Network Troubleshooting and Tools (5.0) study set

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following is considered a system-wide error? A problem with an order entry or customer service call center resource A problem with a router that affects only one local area network (LAN) A fatal error that causes a single computer to fail A problem with an email server that affects all network users

A fatal error that causes a single computer to fail A system-wide error is a problem that renders an individual user's system (computer) completely unusable. All the other problems listed would affect more than one system or user.

What is a digital signature? A hashed web page An encrypted web page A hash of an encrypted data chunk that sender and receiver both have A web page that has been hashed with a private key

A hash of an encrypted data chunk that sender and receiver both have

A network administrator is noticing slow response times from the server to hosts on the network. After adding several new hosts, the administrator realizes that CSMA/CD results in network slowness due to congestion at the server NIC. What should the network administrator do? Add a honeypot to reduce traffic to the server Update the Ethernet drivers to use 802.3 Add additional network cards to the server Disable CSMA/CD on the network

Add additional network cards to the server Adding dual NICs to the server can increase the bandwidth at the server and minimize congestion. You can establish load balancing between the two cards or create a bonded NIC to increase the throughput by combining them into one virtual interface.

What should be considered when troubleshooting the coverage and signal strength of an 802.11n WLAN? Humidity Malware Temperature Building materials in the area

Building materials in the area

Ralph purchases some 802.11a wireless network adapters for desktop computers at a yard sale, which he intends to use on his 802.11g home network. He installs one of the adapters in a computer and attempts to connect it to the network, but he can't see his SSID. He tries a different adapter, thinking the first one might be broken, but that one does not work either. What can Ralph do to resolve the problem and connect the computer to his network? Move the computer closer to the access point. Configure the access point to use the 5 GHz frequency. Manually enter the SSID in the computer's client software. Nothing. 802.11a equipment cannot connect to an 802.11g network.

Nothing. 802.11a equipment cannot connect to an 802.11g network. Wireless LAN equipment built to the 802.11a standard can only use the 5 GHz frequency. However, an 802.11g access point can only use the 2.4 GHz frequency. Therefore, the network adapters cannot connect to Ralph's access point.

Which device can determine the length of a cable? Toner Network analyzer Continuity tester TDR

TDR A Toner is used to locate a cable.

A user has installed a new wireless printer on the network. The user cannot get it connected to the Internet, but can print locally. All other office users can reach the Internet, but cannot connect to the new wireless printer. All users are wireless in this part of the office. What MOST likely has occurred? They installed the printer in infrastructure mode They installed the printer in the wrong subnet They misconfigured the gateway on the wireless printer They installed the printer in ad-hoc mode

They installed the printer in ad-hoc mode

Fox and Hound is a brand name for what device? Crimper Switch Multimeter TOner

Toner

Trixie has recently moved to a new office in her company's building, down the hall from her old one. Since the move, she has only been able to access the wireless network with her laptop intermittently. She never had a problem in her previous location. Which of the following could possibly be the cause of her problem? (Choose all correct answers.) Trixie's new office is farther from the access point than her old one. Her laptop is connecting to the wrong SSID. The access point is using an omnidirectional antenna. There are too many walls between Trixie's new office and the access point.

Trixie's new office is farther from the access point than her old one. There are too many walls between Trixie's new office and the access point. An omnidirectional antenna generates signals in every direction, which would not account for Trixie's problem.

Which of the following command-line utilities can only run on Windows systems? ping ipconfig traceroute ifconfig netstat

ipconfig

Which of the following commands displays the routing table on the local computer? arp -r netstat -r ifconfig -r telnet -r

netstat -r

Ralph has been advised to check his Linux web servers for open ports that attackers might be able to use to penetrate the servers' security. Which of the following utilities can Ralph use to do this? tcpdump dig iptables nmap

nmap

Which of the following Unix/Linux tools is a packet analyzer? iptables nmap tcpdump pathping

tcpdump

Which of the following troubleshooting steps involves prioritizing trouble tickets based on the severity of the problem? Identify the problem Establish a theory of probable cause Test the theory to determine cause Establish a plan of action to resolve the problem and identify potential effects Implement the solution or escalate as necessary Verify full system functionality and, if applicable, implement preventive measures Document findings, actions, and outcomes

Identify the problem The first step in troubleshooting is to identify the problem by establishing symptoms related to the network issue being reported. In this step, problems are typically reported as trouble tickets, which are prioritized based on the severity of the problem. You complete the other steps after the trouble ticket has been prioritized and is being investigated.

A technician just completed a new external website and setup access rules in the firewall. After some testing, only users outside the internal network can reach the site. The website responds to a ping from the internal network and resolves the proper public address. What can the technician do to fix this issue while causing internal users to route to the website using an internal IP address? Configure NAT on the firewall Implement a split-horizon DNS Adjust the proper internal ACL Place the server in the DMZ

Implement a split-horizon DNS Split Domain Name System (Split DNS) is an implementation in which separate DNS servers are provided for security and privacy management for internal and external networks. This can provide a security and privacy management mechanism by logical or physical separation of DNS information for network-internal access and access from an insecure, public network like the Internet.

Ralph has a wired home network with three Windows computers, a switch, and a cable modem/router that provides access to the Internet. All three computers are able to access the Internet, but none of them can access file system shares on the others. Which of the following is the most likely cause of the problem on the three network computers? Incorrect IP addresses Incorrect Subnet mask Incorrect default gateway address Incorrect ACL settings

Incorrect ACL settings The problem is most likely incorrect ACL settings. Because the computers are all able to access the Internet, their TCP/IP settings, including their IP addresses, subnet mask, and default gateway address, must be correct. However, if the users do not have the correct permissions in the access control lists (ACLs) of the file system shares, they will not be able to access the shares over the network.

Of the following choices, what is the MOST likely cause that a user is unable to access a network through the wireless access point? Incorrect WEP key Faulty crossover cable A short in the cable pairs TXRX is reversed

Incorrect WEP key Not too many crossover cables are used in Wi-Fi, and I'm not sure how you could reverse transmit and receive on a wireless card. Cable pairs aren't used in wireless networking.

A network technician receives the following alert from a network device: "High utilization threshold exceeded on gi1/0/24: current value 8463257.54" What is being monitored to trigger the alarm? Network device CPU Network device memory Speed and duplex mismatch Interface link status

Interface link status This is an error message that indicates that the threshold of high utilization of network interface, in this case, interface gi1/0/24, has been exceeded. The message has been triggered on the interface link status. (Note: gi1/0 would be a gigabit interface.)

A network administrator is troubleshooting an issue with unstable wireless connections in a residence hall. Users on the first and second floors report that the hall's SSID is not visible in the evenings. The network administrator has verified that the wireless system is operating normally. What is the cause of the issue being reported by the users? Internet router maintenance is scheduled An ARP attack is underway The SSID is set to hidden A jammer is being used

Internet router maintenance is scheduled a jammer being used would show some possible "wrong" traffic in the logs of the wireless. Internet router maintenance would simply take the network down for the duration of the update/maintenance.

Management wants to filter data that enters or leaves a specific port on a switch. Which network management tool can perform this filtering task? Network sniffer Bandwidth analyzer SNMP trap Syslog server

Network sniffer Bandwidth analyzers can tell you about the network's performance, but not about the data on the network.

Ralph has purchased some old 802.11b wireless networking equipment at a garage sale, which he plans to use to build a home network. When he installs the network adapters in his computers and sets up the access point, he finds that the connections between the devices are no faster than 11 Mbps. What can Ralph do to improve the performance of his network? Nothing. The network is functioning at its top speed. Change the channel used by the devices. Move the computers closer to the access point. Install a larger antenna on the access point.

Nothing. The network is functioning at its top speed.

Which of the following cable testing tools are used only on fiber-optic networks? OTDR Multimeter Tone generator Punchdown tool

OTDR

Which of the following troubleshooting tools is not used to test copper cabling installations? Wiremap tester Multimeter Tone generator and locator OTDR

OTDR An optical time domain reflectometer (OTDR) is a device that transmits light pulses over a fiber-optic network

Clients of Ralph's company are calling to complain that when they try to access the company's website, they see an error message stating that the website has an untrusted security certificate. They are afraid that they are connecting to an unprotected site or that the site has been taken over by hackers? What must Ralph due to address this problem? Obtain an SSL certificate from a trusted third-party company. Configure the web servers to generate a self-signed certificate. Install a certification authority on one of the network servers. Explain to the clients that it is safe to bypass the error message and proceed to the website.

Obtain an SSL certificate from a trusted third-party company.

Which protocol maps IP addresses to Layer 2 (Data Link Layer) addresses? ARP TCP Netstat Ping

ARP ARP is the protocol used to resolve an IP address into a MAC address, which functions at Layer 2 (Data Link Layer) of the OSI seven-layer model.

What TCP/IP protocol is used to resolve an IP address to a MAC address? UDP ARP DHCP BootP

ARP BootP is a legacy means of dynamically assigning IP addresses. It is mostly used in diskless workstations.

Ralph is having trouble providing satisfactory wireless network performance to some executive offices at the far end of the building. The offices have heavy doors and insulated walls for sound dampening, and the occupants typically leave their doors closed during work hours. Which of the following types of radio signal interference is Ralph trying to overcome? Reflection Refraction Diffraction Absorption

Absorption

An organization requires a second technician to verify changes before applying them to network devices. When checking the configuration of a network device, a technician determines that a coworker has improperly configured the AS number on the device. Which of the following might be the result of this? The OSPF not-so-stubby area is misconfigured Reduced wireless network coverage Spanning tree ports in flooding mode BGP routing issues

BGP routing issues BGP (Border Gateway Protocol) is used to route data between autonomous systems (AS). A collection of networks that fall within the same administrative domain is called an autonomous system (AS). The routers within an AS use an interior gateway protocol, such as the Routing Information Protocol (RIP) or the Open Shortest Path First (OSPF) protocol, to exchange routing information among themselves.

Ed is implementing a web server farm on his company's network and has installed a router to create a perimeter network on which the web servers will be located. However, Ed now cannot access the web servers from his workstation on the internal network. Which of the following tasks will Ed have to complete before he can access the perimeter network from the internal network? (Choose all correct answers.) Change IP addresses Change default gateway addresses Update the DNS records Change MAC addresses

Change IP addresses Change default gateway addresses Update the DNS records Ed will first have to change IP addresses. This is because the computers on the other side of the router, on the perimeter network, must use an IP network address that is different from the internal network's address. Next, Ed will have to change the default gateway address setting on the internal network computers to the address of the router so that traffic can be directed to the perimeter network. Finally, Ed will have to update the resource records on the DNS server to reflect the IP address changes. MAC addresses are hard-coded into network interface adapters and are not easily changed.

Ralph is concerned that the IP address scope on his DHCP server is nearly exhausted. What happens to DHCP clients when there are no IP addresses left in the scope for assignment? Clients are assigned a 0.0.0.0 address. Clients self-assign APIPA addresses. Client DHCP requests are forwarded to another DHCP server. Clients are forced to share IP addresses.

Clients self-assign APIPA addresses.

A client reports that half of the marketing department is unable to access network resources. The technician determines that the switch has failed and needs replacement. What would be the MOST helpful in regaining connectivity? VLAN configuration Network diagram Configuration backup Router image

Configuration backup If you have a configuration backup of the switch, a new piece of hardware (new switch) can be installed quickly and the configuration can be restored to the new switch.

A network administrator is configuring a VLAN across multiple switches. The administrator wants to configure the VLAN once and have that configuration propagate to all of the network switches. Which of the following should the administrator do? Configure the switches to utilize IGRP Implement port bonding on the switches Configure the switches to utilize STP Configure the switches to utilize VTP

Configure the switches to utilize VTP VLAN Trunking Protocol (VTP) shares VLAN information to all switches in a network. VTP enables you to create the VLAN only on a single switch. That switch can then propagate information about the VLAN to every other switch on the network and cause other switches to create it.

Ed has discovered that, on some of his newly installed twisted pair cable runs, the installer has stripped away nearly a foot of the cable sheath at each end and has untwisted the wire pairs before attaching them to the connectors. Which of the following problems is the network more likely to experience due to the untwisted wires Jitter Attenuation Crosstalk EMI

Crosstalk

A technician has attempted to optimize the network, but some segments are still reporting poor performance. What issue should the technician look at? Switch incorrectly set to full-duplex Conflicting IP addresses Packet bottlenecks IP address scope depletion

Packet bottlenecks A bottleneck occurs when bandwidth cannot accommodate large amounts of system data at designated data transfer rate speed, typically caused by TCP/IP data interruption or other performance issues.

Alice is troubleshooting a problem that some users are having connecting to an application server on the local network. While testing connectivity using the ping tool, she discovers that she can ping the server successfully using its computer name, but pinging the computer's fully qualified domain name (FQDN) fails. Which of the following is most likely the source of the problem? DNS DHCP EMI ACL

DNS

What is the primary purpose of netstat? Graphical utility that charts amount of network data entering and leaving a host Shows your computer's connection(s) to any web server(s) Captures frames and packets for later review Displays all connections to and from a host computer

Displays all connections to and from a host computer

A network technician needs to monitor the network to find a user that is browsing websites that are against the company policy. What should the technician use to view the website and find the user browsing it? SNMP GET Top listener tool Intrusion detection system Packet sniffer

Packet sniffer

Alice's network has been experiencing intermittent service slowdowns and outages ever since the company moved into their new building. She has tried every troubleshooting procedure she can think of and hasn't been able to determine the cause. One particularly irritating user, hoping to be the squeaky wheel that gets the grease, has taken to calling Alice every time he experiences a problem. One day, as she is working in the datacenter, Alice notices that the user calls her every time she hears an additional humming noise begin. After examining the doors in the hallway, Alice realizes that the racks containing her switches are located right next to the elevator machinery room. Which of the following conditions is probably causing the network communication problem? EMI NEXT FEXT Attenuation

EMI

A network technician needs to identify active services that should be disabled on the network. What tool would BEST accomplish this? Interface monitoring tool Content filter Port scanner Packet analyzer

Port scanner Port scanner will scan for what ports are open or closed enabling certain services or not. For example, if port 22 is open, that means Secure Shell service is enabled, or if port 25 is open, then the SMTP service is enabled.

Which choice is not true about protocol analyzers such as WireShark? Protocol analyzers can capture packets. Protocol analyzers can generate packets and frames. Protocol analyzers can filter packets and frames. Protocol analyzers can show the contents of packets and frames.

Protocol analyzers can generate packets and frames.

Ralph is troubleshooting a workstation that cannot access the network. The workstation is plugged into a wall plate that should provide it with access to a DHCP-equipped network using the 192.168.4.0/24 network address. No one else on that network is reporting a problem. Ralph checks that the patch cable is properly plugged into the workstation and the wall plate, which they are, and then runs ipconfig /all on the user's workstation and examines the output. Which of the following could be the explanation for the user's problem, based on these ipconfig results? DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Link-local IPv6 Address . . . . . : fe80::c955:c944:acdd:3fcb%2 IPv4 Address. . . . . . . . . . . : 169.254.203.42 Subnet Mask . . . . . . . . . . . : 255.255.0.0 Default Gateway . . . . . . . . . : DNS Servers . . . . . . . . . . . : fec0:0:0:ffff::1%1 The Subnet Mask is incorrect. The Default Gateway address is missing. The DHCP scope is exhausted. The DNS server addresses are incorrect.

The DHCP scope is exhausted. The 169.254.203.42 address assigned to the workstation is from the 169.254.0.0/16 network address assigned to Automatic Private IP Addressing (APIPA), a standard for the assignment of IP addresses to DHCP clients when they cannot obtain an address from a DHCP server. Since no one else is experiencing a problem, the DHCP server is presumably functioning. The Subnet Mask value is correct for an APIPA address, and APIPA does not provide Default Gateway or DNS server addresses. Therefore, an exhausted DHCP scope is the only one of the explanations provided that could be the cause of the problem.

A system that worked perfectly last night can't see the network, and you see that the link lights aren't functioning. What's the next item to check? The hub The patch panel The link light The patch cable

The patch cable Since you've already checked the link light, the next logical step would be to check the patch cable that runs between the PC and the wall outlet. They are the most common failure point on a network. You should always check the patch cable first, but if that's not it head over to the equipment room to check the patch panel and hub.

Ralph is setting up a network connection for the company's new vice president, who is supplying his own laptop. He plugs the computer into the wall plate, and the link pulse LED lights up. Then, back in the datacenter, he uses a patch cable to connect the corresponding port in the patch panel to a port in the network switch. Later, the VP calls Ralph to report that data transfers between his laptop and the network servers are extremely slow. Which of the following could explain the problem? There is a duplex mismatch between the laptop and the network switch. Ralph used a crossover cable to connect the laptop to the wall plate. The switch port is disabled. The network adapter drivers on the laptop are outdated.

There is a duplex mismatch between the laptop and the network switch. If the problem was a crossover cable or a disabled switch port, the link pulse LED would not light. Outdated drivers would not be likely to slow network performance, and if they did, the slowdown would be minor.

Which of the following protocols does the traceroute utility on Unix and Linux systems use to test TCP/IP connectivity? ICMP HTTP TCP UDP

UDP On Unix and Linux systems, the traceroute utility tests TCP/IP connectivity by transmitting User Datagram Protocol (UDP) messages. This is unlike the tracert utility on Windows systems, which uses Internet Control Message Protocol (ICMP) messages. Neither version uses TCP or HTTP.

Which of the following is not a common wired network problem? UTP cables < 100M Jitter Wrong cable type Attenuation

UTP cables < 100M UTP cables can be shorter than or equal to (<, =) 100 meters. The problem arises when running CAT cables longer than 100 meters.

Which of the following Windows commands enables you to create a new entry in the ARP cache? arp -N arp -d arp -a arp -s

arp -s The arp -s command enables you to create a cache record specifying the MAC address and its associated IP address. The arp -N command enables you to display the ARP cache entries for a specified network interface. The arp -d command is for deleting cache entries. The arp -a command displays the entries in the ARP table stored in its cache.

Which TCP/IP utility should you use to most easily identify a malfunctioning router on your network? ifconfig ping traceroute netstat

traceroute The traceroute (or tracert) utility can locate a malfunctioning router by using an Echo Request messages with incrementing TTL values. ifconfig is a network configuration utility for Unix and Linux systems; ping can test connectivity to another TCP/IP system, but it cannot locate a malfunctioning router; and netstat displays information about network connections and traffic but cannot locate a malfunctioning router.

Which of the following protocols does the ping program never use to carry its messages? Ethernet ICMP IP UDP TCP

TCP

Which of the following statements about cable certifiers are true? (Choose all correct answers.) A cable certifier eliminates the need for tools like tone generators and wiremap testers. Cable certifiers are the most inexpensive cable testing solution. Cable certifiers must be reconfigured whenever a new cable specification is standardized. Cable certifiers can only test copper-based cables.

A cable certifier eliminates the need for tools like tone generators and wiremap testers. Cable certifiers must be reconfigured whenever a new cable specification is standardized.

Users on Ed's 802.11n wireless network are dropping their connections intermittently. Which of the following might help to resolve the problem? Restart the wireless access point Change the network's SSID Change the channel the devices are using Change the wireless security protocol

Change the channel the devices are using

You are troubleshooting your company's T-1 connection to your ISP. The ISP has asked you to place a loopback on the device which connects your T-1 line to their central office. Which of the following devices should you connect the loopback plug on? Digital subscriber line modem Channel service unit Fiber optic modem Channel remote module

Channel service unit The CSU/DSU terminates a T1 line at the customer's site. Therefore, the CSU (Channel Service Unit) should have the loopback plug attached to test the connection.

Ralph has a wired home network with three Windows computers, a switch, and a cable modem/router that provides access to the Internet. One of the computers is able to connect to the other two, but it cannot connect to the Internet. Which of the following configuration parameters on the malfunctioning computer will Ralph most likely have to change to resolve this problem? IP address Subnet mask Default gateway MAC address

Default gateway The problem is most likely the default gateway address, which directs all traffic intended for the Internet to the cable modem/router. If that address is incorrect, the traffic will never reach the router. Because the computer can access the other two systems on the local network, the IP address and subnet mask are not the problem. It is not necessary (and not always possible) to change the MAC address on a Windows workstation.

Which step of the troubleshooting model involves identifying whether hardware or software has been recently installed or reconfigured? Identify symptoms Establish a theory of probable cause Establish a plan of action to resolve the problem and identify potential effects Determine if anything has changed. Test the theory to determine cause Document findings, actions, and outcomes

Determine if anything has changed.

Ed has installed a separate 802.11n wireless network for guest users working in his company's offices. The guest network is unsecured, and Ed has recently become aware that people outside the building are able to access it. It is not possible to move the access point, and it must run at maximum power to reach the entire building. Which of the following is the most convenient way to prevent users outside the building from accessing the guest network while leaving it available to users inside the building? Change the passphrase daily. Switch the network frequency. Disable SSID broadcasting. Implement MAC filtering.

Disable SSID broadcasting. Disabling SSID broadcasts will not defeat dedicated attackers, but it can prevent casual intruders from accessing the network.

Your Windows 7 system suddenly can't reach the Internet. You know that your DHCP server has been intermittently malfunctioning. What command can you type to see if it gave you an IP address, default gateway, and other necessary IP configuration before it crashed? Route print Ipconfig Ifconfig Nslookup

Ipconfig Ifconfig only works on UNIX systems. Nslookup is used to troubleshoot DNS problems. Route print is used to show your PC's routing tables.

Which of the following indicators can you use to determine whether an adapter is connected to a functioning hub or switch? Speed light-emitting diode (LED) Collision LED Link pulse LED Status LED

Link pulse LED The link pulse LED indicates the adapter is connected to a functioning hub or switch. The speed LED specifies the data rate of the link. The collision LED lights up when collisions occur. There is no status LED on a network interface adapter.

Tim is a network administrator who is setting up three additional switches in his test lab. While configuring the switches, he is verifying the connectivity but finds that when he pings one of the switches using its IP address, he receives "Destination Unreachable". What kind of issue is this? Denial of service attack Misconfigured DNS settings Misconfigured Split Horizon RADIUS authentication errors

Misconfigured Split Horizon Split horizon is a method of preventing a routing loop in a network. If it is misconfigured, the switches would be unable to communicate with each other. None of the other answers provided would prevent communication between the switches.

Ed has installed a separate 802.11n wireless network for guest users working in his company's offices. The guest network is unsecured, and Ed has recently become aware that people outside the building are able to access it. Which of the following steps can Ed take to prevent users outside the building from accessing the guest network, while leaving it available to unauthenticated users inside the building? (Choose all correct answers.) Move the wireless access point to the center of the building. Lower the power level of the wireless access point. Disable SSID broadcasting. Implement MAC filtering.

Move the wireless access point to the center of the building. Lower the power level of the wireless access point. Disable SSID broadcasting. MAC filtering would require Ed to configure the access point with the MAC addresses of all devices that will access the network, which would be impractical in this case.

You have a network with 25 users. All the users are complaining about the network moving too slowly, even when only one person is accessing the server. Which of the following tools could you use to troubleshoot the bottleneck? (Choose all correct answers) Loopback device Network analyzer Protocol analyzer TDR Packet sniffer

Network analyzer Protocol analyzer Packet sniffer The loopback would be a good way to test individual systems, but given that the problem is across the network, it is an unlikely choice here.

Troubleshooting networks add which elements to the general troubleshooting model? Network model outsides-to-insides approach Network model top-to-bottom approach Network model bottom-to-top approach Network model divide-and-conquer approach

Network model top-to-bottom approach Network model bottom-to-top approach Network model divide-and-conquer approach

A technician suspects that a virus has infected the network. One of its actions appears to be that it utilizes a large amount of network bandwidth. What is the BEST tool that the technician can use to quickly determine which workstations are infected? SNMP Web server Syslog Network sniffer

Network sniffer A sniffer is used to examine network traffic. These are more commonly known as packet sniffers. Syslog might be useful, but it would almost certainly not be quick. SNMP is used for, among other things, remotely managing SNMP-capable devices on the network.

Ralph is testing a twisted pair cable run using a tone generator and locator. When he applies the tone generator to a particular pin at one end of the cable, he detects a tone on two pins at the other end. Which of the following faults has Ralph discovered? Open Short Split pair Crosstalk

Short

A technician installs a new WAP and users in the area begin to report poor performance. The technician uses a ping and only 3 of the 5 packets respond. When the technician tests the connection from a wired connection, it responds with 5 of 5 packets. What tool should the network technician use next? Port scanner tool Interface monitoring tool Packet capture tool Spectrum Analyzer tool

Spectrum Analyzer tool A spectrum analyzer is a device that displays signal amplitude (strength) as it varies by signal frequency. Since the issue only occurs when connecting wirelessly, it is most like a spectrum interference issue.

Ed is experiencing bad network performance on some new twisted pair cable runs that he recently had installed. After ruling out all other causes, he tests the cables with a tone generator and locator and finds no faults. Finally, he examines the cable connectors more closely and finds that, while the pins at one end of the cable are correctly connected to their corresponding pins at the other end, in some cases there are two solid color wires twisted together in a pair. Which of the following types of faults has Ed discovered? Open circuit Short circuit Split pairs Transposed wires

Split pairs Having transposed pairs is a fault in which both of the wires in a pair are connected to the wrong pins at one end of the cable. All three of these faults are detectable with a tone generator and locator

What is the name for a device that determines the length of a cable by transmitting a signal at one end and measuring how long it takes for a reflection of the signal to return from the other end? Fox and hound tester Wiremap tester Time domain reflectometer Voltage event recorder Butt set

Time domain reflectometer The technique that provides this capability is called time domain reflectometry (TDR). The tester transmits a signal over the cable and measures how long it takes for a reflection of the signal to return from the other end. OTDR does the same with light. Optical cable reflection.

Ralph is working on a new twisted pair network cable installation on which the individual cable runs were not been properly labeled as they were pulled. Ralph now has to trace each of the cable ends in the office area to the correct cable end in the data center and label them correctly. Which of the following tools should Ralph use to locate the correct cable in a bundle of unlabeled cable ends? Cable certifier Tone generator and locator OTDR Multimeter

Tone generator and locator

Every day at the office, we play Counter-Strike Source over the Internet (only during lunch hour, of course). Today, however, there is a lot of lag in the action--our mutual connection is bogged down somewhere. What could I use in Windows to find out where the bottleneck is occurring? Tracert Traceroute

Tracert

Which Window's tool uses ICMP messages and manipulates IPv4 time-to-live values to illustrate the route packets take through an internetwork? Ping Netstat Route Tracert Nslookup

Tracert

Scott complains about slow access to the server and asks you to fix it. Which of the following utilities can you use to find the bottleneck on the network? Telnet Tracert Nbtstat Ping

Tracert Nbtstat displays the current active socket connections.

Alice is a new hire at Adatum Corp., and when she asks about wireless network access for her laptop, she is given an SSID and a WPA2 passphrase. Later, in the lunchroom when she tries to connect her laptop to the network, she cannot see the SSID she was given in the available networks list, although she can see other networks. What should Alice do next to try to resolve the problem? Type in the WPA2 passphrase. Type the SSID in manually. Move closer to the wireless access point. Move away from the microwave in the lunchroom.

Type the SSID in manually. It is possible that the wireless access point has been configured not to broadcast the network's SSID as a security measure, so Alice should first attempt to access it by typing the SSID in manually.

Which of the following cable types is most vulnerable to EMI? UTP Coaxial Fiber Optic STP

UTP Shielded Twisted Pair (STP) and Coaxial cable both have shielding that helps reduce the possibility of EMI.

A technician has installed an 802.11n network and most users are able to see speeds of up to 300Mbps. There are few users who have an 802.11n network card but are unable to get speeds higher than 108Mbps. What should the technician do to fix the issue? Upgrade the OS version to 64-bit Roll back the firmware on WLAN card Install a vulnerability patch Upgrade the WLAN card driver

Upgrade the WLAN card driver Wireless N networks can support up to 600Mbps with the proper software drivers for the network cards. Without them, they can only achieve 108Mbps since they cannot communicate with the increased data compression rates.

A switch technician is tasked to centrally manage the switches and segment the switches by broadcast domains. The corporate network is currently using VLAN 1 for all of its devices and uses a single private IP address range with a 24-bit mask. The supervisor wants VLAN 100 to be the management subnet and all switches to share the VLAN information. What option would be best to use? Use VLSM on the IP address range, with STP and 802.1q on the inter-switch connections with native VLAN 100 Use VLSM on the IP address range with VTP and 802.1x on all inter-switch connections with native VLAN 100 Use VLSM on VLAN1, with VTP and 802.1w on the inter-switch connections with native VLAN 100 Use VLSM on the IP address range with VTP and 802.1q on the inter-switch connections with native VLAN 100

Use VLSM on the IP address range with VTP and 802.1q on the inter-switch connections with native VLAN 100 802.1q is the networking standard that supports VLANs and VLAN tagging. VTP is the VLAN Trunk Protocol and carries all VLAN information to all switches in a VTP domain.

Users are reporting extreme slowness across the network every Friday. What should the network technician review first to narrow down the root cause of the problem? Baseline Bottleneck Utilization Link status

Utilization Reviewing the network utilization can help the technician identify why the slowness is being experienced every Friday, such as placing additional load on the network by streaming videos or something similar.

Which of the following network applications are most likely to be obviously affected by the wired network connectivity problem known as jitter? (Choose all correct answers.) Email VoIP Streaming video Instant messaging

VoIP Streaming video Jitter is a connectivity problem on wired networks that is caused by individual packets that are delayed due to network congestion, different routing, or queuing problems. When individual packets in a data stream are delayed, the resulting connectivity problem is called jitter. While this condition might not cause problems for asynchronous applications, such as email and instant messaging, real-time communications, such as Voice over IP (VoIP) or streaming video, can suffer intermittent interruptions, from which the phenomenon gets its name.

A network technician has configured a point-to-point interface on a router. Once the fiber optic cables have been run, though, the interface will not come up. The technician has cleaned the fiber connectors and used an optical power meter to confirm that light passes in both directions without excessive loss. What is the MOST likely cause of this issue? Wavelength mismatch Distance limitation Cross-talk EMI

Wavelength mismatch

On Monday morning, Alice arrives at work to find multiple email and telephone messages from users who are unable to access the Accounting department's file server. Which of the following are the best questions to ask during the beginning stage of the troubleshooting process? (Choose two.) What has changed since the users were last able to access the server? Are there any software updates that Alice should apply to the server? Has the server suffered a hard disk failure? Which users are reporting a problem and where are they located?

What has changed since the users were last able to access the server? Which users are reporting a problem and where are they located?

Ralph is the administrator of his company's network. He has a Dynamic Host Configuration Protocol (DHCP) server configured to supply Internet Protocol (IP) addresses and configuration information to all of the Windows computers on the network. One of the Windows users reports that she cannot connect to the network. Which of the following commands can Ralph run on her computer to verify the status of the computer's IP settings and configuration parameters? ifconfig ipconfig msinfo32 tracert

ipconfig

Ralph is setting up a wireless network using the 2.4 GHz band. Which of the following channels should he use to avoid channel overlap? (Choose all correct answers.) 1 4 6 8 11

1, 6, 11

Based on the output shown here, what is the average response time of the destination system? 1 <1 ms <1 ms <1 ms RT-N86U [192.168.2.99] 2 3 ms 5 ms 4 ms 192.168.3.1 3 25 ms 30 ms 17 ms 10.172.1.1 4 106 ms 108 ms 99 ms p3nlh153.shr.prod.phx3.srvr.net [97.74.144.153] 109.5 104.33 106 99.66

104.33 The destination system is the last one listed in the trace. By averaging the response times of 99, 106, and 108 ms, you can calculate the average response time: 104.33 ms.

A network technician must replace a network interface card on a server. The server currently uses a multimode fiber to uplink a fiber switch. Which of the following types of NICs should the technician install on the server? 1000Base-LR 1000Base-FX 1000Base-T 10GBase-SR

10GBase-SR 10GBase-SR is a 10 Gigabit Ethernet LAN standard for operation over multi-mode fiber optic cable and short-wavelength signaling. Remember, for the exam, "S is not single," meaning the ones that have a Base-S as part of its name designates it as a multimode fiber cable.

Alice has recently created a new perimeter network for the company's web server cluster, along with a router to connect it to the internal network. When she is finished, she sends Ralph an email instructing him to run the following command on his Windows workstation so that he can access the servers on the perimeter network. What function does the IP address 192.168.87.226 perform in this command? route add 192.168.46.0 MASK 255.255.255.0 192.168.87.226 192.168.87.226 is the address of Ralph's workstation. 192.168.87.226 is the network address of the perimeter network. 192.168.87.226 is the address of one of the router's interfaces. 192.168.87.226 is the address of web server cluster.

192.168.87.226 is the address of one of the router's interfaces. The correct syntax for the Windows route add command is to specify the destination network address, followed by the subnet mask for the destination network, followed by the address of the router interface on the local network that provides access to the destination network.

Alice is trying to provide users in a warehouse with wireless network connectivity for their tablets. The warehouse is a huge concrete structure with many internal cinderblock walls. Which of the following types of signal interference are inhibiting Alice's efforts? Refraction Reflection Diffraction Absorption

Absorption Absorption is a type of interference that occurs when radio signals have to pass through barriers made of dense materials, such as concrete or cinderblock walls. The density of the material's molecular structure causes the radio signals to be partially converted to heat, which weakens them. Reflection is when signals bounce off of certain surfaces, such as metal. Refraction is when signals bend as they pass through certain barriers, such as glass or water. Diffraction is when signals have to pass around barriers to reach a particular destination. All of these phenomena can weaken the radio signals used in wireless networking, but absorption is the primary problem for Alice in this case.

A user calls Ed at the help desk to report that his computer is displaying a Duplicate IP Address error message. This puzzles Ed because all of the network workstations should be configured to obtain their IP addresses from DHCP servers. Ed asks the user if he has changed the TCP/IP configuration settings on the computer recently. The user says no. Ed then asks of anybody else uses the workstation. The user says no. However, when Ed runs the ipconfig /all command on the user's workstation, he sees that the DHCP Enabled setting reads No. What should Ed do next? Accuse the user of changing the TCP/IP settings and then lying about it. Activate the DHCP client on the workstation and close the trouble ticket. Begin an investigation into the possibility of a rogue DHCP server on the network. Change the IP address on the workstation to one that is not already in use.

Activate the DHCP client on the workstation and close the trouble ticket. Because Ed knows that the network workstations should be using DHCP to obtain their IP addresses, the best thing to do is to enable the DHCP client and close the ticket rather than configure the system with another static address. There is no indication that there is a rogue DHCP server on the network, since the workstation's DHCP client is disabled. This is not the first time that Ed has had a user lie to him, nor will it be the last. He should just let it go and work on addressing the problem.

Which of the following terms describes the progressive weakening of transmitted signals as they travel along a network medium? Absorption Latency Attenuation Crosstalk

Attenuation

In the standard troubleshooting methodology, which of the following steps appears last but must actually be practiced throughout the troubleshooting process? Test the theory to determine cause Document findings, actions, and outcomes Verify full system functionality and, if applicable, implement preventive measures Implement the solution or escalate as necessary Establish a plan of action to resolve the problem and identify potential effects Establish a theory of probable cause Identify the problem

Document findings, actions, and outcomes

A network technician is troubleshooting connectivity problems between switches but suspects the ports are not properly labeled. What option will help to quickly identify the switches connected to each port? Configure TACACs+ on each network device Enable a discovery protocol on the network devices. Configure each uplink to send LACP discovery units. Enable a packet sniffer on each network device's uplink port.

Enable a discovery protocol on the network devices. By enabling a discovery protocol on the network devices, the technician will be able to get detailed information such as the IP addresses, system version, and the type of device information from supporting devices directly connected to the discovery protocol, therefore providing information about the specific routers.

A technician is attempting to resolve an issue with users on the network not accessing websites. The technician pings the default gateway and DNS servers successfully. Pinging a website by URL is unsuccessful but using a known IP address is successful. What would resolve the issue? Update the HOST file with the URLs for all websites Use NSLOOKUP to resolve URLs Ensure ICMP messages can pass through the firewall Enable port 53 on the firewall

Enable port 53 on the firewall Port 53 is used by DNS. The DNS Server is used to translate FQDN to IP addresses.

An administrator's router with multiple interfaces uses OSPF. When looking at the router's status, it is discovered that one interface is not passing traffic. Given the information below, what would resolve this issue? Output: Fast Ethernet 0 is up, line protocol is down Int ip address is 10.20.130.5/25 MTU 1500 bytes, BW 10000 kbit, DLY 100 usec Reliability 255/255, Tx load 1/255, Rx load 1/255 Encapsulation ospf, loopback not set Keep alive 10 Full duplex, 100Mb/s, 100 Base Tx/Fx Received 1052993 broadcasts 0 input errors 0 packets output, 0 bytes 0 output errors, 0 collisions, 0 resets Enable the connecting port Set the loopback address Set OSPF to area 0 Put the IP address in the right broadcast domain Replace the line card

Enable the connecting port Since the line protocol is down, you will need to enable the connecting port to restore the connection.

When you troubleshoot a network problem, it is possible to introduce another problem while attempting to fix the original one. In which step of the troubleshooting process should you be aware of the residual effects that changes might have on the network? Identify the problem Establish a theory of probable cause Test the theory to determine cause Establish a plan of action to resolve the problem Implement the solution or escalate as necessary Verify full system functionality Document findings, actions, and outcomes

Establish a plan of action to resolve the problem

I can't see your machine (Woobie) on the network, but you insist that your machine is up. Which of the following commands might I try to test my connection with your machine? Ping Woobie Nbstat Woobie Netstat Woobie SMTP Woobie

Ping Woobie Netstat displays the current socket connects on the local machine. Nbstat displays the contents of the NetBIOS names cache on the local machine. The SMTP protocol handles outgoing e-mail.

Which symptom is not a result of an IP addressing problem? Duplicate IP address Duplicate MAC addresses Incorrect gateway Static IP address

Static IP address There is nothing wrong with assigning static IP addresses so long as the rules of assigning addresses are followed.

While working in her company's datacenter, Alice notices that the LEDs on most of the network switch ports are green, but there are several that are orange. Alice asks several people why this is so and receives several different answers. Which one of the following answers is correct? The orange LEDs indicate that no device is connected to the switch port. The orange LEDs indicate that the connected device is experiencing an excessive number of collisions. The orange LEDs indicate that the device is connected to the switch at a relatively slow speed. The orange LEDs indicate that the connected devices are other switches, rather than workstations.

The orange LEDs indicate that the device is connected to the switch at a relatively slow speed. Green LEDs indicate the device is running at the full speed supported by the switch, whereas orange LEDs indicate that the device is running at a reduced speed. If no device is connected, the LED does not illuminate at all. The LED does not indicate the occurrence of collisions or the type of device connected to the port.

Alice is the administrator of a wireless network that has client computers in a number of small offices, all located on the same floor of an office building built in the mid-twentieth century. The network has an IEEE 802.11g access point located at the approximate center of the floor. Workstations in most of the rooms connect to the network at 54 Mbps, but the computers in one particular room rarely connect at speeds above 11 Mbps. Which of the following might be the cause of the problem? The computers in the problematic room are configured to use a different wireless encryption protocol than the access point. The computers in the problematic room are experiencing an SSID mismatch. The network adapters in the problematic computers support IEEE 802.11a, not 802.11g. The room containing the problematic computers might be at the limit of the access point's range.

The room containing the problematic computers might be at the limit of the access point's range.

Alice is supporting a network that consists of four internal local area networks (LANs) with 50 users each. Each internal LAN uses twisted pair Gigabit Ethernet links that connect the users to a switch. Each of the four switches connects to a backbone router. All of the routers connect to the same backbone network, which has a single additional router to connect the company's network to the Internet, using a T-1 link. Users on one of the internal LANs are complaining that, when they came in this morning, they could not access the Internet or the other internal LANs, although they could access local resources with no problems. Which network component is the likeliest source of the problem in this scenario? The router connecting the problem LAN to the backbone The Internet router The switch on the problem LAN The cable on the backbone network

The router connecting the problem LAN to the backbone

Alice is a new hire at Adatum Corp., and when she asks about wireless network access for her laptop, she is given an SSID and a passphrase. She is also told that she must add the SSID manually. Later, she types in the SSID she was given, and the computer prompts her to select a security type. Not knowing which option to choose, she selects 802.1x, because it sounds as though it should be the most secure. However, this option does not enable her to enter her passphrase, so she selects another option, WEP, and is able to type in the passphrase. However, her laptop says she "Can't connect to this network." Which of the following is the most likely cause of Alice's problem? Overcapacity Distance limitations Frequency mismatch Security type mismatch

Security type mismatch

A technician has been troubleshooting a network problem, has determined the most likely cause of the issue, and implemented a solution. What is the NEXT step to be taken? Document the findings, actions, and outcomes Duplicate the problem if possible Verify system functionality Make an archival backup

Verify system functionality There are 7 steps to the troubleshooting methodology used in Network+. (1) Identify the problem. (2) Establish a theory of probable cause. (3) Test the theory to determine the cause. (4) Establish a plan of action to resolve the problem and identify potential effects. (5) Implement the solution or escalate as necessary. (6) Verify full system functionality and if applicable implement preventative measures. (7) Document findings, actions, and outcomes.

Alice is working on an older network with a Windows Internet Name Service (WINS) server, a Domain Name System (DNS) server, and an Internet router. A user is complaining that he suddenly can't connect to hosts on other internal networks. The user isn't having problems connecting to resources on his local network or the Internet. Alice asks the user whether anything is new or has been changed on the computer and discovers that he recently changed some Internet Protocol (IP) parameters. What should Alice do next? Verify that the router is up and running and properly configured. Verify that the WINS server is up and running and properly configured. Verify that the DNS server is up and running and properly configured. Verify that the user's IP configuration settings are correct.

Verify that the user's IP configuration settings are correct. Since only one user is reporting the problem, the user's computer is the likeliest source of the problem. The user has probably changed or removed the WINS server address. If the user is working with an incorrect WINS address, he can access local network resources but not resources on another internal LAN. Also, he can access resources on the Internet, which means the Internet router and the DNS server are not the problem.

You have just upgraded a small office LAN switch. When you finish, a user states they can no longer access the network. You check the user's workstation, but do not see any LED lights lit on their NIC. What should you check next? Verify the switch is connected to the router Verify the device is using the correct cable type Verify the NIC is operating properly Verify the network cable is attached to the new switch

Verify the network cable is attached to the new switch

A wireless networking technician has completed a wireless network survey and documented the detected signal strengths in various locations. What is this document called? Heat map Network baseline Bandwidth survey Logical network map

Heat map A heat map will show the signal strengths of wireless network signals in various locations. Technicians will document this information and use it as a tool during troubleshooting and optimization efforts.

Ralph is responsible for the network installation in a new building purchased by his company, and he has elected to have Category 6 unshielded twisted pair cable installed. The company president has asked him if it is possible to run their Gigabit Ethernet network using two of the wire pairs in the cable, while using the other two pairs for telephone connections. Ralph is not sure, so he sets up a lab network using cables with only two pairs connected. When he plugs computers into the switch and turns them on, the LEDs labeled 1000 light up, indicating that a Gigabit Ethernet connection has been established. Ralph gets excited at the thought of how much money he might save the company by using the same cable for both telephone and data. However, while the LED is lit, he can't seem to connect to another system over his test network. Which of the following describes what he must do to correct the problem? Ralph must manually configure the network adapters to use Gigabit Ethernet, rather than let them autonegotiate. Ralph is using the wrong two wire pairs for the Gigabit Ethernet connection. He must rewire the connectors. Ralph is using the wrong pinout standard on his lab network. He must use T568A. Ralph must use all four wire pairs for a Gigabit Ethernet connection.

Ralph must use all four wire pairs for a Gigabit Ethernet connection. a functional Gigabit Ethernet data connection requires all four wire pairs.

Ralph is deploying an 802.11n wireless network for a client that calls for the best possible security without deploying additional servers. When setting up the wireless access point, Ralph disables SSID broadcasts, selects Wi-Fi Protected Access security with preshared keys (WPA-PSK), and configures MAC address filtering. Which of the following statements about the security of this arrangement is true? The configuration is as secure as Ralph can make it with the specified equipment. Ralph should not disable SSID broadcasts, since this prevents users from connecting to the network. Ralph should not use MAC address filtering, because it exposes MAC addresses to possible attacks. Ralph should use Wi-Fi Protected Access II (WPA2) instead of WPA, because it is more resistant to certain types of attacks.

Ralph should use Wi-Fi Protected Access II (WPA2) instead of WPA, because it is more resistant to certain types of attacks.

A desktop computer is connected to the network and receives an APIPA address but cannot reach the VLAN gateway of 10.10.100.254. Other PCs in the VLAN subnet can reach the Internet. What is the MOST likely source of the problem? 802.1q is configured on the switch port APIPA has been misconfigured on the VLAN Bad SFP in the PC's 10/100 NIC OS updates have not been installed

802.1q is configured on the switch port APIPA addresses are self-configured and used when the client cannot get proper IP configuration from a DHCP server. One possible source of this problem is a misconfigured switch port that the computer is connected to. The 802.1q protocol is used to configure VLAN trunking and be configured on the trunk port, not the switch port.

Which of the following statements describes the difference between a packet sniffer and a protocol analyzer? A packet sniffer captures network traffic, and a protocol analyzer examines packet contents. A protocol analyzer captures network traffic, and a packet sniffer examines packet contents. A packet sniffer only captures the local workstation's traffic, whereas a protocol analyzer can capture all the traffic on the network. There is no difference. Packet sniffers and protocol analyzers perform the same functions.

A packet sniffer captures network traffic, and a protocol analyzer examines packet contents.

Which choice is true of a rogue DHCP server? A rogue DHCP server increases the speed of the DHCP service. A rogue DHCP server increases the pool of available IP addresses. A rogue DHCP server ensures that hosts will get compatible APIPA addresses. A rogue DHCP server can assign incompatible IP addresses to hosts.

A rogue DHCP server can assign incompatible IP addresses to hosts. The existence of a DHCP server, rogue or approved, ensures that hosts will not generate APIPA addresses.

A user calls the company's IT help desk to report that she has received an error message on her Windows workstation. The error states that her computer has an IP address that is duplicated on the network. Ralph is concerned that there might be a configuration problem with the DHCP servers on the network. He suspects that there are DHCP servers configured with scopes that overlap, resulting in two DHCP servers assigning the same IP addresses to different clients. He is worried that they are about to receive a flood of calls reporting the same problem. Alice reassures Ralph, telling him that it cannot be a DHCP problem and that there must be two computers that are manually configured with the same IP address. How does Alice know this? Because Windows computers check the routing table before accepting an IP address from a DHCP server Because DHCP servers use DNS queries to check for duplicate IP addresses Because DHCP clients use ARP broadcasts to check for duplicate IP addresses Because it is only possible to have one DHCP server on a given subnet

Because DHCP clients use ARP broadcasts to check for duplicate IP addresses When a Dynamic Host Configuration Protocol (DHCP) client is offered an IP address by a DHCP server, the client broadcasts Address Resolution Protocol (ARP) requests using that address before accepting it. If another computer on the local network is using the offered address, the computer responds to the ARP request and the DHCP client declines the address. The DHCP server then offers another address. It is possible to have two DHCP servers on the same local network, but they must be configured with scopes that do not overlap.

You are working with a certified cable installer to troubleshoot the DSL line coming into your office. He thinks that the DSL signal is coming in on the wrong POTS line. Which tool would he use to troubleshoot this issue? Toner probe Multimeter TDR Butt set

Butt set The butt set is used by technicians to install and test telephone lines.

A user was moved from one cubicle in the office to a new one a few desks over. Now, they are reporting that their VoIP phone is randomly rebooting. When the network technician takes the VoIP phone and reconnects it in the old cubicle, it works without any issues. What is the cause of the problem? Attenuation Bad UPS Cable short Misconfigured DNS

Cable short Since the VoIP phone works in one cubicle but not another very close one, it is likely the new cubicle has a short in the cable running to the network jack or from the jack to the VoIP phone. The network technician should test the new cubicle's network jack to ensure there isn't an issue with the wiring.

Ralph is adding new workstations to his wireless network, which uses an access point that is configured to use WPA2 encryption. However, after installing the wireless network adapter on the first workstation, Ralph finds that he cannot see the wireless access point on the Available Networks display. Which of the following could be the problem? (Choose all correct answers.) Incorrect passphrase Channel overlap Incorrect SSID Incorrect antenna placement

Channel overlap Incorrect antenna placement Both interference resulting from channel overlap and incorrect antenna placement could render the workstation unable to make contact with the access point. An incorrect passphrase would not be the problem unless Ralph had already seen the access point and attempted to connect to it. An incorrect SSID would be the problem only if Ralph had already attempted to manually enter an SSID.

A network administrator recently set up a network computer lab and discovered some connectivity issues. The administrator can ping the fiber uplink interface, but none of the new PCs plugged into the switch respond to ICMP requests. What should the technician do next? Check if there are link lights on the ports Check the ports on the switch for full-duplex Check to see if port security is enabled Check to see if the uplink interface is configured correctly

Check if there are link lights on the ports By checking the link lights on the ports, the administrator can verify if there is any activity on the network, if the ports are enabled, and if the Layer 1 components are working correctly.

The service desk has received many calls this morning complaining about how slow the network is responding when trying to connect to the internet. You are currently at one of the user's workstations and conducted a ping to Google.com, but the results showed that the response time was too slow, and there was too much latency in the route between the workstation and Google.com. You then attempted to ping some of the network printers and other local servers on the network. The results showed acceptable response times. What should you try to do NEXT? Reboot the email server Scan the user's workstation for malware Replace the cable between the user's workstation and the wall jack Check the change control system to determine if any networking equipment was recently replaced

Check the change control system to determine if any networking equipment was recently replaced

Alice receives a call from a user who cannot connect to the company's 802.11n wireless network with a laptop that has an 802.11g network adapter. Other users working in the same area are able to connect to the network without difficulty. Which of the following steps should Alice take first to try to resolve the problem? (Choose all correct answers.) Change the channel used by the wireless access point. Check whether the user is connecting to the correct SSID. Check whether the wireless adapter in the user's laptop is enabled. Provide the user with an 802.11n wireless network adapter.

Check whether the user is connecting to the correct SSID. Check whether the wireless adapter in the user's laptop is enabled. The 802.11n wireless networking standard is backward compatible with 802.11g, so it should not be necessary to provide the user with a new network adapter.

You have just moved into a new condo in a large building. Your wireless network is acting strangely, so you are worried that it may be due to interference from the numerous other wireless networks in the building since each apartment has its own wireless access point. You want to determine what wireless signals are within the walls of your apartment and their relative strength. What technique should you utilize to determine whether the nearby wireless networks are causing interference with your own Wi-Fi network? Conduct a vulnerability scan Perform wardriving around your neighborhood Perform a bandwidth test Conduct a site survey within your apartment

Conduct a site survey within your apartment If you suspect interference within your apartment or other personal spaces, you should conduct a site survey to identify what wireless signals are emanating into your apartment and how strong their signals are. This will allow you to choose the least used frequency/channel to increase your own signal strength and reduce the wireless network's interference.

Alice is attempting to troubleshoot a communication problem between two hosts on the same network. She decides to use a protocol analyzer to capture traffic on the network. After finishing the capture, Alice notices that there are over 15,000 frames in the protocol analyzer's capture buffer. She is having a difficult time identifying the frames that relate to the problem because there are so many in the buffer. She wants to eliminate the extraneous frames from her view, enabling her to view only the frames transmitted by these two hosts. What does Alice have to do to accomplish this? Configure a display filter. Configure a capture filter. Delete the extraneous frames from the buffer. Configure a capture and display filter.

Configure a display filter.

Ralph is experiencing poor performance on his home 802.11n wireless network. Ralph lives in a large apartment complex, and when he runs a Wi-Fi analyzer, he sees many other nearby networks using the often-recommended channels 1, 6, and 11 on the 2.4 GHz frequency. Using the 5 GHz frequency is not an option for Ralph's equipment. What should Ralph do to improve his network performance? Configure his equipment to use channel 2 Configure his equipment to use channel 5 Configure his equipment to use channel 9 Configure his equipment to use channel 10

Configure his equipment to use channel 9 The 2.4 GHz band used by wireless LANs (WLANs) consists of channels that are 20 (or 22) MHz wide. However, the channels are only 5 MHz apart, so there is channel overlap that can result in interference. Channels 1, 6, and 11 are the only channels that are far enough apart from each other to avoid any overlap with the adjacent channels. This is why they are often recommended. However, in Ralph's case, these channels are too crowded with other networks. Ralph should therefore use a channel that is as far as possible from the crowded ones. Channels 2, 5, and 10 are all immediately adjacent to a crowded channel, but channel 9 is at least two channels away from the nearest crowded channel. Therefore, Ralph should configure his equipment to use channel 9.

Ralph recently bought an old 10Base-T Ethernet hub at a garage sale and wants to use it to connect his various computers into a home network. He plugs three computers into the hub and finds that although two of his older computers can communicate with each other, his newest computer cannot connect to the network. Which of the following tasks will most likely resolve the problem? Configure the hub to run at 10 Mbps. Configure the hub to run at 100 Mbps. Configure the computer's network adapter to run at 10 Mbps. Configure the computer's network adapter to run at 100 Mbps.

Configure the computer's network adapter to run at 10 Mbps.

Ralph is working with an ADSL router that has a switch module containing four Ethernet ports, all of which are assigned to the default VLAN1. Ralph can plug a laptop into one of the router's ports and access the Internet with no problems. Ralph now needs to connect the ADSL router to the company network so that the wireless access points on the network can provide users with Internet access through the ADSL router. However, when Ralph plugs the router into a network switch port in VLAN4, the switch starts generating "Native VLAN mismatch detected" errors every minute. Which of the following steps should be part of the solution Ralph implements to stop the error messages? (Choose all correct answers.) Create a VLAN1 on the network switch. Create a VLAN4 on the ADSL router's switch module. Configure the network switch port connected to the router to use VLAN1. Configure the router port connected to the network switch to use VLAN4.

Create a VLAN4 on the ADSL router's switch module. Configure the router port connected to the network switch to use VLAN4.

It is Ralph's first day working for a consultancy that does network cable installations. His new boss hands him a spool of Category 6 cable, a large plier-like device, and a bag of little clear plastic components and tells him to "get started on fives and tens." What is Ralph expected to do? Pull cable runs Create patch cables Attach keystone connectors Install a patch panel

Create patch cables The plier-like device is a crimper, which cable installers use to attach RJ45 connectors, like those in the bag, to lengths of bulk cable. This is the process of creating patch cables, which are used to connect computers to wall plates and patch panels to switches. The boss is telling Ralph to start making patch cables in five and ten foot lengths. You do not use a crimper to attach keystone connectors, and the boss has not given Ralph the tools and components needed to pull cable runs or install a patch panel.

A technician is troubleshooting a PC that is having intermittent connectivity issues. The technician notices that the STP cable pairs are not completely twisted near the connector. Which of the following issues may be experienced due to this? Cross-talk 568A/568B mismatch Tx/Rx reverse Split pairs

Cross-talk Cross-talk can occur if the twisted pairs are not twisted sufficiently. The cable should be trimmed down and terminated again to prevent this issue.

A technician receives a report that a user's workstation is experiencing no network connectivity. The technician investigates and notices the patch cable running from the back of the user's VoIP phone is routed directly under the rolling chair and has been repeatedly smashed. What is the likely cause of the problem? Cross-talk Cable was not properly crimped Excessive collisions Split pairs

Cross-talk' Cross-talk and EMI occur when signals experience interference. Since the cable has been repeatedly run over, its shielding could be damaged since the cable is no longer made up of the same consistency, and cross-talk could occur between the pairs.

A customer's email service is not sending emails anymore. What is the correct order that you should follow to perform the troubleshooting steps? Implement the solution; Verify full system functionality; Establish a theory of probable cause; Determine if any recent changes have been made to the server; Document findings, actions, and outcomes; Establish a plan of action to resolve the problem; Test the theory to determine the cause; Implement preventative measures Determine if any recent changes have been made to the server; Establish a theory of probable cause; Test the theory to determine the cause; Establish a plan of action to resolve the problem; Implement the solution; Verify full system functionality; Implement preventative measures; Document findings, actions, and outcomes Determine if any recent changes have been made to the server; Document findings, actions, and outcomes; Establish a plan of action to resolve the problem; Test the theory to determine the cause; Implement preventative measures; Implement the solution; Verify full system functionality; Establish a theory of probable cause

Determine if any recent changes have been made to the server; Establish a theory of probable cause; Test the theory to determine the cause; Establish a plan of action to resolve the problem; Implement the solution; Verify full system functionality; Implement preventative measures; Document findings, actions, and outcomes

A user calls Alice at the IT help desk and reports that she is having intermittent problems accessing both local servers and Internet websites. Which of the following potential problems can Alice rule out immediately? Duplicate MAC addresses Duplicate IP addresses Malfunctioning router Malfunctioning DNS server

Duplicate IP addresses Operating systems detect duplicate IP addresses immediately and display error messages or notifications on the computers involved. Therefore, the user with the problem would have been informed immediately if another system was using her IP address. All of the other options are possible causes of the problem that are more difficult to troubleshoot.

A user, Ed, is reporting what appear to be intermittent traffic interruptions on his workstation. Sometimes he receives responses to his server requests, and sometimes not. It doesn't seem to be an Internet issue, because the problem also occurs with local server requests. While troubleshooting the problem, Ralph performs a series of packet captures and analyzes the network traffic. He discovers that all of the request messages generated by Ed's workstation have responses on the network, but in some cases, the responses are going to a workstation other than Ed's. Which of the following conditions could be causing this to happen? Duplicate IP addresses Blocked TCP/UDP ports Duplicate MAC addresses Incorrect host firewall settings

Duplicate MAC addresses If someone on the network is spoofing the MAC address of Ed's workstation, the MAC address table in the switch handing the network traffic might be continually changing as packets from each computer reach the switch. This could cause some of the response packets to be forwarded to Ed's workstation and some to the spoofer's workstation. Duplicate IP addresses would not cause this problem because they would be detected by the operating system. Blocked ports and incorrect firewall settings could prevent Ed from receiving responses, but they would not be sent to another workstation.

A wireless technician wants to configure a wireless network to identify itself to visitors by including the word "Guest" in the name. This wireless network needs to provide coverage to the entire building and requires 3 wireless access points to accomplish this coverage level. What would allow users to identify the wireless network by its displayed name as a single network? ESSID broadcast ARP broadcast BSSID broadcast DHCP broadcast

ESSID broadcast With an ESSID (Extended Service Set), a wireless network can utilize multiple wireless access points (WAPs) to broadcast a single network name for access by the clients. A BSSID (Basic Service Set) can only utilize a single WAP in each wireless network.

A company suffers an outage due to a bad module in a core switch. What is the NEXT step to conduct troubleshooting? Gather information, start at the top of the OSI model, and work down Establish a plan of action to solve the problem Establish a theory, identify the problem, duplicate the problem, test the theory, and repeat Gather information, start at the bottom of the OSI model, and work up

Establish a plan of action to solve the problem The troubleshooting steps are to (1) Identify the problem, (2) Establish a theory of probable cause, (3) Test the theory to determine the cause, (4) Establish a plan of action to resolve the problem and identify potential effects, (5) Implement the solution or escalate as necessary, and (6) Verify full system functionality and if applicable implement preventative measures. Since the cause of the problem is already known (a bad module), we can skip directly to establishing a plan of action to solve the problem.

In which troubleshooting step do you try to duplicate a network problem to "divide and conquer" by logically and methodically eliminate elements that aren't the source of the problem? Identify the problem Establish a theory of probable cause Test the theory to determine cause Establish a plan of action to resolve the problem and identify potential effects Implement the solution or escalate as necessary Verify full system functionality and, if applicable, implement preventative measures

Establish a theory of probable cause

A network technician discovers an issue with the spanning tree on the core switch. Which step should the network technician perform NEXT when troubleshooting to resolve the issue? Test a theory to determine the cause Escalate to a senior technician Identify the symptoms Establish a theory of probable cause

Establish a theory of probable cause The troubleshooting steps are to (1) Identify the problem, (2) Establish a theory of probable cause, (3) Test the theory to determine the cause, (4) Establish a plan of action to resolve the problem and identify potential effects, (5) Implement the solution or escalate as necessary, and (6) Verify full system functionality and if applicable implement preventative measures. Since the cause of the problem is already known (a bad module), we can skip directly to establishing a plan of action to solve the problem.

Which of the following is not a network service problem? Duplicate IP address in DHCP scope Overlong DHCP lease periods Exclusions in the DHCP scope Not enough IP addresses in the DHCP scope

Exclusions in the DHCP scope It is perfectly acceptable to reserve (or exclude) IP addresses from the DHCP scope.

Lynne is a home user who would like to share music throughout the computers in her house using an external USB hard drive connected to a router that she purchased over a year ago. The manufacturer states that the router is capable of recognizing drives up to 4TB in size, but she cannot get her 3TB drive to show up on the network. What should Lynne do to fix this problem? Load the latest hardware drivers for her USB drive Install the latest OS on her computers Download the latest playback software for her music files Flash the latest firmware for her router

Flash the latest firmware for her router Routers can be updated by conducting a firmware flash. This is similar to upgrading or patching your computer's operating system, or even updating a device driver. By flashing the firmware, it can provide the ability to communicate with newer devices.

A technician suspects that the email system is slow due to an excessive amount of Spam being received. Which of the following should the technician do FIRST according to the troubleshooting methodology? Verify full system functionality Block incoming email Establish a plan of action Gather information

Gather information After identifying the problem (the server is slow), the next step is to gather information. This can be from various sources such as (but not limited to) users, logs, and IP addresses. After the information has been gathered, the technician should establish a plan of action to resolve the issue.

A network technician responds to a customer reporting that a workstation continually loses the connection to the network. The user explains that it occurs randomly, and it happens several times throughout the day. Which step of the troubleshooting method should the technician perform first? Test the theory Establish a plan of action Gather information Question the obvious

Gather information In order to have a good understanding and a clear idea of what the issue could be, the technician should gather information as the first step.

In which troubleshooting step is a trouble ticket created? Establish a theory of probable cause Verify full system functionality and, if applicable, implement preventive measures Implement the solution or escalate as necessary Test the theory to determine cause Identify the problem Document findings, actions, and outcomes Establish a plan of action to resolve the problem and identify potential effects

Identify the problem

Alice has been asked to update an accounts receivable spreadsheet with information about the day's incoming payments, a task she has never performed before. After locating and opening the spreadsheet on the network server, she types in her new information, but when she attempts to save the changes, she receives an error message that directs her to save the file on her local drive instead of the network server. Which of the following is the probable cause of the problem? Blocked TCP/UDP ports Incorrect filesystem ACL settings Incorrect firewall settings Untrusted SSL certificate

Incorrect filesystem ACL settings Because Alice is able to access the server and open the spreadsheet file, the problem is not related to blocked ports, firewall settings, or an untrusted certificate. The problem is most likely that though she has the necessary filesystem access control list (ACL) permissions to open and read the file, she does not have the permissions needed to modify it.

Ralph is a network administrator attempting to use his workstation to remote into a web server called WebServ1 on the perimeter network. However, the remote desktop client software is unable to establish a connection to the server. Ralph can see all of the computers on his local network and on the perimeter network. He tries using the ping utility to test the WebServ1's TCP/IP functionality, and the ping test is successful. Ralph then calls his colleague Ed and has him try to connect to WebServ1 using the same remote access tool. Ed connects successfully. Which of the following could be the cause of the problem Ralph is experiencing? Name resolution failure Unresponsive service on the web server Blocked TCP/UDP ports on the web server Incorrect firewall settings on Ralph's workstation

Incorrect firewall settings on Ralph's workstation Because Ed can connect to WebServ1 successfully, the problem is not an unresponsive service or blocked ports on the server. The problem is not a name resolution failure because Ralph can successfully ping WebServ1 by name. Therefore, of the options listed, the only possible problem must be that the firewall on Ralph's workstation is not configured to allow the remote desktop client's traffic out.

Ralph is adding new workstations to his wireless network, which uses an access point that is configured to use WPA2 encryption. However, after configuring the wireless network adapter on the first workstation, Ralph finds that it is not connecting to the network. The access point is listed on the Available Networks display, and there are no error messages or indications of a problem, just a failure to connect. Which of the following is most likely to be the problem? Incorrect passphrase Channel overlap Incorrect SSID Poor signal-to-noise ratio

Incorrect passphrase Specifying the wrong passphrase for the encryption protocol is the most common cause of a failure to connect to the network with no indication of an error. Channel overlap or a poor signal-to-noise ratio, caused by a microwave oven or other device, could result in a weak signal, either of which would be indicated in the list of available networks.

Alice's company is opening a new branch office, and Alice is responsible for building the Active Directory domain controller for that office. She installs a new Windows server and configures it as a domain controller and then ships it to the new office site. However, once it arrives and is connected to the home office network, the new domain controller fails to synchronize with the existing ones at the home office. Which of the following could be the cause of the problem? Incorrect time Server hardware failure Duplicate IP addresses Incorrect default gateway address

Incorrect time If the time on the Active Directory domain controller at the new office is more than five minutes off of the time held by domain controller with the PDC Emulator role at the home office, then the new domain controller will not sync. Duplicate IP addresses or an incorrect default gateway address would prevent the new domain controller from connecting to the home office network. A server hardware failure would manifest as an outage far more serious than a domain controller synchronization issue.

Multiple students within a networking lab are required to simultaneously access a single switch remotely. The administrator checks and confirms that the switch can be accessed using the console, but currently only one student can log in at a time. What should be done to fix this issue? Increase installed memory and install a larger flash module Increase the number of VLANs configured on the switch Decrease the number of VLANs configured on the switch Increase the number of virtual terminals available

Increase the number of virtual terminals available You can set a limit of how many virtual terminals can simultaneously connect to a switch. Here, the limit is set to one and we should increase it to solve the issue.

Alice receives a call from a user who cannot connect to the company's 802.11g wireless network with a new laptop that has an 802.11ac network adapter. Other users working in the same area are able to connect to the network without difficulty. Which of the following steps can Alice perform to resolve the problem? (Choose all correct answers.) Install an 802.11ac wireless access point on the network. Change the channel used by the wireless access point. Install an 802.11g wireless network adapter in the user's laptop. Move the user closer to the wireless access point.

Install an 802.11ac wireless access point on the network. Install an 802.11g wireless network adapter in the user's laptop. The 802.11ac and 802.11g wireless networking standards are fundamentally incompatible. The 802.11g access point uses the 2.4 GHz band and the user's 802.11ac laptop uses the 5 GHz band.

Ralph is having trouble providing satisfactory wireless network performance to some executive offices at the far end of the building. The wireless access point is based on the 802.11g standard. The offices have heavy doors and insulated walls for sound dampening, and the occupants typically leave their doors closed during work hours. Which action can Ralph take to provide the users in this offices with better wireless network performance? Install an additional access point nearer to the offices. Modify the access point to use higher number channels. Upgrade the access point to a model based on the 802.11n standard. Configure the access point to disable SSID broadcasting.

Install an additional access point nearer to the offices.

A network technician is connecting three temporary office trailers with a point-to-multipoint microwave radio solution in a wooded area. The microwave radios are up and the network technician can ping devices in all office trailers, however, connectivity is sporadic. What is the cause of this issue? Latency Throttling Interference Split Horizon

Interference As a process of elimination, throttling slows down speed and latency slows down speed even further. Split horizon prevents loops so it only makes sense that interference is the choice. Also, interference causes drops in connections in many circumstances.

A website just changed its IP address, and a user is unable to reach it by typing the site's domain name into their browser. What command can the user run to make the computer learn the website's new IP address? Ipconfig /updatednscache Ipconfig /all Ipconfig /flushdns Ipconfig /dnsupdate

Ipconfig /flushdns Ipconfig /flushdns will clear the DNS cache and force the computer to perform a fresh DNS lookup to get the current IP address of a domain name host.

Which of the following terms describes a connectivity problem on wired networks that is caused by individual packets that are delayed due to network congestion, different routing, or queuing problems? Latency Attenuation Jitter Bottleneck

Jitter When individual packets in a data stream are delayed, the resulting connectivity problem is called jitter. Although this condition might not cause problems for asynchronous applications, real-time communications, such as Voice over IP or streaming video, can suffer interruptions, from which the phenomenon gets its name. Latency describes a generalized delay in network transmissions, not individual packet delays. Attenuation is the weakening of a signal as it travels through a network medium. A bottleneck is a condition in which all traffic is delayed, due to a faulty or inadequate component.

The network administrator is troubleshooting a switch port for a file server with dual NICs. The file server needs to be configured for redundancy, and the dual NICs need to be combined for maximum throughput. What feature on the switch should the network administrator ensure is enabled for best results? BPDU LACP Spanning tree Load balancing

LACP LACP is a protocol used to control the combining of ports. Link Aggregation groups combine numerous physical ports to make one high bandwidth path. This method can increase bandwidth and therefore, throughput. It can also provide network redundancy and load balancing. BPDU guard -Spanning tree takes time to determine if a switch port should forward frames.

A user is unable to connect to a server in another building and discovers the following while troubleshooting the issue: 1) Client PC 1 has an IP address if 172.16.10.25/25 2) PC 1 can successfully ping its gateway of 172.16.10.1/25, which is an interface of router A 3) Server A is named "BLDGRILFESVR01' and has an IP address of 172.16.10.145/25 4) PC 2 with an IP address of 172.16.10.200/25 can successfully ping server A However, when PC 1 pings Server A, it gets an error of destination host unreachable. Which of the following might be the issue? Link from SERVER A to PC 1 are on different subnets Link from ROUTER A to SERVER A is down Link from PC 1 to ROUTER A has duplex issues Link from SERVER A to PC 2 is down

Link from SERVER A to PC 1 are on different subnets Since the IPs listed are all using /25 for their CIDR notation, we can determine that they are on two separate subnets (172.16.10.0-172.16.10.127 and 172.16.10.128-172.16.10.255).

Your company is using a T1 connection for its connectivity to the internet. When you arrived at work this morning, you found that your internet connection was not working properly. You began troubleshooting and verified that the network's router is properly configured, the cable is connected properly between the router and the T1's CSU/DSU, but the T1 remains down. You call your ISP, and they have requested that you test the interface on the CSU/DSU to ensure it hasn't failed. Which tool should you utilize to perform this test? Cable tester Tone generator Light meter Loopback adapter

Loopback adapter If you have a T1 for internet service, it is highly recommended that you have a T1 loopback adapter or plug for testing purposes if the line ever has trouble with it. Inserting the loopback adapter into the CSU/DSU will allow the ISP to remotely diagnosis if the connection between their central office and your demarcation point is working properly.

When troubleshooting a T1 connection, the service provider's technical support representative instructs a network technician to place a special device into the CSU/DSU. Using this device, the provider can verify that communications are reaching the CSU/DSU. What was used by the network technician? Cable analyzer Toner probe OTDR Loopback plug

Loopback plug A loopback plug, also known as a loopback adaptor or a loopback cable, is a device used to test ports (such as serial, parallel, USB, and network ports) to identify network interface card (NIC) issues. Loopback plug equipment facilitates the testing of simple networking issues and is available at very low costs.

A company is experiencing accessibility issues reaching services on a cloud-based system. What monitoring tools should be used to locate possible outages? Packet analyzer Protocol analyzer Network sniffer Network analyzer

Network analyzer A network analyzer is a useful tool, helping you do things like track traffic and malicious usage on the network. A software tool like Wireshark is a network analyzer and protocol analyzer.

Several accounting consultants are working in Ed's office for the first time, and they are unable to connect to the 802.11n wireless network with their laptops. Which of the following tasks should Ed perform first to try to resolve the problem? (Choose all that apply) Check the network adapters in the laptops for channel overlap. Make sure that the consultants are attempting to connect to the correct SSID. Examine the area where the consultants are working for possible sources of signal interference. Make sure that the consultants' laptops are configured to use the correct wireless security protocol.

Make sure that the consultants are attempting to connect to the correct SSID. Make sure that the consultants' laptops are configured to use the correct wireless security protocol.

Several accounting consultants are working in Ed's office for the first time, and they are unable to connect to the 802.11g wireless network with their laptops. They are selecting the correct SSID from the Available Networks list, but they cannot connect, and there are no error messages of any kind. Which of the following tasks should Ed perform to try to resolve the problem? Check the network adapters in the laptops for channel overlap. Change the frequency used by the wireless access point from 2.4 GHz to 5 GHz. Examine the area where the consultants are working for possible sources of signal interference. Make sure that the consultants' laptops are configured to use the correct wireless security protocol.

Make sure that the consultants' laptops are configured to use the correct wireless security protocol. The use of an incorrect wireless security protocol is a well-known source of errorless connection failures, so checking this will most likely enable Ed to locate the source of the problem. Although signal interference could conceivably be the cause for a connection failure, the users can see the network, so this is probably not the problem.

It has been determined by network operations that there is a severe bottleneck on its mesh topology network. The field technician has chosen to use log management and found that one router makes routing decisions slower than the others on the network. What is this an example of? Network device power issues Network device CPU issues Storage area network issues Delayed responses from RADIUS

Network device CPU issues Routing decisions must be processed by the router, relying on the networking device's CPU. This can become a severe bottleneck if you have an underpowered router for a large enterprise environment.

Jason is the network manager and is leading a project to deploy a SAN. He is working with the vendor's support technician to properly set up and configure the SAN on the network. To begin SAN I/O optimization, what should Jason need to provide to the vendor support technician? Network diagrams Baseline documents Asset management document Access to the data center

Network diagrams

Troubleshooting networks add which element to the general troubleshooting model? Gather basic information Form a theory Network model top-to-bottom approach Test the theory

Network model top-to-bottom approach

Ed is troubleshooting some network performance problems. After exhausting many other possibilities, he is examining the twisted pair cable runs in the office's drop ceiling. He finds that some cables have been damaged, apparently by electricians working in that space. In some cases, the cable sheath has been split along its length, and some of the insulation on the wires inside has been scraped off as well. Which of the following types of faults might be caused by this damage? (Choose all correct answers.) Open circuits Short circuits Split pairs Transposed wires

Open circuits Short circuits A split pair is a connection in which two wires are incorrectly mapped in exactly the same way on both ends of the cable. Having transposed pairs is a fault in which both of the wires in a pair are connected to the wrong pins at one end of the cable. Both of these faults are the result of incorrect wiring during installation, and they are not caused by damaged cables.

Ralph is the administrator of a small company's wireless network. He has recently discovered evidence that users outside of the company's office space have been accessing its wireless network. The office is located in a narrow space against the building's outside wall. Ralph is concerned that the network's wireless access point is extending coverage outside the building. Speaking with a consultant friend of his, Ralph is advised to install a different type of antenna on his access point. Which of the following antenna types would most likely help Ralph to alleviate the problem? Dipole Yagi Patch Unidirectional

Patch A patch antenna is a flat device that transmits signals in a half-spherical pattern. By placing the antenna against the building's outer wall, Ralph can provide coverage inside the building and minimize coverage extending to the outside. A dipole antenna is another name for the omnidirectional antenna usually provided with an access point. A unidirectional antenna directs signals in a straight line, which would not provide the coverage Ralph needs. A Yagi antenna is a type of unidirectional antenna.

If nobody on your network can reach any Web sites using the domain names, what command utility would be good to use to determine the problem? Telnet Nslookup Nbstat Ping

Ping If no one on the network can reach any websites using the hostnames, try to ping various websites using hostnames and IP addresses. If you can successfully ping the IP addresses but not the hostnames, the problem most likely lies with DNS. If you cannot ping either hostnames or IP addresses, the problem may lie somewhere else on your network, such as the gateway. nslookup and dig -Lookup information from DNS servers. Canonical names, IP addresses, cache timers, etc.

Stan tells you that he cannot get on the network. You know the link light on the NIC is green and you know the cable is good. He seems to be the only one on the network having this problem. What command line utility and address do you use to run an internal test? Ping the loopback address Ping the subnet mask address Ping the IP address Ping the broadcast address

Ping the loopback address Don't let the link light and good cable fool you. The NIC could still be bad. Pinging the loopback address (127.0.0.1) runs an internal test to verify that the NIC and TCP/IP is working. Pinging anything else won't tell you if your NIC is working correctly.

Donnie complains that he cannot connect to www.comptia.org. Marie, the network administrator, suspects the network's DNS server could be causing the problem. Which of the following steps could help her determine if the DNS server is to blame for Donnie's problem? Run route from Donnie's computer. Run netstat from Donnie's computer. Ping www.comptia.org by both its name and IP address from Donnie's computer. Run nbtstat from Donnie's computer.

Ping www.comptia.org by both its name and IP address from Donnie's computer. Ping www.comptia.org by both its name and the IP address from Donnie's computer. If Marie can ping www.comptia.org by its IP address but not by its name, she knows Donnie's machine cannot properly resolve the name www.comptia.org into its corresponding IP address. The route command is used to check the route your packets take from your PC. The nbtstat command is used to troubleshooting WINS issues. The netstat command is used to see the current TCP & UDP connection statistics on your PC.

Ralph has installed a new Category 5e cable run himself. He has attached keystone connectors to both ends of the cable, mounted the office-side connector to a wall plate, and mounted the datacenter connector into a patch panel. Then he took a patch cord and connected the patch panel port to an open port in one of the network switches. However, the LED on the switch port does not light. What should Ralph do? Repull the cable run using Category 6 cable. Check the cable run for wiring faults. Make sure the switch port is not disabled. Plug a computer into the wall plate.

Plug a computer into the wall plate. For the link pulse LED on the switch port to light up, there must be a completed connection between the switch and a computer at the other end. None of the other options will cause the LED to light.

Sally, in the web development group, has asked for your assistance in troubleshooting her latest website. When she attempts to connect to the web server as a user, her web browser issues a standard HTTP request but continually receives a timeout response in return. You decided to capture the entire TCP handshake between her workstation and the webserver to troubleshoot the issue best. Which of the following tools would BEST allow you to capture and then analyze the TCP handshake? Protocol analyzer Packet sniffer Spectrum analyzer Tone generator

Protocol analyzer

Ed has configured his workstation to use IPsec encryption for network communications. Which of the following tools can he use to verify that his network traffic is encrypted? Multimeter Packet sniffer Port scanner Protocol analyzer

Protocol analyzer A protocol analyzer is a tool that enables a user to view the contents of packets captured from a network. In Ed's case, if IPsec is properly implemented, he should be able to see that the data in packets captured from his workstation is encrypted. A packet sniffer is a tool that captures packets for the purpose of traffic analysis, but cannot view their contents.

Wesley has contacted your IT department with reports of being disconnected from the file server at random times. Which of the following could a technician use to determine whether or not it is Wesley's PC or the file server that is creating the issue? Toner probe Cable tester Throughput tester Protocol analyzer

Protocol analyzer A protocol analyzer or packet sniffer is designed to intercept and log all network packets. In this scenario, we should be able to find out which device is the culprit by using a protocol analyzer such as Wireshark. A cable tester is used to check continuity between cables. A throughput tester is designed to see if the cable that you made will actually perform at its designed speed. A toner probe is an excellent tool for hunting down cables that are incorrectly labeled or not labeled at all!

A company has added many new users to the network that is causing an increase in network traffic by 200%. The engineers' original projection was that the new users would only add 20-30% more network traffic, not 200%. The network administrator suspects that a compromise of the network may have occurred. What should the network administrator have done previously to prevent this network breach? Create VLANs to segment the network traffic Place a network sniffer on segments with new employees Provide end-user awareness and training for employees Ensure best practices were implemented when creating new user accounts

Provide end-user awareness and training for employees With new employees entering a company, they are often not fully aware of its Internet usage policy and safe Internet practices. Providing end-user awareness and training for new employees help reduce the company's vulnerability to malicious entities on the Internet.

The RAID controller on a server failed and was replaced with a different brand. What will be needed after the server has been rebuilt and joined to the domain? Vendor documentation Recent backups Physical IP address Physical network diagram

Recent backups If the RAID controller fails and is replaced with a RAID controller with a different brand, the RAID will break. We would have to rebuild a new RAID disk and access and restore the RAID's most recent backup.

Your company just moved into a beautiful new building. The building has been built with large glass windows covering most of the walls and ceiling to provide natural light to be visible throughout the offices. You have noticed that your cell phone gets poor cellular connectivity when inside the building. What is the MOST likely cause of the poor cellular service within the building? Frequency mismatch Channel overlap Absorption Reflection

Reflection A cellular signal is comprised of radio waves. Just like light, radio waves can bounce off of certain surfaces and materials. Metal and glass are considered highly reflective materials which can cause poor cellular service and connectivity within office buildings that use intricately designed glass walls and ceilings. If a large amount of reflection occurs, signals can be weakened and cause interference at the receiver's device.

Ralph is having trouble providing satisfactory wireless network performance to a row of glass-walled conference rooms at the far end of the building. The doors to the conference rooms are also made of glass and are always closed when meetings are in progress. Which of the following types of radio signal interference are likely to be the main issues that Ralph is trying to overcome? (Choose all correct answers.) Reflection Refraction Diffraction Attenuation

Refraction Attenuation Attenuation is the tendency of signals to weaken as they travel through a network medium. In the case of a wireless network, the medium is the air, and the farther away a wireless device is from the access point, the weaker the signal will be. Refraction is when signals bend as they pass through certain types of barriers, such as the glass walls of conference rooms. The bending changes the direction of the signals, possibly causing them to weaken in the process. Reflection is when signals bounce off of certain surfaces, such as metal. Diffraction is when signals have to pass around barriers to reach a particular destination. All of these phenomena can weaken the radio signals used in wireless networking, but attenuation and refraction are likely to be the primary problems for Ralph in this case.

An administrator has configured a new 100 Mbps WAN circuit, but speed testing shows poor performance when downloading larger files. The download initially reaches close to 100 Mbps but begins to drop and show spikes in the download speeds over time. The administrator checks the router interface and sees the following: NETRTR01# show interface eth 1/1 GigabitEthernet 1/1 is up, line is upHardware is GigabitEthernet, address is 000F.33CC.F13AConfigured speed auto, actual 1Gbit, configured duplex fdx, actual fdxMember of L2 VLAN 1, port is untagged, port state is forwarding What is the issue? Shutdown and then re-enable this interface Remove default 802.1q tag and set to server VLAN Shutdown and restart the router Reset the statistics counter for this interface

Remove default 802.1q tag and set to server VLAN Since the VLAN port is untagged, it can be slowing down performance. It is recommended to remove the default VLAN tag and set up a server VLAN to increase performance.

A technician is troubleshooting a desktop connectivity issue. The technician believes a static ARP may be causing the problem. What should the technician do NEXT according to the network troubleshooting methodology? Remove the ARP entry on the user's desktop Identify a suitable time to resolve the issue on the affected desktop Duplicate the issue in a lab by removing the ARP entry Document the findings and provide a plan of action

Remove the ARP entry on the user's desktop Based on the troubleshooting methodology, you should try to test your hypothesis once you have come up with a probable cause (the static ARP entry). There are 7 steps to the troubleshooting methodology used in Network+. (1) Identify the problem. (2) Establish a theory of probable cause. (3) Test the theory to determine the cause. (4) Establish a plan of action to resolve the problem and identify potential effects. (5) Implement the solution or escalate as necessary. (6) Verify full system functionality and if applicable implement preventative measures. (7) Document findings, actions, and outcomes.

Which of the following is not a potential solution for an IEEE 802.11g wireless computer that has intermittent problems connecting to an IEEE 802.11b/g access point? Install a higher gain antenna on the access point. Replace the access point with a model that supports 802.11n. Move the computer closer to the access point. Change the channel used by the access point.

Replace the access point with a model that supports 802.11n. Replacing the access point with an 802.11n model is not going to have any effect at all unless you upgrade the computer's network adapter as well.

A routine test of a newly installed twisted pair cable run with a wiremap tester indicates that there is a short circuit on one of the wires. Which of the following procedures might possibly correct the fault? Use a different pinout on both ends of the cable Replace the connectors at both ends of the cable run Move the cable away from any potential sources of electromagnetic interference Use a higher grade of UTP cable

Replace the connectors at both ends of the cable run A short circuit is a wiring fault indicating that a pin at one end of a cable run is connected to two pins at the other end. To correct the problem, you must replace the connector with the faulty wiring. None of the other suggestions are solutions for a wiring fault.

Today, your company's network started to experience network connectivity issues for various workstations around the company. As you begin troubleshooting, you identify that all the workstations receive their connectivity from a single switch on the 3rd floor of the office building. You start searching the 3rd floor for the cause of this issue and find a small wired router plugged into a network jack in the sales manager's office. From this small wired router, he has connected his workstation and a small Smart TV to watch Netflix while working. You question the sales manager about when he brought in the new router. He states that he just hooked it up this morning. What type of issue did the sales manager accidentally introduced into the network by installing the router? Evil twin VLAN mismatch Network loop Rogue DHCP server

Rogue DHCP server Routers usually contain their own DHCP servers. When the sales manager installed the wired router, he inadvertently introduced a secondary DHCP server into the network. This could cause the same IP addresses to be assigned to two different workstations, resulting in connectivity issues for those workstations. Had the sales manager installed a simple hub or switch, this would not have caused any issues. Because this is a wired router, it cannot be an evil twin since evil twins are wireless access points. We have no indications of a VLAN mismatch since this would only affect the workstations connected to this router. Similarly, we have no indications of a network loop, so this network might already be implementing good practices by utilizing an STP to prevent them.

Which of the following are most likely critical nodes? (Choose all correct answers) IP security camera Switch with the payroll VLAN Server Front-end router RADIUS uses TCP port 1812

Server Front-end router Critical nodes are IT department assets whose loss would stop the organization from functioning until the loss is recovered. Servers and the router that connects the organization to the Internet are typically critical nodes. Failure of a security camera or a disconnection of the payroll department would not normally disrupt an entire organization from performing its job (unless it was a payroll company, of course).

An administrator arrives at work and is told that network users are unable to access the file server. The administrator logs into the server and sees the updates were automatically installed last night and the network connection shows "limited" with no availability. What rollback action should the technician perform? Browser on the server Server's NIC drivers Server's IP address Antivirus updates

Server's NIC drivers An IP address is attached to a NIC's MAC address, which would not change in the event of an update. Sometimes, software updates can adjust hardware driver settings accidentally, so it is a good practice to always review these settings first to eliminate this.

After connecting a tone generator to the green wire at one end of a twisted pair cable run, Ralph proceeds to the other end of the cable and touches the locator to each of the eight pins in turn. The green wire and the green striped wire both produce a tone. What type of wiring fault has Ralph discovered? Split pair Far-end crosstalk Transposed wires Short circuit Delay skew

Short circuit

To save the company money and to provide some new hires with Gigabit Ethernet connectivity, Ralph has installed some new Category 5e cable runs, connecting his company's datacenter with a newly rented office at the far end of the building. However, the new users are complaining of intermittent connectivity problems. The company brings in a cabling contractor to investigate, and his diagnosis is attenuation. Which of the following solutions will most likely be a sure solution to the problem? Repull the runs using Category 6 cable. Shorten the cable runs. Configure the hardware to run at a slower speed. Install high-end network adapters in the workstations.

Shorten the cable runs.

An end user receives a new computer and now is unable to connect to a database using ODBC. Other users are able to connect successfully, and the network technician is able to successfully ping the database server but still is unable to connect. What might have caused this issue? Missing IP routes on router Wrong default gateway address Software firewall is blocking ports Failing network interface card

Software firewall is blocking ports A change in the firewall settings to allow access to the specified ports will fix the problem. It appears the default firewall on this new computer is blocking the port used to communicate with the database server.

Ralph is using a tone generator and locator to test some newly installed twisted pair cable runs on his network. Which of the following cable faults will he be unable to detect? Open Short Split pair Transposed pairs

Split pair A split pair is a connection in which two wires are incorrectly mapped in exactly the same way on both ends of the cable. Transposed pairs is a fault in which both of the wires in a pair are connected to the wrong pins at one end of the cable.

Alice receives a call in which a user reports that he is unable to send print jobs to the network-attached workgroup printer near his desk. Which of the following tasks should Alice perform first? Reinstall the printer driver on the user's workstation. Test network connectivity to the printer using the ping utility. Examine the switches to which the user's workstation and the printer are connected. Check to see if there are printer firmware upgrades available.

Test network connectivity to the printer using the ping utility.

You are working as a network technician and have been asked to troubleshoot an issue with a workstation. You have just established a theory of probable cause. Which of the following steps should you perform NEXT? Identify the problem Verify full system functionality Test the theory to determine cause Implement the solution or escalate as necessary

Test the theory to determine cause There are 7 steps to the troubleshooting methodology used in Network+. (1) Identify the problem. (2) Establish a theory of probable cause. (3) Test the theory to determine the cause. (4) Establish a plan of action to resolve the problem and identify potential effects. (5) Implement the solution or escalate as necessary. (6) Verify full system functionality and if applicable implement preventative measures. (7) Document findings, actions, and outcomes.

Given a network problem scenario, a technician should identify the problem, then establish a theory for the cause of the problem. What is the next logical troubleshooting step? Implement an action plan. Document the outcome. Test the theory to determine the cause. Implement a solution with potential effects.

Test the theory to determine the cause. Identify the problem Establish a theory of probable cause Test the theory to determine cause Establish a plan of action to resolve the problem and identify potential effects Implement the solution or escalate as necessary Verify full system functionality and, if applicable, implement preventive measures Document findings, actions, and outcomes

Ralph is responsible for a wireless LAN that consists of an 802.11n 2x2 access point and laptop computers with a variety of network adapters. Some of the laptops support 802.11n, most support 802.11g, and a few older models have 802.11a adapters. The wireless LAN is located in a large office building with many other wireless networks, and Ralph is having trouble finding a channel on the 2.4 GHz band that is not congested with traffic. Scanning the 5 GHz band, he finds relatively little traffic, so he reconfigures the access point to use a 5 GHz channel. The result is that some of the laptops are able to connect to the network, whereas others are not. What is the most likely reason for the connection failures, and what must Ralph do to enable all of the laptops to connect to the wireless network? The 5 GHz band does not support automatic channel selection. Ralph must configure each laptop to use the same channel as the access point for all the laptops to connect successfully. The 802.11g standard does not support communication using the 5 GHz band. Ralph must configure the access point to support 2.4 GHz for all the laptops to connect successfully. The 5 GHz band does not support MIMO communications, so the 802.11n laptops are unable to connect to the network. Ralph must replace the access point with an 802.11g unit for all the laptops to connect successfully. The 802.11a standard does not support communication using the 5 GHz band. Ralph must replace the network adapters in those laptops with newer models for them to connect successfully.

The 802.11g standard does not support communication using the 5 GHz band. Ralph must configure the access point to support 2.4 GHz for all the laptops to connect successfully.

A user reports to Ralph that he cannot access the Internet, although he is able to connect to computers on the local network. Ralph runs ipconfig /all on the user's workstation and examines the output. Which of the following is the most likely explanation for the user's problem, based on these ipconfig results? DHCP Enabled. . . . . . . . . . . : No Autoconfiguration Enabled . . . . : Yes Link-local IPv6 Address . . . . . : fe80::c955:c944:acdd:3fcb%2 IPv4 Address. . . . . . . . . . . : 192.168.4.24 Subnet Mask . . . . . . . . . . . : 255.255.255.0 Default Gateway . . . . . . . . . : 192.168.6.99 DHCPv6 IAID . . . . . . . . . . . : 241232745 DNS Servers . . . . . . . . . . . : 202.86.10.114 NetBIOS over Tcpip. . . . . . . . : Enabled The Subnet Mask setting is incorrect. The Default Gateway setting is incorrect. The DNS Servers setting is located on another network. DHCP is not enabled.

The Default Gateway setting is incorrect. The Default Gateway setting should contain the address of a router on the local network that provides access to other networks, such as the Internet. In this case, therefore, the Default Gateway address should be on the 192.168.4.0 network, but it contains an address on the 192.168.6.0 network, which is not local. Therefore, the user can only access systems on the 192.168.4.0 network. The Subnet Mask setting must be correct, or the user would not be able to access any other systems. Unlike the default gateway, the DNS server does not have to be on the local network, so the address shown can be correct. DHCP is not necessary to access the Internet.

Ralph has begun to receive calls from users reporting that they cannot access the local network or the Internet. Ralph checks their computers and discovers that all of the users with a problem have IP addresses in the 169.254.0.0/16 network, which is not the address used on Ralph's network. Which of the following might be the cause of the problem? The users have tried to modify their IP configuration settings. There is a rogue DHCP server somewhere on the network. The IP address leases assigned by the DHCP server have expired. The users' workstations have been infected by a form of malware.

The IP address leases assigned by the DHCP server have expired. The 169.254.0.0/16 network is used by Automatic Private IP Addressing (APIPA), a standard that provides DHCP clients with an IP address when they cannot contact a DHCP server. Unknown to Ralph, the DHCP server on his network has been down for over a week, and the users' IP address leases have begun to expire. This causes them to revert to APIPA addresses. Multiple users changing their IP addresses would not result in them all using the same network address.

Alice is supporting a network that consists of four internal local area networks (LANs) with 50 users each. Each internal LAN uses twisted pair Gigabit Ethernet links that connect the users to a switch. Each of the four switches connects to a backbone router. All of the routers connect to the same backbone network, which has a single additional router to connect the company's network to the Internet. Users on all of the internal LANs are complaining that, when they came in this morning, they could not access the Internet, although they could access resources on all of the LANs with no problems. Which network component is the likeliest source of the problem in this scenario? The router connecting the problem LAN to the backbone The Internet router The switch on the problem LAN The cable on the backbone network

The Internet router

Ralph is troubleshooting a workstation that cannot access the network. The workstation is plugged into a wall plate that should provide it with access to a DHCP-equipped network using the 192.168.32.0/20 network address. Ralph checks that the patch cable is properly plugged into the workstation and the wall plate, which they are, and then runs ipconfig /all on the user's workstation and examines the output. Which of the following could be the explanation for the user's problem, based on these ipconfig results? DHCP Enabled. . . . . . . . . . . : No Autoconfiguration Enabled . . . . : Yes Link-local IPv6 Address . . . . . : fe80::c955:c944:acdd:3fcb%2 IPv4 Address. . . . . . . . . . . : 192.168.42.24 Subnet Mask . . . . . . . . . . . : 255.255.255.0 Default Gateway . . . . . . . . . : 192.168.42.99 DNS Servers . . . . . . . . . . . : 202.86.10.114 The IPv4 Address setting is incorrect. The Subnet Mask setting is incorrect. The Default Gateway setting is incorrect. The DNS Servers setting is located on another network.

The Subnet Mask setting is incorrect. For a computer connected to the 192.168.32.0/20 network, the Subnet Mask value should be 255.255.240.0, not 255.255.255.0, as shown in the ipconfig output. The IPv4 Address, Default Gateway, and DNS Servers settings are appropriate for the network.

You have just installed a new switch in your company's network closet. The switch connects to your router using an SFP port on both the router and switch. Unfortunately, you only had a long cable available to make the connection, so after running the cable from the rack containing the switch to the other rack containing the router, you decide to coil up the excessive cable and use a zip tie to hold the coil to the side of the rack. You head back to your office, log into the switch over SSH, and check the log file. You notice that several messages indicate that the signal strength on the transmit portion of the SFP is registering as too weak. What is the BEST explanation for the cause of this error? The SFP module has gone bad You used an MMF cable instead of an SMF cable The bend radius of the cable has been exceeded You used an MTRJ cable instead of an ST cable

The bend radius of the cable has been exceeded The most likely explanation is that you coiled up the excess cable too tightly and exceeded the bend radius for the cable. By doing this, you may have broken or cracked the fiber connected to the transmit portion of the SFP. It is unlikely that the SFP failed since only the transmit portion is registering as weak. If you used the wrong type of cable (MTRJ vs. ST), you would not have been able to connect it to the SFP module as it wouldn't fit. Similarly, if you used an MMF instead of an SMF cable, you would get no connection, not a weak connection.

Your company has been asked by a local charity that supports underprivileged youth if they would help to build an internet café for their students. Because the charity doesn't have any funding for this project, your company has decided to donate their old workstations and networking equipment to create the network. All of the workstations, routers, and switches have been tested before installation. The company has decided to reuse some old network cables to connect the computers to the switches to save money. When you arrive at the new internet cafe, you are told that everything is working except unlucky computer #13 can't connect to the network. You attempt to plug the network cable into another computer, but then that computer cannot connect to the network. Confused, you try connecting the cable directly between two computers, and now they can communicate directly with each other. What is wrong with this cable? The cable is a Cat 3 cable and should be replaced with a CAT 5e cable The cable is a rollover cable The cable is a crossover cable but should be a straight-through cable The cable is a straight-through cable but should be a crossover cable

The cable is a crossover cable but should be a straight-through cable. Since the cable only worked when connecting two computers directly together, it is a crossover cable. Crossover cables are used to connect two of the same devices (computer to computer, or router to router) by switching the transmit and receiving pins in the cable's jack. Since you are trying to connect a computer to a switch, you need to have a straight-through cable instead.

You have three virtual LANs (VLAN2, VLAN3, and VLAN4) with each implemented on three switches. A single router provides routing among the VLANs. All of the VLAN2 users connected to a common switch are complaining that they can't access resources on other hosts within their own VLAN or on VLAN3 and VLAN4. Before today, they could connect to local and remote resources with no problem. What is the likeliest cause of the service interruption? The router is malfunctioning and not routing among the VLANs. VLAN2 is misconfigured. The common switch to which the VLAN2 users are connected is not functioning. VLAN3 and VLAN4 are misconfigured.

The common switch to which the VLAN2 users are connected is not functioning.

A user calls Alice at the help desk to report that he cannot access the Internet. He can access systems on the local network, however. Alice examines the routing table on the user's workstation, and sees the following. Which of the following statements explains why the user cannot access the Internet? IPv4 Route Table 127.0.0.0 255.0.0.0 On-link 127.0.0.1 331 127.0.0.1 255.255.255.255 On-link 127.0.0.1 331 127.255.255.255 255.255.255.255 On-link 127.0.0.1 331 224.0.0.0 240.0.0.0 On-link 127.0.0.1 331 224.0.0.0 240.0.0.0 On-link 192.168.2.37 281 The routing table contains a loopback address. The routing table does not specify a default gateway address. The routing table does not specify a DNS server address. The routing table contains two different routes to the 224.0.0.0 network.

The routing table does not specify a default gateway address. To access the Internet, the workstation's routing table must include a default gateway entry, which would have a Network Destination value of 0.0.0.0. A workstation's routing table does not specify the address of a DNS server. The loopback and 224.0.0.0 multicast addresses are normal routing table entries.

Bob administers a 20-node Windows and Mac OS X network with one Linux server. This morning Bob is inundated with calls from users complaining they can't access the network. The server, which sits in an equipment rack four feet from his desk, also cannot access the network. No one's link light is working. He has made no administrative changes during the night. Where should look first? The server The patch panel The patch cable The switch

The switch Patch cable or patch panel problems would only probably affect only one system or a very small group of systems. The server does not affect whether or not systems have a connection to the network, so no need to check it.

Ralph is setting up a workstation for the company's new vice president. He has installed the computer in the VP's office and plugged it into the wall plate. Then, back in the datacenter, he uses a patch cable to connect the corresponding port in the patch panel to a port in the network switch. However, the computer is unable to access the network. There are no complaints from other users. Which of the following could be the source of the problem? (Choose all correct answers.) The DNS server is malfunctioning. The switch port is disabled. The NAT server is not functioning. The switch is configured to use port security.

The switch port is disabled. The switch is configured to use port security. It is common practice on many networks to disable switch ports that are not in use so that unauthorized individuals can't plug devices into them. Some networks also use port security, in which switches are configured with access control lists (ACLs) that specify the MAC addresses of devices that are permitted to use them. Either of these could be the source of Ralph's problem. Because there are no other network users reporting problems, malfunctioning services such as NAT and DNS are not likely to be the cause.

A technician installs three new switches to a company's infrastructure. The network technician notices that all the switch port lights at the front of each switch flash rapidly when powered on and connected. Additionally, there are rapidly flashing amber lights on the switches when they started up the next day. What is happening to the switches? The switches are running through their spanning tree process The switches are having problems communicating with each other The switches are connected and detected a spanning tree loop The switches are not functioning properly and need to be disconnected

The switches are running through their spanning tree process

You are the network administrator with 15 users on a network. None of them have been able to connect to the server for the last 30 minutes. You try pinging the workstations from the server, but you can't ping any of them or the loopback address, even after a reboot. Which of the following statements must be true? You need to reboot the DHCP server. All users need to reboot their systems. You need to reboot the DNS server. There is a problem with the server NIC.

There is a problem with the server NIC. The main factor in all of this is that the server cannot ping the loopback address. This means that the server's NIC is not functioning properly. As a result, the server will obviously not be able to ping the workstations. Users have already rebooted, without a successful ping, DNS is useless, and DHCP deal's with assigning IP addresses.

Ralph is troubleshooting a workstation that cannot access the network. The workstation is plugged into a wall plate that should provide it with access to a DHCP-equipped network using the 192.168.4.0/24 network address. Ralph checks that the patch cable is properly plugged into the workstation and the wall plate, which they are, and then runs ipconfig /all on the user's workstation and examines the output. Which of the following could be the explanation for the user's problem, based on these ipconfig results? IPv4 Address. . . . . . . . . . . : 10.124.16.8 Subnet Mask . . . . . . . . . . . : 255.0.0.0 Lease Obtained. . . . . . . . . . : Monday, October 23, 2017 6:23:47 PM Lease Expires . . . . . . . . . . : Saturday, November 18, 2017 9:49:24 PM Default Gateway . . . . . . . . . : DNS Servers . . . . . . . . . . . : fec0:0:0:ffff::1%1 The workstation could not connect to a DHCP server. There is a rogue DHCP server on the network. The workstation is not configured to use DHCP. The IP address assigned by the DHCP server has expired.

There is a rogue DHCP server on the network. The DHCP client on the workstation is enabled, but the IP address assigned to the workstation is not from the 192.168.4.0/24 network. The assigned address is not an APIPA address, nor is it expired, so the only conclusion is that there is a rogue DHCP server on the network assigning addresses from a wholly different subnet.

Two of the following devices work together to trace out a cable: One sends an electrical signal along the cable at a particular frequency; the other one emits a sound when it detects that signal on the cable. What are the two devices? (Select two.) Tone probe Frequency locator Tone emitter Tone generator

Tone probe Tone generator

Oliver has inherited a network without any labeled ports on the patch panel. What tool will he need to get the patch panel properly labeled? Hardware Loopback TDR Crossover cable Toner

Toner A TDR determines the length of a cable, which does not help in this situation. Hardware Loopback is used to test that a NIC is functioning properly.

Ralph's company has expanded to include an additional building on the far end of the corporate campus, approximately four kilometers away from the building housing the datacenter. A single-mode fiber-optic cable connection has been installed between the new building and the datacenter for a 1000Base-BX10 connection, but the cable is not yet connected to a transceiver at the datacenter end. Noticing that there is a 1000Base-SX transceiver module in the datacenter store room, Ralph is wondering if he could use this on the new cable run. Which of the following are reasons why this might not work? (Choose all correct answers.) Transceiver mismatch Incorrect cable type Excessive cable length Wavelength mismatch

Transceiver mismatch Incorrect cable type Excessive cable length Wavelength mismatch The 1000Base-SX standard calls for multimode cable with a maximum length of approximately 500 meters, while the new cable run is 4,000 meters and uses single-mode cable. The 1000Base-SX transceiver will also be incompatible with the 1000Base-BX10 transceiver at the other end. 1000Base-BX10 uses wavelengths from 1,300 to 1,600 nanometers, whereas 1000Base-SX uses wavelengths of 770 to 860 nm.

The entire network at Adatum Corp. is unable to access the Internet. All of the users throughout the network are complaining that their browsers are displaying DNS failure messages. The company does not have an in-house network administrator, so they call Ralph at his consulting firm. Which of the following should be the first question that Ralph asks in his attempt to pinpoint the location of the malfunction? What browser are the users running? Where is the DNS server located? What technology is used to provide access to the Internet? What sites are the users attempting to access?

Where is the DNS server located? If the DNS server is located on Adatum's company network, then the DNS server could be failing to resolve the website names. However, the DNS server could be located on the Internet service provider's network, in which case the problem might be in the router that provides access to the ISP's network.

Ralph has been asked to create some new patch cables that will be used to connect patch panel ports to the network switches. He has been told to use the T568B pinout standard for all of the cable connectors. Ralph gathers the materials and the tools needed to complete the task, but he is not sure about the T568B pinout. Which of the following pinouts must Ralph use when creating the patch cables? White/orange, orange, white/green, blue, white/blue, green, white/brown, brown White/green, green, white/orange, blue, white/blue, orange, white/brown, brown White/orange, orange, white/green, green, white/blue, blue, white/brown, brown White/brown, white/green, white/orange, blue, white/blue, orange, green, brown

White/orange, orange, white/green, blue, white/blue, green, white/brown, brown t568b, use visualization of sun over tree over lake over seaweed over dirt. Stripe always comes first. t568a reverses orange and green.

Ed is examining some twisted pair cable runs that were recently installed in his office by an outside contractor. Looking at the connectors, he sees a variety of pinout combinations. Which of the following pinouts must Ed have rewired because they are incorrect? (Choose all correct answers.) White/orange, orange, white/green, blue, white/blue, green, white/brown, brown White/green, green, white/orange, blue, white/blue, orange, white/brown, brown White/orange, orange, white/green, green, white/blue, blue, white/brown, brown White/brown, white/green, white/orange, blue, white/blue, orange, green, brown

White/orange, orange, white/green, green, white/blue, blue, white/brown, brown White/brown, white/green, white/orange, blue, white/blue, orange, green, brown The others are correct for t568a and t568b. t568b, use visualization of sun over tree over lake over seaweed over dirt. Stripe always comes first. t568a reverses orange and green.

You just arrived at school today, pulled your laptop out of your backpack, and tried to connect your laptop to the Wi-Fi network. It worked fine yesterday, but today it won't connect automatically or display any available networks. You haven't done anything to the laptop since you left class yesterday. You ask your classmates if they can connect to the Wi-Fi, and every one of them is connected without any issues. What should you check FIRST in your attempt to connect your laptop to the Wi-Fi? Wireless controller configuration IP address issued by the DHCP server Wireless switch on your laptop The configuration of the WAP

Wireless switch on your laptop Since everyone else's laptops are connected without any issues, the problem is not with the network but with your laptop in some form. This rules out the wireless controller configuration or WAP settings since those are both things that would affect all users on the network. Since you are not connected or finding any networks, you won't have a DHCP address assigned. The most likely cause of your issue is that the wireless switch on your laptop was accidentally switched to the off position when you put your laptop in your backpack. (Note: Not all laptops have a wireless switch, but from the options provided, this is the most logical answer. If you have a MacBook, for example, they do not use a physical wireless switch.)

Which of the following commands enables you to view the ARP table stored in memory? arp -c arp -d arp -a arp -s

arp -a The arp -a command displays the entries in the ARP table stored in its cache. The arp -d command is for deleting entries, and the arp -s command is for adding entries. The arp -c command is not a valid option.

Ed has recently discovered a rogue DHCP server on his network. After disabling the server, he now needs to terminate all of the rogue IP address leases currently held by DHCP clients on the network and have them request new leases from the authorized DHCP server. Which of the following commands must he use on each client to do this? (Choose all correct answers.) ipconfig /dump ipconfig /renew ipconfig /lease ipconfig /discard ipconfig /release

ipconfig /renew ipconfig /release

You are assisting a member of your organization's security team during an incident response. The team member asks you to determine if any strange TCP connections are occurring on a given workstation. You open the command prompt on the workstation. Which of the following tools would provide you with information on any TCP connections currently on the workstation? arp route netstat tracert

netstat Netstat (network statistics) is a command-line network utility tool that displays network connections for the Transmission Control Protocol (incoming and outgoing), routing tables, and several network interface and network protocol statistics. It is useful when determining if a workstation is attempting outbound connections due to malware (beaconing activity) or has ports open and listening for inbound connections.

Which of the following Windows command-line utilities produced the output shown here? Interface Statistics Received Sent Bytes 663321544 1088192828 Unicast packets 29291610 10424979 Non-unicast packets 817568 58116 Discards 1628 0 Errors 0 0 Unknown protocols 0

netstat Running the Windows netstat command with the -e parameter displays Ethernet statistics, including the number of bytes and packets that have been transmitted and received. The ping, tracert, and arp utilities are not capable of producing this output.

A user calls Alice at the help desk to report that he cannot access the Internet. He can access systems on the local network, however. Alice examines the routing table on the user's workstation and sees the following. Which of the following commands must Alice run to correct the user's problem? IPv4 Route Table Active Routes: Network Destination Netmask Gateway Interface Metric 127.0.0.0 255.0.0.0 On-link 127.0.0.1 331 127.0.0.1 255.255.255.255 On-link 127.0.0.1 331 192.168.2.0 255.255.255.0 On-link 192.168.2.37 281 route add 0.0.0.0 MASK 0.0.0.0 192.168.2.37 METRIC 25 IF 192.168.2.99 route add 0.0.0.0 MASK 255.255.255.0 192.168.2.99 METRIC 25 IF 192.168.2.37 route add 192.168.2.0 MASK 255.255.255.0 192.168.2.99 METRIC 25 IF 192.168.2.37 route add 0.0.0.0 MASK 0.0.0.0 192.168.2.99 METRIC 25 IF 192.168.2.37

route add 0.0.0.0 MASK 0.0.0.0 192.168.2.99 METRIC 25 IF 192.168.2.37 To access the Internet, the workstation's routing table must include a default gateway entry. To create a default gateway entry in the routing table, you use the route add command with a Network Destination value of 0.0.0.0, a MASK value of 0.0.0.0, and the address of a router on the local network (in this case, 192.168.2.99). The entry must also have a METRIC value that is lower than the other entries in the table so that it will be used first.

Ed is implementing a web server farm on his company's network and has created a perimeter network on which the web servers will be located. The perimeter network is using the network IP address 192.168.99.0/24. He has also installed a router connecting the perimeter network to the internal network, which uses the 192.168.3.0/24 network address. The IP addresses of the router's interfaces are 192.168.3.100 and 192.168.99.1. Ed needs to access the web servers from his Windows workstation on the internal network, but right now, he cannot do so. Because he needs to have a different router specified as his default gateway, Ed decides to add a route for the perimeter network to his computer's routing table. Which of the following commands will create a routing table entry that enables Ed to access the perimeter network? route add 192.168.99.0 MASK 255.255.255.0 192.168.3.100 route add 192.168.3.0 MASK 255.255.255.0 192.168.3.100 route add 192.168.99.1 MASK 255.255.255.0 192.168.3.0 route add 192.168.3.100 MASK 255.255.255.0 192.168.99.0

route add 192.168.99.0 MASK 255.255.255.0 192.168.3.100 The correct syntax for the Windows route add command is to specify the destination network address, followed by the subnet mask for the destination network, followed by the address of the router interface on the local network that provides access to the destination network. The other options do not specify the correct addresses in the syntax.

You are trying to connect to another server on the network but are unable to do so. You have determined that the other server is located on the 10.0.0.1/24 network, but your workstation is located on the 192.168.1.1/24 network. Which of the following tools should you use to begin troubleshooting the connection between your workstation and the server? ifconfig traceroute netstat dig

traceroute Tracert is a command-line utility used to trace the path of an IP packet as it moves from its source to its destination. While using ping will tell you if the remote website is reachable or not, it will not tell you where the connection is broken. Tracert, though, performs a series of ICMP echo requests to determine which device in the connection path is not responding appropriately. This will help identify if the connectivity issue lies within your workstation and the server since the traffic must be routed between the two networks.

You are working as a service desk analyst. This morning, you have received multiple calls from users reporting that they cannot access websites from their work computers. You decide to troubleshoot the issue by opening up your command prompt on your Windows machine and running a program to determine where the network connectivity outage is occurring. Which tool should you use to determine if the issue is on the intranet portion of your corporate network or if the issue is occurring due to a problem with your ISP? netstat nslookup ping tracert

tracert While using ping will tell you if the remote website is reachable or not, it will not tell you where the connection is broken. Tracert, though, performs a series of ICMP echo requests to determine which device in the connection path is not responding appropriately.

Every day, you check the news at www.cnn.com. Today, it takes 3 minutes longer than usual to view the page. What is one thing you can do to see where the bottleneck is? telnet www.cnn.com tracert www.cnn.com ping www.cnn.com nslookup www.cnn.com

tracert www.cnn.com Nslookup is a utility used to query DNS servers.

Which of the following parameters causes the ping tool to transmit messages continually until manually halted? -n -t -i -a

-t

Which of the following cable installation tools is likely to be the most expensive? A crimper A cable certifier A punchdown tool A wiremap tester

A cable certifier

Which of the following devices is an essential tool for technicians working on telephone cables but is not needed for data networking cable installations? Tone generator and locator Wiremap tester Cable certifier Butt set

Butt set

When troubleshooting, you begin by taking steps to identify the problem. After you do this, which of the following steps should you perform next? Implement the solution Establish a plan of action Establish a theory of probable cause Verify full system functionality

Establish a theory of probable cause After identifying the problem, the next step is to establish a theory for the probable cause of the problem. After that, you can test your theory, establish a plan of action, implement a solution, verify the functionality of the system, and document the entire process.

Alice is a consultant who has been hired to move a client's old 20-node coaxial Ethernet network to a new location. She disassembles all of the network cabling and other components and packs them for shipping. At the new site, she sets up all of the computers, plugs a T-connector into each network adapter, and connects the cables, running them from one computer to the next to form the bus. When Alice is finished, she starts the computers and tests their network connectivity. She finds that 12 consecutive computers can communicate with each other, and the other 8 can communicate with each other, but the 12 cannot communicate with the 8. She makes sure that all of the connectors are securely tightened, especially the ones on the 12th computer, but the problem persists. Which of the following is the most likely cause of the difficulty? Alice has forgotten to terminate the computers at each end of the bus. One of the connectors on the 12th computer has a bent pin. Alice has forgotten to ground the network. The transmit and receive pins are reversed on the 12th computer.

One of the connectors on the 12th computer has a bent pin. A bent pin on one of the twelfth computer's connections would cause a break in the bus, essentially forming two networks that operate independently. The failure to terminate or ground the network would not produce this type of fault. Reversing the transmit and receive pins is not possible on a coaxial connection, due to the architecture of the cable.

Which of the following Windows command-line utilities produced the output shown here? Interface: 192.168.2.24 --- 0x2 Internet Address Physical Address Type 192.168.2.2 d4-ae-52-bf-c3-2d dynamic 192.168.2.20 00-26-c7-7e-00-e0 dynamic 192.168.2.22 00-90-a9-a2-43-8f dynamic ping tracert netstat arp

arp Running the arp utility with the -a parameter on a Windows system displays the contents of the Address Resolution Protocol (ARP) cache. The cache contains records of the IP addresses on the network that arp has resolved into MAC addresses. The ping, tracert, and netstat utilities are not capable of producing this output.

Which of the following command-line utilities enables you to view the Internet Protocol (IP) configuration on a Unix or Linux host? ifconfig nslookup ipconfig netstat

ifconfig

Which of the following command-line utilities can only run on Unix and Linux systems? ping ipconfig tracert ifconfig netstat

ifconfig The ipconfig and tracert commands run only on Windows, although there is a Unix/Linux version of tracert called traceroute.

Which of the following commands can Ralph use to display the number of bytes that a Windows workstation has transmitted? netstat tcpdump ipconfig iptables

netstat tcpdump is a data-network packet analyzer computer program that runs under a command line interface

Which of the following netstat commands can tell you how many IPv6 packets have been received on a particular Windows workstation? netstat -a netstat -s netstat -e netstat -r

netstat -s Netstat is a command line utility for Linux that prints network connections, routing tables, interface statistics, masquerade connections, and multicast memberships. Netstat can be used to diagnose network issues and service problems.

Which of the following Windows command-line utilities produced the output shown here? Server: trv213.pljd.net Address: 203.186.120.114 &nbsp; Non-authoritative answer: Name: microsoft.com Addresses: 104.43.195.251 23.100.122.175 23.96.52.53 191.239.213.197 104.40.211.35 nslookup pathping netstat route

nslookup nslookup is a command-line utility that generates DNS resource record requests and sends them to a specific DNS server.

Which of the following parameters enables you to specify the time-to-live (TTL) value of the messages ping transmits? -n -t -i -a

-i Running the ping tool with the -i parameter enables you to specify the time-to-live (TTL) value of the messages ping transmits. The -t parameter causes the ping tool to send messages to the target continuously until you manually stop it. The -n parameter enables you to specify the number of messages the ping tool should transmit. The -a parameter resolves an IP address you specify as the target to a hostname.

Alice is the network administrator of her company's network. The company has just moved into a building that has existing Category 6 (CAT6) unshielded twisted pair cabling. However, none of the cable connections has been labeled, and Alice is trying to identify and document where each cable run starts and ends. Which tools can Alice use for this purpose? (Choose all correct answers.) A packet sniffer A loopback connector A tone generator and locator A wiremap tester

A tone generator and locator A wiremap tester

Which of the following Windows commands enables you to delete the entire ARP cache? arp -c * arp -d * arp -a arp -s

arp -d *

Which of the following route commands displays the contents of a Windows computer's IPv6 routing table only? route print route print -6 route list -6 route list

route print -6

Which of the following parameters enables you to specify the number of messages the ping tool transmits? -n -t -i -a

-n Running the ping tool with the -n parameter enables you to specify the number of messages the ping tool should transmit with each execution. The -t parameter causes the ping tool to send messages to the target continuously until you manually stop it. The -i parameter enables you to specify the time-to-live (TTL) value of the messages ping transmits. The -a parameter resolves an IP address you specify as the target to a hostname.

Ed is a first-tier support technician. He receives the help calls listed here. His job is to assign them priorities based on their severity. Which of the following should be the problem that receives the lowest priority? A problem with an order entry or customer service call center resource that affects an entire department, with multiple local area networks (LANs) A fatal error that causes a single computer to fail A problem with a mission-critical backbone router that affects an entire network A problem with an application server that affects a single LAN

A fatal error that causes a single computer to fail

Ed is a first-tier support technician. He receives the help calls listed here. His job is to assign them priorities based on their severity. Which of the following should be the problem that receives the highest priority? A problem with an order entry or customer service call center resource that affects an entire department, with multiple local area networks (LANs) A fatal error that causes a single computer to fail A problem with a mission-critical backbone router that affects an entire network A problem with an application server that affects a single LAN

A problem with a mission-critical backbone router that affects an entire network

Which of the following is a network-wide problem? A problem with an order entry or customer service call center resource A fatal error that causes a single computer to fail A problem with an application server that affects a single local area network (LAN) A problem with a router that connects an entire network to the Internet

A problem with a router that connects an entire network to the Internet Any problem that affects all the users on the network is a network-wide problem and should be given the highest priority. An example of this would be a problem with an Internet router. All other problems listed do not affect the entire network.

You have a problem with a server or other network component that prevents many users from working. What type of problem is this? A network-wide problem A shared resource problem A system-wide problem A user application problem

A shared resource problem If a problem lies within a specific server or other network component that prevents many users from working, it is a shared resource problem. A problem that lies within resources that provide services to the entire network is a network-wide problem. System-wide problems put a specific computer out of commission, preventing a user from getting any work done. An application problem is a problem that affects only a single user's access to a device or application.

Ralph is a new hire working on a network that uses CAT5 unshielded twisted pair cable, which was installed several years ago. Over time, some of the paper labels that the original cable installers used to identify the wall plates and patch panel connectors have worn away or fallen off. As a result, Ralph has quite a few cable runs that he is unable to identify. After checking with his supervisor, Ralph discovers that the company has no cable testing equipment and is unwilling to hire a consultant just to identify cable runs. What is the most inexpensive tool Ralph can use to associate unlabeled wall plates with the correct patch panel ports? A wiremap tester A cable certifier A tone generator and locator A time domain reflectometer

A tone generator and locator

Which of the following are the three main categories of information that you can display by running the netstat command on a Windows computer? (Choose all correct answers.) Connection state Active connections Routing table Interface statistics

Active connections Routing table Interface statistics When you run the netstat command without any switch options, it displays the computer's active connections. Running netstat -e displays the computer's interface statistics. Running netstat -r displays the routing table. There is no netstat switch that displays the computer's connection state.

Ed has discovered that some of the twisted pair cable runs on his newly installed Ethernet network are well over 100 meters long. Which of the following problems is his network likely to experience due to cable segments that are greater than the specified length? Jitter Attenuation Crosstalk EMI

Attenuation Attenuation is the weakening of a signal as it travels long distances, whether on a wired or wireless medium. The longer the transmission distance, the more the signal weakens. Cable length specifications are designed in part to prevent signals from attenuating to the point at which they are unviable

Ed is trying to troubleshoot a problem that has caused a wired network connection to slow down noticeably. Which of the following wired network problems will cause a drastic slowdown of a network connection, without causing it to fail completely? (Choose all correct answers.) Bottleneck Speed mismatch Duplex mismatch TX/RX reversal

Bottleneck Duplex mismatch A speed mismatch or a TX/RX reversal will stop network communication completely.

Alice has been told by a consultant that the newly installed twisted pair cable runs on her network might have split pairs. Which of the following cable testing tools can she use to detect split pairs? Tone generator and locator Wiremap tester Multimeter Cable certifier

Cable certifier Because all of the pins are connected properly, a tone generator and locator cannot detect this fault, and neither can a wiremap tester or a multimeter. However, a cable certifier is a highly sophisticated electronic device that can detect all types of cable faults, including split pairs, as well as measure cable performance characteristics.

Ralph is a new hire for a consulting firm that frequently performs cable installations. He is trying to learn more about the tools needed to install internal cable runs. To that end, which of the following statements about cable crimpers has Ralph found to be true? Cable installers use a crimper to attach keystone connectors to lengths of bulk cable. Cable installers use a crimper to attach RJ45 connectors to lengths of bulk cable. You need to purchase a separate crimper for each type of cable to which you want to attach connectors. Making your own patch cables by applying connectors yourself is always more economical than buying prefabricated patch cables.

Cable installers use a crimper to attach RJ45 connectors to lengths of bulk cable. Installers do not use a crimper to attach a cable end to a keystone connector. For this, they use a punchdown tool. Making patch cables yourself can represent a false economy. Buying bulk cable and connectors and making patch cables yourself can conceivably be cheaper than purchasing prefabricated cables. However, when you factor in the time needed to attach the connectors, the learning curve required to attach the connectors correctly, and the failure rate requiring the re-application of connectors, it might be more economical to purchase prefabricated patch cables in quantity instead.

Alice is working the help desk when a user calls and reports that she is unable to connect to the Internet. Which of the following steps is the one Alice is least likely to perform first when troubleshooting the problem? Check the configuration of the router connecting the LAN to the Internet. Ask the user if she can access resources on the local network. Check to see if anyone else is experiencing the same problem. Check the user's job title to see if she is an important person in the company.

Check the configuration of the router connecting the LAN to the Internet. There are many possible causes for the problem that are more likely than a router configuration error, so this is not something Alice would check first. Asking if the user can access the local network attempts to isolate the problem. If she cannot, the problem could be in her computer; if she can, then the problem lies somewhere in the Internet access infrastructure. If other users are experiencing the problem, then the issue should receive a higher priority, and Alice knows that the problem does not lie in the user's computer. While it might not be the first thing she checks, it is a political reality that higher ranking users get preferential treatment.

Which of the following should a troubleshooter look for when a duplex mismatch is suspected on an Ethernet network? (Choose all correct answers.) Collisions Runt frames CRC (cyclical redundancy check) errors Failed ping tests

Collisions Runt frames CRC (cyclical redundancy check) errors Ping tests do not detect a duplex mismatch because ping only transmits a small amount of data in one direction at a time. The mismatch only becomes apparent when the systems transmit large amounts of data.

Ralph is the network administrator of his company's network. He has had three users call the help desk to report that they are having problems connecting to the local application server. Comparing their stories, Ralph suspects that their Transmission Control Protocol (TCP) connections are being dropped. The users are not having problems connecting to any other hosts on the network. To troubleshoot this problem, Ralph decides to use a protocol analyzer. He wants to store and view only the traffic relating to the hosts and server that are having problems. How can Ralph do this? Configure a display filter. Configure a capture filter. Set a trap on the analyzer. Configure both a capture and a display filter.

Configure a capture filter. Capture filters determine what is stored in the buffer. Display filters only determine what is displayed from the contents of the buffer.

Ralph has to spend the day completing a twisted pair cable installation in his office. Contractors have already pulled the cables through the walls and ceilings. Ralph only has to attach connectors to the ends of the cables, both internal cable runs and patch cables. Which of the following tools will Ralph need? (Choose all correct answers.) Telepole Crimper Punchdown tool Pigtail splicer

Crimper Punchdown tool

Which of the following tools can you use to create your own twisted pair patch cables? (Choose all correct answers.) Punchdown tool Crimper Pliers Wire stripper

Crimper Wire stripper

Which of the following types of interference on a twisted pair network are designed to be prevented by the twists in the wire pairs inside the cable? Crosstalk EMI Attenuation Latency

Crosstalk

Alice has recently installed some new computers onto her Gigabit Ethernet network. To ensure best possible network performance, she has configured the network adapters in the new computers to run at 1 Gbps speed and use full-duplex communication. Once the computers are in service, however, Alice begins getting reports of extremely poor network performance on those machines. She tries running some ping tests and does not see any problem. She calls in a consultant to perform a packet analysis, and the consultant detects large numbers of packet collisions, late collisions, cyclical redundancy check (CRC) errors, and runt frames. Which of the following could be the problem? Duplex mismatch TX/RX reversal Incorrect cable type Damaged cables

Duplex mismatch There should be no collisions at all on a full-duplex network, so the problem is clearly related to the duplexing of the communications. Ethernet running over twisted pair cable, in its original half-duplex mode, detects collisions by looking for data on the transmit and receive pins at the same time. In full-duplex mode, data is supposed to be transmitted and received at the same time. When one side of a connection is configured to use full duplex, as Alice's new computers are, and the other end is configured to use half duplex (as the switches must be), the full-duplex communications on the one side look like collisions to the half-duplex side. The half-duplex adapter transmits a jam signal as a result of each collision, which causes the full-duplex side to receive an incomplete frame. Both sides then start to retransmit frames in a continuing cycle, causing network performance to diminish drastically.

Ed has discovered that some of the twisted pair cables on his newly installed network are running right alongside fluorescent light fixtures in the drop ceiling. Which of the following problems is the network likely to experience due to the cables' proximity to the fixtures? Jitter Attenuation Crosstalk EMI

EMI Fluorescent light fixtures and other devices in an office environment can generate magnetic fields, resulting in electromagnetic interference (EMI). When a copper-based cable runs too near to such a device, the magnetic fields can generate an electric current on the cable that interferes with the signals exchanged by network devices. Jitter, crosstalk, and attenuation are all conditions that can affect the performance of a wired network, but they are not directly related to the cables' proximity to light fixtures.

Which of the following statements about multitiered technical support organizations are true? (Choose all correct answers.) Help calls are always escalated to second-tier technicians when they involve mission-critical network components such as routers. First-tier technicians generally handle desktop problems. Second-tier technicians are generally less experienced than first-tier technicians. First-tier technicians are generally less experienced than second-tier technicians.

Help calls are always escalated to second-tier technicians when they involve mission-critical network components such as routers. First-tier technicians generally handle desktop problems. First-tier technicians are generally less experienced than second-tier technicians.

Ralph has two computers that he long ago networked together by plugging one end of an Ethernet cable into each machine. He recently bought an old Ethernet hub at a garage sale and wants to use it to expand his network. The hub has four numbered ports and a fifth port marked with an X. Ralph plugs one computer into port 1 using his existing cable and buys a new cable to plug the other computer into port 4. The two computers cannot communicate, however. Which of the following solutions will not enable his computers to communicate? Move the port 4 cable to port 2. Replace the old cable with a second new one. Plug the computer with the old cable into the X port. Plug the computer with the new cable into the X port.

Move the port 4 cable to port 2. The problem is unlikely to be a bad hub port or a bad cable, so moving the cable from port 4 to port 2 will not help. The problem is the crossover circuit between the two computers. The two systems were once connected directly together, which means that Ralph was using a crossover cable. The hub also provides a crossover circuit (except in the X port), and old hubs often do not autonegotiate crossovers. Therefore, the connection has two crossovers, which is the equivalent of wiring transmit pins to transmit pins, instead of transmit pins to receive pins. All of the other options eliminate one of the crossover circuits, enabling the computers to be wired correctly.

Which of the following tools can you use to test the optical loss in a fiber-optic cable? An OLTS A TDR A light meter A wiremap tester

OLTS An optical loss test set (OLTS) identifies signal loss in fiber optic cabling. A time domain reflectometer (TDR) measures electrical signals in copper-based cabling, not light signals. A light meter measures the strength of light signals on fiber optic cable, but it cannot generate the signal needed to test optical loss. Wiremap testers are used only on copper cables, not fiber optic.

Ralph recently bought an old Ethernet hub and some twisted pair cables at a garage sale and wants to use them to build a home network. He plugs two computers into the hub using the cables but finds that the computers are unable to communicate. Then he notices that one of the ports in the hub is labeled with an X. He tries plugging one of the computers into the X port, and now they can communicate. Which of the following statements is the most likely explanation for this behavior? The hub has a bad port. One of the cables is a crossover cable. Both of the cables are crossover cables. The X port provides extra strength to the signals.

One of the cables is a crossover cable. Older Ethernet hubs do not autonegotiate crossovers. Instead, they have an X (or uplink) port that provides a connection without a crossover circuit, so you can connect one hub to another. If both of the cables had been standard straight-through Ethernet cables or if both had been crossover cables, then plugging them into two regular ports should have worked. Because plugging one cable into the X port worked, this means that only one of the cables must be a crossover cable. The problem, therefore, was the cable, not the port. The X port does not provide extra strength to the signals.

Ralph is testing a twisted pair cable run using a tone generator and locator. When he applies the tone generator to one particular wire at one end of the cable, he fails to detect a tone at the other end. Which of the following faults has Ralph discovered? Open Short Split pair Crosstalk

Open

Which of the following statements about prioritizing help calls are true? (Choose all correct answers.) Individual desktop problems take precedence over problems with shared resources. Problems with shared resources take precedence over individual desktop problems. Departmental problems take precedence over network-wide problems. Network-wide problems take precedence over departmental problems.

Problems with shared resources take precedence over individual desktop problems. Network-wide problems take precedence over departmental problems.

Which of the following troubleshooting tools enables you to copy all of the packets transmitted over a network to a buffer, interpret the protocols used in the packets, and display the output? Event Viewer Traffic monitor Protocol analyzer Management console

Protocol analyzer

A single Windows user suddenly can't connect to any hosts on the network (local or remote). Alice interviews the user and finds out that he made some changes to his computer's Internet Protocol (IP) configuration properties. What should she do next? Run the ipconfig command to view the local configuration Check the Domain Name System (DNS) server to see if it is resolving IP hostnames Check the Windows Internet Name Service (WINS) server to see if it is resolving Network Basic Input/Output System (NetBIOS) names Verify that the router is functioning

Run the ipconfig command to view the local configuration If the router, DNS server, or WINS server were causing the problem, more than one user would be experiencing the problem.

Ed is trying to troubleshoot a problem with his wired network, and his research has led him to a list of possible network faults. The list is rather old, however, and Ed is wondering if some of the problems are relevant. Which of the following wired network problems no longer occur with modern Gigabit Ethernet switches and network adapters in their default configurations? (Choose all correct answers.) Bottleneck Speed mismatch Duplex mismatch TX/RX reversal

Speed mismatch Duplex mismatch The Gigabit Ethernet standards call for switches and network adapters to support autonegotiation by default, which enables devices to communicate and select the best network speed and duplex mode available to them both

Ed is trying to troubleshoot a problem that has caused a wired network connection to fail completely. Which of the following wired network problems will cause a complete failure of a network connection? (Choose all correct answers.) Bottleneck Speed mismatch Duplex mismatch TX/RX reversal

Speed mismatch TX/RX reversal A speed mismatch on a wired network only occurs when two devices are configured to use a specific transmission speed and those speeds are different. In that case, network communication stops. For network communication to occur on a twisted pair network, transmit (TX) pins must be connected to receive (RX) pins. If the connections are reversed, no communication occurs. Bottlenecks and duplex mismatches will slow down network communications, but they will not stop them dead.

Which of the following types of wiring faults cannot be detected by a wiremap tester? Split pairs Open circuits Short circuits Transposed wires

Split pairs A wiremap tester consists of a main unit that connects to all eight wires of a UTP cable at once and a loopback device that you connect to the other end, enabling you to test all of the wires at once. A wiremap tester can detect opens and shorts, as well as transposed wires. However, it cannot detect split pairs because, in that fault, the pins are properly connected.

Which of the following application layer protocols includes a program that enables a user to log on to a network device and execute commands on the remote system using a command-line interface? (Choose all correct answers.) Telnet File Transfer Protocol (FTP) Simple Network Management Protocol (SNMP) Domain Name System (DNS) Nslookup

Telnet File Transfer Protocol (FTP) Both Telnet and FTP are protocols that include command-line client applications, with Telnet providing terminal emulation and FTP file transfer functionality.

Alice is troubleshooting a Windows server, and while doing so she runs the following command: ping 127.0.0.1. The command completes successfully. What has Alice proven by doing this? That the computer's network adapter is functioning properly That the computer's TCP/IP networking stack is loaded and functioning That the computer's IP address is correct for the network Nothing at all

That the computer's TCP/IP networking stack is loaded and functioning The IP address 127.0.0.1 is a dedicated loopback address that directs outgoing IP traffic directly into the incoming IP traffic buffer. A successful ping test using that address indicates that the computer's TCP/IP stack is functioning properly, but the traffic never reaches the network adapter or the network, so the test does not confirm that the adapter is functioning or that the computer has a correct IP address for the network.

Ralph is working on his company's perimeter network, which has five web servers running Linux, a Cisco router, a CSU/DSU providing a leased line connection, and a Windows-based firewall. While trying to troubleshoot a network communications failure, Ralph types the following command on one of the systems: traceroute adatum.com. Which of the following systems might Ralph be working on? (Choose all correct answers.) The Windows-based firewall The Cisco router The CSU/DSU console One of the Linux web servers

The Cisco router One of the Linux web servers Both Linux and the Cisco IOS operating systems have the traceroute utility. Windows has a version of the utility, but it's called tracert. The CSU/DSU cannot run a traceroute command.

Ralph is attempting to access a Domain Name System (DNS) server located on the other side of a router, but his attempt fails with an error stating that the destination port UDP 53 is unreachable. His first step in troubleshooting the problem is to try using the Nslookup utility to access that specific DNS server. This too fails. Next, he uses the ping utility with the DNS server's IP address. The ping test is successful, indicating that the server is up and running. Which of the following are possible causes of the problem? (Choose all correct answers.) The router connecting the networks is not running DNS and will not forward this type of datagram. The DNS process on the remote server is not running. The TCP/IP host configuration on your computer is improperly configured. The TCP/IP host configuration on the DNS server computer is improperly configured. There is a firewall blocking the DNS server's UTP 53 port.

The DNS process on the remote server is not running. There is a firewall blocking the DNS server's UTP 53 port. The TCP/IP client on the server is operating, as verified by the ping utility. This means that the IP host configurations on Ralph's computer and on the DNS server are both functioning.

Ralph is working on his company's perimeter network, which has five web servers running Linux, a Cisco router, a CSU/DSU providing a leased line connection, and a Windows-based firewall. While trying to troubleshoot a network communications failure, Ralph types the following command on one of the systems: ping 192.168.1.76. Which of the following systems might Ralph be working on? (Choose all correct answers.) The Windows-based firewall The Cisco router The CSU/DSU console One of the Linux web servers

The Windows-based firewall The Cisco router One of the Linux web servers Windows, Linux, and the Cisco IOS operating systems all include the ping utility. The CSU/DSU cannot run a ping command.

Ed is working the help desk at a local computer store, and he receives a call from a customer trying to set up a home network using Windows 10 and wired Ethernet equipment. The customer reports that, from her computer, she can see the two other computers in the house, but she cannot access the Internet. Ed asks her to run the ipconfig /all command and read the results to him. She says that her IP address is 172.16.41.2, her subnet mask is 255.255.255.0, and her default gateway is 172.16.43.1. Which of the following is most likely the cause of the customer's problem? The customer's network cable is unplugged. The customer has an incorrect subnet mask. The customer has an incorrect default gateway address. The computer's DNS record contains the wrong information.

The customer has an incorrect default gateway address. Because the customer can access the other two computers in the house, Ed knows that her IP address and subnet mask are properly configured that the network cable is plugged in and functional. Ed also knows that the computer's DNS record does not play a role in outgoing connections. The problem is most likely the default gateway because the gateway address the customer specified is on another network, 172.16.43.0, rather than on her own network, 172.16.41.0.

Ed is working the help desk at a local computer store, and he receives a call from a customer trying to set up a home network using Windows 10 and wired Ethernet equipment. The customer reports that, from her computer, she cannot access the two other computers in the house, nor can she access the Internet. Ed asks her to run the ipconfig /all command and read the results to him. She says that her IP address is 172.16.41.2, her subnet mask is 255.255.255.0, and her default gateway is 172.16.43.1. Which of the following could conceivably be the cause of the customer's problem? (Choose all correct answers.) The customer has an incorrect IP address. The customer has an incorrect subnet mask. The customer has an incorrect default gateway address. The computer's DNS record contains the wrong information.

The customer has an incorrect subnet mask. The customer has an incorrect default gateway address.

Ed is working the help desk at a local computer store, and he receives a call from a customer trying to set up a home network using Windows 10 and wired Ethernet equipment. The customer reports that she cannot access the other two computers in the house, nor can she access the Internet. Ed asks her to run the ipconfig /all command and read the results to him. She says that her IP address is 192.168.0.2, her subnet mask is 255.255.255.0, and her default gateway is 192.168.0.1. Which of the following is most likely the cause of the customer's problem? The customer's network cable is unplugged. The customer's network address cannot include a zero. The customer has an incorrect subnet mask. The customer has an incorrect default gateway address.

The customer's network cable is unplugged. The customer's IP address, subnet mask, and default gateway are appropriate for her home network. There is nothing wrong with having a zero in the network address. Therefore, of the options presented, the only logical choice is that the network cable is unplugged.

Alice has a network with a Domain Name System (DNS) server, a proxy server, and an Internet router. A user is complaining that she suddenly can't connect to hosts on her own local area network (LAN) and other internal LANs, and she can't access hosts on the Internet. What is the likeliest problem? The user's local configuration The proxy server The DNS server The router

The user's local configuration A DNS, proxy, or router problem would affect more than one user.

Ralph is testing some newly installed twisted pair cable runs on his network using a wiremap tester, and he has found one run that appears to have a cable break. However, the connectors at both ends are correctly installed, so the break must be somewhere inside the cable itself, which is nearly 100 meters long. Which of the following tools can Ralph use to determine the location of the cable break? (Choose all correct answers.) Tone generator and locator Multimeter Time domain reflectometer Cable certifier

Time domain reflectometer Cable certifier

A user reports that she can't connect to a server on her network. Ed wants to identify the scope of the problem, so he tries to reproduce the problem on the user's computer. The problem still remains. No other users are reporting this problem. What is the next logical step that Ed should perform to identify the affected area? Verify that the local router is forwarding traffic Try performing the same task on a computer attached to the same segment Verify that the server is configured properly Verify that the switch the client is connected to is functioning

Try performing the same task on a computer attached to the same segment In this scenario only one user is reporting a problem. Therefore, the likeliest next step is to perform the same task on another computer attached to the same segment.

Users are having trouble connecting to Internet hosts. Alice suspects that there is a problem with the Domain Name System (DNS) server, and she wants to verify this. Which of the following steps can she take to determine whether the DNS server is resolving Internet hostnames? Issue the ipconfig command from a local workstation Try to connect to a host using the Internet Protocol (IP) address instead of the hostname Ping the DNS server to see if it is functioning Use the tracert command to test the functionality of the DNS server

Try to connect to a host using the Internet Protocol (IP) address instead of the hostname

Ralph has been asked to create some new patch cables that will be used to connect patch panel ports to the network switches. He has been told that the patch panel connectors are all wired using the T568A pinout standard. Which of the following instructions should Ralph use when creating the patch cables? Use T568A at both ends Use T567B at both ends Use T568A at one end and T568B at the other end Use either standard, as long as both ends are the same

Use either standard, as long as both ends are the same Either the T568A or the T568B pinout standard is acceptable. The patch cables will function properly as long as both ends are wired using the same pinout standard.

Which of the following are not general troubleshooting steps? (Choose all correct answers.) Identify the problem Establish a theory of probable cause Test the theory to determine cause Verify that the client's Internet Protocol (IP) configuration is correct Establish a plan of action to resolve the problem and identify potential effects Verify that the router is forwarding. Implement the solution or escalate as necessary Verify full system functionality and, if applicable, implement preventive measures Document findings, actions, and outcomes

Verify that the client's Internet Protocol (IP) configuration is correct Verify that the router is forwarding.

Which of the following Windows command-line utilities produced the output shown here? Active Connections &nbsp; Proto Local Address Foreign Address State TCP 127.0.0.1:5327 CM412:49770 ESTABLISHED TCP 127.0.0.1:49770 CM412:5327 ESTABLISHED TCP 127.0.0.1:52114 CM412:52115 ESTABLISHED ping tracert netstat arp

netstat Running the Windows netstat utility with no parameters generates a list of the workstation's active connections.

Which of the following command-line utilities enables you to generate Domain Name System (DNS) request messages? ifconfig nslookup nbtstat netstat

nslookup The nslookup tool enables you to generate DNS request messages from the command line and send them to a specific DNS server. The other options listed are not DNS utilities.

Which of the following utilities can you use to view resource record information on a particular DNS server? (Choose all correct answers.) netstat nslookup nbtstat arp dig

nslookup dig nslookup and dig are both command-line utilities that you can direct to a specific DNS server and then generate queries that display resource record information the program retrieves from the server. netstat displays information about networking protocols, whereas nbtstat displays information derived from the system's NetBIOS over TCP/IP implementation. arp is a tool that you can use to display and manage a system's ARP table entries. netstat, nbtstat, and arp are not able to display resource record information.

Which of the following command-line utilities is capable of performing the same basic function as traceroute or tracert? ping pathping netstat route

pathping

Which of the following Windows command-line utilities produced the output shown here? Reply from 97.74.144.153: bytes=32 time=111ms TTL=53 Reply from 97.74.144.153: bytes=32 time=109ms TTL=53 Reply from 97.74.144.153: bytes=32 time=108ms TTL=53 Reply from 97.74.144.153: bytes=32 time=109ms TTL=53 &nbsp; Statistics for 97.74.144.153: Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 108ms, Maximum = 111ms, Average = 109ms ping tracert netstat arp

ping

Which of the following command-line utilities can run on both Windows and Unix/Linux systems? (Choose all correct answers.) ping traceroute ifconfig iptables nslookup

ping nslookup The ping and nslookup utilities can both run on Windows or Unix/Linux systems. The traceroute command runs only on Unix/Linux, although there is a Windows version called tracert. The ifconfig and iptables commands only exist on Unix and Linux systems.

Ralph is the administrator of his company's network. All of the users on the network are reporting that they are having difficulty connecting to a particular application server that is located on a perimeter network, on the other side of a router. The users are not having trouble connecting to local hosts. Which of the following troubleshooting tools can Ralph use to verify the network layer functionality of the application server and the router? (Choose all correct answers.) ping route arp traceroute

ping traceroute Ralph can use the ping and traceroute tools to verify the network layer functionality of the application server and the router. The ping tool tests the network layer through the exchange of Internet Control Message Protocol (ICMP) Echo and Echo Reply messages. The traceroute tool can verify that there is a functioning path between the users' workstations and the application server. The route tool is used to administer the routing table on the local machine. The arp tool is used to view a computer's Media Access Control (IP to MAC) address resolution table stored in memory.

While performing a protocol analysis, Alice notes that there are many ICMP packets in her captured traffic samples. She attributes these to her frequent use of TCP/IP troubleshooting tools. Which of the following utilities are used to test network layer characteristics of a host using Internet Control Message Protocol (ICMP) messages? (Choose all correct answers.) ipconfig netstat ping tracert

ping tracert

Running ping to specify the size of the messages sent to the target, in this case, 2028 bytes. Specify the number of messages the ping tool should transmit, in this case 11. ping 10.0.0.1 -t ping 10.0.0.1 -n 2048 ping 10.0.0.1 -l 2048 -n 11 ping 10.0.0.1 -l 2048 -t ping 10.0.0.1 -n 2048 -t 11

ping 10.0.0.1 -l 2048 -n 11

Ed suspects that his workstation is experiencing TCP/IP communication problems. Which of the following commands can he use to confirm that the computer's TCP/IP stack is loaded and functioning? (Choose all correct answers.) ping loopback ping localhost ping 127.0.0.1 ping 127.0.0.0

ping localhost ping 127.0.0.1

Ralph is a network administrator who has had a Windows user report difficulties accessing certain other computers on the network. Ralph determines that the user is only experiencing problems when trying to connect to a system on the far side of a router. Ralph therefore decides to inspect the routing table on the user's computer. Which of the following tools can he use to do this? (Choose all correct answers.) nbtstat route nslookup netstat

route netstat The route print tool displays the contents of the routing table on a Windows computer. So does the netstat -r command. The nbtstat and nslookup tools cannot display the routing table.

Which of the following Windows command-line utilities produced the output shown here? 1 <1 ms <1 ms <1 ms RT-N86U [192.168.2.99] 2 3 ms 5 ms 4 ms 192.168.3.1 3 25 ms 30 ms 17 ms 10.172.1.1 4 20 ms 19 ms 29 ms gateway-BE1-EBlocal.eh.lpod.net [207.44.123.89] ping tracert netstat arp

tracert


Set pelajaran terkait

CompTIA A+ Exam 220-1001 - Troubleshooting Quiz

View Set

1st conditional + future time clauses

View Set

WHAP: The Ultimate Guide to World History

View Set

ACCT 4631 - Internal Auditing: HW 11

View Set

Chapter 14-16-16 Microbiology Exam 2

View Set

81-100 100 Most Misspelled Words Practice

View Set

California Real Estate Principles

View Set