Network Troubleshooting and Tools QUIZ

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

You are moving several wireless access points to an outdoor location for a special event. What should be the primary concern to ensure a positive experience for attendees? A) Overcapacity B) Incorrect antenna placement C) Signal-to-noise ratio D) Power levels

D) Power levels

You are troubleshooting a connectivity problem with a computer named Computer1 on a network that has a router with the IP address 192.168.10.1. The network uses a non-subnetted Class C IP address range. Computer1 is configured with an IP address of 192.168.10.255 and a default gateway address of 192.168.10.1. The computers on the network are configured with the subnet mask 255.255.255.0. Computer1 cannot connect to the other nodes on the network. The link lights on Computer1's network interface card (NIC) are lit. What is most likely causing the connectivity problem? A) Computer1's IP address B) the router's IP address C) the subnet mask used on the network D) Computer1's default gateway address E) Computer1's NIC

A) Computer1's IP address

You have an 802.11g wireless network that uses a single wireless access point. For security purposes, you do not broadcast the SSID. You have noticed wireless latency issues on your wireless network. What should you do to fix this issue? A) Install another wireless access point that uses a different non-overlapping channel and the same SSID. B) Enable channel bonding. C) Install another wireless access point that uses the same non-overlapping channel and a different SSID. D) Disable channel bonding

A) Install another wireless access point that uses a different non-overlapping channel and the same SSID.

You have implemented an Ethernet CSMA/CD network for your company. Users complain of delays. When you research the issues, you discover that the network has low throughput. What is the most likely cause of delay on this network? A) collisions B) switching loops C) broadcast storms D) improper termination

A) collisions

The network you administer is a Fast Ethernet network. Wall outlets are connected to patch panels by 90-meter cables. Patch panels are connected to switches by 5-meter cables. The network uses Category 5 unshielded twisted-pair (CAT 5 UTP) cable. You use a 15-meter patch cable to connect a server named Shipping to a wall outlet. You connect the Shipping computer to the network, start the computer, and properly configure it. However, clients cannot connect to the Shipping server. Clients can connect to other servers on the network. What will most likely solve the connection problem? A) replacing the 15-meter patch cable with a 3-meter patch cable B) replacing the CAT 5 UTP with CAT 3 UTP C) replacing the CAT 5 UTP with CAT 1 UTP D) replacing the 15-meter patch cable with a 10-meter patch cable

A) replacing the 15-meter patch cable with a 3-meter patch cable

Refer to PDF for this one

Answer is too long.

You are connecting a switch to a router. You just made a cable with each end configured differently, one 568A and the other 568B. When you plug in the cable, the devices cannot communicate. What is the most likely cause? A) Open/short B) Incorrect cable type C) Bent pins D) Jitter

B) Incorrect cable type

A user named Luther reports that he cannot log on to the network from his workstation. You attempt to use your administrator credentials to log on to the network from Luther's computer, but you cannot. Both you and Luther can log on to the network from your workstation. Your workstation and Luther's workstation are connected to the same hub. What is most likely causing the connectivity problem on Luther's workstation? A) Luther is typing an incorrect password when he attempts to log on to the network from his workstation. B) The NIC in Luther's workstation is defective. C) The hub that connects Luther's workstation to the network is defective D) Luther is typing an incorrect user name when he attempts to log on to the network from his workstation

B) The NIC in Luther's workstation is defective.

Users are unable to log in to the network. When you examine the authentication server, you see that CPU usage is almost 100%. What is most likely the issue? A) Incorrect gateway B) Unresponsive service C) Expired IP addresses D) Names not resolving

B) Unresponsive service

While troubleshooting a network outage on a 10GBaseSW network, a technician finds a 500-meter fiber cable with a small service loop and suspects it might be the cause of the outage. Which of the following is MOST likely the issue? A) dirty connectors B) maximum cable length C) bend radius exceeded D) RF interference caused by impedance mismatch

B) maximum cable length

You need to implement a wireless network to provide users in an outdoor sitting area with Internet connections. Which signal-absorbing obstructions should be noted when performing a WLAN site survey? A) microwave ovens B) trees C) plastic material D) local telephone lines

B) trees

Refer to PDF for this one

Branch4 - Change subnet mask to 255.255.255.0. Sales33 - Fix the computer's issue with DHCP. Server15 - Change default gateway to 172.21.0.1. Marketing11 - No changes to Marketing11. Research15 - No changes to Research15.

During a recent network breach, a help desk technician identifies the IP address of the computer that is affected. When you ask for the address, he gives you the following binary address:11000000 10101000 00101100 00011000What is the IP address? A) 192.168.44.25 B) 192.168.45.25 C) 192.168.44.24 D) 192.168.45.24

C) 192.168.44.24

Technicians have recently reported to you that the type of lighting in your company's building can affect the network communication. Which of the following statements is TRUE? A) The outer jacket of UTP and STP cable deteriorates when exposed to some types of fluorescent lighting. B) Incandescent bulbs emit high frequency electromagnetic waves that can resonate with 100 Mbps transmissions, causing them to amplify beyond the capacity of the media. C) Fluorescent lighting fixtures emit high levels of EMI. D) Halogen lights emit a full spectrum of light that can interfere with fiber-optic transmissions.

C) Fluorescent lighting fixtures emit high levels of EMI.

The security administrator just updated some security settings, including settings on routers and firewall. Users are complaining that they cannot access certain remote resources that they were able to access prior to the changes being made. What is most likely the problem? A) Incorrect netmask B) Duplicate MAC addresses C) Incorrect ACL settings D) Incorrect time

C) Incorrect ACL settings

You need to solve a traffic problem occurring on a large Ethernet network. Within this large segment, the accounting department is flooding the network with a high volume of data, which causes the entire network to slow down. Which device is a quick and low-cost solution to isolating the accounting department? A) repeater B) gateway C) bridge D) router

C) bridge

You want to configure a firewall and filter packets on a Linux system. Which command would you use? A) tcpdump B) nslookup C) iptables D) ifconfig

C) iptables

A new user is reporting a "Destination Host Unreachable" message. What is the most likely culprit? A) Incorrect time B) Rogue DHCP server C) Untrusted SSL certificate D) Incorrect gateway

D) Incorrect gateway

A contractor is unable to connect to your wireless network using his 802.11g wireless adapter. What is the most likely problem? A) You are using an incorrect channel on your network. B) You have an 802.11b network. C) You have an 802.11n network. D) You have an 802.11a network

D) You have an 802.11a network

You have been hired as an IT technician. You have been given a kit that contains the tools shown in the exhibit. You need to determine the tasks that each tool is used to perform. Match each task on the left with the appropriate tool exhibit name on the right. (Please Refer to the PDF)

Exhibit A - to terminate the ends of a cable and attach the connector Exhibit B - to remove the outer plastic from the wiring Exhibit C - to locate the ends of a cable Exhibit D - to measure electric current, voltage, and usually resistance Exhibit E - to test the wiring of a cable Exhibit F - to test a computer port Exhibit G - to connect a cable into a punch down block or patch panel

Refer to PDF

Refer to PDF

You are troubleshooting a network connectivity problem on a Windows 7 computer. You issue the following command at a command prompt in command prompt window: nbtstat -r Which screen is displayed as a result of issuing this command?

Refer to PDF

Your network is shown in the following image: (PDF) Workstations A4 and A5 were recently added to the network. Since the clients have been added, the network has been running very slowly. Which two conditions could be causing this problem? (Choose two.) A) A connector is loose. B) You have exceeded your network server access limits. C) You exceeded the maximum number of computers allowed on the network. D) The bus network might be missing a terminator.

A) A connector is loose. D) The bus network might be missing a terminator.

Management has decided to implement a diversity antenna system at its main headquarters. What is the advantage of using this system? A) A diversity antenna system avoids multipath distortion. B) A diversity antenna system increases the transmission power. C) A diversity antenna system adds more bandwidth. D) A diversity antenna system increases the coverage area.

A) A diversity antenna system avoids multipath distortion.

You are a system administrator. A user calls you complaining that he cannot log on to the network. What are two questions you should ask first when troubleshooting the problem? (Choose two.) A) Can the problem be duplicated? B) Is the computer plugged in? C) Are other users also experiencing the same problem? D) How much memory does your computer have?

A) Can the problem be duplicated? C) Are other users also experiencing the same problem?

You are about to install several wireless access points in different areas of the building. You want maximum coverage, so you opt for the longer-range 2.4 Ghz frequency. Which item below should most likely also be of concern? A) Channel overlap B) Interference C)Power levels D) Security type mismatch

A) Channel overlap

You originally configured a redundant server with a static IP address, and it has been offline for some time. When you power the server up to performs some tests, what might be an unexpected consequence? A) Duplicate IP addresses B )Incorrect host-based firewall settings C) Names not resolving D) Blocked TCP/UDP ports

A) Duplicate IP addresses

You have been called to troubleshoot a workstation problem in the oldest building on your company's corporate campus. The network workstations in that building are unreliable. When the room lights are on, connectivity is lost, but when the room lights are off, the network is functional. Upon arrival, you quickly survey the work environment. You observe the following conditions: *Lighting consists mainly of fluorescent lights. *Temperature is 65 degrees Fahrenheit (18 degrees Celsius). *Humidity is 75%. *Employees own space heaters, but they are not using them. *Electrical outlets appear outdated. What is most likely causing the loss of connectivity? A) Fluorescent lighting in the room B) Low temperature C) Defective network hubs D) Voltage fluctuation in the outlets

A) Fluorescent lighting in the room

The network you administer has two LANs connected by DSL routers through the Internet, as depicted in the following exhibit: (PDF) Client4 cannot connect to Client5. Client3 cannot connect to Client4, but Client3 can connect to Client2. Client2 can connect to Server1, and Client1 can connect to Server2.Which device is most likely causing the connectivity problem on the network? A) Hub B B) DSLRouter A C) DSLRouter B D) Client3 E) Hub A

A) Hub B

You installed a network in a company executive's home office to allow her to securely access the corporate network and work from home. It has worked properly for three months, but now she says that it is broken. What should you do first to troubleshoot this problem? A) Identify the problem. B) Establish a plan of action. C) Test the theory to determine cause. D) Establish a theory of probable cause.

A) Identify the problem.

You install a network analyzer to capture your network's traffic as part of your company's security policy. Later, you examine the captured packets and discover that the only packets that were captured are from Subnet 1. You need to capture packets from all four subnets on your network. Two routers are used on your network. What could you do? (Choose two. Each answer is a complete solution.) A) Install a distributed network analyzer. B) Install a port scanner. C) Install the network analyzer on all four subnets. D) Install the network analyzer on a router. E) Install the network analyzer on the firewall.

A) Install a distributed network analyzer. C) Install the network analyzer on all four subnets.

You are troubleshooting a connectivity problem on an Ethernet network that contains both NetWare and Windows servers. A Windows 7 client cannot connect to the Internet or any network resources. However, other computers on the same subnet as the client can access network resources and the Internet. You issue the ipconfig command at the workstation and find that the IP address is 169.254.184.25 and the subnet mask is 255.255.0.0. This IP network and subnet are different from the IP network and subnet that other computers on the same segment are using. What is the most likely problem? A) The client selected the IP address using APIPA. B) The client obtained the IP address from a DHCP server it found on the Internet. C) The client obtained the IP address from a NetWare server. D) The client obtained the IP address from a Windows server.

A) The client selected the IP address using APIPA.

The company network that you administer has four LANs: accounting, receiving, shipping, and development. Each LAN is connected to the other LANs by a router. The user of the computer named LeadDev on the development LAN reports that he cannot connect to a computer named DevServ, which is also on the development LAN. The user of a computer named Shipmaster on the shipping LAN reports that she can connect to the DevServ computer. Which situation is the most likely cause of the connectivity problem? A) The network cable is disconnected from the NIC on the LeadDev computer. B) The router is defective. C) The Shipmaster computer has a faulty NIC. D) The NIC in the DevServ computer is defective.

A) The network cable is disconnected from the NIC on the LeadDev computer.

You have been called to assist a user with a network connectivity problem. The user is unable to access an application stored on a server. You want to determine if this problem is network-wide or a workstation problem. Which step should be taken to make this determination? A) Try opening the application from other workstations. B) Try opening other applications on the user's workstation. C) Shut down the server and reset the network. D) Reset the user's rights/permissions for the application.

A) Try opening the application from other workstations.

You need to determine the length of a network cable. Which device should you use? A) a TDR B) a crossover cable C) a tone generator D) a hardware loopback

A) a TDR

You administer a LAN that uses TCP/IP as its network communications protocol. You want to view the number of UDP packets that will be sent to SERVER_1 from CLIENT_A. Which tool should you use to view this information? A) a protocol analyzer B) Performance Monitor C) Monitor.nlm D) a hardware loopback

A) a protocol analyzer

You have implemented a new 802.11b 2.4-GHz WLAN. Which of the following devices can cause interference with this network? (Choose all that apply.) A) cordless phones B) microwave ovens C) cable TV cabling D) electrical wiring

A) cordless phones B) microwave ovens

You need to display the current IP configuration of a Windows 7 computer. Which command should you use? A) ipconfig B) winipcfg C)netstat D) tracert

A) ipconfig

You need to create a cable that will allow you to get a link light on your network interface card (NIC) when the NIC is not plugged into a hub or switch. Which type of cable should you use? A) loopback cable B) rollover cable C) crossover cable D) straight-through cable

A) loopback cable

You need to check an IP connection end-to-end at the Network layer. Which tool should you use? A) ping B) trace C) telnet D) show

A) ping

Your organization has responded to a security incident. The breach has been contained, and all systems have been recovered. What should you do last as part of the incident response? A) post-mortem review B) analysis C) investigation D) triage

A) post-mortem review

Your manager suspects that your network is under attack. You have been asked to provide information regarding traffic flow and statistical information for your network. Which tool should you use? A) protocol analyzer B) penetration test C) port scanner D) vulnerability test

A) protocol analyzer

You are on a Linux system, and you want to use a command-line tool to look at POP3 traffic on the local machine. Which command will you use? A) tcpdump B) tracert C) ipconfig D) netstat

A) tcpdump

You are troubleshooting a network connectivity problem on a Windows 7 Enterprise computer, and you need to view the MAC address for the NIC installed in the computer. Which command should you use? A) the ipconfig /all command B) the tracert command C) the ping command D) the arp command

A) the ipconfig /all command

You are the network administrator for your company. You are in the process of verifying the configuration of the network devices to ensure smooth network connectivity. You want information on the routes taken by packets from a Cisco router so that you are able to identify the network points where packets are being dropped. Which command should you use to accomplish this task in the most efficient manner? A) traceroute B) tracert C) ping D) extended ping

A) traceroute

An employee shows you a Web site that publishes the SSIDs and passwords for private wireless networks in your area. The information on your company's wireless network is included. Of which type of attack is this an example? A) war chalking B) WEP cracking C) WPA cracking D) evil twin

A) war chalking

You are the network administrator for your company. One of your trainees configured the company's network. However, the network is not working. You ran the ipconfig command on Host A and found that the subnet mask on Host A is not properly configured. The network is shown in the following image: (PDF) Which subnet mask should you configure on Host A to solve the problem? A) 255.255.240.0 B) 255.255.254.0 C) 255.255.192.0 D) 255.255.0.0

B) 255.255.254.0

You are troubleshooting a computer that has the IP address of 196.22.14.42. To which network class does the IP belong? A) Class D B) Class C C) Class E D) Class B E) Class A

B) Class C

You have discovered that hackers are gaining access to your WEP wireless network. After researching, you discover that the hackers are using war-driving methods. You need to protect against this type of attack. What should you do? (Choose all that apply.) A) Configure the WEP protocol to use a 128-bit key. B) Configure the network to use authenticated access only. C) Change the default SSID. D) Disable SSID broadcast.

B) Configure the network to use authenticated access only. C) Change the default SSID. D) Disable SSID broadcast.

Your organization has several wireless access points located in the building. Access point usage is based on department membership. Many users report that they are able to see multiple access points. You research this issue and discover that their computers are not connecting to the appropriate access point due to an SSID mismatch. You must ensure that the computers connect to the correct access point if that access point is available. Computers should be able to connect to other access points only if their main access point is down. What should you do? A) Reduce the signal strength on the wireless access points. B) Configure the preferred wireless network on the user's computer. C) Ensure that the wireless access points in close proximity use different channels. D) Configure MAC filtering on the wireless access points

B) Configure the preferred wireless network on the user's computer.

You are troubleshooting a problem in which several users have called the help desk to report problems connecting to parts of the WAN. They were able to access the entire WAN earlier in the day, but when they returned from their lunch breaks they were not able to access parts of the WAN. You have been able to gather information about the problem, duplicate the problem, question the users, and adequately establish the symptoms of the problem. What should you do next? A) Test the result. B) Establish what has changed. C)Select the most probable cause. D) Recognize the potential effects of the solution.

B) Establish what has changed.

A user in the Engineering department is unable to log on to the network. The network has eight subnets and uses TCP/IP. There have been no other complaints from other departments. Which steps should help you isolate the cause of the problem? (Choose two.) A) Replace all the patch cables. B) Establish whether other local-segment users are having the same problem. C) Configure a WINS server. D) Ping the server.

B) Establish whether other local-segment users are having the same problem. D) Ping the server.

In your fiber network, some users are reporting connectivity issues, while others are not. You suspect a faulty or broken cable. Which tool would help you locate the fault? A) Spectrum analyzer B) OTDR C) Loopback adapter D) Multimeter

B) OTDR

A user is complaining that she cannot log on to the network server. What specific steps should you take to locate the problem? (Choose three.) A) Reboot the network server. B) Ping the server. C) Have a user on a remote segment try to log on to the server. D) Have a user on the local segment try to log on to the server. E) Ask the user reporting the problem to reboot her workstation

B) Ping the server. C) Have a user on a remote segment try to log on to the server. D) Have a user on the local segment try to log on to the server.

You recently built a virtual network for testing purposes that is parallel to your existing network. When users attempt to log on to the existing network, they get a different IP address than expected. In addition, some users report receiving a duplicate IP address error. What could be the issue? A) Exhausted DHCP scope B) Rogue DHCP server C) Incorrect host-based firewall settings D) Incorrect netmask

B) Rogue DHCP server

You administer a network for your company. You determine that there is a network connectivity problem on one of the computers on the network. You re-create the problem and determine that the problem is located in the NIC. You establish a theory of probable cause. Which step should you take next to troubleshoot the problem? A) Implement a correction plan. B) Test the theory. C) Provide feedback to the users of the computer. D) Form a correction plan.

B) Test the theory.

You just installed a replacement switch that was moved from one part of the network to a new location. After all the patch cables are reconnected, some users cannot communicate via e-mail. What is the most likely issue? A) Bad port B) VLAN mismatch C) Attenuation D) Network connection LED status indicators

B) VLAN mismatch

You added a new wireless access point for the Research and Development team in a newly constructed wing of the old building. You also configured the wireless access point to use WPA2. Where do you anticipate most support issues to arise from? (Choose all that apply.) A) Attenuation B) Wrong SSID C) Jitter D) Wrong passphrase

B) Wrong SSID D) Wrong passphrase

You need to increase the area that is covered by your wireless network to include another building. You decide to use a signal bounce. All of the following could help with this issue EXCEPT: A) channel bonding B) encryption C) reflectors D) repeaters

B) encryption

You need to obtain the current protocol statistics and port connections for Windows and UNIX/Linux computers. Which tool should you use? A) ping B) netstat C) nbtstat D) tracert

B) netstat

A user reports that she cannot print from her computer. You also notice that they are unable to reach a supplier's web site. The operating system is Windows 8.1. Which command should you start with to help with your diagnosis? A) route B) ping C) nmap D) dig

B) ping

You are the network administrator for your company's network. All servers run Windows Server 2008. All workstations run Windows 7. The network diagram is shown in the following exhibit. Workstation A2 cannot connect to Server B. Workstation B2 can connect to Server B. Workstation A2 can connect to Server A. Which command should you run from Workstation A2 to test the connection from Workstation A2 to Server B? A) pconfig 137.17.0.1 B) ping 137.17.0.1 C) tracert 137.17.0.2 D) ping 137.17.0.2

B) ping 137.17.0.1

You have been hired as a network technician. As part of your technician's kit, you have been issued a basic digital multimeter with no extra probes. What is the primary function of this device? A) measures the temperature of a chip on motherboard B) tests voltage C) measures the light signal energy D) connects RJ-45 jacks to an Ethernet cable

B) tests voltage

Your Windows 7 computer is located on a TCP/IP network that uses DHCP. You want your computer to release its lease on the TCP/IP configuration that it received from the DHCP server. Which command should you issue to release the configurations? A) the ping command B) the ipconfig command C) the arp command D) the tracert command

B) the ipconfig command

You need to verify a network's transmission speed. Which tool should you use? A) loopback plug B) throughput tester C) bit-error rate tester D) connectivity software

B) throughput tester

You want to trace a signal from one end of a 100BaseT UTP cable to the other. Which tool will help you input a test signal that can be traced through the cable? A) crossover adapter B) tone generator C) signal generator D) tone locator

B) tone generator

Your network is experiencing a problem that a technician suspects is concerning a Cisco router. The technician provides you the following command results: 1 14.0.0.2 4 msec 4 msec 4 msec 2 63.0.0.3 20 msec 16 msec 16 msec 3 33.0.0.4 16 msec * 16 msec Which Cisco command produced the results you were given? A) ping B) traceroute C) extended ping D) tracert

B) traceroute

You instruct a user to issues the ipconfig command with the /release and /renew options. In which two situations would it be appropriate to ask a user to do this? (Choose two.) A) when no IP helper address has been configured on the router between the client and the DHCP server B) when recent scope changes have been made on the DHCP server C) when the no ip directed-broadcast command has been issued in the router interface local to the client, and no IP helper address has been configured on the router between the client and the DHCP server D) when the result of running the ipconfig /all command indicates a 169.254.163.6 address

B) when recent scope changes have been made on the DHCP server D) when the result of running the ipconfig /all command indicates a 169.254.163.6 address

A user is complaining about wireless connectivity. Their cubicle is on a concrete wall, and the wireless access point is mounted on the other side of the wall. What describes what is happening to the wireless signal that only has to travel a few inches? A) Refraction B) Attenuation C) Absorption D) Frequency mismatch

C) Absorption

A new file server is configured to allow personnel within the company to store files. Users are reporting that they cannot upload files to the file server. What might be the areas you should examine? (Choose two.) A) Duplicate IP addresses B) Hardware failure C) Blocked TCP/UDP ports D) Incorrect ACL settings

C) Blocked TCP/UDP ports D) Incorrect ACL settings

A user is complaining about poor network connectivity. Upon examining the workstation, you notice it is connected to a patch cable that your new network technician made earlier in the week. You suspect there is interference between two pairs in the cable. What is the most likely culprit for the connectivity issue? A) Damaged cables B) Latency C) Crosstalk D) EMI

C) Crosstalk

You are nearing the completion of a project that involves implementing a new network infrastructure and upgrading the operating systems running on your network servers. Currently, static IP addresses and HOSTS files are used. The upgrade has included implementing DNS, implementing DHCP, and moving servers and other resources to a new location with new IP addresses. However, now you cannot access the resources that were moved using their host names from any of the client workstations. You can access them by their IP addresses. What should you do first? A) Enable NetBIOS over TCP/IP. B) Configure DHCP to supply a different range of IP addresses to the workstations. C) Delete the HOSTS file on each workstation. D) Import the workstations' names and address mappings to DNS.

C) Delete the HOSTS file on each workstation.

A user is complaining that she cannot log on to the network server. What should you do first to resolve the problem? A) Ask the user reporting the problem to reboot her workstation. B) Ensure that network server-access limits have not been exceeded. C) Establish whether other users are experiencing the same problem. D) Reboot the network server.

C) Establish whether other users are experiencing the same problem.

Users are reporting Internet connectivity issues. After researching, you discover that the routing protocols in use on your network are experiencing routing loops. You must prevent this from happening. What should you do? A) Test all of the routing interfaces to determine which is experiencing problems. B) Reconfigure your routers so that only a single routing protocol is used throughout the network. C) Implement split horizon. D) Replace the routers on your network

C) Implement split horizon.

Your company has recently replaced all the shielded twisted pair (STP) and unshielded twisted pair (UTP) cable with fiber optic cable. You need to purchase a device to determine the length of the cables used on your network. Which tool do you need? A) toner probe B) TDR C) OTDR D) butt set

C) OTDR

You are a desktop administrator for Nutex Corporation. Your organization uses Ethernet cable to connect network resources. A user reports that he is unable to access network resources on his portable computer. The portable computer is connected to the company's network using an Ethernet cable. When you test the cable using a time domain reflectometer (TDR), the signal returns too soon. What should you do? A) Reinstall the network adapter. B) Replace the network adapter. C) Replace the network cable. D) Re-route the network cable.

C) Replace the network cable.

You administer a small 100BaseTX Fast Ethernet network for your company. Users report that the network is responding very slowly to user requests, and you conclude that the NIC in the John1 computer is causing a broadcast storm. What would lead you to this conclusion? A) The power light on the NIC in John1 is constantly off. B) The traffic link light on the hub port that is connected to the NIC in John1 is constantly off. C) The traffic link light on the NIC in John1 is constantly on. D) A protocol analyzer indicates that John1 is occasionally transmitting data packets.

C) The traffic link light on the NIC in John1 is constantly on.

You are replacing a SFP fiber cable. You decide to use an SFP+ cable because one is available. The cable fits in the ports, but you lose connectivity. Which is the most likely culprit? A) Incorrect pin-out B) Latency C) Transceiver mismatch D) Damaged cables

C) Transceiver mismatch

You are a system administrator. A user calls you complaining that every time she tries to log on to the network, she gets an error message. Other users are not having any problems. Which question is best to ask first when attempting to troubleshoot the problem? A) What is your username and password? B) Have you rebooted your computer? C) Which error message do you receive? D) How much memory is installed in your computer?

C) Which error message do you receive?

The network diagram is shown in the following image: (PDF) The workstations on the network cannot connect to the Internet. You can ping the router from the Internet. The workstations and server can connect to each other. Where is the problem most likely to exist? A) between the server and the network B) between the server and the workstations C) between the router and the server D) between the router and the Internet

C) between the router and the server

You have decided to implement a network protocol analyzer on your company's network. Which job is NOT performed by this tool? A) identify the types of traffic on the network B) provide network activity statistics C) detect active viruses or malware on the network D) identify source and destination of communication

C) detect active viruses or malware on the network

You are investigating possible unauthorized access to a Windows Server 2008 computer. The first step in your company's investigation policy states that the current network connections must be documented. Which command should you use? A) ping B) tracert C) netstat D) ipconfig

C) netstat

While performing routine network maintenance, you discover that one device on your network is operating in halfduplex mode. All the other devices on your network operate in full-duplex mode. What would this condition cause between the half-duplex device and the other devices? A) faster communication B) no communication C) slower communication D) It would have no effect

C) slower communication

You administer computers on a Windows network. You suspect a problem with automatic NetBIOS name resolution on a Windows 7 computer on the network. Which command should you use to troubleshoot the name resolution problem? A) the ipconfig /all command B) the tracert dnsname command C) the nbtstat -r command D) the netstat command

C) the nbtstat -r command

You administer a LAN for your company. The LAN is connected to the Internet through a T1 connection. The network you administer is displayed in the following exhibit: (PDF) The link light on the hub for the cable that connects the hub to the router is not lit. The link lights on the hub for Workstation A and the Server computer are lit. Workstation A and Server can communicate with one another, but neither of these computers can communicate with the Workstation B computer. Workstation B can connect to the Internet through the modem, but Workstation B cannot communicate with either Workstation A or Server. Which device is most likely causing the communications problem? A) the modem B) the hub C) the router D) Workstation A

C) the router

You are implementing an 802.11g wireless network in your office. What is the maximum number of wireless access points that you can implement within 30 meters of each other? A) two B) five C) three D) four

C) three

You are a desktop administrator for Nutex Corporation. A user reports that he is unable to access network resources. You notice a break in the network cable. You need to create a new network cable to connect the computer physically to the RJ-45 jack in the wall. What tool should you use to splice the end of the cable to an RJ-45 connector? A) time domain reflectometer B) optical tester C) wire crimper D) pliers

C) wire crimper

Refer to PDF

Cable tester - Verifies that a cable is good Crimper - Attaches media connectors to the ends of the cable Loopback plug - Echoes signals over a port to ensure it is working properly Multimeter - Includes a voltmeter, an ohmmeter, and an ammeter to measure voltage, current, and resistance, respectively Punchdown tool - Attaches cable to a patch panel Toner probe - Includes a tone generator and a tone locater to locate the ends of a cable

Users are complaining about a decrease in network performance. You need to verify that the ISP is meeting the terms outlined in the SLA. What tool should you use? A) Packet sniffer B) Port scanner C) Protocol analyzer D) Bandwidth speed tester

D) Bandwidth speed tester

You are troubleshooting a workstation that is not communicating with the network. You try a different port within the wiring closet hub, and this seems to fix the problem. What should you do next? A) Document the problem and the solution. B) Have other users reboot their workstations. C) Replace all the patch cables. D) Connect to the network and try to transfer a file.

D) Connect to the network and try to transfer a file.

A user is experiencing network connectivity issues after a faulty NIC was replaced. You want the user to have excellent throughput, so you configure the NIC for full-duplex (auto configuration off). The corresponding switch port is configured as auto-config, so you should be OK, but the throughput is lower than expected. What is the issue? A) TX/RX reverse B) Bottlenecks C) Incorrect pin-out D) Duplex/speed mismatch

D) Duplex/speed mismatch

An employee has just relocated to the New York office, after working in Paris for the past five years. Both offices use DHCP to issue IP addresses. She brought her company laptop with her. The laptop was issued in Paris. As she is settling in to the new office, she is not able to connect to the network. What is the most likely cause of her problem? A) Hardware failure B) Untrusted SSL certificate C) Expired IP addresses D)Duplicate MAC addresses

D) Duplicate MAC addresses

During a recent troubleshooting incident, you discovered a problem with some network transmission media. The communication over the media was distorted. Which issue most likely caused this problem? A) Crosstalk B) Attenuation C) ESD D) EMI

D) EMI

You are shopping for a new wireless access point. The access point will be mounted to the wall. With which one of these should you be concerned during the selection process? A) Incorrect antenna type B) Wrong passphrase C) Security type mismatch D) Incorrect antenna placement

D) Incorrect antenna placement

You are installing a second wireless access point in your office. When you place the second wireless access point, you notice it is experiencing interference intermittently. You want to prevent the interference. Which method would NOT prevent interference? A) Move the new wireless access point. B) Decrease the signal strength of the new wireless access point. C) Change the channel used on the new wireless access point. D) Increase the signal strength of the new wireless access point.

D) Increase the signal strength of the new wireless access point.

You need to display protocol statistics and connections using NetBIOS for a Windows computer. Which utility should you use? A) arp B) FTP C) ping D) Nbtstat

D) Nbtstat

You are the network admin at a small college. For most of the day, your school's wireless network performs as it should. Between classes, however, performance is abysmally slow. What is the most likely cause? A) Refraction B) Channel overlap C) Signal-to-noise ratio D) Overcapacity

D) Overcapacity

You are a network administrator. A user named Wendy uses a computer named Client1. Wendy reports that she cannot connect to other computers on the 100BaseTX Ethernet network that is depicted in the following exhibit (PDF). You test Client1 and the other computers connected to Hub A and Hub B, and you determine that only Wendy cannot connect to the network. What is most likely causing the connectivity problem in this scenario? A) Hub A is defective. B) A broadcast storm is emanating from the NIC in Client4. C) Hub B is defective. D) The NIC in Client1 is defective

D) The NIC in Client1 is defective

You are the network administrator for a corporate network that includes a DNS server, a DHCP server, a file/print server, and a wireless subnet. Computers on the wireless subnet are having trouble connecting to internal resources and to the Internet. Upon troubleshooting the problem, you discover that some of the wireless computers can only access resources on other wireless computers. However, some of the wireless computers can access internal resources and the Internet. What is causing some of the wireless computers to be able to access other wireless computers only? A) The computers are configured with static IP addresses. B) The computers are configured with the wrong subnet mask. C) The computers are configured to operate in infrastructure mode. D) The computers are configured to operate in ad hoc mode.

D) The computers are configured to operate in ad hoc mode.

While reviewing recent performance reports from your network devices, you notice that there are a high number of corrupt packets reaching a router named Router 34. What is most likely happening to them? A) The packets are being forwarded to the next router upstream. B) The packets are causing the interface to reset. C) The packets are causing the duplexing method to change. D) The packets are being dropped.

D) The packets are being dropped.

A user has just returned from a week-long conference. While attending the conference, the user connected their work laptop to both the hotel Wi-Fi and the conference Wi-Fi. Now the user cannot connect to the company's Wi-Fi. What is most likely the issue? A) Frequency mismatch B) Latency C) Jitter D) Wrong SSID

D) Wrong SSID

You need to check for open circuits and short circuits on your network. Which tool should you use? A) toner probe B) butt set C) protocol analyzer D) cable tester

D) cable tester

A hacker has used a packet sniffer to attack your company's network. What can a hacker accomplish by using this technique? A) spreading a virus on a network B) initiating a social engineering attack C) inserting a Trojan horse on a network server D) collecting data on network traffic

D) collecting data on network traffic

You install a second NIC in your Linux computer. Then, you log on to the computer as root. You want to configure the new NIC with the IP address 192.168.0.1 and the subnet mask 255.255.255.0.Which command should you issue at a command prompt to configure the NIC? A) ipconfig eth1 192.168.0.1 netmask 255.255.255.0 up B) ifconfig eth0 192.168.0.1 subnet 255.255.255.0 up C) ipconfig eth0 192.168.0.1 subnet 255.255.255.0 up D) ifconfig eth1 192.168.0.1 netmask 255.255.255.0 up

D) ifconfig eth1 192.168.0.1 netmask 255.255.255.0 up

You are the network administrator for your company's network. All servers run Windows Server 2008. All workstations run Windows 7. The network diagram is shown in the following image (PDF). Which command should you run from Server B to determine whether the default gateway address is properly configured? A) ipconfig 129.68.0.1 B) ipconfig ServerB C) ipconfig /renew D) ipconfig /all

D) ipconfig /all

You are using the ipconfig tool to troubleshoot a problem with a wireless host. The results are shown below: Adapter address: 00-10-4B-DE-F5-D8IP address: 192.168.1.40Subnet mask: 255.255.255.0Default gateway: 0.0.0.0You can access services on the local network from the host, but you cannot access the Internet. What is the most likely cause of the problem? A) incorrect subnet mask B) incorrect IP address C) invalid Ethernet adapter D) missing default gateway

D) missing default gateway

Your company's security policy states that passwords should never be transmitted in plain text. You need to determine if this policy is being followed. Which tool should you use? A) password cracker B) network mapper C) vulnerability scanner D) protocol analyzer

D) protocol analyzer

You are troubleshooting a network problem in which users cannot connect to the Internet. The network diagram is as shown (PDF). The activity lights on the hubs' ports connected to the router and the lights on the router's ports connected to the hubs are not lit. All other lights on both devices are lit. Which component is most likely to have failed? A) hubs B) modem C) NICs D) router

D) router

You administer computers on an Ethernet 100BaseTX network, which uses the TCP/IP network communications protocol. The network uses an unsubnetted Class A IP address range. A computer on the network named Admin1 has the IP address 12.10.100.3, and a computer on the network named Marketing1 is configured with the IP address 12.10.100.4. Both computers are configured with the subnet mask 255.0.0.0 and the default gateway address 12.10.100.5. The network is connected to the Internet. RemoteWkst is a computer on a remote network that is connected to the Internet. Normally, Marketing1 and Admin1 can connect to RemoteWkst. You recently discovered that Marketing1 can connect to Admin1 and Admin1 can connect to Marketing1, but neither of these computers can connect to RemoteWkst. You suspect that there is a problem with one of the routers between RemoteWkst and the network you administer. Which TCP/IP utility should you use to troubleshoot this connectivity problem? A) the ipconfig utility B) the arp utility C) the nslookup utility D) the tracert utility

D) the tracert utility

You are the network administrator for your company's network. All servers run Windows Server 2008. All workstations run Windows 7. The network diagram is shown in the following exhibit. Workstation A2 is experiencing delays accessing Server B. Which utility should you run from Workstation A2 to determine the source of the slowdown? A) ipconfig B) ping C) netstat D) tracert

D) tracert

You want to determine the route a packet takes to reach a remote system. Which Windows utility should you use? A) telnet B) netstat C) ipconfig D) tracert

D) tracert

You have been hired as a network consultant by a company. You discover that the network's signal strength greatly weakens as traffic travels over the network medium due to absorption and scattering. What is the term for this tendency? A) Harmonic distortion B) EMI C) Intermodulation distortion D) Refraction E) Attenuation

E) Attenuation

You have been hired as an IT technician. You have been given a kit that contains the tools shown in the exhibit (Please Refer to the PDF).

Exhibit A - wire crimper Exhibit B - cable stripper Exhibit C - tone generator and probe Exhibit D - multimeter Exhibit E - cable tester Exhibit F - loopback plug Exhibit G - punchdown tool

Refer to the PDF

Refer to the PDF


Ensembles d'études connexes

Unit Five - Mental Health and Community Issues

View Set

CHAPTER 11: Pesticide Application Procedures: Review

View Set

Exam 2 - Clicker Questions 2/28/17

View Set

Anatomy and Physiology Chapter 2-Chemical Level of Organization

View Set

Chp. 8: Disorders of Fluid and Electrolyte and Acid Base Balance

View Set

Cell Membrane - Composition and Transport week 3

View Set