Network + Chapter 18 - 20
You need to monitor the temperature of your server room. What device should you use?
A temperature monitor
You want to monitor your UPS systems and make sure they are functioning correctly. What device should you use?
A voltage event recorder
A standard of normal network performance is called (blank)
A baseline
What type of device is used to put an RJ-45 end on a Cat 5e cable?
A cable stripper/crimper
You have upgraded the firmware on your switches and access points. What documentation do you need to update? A. Baselines and configuration documentation B. Physical network diagram C. Logical network diagram D. Wiring schematics
A. Baselines and configuration documentation A physical network diagram contains all the physical devices and connectivity paths on your network and should accurately picture how your network physically fits together in detail. This document will also have the firmware revision on all the switches and access points in your network.
Where is the IDS/IPS software typically placed within a network? A. Between the internal router and the firewall connected to the ISP B. Between the printer and the router connected to the ISP C. Between the computer and the switch configured with VLANs D. Between the firewall and the router connected to the email server
A. Between the internal router and the firewall connected to the ISP Remember that firewalls are the first line of defense for an Internet-connected network. If a network was directly connected to the Internet without a firewall, an attacker could theoretically gain direct access to the computers and servers on that network with little effort. The IDS/IPS software is usually positioned between your internal router and the firewall to the outside network (Internet).
You are troubleshooting a LAN switch and have identified the symptoms. What is the next step you should take? A. Escalate the issue. B. Create an action plan. C. Implement the solution. D. Determine the scope of the problem.
A. Escalate the issue. Once you have determined that the switch or the configuration of the switch is the problem, you need to escalate the issue.
When troubleshooting an obscure network problem, what physical conditions should be reviewed to make sure the network device is operating correctly? (Choose all that apply.) A. Excessive heat B. Low/excessive humidity C. ESD problems D. None of the above
A. Excessive heat B. Low/excessive humidity C. ESD problems From a design standpoint, the physical environment for a server should be optimized for items such as placement, temperature, and humidity. When troubleshooting, don't forget to check the physical conditions under which the network device is operating. Check for problems such as those mentioned here as well as EMI/RFI problems, power problems, and unplugged cables.
In an ICS, which of the following uses coded signals over communication channels to acquire information about the status of the remote equipment? A. ICS server B. Telemetry system C. Human interface D. PLC
A. ICS server An ICS server, also called a data acquisition server, uses coded signals over communication channels to acquire information about the status of the remote equipment for display or for recording functions.
Which of the following are reasons to optimize network performance? (Choose all that apply.) A. Maximizing uptime B. Minimizing latency C. Using VoIP D. Using video applications E. None of the above
A. Maximizing uptime B. Minimizing latency C. Using VoIP D. Using video applications There are many bandwidth-intensive programs, like VoIP and video streaming. These are just a few of the reasons it's necessary to try to optimize network performance.
Which device would be used to measure voltage? A. Multimeter B. OTDR C. Butt set D. Toner probe
A. Multimeter A multimeter, or a volt/ohm meter (VOM), is used to measure voltage, current, and resistance.
Which is a tool in the network scanner category (Choose all that apply.) A. Packet sniffers B. IDS/IPS software C. Port scanners D. None of the above
A. Packet sniffers B. IDS/IPS software C. Port scanners Yep, all of the above. The CompTIA Network+ objectives cover all three in regard to tools used to analyze today's networks.
Which tool would be used to connect wire between two punch-down block blades? A. Punch-down tool B. Crimper C. Snips D. Strippers
A. Punch-down tool I hope you said A! A punch-down tool would be used if you needed to connect wire to a punch-down block. Most networks today have wiring closets, and to terminate the cables, you're certain to need a punch-down tool.
To optimize performance on your network, which of the following control traffic in some way? (Choose all that apply.) A. QoS B. Traffic shaping C. Load balancing D. Caching services E. None of the above
A. QoS B. Traffic shaping C. Load balancing D. Caching services There are many theories and strategies you can apply to optimize performance on your network. All of them deal with controlling the traffic in some way. Strategies include QoS, traffic shaping, load balancing, high availability, and the use of caching servers. You want to ensure that you have plenty of bandwidth available for those applications that need it, such as critical service operations, VoIP, and real-time multimedia streaming.
Which of the following are not steps in the Network+ troubleshooting model? (Choose all that apply.) A. Reboot the servers. B. Identify the problem. C. Test the theory to determine the cause. D. Implement the solution or escalate as necessary. E. Document findings, actions, and outcomes. F. Reboot all the routers.
A. Reboot the servers. F. Reboot all the routers. Rebooting servers and routers are not part of the troubleshooting model.
Which of the following identifies steps to recover from adverse effects caused by a change? A. Rollback process B. Approvable process C. Notification process D. Impact assessment
A. Rollback process Those making the changes should be completely briefed in rollback procedures, and they should exhibit a clear understanding of them prior to implementing the changes.
A user is experiencing problems logging in to a Unix server. He can connect to the Internet over the LAN. Other users in the same area aren't experiencing any problems. You attempt logging in as this user from your workstation with his username and password and don't experience any problems. However, you cannot log in with either his username or yours from his workstation. What is a likely cause of the problem? A. The Caps Lock key is pressed. B. The network hub is malfunctioning. C. You have a downed server. D. You have a jabbering NIC.
A. The Caps Lock key is pressed. Because other users in the same area aren't having a problem, it can't be a downed server, network hub, or jabbering NIC. And because both you and the user can't log in, more than likely it's a problem specific to that workstation. The only one that would affect your ability to log in from that station is the Caps Lock key being pressed. That will cause the password to be in all uppercase (which most server operating systems treat as a different password), and thus it will probably be rejected.
Which of the following tools can test a port on a device? A. Cable certifier B. Loopback plug C. Butt set D. Toner probe
B. Loopback plug A loopback test is a diagnostic procedure in which a signal is transmitted and returned to the sending device after passing through all or a portion of a network or circuit. A loopback plug makes this test possible.
A user calls you, reporting a problem logging in to the corporate intranet. You can access the website without problems using the user's username and password. At your request, the user has tried logging in from other workstations but has been unsuccessful. What is the most likely cause of the problem? A. The user is logging in incorrectly. B. The network is down. C. The intranet server is locked up. D. The server is not routing packets correctly to that user's workstation.
A. The user is logging in incorrectly. Because the user can't log in correctly from any machine, more than likely he is using the wrong procedure for logging in. Because no one else is having that problem (including yourself), the problem must be related to that user.
You need to trace cables in multiple-pair wiring. What tool will you use? A. Toner probe B. IDS C. Cable tester D. Butt set
A. Toner probe A toner probe sends a signal down a pair of wires so that the wires can be traced. Typically, a butt set is used to find this signal, but toner probe is the best answer to this question.
Which network-performance optimization technique can delay packets that meet certain criteria to guarantee usable bandwidth for other applications? A. Traffic shaping B. Jitter C. Logical D. Load balancing
A. Traffic shaping, also known as packet shaping, is a form of bandwidth optimization. It delays packets that meet a certain criteria to guarantee usable bandwidth for other applications. Essentially, with traffic shaping, you're delaying some traffic so other traffic can get through. Traffic shaping uses bandwidth throttling to ensure that certain data streams don't send too much data in a specified period of time.
(Blank) is a type of power converter that specifically converts DC to AC.
An inverter
When a signal moves through any medium, the medium itself will degrade the signal. What is this called?
Attenuation
Which pins are switched in a crossover cable? A. 1 and 2, 3 and 4 B. 1 and 3, 2 and 6 C. 2 and 4, 5 and 7 D. 1 and 4, 5 and 8
B. 1 and 3, 2 and 6 On a crossover cable, one connector has flipped the wires. Specifically, pins 1 and 3 get switched, and pins 2 and 6 get switched.
A user can't log in to the network. She can't even connect to the Internet over the LAN. Other users in the same area aren't experiencing any problems. You attempt to log in as this user from your workstation with her username and password and don't experience any problems. However, you cannot log in with either her username or yours from her workstation. What is a likely cause of the problem? A. Insufficient rights to access the server B. A bad patch cable C. Server down D. Wrong username and password
B. A bad patch cable Because of all the tests given and their results, you can narrow the problem down to the network connectivity of that workstation. And because no other users in her area are having the same problem, it can't be the hub or server. You can log in as the user from your workstation, so you know it isn't a rights issue or username/password issue. The only possible answer listed is a bad patch cable.
Load testing, connectivity testing, and throughput testing are all examples of what? A. Load balancing B. Network monitoring C. Packet sniffing D. Traffic shaping
B. Network monitoring Network monitoring can have several names, including load testing, connectivity testing, and throughput testing. You will also hear network monitors referred to as protocol analyzers.
Which of the following provides increased availability to firewalls and gateways? A. DHCP B. CARP C. SaaS D. NaaS
B. CARP Common Address Redundancy Protocol (CARP) can be used to increase availability of gateways and firewalls.
Which device should be used if you need to determine whether your network meets ISO or TIA standards? A. Angry IP B. Certifiers C. Nmap D. Routing table
B. Certifiers A certifier is a combination cable tester and network analyzer, only better. It can test the performance and response times of network resources and certify your full Category 6 cable installation at the same time.
Several users can't log in to the server. Which action would help you to narrow the problem down to the workstations, network, or server? A. Run tracert from a workstation. B. Check the server console for user connections. C. Run netstat on all workstations. D. Check the network diagnostics.
B. Check the server console for user connections. Although all of these are good tests for network connectivity, checking the server console for user connections will tell you whether other users are able to log into the server. If they can, the problem is most likely related to one of those users' workstations. If they can't, the problem is either the server or network connection. This helps narrow down the problem.
You have a user who cannot connect to the network. What is the first thing you could check to determine the source of the problem? A. Workstation configuration B. Connectivity C. Patch cable D. Server configuration
B. Connectivity You need to check basic connectivity. The link light indicates that the network card is making a basic-level connection to the rest of the network. It is a very easy item to check, and if the link light is not lit, it is usually a very simple fix (like plugging in an unplugged cable).
Which tool is used to attach an RJ-45 connector to a Cat 5 cable? A. Punch-down tool B. Crimper C. Snips D. Strippers
B. Crimper A wire crimper, or crimper, is used for attaching ends onto different types of network cables.
When wireless users complain that they are losing their connection to applications during a session, what is the source of the problem? A. Incorrect SSID B. Latency C. Incorrect encryption D. MAC address filter
B. Latency When wireless users complain that the network is slow (latency) or that they are losing their connection to applications during a session, it is usually latency arising from a capacity issue.
What tool would you use to both find a break in a fiber-optic connection and test the fiber connectivity on the network? A. Multimeter B. OTDR C. Butt set D. Toner probe
B. OTDR An optical time-domain reflectometer (OTDR) is an optoelectronic instrument used to give you the skinny on optical fibers. It works by putting out a series of optical pulses into the specific fiber you want to test and can tell you if a break in the fiber has occurred and where.
A workstation presents an error message to a user. The message states that a duplicate IP address has been detected on the network. After establishing what has changed in the network, what should be the next step using the standard troubleshooting model? A. Test the result. B. Select the most probable cause. C. Create an action plan. D. Identify the results and effects of the solution.
B. Select the most probable cause. According to the Network+ troubleshooting model, the next step would be step 2, establishing the most probable cause.
You need to create a cable that will connect your host to a wall jack connection. Which of the following will you use? A. IDS/IPS B. Snips C. Coax cable strippers D. Multimeter
B. Snips To create a patch cable (568A) to connect your host to a jack in the wall, you need to use a snip.
Which type of cable will have the pins in the same order on both connectors? A. Crossover cable B. Straight-through cable C. Console cable D. Telephone cable
B. Straight-through cable Straight-through cables, known as drop cables or patch cables, will have the pins in the same order on both connectors.
Which of the following can check the speed and condition of the signal on a cable, measure the time it takes to send a signal down the wire and back, and find the exact location of a break? A. Multimeter B. TDR C. Tone generator D. Event recorder
B. TDR A time-domain reflectometer (TDR) is a tool that finds and describes faults in metallic cables like twisted wire pairs and coaxial cables. The equivalent device for optical fiber is an optical time-domain reflectometer (OTDR). A TDR can also check the speed and condition of the signal on the cable.
You install new switches in your server room and are now experiencing network instability and other issues across all servers in the rack. Which device would be used to alert you of a system overheating? A. Voltage event recorder B. Temperature monitor C. Surge protector D. Probe
B. Temperature monitor Electronic devices are prone to overheating, which is why you should use a temperature monitor.
Users are reporting that they can access the Internet but not the internal company website. Which of the following is the most likely problem? A. The DNS entry for the server is non-authoritative. B. The intranet server is down. C. The DNS address handed out by DHCP is incorrect. D. The default gateway is incorrect.
B. The intranet server is down. Since users can get to the Internet, this means the DNS server is working and they have the correct default gateway. The intranet server is probably down.
You have added a new cable segment to your network. You need to make sure you document this for troubleshooting purposes. What should you update? A. The disaster recovery plan B. The wiring schematics C. The router connections document D. The baseline document
B. The wiring schematics If you add a new cable segment to the network, you need to update the wiring schematics document.
You can ping the local router and web server that a local user is trying to reach, but you cannot reach the web page that resides on that server. From step 2 of the troubleshooting model, what is a possible problem that would lead to this situation? A. Your network cable is unplugged. B. There is a problem with your browser. C. Your NIC has failed. D. The web server is unplugged.
B. There is a problem with your browser. Because you cannot reach the web page that resides on the server, the problem is most likely related to your browser.
The lowest level of QoS is called (blank)
Best effort
Which of the following options is not a function of a TDR? A. Estimate cable lengths B. Find splice and connector locations and their associated loss amounts C. Display unused services D. Determine cable-impedance characteristics E. Send a signal down a cable and measure how long it takes to come back
C. Display unused services Due to sensitivity to any variation and impedance, options A, B, D, and E are all reasons you'd use a TDR.
What is the technical term for what happens when two objects of dissimilar charge come in contact? A. RFI B. EMI C. ESD D. Crosstalk
C. ESD Electrostatic discharge (ESD) is the technical term for what happens when two objects of dissimilar charge come in contact.
On which of the following would a technician use a punch-down tool? A. RJ-45 connector B. CSU/DSU C. 110 block D. Fiber ST connector
C. 110 block A punch-down tool is used to punch down an RJ-45 cable to an insulation displacement connector, typically a 110 block.
Which of the following is neither a virtualization component nor a service made available through virtualization? A. Virtual servers B. SaaS C. CARP D. Virtual switches
C. CARP Common Address Redundancy Protocol (CARP) can be used to increase availability of gateways and firewalls. It is not related to virtualization.
What is the purpose of packet sniffers? A. Discarding frames B. Sending transmissions from one port to another port C. Looking inside every packet on a network segment D. Stopping malicious behavior on the network
C. Looking inside every packet on a network segment The basic purpose of packet sniffers or network analyzers is to collect and analyze each individual packet that is captured on a specific network segment to determine whether problems are happening. You can also use them to see if there is too much traffic on a segment.
You lose power to your computer room and the switches in your network do not come back up when everything is brought online. After you have identified the affected areas, established the cause, and escalated this problem, what do you do next? A. Start to implement a solution to get those users back online ASAP. B. Create an action plan and solution. C. Meet with the emergency response team to determine the next step. D. Copy all the working routers' configurations to the nonworking switches.
C. Meet with the emergency response team to determine the next step. Once you escalate the problem, you are done with the seven-step model. Meet with the escalation team to determine the next step.
Several users have complained about the server's poor performance as of late. You know that the memory installed in the server is sufficient. What could you use to determine the source of the problem? A. Server's NIC link light B. Protocol analyzer C. Performance-monitoring tools D. Server's system log file
C. Performance-monitoring tools Performance-monitoring tools can give you an idea of how busy the server and the rest of the network are. These tools use graphs to indicate how much traffic is going through the server.
Which of the following govern how the network is configured and operated as well as how people are expected to behave on the network? A. Baselines B. Laws C. Policies D. Procedures
C. Policies Policies govern how the network is configured and operated as well as how people are expected to behave on the network, such as how users are able to access resources and which types of employees get network access.
What is the basic purpose of QoS? (Choose two.) A. Block access to certain websites B. Make your entire network run faster C. Provide priority to one or more types of traffic over others D. Block access to web resources for just certain users or groups E. Prioritize delay-sensitive traffic
C. Provide priority to one or more types of traffic over others E. Prioritize delay-sensitive traffic Quality of service (QoS) is basically the ability to provide different priority to one or more types of traffic over other levels for different applications, data flows, or users so that they can be guaranteed a certain performance level.
UTP cables use which type of connector? A. RJ-11 B. RJ-25 C. RJ-45 D. BNC
C. RJ-45 UTP cables use an RJ-45 connector. RJ-11 and RJ-25 are often used for terminating telephone lines.
What is the purpose of a port scanner? A. Scan UDP for closed ports B. Sweep TCP for closed ports C. Search the network host for open ports D. None of the above
C. Search the network host for open ports Hope you answered C! A port scanner is just a piece of software designed to search a network for open hosts. Administrators of networks use port scanners to ensure security and bad guys use them to compromise it.
You have just implemented a solution and you want to celebrate your success. But what should you do next before you start your celebration? A. Gather more information about the issue. B. Document the issue and the solution that was implemented. C. Test the solution and identify other effects it may have. D. Escalate the issue.
C. Test the solution and identify other effects it may have. After you have implemented a solution, you need to test if the solution works and identify other effects it may have.
What term describes technologies that can deliver voice communications over the Internet? A. Jitter B. Uptime C. Voice over Internet Protocol D. None of the above
C. Voice over Internet Protocol Voice over Internet Protocol (VoIP) is a general term that describes several technologies that are able to deliver voice communications over the Internet or other data networks.
UTP cable has specific colors for the wire associated with each pin. Based on the TIA/EIA 568B wiring standard, what is the correct color order, starting with pin 1? A. White/Orange, Orange, Blue, White/Green, White/Blue, Green, White/Brown, Brown B. Orange, White/Orange, White/Green, Blue, White/Blue, White/Brown, Brown, Green C. White/Orange, Orange, White/Green, Blue, White/Blue, Green, White/Brown, Brown D. White/Green, Green, White/Orange, Blue, White/Blue, Orange, White/Brown, Brown
C. White/Orange, Orange, White/Green, Blue, White/Blue, Green, White/Brown, Brown If you are going to make your own UTP cables (drop/patch cables) to customize length, you need to make sure that the right wires get to the right pins.
You have gathered information on a network issue and determined the affected areas of the network. What is your next step in resolving this issue? A. You should implement the best solution for the issue. B. You should test the best solution for the issue. C. You should check to see if there have been any recent changes to this affected part of the network. D. You should consider any negative impact to the network that might be caused by a solution.
C. You should check to see if there have been any recent changes to this affected part of the network. After determining the affected area, you need to find out if any changes have taken place.
What type of device determines if a cable meets standards specifications?
Cable certifier
What is another name for using virtualization to provide services?
Cloud computing
If you need to connect two PCs directly together using their network adapters, what type of cable do you need?
Crossover
What cable issues should you know and understand for network troubleshooting?
Crosstalk, attenuation, collisions, shorts, open impedance mismatch, interference
If you plug a host into a switch port and the user cannot get to the server or other services they need to access despite a working link light, what could the problem be?
The port has the wrong VLAN assignment.
After a change has been made, which of the following is not a document that needs to be updated? A. Network configurations B. Additions to the network C. Physical location changes D. All of the above
D. All of the above The job isn't complete until the paperwork is complete. In this case, network configurations, additions to the network, and physical location changes should be updated to reflect the changed state of the network.
Which of the following is not a basic physical issue that can occur on a network when a user is connected via cable? A. Crosstalk B. Shorts C. Open impedance mismatch D. DNS configurations
D. DNS configurations Because most of today's networks still consist of large amounts of copper cable, networks can suffer from the physical issues that have plagued all networks since the very beginning of networking (and the answers here are not a complete list). Newer technologies and protocols have lessened these issues but have not resolved them completely.
What is the purpose of wire-map testers? A. Check copper cable for crossed pairs only B. Analyze protocols in software C. Help find unused protocols and remove them from the network D. Detect transposed wires, opens, and shorts in twisted-pair cables
D. Detect transposed wires, opens, and shorts in twisted-pair cables Wire-map testing is the most basic type of testing for twisted-pair cables. It detects transposed wires, opens (broken or unconnected wires), and shorts (wires or pins improperly connected to each other).
You have implemented and tested a solution and identified any other effects the solution may have. What is your next step? A. Create an action plan. B. Close the case and head home for the day. C. Reboot the Windows server. D. Document the solution.
D. Document the solution. After investigating the problem thoroughly and successfully testing and resolving an issue, you need to document the solution.
You receive a call from a user who is having issues connecting to a new VPN. Which is the first step you should take? A. Find out what has changed. B. Reboot the workstation. C. Document the solution. D. Identify the symptoms and potential causes.
D. Identify the symptoms and potential causes. Since this is a new connection, you need to start by troubleshooting and identify the symptoms and potential causes.
Which software tool is used to view network traffic at the frame level? A. TDR B. Multimeter C. Port scanner D. Packet sniffer
D. Packet sniffer Unlike port scanners, packet sniffers actually look inside every packet on a network segment at the frame level.
What can provide different priority levels to different applications, data flows, or users to help guarantee performance levels? A. 1 Gbps connection B. Bandwidth C. Uptime D. Quality of Service
D. Quality of Service QoS provides different priority levels to different applications, data flows, or users so that they can be guaranteed a certain performance level.
Which device monitors incoming voltage levels and overvoltage thresholds? A. Repeater B. Toner probe C. VOM D. Surge protector
D. Surge protector An everyday surge protector monitors the incoming voltage level and trips a circuit breaker when the voltage reaches a certain level, known as the overvoltage threshold.
A user calls you, complaining that he can't access the corporate intranet web server. You try the same address, and you receive a Host Not Found error. Several minutes later, another user reports the same problem. You can still send email and transfer files to another server. What is the most likely cause of the problem? A. The hub is unplugged. B. The server is not routing protocols to your workstation. C. The user's workstation is not connected to the network. D. The web server is down.
D. The web server is down. Because other people are experiencing the problem, most likely it is either network or server related. Because you can transfer files to and from another server, it can't be the network. Thus, the problem is related to the web server.
Which device would most likely be used to locate a specific connection in an unlabeled punch-down block? A. VOM B. Certifier C. TDR D. Toner probe
D. Toner probe Otherwise known as a "fox and hound" wire tracer, a toner probe would be useful in this situation. A toner probe will emit an audible tone when it touches the other end of the cable.
What is step 7 of the seven-step troubleshooting model?
Document findings, actions, and outcomes.
What is step 4 of the seven-step troubleshooting model?
Establish a plan of action to resolve the problem and identify potential effects.
True/False: A TDR is used to test fiber connections.
False
True/False: An IDS box can find and fix a problem as the attack occurs.
False
True/False: A network analyzer will see every packet on every segment of your network at the same time.
False. A typical network analyzer can see only one segment at a time.
True/False: It is okay to scan the DoD network servers with a port scanner.
False. Unless you don't mind prison.
(Blank) are systems that are configured to be attractive to hackers and to lure them into spending time attacking them while information is gathered about the attack.
Honeypots
What is step 5 of the seven-step troubleshooting model?
Implement the solution or escalate as necessary.
Spreading network traffic across multiple connections is called (blank)
Load balancing
How is crosstalk minimized in twisted-pair cabling?
Network designers minimize crosstalk inside network cables by twisting the wire pairs together, putting them at a 90-degree angle to each other.
The steps you should take when, for example, a network user is fired are called (blank)
Procedures
What is it called when a cable has two wires of a twisted pair connected to two wires from a different pair?
Split pairs
What are some of the problems that, if determined, should be escalated?
Switching loops, routing loops, routing problems, Proxy ARP, broadcast storms
What is step 3 of the seven-step troubleshooting model?
Test the theory to determine cause.
Which network-performance optimization technique uses a contract to determine which data can get on to the network?
Traffic shaping
True/False: An IDS box will report an attack but not fix it.
True
True/False: An OTDR is used to test fiber connections.
True
List at least three major components of virtualization.
Virtual servers, virtual switches, virtual desktops, software as a service (SaaS), and network as a service (NaaS)