Monitoring and Troubleshooting Networks (Lesson 8)

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

What are the steps (in order) of the CompTIA Network+ troubleshooting methodology?

1. Identify the problem 2. Establish probable cause 3. Test the theory to determine cause 4. Establish a plan of action 5. Implement the solution (or escalate as necessary) 6. Verify full system functionality and implement preventive measure 7. Document findings

How many steps are there in the CompTIA Network+ troubleshooting methodology?

7

Gathering systems' statistics regularly allows system administrators toidentify bottlenecks. Why do they want to do this? A) To identify resource usage problems before they critically affect performance. B) To troubleshoot IP connectivity issues. C) To review log information collected by SIEM. D) To mitigate storage issues and identity opportunities for SAN and/or NAS.

A

Users on a floor served by a single switch cannot get a network connection.What is the best first step? A) Reset the switch B) Reset all user devices C) Check for an IP issue D) Check auto negotiation settings

A

Which monitoring alert can an administrator configure to measure the total amount of data transferred in a 24-hour period? A) Utilization B) Speed C) Resets D) Link status

A

Which of the following is not a network category type? A) SAN B) LAN C) CAN D) WAN

A

Which of the following is not an element of contingency planning? A) Fire suppression systems B) Business continuity C) Backup site D) Disaster recovery

A

After asking the three basic questions of anyone reporting a problem, whatshould you have determined? (Choose three.) A) Whether to look for recent change or an oversight in configuration B) Where to look for the problem C) The severity of the problem D) If the problem should be escalated

A, B, C

Which three means of establishing a theory of probable cause refer to the OSI model? (Choose three) A) Divide-and-conquer B) Top-to-bottom C) Bottom-to-top D) Priority

A, B, C

Users on a network segment have been experiencing poor performance. The cause has been identified as a broadcast storm. What is often the cause of broadcast storms? (Select all that apply) A) Network card/switch B) Misconfigured STP C) Power source D) Looping riding devices E) Duplicate IPs

A, B, D

Identify the examples of open questions a network manager may ask users in step one of the Computing Technology Industry Association (CompTIA) Network+ troubleshooting methodology. (Select two) A) What happens when the webpage opens? B) What is the response status code? C) What other applications are working correctly? D) Is a shortcut to the database on the desktop?

A, C

A single host on a network is unable to resolve names. Evaluate Domain Name System (DNS) configuration issues and determine which are the most likely to be the cause. (Select two). A) The DNS address is not configured. B) The DNS server is offline. C) The DNS service configuration is incorrect. D) The DNS suffix is incorrect.

A, D

You suspect that a network application is generating faulty packets. What interface metric(s) might help you to diagnose the problem? (Choose 2) A) Errors B) Resets C) Speed D) Duplex E) Discards/drops

A, E

A network administrator is calculating the throughput between two hosts. The administrator transfers a 2-Gigabyte (GB) file in 30 minutes. Solve the throughput between the two hosts in Megabits per second (Mbps). A) 4.55 Mbps B) 9.54 Mbps C) 4.77 Mbps D) 19.09 Mbps

B

A network technician discovers that a port with mismatched speed settings are the cause of an outage. Evaluate the types of issues that can occur in a network and determine what type of issue the scenario represents. A) Gateway B) Network Interface C) Dynamic Host Configuration Protocol (DHCP) d) Routing

B

A technician needs to protect the network power system. All of the following are good solutions for her to implement, EXCEPT: _____. A) Redundant power supply B) LCD monitors C) Backup generator

B

Following maintenance on network switches, users in one department cannot access the company's internal web and email servers. You can demonstrate basic connectivity between the hosts and the servers by IP address. What might the problem be? A) Router issues B) Name resolution C) Power outage D) DHCP

B

What is a top listener in terms of network monitoring? A) Interface that generates the most outgoing traffic B) Interface that receives the most incoming traffic. C) Interface that both generate and receives the most traffic. D) Interface primarily used for troubleshooting the network.

B

What is the function of a SIEM? A) Troubleshooting poor network performance B) Assisting with security logging and alerting C) Measuring network throughput D) Obtaining IP addresses through DHCP

B

A junior technician escalates a trouble ticket to a senior technician. Which of the following are reasons for the technician to take this action? (Select two) A) The problem falls under a system warranty. B) The solution requires a major reconfiguration of the network. C) A customer becomes difficult to work with. D) The scope of the problem is unknown.

B, C

A network administrator has had difficulty keeping track of IP address assignments on networking devices and clients recently. Which of the following is the BEST technology to aid in this scenario? A) DNS B) DHCP C) IMAP D) NTP

C

A network manager becomes aware of network degradation. The manager uses the Computing Technology Industry Association (CompTIA) Network+ troubleshooting methodology. Analyze this methodology and determine the third troubleshooting step the manager will employ. A) Establish a theory of probable cause. B) Establish a plan of action. C) Test the theory to determine cause. D) Implement the solution or escalate, as necessary.

C

How does an SNMP agent report an event to the management system? A) Get B) Indicator C) Trap D) Log

C

What sort of log would you inspect if you wanted to track web server access attempts? A) System logs B) Application/general logs C) History/security/audit logs D) Performance logs

C

Which of the following DNS records need to be configured for SMTP traffic? A) A B) CNAME C) MX D) PTR

C

You have connected a new computer to a network port and cannot get a link. You have tested the adapter and cable and can confirm that there areno problems. No other users are experiencing problems. The old computer also experienced no problems. What cause would you suspect, and what is a possible next step? A) Duplicate IP address B) DNS issue C) Speed mismatch D) Power outage

C

A network manager is configuring a management and monitoring system for a network. Recommend guidelines that the administrator can utilize for the configuration. (Select two) A) Configure the server to provide information to the monitoring system. B) Install the monitoring system on each host on the network. C) Identify metrics to use for monitoring network health and performance. D) Record baseline measurements for selected metrics.

C, D

Windows machines on a network are failing to obtain an Internet Protocol (IP) configuration. Analyze this type of network issue and determine possible reasons for this failure. (Select two) A) The Dynamic Host Configuration Protocol (DHCP) reservation lease has expired. B) The client has been configured without a Domain Name System (DNS) address. C) The device time is not set correctly and the Internet Protocol (IP) address shows as expired. D) There are no more addresses available in the current scope.

C, D

A technician has just been hired by a company. What type of documentation should she expect to encounter? A) Inventory B) IDF/MDF diagrams C) Wiring diagram D) all of these answers

D

The help desk receives an increase in calls from employees stating that the network is slow. A network manager uses a network performance tool and notices that 10% of the end user devices are using 80% of the network. Further investigation reveals that the users with the most bandwidth are streaming music. What is occurring on the network? A) Throughput B) Top talkers C) Thresholds D) Bottleneck

D

Which choice is not a backup methodology? A) Differential B) Incremental C) Full D) Photographic

D

Which choice is not an element of unified communication (UC)? A) Presence information B) Collaboration C) Video conferencing D) Virtualization

D

Which of the following is a step in network design? A) Assess customer needs. B) Check operating system compatibility. C) Assess current network infrastructure. D) all of these answers

D

Which step has been omitted from the list of activities related to identifying the problem: Gather information, duplicate the problem, question users, identify symptoms, determine if anything has changed. A) Utilize the divide-and-conquer approach B) Escalate if needed C) Upgrade system D) Approach multiple problems individually

D

You have pinged the router for the local subnet and confirmed that there is a valid link. The local host cannot access remote hosts, however. No other users are experiencing problems. What do you think is the cause? A) There is a duplicate MAC address on the network B) The router is offline C) There is a duplicate IP address on the network D) The router is not configured as the default gateway for the local host

D

True or False? Documentation should be created only at the end of the troubleshooting process.

False

True or False: Port 162 is used for SNMP Trap.

True

Which step follows "Implement the solution or escalate as necessary" in the troubleshooting methodology?

Verify full system functionality


Kaugnay na mga set ng pag-aaral

PCR, Western Blot, Immunohistochemistry

View Set

NUR 210 (M1) - Chest Tubes & Pneumothorax

View Set

Prep U Respiratory Chapter 8: Nursing Assessment: Respiratory Function

View Set