16

Ace your homework & exams now with Quizwiz!

Class of Service (CoS)

0-Background 0-Best effort 0-Excellent effort 0-Critical applications 0-Video (< 100ms latency) 0-Voice (< 10ms latency) 0-Internetwork control 0-Network control

Which Class of Service (COS) priority value should be assigned to a video conference call?

4

Which of the following components do switches use to optimize network performance by performing switching operations in hardware rather than using the CPU and software?

An application-specific integrated circuit

Which of the following statements about DSCP are true? (Select two.)

Classification occurs at Layer 3. The DiffServ field is used to add precedence values.

Your organization uses a time-keeping application that only runs on Windows 2000 and does not run on newer OS versions. Because of this, there are several Windows 2000 workstations on your network. Last week you noticed unusual activity on your network coming from the Windows 2000 workstations. After further examination, you discover that the Windows 2000 workstations were the victim of a malicious attack and were being used to infiltrate the network. You find out that the attackers were able to gain access to the workstations because of the legacy operating system being used. The organization still needs to use the Windows 2000 workstations, which need to be connected to the internet, but you want to make sure the network is protected from future events. Which solution should you implement to protect the network while also allowing operations to continue as normal?

Configure VLAN membership so that the Windows 2000 workstations are on their own VLAN.

You have a website that uses multiple servers for different types of transactions. For example, one server is responsible for static web content, while another is responsible for secure transactions. You would like to implement a device to speed up access to your web content. The device should be able to distribute requests between the various web servers using specialized hardware, and not just a software configuration. In addition, SSL sessions should use the hardware components in the device to create the SSL sessions. Which type of device should you choose?

Content switch

A user reports that she can't connect to the Internet. After some investigation, you find that the wireless router has been misconfigured. You are responsible for managing and maintaining the wireless access point. What should you do next?

Create an action plan.

Users report that the network is down. As a help desk technician, you investigate and determine that a specific router is configured so that a routing loop exists. What should you do next?

Determine if escalation is needed.

A user reports that she can't connect to a server on your network. You check the problem and find out that all users are having the same problem. What should you do next?

Determine what has changed.

You are a network administrator for your company. A frantic user calls you one morning exclaiming that nothing is working. What should you do next in your troubleshooting strategy?

Establish the symptoms.

A web server on your network hosts the public website for your company. You want to make sure that a failure of the NIC in the server does not prevent the website from being accessible on the internet. Which solution should you implement?

Ethernet bonding

A router periodically goes offline. Once it goes offline, you find that a simple reboot puts the router back online. After doing some research, you find that the most likely cause of the problem is a bug in the router software. A new patch is available from the manufacturer that is supposed to eliminate the problem. What should you do next?

Identify possible effects of the solution.

A user reports that he can't connect to a specific website. You go to the user's computer and reproduce the problem. What should you do next?

Identify the affected areas of the network.

Steps of troubleshooting

Identify the problem. Establish a theory of probable cause. Test the theory to determine the cause. Establish a plan of action. Implement the solution or escalate. Verify full system functionality. Document findings, actions, and outcomes.

A user is unable to connect to the network. You investigate the problem and determine that the network adapter is defective. You replace the network adapter and verify that it works. What should you do next?

Identify the results and effects of the solution.

Your company leases a very fast internet connection and pays for it based on usage. You have been asked by the company president to reduce internet line lease costs. You want to reduce the amount of web pages that are downloaded over the leased connection without decreasing performance. What is the best way to do this?

Install a proxy server.

Which of the following devices accepts incoming client requests and distributes those requests to specific servers?

Load balancer

Which type of switch optimizes network performance by using ASIC to perform switching at wire speed?

Multilayer switch

Layer 3 switch

Multiple broadcast domains

Router

Multiple broadcast domains

You are in the process of implementing a network access protection (NAP) infrastructure to increase your network's security. You are currently configuring the remediation network that non-compliant clients will connect to in order to become compliant. The remediation network needs to be isolated from the secure network. Which technology should you implement to accomplish this task?

Network segmentation

What is the purpose of using Ethernet bonding? (Select two.)

Provides a failover solution for network adapters. Increases network performance.

802.11n wireless access point

Single broadcast domain

Bridge

Single broadcast domain

Hub

Single broadcast domain

Repeater

Single broadcast domain

Unmanaged switch

Single broadcast domain

Which of the following devices is used on a LAN and offers guaranteed bandwidth to each port?

Switch

You are a network administrator for your company. A user calls and tells you that after stepping on the network cable in her office, that she can no longer access the network. You go to the office and see that one of the user's stiletto heels has broken and exposed some of the wires in the Cat 5 network cable. You make another cable and attach it from the wall plate to the user's computer. What should you do next in your troubleshooting strategy?

Test the solution.

Computes lost/sent packet statistics for each hop in the route between two hosts.

pathping

Tests connectivity between two network hosts by sending IPv4 ICMP Echo Request packets without modifying the TTL parameter.

ping

Tests connectivity between two network hosts by sending IPv6 ICMP Echo Request packets without modifying the TTL parameter.

ping -6

pathping Used on Linux systems to identify the route between two IPv6 hosts.

traceroute6

Used on Windows systems to identify the route between two IPv4 hosts.

tracert


Related study sets

Weathering, Erosion, and Geologic Time

View Set

A&P Lab: Set 5: Body Orientation and Direction

View Set

Chapter 9: Managing Linux Processes

View Set