Comptia Network + Practice Tests - Second Edition (N10-008) - Ch. 5

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

32. Which of the following types of cables is used to connect a terminal to the console port of a router or switch? A. Rollover B. Straight through C. Crossover D. Plenum E. Shielded F. Tap

A. Rollover A rollover cable is a type of null modem cable, usually flat and light blue in color, with the pinouts reversed on either end, to enable a terminal to communicate with a router or switch through the device's dedicated console port. None of the other options are suitable for this purpose. A straight through cable is the standard network cable used to connect a computer to a switch. A crossover cable is designed to connect two network adapters directly. A plenum cable is a type of cable intended for use within air spaces and has an outer sheath that does not produce toxic fumes when it burns. A shielded cable is intended to protect signals from electromagnetic interference. A tap is a device used to branch a coaxial cable to two devices.

76. Ralph's company has expanded to include an additional building on the far end of the corporate campus, approximately 4 kilometers away from the building housing the datacenter. A single-mode fiber-optic cable connection has been installed between the new building and the datacenter for a 1000Base-BX10 connection, but the cable is not yet connected to a transceiver at the datacenter end. Noticing that there is a 1000Base-SX transceiver module in the datacenter storeroom, Ralph is wondering if he could use this on the new cable run. Which of the following are reasons why this might not work? (Choose all that apply.) A. Transceiver mismatch B. Incorrect cable type C. Excessive cable length D. Wavelength mismatch

A. Transceiver mismatch B. Incorrect cable type C. Excessive cable length D. Wavelength mismatch The 1000Base-SX standard calls for multimode cable with a maximum length of approximately 500 meters, while the new cable run is 4,000 meters and uses single-mode cable. The 1000Base-SX transceiver will also be incompatible with the 1000Base-BX10 transceiver at the other end. 1000Base-BX10 uses wavelengths from 1,300 to 1,600 nanometers (nm), whereas 1000Base-SX uses wavelengths of 770 to 860 nm.

95. Which of the following parameters causes the ping tool to transmit messages continually until manually halted? A. -n B. -t C. -i D. -a

B. -t Running the ping tool with the -t parameter causes it to send messages to the target continuously until it is manually stopped. The -n parameter specifies the number of messages the ping tool should transmit. The -i parameter specifies the time-to-live (TTL) value of the messages ping transmits. The -a parameter resolves an Internet Protocol (IP) address specify as the target to a hostname.

87. Which of the following command-line utilities is capable of performing the same basic function as traceroute or tracert? A. ping B. pathping C. netstat D. route

B. pathping Like traceroute and tracert, pathping is capable of generating a list of the routers that packets pass through on the way to a specific destination system. pathping also displays the percentage of lost packets for each hop, which traceroute and tracert cannot do. The ping, netstat, and route utilities are not capable of displaying route traces.

75. Delays in the transmission of data packets over a network can result in temporary service interruptions, dropouts, or even data loss. Which of the following terms is used to describe these delays? A. Crosstalk B. Electromagnetic interference (EMI) C. Jitter D. Attenuation

C. Jitter Jitter is defined as delays in the transmission of individual network packets. For audio or video transmissions, jitter can result in dropped words or frames. For data file transmissions, jitter can require retransmission of packets.

88. Which TCP/IP utility should you use to most easily identify a malfunctioning router on your network? A. ifconfig B. ping C. traceroute D. netstat

C. traceroute The traceroute (or tracert) utility can locate a malfunctioning router by using an Echo Request messages with incrementing Time to Live (TTL) values. ifconfig is a network configuration utility for Unix and Linux systems; ping can test connectivity to another Transmission Control Protocol/Internet Protocol (TCP/IP) system, but it cannot locate a malfunctioning router; and netstat displays information about network connections and traffic but cannot locate a malfunctioning router

3. Which of the following is a networkwide problem? A. A problem with an order entry or customer service call center resource B. A fatal error that causes a single computer to fail C. A problem with an application server that affects a single Local Area Network (LAN) D. A problem with a router that connects an entire network to the Internet

D. A problem with a router that connects an entire network to the Internet Any problem that affects all the users on the network is a networkwide problem and should be given the highest priority. An example of this would be a problem with an Internet router. All other problems listed do not affect the entire network.

37. Which of the following devices is an essential tool for technicians working on telephone cables but is not needed for data networking cable installations? A. Tone generator and locator B. Wiremap tester C. Cable certifier D. Butt set

D. Butt set Telephone cable technicians have their own specialized tools, such as the butt set, a one-piece telephone handset with alligator clips that enables its operator to connect to a line anywhere that the cables are accessible

16. In which troubleshooting step is a trouble ticket created? A. Establish a theory of probable cause B. Verify full system functionality and, if applicable, implement preventive measures C. Implement the solution or escalate as necessary D. Test the theory to determine cause E. Identify the problem F. Document findings, actions, and outcomes G. Establish a plan of action to resolve the problem and identify potential effects

E. Identify the problem The first step in troubleshooting involves identifying the problem and creating a trouble ticket. You complete the other troubleshooting steps after the trouble ticket has been prioritized.

89. Which of the following protocols does the ping program never use to carry its messages? A. Ethernet B. ICMP C. IP D. UDP E. TCP

E. TCP All Windows ping transactions use Internet Control Message Protocol (ICMP) messages. ICMP messages are encapsulated directly within Internet Protocol (IP) datagrams; they do not use transport layer protocols, such as User Datagram Protocol (UDP). Ping transactions to destinations on the local network are encapsulated within Ethernet frames. On Unix and Linux, ping uses UDP, which is also encapsulated in IP datagrams.

26. In which troubleshooting step do you create a record of your activities and inform the user of what happened and why? A. Identify the problem B. Establish a theory of probable cause C. Test the theory to determine cause D. Establish a plan of action to resolve the problem and identify potential effects E. Implement the solution or escalate as necessary F. Verify full system functionality and, if applicable, implement preventive measures G. Document findings, actions, and outcomes

G. Document findings, actions, and outcomes The last step of the troubleshooting process is to document the solution and explain to the user what happened and why. In reality, documentation should begin when the problem is reported, and the documentation should be updated throughout the troubleshooting process.

45. Which of the following statements about cable certifiers are true? (Choose all that apply.) A. A cable certifier eliminates the need for tools like tone generators and wiremap testers. B. Cable certifiers are the most inexpensive cable testing solution. C. Cable certifiers must be reconfigured whenever a new cable specification is standardized. D. Cable certifiers can only test copper-based cables.

A. A cable certifier eliminates the need for tools like tone generators and wiremap testers. C. Cable certifiers must be reconfigured whenever a new cable specification is standardized. Cable certifiers can detect all of the faults that tone generators and wiremap testers can detect, and they can do a great deal more, such as specify whether a cable run meets the performance specifications defined in a cable standard. When testing a new cable type, the specifications defined in the cable standard must be added to the device. Cable certifiers are far more expensive than most other cable testing solutions. Cable certifiers are available that support various cable media, including copper and fiber optic.

39. Which of the following tools can you use to test the optical loss in a fiber-optic cable? A. An OLTS B. A TDR C. A tone generator and locator D. A wiremap tester

A. An OLTS An optical loss test set (OLTS) identifies signal loss in fiber-optic cabling. A time-domain reflectometer (TDR) measures electrical signals in copper-based cabling, not light signals. Tone generator and locator tools and wiremap testers are used in copper-based cabling installations, not fiber-optic cabling.

69. Ed is trying to troubleshoot a problem that has caused a wired network connection to slow down noticeably. Which of the following wired network problems will cause a drastic slowdown of a network connection, without causing it to fail completely? (Choose all that apply.) A. Bottleneck B. Speed mismatch C. Duplex mismatch D. TX/RX reversal

A. Bottleneck C. Duplex mismatch A bottleneck is a component involved in a network connection that is not functioning correctly, causing a traffic slowdown that affects the entire network. A duplex mismatch occurs when one side of a connection is configured to use full duplex and the other end is configured to use half duplex. When this occurs, the full-duplex communications on the one side look like collisions to the half-duplex side. The half-duplex adapter transmits a jam signal as a result of each collision, which causes the full-duplex side to receive an incomplete frame. Both sides then start to retransmit frames in a continuing cycle, causing network performance to diminish drastically. A speed mismatch or a Transmit and Receive (TX/RX) reversal will stop network communication completely.

53. What is the name of the tool shown in the attached figure? A. Butt set B. Crimper C. Tone generator and locator D. Punchdown tool

A. Butt set The device shown in the figure is a butt set, a basic tool of telephone installers and line workers. By connecting the clips to pins in a punchdown block, you can access telephone circuits in order to test them or place telephone calls.

14. Alice is working the help desk when a user calls and reports that she is unable to connect to the Internet. Which of the following steps is the one Alice is least likely to perform first when troubleshooting the problem? A. Check the configuration of the router connecting the LAN to the Internet B. Ask the user if she can access resources on the local network C. Check to see if anyone else is experiencing the same problem D. Check the user's job title to see if she is an important person in the company

A. Check the configuration of the router connecting the LAN to the Internet There are many possible causes for the problem that are more likely than a router configuration error, so this is not something Alice would check first. Asking if the user can access the local network attempts to isolate the problem. If she cannot, the problem could be in her computer; if she can, then the problem lies somewhere in the Internet access infrastructure. If other users are experiencing the problem, then the issue should receive a higher priority, and Alice knows that the problem does not lie in the user's computer. While it might not be the first thing she checks, it is a political reality that higher ranking users often get preferential treatment.

67. Which of the following should a troubleshooter look for when a duplex mismatch is suspected on an Ethernet network? (Choose all that apply.) A. Collisions B. Runt frames C. CRC errors D. Failed ping tests

A. Collisions B. Runt frames C. CRC errors There should be no collisions at all on a full-duplex network, so collisions indicate that at least one side of the connection is trying to operate in half-duplex mode. Ethernet running over twisted-pair cable, in its original half-duplex mode, detects collisions by looking for data on the transmit and receive pins at the same time. In full-duplex mode, data is supposed to be transmitted and received at the same time. In a duplex mismatch, in which one side of a connection is configured to use full duplex and the other end is configured to use half duplex, the full-duplex communications originating from one side look like collisions to the half-duplex side. The half-duplex adapter transmits a jam signal as a result of each collision, which causes the full-duplex side to receive an incomplete or damaged frame, which are perceived as runts or through Cyclic Redundancy Check (CRC) errors. Both sides then start to retransmit frames in a continuing cycle, causing network performance to diminish. Ping tests do not detect a duplex mismatch, because ping only transmits a small amount of data in one direction at a time. The mismatch only becomes apparent when the systems transmit large amounts of data.

28. A user calls Alice at the help desk to report that her mouse has stopped working, she cannot access the Internet, and all of her email has disappeared from her inbox. Which of the following would be the best course of action for Alice to take? A. Create a separate trouble ticket for each problem B. Escalate the call to a senior technician C. Have the caller's computer replaced with a new one D. Send a technician to the user's site to address all of the problems

A. Create a separate trouble ticket for each problem Because the multiple problems seem to be unrelated, Alice should handle them individually by creating a separate trouble ticket for each one and prioritizing each one. None of the problems seem to be severe enough to warrant escalation, nor should it be necessary to replace the computer. While it would be possible to send a technician to address all of the problems at once, it would be more efficient to assign each its own priority and handle it like any other trouble call.

20. Which of the following are reasons for documenting a network problem or incident? (Choose all that apply.) A. Documentation makes it easier to escalate calls to senior technicians. B. Documentation makes it easier to prioritize administrative tasks. C. Documentation makes it easier to prioritize each help call. D. Documentation makes it easier to escalate calls to first-tier technicians.

A. Documentation makes it easier to escalate calls to senior technicians. C. Documentation makes it easier to prioritize each help call. When a network problem or incident is reported, documentation begins. Proper documentation makes it easier for a first-tier support technician to prioritize and to escalate the call to senior technicians, if necessary.

77. Alice has recently installed some new computers onto her Gigabit Ethernet network. To ensure the best possible network performance, she has configured the network adapters in the new computers to run at 1 Gbps speed and use full-duplex communication. Once the computers are in service, however, Alice begins getting reports of extremely poor network performance on those machines. She tries running some ping tests and does not see any problem. She calls in a consultant to perform a packet analysis, and the consultant detects large numbers of packet collisions, late collisions, Cyclic Redundancy Check (CRC) errors, and runt frames. Which of the following could conceivably be the problem? A. Duplex mismatch B. TX/RX reversal C. Incorrect cable type D. Damaged cables

A. Duplex mismatch There should be no collisions on a full-duplex network, so the problem is clearly related to the duplexing of the communications. Ethernet running over twisted-pair cable, in its original half-duplex mode, detects collisions by looking for data on the Transmit and Receive (TX/RX) pins at the same time. In full-duplex mode, data is supposed to be transmitted and received at the same time. When one side of a connection is configured to use full duplex, as Alice's new computers are, and the other end is configured to use half duplex (as the switches must be), the full-duplex communications on the one side look like collisions to the half-duplex side. The half-duplex adapter transmits a jam signal as a result of each collision, which causes the full-duplex side to receive an incomplete frame. Both sides then start to retransmit frames in a continuing cycle, causing network performance to diminish drastically. The ping tests do not detect a problem, because ping only transmits a small amount of data in one direction at a time. The other options would likely cause the ping tests to fail as well. The solution to the problem is to configure all of the devices to autonegotiate their speed and duplex modes.

22. Which of the following statements about multitiered technical support organizations are true? (Choose all that apply.) A. Help calls are always escalated to second-tier technicians when they involve mission-critical network components such as routers. B. First-tier technicians generally handle desktop problems. C. Second-tier technicians are generally less experienced than first-tier technicians. D. First-tier technicians are generally less experienced than second-tier technicians.

A. Help calls are always escalated to second-tier technicians when they involve mission-critical network components such as routers. B. First-tier technicians generally handle desktop problems. D. First-tier technicians are generally less experienced than second-tier technicians. First-tier technicians are generally less experienced than second-tier technicians. First-tier technicians are the first point of contact for users. They receive and prioritize help desk calls and escalate problems to second-tier technicians, if necessary. First-tier technicians generally handle individual desktop problems, whereas second-tier technicians troubleshoot mission-critical network components such as routers and switches.

1. Which of the following troubleshooting steps involves prioritizing trouble tickets based on the severity of the problem? A. Identify symptoms of the problem B. Establish a theory of probable cause C. Test the theory to determine cause D. Establish a plan of action to resolve the problem and identify potential effects E. Implement the solution or escalate as necessary F. Verify full system functionality and, if applicable, implement preventive measures G. Document findings, actions, and outcomes

A. Identify symptoms of the problem The first step in troubleshooting is to identify the problem by establishing symptoms related to the network issue being reported. In this step, problems are typically reported as trouble tickets, which are prioritized based on the severity of the problem. You complete the other steps after the trouble ticket has been prioritized and is being investigated.

5. Which of the following troubleshooting steps involves asking the user preliminary questions such as, "What were you doing when the problem occurred?" A. Identify the problem B. Establish a theory of probable cause C. Test the theory to determine cause D. Establish a plan of action to resolve the problem and identify potential effects E. Implement the solution or escalate as necessary F. Verify full system functionality and, if applicable, implement preventative measures G. Document findings, actions, and outcomes

A. Identify the problem The first step in troubleshooting is to identify the problem by establishing symptoms related to the network problem being reported. In this step, you ask the user many questions to identify and define the symptoms of the problem and prioritize the trouble ticket. Although you might continue to ask the user questions throughout the troubleshooting process, this is typically associated with the first step of the troubleshooting process

55. Ralph is testing a twisted-pair cable run using a tone generator and locator. When he applies the tone generator to one particular wire at one end of the cable, he fails to detect a tone at the other end. Which of the following faults has Ralph discovered? A. Open B. Short C. Split pair D. Crosstalk

A. Open The failure to detect a tone on a wire indicates that there is either a break in the wire somewhere inside the cable or a bad connection with the pin in one or both connectors. This condition is called an open circuit. A short is when a wire is connected to two or more pins at one end of the cable. A split pair is a connection in which two wires are incorrectly mapped in exactly the same way on both ends of the cable. Crosstalk is a type of interference caused by signals on one wire bleeding over to other wires.

32. Which of the following types of cables is used to connect a terminal to the console port of a router or switch? A. Rollover B. Straight through C. Crossover D. Plenum E. Shielded F. Tap

A. Rollover A rollover cable is a type of null modem cable, usually flat and light blue in color, with the pinouts reversed on either end, to enable a terminal to communicate with a router or switch through the device's dedicated console port. None of the other options are suitable for this purpose. A straight through cable is the standard network cable used to connect a computer to a switch. A crossover cable is designed to connect two network adapters directly. A plenum cable is a type of cable intended for use within air spaces and has an outer sheath that does not produce toxic fumes when it burns. A shielded cable is intended to protect signals from electromagnetic interference. A tap is a device used to branch a coaxial cable to two devices.

11. A single Windows user suddenly cannot connect to any hosts on the network (local or remote). Alice interviews the user and finds out that he made some changes to his computer's Internet Protocol (IP) configuration properties. What should she do next? A. Run the ipconfig command to view the local configuration B. Check the Domain Name System (DNS) server to see if it is resolving IP hostnames C. Check the Windows Internet Name Service (WINS) server to see if it is resolving Network Basic Input/Output System (NetBIOS) names D. Verify that the router is functioning

A. Run the ipconfig command to view the local configuration Since only one user is reporting the problem, and he had admitted to making changes to his IP configuration, Alice should probably start by checking the configuration using the ipconfig command. If the router, DNS server, or WINS server were causing the problem, more than one user would be experiencing difficulties.

30. Which of the following types of Unshielded Twisted Pair (UTP) wiring faults cannot be detected by a wiremap tester? A. Split pairs B. Open circuits C. Short circuits D. Transposed wires

A. Split pairs A wiremap tester consists of a main unit that connects to all eight wires of a UTP cable at once and a loopback device that you connect to the other end, enabling you to test all of the wires at once. A wiremap tester can detect opens and shorts, as well as transposed wires. However, it cannot detect split pairs because, in that fault, the pins are properly connected.

33. Which of the following types of patch cables is used to connect a computer to a wall plate? A. Straight through B. Crossover C. Rollover D. Plenum

A. Straight through A straight through cable is the standard network patch cable used to connect a computer to a wall plate. A crossover cable is designed to connect two network adapters directly. A rollover cable is used to enable a terminal to communicate with a router or switch through the device's console port. A plenum cable is a type of cable intended for use within air spaces that has an outer sheath that does not produce toxic fumes when it burns.

79. Which of the following application layer protocols includes a program that enables a user to log on to a network device and execute commands on the remote system using a commandline interface? (Choose all that apply.) A. Telnet B. File Transfer Protocol (FTP) C. Simple Network Management Protocol (SNMP) D. Domain Name System (DNS) E. Nslookup

A. Telnet B. File Transfer Protocol (FTP) Both Telnet and FTP are protocols that include command-line client applications, with Telnet providing terminal emulation and FTP file transfer functionality. SNMP and DNS are both application layer protocols, but neither one includes a program. Nslookup has a command-line interface, but it executes commands on the local system, not a remote one.

12. Alice has a network with a Domain Name System (DNS) server, a proxy server, and an Internet router. A user is complaining that she suddenly cannot connect to hosts on her own Local Area Network (LAN) and other internal LANs, and she cannot access hosts on the Internet. What is the likeliest problem? A. The user's local configuration B. The proxy server C. The DNS server D. The router

A. The user's local configuration Since only one user is reporting the problem, the user's computer and its configuration are the likeliest suspect components. A DNS, proxy, or router problem would affect more than one user.

27. On Monday morning, Alice arrives at work to find multiple email and telephone messages from users who are unable to access the Accounting department's file server. Which of the following are the best questions to ask during the beginning stage of the troubleshooting process? (Choose two.) A. What has changed since the users were last able to access the server? B. Are there any software updates that Alice should apply to the server? C. Has the server suffered a hard disk failure? D. Which users are reporting a problem, and where are they located?

A. What has changed since the users were last able to access the server? D. Which users are reporting a problem, and where are they located? The first stage of the troubleshooting process calls for Alice to identify the problem by gathering information. Learning about who is reporting the problem and what has changed since the server was last accessible can provide Alice with information that could help her determine whether the problem is located in the users' workstations, somewhere in the network, or in the server itself. The other options are intended to test a theory about a probable cause, a troubleshooting stage that comes later.

51. What is the function of the tool shown in the attached figure? A. When you place the tool at one end of a wire, it generates a tone that can be detected at the other end. B. To connect a bulk cable to a keystone connector, you use the tool to punch each wire down into the correct receptacle on the connector. C. By touching the end of the tool to a copper cable, you can detect and measure the electrical current flowing through it. D. By connecting the tool to the end of a fiber-optic cable, you can measure the length of the cable run.

A. When you place the tool at one end of a wire, it generates a tone that can be detected at the other end. The device shown in the figure is a tone generator and locator, used to test Unshielded Twisted Pair (UTP) wiring and detect certain basic wiring faults. This tool is not capable of performing any of the tasks described in the other options.

94. Which of the following command-line utilities enables you to view the Internet Protocol (IP) configuration on a Unix or Linux host? A. ifconfig B. nslookup C. ipconfig D. netstat E. iperf

A. ifconfig On a Unix or Linux host, the ifconfig command displays the system's current IP configuration settings and parameters. ipconfig is a Windows command-line utility that performs the same basic function. The other options are command-line utilities that do not display IP configuration information.

85. Which of the following Windows command-line utilities produced the output in the attached image? A. ping B. tracert C. netstat D. arp E. hostname

A. ping The Windows ping utility functions by transmitting a series of Internet Control Message Protocol (ICMP) Echo Request messages to a specified destination. The destination system responds with ICMP Echo Reply messages that are listed in the output display. The tracert, netstat, arp, and hostname utilities are not capable of producing this output.

48. Which of the following cable installation tools is likely to be the most expensive? A. A crimper B. A cable certifier C. A punchdown tool D. A wiremap tester

B. A cable certifier Crimpers and punchdown tools are relatively simple and inexpensive mechanical devices that cable installers use to connect bulk cable to connectors. A wiremap tester is an electronic device for cable testing, but it is still relatively simple. A cable certifier is a complex electronic device that can perform a battery of tests on a cable run, confirm that the cable conforms to the required wiring standards, and maintain records of the testing procedure. Cable certifiers are by far the most expensive of the devices listed.

24. Ed is a first-tier support technician. He receives the help calls listed here. His job is to prioritize them based on their severity. Which of the following should be the problem that receives the lowest priority? A. A problem with an order entry or customer service call center resource that affects an entire department, with multiple Local Area Networks (LANs) B. A fatal error that causes a single computer to fail C. A problem with a mission-critical backbone router that affects an entire network D. A problem with an application server that affects a single LAN

B. A fatal error that causes a single computer to fail A problem that affects the entire network should be given highest priority. This includes a mission-critical backbone router. Problems that affect multiple LANs or an entire department are generally given the next highest priority. An application problem that affects a shared application server on a LAN should be given the next highest priority. A problem with a single user's computer should be given the lowest priority if the other problems have been reported.

38. Which of the following tools might you use when connecting internal twisted-pair cable runs to the keystone connectors that snap into wall plates? (Choose all that apply.) A. A crimper B. A punchdown tool C. A pigtail splicer D. A wire stripper E. A fusion splicer

B. A punchdown tool D. A wire stripper The punchdown tool is critical to this operation. In one motion, the tool strips the insulation off of the wire, presses it down into the connector, and cuts off the excess at the end. A wire stripper simplifies the task of preparing the cable for the connection process. A crimper is used only for attaching connectors to patch cables. Pigtail splicers and fusion splicers are used only on fiber-optic networks.

10. You have a problem with a server or other network component that prevents many users from working. What type of problem is this? A. A networkwide problem B. A shared resource problem C. A systemwide problem D. A user application problem

B. A shared resource problem If a problem lies within a specific server or other network component that prevents many users from working, it is a shared resource problem. A problem that lies within resources that provide services to the entire network is a networkwide problem. Systemwide problems put a specific computer out of commission, preventing a user from getting any work done. An application problem is a problem that affects only a single user's access to a device or application.

70. Ed has discovered that some of the twisted-pair cable runs on his newly installed Ethernet network are well over 100 meters long. Which of the following problems is his network likely to experience due to cable segments that are greater than the specified length? A. Jitter B. Attenuation C. Crosstalk D. EMI

B. Attenuation Attenuation is the weakening of a signal as it travels long distances, whether on a wired or wireless medium. The longer the transmission distance, the more the signal weakens. Cable length specifications are designed in part to prevent signals from attenuating to the point at which they are unviable. Jitter, crosstalk, and electromagnetic interference (EMI) are all conditions that can affect the performance of a wired network, but they are not directly related to the length of the cable.

40. Which of the following troubleshooting tools can test cabling for length, attenuation, near-end crosstalk (NEXT), equal level far-end crosstalk (ELFEXT), propagation delay, delay skew, and return loss? A. Wiremap tester B. Cable certifier C. Time-domain reflectometer (TDR) D. Optical loss test set (OLTS) E. Spectrum analyzer

B. Cable certifier You can use a cable certifier to identify a variety of cable performance characteristics, typically including cabling lengths, signal attenuation, crosstalk, propagation delay, delay skew, and return loss, in addition to providing all the functionality of a wiremap tester. The other tools listed are dedicated to a single testing modality and do not test for crosstalk.

44. Ralph is a new hire for a consulting firm that frequently performs cable installations. He is trying to learn more about the tools needed to install internal cable runs. To that end, which of the following statements about cable crimpers has Ralph found to be true? A. Cable installers use a crimper to attach keystone connectors to lengths of bulk cable. B. Cable installers use a crimper to attach RJ45 connectors to lengths of bulk cable. C. You need to purchase a separate crimper for each type of cable to which you want to attach connectors. D. Making your own patch cables by applying connectors yourself is always more economical than buying prefabricated patch cables.

B. Cable installers use a crimper to attach RJ45 connectors to lengths of bulk cable. A crimper is a plier-like device that cable installers use to create patch cables by attaching RJ45 connectors to lengths of bulk cable. Installers use a punchdown tool, not a crimper, to attach a cable end to a keystone connector. It is not always necessary to purchase a crimper for each cable type. Some crimpers are designed for a single cable/connector combination, but there are many that have replaceable bits, supporting a variety of cables and connectors. Making patch cables yourself can represent a false economy. Buying bulk cable and connectors and making patch cables yourself can conceivably be cheaper than purchasing prefabricated cables. However, when you factor in the time needed to attach the connectors, the learning curve required to attach the connectors correctly, and the failure rate requiring the re-application of connectors, it might be more economical to purchase prefabricated patch cables in quantity instead.

100. Ralph is the network administrator of his company's network. He has had three users call the help desk to report that they are having problems connecting to the local application server. Comparing their stories, Ralph suspects that their Transmission Control Protocol (TCP) connections are being dropped. The users are not having problems connecting to any other hosts on the network. To troubleshoot this problem, Ralph decides to use a protocol analyzer. He wants to store and view only the traffic relating to the hosts and server that are having problems. How can Ralph do this? A. Configure a display filter B. Configure a capture filter C. Set a trap on the analyzer D. Configure both a capture filter and a display filter

B. Configure a capture filter Ralph wants to store and view only the traffic relating to the hosts that are experiencing problems. The best way to do this is to set a capture filter. Capture filters determine what is stored in the buffer. Display filters only determine what is displayed from the contents of the buffer. You do not set a trap on an analyzer—you set traps on Simple Network Management Protocol (SNMP) agents. Also, there is no need to configure both a capture filter and a display filter. If you set a capture filter that blocks all other traffic from entering the buffer, the display filter would be redundant.

54. Ralph has to spend the day completing a twisted-pair cable installation in his office. Contractors have already pulled the cables through the walls and ceilings. Ralph only has to attach connectors to the ends of the cables, both internal cable runs and patch cables. Which of the following tools will Ralph need? (Choose all that apply.) A. Telepole B. Crimper C. Punchdown tool D. Pigtail splicer

B. Crimper C. Punchdown tool A crimper is a plier-like tool that cable installers use to attach RJ45 connectors to patch cables. A punchdown tool is a tool that cable installers use to attach keystone connectors to cable ends, for use in wall plates and patch panels. A telepole is a device used to run cables through walls, floors, and ceilings, but since the cable runs have already been pulled, Ralph will not need this tool. A pigtail splicer is a tool used only in fiber-optic cable installations.

47. Which of the following tools can you use to create your own twisted pair patch cables? (Choose all that apply.) A. Punchdown tool B. Crimper C. Pliers D. Wire stripper

B. Crimper D. Wire stripper A crimper is a device used for attaching connectors to patch cables. A wire stripper, while not essential to the process, can simplify the task of preparing the cable. A punchdown tool is used for attaching keystone connectors to cable ends, for use in wall plates and patch panels. A standard set of pliers is not used in the process of attaching connectors.

66. After experiencing some problems with devices connected to the company's fiber-optic network, Alice brings in a contractor to test the fiber-optic cable runs. The contractor detects a significant amount of decibel (dB) loss in some of the cable runs, which could be the source of the problems. Which of the following are possible causes of the decibel loss? (Choose all that apply.) A. Electromagnetic interference B. Dirty optical cables C. Excessive cable length D. Signal crosstalk

B. Dirty optical cables C. Excessive cable length Dirt on fiber-optic cable connectors can reduce the strength of the signal, resulting in decibel loss. Excessive cable length can result in greater attenuation and weaker signals due to the decibel loss. Electromagnetic interference and signal crosstalk are both factors that can affect copper cable transmissions, but not fiber optic.

15. In the standard troubleshooting methodology, which of the following steps appears last, but must actually be practiced throughout the troubleshooting process? A. Test the theory to determine cause B. Document findings, actions, and outcomes C. Verify full system functionality and, if applicable, implement preventive measures D. Implement the solution or escalate as necessary Establish a plan of action to resolve the problem and identify potential effects F. Establish a theory of probable cause G. Identify the problem

B. Document findings, actions, and outcomes Documenting everything you discover and everything you do is a crucial part of the troubleshooting method that must begin before you take any other action whatsoever. However, it appears as the last step in the troubleshooting methodology.

7. In which troubleshooting step do you try to duplicate a network problem to logically and methodically eliminate elements that are not the source of the problem? A. Identify the problem. B. Establish a theory of probable cause. C. Test the theory to determine cause. D. Establish a plan of action to resolve the problem and identify potential effects. E. Implement the solution or escalate as necessary. F. Verify full system functionality and, if applicable, implement preventative measures. G. Document findings, actions, and outcomes.

B. Establish a theory of probable cause. The second step in troubleshooting is to attempt to duplicate a problem and develop a theory of its probable cause. As you troubleshoot a problem, you then test your theory to confirm your findings. You complete the other troubleshooting steps after the specific cause has been identified.

63. Ralph's company has engaged a firm of wiring contractors to install some new fiber-optic cable runs. Before the cables are connected to any devices, Ralph wants to confirm that they have been installed to proper specifications. He brings in a contractor from another firm to test the cable runs. To test each cable run, the contractor connects a light source to one end of the cable and a measuring device to the other end. Which of the following is the correct name for this testing device? A. Optical power meter B. OLTS C. OTDR D. Multimeter

B. OLTS An optical loss test set (OLTS) is the term for the combination of an optical light source and an optical power meter. The optical power meter by itself cannot be used to test the cable runs when there are no devices connected to them. An Optical Time Domain Reflectometer (OTDR) is a device for measuring the lengths and other characteristics of fiber-optic cables. A multimeter is a device for measuring the electric current on a copper cable.

21. Which of the following statements about prioritizing help calls are true? (Choose all that apply.) A. Individual desktop problems take precedence over problems with shared resources. B. Problems with shared resources take precedence over individual desktop problems. C. Departmental problems take precedence over networkwide problems. D. Networkwide problems take precedence over departmental problems.

B. Problems with shared resources take precedence over individual desktop problems. D. Networkwide problems take precedence over departmental problems. When establishing priorities, networkwide problems take precedence over departmental problems, and problems with shared resources take precedence over individual desktop problems.

35. A routine test of a newly installed twisted-pair cable run with a wiremap tester indicates that there is a short circuit on one of the wires. Which of the following procedures might possibly correct the fault? A. Use a different pinout on both ends of the cable B. Replace the connectors at both ends of the cable run C. Move the cable away from any potential sources of electromagnetic interference D. Use a higher grade of Unshielded Twisted Pair (UTP) cable

B. Replace the connectors at both ends of the cable run A short circuit is a wiring fault indicating that a pin at one end of a cable run is connected to two pins at the other end. To correct the problem, you must replace the connector with the faulty wiring. None of the other suggestions are solutions for a wiring fault.

56. Ralph is testing a twisted-pair cable run using a tone generator and locator. When he applies the tone generator to a particular pin at one end of the cable, he detects a tone on two pins at the other end. Which of the following faults has Ralph discovered? A. Open B. Short C. Split pair D. Crosstalk

B. Short A short is when a wire is connected to two or more pins at one end of the cable or when the conductors of two or more wires are touching inside the cable. This would cause a tone applied to a single pin at one end to be heard on multiple pins at the other end. An open circuit would manifest as a failure to detect a tone on a wire, indicating that there is either a break in the wire somewhere inside the cable or a bad connection with the pin in one or both connectors. A split pair is a connection in which two wires are incorrectly mapped in exactly the same way on both ends of the cable. Crosstalk is a type of interference caused by signals on one wire bleeding over to other wires.

71. Ed is trying to troubleshoot a problem with his wired network, and his research has led him to a list of possible network faults. The list is rather old, however, and Ed is wondering if some of the problems are relevant. Which of the following wired network problems no longer occur with modern Gigabit Ethernet switches and network adapters in their default configurations? (Choose all that apply.) A. Bottleneck B. Speed mismatch C. Duplex mismatch D. Transmit and Receive (TX/RX reversal)

B. Speed mismatch C. Duplex mismatch The Gigabit Ethernet standards call for switches and network adapters to support autonegotiation by default, which enables devices to communicate and select the best network speed and duplex mode available to them both. Therefore, speed mismatches and duplex mismatches no longer occur unless someone modifies the speed or duplex settings to incompatible values on one or both devices.

68. Ed is trying to troubleshoot a problem that has caused a wired network connection to fail completely. Which of the following wired network problems will cause a complete failure of a network connection? (Choose all that apply.) A. Bottleneck B. Speed mismatch C. Duplex mismatch D. TX/RX reversal E. Bad switch port

B. Speed mismatch D. TX/RX reversal E. Bad switch port A speed mismatch on a wired network only occurs when two devices are configured to use a specific transmission speed and those speeds are different. In that case, network communication stops. For network communication to occur on a twisted-pair network, transmit (TX) pins must be connected to receive (RX) pins. If the connections are reversed, no communication occurs. If the switch port to which a computer is connected is bad, there will be no network communication. Bottlenecks and duplex mismatches will slow down network communications, but they will not stop them completely.

29. Alice receives a call in which a user reports that he is unable to send print jobs to the network-attached workgroup printer near his desk. Which of the following tasks should Alice perform first? A. Reinstall the printer driver on the user's workstation. B. Test network connectivity to the printer using the ping utility. C. Examine the switches to which the user's workstation and the printer are connected. D. Check to see if there are printer firmware upgrades available.

B. Test network connectivity to the printer using the ping utility. The first phase of the troubleshooting process is gathering information. Learning whether the printer is accessible over the network can help Alice to isolate the location of the problem and develop a theory of probable cause. Installing drivers, checking switches, and upgrading firmware are all part of a later phase in the troubleshooting process: testing a theory to determine the cause of the problem.

78. Ralph is attempting to access a Domain Name System (DNS) server located on the other side of a router, but his attempt fails with an error stating that the destination port UDP 53 is unreachable. His first step in troubleshooting the problem is to try using the nslookup utility to access that specific DNS server. This too fails. Next, he uses the ping utility with the DNS server's Internet Protocol (IP) address. The ping test is successful, indicating that the server is up and running. Which of the following are possible causes of the problem? (Choose all that apply.) A. The router connecting the networks is not running DNS and will not forward this type of datagram. B. The DNS process on the remote server is not running. C. The TCP/IP host configuration on your computer is improperly configured. D. The TCP/IP host configuration on the DNS server computer is improperly configured. E. There is a firewall blocking

B. The DNS process on the remote server is not running. E. There is a firewall blocking the DNS server's UTP 53 port. One possible cause of the problem is that the DNS process on the remote server is corrupted or not running. Another possible cause is that there is a firewall blocking access to the server's Unshielded Twisted Pair (UTP) port 53. Both of these would render the port unreachable. The Transmission Control Protocol/Internet Protocol (TCP/IP) client on the server is operating, as verified by the ping utility. This means that the IP host configurations on Ralph's computer and on the DNS server are both functioning. The router does not need to be running DNS to forward datagrams.

52. What is the function of the tool shown in the attached figure? A. When you place the tool at one end of a wire, it generates a tone that can be detected at the other end. B. To attach a bulk cable end to an RJ45 connector, you use the tool to squeeze the connector closed, forcing the wire ends to contact the connector's pins. C. By touching the end of the tool to a copper cable, you can detect and measure the electrical current flowing through it. D. By connecting the clips to pins in a punchdown block, you can access telephone circuits in order to test them or place telephone calls.

B. To attach a bulk cable end to an RJ45 connector, you use the tool to squeeze the connector closed, forcing the wire ends to contact the connector's pins. The device shown in the figure is a crimper, which is used to create patch cables by attaching connectors to both ends of a relatively short length of bulk cable. This tool is not capable of performing any of the tasks described in the other options.

50. What is the function of the tool shown in the attached figure? A. When you place the tool at one end of a wire, it generates a tone that can be detected at the other end. B. To connect a bulk cable to a keystone connector, you use the tool to punch each wire down into the correct receptacle on the connector. C. By touching the end of the tool to a copper cable, you can detect and measure the electrical current flowing through it. D. By connecting the tool to the end of a fiber-optic cable, you can measure the length of the cable run.

B. To connect a bulk cable to a keystone connector, you use the tool to punch each wire down into the correct receptacle on the connector. The device shown in the figure is a punchdown tool, used to connect Unshielded Twisted Pair (UTP) cable ends to the keystone connectors used in modular wall plates and patch panels. After lining up the individual wires in the cable with the connector, one uses the tool to press each wire into its slot. The tool also cuts the wire sheath to make an electrical contact and trims the end of the wire. This tool is not capable of performing any of the tasks described in the other options.

62. Ralph is working on a new twisted-pair network cable installation on which the individual cable runs were not properly labeled as they were pulled. Ralph now has to trace each of the cable ends in the office area to the correct cable end in the data center and label them correctly. Which of the following tools should Ralph use to locate the correct cable in a bundle of unlabeled cable ends? A. Cable certifier B. Tone generator and locator C. OTDR D. Multimeter

B. Tone generator and locator Ralph can use a tone generator and locator to locate the correct cable associated with each office connection. By connecting the tone generator to one end of a cable run, he can use the locator to find the other end. A cable certifier identifies a variety of cable performance characteristics, typically including cabling length, signal attenuation, and crosstalk. An Optical Time Domain Reflectometer (OTDR) is a device for measuring the lengths and other characteristics of fiber-optic cables. A multimeter is a device for measuring the electric current on a copper cable.

4. A user reports that she cannot connect to a server on her network. Ed wants to identify the scope of the problem, so he tries to reproduce the problem on the user's computer. The problem still remains. No other users are reporting this problem. What is the next logical step that Ed should perform to identify the affected area? A. Verify that the local router is forwarding traffic. B. Try performing the same task on another computer attached to the same segment. C. Verify that the server is configured properly. D. Verify that the switch the client is connected to is functioning.

B. Try performing the same task on another computer attached to the same segment. In this scenario, only one user is reporting a problem. Therefore, the likeliest next step is to perform the same task on another computer attached to the same segment. If Ed can perform the task successfully, the problem most likely lies within the user's computer or the connection to the switch. Since no other users are reporting the same problem, the server and switches on the network are probably up and functioning. Checking the router is not necessary since the user and server are on the same network.

81. Users are having trouble connecting to Internet hosts. Alice suspects that there is a problem with the Domain Name System (DNS) server, and she wants to verify this. Which of the following steps can she take to determine whether the DNS server is resolving Internet hostnames? A. Issue the ipconfig command from a local workstation B. Try to connect to a host using the IP address instead of the hostname C. Ping the DNS server to see if it is functioning D. Use the tracert command to test the functionality of the DNS server

B. Try to connect to a host using the IP address instead of the hostname If Alice suspects that a DNS server is not resolving hostnames, she should try connecting to a remote host using the Internet Protocol (IP) address instead of the name. If she can connect, she knows that all internal Local Area Network (LAN) components and the Internet gateway are functioning, and the remote host is functioning. The problem most likely lies within the DNS server itself. If Alice cannot connect to a remote host using the IP address, the problem is not the DNS server. She would need to do more testing to isolate the problem device and the affected area. ipconfig is a workstation command that enables you to verify the local IP configuration; it is not used to test a DNS server's functionality. Using the ping command will only tell you whether the computer hosting the DNS service is functioning at the network layer of the Open Systems Interconnection (OSI) model; it will not test the DNS service functionality. The tracert (or traceroute) command is used to identify the hop-by-hop path taken to reach a destination; it does not allow you to test functionality above the network layer of the OSI model.

41. Under which of the following conditions is a cable installer required to use plenum cable? A. When cables run close to sources of electromagnetic interference (EMI) B. When cables are running through building air flow spaces C. When data and voice traffic will be running over the same cable D. When cables are running through areas of low temperature

B. When cables are running through building air flow spaces Plenum cable is a type of cable intended for use within building air spaces (called plenums) that has an outer sheath that is more resistant to high temperatures and does not produce toxic fumes when it burns. The use of plenum cable has no effect on EMI or the type of traffic on the cable, nor is it required for low temperature areas.

96. Which of the following Windows commands enables you to delete the entire ARP cache? A. arp -c * B. arp -d * C. arp -a D. arp -s

B. arp -d * The arp -d command is for deleting cache entries, and by running it with the asterisk wildcard, the command deletes all of the entries in the cache. The arp -a command displays the entries in the ARP table stored in its cache, and the arp -s command is for adding entries. The arp -c * command is not a valid option.

90. Which of the following commands displays the routing table on the local computer? A. arp -r B. netstat -r C. ifconfig -r D. telnet -r

B. netstat -r The netstat utility can display the routing table, along with other types of network traffic and port information. The arp utility is for adding addresses to the Address Resolution Protocol (ARP) cache; it cannot display the routing table. The ifconfig command displays Transmission Control Protocol/Internet Protocol (TCP/IP) configuration information on Unix and Linux systems; it cannot display the routing table. Telnet is a terminal emulation program; it cannot display the routing table.

93. Which of the following command-line utilities enables you to generate Domain Name System (DNS) request messages? A. ifconfig B. nslookup C. nbtstat D. netstat E. iperf

B. nslookup The nslookup tool enables you to generate DNS request messages from the command line and send them to a specific DNS server. The other options listed are not DNS utilities.

82. Which of the following utilities can you use to view resource record information on a particular Domain Name System (DNS) server? (Choose all that apply.) A. netstat B. nslookup C. nbtstat D. arp E. dig

B. nslookup E. dig nslookup and dig are both command-line utilities that you can direct to a specific DNS server and then generate queries that display resource record information the program retrieves from the server. netstat displays information about networking protocols, whereas nbtstat displays information derived from the system's Network Basic Input/ Output System (NetBIOS) over Transmission Control Protocol/Internet Protocol (TCP/IP) implementation. arp is a tool that you can use to display and manage a system's Address Resolution Protocol (ARP) table entries. netstat, nbtstat, and arp are not able to display resource record information.

84. Which of the following Windows command-line utilities produced the output in the attached image? A. ping B. tracert C. netstat D. arp E. hostname

B. tracert The Windows tracert utility functions by transmitting a series of Internet Control Message Protocol (ICMP) Echo Request messages to a specified destination with incrementing Time to Live (TTL) values. Each successive message reaches one hop farther on the route to the destination before timing out. The tracert display therefore lists the names and addresses of the routers that packets must traverse to reach the destination. The ping, netstat, arp, and hostname utilities are not capable of producing this output.

91. Which of the following command lines will produce the output shown in the attached figure? A. ping 10.0.0.1 -t B. ping 10.0.0.1 -n 2048 C. ping 10.0.0.1 -l 2048 -n 11 D. ping 10.0.0.1 -l 2048 -t E. ping 10.0.0.1 -n 2048 -t 11

C. Running ping with the -l parameter enables you to specify the size of the messages sent to the target—in this case, 2028 bytes. The -n parameter enables you to specify the number of messages the ping tool should transmit—in this case, 11. Combining these two parameters generates the output in the figure. The -t parameter causes the ping tool to transmit messages until manually halted.

99. Which of the following parameters enables you to specify the Time to Live (TTL) value of the messages that ping transmits? A. -n B. -t C. -i D. -a

C. -i Running the ping tool with the -i parameter specifies the TTL value of the messages that ping transmits. The -t parameter causes the ping tool to send messages to the target continuously until it is manually stopped. The -n parameter specifies the number of messages the ping tool should transmit. The -a parameter resolves an Internet Protocol (IP) address specified as the target to a hostname.

2. Which of the following is considered a systemwide error? A. A problem with an order entry or customer service call center resource B. A problem with a router that affects only one Local Area Network (LAN) C. A fatal error that causes a single computer to fail D. A problem with an email server that affects all network users

C. A fatal error that causes a single computer to fail A systemwide error is a problem that renders an individual user's system (computer) completely unusable. All the other problems listed would affect more than one system or user.

23. Ed is a first-tier support technician. He receives the help calls listed here. His job is to prioritize them based on their severity. Which of the following should be the problem that receives the highest priority? A. A problem with an order entry or customer service call center resource that affects an entire department, with multiple Local Area Networks (LANs) B. A fatal error that causes a single computer to fail C. A problem with a mission-critical backbone router that affects an entire network D. A problem with an application server that affects a single LAN

C. A problem with a mission-critical backbone router that affects an entire network A problem that affects the entire network should be given highest priority. This includes a mission-critical backbone router. Problems that affect multiple LANs or an entire department are generally given the next highest priority. An application problem that affects a shared application server on a LAN should be given the next highest priority. A problem with a single user's computer should be given the lowest priority if the other problems have been reported.

36. Ralph is a new hire working on a network that uses Category 5 (Cat 5) Unshielded Twisted Pair (UTP) cable, which was installed several years ago. Over time, some of the paper labels that the original cable installers used to identify the wall plates and patch panel connectors have worn away or fallen off. As a result, Ralph has quite a few cable runs that he is unable to identify. After checking with his supervisor, Ralph discovers that the company has no cable testing equipment and is unwilling to hire a consultant just to identify cable runs. What is the most inexpensive tool Ralph can use to associate unlabeled wall plates with the correct patch panel ports? A. A wiremap tester B. A cable certifier C. A tone generator and locator D. A time-domain reflectometer (TDR)

C. A tone generator and locator All of the suggested tools are capable of associating wall plates with the correct patch panel ports, but the tone generator and locator is by far the most inexpensive solution.

46. Alice is the network administrator of her company's network. The company has just moved into a building that has existing Category 6 (Cat 6) Unshielded Twisted Pair (UTP) cabling. However, none of the cable connections have been labeled, and Alice is trying to identify and document where each cable run starts and ends. Which tools can Alice use for this purpose? (Choose all that apply.) A. A packet sniffer B. A loopback adapter C. A tone generator and locator D. A wiremap tester

C. A tone generator and locator D. A wiremap tester Alice can use a tone generator and locator or a wiremap tester to identify and test cable connections. By connecting the tone generator or the remote wiremap unit to one end of a cable run, she can use the locator or the master wiremap unit to find the other end. This can enable her to identify a starting point and an ending point for a cable run. A loopback adapter is used to test the transmission and reception capabilities of a port. A packet sniffer captures and analyzes network traffic; it cannot identify cables.

9. Ralph is a first-tier technician working the help desk. A user calls in, saying that when she turned her computer on that morning, nothing appeared on the screen. Which of the following should be Ralph's first question to the user? A. What is your computer's IP address? B. Have you applied the latest system updates? C. Are the computer and monitor plugged in to AC power? D. Has anyone else been using your computer?

C. Are the computer and monitor plugged in to AC power? In troubleshooting, one of the first steps in the process of identifying the problem is to question the obvious, such as whether the computer is plugged in or switched on. It would be unlikely that the user would know her computer's IP address or what updates had been installed when the screen is blank. Questioning whether other people have used the computer might come up later, but it will be little help at this stage of the troubleshooting process.

65. Which of the following terms describes the progressive weakening of transmitted signals as they travel along a network medium? A. Absorption B. Latency C. Attenuation D. Crosstalk

C. Attenuation Attenuation is the weakening of a signal as it travels long distances, whether on a wired or wireless medium. The longer the transmission distance, the more the signal weakens. Absorption is the tendency of a wireless signal to change as it passes through different materials. Latency is a measurement of the time it takes for a signal to travel from its source to its destination. Crosstalk is a type of interference that occurs on wired networks when a signal bleeds over to an adjacent wire.

43. Which of the following devices is not one of the tools generally used by a data networking cable installer? A. Tone generator and locator B. Wiremap tester C. Butt set D. Cable certifier

C. Butt set A butt set is a one-piece telephone handset with alligator clips that enables its operator to connect to a telephone line anywhere that the cables are accessible. They are used by telephone cable technicians, but generally not by installers of network data cables. The other options are all standard tools used by data networking cable installers.

49. What is the function of the tool shown in the attached figure? A. By placing the tool at one end of a wire, it generates a tone that can be detected at the other end. B. To connect a bulk cable to a keystone connector, you use the tool to punch each wire down into the correct receptacle on the connector. C. By touching the end of the tool to a copper cable, you can detect and measure the electrical current flowing through it. D. By connecting the tool to the end of a fiber-optic cable, you can measure the length of the cable run.

C. By touching the end of the tool to a copper cable, you can detect and measure the electrical current flowing through it. The device shown in the figure is a multimeter, which is used to measure the electric current on a copper conductor, such as an Unshielded Twisted Pair (UTP) network. This tool is not capable of performing any of the tasks described in the other options.

6. When troubleshooting, you begin by taking steps to identify the problem. After you do this, which of the following steps should you perform next? A. Implement the solution B. Establish a plan of action C. Establish a theory of probable cause D. Verify full system functionality

C. Establish a theory of probable cause After identifying the problem, the next step is to establish a theory for the probable cause of the problem. After that, you can test your theory, establish a plan of action, implement a solution, verify the functionality of the system, and document the entire process.

73. Which of the following indicators can you use to determine whether an adapter is connected to a functioning hub or switch? A. Speed Light-Emitting Diode (LED) B. Collision LED C. Link pulse LED D. Status LED

C. Link pulse LED The link pulse LED indicates the adapter is connected to a functioning hub or switch. The speed LED specifies the data rate of the link. The collision LED lights up when collisions occur. There is no status LED on a network interface adapter.

13. Alice takes a call from a user who is unable to send email to a colleague in one of the company's branch offices. Alice begins by having the user try to send emails to different people at the branch office, to people in the local office, and to people on the Internet. She then checks the user's Internet Protocol (IP) configuration settings, the computer's Local Area Network (LAN) communication, and the cable connection to the network. Which of the following approaches is Alice using to troubleshoot the problem? A. OSI bottom-to-top B. Divide and conquer C. OSI top-to-bottom D. Question the obvious

C. OSI top-to-bottom Alice is using a top-to-bottom approach, based on the Open Systems Interconnection (OSI) reference model. She begins at the top of the model (the application layer) by checking the system's email capabilities, and then proceeds downwards to check the computer's IP configuration (at the network layer), the local network connectivity (the data link layer), and the computer's cables (the physical layer). A bottom-to-top approach would begin with the cables. The divide-and-conquer approach and questioning the obvious would not involve the steps Alice took in the order that she took them.

74. Ralph wants to use Power over Ethernet (PoE) to supply power to security cameras located throughout his company's datacenter. The Ethernet network is currently running at Gigabit Ethernet speed, but Ralph is planning to downgrade the camera connections to 100Base-TX, because that standard has two wire pairs free for the transmission of power. Which of the following statements about Ralph's plan is true? A. Ralph's planning is correct; only 10Base-T and 100Base-TX support PoE. B. Ralph's plan will not work because 100Base-TX is not compatible with PoE. C. Ralph's plan will work, but it is not necessary to downgrade the connections to 100Base-TX. D. Ralph's plan will not work, because PoE cannot supply enough power for the cameras.

C. Ralph's plan will work, but it is not necessary to downgrade the connections to 100Base-TX. The Alternative B PoE variant can use the spare wire pairs in a Category 5 (Cat 5) or better 10Base-T or 100Base-TX cable to supply power to connected devices. The Alternative A and 4PPoE variants cannot use the spare wire pair in this manner; they supply power using the wire pairs that carry data at the same time. For Gigabit Ethernet or faster installations, Alternative B is capable of using the data wire pairs.

57. Ralph is using a tone generator and locator to test some newly installed twisted-pair cable runs on his network. Which of the following cable faults will he be unable to detect? A. Open B. Short C. Split pair D. Transposed pairs

C. Split pair A split pair is a connection in which two wires are incorrectly mapped in exactly the same way on both ends of the cable. Each pin on one end of the cable is correctly wired to the corresponding pin at the other end, but the wires inside the cable used to make the connections are incorrect. In a properly wired connection, each twisted pair should contain a signal wire and a ground wire. In a split pair, it is possible to have two signal wires twisted together as a pair. This can generate excessive amounts of crosstalk, corrupting both of the signals involved. Because all of the pins are connected properly, a tone generator and locator cannot detect this fault. An open circuit would manifest as a failure to detect a tone on a wire, indicating that there is either a break in the wire somewhere inside the cable or a bad connection with the pin in one or both connectors. A short is when a wire is connected to two or more pins at one end of the cable or when the conductors of two or more wires are touching inside the cable. Transposed pairs is a fault in which both of the wires in a pair are connected to the wrong pins at one end of the cable. All three of these faults are detectable with a tone generator and locator.

58. Which of the following cable faults increases a twisted-pair cable's susceptibility to crosstalk? A. Open B. Short C. Split pair D. Transposed pairs

C. Split pair A split pair is a connection in which two wires are incorrectly mapped in exactly the same way on both ends of the cable. Each pin on one end of the cable is correctly wired to the corresponding pin at the other end, but the wires inside the cable used to make the connections are incorrect. In a properly wired connection, each twisted pair should contain a signal wire and a ground wire. In a split pair, it is possible to have two signal wires twisted together as a pair. This can generate excessive amounts of crosstalk, corrupting both of the signals involved. Open circuits, shorts, and transposed pairs interfere with cable performance but do not make it more susceptible to crosstalk.

64. Ed is experiencing poor network performance on some new twisted-pair cable runs. After ruling out all other causes, he tests the cables with a tone generator and locator and finds no faults. Finally, he examines the cable connectors more closely and finds that, while the pins at one end of the cable are correctly connected to their corresponding pins at the other end, in some cases there are two solid color wires twisted together in a pair. Which of the following types of faults has Ed discovered? A. Open circuit B. Short circuit C. Split pairs D. Transposed wires

C. Split pairs A split pair is a connection in which two wires are incorrectly mapped in exactly the same way on both ends of the cable. In a properly wired connection, each twisted pair should contain a colored signal wire and a striped ground wire. In a split pair, it is possible to have two signal wires twisted together as a pair. This can generate excessive amounts of crosstalk, corrupting both of the signals involved. Because all of the pins are connected properly, a tone generator and locator cannot detect this fault. An open circuit would manifest as a failure to detect a tone on a wire, indicating that there is either a break in the wire or a bad connection in one or both connectors. A short is when a wire is connected to two or more pins or when the conductors of two or more wires are touching. Transposed pairs is a fault in which both of the wires in a pair are connected to the wrong pins at one end of the cable. All three of these faults are detectable with a tone generator and locator.

18. Which step of the troubleshooting model involves replacing components until a faulty hardware device is identified? A. Duplicate the problem B. Gather information C. Test the theory to determine the cause D. Establish a plan of action to resolve the problem E. Verify full system functionality F. Document findings, actions, and outcomes

C. Test the theory to determine the cause After you have established a theory of probable cause, you can try to test the theory by replacing hardware components one by one until you find the faulty device.

61. Alice's company has moved to a building that was prewired for twisted-pair Ethernet. However, since installing the company's Gigabit Ethernet equipment using the existing cable runs, performance has been poor. After performing some packet captures and analyzing the traffic samples, Alice discovers that there are a great many Ethernet frames being retransmitted. Next, she examines the cable runs in the drop ceilings. They do not appear to be overly long, and they do not appear to run near any major sources of electromagnetic interference. Which of the following could be the problem? A. Some of the cable runs are using T568A pinouts and some are using T568B. B. The cables only have two wire pairs connected, instead of four. C. The existing cable is not rated for use with Gigabit Ethernet. D. There are mismatched transceivers at the cable ends.

C. The existing cable is not rated for use with Gigabit Ethernet. Of the options provided, the only possible source of the problem is that the cable runs are using a cable type not rated for Gigabit Ethernet. Some older buildings might still have Category 3 cable installed, which was used in the original twisted-pair Ethernet specification. Cat 3 is unsuitable for use with Gigabit Ethernet in many ways and can result in the poor performance that Alice is experiencing. A cable installation with runs wired using different pinout standards will not affect performance as long as each run uses the same pinouts at both ends. Gigabit Ethernet will not function at all if only two wire pairs are connected. The transceivers are located in the equipment that Alice's company brought from the old location, so they are not mismatched.

34. What is the name for a device that determines the length of a cable by transmitting a signal at one end and measuring how long it takes for a reflection of the signal to return from the other end? A. Fox and hound tester B. Wiremap tester C. Time-domain reflectometer D. Voltage event recorder E. Butt set F. Spectrum analyzer

C. Time-domain reflectometer The technique that provides this capability is called time-domain reflectometry (TDR). The tester transmits a signal over the cable and measures how long it takes for a reflection of the signal to return from the other end. Using this information and the cable's nominal velocity of propagation (NVP)—a specification supplied by the cable manufacturer— the device can calculate the length of a cable run. The other devices listed do not work in this way.

60. Ralph is testing some newly installed twisted-pair cable runs on his network using a wiremap tester, and he has found one run that appears to have a cable break. However, the connectors at both ends are correctly installed, so the break must be somewhere inside the cable itself, which is nearly 100 meters long. Which of the following tools can Ralph use to determine the location of the cable break? (Choose all that apply.) A. Tone generator and locator B. Multimeter C. Time-domain reflectometer D. Cable certifier

C. Time-domain reflectometer D. Cable certifier A time-domain reflectometer (TDR) is a device that determines the length of a cable by transmitting a signal at one end and measuring how long it takes for a reflection of the signal to return from the other end. Using this information and the cable's nominal velocity of propagation (NVP)—a specification supplied by the cable manufacturer—the device can calculate the length of a cable run. In a cable with a break in its length, a TDR calculates the length of the cable up to the break. Cable certifiers typically have time-domain reflectometry capabilities integrated into the unit. A tone generator and locator or a multimeter cannot locate a cable break.

92. Which of the following commands enables you to view the Address Resolution Protocol (ARP) table stored in memory? A. arp -c B. arp -d C. arp -a D. arp -s

C. arp -a The arp -a command displays the entries in the ARP table stored in its cache. The arp -d command is for deleting entries, and the arp -s command is for adding entries. The arp -c command is not a valid option.

86. Which of the following Windows command-line utilities produced the output in the attached image? A. ping B. tracert C. netstat D. arp E. hostname

C. netstat Running the Windows netstat utility with no parameters generates a list of the workstation's active connections. The ping, tracert, arp, and hostname utilities are not capable of producing this output.

98. While performing a protocol analysis, Alice notes that there are many Internet Control Message Protocol (ICMP) packets in her captured traffic samples. She attributes these to her frequent use of Transmission Control Protocol/Internet Protocol (TCP/IP) troubleshooting tools. Which of the following utilities are used to test network layer characteristics of a host using ICMP messages? (Choose all that apply.) A. ipconfig B. netstat C. ping D. tracert

C. ping D. tracert ping and tracert are both utilities that test network layer characteristics using ICMP messages. ping tests the network layer functionality of the host, and traceroute displays the path to the host through the internetwork. ipconfig and netstat do not use ICMP messages.

8. Ralph is a first-tier technician working the help desk. After identifying a network problem submitted by multiple users, Ralph comes up with a theory specifying a possible source of the problem and sets about testing his theory. Unfortunately, testing indicates that Ralph's theory is wrong; the source he suspected is not the cause of the problem. Which of the following should not be the next step in Ralph's troubleshooting process? A. Reinterview the users to gather more information about the problem B. Escalate the problem to a second-tier technician C. Repeat the process of establishing a theory of probable cause D. Begin replacing components that might contribute to the problem

D. Begin replacing components that might contribute to the problem Replacing components by guesswork could resolve the problem through chance, but it would more likely be a waste of time and hardware. When Ralph's first theory is disproven, the next logical step would be to devise another theory. This could conceivably involve reinterviewing the users or escalating the issue to a senior technician. If the theory had been confirmed, the next step would be to devise a plan of action to resolve the problem.

72. Ed has discovered that some of the twisted-pair cables on his newly installed network are running right alongside fluorescent light fixtures in the drop ceiling. Which of the following problems is the network likely to experience due to the cables' proximity to the fixtures? A. Jitter B. Attenuation C. Crosstalk D. EMI

D. EMI Fluorescent light fixtures and other devices in an office environment can generate magnetic fields, resulting in electromagnetic interference (EMI). When a copper-based cable runs too near to such a device, the magnetic fields can generate an electric current on the cable that interferes with the signals exchanged by network devices. Jitter, crosstalk, and attenuation are all conditions that can affect the performance of a wired network, but they are not directly related to the cables' proximity to light fixtures.

59. Alice has been told by a consultant that the newly installed twisted-pair cable runs on her network might have split pairs. Which of the following cable testing tools can she use to detect split pairs? A. Tone generator and locator B. Wiremap tester C. Multimeter D. Cable certifier

D. Cable certifier A split pair is a connection in which two wires are incorrectly mapped in exactly the same way on both ends of the cable. Each pin on one end of the cable is correctly wired to the corresponding pin at the other end, but the wires inside the cable used to make the connections are incorrect. In a properly wired connection, each twisted pair should contain a signal wire and a ground wire. In a split pair, it is possible to have two signal wires twisted together as a pair. This can generate excessive amounts of crosstalk, corrupting both of the signals involved. Because all of the pins are connected properly, a tone generator and locator cannot detect this fault, and neither can a wiremap tester or a multimeter. However, a cable certifier is a highly sophisticated electronic device that can detect all types of cable faults, including split pairs, as well as measure cable performance characteristics.

17. Which step of the troubleshooting model involves identifying whether hardware or software has been recently installed or reconfigured? A. Identify symptoms B. Establish a theory of probable cause C. Establish a plan of action to resolve the problem and identify potential effects D. Determine if anything has changed. E. Test the theory to determine cause F. Document findings, actions, and outcomes

D. Determine if anything has changed. During the troubleshooting process, you must establish whether anything has changed. This typically involves asking the user whether any new or existing hardware or software has been installed or reconfigured.

25. When you troubleshoot a network problem, it is possible to introduce another problem while attempting to fix the original one. In which step of the troubleshooting process should you be aware of the residual effects that changes might have on the network? A. Identify the problem B. Establish a theory of probable cause C. Test the theory to determine cause D. Establish a plan of action to resolve the problem E. Implement the solution or escalate as necessary F. Verify full system functionality G. Document findings, actions, and outcomes

D. Establish a plan of action to resolve the problem After you identify a problem and establish and test a theory of its probable cause, you must create a plan of action to resolve the problem and identify any potential effects (positive or negative) your solution might have. Then, you implement your solution, test the results, and finish documenting the incident.

42. Which of the following troubleshooting tools is not used to test copper cabling installations? A. Wiremap tester B. Multimeter C. Tone generator and locator D. OTDR

D. OTDR An Optical Time Domain Reflectometer (OTDR) is a device that transmits light pulses over a fiber-optic network and measures the time interval and strength of the returning pulse, to measure the length of the cable run. An OTDR can be used to locate fiber-optic cable breaks, as well as characterize a cable run's reflectance, optical return loss, and other characteristics. Multimeters, tone generators, and wiremap testers are all devices that work only with copper networks.

31. After connecting a tone generator to the green wire at one end of a twisted-pair cable run, Ralph proceeds to the other end of the cable and touches the locator to each of the eight pins in turn. The green wire and the green striped wire both produce a tone. What type of wiring fault has Ralph discovered? A. Split pair B. Far end crosstalk C. Transposed wires D. Short circuit E. Delay skew

D. Short circuit The first and most essential test that installers must perform on every cable run is a continuity test, which ensures that each wire on both ends of the cable is connected to the correct pin and only the correct pin. If a pin on one end of a cable run is connected to two or more pins on the other end, the cable has a short circuit.

19. Which of the following are not general troubleshooting steps? (Choose all that apply.) A. Identify the problem B. Establish a theory of probable cause C. Test the theory to determine cause D. Verify that the client's Internet Protocol (IP) configuration is correct E. Establish a plan of action to resolve the problem and identify potential effects F. Verify that the router is forwarding. G. Implement the solution or escalate as necessary H. Verify full system functionality and, if applicable, implement preventive measures I. Document findings, actions, and outcomes

D. Verify that the client's Internet Protocol (IP) configuration is correct F. Verify that the router is forwarding. Verifying that a router is functioning and forwarding traffic and verifying that a client's IP configuration is correct are not considered general troubleshooting steps. You might perform these two steps as a subset of general troubleshooting steps.

83. Which of the following Windows command-line utilities produced the output in the attached image? A. ping B. tracert C. netstat D. arp E. hostname

D. arp Running the arp utility with the -a parameter on a Windows system displays the contents of the Address Resolution Protocol (ARP) cache. The cache contains records of the Internet Protocol (IP) addresses on the network that arp has resolved into Media Access Control (MAC) addresses. The ping, tracert, netstat, and hostname utilities are not capable of producing this output.

97. Ralph has been advised to check his Linux web servers for open ports that attackers might be able to use to penetrate the servers' security. Which of the following utilities can Ralph use to do this? A. tcpdump B. dig C. iptables D. nmap E. iperf

D. nmap The nmap utility is capable of scanning a system for open ports that might be a security hazard. The tcpdump, dig, iptables, and iperf utilities cannot do this.

80. Which of the following Windows tools uses Internet Control Message Protocol (ICMP) messages and manipulates IPv4 time-to-live values to illustrate the route packets take through an internetwork? A. ping B. netstat C. route D. tracert E. nslookup F. hostname

D. tracert The Windows tracert tool transmits a series of ICMP messages with incrementing Time to Live (TTL) values, which identify each router on the path that the packets take through the network. Ping uses ICMP, but it does not manipulate TTL values. Netstat, Route, Nslookup, and Hostname do not use ICMP messages, nor do they manipulate TTL values when performing their normal functions.


Ensembles d'études connexes

Network+ Ch2 quiz updated better

View Set

Chapter 11: The Agreement: Acceptance (SmartBook Assignment)

View Set

Romanesque Art & Architecture | FINAL EXAM

View Set

Mastering Biology Chapter 12: Mitosis

View Set

Chapter 7, Chapter 7S, Chapter 8, Chapter 9, Chapter 4, Midterm, Operations Management - Chapter 4, Operations Management - Chapter 7, Operations Management - Chapter 8, Operations Management - Chapter 9, Chapter 4 - OPMT 303, Chapter 4 Post Quiz, SC...

View Set

MED-SURG | RESPIRATORY 3 - INFECTIOUS PROCESSES 03.05 Isolation Precautions (MRSA, C. Difficile, Meningitis, Pertussis, Tuberculosis, Neutropenia)

View Set

NCLEX.. Fundamentals... Nutritional Components of Care

View Set

digital marketing and e-commerce (Google)

View Set

Chapter 3 Business Policy Pearson

View Set

8.04 Semester Test: World History 100% correct

View Set