABLISHED TCP 127.0.0.1:49770 CM412:5327 ESTABLISHED TCP 127.0.0.1:52114 CM412:52115 ESTABLISHED ping tracert netstat arp
netstat Running the Windows netstat utility with no parameters generates a list of the workstation's active connections.
Which of the following commands can Ralph use to display the number of bytes that a Windows workstation has transmitted? netstat tcpdump ipconfig iptables
netstat tcpdump is a data-network packet analyzer computer program that runs under a command line interface
Which of the following netstat commands can tell you how many IPv6 packets have been received on a particular Windows workstation? netstat -a netstat -s netstat -e netstat -r
netstat -s Netstat is a command line utility for Linux that prints network connections, routing tables, interface statistics, masquerade connections, and multicast memberships. Netstat can be used to diagnose network issues and service problems.
Which of the following command-line utilities enables you to generate Domain Name System (DNS) request messages? ifconfig nslookup nbtstat netstat
nslookup The nslookup tool enables you to generate DNS request messages from the command line and send them to a specific DNS server. The other options listed are not DNS utilities.
Which of the following Windows command-line utilities produced the output shown here? Server: trv213.pljd.net Address: 203.186.120.114 Non-authoritative answer: Name: microsoft.com Addresses: 104.43.195.251 23.100.122.175 23.96.52.53 191.239.213.197 104.40.211.35 nslookup pathping netstat route
nslookup nslookup is a command-line utility that generates DNS resource record requests and sends them to a specific DNS server.
Which of the following utilities can you use to view resource record information on a particular DNS server? (Choose all correct answers.) netstat nslookup nbtstat arp dig
nslookup dig nslookup and dig are both command-line utilities that you can direct to a specific DNS server and then generate queries that display resource record information the program retrieves from the server. netstat displays information about networking protocols, whereas nbtstat displays information derived from the system's NetBIOS over TCP/IP implementation. arp is a tool that you can use to display and manage a system's ARP table entries. netstat, nbtstat, and arp are not able to display resource record information.
Which of the following command-line utilities is capable of performing the same basic function as traceroute or tracert? ping pathping netstat route
pathping
Running ping to specify the size of the messages sent to the target, in this case, 2028 bytes. Specify the number of messages the ping tool should transmit, in this case 11. ping 10.0.0.1 -t ping 10.0.0.1 -n 2048 ping 10.0.0.1 -l 2048 -n 11 ping 10.0.0.1 -l 2048 -t ping 10.0.0.1 -n 2048 -t 11
ping 10.0.0.1 -l 2048 -n 11
Which of the following Windows command-line utilities produced the output shown here? Reply from 97.74.144.153: bytes=32 time=111ms TTL=53 Reply from 97.74.144.153: bytes=32 time=109ms TTL=53 Reply from 97.74.144.153: bytes=32 time=108ms TTL=53 Reply from 97.74.144.153: bytes=32 time=109ms TTL=53 Statistics for 97.74.144.153: Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 108ms, Maximum = 111ms, Average = 109ms ping tracert netstat arp
ping
Which of the following command-line utilities can run on both Windows and Unix/Linux systems? (Choose all correct answers.) ping traceroute ifconfig iptables nslookup
ping nslookup The ping and nslookup utilities can both run on Windows or Unix/Linux systems. The traceroute command runs only on Unix/Linux, although there is a Windows version called tracert. The ifconfig and iptables commands only exist on Unix and Linux systems.
Ralph is the administrator of his company's network. All of the users on the network are reporting that they are having difficulty connecting to a particular application server that is located on a perimeter network, on the other side of a router. The users are not having trouble connecting to local hosts. Which of the following troubleshooting tools can Ralph use to verify the network layer functionality of the application server and the router? (Choose all correct answers.) ping route arp traceroute
ping traceroute Ralph can use the ping and traceroute tools to verify the network layer functionality of the application server and the router. The ping tool tests the network layer through the exchange of Internet Control Message Protocol (ICMP) Echo and Echo Reply messages. The traceroute tool can verify that there is a functioning path between the users' workstations and the application server. The route tool is used to administer the routing table on the local machine. The arp tool is used to view a computer's Media Access Control (IP to MAC) address resolution table stored in memory.
While performing a protocol analysis, Alice notes that there are many ICMP packets in her captured traffic samples. She attributes these to her frequent use of TCP/IP troubleshooting tools. Which of the following utilities are used to test network layer characteristics of a host using Internet Control Message Protocol (ICMP) messages? (Choose all correct answers.) ipconfig netstat ping tracert
ping tracert
Ed suspects that his workstation is experiencing TCP/IP communication problems. Which of the following commands can he use to confirm that the computer's TCP/IP stack is loaded and functioning? (Choose all correct answers.) ping loopback ping localhost ping 127.0.0.1 ping 127.0.0.0
ping localhost ping 127.0.0.1
Ralph is a network administrator who has had a Windows user report difficulties accessing certain other computers on the network. Ralph determines that the user is only experiencing problems when trying to connect to a system on the far side of a router. Ralph therefore decides to inspect the routing table on the user's computer. Which of the following tools can he use to do this? (Choose all correct answers.) nbtstat route nslookup netstat
route netstat The route print tool displays the contents of the routing table on a Windows computer. So does the netstat -r command. The nbtstat and nslookup tools cannot display the routing table.
Which of the following Windows command-line utilities produced the output shown here? 1 <1 ms <1 ms <1 ms RT-N86U [192.168.2.99] 2 3 ms 5 ms 4 ms 192.168.3.1 3 25 ms 30 ms 17 ms 10.172.1.1 4 20 ms 19 ms 29 ms gateway-BE1-EBlocal.eh.lpod.net [207.44.123.89] ping tracert netstat arp
tracert