5.0 Network Trouble Shooting Flashcards

1
Q

You need to increase the area that is covered by your wireless network to include another building. You decide to use a signal bounce. All of the following could help with this issue EXCEPT:

A) repeaters
B) channel bonding
C) reflectors
D) encryption

A

Encryption cannot increase the area covered by your wireless network. Encryption is a security feature that protects data that is transmitted over the wireless network. Encryption when used on a wireless network can be used to prevent messages from being intercepted and read. However, you must ensure that the encryption methods used are compatible. Incompatible encryption methods would cause communication between the wireless networks or between the wireless and wired networks.

Repeaters, reflectors, and channel bonding can increase the area covered by your wireless network by using a signal bounce. Repeaters and reflectors simply bounce the signal. Channel bonding is an 802.11n implementation that increases the bandwidth by combining two adjacent 20-MHz bands.

Keep in mind that wireless switch or access placement is also important. Often just relocating an access point can alter the covered area enough to include the new location. Another factor is the signal strength. Signal strength can be adjusted based on your organization’s needs. Signal strength is also referred to as power level. Remember that using signal bounce can make the signal strength at a device appear as a strong signal with the user still experiencing consistent drops issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What happens when wireless access point is at full capacity with devices?

A

Device saturation − Some wireless networks support a maximum number of devices. Once device saturation occurs, no other devices will be able to join the network. You will need to deploy another wireless access point, upgrade the current access point to support more devices, or replace the current access point with one that will support more devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What occurs when there is too many devices that surpasses the maximum bandwidth of a Wireless Access Point?

A

Bandwidth saturation − Wireless networks have a maximum bandwidth available. If too many devices connect to the wireless network and have high bandwidth requirements, bandwidth saturation can occur. If this occurs, you should determine which devices are requiring the most bandwidth and move them to another network. You could also deploy another wireless network with a higher bandwidth maximum.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What should you do when you update a wireless device?

A

Untested updates − Any updates to wireless network devices should be thoroughly tested before deployment on the network. This includes any firmware updates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why should you avoid open wireless networks?

A

Open networks − Open networks are commonly deployed in public areas, such as libraries, coffee shops, and retail establishments, to provide a service to customers. However, you should use extreme caution when using open, unsecured networks as any communication can be intercepted and read. Companies should adopt a policy that clearly states whether personnel can connect to open networks using company-issued devices, including laptops, cell phones, and other mobile devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What protocol should you follow when there is incompatibility?

A

Incompatibilities − Incompatibilities usually occur when you deploy a device, update, or application that is incompatible with the clients on your wireless network. It may be necessary to roll back the update, remove the application, or reconfigure the device. If you deploy devices, updates, or applications in a testing environment first, you should be able to discover these issues before live deployment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What standard is MIMO uses on the IEEE?

A

Multiple in, multiple out (MIMO) − MIMO is deployed in 802.11n wireless networks. It uses separate antennas for outgoing and incoming transmissions. MIMO increases reliability and throughput.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What happens when there is RF Attenuation?

A

Radio Frequency (RF) Attenuation – RF attenuation is when RF or light waves have their signal strength weakened. This attenuation happens naturally as the signals pass through walls, bodies, windows, and similar surroundings. While this has become less of a problem with modern Wi-Fi networks, IT teams should keep this issue in mind when designing a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What happens when you use the wrong Encryption Protocol?

A

Encryption Protocol Mismatch – An encryption protocol mismatch occurs when a user uses a security key to unlock an encryption protocol, but that key does not work with the designated protocol. Protocol key management can be a cumbersome process, especially with networks that utilize several encrypting protocols. Implementing a key manager can be one way to ensure these mismatches do not occur often.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What do you do when you have a Captive portal Issues?

A

Captive Portal Issues – A captive portal is a web page that is accessed by a web browser to help authenticate and authorize users when they are first connecting to a network. However, this portal can have issues occur with authentication, redirection, broken rules, and other similar issues. Whenever implementing a captive portal, it is critical to test the portal to ensure that it is functioning properly and preventing unauthorized parties from entering the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What happens when Client Disassociation Issues arise?

A

Client Disassociation Issues – Disassociation occurs when a user is removed or disconnected from a network either from being forcibly removed or by a network error occurring. Disassociation can be disruptive to workflow as well as be an indicator of a potential attack taking place, such as an Evil Twin attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the AP Configurations?

A

Lightweight Access Point Protocol (LWAPP) − LWAPP is a protocol that allows a wireless LAN controller (WAC) to manage and control multiple wireless access points.

Control And Provisioning of Wireless Access Points (CAPWAP) is a newer alternative to LWAPP.

Thin vs thick − Thick access points handle a wide array of tasks in software, each a separate IP address wired directly into Ethernet switches, If WLAN controller is deployed, the access points no longer have to handle as many tasks because they can be handed off to the WLAN controller. When a WLAN controller is used, the APs are referred to as thin APs.

AP association time – Whenever connection to an access point within a network there are several steps that should take place. This process begins by a device requesting access, to which the AP going through the process to authenticate the user. After the user verifies their identity, then the user must make an association request to the AP. After receiving the association request, the AP will then create an Association ID for the device and give them access to the network. This entire process refers to how long the AP association time takes. Fast association times will enable users to connect faster and be more productive rather than having to wait for unspecified times for the AP to respond. Attackers can try to target these APs by flooding them with fake access requests to attempt to cause a denial-of-service attack, which will subsequently slow down workflow production.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You are a desktop administrator for Nutex Corporation. Your organization uses Ethernet cable to connect network resources. A user reports that he is unable to access network resources on his portable computer. The portable computer is connected to the company’s network using an Ethernet cable. When you test the cable using a time domain reflectometer (TDR), the signal returns too soon. What should you do?

A) Re-route the network cable.
B) Reinstall the network adapter.
C) Replace the network adapter.
D) Replace the network cable.

A

You should replace the network cable. As stated in the scenario, the TDR shows that signal returns too early, which implies that there is a breakage in the network cable. Therefore, you should replace the cable to fix the problem.

You should not reinstall the network adapter. The TDR shows that the signal returns too early which implies that there is a breakage in the network cable. Reinstalling the network adapter will not fix the problem. You should only reinstall the network adapter if you discover an issue with the adapter’s driver.

You should not replace the network adapter. This is required if Device Manager cannot detect a network adapter plugged in the computer or if the network adapter is faulty.

You should not re-route the network cable. This would be a problem if interference were occurring. Re-routing cable further from the interference source usually can fix the problem. Cables can also be enclosed in a protective shield to prevent interference. It is also necessary to re-route a network cable if it lies across the floor. Routing network cable across the floor can cause tripping hazards and can result in cable breakage from the constant pressure of being walked on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A hacker has used a packet sniffer to attack your company’s network. What can a hacker accomplish by using this technique?

A) initiating a social engineering attack
B) spreading a virus on a network
C) collecting data on network traffic
D) inserting a Trojan horse on a network server

A

A packet sniffer is a device that can be used to collect traffic data on network media, even if the traffic is not addressed to that device. A packet sniffer is also called a network analyzer, network sniffer, or protocol analyzer. Many packet sniffers can provide in-depth traffic analysis for your network. An attacker can use a packet sniffer to defeat a MAC address filter. A packet sniffer is a type of network analyzer.

A hacker can initiate a social engineering attack by using several methods, such as instant messaging, a telephone call, or an in-person visit to a company. A virus can be spread through several methods, such as infected storage media or infected e-mail messages. A hacker can use e-mail or another transmission method to insert a Trojan horse on a network server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Your organization has responded to a security incident. The breach has been contained, and all systems have been recovered. What should you do last as part of the incident response?

A) investigation
B) post-mortem review
C) analysis
D) triage

A

A post-mortem review should be completed last as part of the incident response. The post-mortem review should be performed within the first week of completing the investigation of the intrusion. Triage is part of the first step in an incident response. During this step, the incident response team examines the incident to see what was affected and sets priorities. Investigation takes place after the triage. It involved the collection of relevant data. After the investigation stage, the incident response team is responsible for the containment stage. After the incident is contained, the next stage is analysis, where the root cause of the incident is discovered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The troubleshooting order according to the CompTIA Network+ blueprint is as follows - First step:

  1. Identify the problem.

What does this entail?

A

a. Identify the problem.
b. Gather information.
c. Question users.
d. Identify symptoms.
e. Determine if anything has changed.
f. Duplicate the problem, if possible.
g. Approach multiple problems individually.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The troubleshooting order according to the CompTIA Network+ blueprint is as follows - Second step:

  1. Establish a Theory

What does this entail?

A

a. Question the obvious.
b. Consider multiple approaches.
-Top-to-bottom/bottom-to-top OSI model
- Divide and conquer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The troubleshooting order according to the CompTIA Network+ blueprint is as follows - Third Step:

3.Test the theory to determine cause.

What does this entail?

A

a. If the theory is confirmed, determine next steps to resolve the problem.
b. If the theory is not confirmed, re-establish new theory or escalate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The troubleshooting order according to the CompTIA Network+ blueprint is as follows - What is the 4th step?

A

Establish a plan of action to resolve the problem and identify potential effects,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The troubleshooting order according to the CompTIA Network+ blueprint is as follows - What is the 5th step?

A

Implement the solution or escalate as necessary,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The troubleshooting order according to the CompTIA Network+ blueprint is as follows - What is the 6th step?

A

Verify full system functionality and, if applicable, implement preventive measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The troubleshooting order according to the CompTIA Network+ blueprint is as follows - What is the 7th step?

A

Document findings, actions, outcomes, and lessons learned.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

You need to create a cable that will allow you to get a link light on your network interface card (NIC) when the NIC is not plugged into a hub or switch. Which type of cable should you use?

A) crossover cable
B) rollover cable
C) loopback cable
D) straight-through cable

A

You should use a loopback cable. A loopback cable is used to test the network function of the NIC by allowing it to send and receive network communication with itself.

A crossover cable connects two legacy or non-MDIX compliant devices, such as two computers, two hubs, or two switches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Are patch cables the same thing as straight through cables?

A

A patch cable and a straight-through cable are the same thing. This is the standard cable used to connect networking devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What are the pinout setting for a roll over cable?

A

A rollover cable connects the console port on any Cisco device. The pin configuration for a rollover cable is easy to remember because of the cable name. The cable pin configuration is “rolled over” so that pin 1 on end 1 is pin 8 on the other, pin 2 on end 1 is pin 7 on the other, and so on until a complete reversal is made. The wires are in reverse order on opposite ends.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

You have two wireless networks in your building. The wireless networks do not overlap. Both of them use Wi-Fi Protected Access (WPA).

You want to ensure that no unauthorized wireless access points are established. What should you do?

A) Disable SSID broadcast for the two wireless networks.
B) Periodically complete a site survey.
C) Change the two wireless networks to WEP.
D) Change the two wireless networks to WPA2.

A

You should periodically complete a site survey to ensure that no unauthorized wireless access points are established. Site surveys generally produce information on the types of systems in use, the protocols in use, and other critical information. This information often comes in the form of an audit or assessment report. These reports can be useful in detailing information about the site, identify any abnormal devices or apps, and help track baselines over periods of time. You need to ensure that hackers cannot use site surveys to obtain this information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

The security administrator just updated some security settings, including settings on routers and firewall. Users are complaining that they cannot access certain remote resources that they were able to access prior to the changes being made. What is most likely the problem?

A) Incorrect ACL settings
B) Duplicate MAC addresses
C) Incorrect netmask
D) Incorrect time

A

You should check for incorrect access control list (ACL) settings. ACL settings allow or deny the transmission of network traffic (inbound or outbound). Incorrect settings could block traffic that was intended to be allowed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What happens when you have detailed the wrong the subnet mask?

A

An incorrect netmask can cause routing and performance issues. In classless interdomain routing (CIDR) notation, the netmask follows the IP address, beginning with the slash. As an example, in the IP address 172.16.0.0/16, the netmask is /16. The netmask determines the subnet to which the IP address belongs and the size of the subnet. An incorrect subnet mask would prevent communication with the resources but is not the most likely problem. If an incorrect subnet mask was used, all users will have trouble communicating with the resource that is incorrectly configured.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What happens when you have a duplicate MAC address?

A

Duplicate MAC addresses can be caused by MAC address spoofing, static IP addresses still in the pool of available addresses, or by manufacturers reusing MAC addresses. It is not likely that the MAC addresses were changed in any way, as this is not a standard step to take. To resolve a duplicate address caused by a static address, turn off the client computer that has the static address, remove the static IP address from the pool on the DHCP server, and then restart the client computer. With regard to manufacturers recycling MAC addresses, as long as two NICs with the same MAC address have at least one router between them, there will not be a conflict. Routers direct traffic via IP addresses, while switches direct traffic via MAC addresses, with an ARP table showing the relationship between MAC address and IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is the ping used for?

A

ping − tests connectivity to a remote host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is the ipconfig used for?

A

ipconfig − displays network configuration settings for the local computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is the nslookup used for?

A

nslookup − verifies entries on a DNS server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is nbstat used for?

A

nbtstat − diagnoses problems with NetBIOS name resolution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Your company is located in Atlanta, Georgia. Management has decided to deploy multiple 802.11b WLANs. You are concerned that there are not enough non-overlapping channels to support the number of access points that you need to deploy. How many non-overlapping channels are supported in this deployment?

A) eight
B) eleven
C) three
D) five

A

802.11b wireless local area networks (WLANs) support three non-overlapping or non-interfering channels that can be used in a single area. An additional channel (channel 14) is supported in all countries except the United States.

Wireless access points or bridges must use non-adjacent, non-overlapping radio channels to prevent interference from the adjacent bridge or access point.

Each 802.11b channel utilizes a RF bandwidth of 22 MHz in DSSS modulation. You can use a combination of channels 1, 6, and 11 in a single area, referred to as a cell. This allows the 802.11b networks to provide a collective bandwidth of 33 Mbps in a cell for an office or home WLAN environment. When using multiple bridges to cover a large area, you should ensure that the channels are configured in such a way that there is no overlap.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

A network contains 150 Windows client computers that all receive their IP configuration from a DHCP server. The network is divided into two subnets. The network administrator decides to move a client computer from one subnet to another. After moving the client, the computer is having trouble communicating on the network. You suspect that the client computer is using an IP address from the old subnet. You need to run the appropriate commands to ensure that the client computer receives a new IP address.

Select the appropriate command(s) from the left and place them in the appropriate order on the left. Only select commands that are necessary for the scenario. The scenario may include one or more commands. Order is important.

ipconfig /release
ipconfig /renew
ipconfig/ all
ipconfig/ flushdns
ipconfig/ displaydns
ipconfig/ showclassid
iconfig/ setclassid

A

For this scenario, you need to release and renew the DHCP lease for the client computer. You do this by running the following commands:

ipconfig /release
ipconfig /renew

The ipconfig /all command will display all the TCP/IP settings for the computers.

The ipconfig /flushdns command removes the contents of the computer’s DNS cache.

The ipconfig /registerdns command registers the computer’s DNS host name with the DNS server.

The ipconfig /displaydns command displays the contents of the computer’s DNS cache.

The ipconfig /showclassid command will display the DHCP class ID assigned to the client computer.

The ipconfig /setclassid command will configure the DHCP class ID for the client computer.

You should only select commands needed for the scenario. In some cases, only a single command may be necessary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

You want to configure a firewall and filter packets on a Linux system. Which command would you use?

A) nslookup
B) ifconfig
C) iptables
D) tcpdump

A

The iptables Linux command allows you to control a firewall and filter packets. Filtering can be performed using packet type, packet source/destination, or target.

The tcpdump command allows you to analyze wired or wireless network traffic on a Linux system. For example, to examine POP3 traffic on the wired NIC, you would use this command:

sudo tcpdump -I eth0 -nn -s0 -v port 110

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

what is ifconfig used for?

A

Ifconfig is the counterpart to the Windows ipconfig command, and provides information about the network interface card. Ifconfig functions much the same way as ipconfig, but it does not provide information on wireless adapters. To retrieve information about wireless adapters on a non-Windows system, use the iwconfig command.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

You have implemented a new 802.11b 2.4-GHz WLAN. Which of the following devices can cause interference with this network? (Choose 2)

A) electrical wiring
B) cordless phones
C) cable TV cabling
D) microwave ovens

A

Microwave ovens can cause interference for 802.11b wireless local area networks (WLANs) that operate in the 2.4-GHz frequency band. Microwave ovens operate at the 2.45-GHz frequency band, and can cause interference when used in areas where 802.11b WLANs are deployed. Cordless phones can also cause interference. Typically these cordless phones use a higher transmitting power than the access points and can create a lot of noise in 802.11b WLANs. To avoid the interference from cordless phones, you can change either the location of access points or the location of the cordless phones. You can use the cordless phones that operate at 900MHz frequency band to avoid interference with 802.11b WLANs. Most medical equipment that uses radio frequencies operates in the 2.4-GHz ISM frequency band. Therefore, when doing a site survey, you must consider the interference by microwave ovens, cordless phones, and other devices that operate in the 2.4-GHz ISM frequency band, and you should plan the positions of the access points according to these devices to avoid interference.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

You need to obtain the current protocol statistics and port connections for Windows and UNIX/Linux computers. Which tool should you use?

A) tracert
B) netstat
C) nbtstat
D) ping

A

Netstat is a TCP/IP utility that you can use to determine the computer’s inbound and outbound TCP/IP connections. It displays current connections and their listening ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What is tracert used for?

A

Issuing tracert at a Windows command prompt will trace the route a packet takes from the source computer to the destination host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

The network administrator has changed the IP address of several servers on the network. Now a user named Jim is unable to connect to file shares on those servers using the computer name. You need to run the appropriate command(s) on Jim’s computer to resolve the problem.

Select the appropriate command(s) from the left and place them in the appropriate order on the left. Only select commands that are necessary for the scenario. The scenario may include one or more commands. Order is important.

ipconfig /release
ipconfig /renew
ipconfig/ all
ipconfig/ flushdns
ipconfig/ displaydns
ipconfig/ showclassid
iconfig/ setclassid

A

All you need to do is flush the contents of the client computer’s DNS cache. You do this by running the following command:

ipconfig /flushdns

The ipconfig /all command will display all the TCP/IP settings for the computers.

The ipconfig /registerdns command registers the computer’s DNS host name with the DNS server.

The ipconfig /displaydns command displays the contents of the computer’s DNS cache.

The ipconfig /renew command will renew the client’s DHCP lease.

The ipconfig /release command will release the client’s DHCP lease.

The ipconfig /showclassid command will display the DHCP class ID assigned to the client computer.

The ipconfig /setclassid command will configure the DHCP class ID for the client computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

You need to perform some administrative maintenance on a Cisco router. You decide to connect your notebook computer to the console port on the router. Which type of cable should you use?

A) crossover cable
B) patch cable
C) rollover cable
D) straight-through cable

A

You should use a rollover cable (also called a console cable) to connect to the console port on any Cisco device. The pin configuration for a rollover cable is easy to remember because of the cable’s name. The cable pin configuration is “rolled over” so that pin 1 on end 1 matches pin 8 on end 2, pin 2 on end 1 matches pin 7 on end 2, and so on, until a complete reversal is made. In other words, the wires are in reverse order on opposite ends.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

You have been hired as a network consultant by a company. You discover that the network’s signal strength greatly weakens as traffic travels over the network medium due to absorption and scattering. What is the term for this tendency?

A) Refraction
B) Attenuation
C) EMI
D) Harmonic distortion
E) Intermodulation distortion

A

In networking, attenuation is the term for a loss of signal strength as data travels over the network medium (cable). The attenuation rate is often the deciding factor when selecting the medium to use for a particular length of network cable. Attenuation is also referred to a decibel (Db) loss.

For example, unshielded twisted-pair (UTP) cable has the greatest susceptibility to attenuation. This is why the maximum recommended segment length for UTP is limited to 100 meters (328 feet). ThinNet cable, on the other hand, has less susceptibility to attenuation; the signal can travel a distance of 185 meters (607 feet) before being adversely affected by attenuation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What is a crossover cable?

A

A crossover cable connects two legacy or non-MDIX compliant devices, such as two computers, two hubs, or two switches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What is the opposite of attenuation?

A

The opposite of attenuation is amplification. If you want to create a network that extends beyond the normally acceptable length of a particular cable type, you would need to install a signal amplifier. In networking terms, this amplifier is called a “repeater.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What occurs when fluorescent lighting and Radio frequency interfere with?

A

Electromagnetic interference (EMI) occurs when objects, such as fluorescent lighting, interfere with transmission over copper cabling. Radio frequency interference (RFI) occurs when objects, such as cordless phones, interfere with transmission over wireless radio frequencies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

When does Crosstalk happen?

A

Crosstalk is a specialized type of EMI caused by parallel runs of twisted-pair cables. The only solution to this problem is to change the path of the cables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What types of Cross talk are there?

A

Near end − Near-end crosstalk (NEXT) measures the ability of the cable to resist crosstalk. Most commercial cabling will give you the minimum NEXT values that are guaranteed.

Far end − Far-end crosstalk (FEXT) measures interference between two pairs of a cable measured at the other end of the cable with respect to the interfering transmitter.

EMI affects cable placement. You should arrange cables to minimize interference. Ideally, Ethernet cables should not be placed close to high voltage cables, generators, motors, or radio transmitters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What is Refraction?

A

Refraction is the bending of waves as they pass from one medium to another, due to a change in their speed. Harmonic distortion is the distortion of a wave by unwanted multiples of an original frequency, causing interruptions to the way the wave form behaves in electrical circuits, or sounds. Intermodulation distortion occurs when two different frequencies are simultaneously passed through an amplifier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

You are a system administrator. A user calls you complaining that he cannot log on to the network. What are two questions you should ask first when troubleshooting the problem? (Choose 2)

A) Can the problem be duplicated?
B) Are other users also experiencing the same problem?
C) Is the computer plugged in?
D) How much memory does your computer have?

A

One of the first steps in troubleshooting is to isolate the source of the problem. By asking if other users are experiencing the same problem, you will know if this is a network problem or a problem with the user’s logon process. If the problem cannot be duplicated, it could be an intermittent problem, or it could be something simple, such as the user typing his password incorrectly. Determining the amount of memory or confirming the computer is plugged in could be useful in other scenarios. This type of information would not enable you to determine the problem in this scenario.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

A user reports that she cannot print from her computer. You also notice that they are unable to reach a supplier’s web site. The operating system is Windows 8.1. Which command should you start with to help with your diagnosis?

A) route
B) nmap
C) dig
D) ping

A

The ping command allows you to test the connection between a local computer and a node on the network. If you are trying to determine why a user cannot print, you can issue the ping command with either the printer’s network name (ping colorprinter) or the IP address of the printer (ping 192.168.1.38). If you could ping by IP address, but not by network name, that would indicate a problem with DNS translation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What are the nmap Linux function?

A

The nmap Linux command is used to explore the network. It also acts as a security scanner. As an example, you can use nmap 192.168.1.0/24 to scan a subnet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

What are the functions of the route add command?

A

The route command can be used to add additional routes (path) in your network. As an example, if you decided that traffic from some computers needed to go to another node in the network, you would use a route add command.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

You work for a company that deploys wireless networks for your customers. You have been asked to deploy wireless range extenders for several companies. For which of the following situations does deploying a wireless range extender make sense?

A) For a new branch office opening 7 km away from the main office, where 5-10 users will need wireless network access at the same time

B) To add wireless coverage for an office expansion to 10th floor, where up to 40 users might need wireless access at the same time

C) For the back porch of a coffee shop where as many as 30 users might need wireless network access at the same time

D) For a deli dining area in a grocery store, where up to 35 patrons may need wireless access at the same time

E) For a sprawling small office/home office layout with no more than 10 devices active at any given time, but with two dead spots in need of improved wireless network access

A

The only situation in which deploying a wireless range extender would make sense is for a sprawling small office/home office layout (SOHO) with no more than 10 devices active at any given time, but with two dead spots in need of improved wireless network access. A wireless range extender provides wireless coverage for a larger area than a single wireless access point can handle on its own. Strategically placed range extenders can also deliver wireless coverage in areas where low-signal or no-signal conditions may prevail when only a single WAP is used. In fact, wireless extenders will provide something less than the square of the area that a single WAP covers, because they must stay close enough to the WAP to receive a strong enough signal for them to meaningfully extend that signal further afield.

As the name indicates, a wireless range extender simply extends an existing wireless network, usually provided by a wireless access point that also includes multiple switched ports and built-in router capabilities (along with USB ports, DHCP, address and content filtering, and more). Low cost range extenders offer none of these additional functions; more expensive models may include some of these. In general, a range extender should not be expected to handle more than 20 or 25 simultaneously connected devices, whereas wireless access points can typically handle up to 60 devices each. Thus, wireless range extenders apply only to small-scale, low-usage scenarios like the small office/home office situation described.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

The network you administer is a Fast Ethernet network. Wall outlets are connected to patch panels by 90-meter cables. Patch panels are connected to switches by 5-meter cables. The network uses Category 5 unshielded twisted-pair (Cat5 UTP) cable.

You use a 15-meter patch cable to connect a server named Shipping to a wall outlet. You connect the Shipping computer to the network, start the computer, and properly configure it. However, clients cannot connect to the Shipping server. Clients can connect to other servers on the network. What will most likely solve the connection problem?

A) replacing the 15-meter patch cable with a 3-meter patch cable
B) replacing the Cat5 UTP with Cat3 UTP
C) replacing the 15-meter patch cable with a 10-meter patch cable
D) replacing the Cat5 UTP with Cat1 UTP

A

On a Fast Ethernet network that uses unshielded twisted-pair (UTP) cables, such as a 100Base-TX Ethernet network, the maximum length of the cable between a computer and a switch or hub is 100 meters. In this scenario, the total length of cable between the Shipping server and the switch is 110 meters. You can solve the connection problem in this scenario by replacing the 15-meter patch cable that connects the Shipping server to the wall outlet with a patch cable that is no more than 5 meters in length. Db loss in cabling (also called attenuation) occurs because the voltage decays slowly as the current travels the length of the cable. If you replace the 15-meter patch cable with a 10-meter patch cable, then the connectivity problem will still occur because the overall cable length between the server and the switch will still exceed 100 meters.

The switch and patch panel are usually located within a telecommunications closet. A basic patch panel does not normally contribute any networking services; it simply serves as a junction box between the switch and the various nodes on the network. A patch panel provides a convenient interface from which you can arrange and rearrange connections between the switch and the nodes.

Distance issues are caused when cable lengths exceed the maximum distance allowed by a particular media type. Ensure that your cable runs do not exceed the maximum distance allowed. Repeaters could also be used to prevent this problem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Physical connectivity problems include?

A

Bad connectors
Bad wiring
Open circuits or short circuits
Split cables
Transmit (TX)/Receive (RX) ends reversed
Cable placement
EMI/Interference
Cross-talk
Db loss and attenuation
Distance limitations
Incorrect termination (mismatched standards)
Split pairs
Bad SFP/GBIC (cable or transceiver)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Prior to deploying a new wireless access point at a retail store that is located in a strip mall, you decide to perform a site survey. Which statements describe the purpose of doing this? (Choose 2)

A) to calculate the hop count to the gateway
B) to find the frequency and power settings to be used on access points
C) to find out the server processing speed required
D) to calculate the number of access points required for the coverage area
E) to find out the required Internet bandwidth

A

Site surveys are done to assess the coverage area of each access point and the number of access points required for a specified coverage area.

A site survey should be done prior to installing a WLAN. Site surveying is required to determine the frequency and power settings of each access point to avoid channel overlapping and interference. A site survey is the only technique that helps the customer install complete WLAN coverage for mobile roaming clients. After a proper site survey, a site survey engineer can identify the position of access points within the facility. The quality of the output of the site survey depends on the experience and knowledge of the site survey engineer.

End-to-end connectivity is a process whereby you troubleshoot connectivity issues from the host experiencing the connection problem all the way through the network. You should always start at the local host and proceed through the network, through routers and other devices, to the destination. Any connectivity problem could be at the host, the remote host, or anywhere in between. Following a logical process will ensure that the exact issue will be located.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Connectivity issues: “Incorrect interface/interface misconfiguration”

A

Incorrect interface/interface misconfiguration − If the interface is incorrectly configured, then traffic will not pass through that interface properly. Often the easiest way to test and interface is to use the ping command or a loopback tester. If you connect a router to a multiplexer but cannot access the router’s interface even though the signal level is good, it is most likely that the wrong wavelength as demuxed from the multiplexer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Connectivity issues: “Interface Errors”

A

Interface errors − Interface errors are usually dependent upon the device and vendor. You should consult the device’s operation manual to determine what the interface error means. In most cases, vendors have an online knowledge base that you can search.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Connectivity issues: “Simultaneous wired/wireless connections”

A

Simultaneous wired/wireless connections − Some organizations have both wired and wireless networks in use. Client computers, though, should connect to only one of these types of networks. If you want to use a wired connection, you should plug into that network. If a wireless network is in range, your computer may attempt to connect to the wireless network as well if you have enabled the connect automatically feature.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Connectivity issues: “Discovering neighboring devices/nodes”

A

Discovering neighboring devices/nodes − Most devices have the ability to discover neighboring devices or nodes by using the appropriate routing protocol. It may be necessary to enable multiple routing protocols based on the types of devices to which you must connect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Connectivity issues: “Port configuration”

A

Port configuration − Each switch port is a single collision domain. If you improperly configure the ports, then communication on the appropriate domain may not be possible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Connectivity issues: “VLAN assignment”

A

VLAN assignment − This problem occurs when configuring the VLAN assignment on a client computer or device. Each VLAN is a separate collision domain. Make sure that client computers are configured with the appropriate VLAN to ensure that they can communicate within the collision domain. If a device is attached to an incorrect VLAN, it will not respond to network communication even through the link activity light is on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

You need to deploy wireless access points in a college environment. You want to deploy a solution that will provide the shortest range and the most non-overlapping channels to prevent interference. Which wireless standard should you deploy?

A) 802.11a
B) 802.11x
C) 802.11b
D) 802.11g

A

You should deploy the 802.11a wireless standard. This standard provides the most non-overlapping channels (eight) and the shortest range (30 m in an open environment, 10 m in a building). The 30 meter (m) distance limitation is an important consideration when implementing this wireless network. This standard is the best to use in a campus environment where multiple wireless access points may be deployed near each other.

The 802.11b and 802.11g wireless standards provide only three non-overlapping channels. In addition, they provide a range of up to 100 m in an open environment and 30 m in a building.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

A user in the Engineering department is unable to log on to the network. The network has eight subnets and uses TCP/IP. There have been no other complaints from other departments. Which steps should help you isolate the cause of the problem? (Choose 2)

A) Ping the server.
B) Establish whether other local-segment users are having the same problem.
C) Configure a WINS server.
D) Replace all the patch cables.

A

When troubleshooting a problem, you should try the obvious or quick fixes first. This is especially true when you are attempting to correct a problem remotely with a non-technical and often impatient end user.

A logical first place to start troubleshooting would be to determine if the condition is network-wide or workstation-specific. You should have other similar users attempt to perform the same actions. If they are able to do so, the problem is a local condition. Next, you should ping the server from the user’s computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

You just installed a replacement switch that was moved from one part of the network to a new location. After all the patch cables are reconnected, some users cannot communicate via e-mail. What is the most likely issue?

A) Bad port
B) Attenuation
C) VLAN mismatch
D) Network connection LED status indicators

A

VLAN mismatch occurs when the VLAN assigned to the port on one end of the cable does not match the VLAN assigned to the port on the other end of the cable. In a native VLAN mismatch, one port might be assigned to VLAN 10, and the other assigned to VLAN 100. This can cause a security risk, as the traffic may not go where intended. In a trunk VLAN mismatch, one port is configured to trunk mode off, and the other is configured to trunk mode on. In this last case, the trunk link would no longer be functional. This would explain why some but not all of the users are unable to communicate via e-mail.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

what do you do when you experience bad port on a switch, hub or router?

A

A bad port on a switch, hub, or router will cause connectivity issues for all users, not select users, when communicating with that port. When connected, a port should have a connectivity light, and when transmitting data, should have a data light. If a bad port is suspected, plug the patch cable into another empty port. If you get traffic, the original port was bad. To shut down suspected bad port 11, enter the following commands:

Switch(config)# interface Fa0/11

Switch(config-if)# shutdown

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Indicators of a Network Connection via LED status?

A

Network connection LED status indicators on ports and NICs tell you whether you have a network connection and whether there is traffic on that connection. For switch ports, the LED indicators are usually on the left and right sides of the port. The left LED usually indicates a network connection. In some equipment, an amber light would indicate a 100mbs connection, while a green light would indicate a 1000mbs connection. The right LED will blink to notify that there is network activity on that port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

ElliotA, KateB, and PayR are workstations. FileSrv is a file server, and WebSrv is a Web server. FRW1 and FRW2 are firewalls. WebSrv is on a demilitarized zone (DMZ) that is maintained between the two firewalls. Router1 connects the network to the Internet. Remote users on the Internet connect to WebSrv, and some remote users on the Internet are allowed to gain access to files on FileSrv.

Users report a network connectivity problem, so you test network connectivity. ElliotA can connect to KateB and FileSrv. KateB can connect to WebSrv. WebSrv can connect to PayR and FileSrv. FileSrv cannot connect to Router1, but FileSrv can connect to FRW1 and FRW2. Internet users can connect to Router1, but they cannot connect to WebSrv.

What is most likely causing the connectivity problem on the network?

A)FRW1 is configured with an invalid IP address.
B)Router1’s connection to the Internet is down.
C)The cable that connects Router1 to FRW2 is not properly connected to FRW2.
D)Router1 is overloaded with network traffic.
E)The port on Hub1 that connects FileSrv to the hub is not able to send or receive data.

A

The most likely cause of the network connectivity problem in this scenario is that the cable that connects Router1 to FRW2 is not properly connected to FRW2. If the cable is not properly connected, then users on the Internet will be able to contact Router1, but they will not be able to gain access to resources on WebSrv. Also, computers on the network will be able contact one another and the firewalls, but they will not be able to contact Router1 or connect to the Internet. Potential issues with the cable are a bad connector, bad internal wiring, a split (a physical cut in the cable), or a termination problem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Potential issues with cables: Bad Connectors?

A

Bad connector − If you suspect that a connector is bad on a short cable, it may be easier to replace the entire cable than one connector. However, for long cable runs that extend over a long distance, you should replace the connector so that the cable will not have to be re-routed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Potential issues with cables: Bad Wiring?

A

Bad wiring − If you suspect that the cable itself is damaged or nonfunctional, you should always replace the cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Potential issues with cables: Split Cables?

A

Split cables − This is similar to bad wiring but is much easier to diagnose because the cable is actually cut. An open circuit can be the direct result of this issue.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Potential issues with cables: Incorrect termination?

A

Incorrect termination − This occurs when the cabling connectors are configured with the wrong individual pin in the connector sockets, or when a twisted pair cable is wired as a split pair.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Potential issues with cables: Straight-through?

A

Straight-through − With this type of cable, each pin should connect to the same pin on the opposite side. This cabling is used when connecting unlike devices, such as connecting a router to a hub, a computer to a switch, or a LAN port to a switch, hub, or computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Crossover Cable?

A

Crossover − With this type of cable, some of the internal wires should cross over each other by switching the orange-white and green-white wires, and then the orange and green wires. This cabling is used when connecting like devices, such as connecting a computer to a router, a computer to a computer, or a router to a router.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Potential issues with cables: Dirty optical cables?

A

Dirty optical cables – Cleanliness is important with fiber optic cables and directly impacts the performance of optical communication networks. A dirty optic cable on either connecter end can create severe problems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Potential issues with cables: TX/RX reversal?

A

TX/RX reversal is another kind of cabling error. A straight-through cable has the same transmit (Tx) or receive (Rx) leads at each end, while they are reversed at one end in a crossover cable. A straight-through cable connects dissimilar devices, while a crossover cable connects like devices. If you use a crossover cable in the wrong location on the network, the device will be unable to connect to the network. You should replace the cable with the correct type.

Some switches support medium dependent interface crossover (MDIX). This allows a switch port to match its leads to the cable you have used. However, if a network device does not support MDIX, you must use an appropriate cable (that is, a crossover cable) to allow its Tx leads to connect to the Rx leads on a connected device. If loss of connection occurs, you are using the wrong cable or have the switch leads configured incorrectly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

How does a split pair occur in wiring error?

A

A split pair is a wiring error where two wires of a twisted pair are instead connected using two wires from different pairs. It most commonly occurs when a punch-down block is wired incorrectly or when RJ-45 connectors are crimped onto the wrong wires. In both of these situations, you will need to rewrite the block or connector. Open circuits or short circuits could also cause loss of connection.

An open circuit is usually the result of a broken cable or improper termination. This causes an incomplete connection and complete failure of the electric current.

A short circuit occurs when there is unwanted contact with the cabling. This results in the current following an unwanted path, which could cause overheating or burning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

You need to check an IP connection end-to-end at the Network layer. Which tool should you use?

A) telnet
B) trace
C) ping
D) show

A

The ping command checks the connection to the router end-to-end at the Network layer. It uses the ICMP protocol to send Echo requests and replies to check connectivity to another network host. To ping the address 110.11.32.3, you should enter the following command:

ping 110.11.32.3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

You are issued a network technician toolkit that contains several tools. Match the tools on the left to the descriptions on the right. Move the correct items from the left column to the column on the right to match the tools with the descriptions.

Toner Probe − Verifies that a cable is good

Loopback plug − Attaches media connectors to the ends of the cable

Crimper − Echoes signals over a port to ensure it is working properly

Punchdown tool − Includes a voltmeter, an ohmmeter, and an ammeter to measure voltage, current, and resistance, respectively

Multimeter − Attaches cable to a patch panel

Cable tester − Includes a tone generator and a tone locater to locate the ends of a cable

A

Cable tester − Verifies that a cable is good
Crimper − Attaches media connectors to the ends of the cable
Loopback plug − Echoes signals over a port to ensure it is working properly
Multimeter − Includes a voltmeter, an ohmmeter, and an ammeter to measure voltage, current, and resistance, respectively
Punchdown tool − Attaches cable to a patch panel
Toner probe − Includes a tone generator and a tone locater to locate the ends of a cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

You are troubleshooting a connectivity problem with a computer named Computer1 on a network that has a router with the IP address 192.168.10.1. The network uses a non-subnetted Class C IP address range. Computer1 is configured with an IP address of 192.168.10.255 and a default gateway address of 192.168.10.1. The computers on the network are configured with the subnet mask 255.255.255.0. Computer1 cannot connect to the other nodes on the network. The link lights on Computer1’s network interface card (NIC) are lit.

What is most likely causing the connectivity problem?

A) the subnet mask used on the network
B) Computer1’s IP address
C) Computer1’s default gateway address
D) the router’s IP address
E) Computer1’s NIC

A

Of the choices listed, Computer1’s IP address is most likely causing its connectivity problem. Computer1 is configured with the broadcast address for the network, and thus cannot communicate on the network. The network address 192.168.10.1 with a subnet mask of 255.255.255.0 can also be represented as 192.168.10.1/24. The slash (/) character and the number that follows it represent the network prefix, which indicates the number of bits in an IP address that are used for the network address. In this scenario, the first three octets are used as the network address and the last octet is used for host addresses because it is a class C address range. Therefore, the router’s network address is 192.168.10 and its host address is 1. IP addresses from 192.168.10.1 through 192.168.10.254 are valid host addresses on the network. In this scenario, the address 192.168.10.0 is the network ID for the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

A user is complaining about wireless connectivity. Their cubicle is on a concrete wall, and the wireless access point is mounted on the other side of the wall. What describes what is happening to the wireless signal that only has to travel a few inches?

A) Absorption
B) Attenuation
C) Frequency mismatch
D) Refraction

A

Absorption occurs when an object does not reflect or refract a wireless signal, but rather absorbs a portion of it. Different materials have different absorption rates. For example, drywall has a relatively low absorption rate, while concrete has a relatively high absorption rate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Your company is located in Charlotte, North Carolina. Management has decided to deploy multiple 802.11a WLANs. You are concerned that there are not enough non-overlapping channels to support the number of access points that you need to deploy. How many non-overlapping channels are supported in this deployment?

A)four
B)eleven
C)three
D)twenty-three

A

The 802.11a wireless local area network (WLAN) technology supports twenty-three non-overlapping or non-interfering channels that can be used in a single area.

Wireless access points or bridges must use non-adjacent, non-overlapping radio channels to prevent interference from the adjacent ones. Each 802.11a channel utilizes a RF bandwidth of 20 MHz in Orthogonal Frequency Division Multiplexing (OFDM) modulation. This 20-MHz channel is split into 52 channels with 300-KHz smaller sub-carriers, out of which 48 are used for data transmission. The eight non-overlapping channels can be used in a single area or cell to provide the cell a total bandwidth up to 532 Mbps.

802.11b includes four non-overlapping channels (channels 1, 6, 11, 14) in most countries, and 802.11g includes four non-overlapping channels (channels 1, 5, 9, and 13) in most countries. In the US, 802.11b includes the same four non-overlapping channels, but 802.11g includes three non-overlapping channels (channels 1, 6, and 11).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Your company has recently replaced all the shielded twisted pair (STP) and unshielded twisted pair (UTP) cable with fiber optic cable. You need to purchase a device to determine the length of the cables used on your network. Which tool do you need?

A) butt set
B) OTDR
C) toner probe
D) TDR

A

An optical time domain reflectometer (OTDR) can be used to determine the length of the cables used on a fiber optic network. A time domain reflectometer (TDR) determines the length of shielded twisted-pair (STP), unshielded twisted-pair (UTP), or coaxial cables.

A butt set is used to test telephone lines. A toner probe is used to identify a single cable on the network. It is the best tool to use to locate a bad Cat5 cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

A contractor is unable to connect to your wireless network using his 802.11g wireless adapter. What is the most likely problem?

A)You are using an incorrect channel on your network.
B)You have an 802.11n network.
C)You have an 802.11b network.
D)You have an 802.11a network.

A

It is most likely that you have an 802.11a network because 802.11g devices are incompatible with 802.11a networks. The frequency used by the different wireless networks is important. Some of them use the same frequency and can, therefore, be considered compatible. However, keep in mind any other devices, such as cordless phones, that can use the same radio frequency as they can cause interference.802.11g devices are compatible with 802.11b networks.802.11n networks allow the usage of 802.11a, 802.11b, or 802.11g devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

What are the consideration when it comes wireless standards? Name Four?

A

Throughput − Each wireless network type has a different maximum throughput. Keep in mind that this throughput is shared by all the devices connected to the wireless access point.

Frequency − Each wireless network uses a certain frequency. Some network types may use the same frequency. Document the frequencies used when you implement any wireless network so that you can ensure that future wireless networks do not interfere with existing ones.
Distance − All wireless access points will have a limited distance for their signal. You can increase and decrease the signal strength as needed, but the maximum distance will always remain. In most cases, companies decrease the signal strength to limit the area covered by the wireless network.

Channels − Each wireless network can operate over several channels that can be used by that frequency. Research the frequency in use to determine the non-overlapping channels. While there may be 10 channels available, usually only three or four of the available channels are considered non-overlapping. Wireless access points that use the same frequency should be configured to use different non-overlapping channels.

Channel Utilization − This refers to the fraction of time that is needed to transmit data packets over a given channel. This process is handled by a scheduling mechanisms that will check to make sure that the data packets are capable of being sent over a particular channel and that it will not impact network speeds and waste resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

A user has just returned from a week-long conference. While attending the conference, the user connected their work laptop to both the hotel Wi-Fi and the conference Wi-Fi. Now the user cannot connect to the company’s Wi-Fi. What is most likely the issue?

A) Jitter
B) Latency
C) Frequency mismatch
D) Wrong SSID

A

The most likely issue is an incorrect Service Set Identifier (SSID). Most wireless devices remember the previous SSID, even if you move to a new network, so you should always check the SSID when troubleshooting. Also, it is very easy for a user to select the wrong SSID. They may not have the correct password or passphrase, and they may type in the SSID name incorrectly. Checking for the correct SSID is often the first step to wireless troubleshooting. On most devices, you can set the device to remember an SSID and its credentials. However, if the SSID or the credentials change, the device will be unable to automatically log in to the wireless network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

You are troubleshooting a connectivity problem on an Ethernet network that contains both NetWare and Windows servers. A Windows 7 client cannot connect to the Internet or any network resources. However, other computers on the same subnet as the client can access network resources and the Internet. You issue the ipconfig command at the workstation and find that the IP address is 169.254.184.25 and the subnet mask is 255.255.0.0. This IP network and subnet are different from the IP network and subnet that other computers on the same segment are using. What is the most likely problem?

A) The client obtained the IP address from a DHCP server it found on the Internet.
B) The client obtained the IP address from a NetWare server.
C) The client obtained the IP address from a Windows server.
D) The client selected the IP address using APIPA.

A

Automatic Private IP Addressing (APIPA) is a feature of Windows operating systems that enables a system to automatically assign itself an IP address when a DHCP server is not available. APIPA acts as a DHCP failover mechanism, making support easier for small local area networks. If APIPA addresses are in use, you should discover why the DHCP server cannot be contacted. The problem could be with the connection to the DHCP server or with the DHCP server itself.

APIPA uses the Address Resolution Protocol (ARP) to select a unique IP address in the reserved address range of 169.254.0.0 to 169.254.255.255 and a subnet mask of 255.255.0.0 when no DHCP server is available. Once the system has assigned itself an IP address, it can communicate with other devices on the LAN using TCP/IP, provided the devices are either configured for APIPA or manually set to the correct address range and a subnet mask.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

Users are unable to log in to the network. When you examine the authentication server, you see that CPU usage is almost 100%. What is most likely the issue?

A) Unresponsive service
B) Incorrect gateway
C) Expired IP addresses
D) Names not resolving

A

Most likely, you have an unresponsive service that is tying up resources. In Services on a Windows computer, find the unresponsive service and note the name of the service.

In an elevated command prompt, enter “sc queryex servicename” and get the process ID (PID). Then, kill the process using “taskkill /f /pid” followed by the PID in question. If the PID were 1687, for example, the command would be taskkill /f /pid 1687.

91
Q

What happens when you get an Expired IP address?

A

Expired IP addresses occur when a client computer has been offline for a period of time, is brought back on line, and uses an IP address whose lease has expired. To resolve the problem on a Windows computer, issue an “ipconfig /release” command, followed by “ipconfig /renew”. This will unbind the IP address from the client machine, and the DHCP server will issue a new IP address. Expired IP addresses would cause connectivity issues but not resource usage issues.

92
Q

What happens when you get “Destination Host Unreachable”

A

If you get a “Destination Host Unreachable” message, the most likely culprit is an incorrect gateway. Make sure the local machine and the default gateway are on the same subnet. If the gateway IP address is actually the IP address of the LAN side of the router, you will see a “Request timed out” message. This would result in connectivity issues but not resource usage issues.

93
Q

To improve security, you change your Web server named Web1 to the HTTPS protocol. Shortly after implementing the change, users report that they cannot access any Web sites hosted on Web1 by using their fully qualified domain names (FQDNs). However, they can access other Web sites that are hosted on other Web servers by using their FQDNs. What is causing this problem?

A) The new Web address starts with https instead of http.
B) The local area network (LAN) is down.
C) The DNS server is down.
D) HTTPS is not a supported protocol.

A

HTTPS is a supported protocol. When a Web server uses HTTPS technology, all the data transfer between clients and the server is encrypted using Secure Sockets Layer (SSL) technology. Web pages using this technology begin their Uniform Resource Locators (URLs) with https://. This technology is used frequently with e-commerce Web sites. In this scenario, users are probably attempting to access the Web sites by typing http:// instead of https://.

Although users are unable to access any Web sites hosted on Web1 by using FQDNs, they are able to access other Web sites by using their FQDNs. Therefore, the Domain Name Service (DNS) server is operational, as is the network.

94
Q

You administer a LAN that uses TCP/IP as its network communications protocol. You want to view the number of UDP packets that will be sent to SERVER_1 from CLIENT_A. Which tool should you use to view this information?

A) a hardware loopback
B) Monitor.nlm
C) Performance Monitor
D) a protocol analyzer

A

You should use a protocol analyzer to view the number of User Datagram Protocol (UDP) packets sent from CLIENT_A to SERVER_1. A protocol analyzer is software that enables you to view information about the network communications protocols that are used on a network. You can also use a protocol analyzer to determine the Web sites that are being visited by network users and to alert you if network interface cards (NICs) are jabbering. A jabbering NIC should be replaced because it continually sends data and saturates the network with data packets.

95
Q

Your company’s security policy states that passwords should never be transmitted in plain text. You need to determine if this policy is being followed. Which tool should you use?

A) protocol analyzer
B) password cracker
C) network mapper
D) vulnerability scanner

A

You should use a protocol analyzer to determine if passwords are being transmitted in plain text. Protocol analyzers capture packets as they are transmitted on the network. If a password is transmitted in plain text, you will be able to see the password in the packet. Protocol analyzers are also called network analyzers or packet sniffers. Protocol or network analyzers (or sniffers) can be used to troubleshoot many problems. You can use sniffers to identify the MAC address causing a broadcast storm, to identify the protocols is used on the network, or to observe connection setup, request, and response headers to a Web server.

96
Q

How can you test for vulnerabilities?

A

A vulnerability scanner tests your network for known vulnerabilities and suggests ways to prevent the vulnerabilities.

97
Q

What can you use for a visual map of topology?

A

A network mapper obtains a visual map of the topology of your network, including all devices on the network. A network mapper will create a visual representation of the network map.

98
Q

You need to display the current IP configuration of a Windows 7 computer. Which command should you use?

A) tracert
B) netstat
C) winipcfg
D) ipconfig

A

The ipconfig utility displays TCP/IP configurations on computers running Windows operating systems

99
Q

You are troubleshooting a computer that has the IP address of 196.22.14.42. To which network class does the IP belong?

A) Class A
B) Class C
C) Class B
D) Class D
E) Class E

A

Class C addresses range from 192 to 223 decimal, or 11000000 to 11011111 binary. The first three bits in a Class C address are always 110. Class C addresses use the first three octets for the network address and the last octet for the host address. With one octet to use for the hosts, you can assign the addresses 1 through 255 (decimal) for the host ID, which is 00000001 through 11111111 in binary.

100
Q

What are the address class ranges in binary and decimal?

A

The address class ranges are listed below in binary and decimal:

Class A: 00000000 − 1111110 / 0 – 126
Class B: 10000000 − 10111111 / 128 – 191
Class C: 11000000 − 11011111 / 192 – 223
Class D: 11100000 − 11101111 / 224 – 239
Class E: 11110000 − 11111111 / 240 – 255

Note that the 127 network address is used for loopback.

Also notice that the most significant bit, the left-most bit, is a zero for all Class A addresses. For Class B addresses, the zero shifts to the right one place, which means that the two most significant bits in all Class B addresses are 10. The zero shifts again for Class C, which means that the three most significant bits in all Class C addresses are 110. This “shifting” continues for Class D and Class E. Knowing this pattern enables you to determine the class of a binary IP address simply by looking at the most significant bits.

101
Q

During a recent network breach, a help desk technician identifies the IP address of the computer that is affected. When you ask for the address, he gives you the following binary address:11000000 10101000 00101100 00011000 What is the IP address?

A) 192.168.44.24
B) 192.168.45.25
C) 192.168.44.25
D) 192.168.45.24

A

The 11000000 10101000 00101100 00011000 binary address translates into the 192.168.44.24 IP address in dotted decimal format. vb

102
Q

What are the constructions of an IP address

A

You need to understand the address structure for IPv4 addresses. Each 4 IP address is 32 bits long. When we refer to the IP address we use a dotted-decimal notation, while the computer converts this into binary. However, even though these sets of 32 bits are considered a single “entity,” they have an internal structure containing two components:

Network Identifier (Network ID): A certain number of bits, starting from the left-most bit, identify the network where the host or other network interface is located. This is also sometimes called the network prefix, or even just the prefix.
Host Identifier (Host ID): The remainder identifies the host on the network.

103
Q

You need to display protocol statistics and connections using NetBIOS for a Windows computer. Which utility should you use?

A) Nbtstat
B) arp
C) ping
D) FTP

A

Nbtstat displays NetBIOS over TCP/IP statistics on Windows computers.

Use nbtstat to perform the following actions:

Track NetBIOS over TCP/IP statistics.
Show details of incoming and outgoing NetBIOS over TCP/IP connections.
Resolve NetBIOS names.

Issuing the nbtstat command with the -r option will list names resolved by the Windows Internet Naming Service (WINS) and by broadcast.

104
Q

You want to trace a signal from one end of a 100Base-T UTP cable to the other. Which tool will help you input a test signal that can be traced through the cable?

A) tone locator
B) tone generator
C) signal generator
D) crossover adapter

A

A tone generator allows you to input a signal on one end of a cable and probe the other end of the cable for connectivity.

A tone locator is used to locate the signal generated by the tone generator at the other end of the cable. When the tone locator probe is placed near the other end of the cable, a tone is emitted. It is not necessary to touch the cable with the tone locator probe.

105
Q

What is a signal generator?

A

A signal generator is used to measure the bandwidth of a network.

106
Q

Users are complaining about a decrease in network performance. You need to verify that the ISP is meeting the terms outlined in the SLA. What tool should you use?

A) Bandwidth speed tester
B) Protocol analyzer
C) Port scanner
D) Packet sniffer

A

A bandwidth speed tester will allow you to verify the upload and download speeds of your Internet connection, as well as determining if a bottleneck is internal or external. Internet Service Providers often tout “Speeds up to …” that are indicative of the most ideal conditions, such as during the middle of the night when there is little traffic. Simply put, a bandwidth speed tester measures the speed you are receiving from your ISP during business hours, as opposed to what was promised. Free bandwidth speed testers are available from www.solarwinds.com, www.speedtest.net, and several other sites.

107
Q

I need to find an open port, what tool can I use?

A

A port scanner can be used to identify open ports on a host or on a server. A port that is open but unused, such as port 23 (Telnet) represents a security risk, and should be disabled. Port scanners do not measure network performance.

108
Q

I want to intercept and examine traffic on a network to determine if a bottle neck is happening. What protocol should I use?

A

A protocol analyzer is a tool that allows you to intercept and examine traffic on a network. Once captured, the traffic can then be analyzed to determine what is causing the bottlenecks, and which protocols are being used. For example, you could use a protocol analyzer to ascertain whether FTP traffic is causing throughput issues on your network. This tool would provide no information on speed.

109
Q

You have been hired as a network technician. As part of your technician’s kit, you have been issued a basic digital multimeter with no extra probes. What is the primary function of this device?

A) tests voltage
B) measures the light signal energy
C) measures the temperature of a chip on motherboard
D) connects RJ-45 jacks to an Ethernet cable

A

A digital multimeter is a tool that can test voltage. For example, you can use a digital multimeter to test the voltage output of a power supply or to test for breakage in a telephone or Ethernet cable. To use a digital multimeter to measure light signals or temperatures, you will need a light signal probe or temperature probe.

110
Q

What tool should I use to measure the temperature of a chip or motherboard?

A

A digital infrared thermometer measures the temperature of a chip or motherboard system chassis.

111
Q

What is the function of nbstat -r

A

A table of NetBIOS names resolution and registration statistics will be displayed when you issue the nbtstat -r command. This screen displays NetBIOS connection statistics, such as the number of NetBIOS names resolved by broadcast and the number of NetBIOS names resolved by a NetBIOS name server. This screen also displays the NetBIOS names that have been resolved.

112
Q

What is the function of netstat -a

A

The Active Connections screen is displayed when you issue the netstat -a or netstat -A command at a command prompt on a Windows computer.

113
Q

What is the function of netstat -r or -R

A

The Route Table screen is displayed when you issue the netstat -r or netstat -R command at a command prompt on a Windows computer.

114
Q

What is the function of nbstat -n

A

The NetBIOS Local Name Table screen is displayed when you issue the nbtstat -n or nbtstat -N command at a command prompt on a Windows computer.

115
Q

While performing routine network maintenance, you discover that one device on your network is operating in half-duplex mode. All the other devices on your network operate in full-duplex mode. What would this condition cause between the half-duplex device and the other devices?

A) no communication
B) It would have no effect.
C) slower communication
D) faster communication

A

This condition would cause slower communication between the half-duplex device and the other devices. This would occur because the half-duplex device would only be capable of sending or receiving data. Full-duplex devices can send AND receive data at the same time.

This condition would not prevent communication from occurring between the devices. Communication would fail if the port speed or MDIX settings are mismatched. For example, devices that can only operate at 100 Mbps cannot communicate on a network that runs at 1000 Mbps. Keep in mind that many switches and other devices are capable of operating at multiple speeds depending on the network. In many cases when there is a speed mismatch, the devices will just operate at the speed of the slowest device. Using the wrong type of cable on a network, such as a straight-through in place of a crossover, may also decrease communication speed. Using a bad cable may cause the connected device to lose all communication. You need to replace the bad or improper cable to restore full functionality to the network.

116
Q

What do you do when you have a MTU Mismatch?

A

An issue referred to as a mismatched MTU or MTU black hole occurs when communication over some routes fails due to an intermediate network segment with a maximum packet size smaller than the maximum packet size of the communicating hosts. Specifically, the black-hole router does not send an appropriate Internet Control Message Protocol (ICMP) response to this condition, or if a firewall on the path drops such a response. To solve this problem, you need to first locate the black hole using the ping command. Once the black hole is found, you should configure one of two possible solutions:

Configure the black-hole routers to send ICMP Type 3 Code 4 messages.

Set the MTU of the black-hole router interface to be the largest size that the black-hole router can handle.

117
Q

What creates a switching loop?

A

Another issue you should be aware of is a switching loop. This network problem occurs when there is more than one Layer 2 path between two endpoints. The loop creates broadcast radiation as broadcasts and multicasts are forwarded by switches out every port. Because the Layer 2 header does not support a time to live (TTL) value, if a frame is sent into a looped topology, it can loop forever. You can implement the scanning tree protocol (STP) to prevent this looping. A broadcast storm occurs if one end of a cable is plugged into one port of the switch and the other in another port.

118
Q

As a new network technician, you have been issued a toolkit from your company that contains several networking tools. Which of the following descriptions best describes a cable certifier?

A) an electronic measuring tool that tests voltage, current, and resistance
B) an instrument used to collect network cable test data and print certification reports
C) a tool used to capture and analyze data that is sent over a network
D) an electronic instrument that is used to test cable resistance levels, but does not locate faults

A

Cable certifier − an instrument used to collect network cable test data and print certification reports

Cable certifiers are more expensive than cable testers because certifiers actually provide a certified report that proves cable type. Companies that manufacture cable certifiers must have these certifiers verified by international certification organizations, such as ISO or ANSI. Network technicians should be able to read the output from a cable certifier and determine the problem. Cable testers do NOT provide as much detailed information as cable certifiers. In addition, they cannot be relied upon to prove cable capabilities as well as cable certifiers can.

119
Q

What is an OTDR?

A

Optical time-domain reflectometer (OTDR) − an electronic instrument used to check fiber cable resistance levels and locate cable faults

120
Q

when should you used a protocol analyzer?

A

Protocol analyzer output can be very detailed. Generally this tool is best used when you need to get traffic analysis details, such as the types of traffic, to improve network performance, or to determine if an attack is occurring. TDRs and OTDRs can provide some of the same information as cable testers and cable certifiers. While TDRs and OTDRs are closer to cable certifiers than cable testers, TDRs and OTDRs do not provide the same certification reports as cable certifiers. TDRs and OTDRs are usually more expensive than cable testers but less expensive than cable certifiers.

121
Q

You need to solve a traffic problem occurring on a large Ethernet network. Within this large segment, the accounting department is flooding the network with a high volume of data, which causes the entire network to slow down. Which device is a quick and low-cost solution to isolating the accounting department?

A) repeater
B) gateway
C) router
D) bridge

A

A bridge provides a quick and low-cost solution for dividing a network into different segments for the purposes of reducing network traffic. Bridges work by building routing tables based on MAC addresses. These routing tables enable bridges to determine which packets need to pass through the bridge to another segment, versus which packets should stay on the local segment. In this scenario, the Accounting department is currently sharing the bandwidth of the entire segment. Using a bridge to place this department on its own segment means the traffic of this segment will stay on the local segment, thus reducing the overall traffic of the network. Only packets destined for other segments will pass through the bridge.

A bridge is not an optimal choice for reducing intersegment traffic. In such a case, a router or gateway would be a better choice.

122
Q

You originally configured a redundant server with a static IP address, and it has been offline for some time. When you power the server up to performs some tests, what might be an unexpected consequence?

A) Duplicate IP addresses
B) Names not resolving
C) Blocked TCP/UDP ports
D) Incorrect host-based firewall settings

A

The consequence may be duplicate IP addresses. Duplicate IP addresses can occur when a DHCP server “thinks” an IP address is available. For example, a client machine requests an IP address, and the DHCP server issues an address listed as available from the pool of addresses. A conflict may occur if a dormant machine comes back online with an IP address that the DHCP server thought was expired and added back into the pool.

123
Q

Why do we block unnecessary TCP/UDP?

A

Blocked TCP/UDP ports are often necessary to protect the network from insecure protocols that are easily exploited by hackers. Ports that are often blocked include TCP port 23 (Telnet), TCP port 21 (FTP), TCP/UDP port 53 (DNS, as a post-attack exit port), and UDP port 161 (SNMP). Blocked TCP/UDP ports were likely configured based on security policies and should not be changed unless you are authorized to do so.

124
Q

You have decided to implement a network protocol analyzer on your company’s network. Which job is NOT performed by this tool?

A) detect active viruses or malware on the network
B) provide network activity statistics
C) identify source and destination of communication
D) identify the types of traffic on the network

A

A network protocol analyzer does not detect active viruses or malware on the network. Most network protocol analyzers provide the following functions:

Provide network activity statistics.
Identify source and destination of communication.
Identify the types of traffic on the network.
Detect unusual level of traffic.
Detect specific pattern characteristics.

A network protocol analyzer can determine if passwords are being transmitted over the network in clear text. It can also be used to read the contents of any File Transfer Protocol (FTP) packet, including an FTP GET request. WireShark is a commercial network protocol analyzer.

125
Q

For the Network+ exam, you also need to understand trouble shooting tools, what are they?

A

Speed test sites − These sites are used to determine the speed of your Internet connection. They are a great method to help you see if you are getting the speed promised by your Internet service provider (ISP). For a list of possible sites to use, please see
http://pcsupport.about.com/od/toolsofthetrade/tp/internet-speed-test.htm,

Looking glass sites − These sites view routing information from a server’s perspective using Border

Gateway Protocol (BGP) routes. For a list of possible looking glass servers, please see http://www.bgp4.as/looking-glasses.

Wi-Fi analyzer − These tools are used to analyze the signal strength of your wireless access points. For a list of possible FREE Wi-Fi analyzers for laptops or mobile devices, please see http://open-tube.com/free-wifi-analyzers-for-laptops-mobile-devices/

126
Q

You recently built a virtual network for testing purposes that is parallel to your existing network. When users attempt to log on to the existing network, they get a different IP address than expected. In addition, some users report receiving a duplicate IP address error. What could be the issue?

A) Rogue DHCP server
B) Incorrect netmask
C) DHCP scope exhaustion
D) Incorrect host-based firewall settings

A

A Dynamic Host Configuration Protocol (DHCP) server is used to distribute IP addresses. DHCP is the network service used to assign IP address, subnet mask, default gateway, and DNS server addresses to devices as the boot onto the network. Because users are getting different IP addresses than expected and some have received a duplication IP address, the issue is probably a rogue DHCP server. A rogue DHCP server can be placed on the network through malicious intent or inadvertently through a virtual machine. Rogue DHCP servers play a big role in man-in-the-middle attacks.

127
Q

When does a Exhausted DHCP Scope Occurs?

A

Exhausted DHCP scope occurs when the DHCP server no longer has any available IP addresses to issue. This may occur as the result of a DHCP starvation attack, a type of Denial of Service (DoS) attack. If the available IP addresses in the DHCP pool are all assigned, a legitimate user will be denied access to the network. If the DHCP is exhausted, computers will be unable to lease an IP address. Symptoms of exhausted DHCP scope includes error messages on DHCP leases and computers using APIPA addresses.

128
Q

What happens when you have an incorrect netmask?

A

An incorrect netmask can cause routing and performance issues, but will not cause duplicate IP address errors. In classless interdomain routing (CIDR) notation, the netmask follows the IP address, beginning with the slash. As an example, in the IP address 172.16.0.0/16, the netmask is /16. The netmask determines the subnet to which the IP address belongs, and the size of the subnet.

129
Q

You are troubleshooting a network connectivity problem on a Windows 7 Enterprise computer, and you need to view the MAC address for the NIC installed in the computer. Which command should you use?

A) the ping command
B) the arp command
C) the tracert command
D) the ipconfig /all command

A

Of the commands listed, you should use the ipconfig /all command to view the media access control (MAC) address of the network interface card (NIC) installed in the Windows 7 Enterprise computer. The MAC address for the Ethernet adapter appears on the line entitled Physical Address. TCP/IP uses Address Resolution Protocol (ARP) to resolve IP addresses to MAC addresses so that TCP/IP and Ethernet, or another Physical layer protocol, can interoperate.

The arp command will not display the MAC address for the NIC in your Windows XP computer. If you issue the arp -a command, then you can view the ARP cache for the computer, which displays the IP address and its corresponding MAC address for all entries in the cache.

The tracert command and the ping command, when issued without switches, will display directions for using these commands. You can use the tracert command with various switches and variables to determine the route a packet takes through a TCP/IP network, and you can use the ping command with various switches and variables to test connectivity between hosts.

130
Q

A new user is reporting a “Destination Host Unreachable” message. What is the most likely culprit?

A) Rogue DHCP server
B) Untrusted SSL certificate
C) Incorrect gateway
D) Incorrect time

A

If you get a “Destination Host Unreachable” message, the most likely culprit is an incorrect gateway. Make sure the local machine and the default gateway are on the same subnet. If what is entered as the gateway IP address is actually the IP address of the LAN side of the router, you will see a “Request timed out” message.

131
Q

When does a untrusted SSL certificate occur?

A

An untrusted SSL certificate message can occur when the SSL certificate was not signed or issued by an organization that is trusted by the browser. The most common cause is a website using a trusted certificate that is missing one or more intermediate certificates.

132
Q

You are moving several wireless access points to an outdoor location for a special event. What should be the primary concern to ensure a positive experience for attendees?

A) Signal-to-noise ratio
B) Incorrect antenna placement
C) Overcapacity
D) Power levels

A

The primary concern should be the power levels. You may need to boost the power levels. By nature, wireless access points have greater coverage areas outdoors. Boosting the power level will provide a better experience for the event attendees. Power levels can affect wireless network performance.

Overcapacity is an issue in wireless performance but usually is not the primary concern. The proliferation of wireless devices will put an enormous drain on a wireless network originally designed for a few devices. In today’s environment, the network may need to provide service to tablet computers, smartphones, personal performance monitors, and smart watches in addition to the few laptops the network was originally designed to support. Always determine the number of expected devices to ensure that you provide adequate connections.

133
Q

What is the SNR?

A

The signal-to-noise ratio (SNR) is the relationship between the strength of the wireless signal compared to the amount of background interference (noise). SNR is measured in decibels (dB). Devices such as microwaves, cordless phones, wireless cameras, and fluorescent lights are all contributors. When using a Wi-Fi analyzer, any SNR below 25dB is considered poor, while a reading above 41db is considered excellent. In outside spaces, SNR is not usually an issue.

134
Q

You administer computers on an Ethernet 100Base-TX network, which uses the TCP/IP network communications protocol. The network uses an unsubnetted Class A IP address range. A computer on the network named Admin1 has the IP address 12.10.100.3, and a computer on the network named Marketing1 is configured with the IP address 12.10.100.4. Both computers are configured with the subnet mask 255.0.0.0 and the default gateway address 12.10.100.5. The network is connected to the Internet. RemoteWkst is a computer on a remote network that is connected to the Internet. Normally, Marketing1 and Admin1 can connect to RemoteWkst.

You recently discovered that Marketing1 can connect to Admin1 and Admin1 can connect to Marketing1, but neither of these computers can connect to RemoteWkst. You suspect that there is a problem with one of the routers between RemoteWkst and the network you administer.

Which TCP/IP utility should you use to troubleshoot this connectivity problem?

A) the nslookup utility
B) the arp utility
C) the ipconfig utility
D) the tracert utility

A

To test the routers between your network and RemoteWkst, you should use the tracert utility. To use the tracert utility, you should type the tracert command at a command prompt and either an IP address or a Domain Name System (DNS) name variable after the command, as in the following example: tracert dnsname or tracert ipaddress. The tracert utility will then display the IP address and DNS name of every node that a data packet passes through on its way to the remote computer. The tracert command will also display the time required for a data packet to travel through each node, and an error message if a router on the path is experiencing problems. In this scenario, the tracert command will display an error message if a router is experiencing a problem between either Admin1 or Marketing1 and RemoteWkst. If you receive a Request Timed Out message from tracert when you trace the route to external resources, it is possible that the firewall is blocking echo reply in and echo request out messages. You would need to reconfigure the firewall to allow these messages. The traceroute command is the Linux equivalent of the tracert command.

135
Q

Management has decided to implement a diversity antenna system at its main headquarters. What is the advantage of using this system?

A) A diversity antenna system increases the transmission power.
B) A diversity antenna system avoids multipath distortion.
C) A diversity antenna system increases the coverage area.
D) A diversity antenna system adds more bandwidth.

A

To avoid multipath distortion, you should use the diversity antenna system on 802.11b Wireless Local Area Network (WLAN) access points and bridges. Multipath distortion is caused by the reflection of radio frequency (RF) signal on surfaces while traveling between the transmitter and the receiver. The reflected signals reach the receiver with delay. This delayed signal adds distortion to the non-reflected signal that is received by the antenna.

Multipath distortion can be avoided either by using an antenna diversity system or by changing the location of the antenna. To provide antenna diversity, each access point has two antenna connectors. With the antenna diversity system, the signal is received through both antennas and the best antenna is selected by comparing the distortion ratio. The antenna that receives the lowest distortion signal is selected as the best antenna. This antenna is used to receive the signal continuously until there is a failure in the received packet. If the received packet fails, the access point starts the process to select the best antenna again.

Diversity antennas do not add more bandwidth, increase the coverage area, or increase the transmission power.

136
Q

A new file server is configured to allow personnel within the company to store files. Users are reporting that they cannot upload files to the file server. What might be the areas you should examine? (Choose 2)

A) Duplicate IP addresses
B) Blocked TCP/UDP ports
C) Incorrect ACL settings
D) Hardware failure

A

The areas you should examine are blocked TCP/UDP ports and incorrect ACL settings. Blocked TCP/UDP ports are often necessary to protect the network from insecure protocols that are easily exploited by hackers. Ports that are often blocked include TCP port 23 (Telnet), TCP port 21 (FTP), TCP/UDP port 53 (DNS, as a post-attack exit port) and UDP port 161 (SNMP).

For ACLs on routers and firewalls, incorrect ACL settings would allow or prevent transmission of network traffic (inbound or outbound). ACL settings on file servers can allow or deny access to the folders.

137
Q

You are using the ipconfig tool to troubleshoot a problem with a wireless host. The results are shown below: Adapter address: 00-10-4B-DE-F5-D8IP address: 192.168.1.40 Subnet mask: 255.255.255.0 Default gateway: 0.0.0.0 You can access services on the local network from the host, but you cannot access the Internet. What is the most likely cause of the problem?

A)incorrect subnet mask
B)missing default gateway
C)incorrect IP address
D)invalid Ethernet adapter

A

A default gateway must be specified for a host for it to connect to hosts outside the local network. This address is the address of the router interface on the local segment that forwards data to other networks. On small networks, the default gateway is the address of the router that connects the local network to the Internet. You should ensure that the default gateway is correctly configured for the interface that is on the local subnet. A wrong default gateway will have the same result as a missing default gateway: packets will not be able to leave the local subnet.

From the output of the ipconfig utility, you can see that no default gateway is configured for the host. You must configure the proper default gateway for the host. This can be done manually or using DHCP to automatically assign the appropriate addressing information.

138
Q

A user named Luther reports that he cannot log on to the network from his workstation. You attempt to use your administrator credentials to log on to the network from Luther’s computer, but you cannot. Both you and Luther can log on to the network from your workstation. Your workstation and Luther’s workstation are connected to the same hub.

What is most likely causing the connectivity problem on Luther’s workstation?

A) The NIC in Luther’s workstation is defective.
B) Luther is typing an incorrect user name when he attempts to log on to the network from his workstation.
C) The hub that connects Luther’s workstation to the network is defective.
D) Luther is typing an incorrect password when he attempts to log on to the network from his workstation.

A

In this scenario, neither you nor Luther can log on to the network from his computer. However, both of you can log on to the network from your computer. Thus, you can assume that the network interface card (NIC) in Luther’s computer is defective. If Luther were unable to log on to the network from his computer, but you were able to log on to the network from his computer, then you could assume that Luther was supplying either an incorrect user name or password or both.

One of the most common logon problems can be attributed to the caps lock feature. When the caps lock feature is enabled, then all alphabetical characters typed without the shift key being pressed appear in upper case. Most network operating systems require case-sensitive passwords. Therefore, the password system and the password SYSTEM are considered different passwords by the operating system.

Both your computer and Luther’s computer are connected to the same hub. If the hub were defective, then neither you nor Luther would be able to log on to the network from either computer.

139
Q

You are replacing a SFP fiber cable. You decide to use an SFP+ cable because one is available. The cable fits in the ports, but you lose connectivity. Which is the most likely culprit?

A)Transceiver mismatch
B)Incorrect pin-out
C)Damaged cables
D)Latency

A

Transceiver mismatch occurs when you have a fiber connector plugged into the wrong type fiber port. As an example, if you have a Small Form Pluggable (SFP) fiber connector, do not plug it into an SFP+ port, and do not plug an Angle Polished Connector (APC) connector into a Ultra Polished Connector (UPC) port.

140
Q

You are setting up an 802.11a wireless network in an office environment that includes three wireless access points. The wireless access points are at least 15 meters apart and are configured for automatic channel setting. Each time you turn the wireless access points on, they all choose the same channel. You need to ensure that the access points choose separate channels to prevent interference, using the least amount of administrative effort.

What should you do?

A) Reduce the signal strength on each access point.
B) Manually configure each of the access points to use channels 1, 6, and 11, respectively.
C) Increase the distance between the wireless access points to at least 20 meters.
D) Start each wireless access point at a separate time.

A

You should start each wireless access point at a separate time. This will allow each access point to select a channel. Then, when the next access point is booted, it will detect the other access points’ channels and use another channel besides the ones detected. 802.11a wireless access points have eight available non-overlapping channels: 36, 40, 44, 48, 52, 56, 60, and 64.

802.11a products need to be configured for automatic channel selection. Therefore, you cannot manually configure the channel. With the automatic channel selection feature, 802.11a wireless access points can detect other access points and configure their channel accordingly. This is the reason that it is important to start 802.11a wireless access points at a separate time. The suggested range for 802.11a wireless access points is 30 meters in an open space, and 10 meters in an office environment.

You should not increase the distance between the wireless access points to at least 20 meters. For 802.11a wireless access points, the suggested distance in an office environment is 10 meters.

141
Q

You are connecting a switch to a router. You just made a cable with each end configured differently, one 568A and the other 568B. When you plug in the cable, the devices cannot communicate. What is the most likely cause?

A) Open/short
B) Incorrect cable type
C) Bent pins
D) Jitter

A

You have an incorrect cable type. You made a crossover cable when you needed a straight-through cable. In general, a straight-through cable is used when you are connecting two different pieces of equipment, as in a computer and a switch or a router and a switch. The straight-through cable has matching 568A or 568B connectors, but not both. A crossover cable is used when you are connecting two like pieces of equipment, such as two routers. A crossover cable will have one end configured as 568A and the other as 568B.

142
Q

You are troubleshooting a workstation that is not communicating with the network. You try a different port within the wiring closet hub, and this seems to fix the problem. What should you do next?

A) Document the problem and the solution.
B) Have other users reboot their workstations.
C) Connect to the network and try to transfer a file.
D) Replace all the patch cables.

A

When troubleshooting a problem, you should try the obvious or quick fixes first. Once you have implemented a solution or workaround, you will need to test the solution to be sure it resolved the problem.

Connect to the network and try to transfer a file.

143
Q

You administer a small 100Base-TX Fast Ethernet network for your company. Users report that the network is responding very slowly to user requests, and you conclude that the NIC in the John1 computer is causing a broadcast storm.

What would lead you to this conclusion?

A) The traffic link light on the hub port that is connected to the NIC in John1 is constantly off.

B) The power light on the NIC in John1 is constantly off.

C) A protocol analyzer indicates that John1 is occasionally transmitting data packets.

D) The traffic link light on the NIC in John1 is constantly on.

A

The term broadcast storm refers to the presence of too many data packets that are being sent simultaneously on a network. Several conditions can cause a broadcast storm, including a malfunctioning network component, incompatible network equipment, cable crosstalk, and too many computers on one subnet. In this scenario, a malfunctioning transceiver on a network interface card (NIC) is constantly sending data packets that flood the network and prevent other computers from communicating. This problem would be indicated by the link light on the NIC in the John1 computer, which would remain constantly on, leading you to conclude that the John1 computer is causing a broadcast storm. Typically, the link light on a NIC that is functioning properly will flicker on and off as the NIC transmits data. Some NICs have one light that indicates network connectivity and a separate light that indicates traffic; in this scenario, the traffic light would be continuously on instead of flickering on and off. In addition, the device to which the John1 NIC is connected, such as a hub or switch, will also have a continuously lit link light at the John1 connection point.

144
Q

What is the difference with Chattering and Jabbering?

A

A malfunctioning NIC that continuously broadcasts packets on a network may be chattering or jabbering; chatter is the output of continuous random signals, and jabber is the production of oversized data frames.

145
Q

You are on a Linux system, and you want to use a command-line tool to look at POP3 traffic on the local machine. Which command will you use?

A) tcpdump
B) ipconfig
C) netstat
D) tracert

A

The tcpdump command allows you to analyze wired or wireless network traffic on a Linux system. For example, to examine POP3 traffic on the wired NIC, you would use the command sudo tcpdump -I eth0 -nn -s0 -v port 110.

146
Q

What does Show interface command do?

A

Show interface – Show interface is a useful command that can show connectivity issues, physical port issues, port status, traffic flows, and IP address assignments on both switches and routers. This command is very helpful for establishing a networks topology.

147
Q

What does Show Config command do?

A

Show config – The show config command displays the current configuration that is running on a device. This command can be very helpful for identifying if devices have fallen out of compliance with the organization’s set configuration as well as expedite troubleshooting by being able to search for misconfigurations faster.

148
Q

What does show route do?

A

Show route – The show route command is used to view and manipulate the IP routing tables that are stored in a router. These tables contain all the known destination networks, how they were learned, and how to reach them. This command can help identify if a network has all the necessary routes need to complete network communication.

149
Q

You installed a network in a company executive’s home office to allow her to securely access the corporate network and work from home. It has worked properly for three months, but now she says that it is broken. What should you do first to troubleshoot this problem?

A) Identify the problem.
B) Test the theory to determine cause.
C) Establish a theory of probable cause.
D) Establish a plan of action.

A

According to the general troubleshooting strategy, the first thing you should do when troubleshooting a problem is to identify the problem. This includes gathering information, duplicating the problem, questioning users, identifying symptoms, determining if anything has changed, and approaching multiple problems individually. The user’s statement that the network is “broken” does not clarify whether there is an issue with hardware or software, with user error, or with an external vendor such as the network service provider. If a user complains that he is unable to access a server or printer resource on the network, you should first ask if the user is able to access any network resources.

150
Q

The link light on the hub for the cable that connects the hub to the router is not lit. The link lights on the hub for Workstation A and the Server computer are lit. Workstation A and Server can communicate with one another, but neither of these computers can communicate with the Workstation B computer. Workstation B can connect to the Internet through the modem, but Workstation B cannot communicate with either Workstation A or Server.

Which device is most likely causing the communications problem?

A)the modem
B)the hub
C)Workstation A
D)the router

A

Of the choices available, the router is most likely causing the communications problem in this scenario. The router links the company’s LAN to the Internet. Server and Workstation A cannot communicate with Workstation B, and Workstation B cannot communicate with the computers on the company’s LAN, so the router is most likely malfunctioning. Workstation A and Server can communicate with one another, so Workstation A and the hub appear to be functioning properly. Workstation B can connect to the Internet, so the modem appears to be functioning properly.

End-to-end connectivity is a process whereby you troubleshoot connectivity issues from the host experiencing the connection problem all the way through the network. You should always start at the local host and proceed through the network, through routers and other devices, to the destination. Any connectivity problem could be at the host, the remote host, or anywhere in between. Following a logical process will ensure that the exact issue will be located. As you move out from the local host, you should keep in mind that other hosts will be experiencing the same problem. For example, if the problem is not with the local host and you discover that the problem is with the router, all hosts that use that router should be experiencing the same problem.

151
Q

A user is complaining that she cannot log on to the network server. What specific steps should you take to locate the problem? (Choose 3)

A) Have a user on a remote segment try to log on to the server.
B) Ask the user reporting the problem to reboot her workstation.
C) Have a user on the local segment try to log on to the server.
D) Reboot the network server.
E) Ping the server.

A

A logical first place to start troubleshooting would be to determine if the condition is network-wide or workstation specific. Have other similar users both on local segments and remote segments attempt to perform the same actions. You should also verify that connectivity with the server can be established. You can do this by pinging the server.

Rebooting the network server or the user’s workstation are not good first steps in attempting to resolve the problem.

152
Q

While reviewing recent performance reports from your network devices, you notice that there are a high number of corrupt packets reaching a router named Router34. What is most likely happening to them?

A) The packets are being forwarded to the next router upstream.
B) The packets are being dropped.
C) The packets are causing the interface to reset.
D) The packets are causing the duplexing method to change.

A

Corrupt packets are being dropped. Packet drops occur for a variety of reasons, including packet corruption, speed mismatch, and duplex mismatch. Corrupt packets are not forwarded by network devices. An interface only resets when a power outage occurs or when an administrator initiates a reset. Packets cannot change the duplexing method. However, a packet that uses a different duplexing than is the network supports is usually dropped.

As a network technician, you should perform interface monitoring. This includes being able to read errors and determine their cause, understand network utilization reports, determine discards and packet drops and their cause, perform interface resets, and ensure speed and duplex settings are appropriately configured.

153
Q

A user is complaining that she cannot log on to the network server. What should you do first to resolve the problem?

A) Ask the user reporting the problem to reboot her workstation.
B) Establish whether other users are experiencing the same problem.
C) Reboot the network server.
D) Ensure that network server-access limits have not been exceeded.

A

A logical first place to start troubleshooting would be to determine if the condition is network-wide or workstation-specific, for example by having other similar users attempt to perform the same actions. If other users are unable to duplicate the problem, the problem points to a workstation condition. Rebooting the server or the user’s workstation are not good first steps in attempting to resolve the problem. If the server’s access limits had been exceeded, then no other users would be able to log on.

154
Q

Workstation A2 is experiencing delays accessing Server B. Which utility should you run from Workstation A2 to determine the source of the slowdown?

A) netstat
B) tracert
C) ping
D) ipconfig

A

The tracert utility will provide a listing of all routers through which data from Workstation A2 must pass on its way to Server B. If there are any problems along the way, they will show up in the output from the tracert command.

155
Q

Common Router Switch Problems: Port Configuration?

A

Port configuration − Each switch port is a single collision domain. If you improperly configure the ports, then communication on the appropriate domain may not be possible.

156
Q

Common Router Switch Problems: VLan Assignment?

A

VLAN assignment − This problem occurs when configuring the VLAN assignment on a client computer or device. Each VLAN is a separate collision domain. Make sure that client computers are configured with the appropriate VLAN to ensure that they can communicate within the collision domain.

157
Q

Common Router Switch Problems: Bad/Missing routes?

A

Bad/missing routes − This problem will cause routers to incorrectly forward packets. If bad routes are configured, the bad routes should either be reconfigured or deleted. Missing routes should be added. This is more of a problem on statically configured routers.

158
Q

Common Router Switch Problems: Misconfigured DNS?

A

Misconfigured DNS − If the wrong DNS information in configured, devices are unable to resolve a DNS name properly. The device or host will need to be reconfigured with the correct DNS information. For example, if an MX record is entered incorrectly, devices will be unable to access the mail server.

159
Q

Common Router Switch Problems: Misconfigured DHCP?

A

Misconfigured DHCP − If the DHCP server in configured incorrectly, hosts will be obtaining incorrect IP information from this server. This could include incorrect IP address, subnet mask, default gateway, and even DNS server information. While a DHCP server makes it much easier to configure client’s with their IP configuration information, a misconfigured component within the DHCP lease can cause communication problems from all DHCP clients. Also keep in mind that rogue DHCP servers, which are unauthorized DHCP servers, can also cause problems. If you suspect that there is an unauthorized DHCP server on the network, you will need to establish a plan to locate the rogue DHCP server.

160
Q

Common Router Switch Problems: Cable Placement?

A

Cable placement − Cable placement issues vary depending on the type of media (twisted pair, coaxial, or fiber) used. You should avoid running cables near objects that may cause problems with the cabling.

161
Q

Common Router Switch Problems: Simultaneous wired/wireless connections?

A

Simultaneous wired/wireless connections − Some organizations have both wired and wireless networks in use. Client computers, though, should connect to only one of these types of networks. If you want to use a wired connection, you should plug into that network. If a wireless network is in range, your computer may attempt to connect to the wireless network as well if you have enabled the connect automatically feature.

162
Q

Common Router Switch Problems: Discovering neighboring devices/nodes?

A

Discovering neighboring devices/nodes − Most devices have the ability to discover neighboring devices or nodes by using the appropriate routing protocol. It may be necessary to enable multiple routing protocols based on the types of devices to which you must connect.

163
Q

Common Router Switch Problems: Multicast Flooding?

A

Multicast Flooding – Multicasting is group communication method where data transmissions are addressed to a group of destinations simultaneously. When multicast flooding occurs, data packets are flooded to these grouped devices all at once, which can cause slowdowns or network crashes for all the destination devices. Managing data packet flows with flood guards are useful ways to prevent such issues.

164
Q

Common Router Switch Problems: Asymmetrical Flooding ?

A

Asymmetrical Flooding – Asymmetric routing occurs when a data packet takes one path to reach a destination and then takes a different path to return to the source. Asymmetrical flooding occurs when these data packets go through every switch or router that is being sent between this conversation, which will cause the network to either crash or cause significant slowdowns.

165
Q

Common Router Switch Problems: Low optical link budge Optical Link Budget ?

A

Low optical link budge Optical Link Budget – The optical link budget sets a hard limit on the maximum distance an optical network can cover. Having this set too low can cause the network to lag or have dead zones within a network where users are unable to connect well to.

166
Q

Common Router Switch Problems: Certification Issues ?

A

Certification Issues – Many devices within a network have certificates attached to them to verify the information that they are sending and to create a trust model. However, certifications can expire or be revoked if they are mishandled. Routinely monitoring and staying up to date on the various certificates within a network to ensure they are still useable.

167
Q

Common Router Switch Problems: Blocked services, Port Services, Ports, or Addresses ?

A

Blocked services, portsServices, Ports, or addressesAddresses – Occasionally errors can occur within a network due to a port, IP address, or service being blocked. While the reasons these services may have been blocked can vary greatly, IT teams can route this information through a new port or utilize a different service to continue productivity or they can unblock the issue. However, when unblocking these ports, addresses, or services, it is important to ensure that network security is not compromised in the process.

168
Q

Common Router Switch Problems: NTP Issues ?

A

NTP Issues – NTP can have a variety of issues associated with it. Some of the most common issues are not receiving NTP packets, not being able to process NTP packets, NTP packets causing the loss of synchronization, and the NTP clock period being manually set. If NTP is having a significant amount of issues, IT teams can run NTP’s debugging commands canto help identify the issues.

169
Q

Common Router Switch Problems: NIC teaming misconfiguration ?

A

NIC teaming misconfiguration − Also known as load balancing and failover (LBFO), NIC teaming allows multiple network interface cards (NICs) in the same computer to be placed into a team for bandwidth aggregation and traffic failover to prevent connectivity loss in the event of a network component failure.

Active-active versus active-passive − In an active-active NIC team, both NICs work together managing network traffic. In an active-passive NIC team, one NIC is the primary NIC. The other NIC is only brought over in a failover situation when the primary NIC is down.

Multicast versus broadcast − Multicast enables a single device to communicate with multiple hosts. Broadcast occurs when a single device communicates with a single host.

170
Q

You have replaced all of the routers on your network with switches. You then decide to turn off CSMA/CD. What is the BEST description of the result of your actions?

A) Network devices will now operate in half-duplex mode.
B) The switch ports will now operate at a higher port speed.
C) The switch ports will now operate at a lower port speed.
D) Network devices will now operate in full-duplex mode.

A

Network devices will now operate in full-duplex mode. Because each switch port is connected to a single device and each device operates in its own collision domain, you can turn off CSMA/CD, thereby allowing full-duplex mode, meaning that traffic can be transmitted in both directions at the same time.

Network devices will NOT operate in half-duplex mode. This is the mode that is used if CSMA/CD is enabled. Half-duplex mode means that devices can only transmit or receive at any one time.

Your actions do not actually affect the speed of the switch ports. The switch ports are capable of a certain speed regardless of whether using half-duplex or full-duplex mode. Many switches allow you to change the speed of your switch ports by disabling auto-negotiation. However, if you disable auto-negotiation, you can cause devices on your network to stop operating if they do not support the configured port speed.

171
Q

You install a second NIC in your Linux computer. Then, you log on to the computer as root. You want to configure the new NIC with the IP address 192.168.0.1 and the subnet mask 255.255.255.0. Which command should you issue at a command prompt to configure the NIC?

A)ipconfig eth1 192.168.0.1 netmask 255.255.255.0 up
B)ifconfig eth1 192.168.0.1 netmask 255.255.255.0 up
C)ifconfig eth0 192.168.0.1 subnet 255.255.255.0 up
D)ipconfig eth0 192.168.0.1 subnet 255.255.255.0 up

A

On a Linux computer, you should use the ifconfig command to configure a network interface card (NIC). The first NIC in a Linux computer is typically named eth0, and the second NIC is named eth1. Therefore, you should log on to the Linux computer as root, which is also known as the superuser, and issue the command ifconfig eth1 192.168.0.1 netmask 255.255.255.0 to configure the second NIC. The 192.168.0.1 portion of the command configures the IP address for the NIC, the netmask 255.255.255.0 portion of the command configures the subnet mask for the NIC, and the up portion of the command activates the NIC. A similar procedure would be used on a UNIX computer.

172
Q

Which command should you run from Server B to determine whether the default gateway address is properly configured?

A)ipconfig /all
B)ipconfig /renew
C)ipconfig ServerB
D)ipconfig 129.68.0.1

A

The ipconfig /all command lists all the TCP/IP configuration parameters for the computer on which it is run. This includes the default gateway address for the Server B network. By examining the output from ipconfig /all, you will be able to determine if the configured default gateway address is correct.

173
Q

You added a new wireless access point for the Research and Development team in a newly constructed wing of the old building. You also configured the wireless access point to use WPA2. Where do you anticipate most support issues to arise from? (Choose 2)

A) Wrong passphrase
B) Jitter
C) Wrong SSID
D) Attenuation

A

Most support issues will arise from users having the wrong Service Set Identifier (SSID) or wrong passphrase. It is very easy for a user to select the wrong SSID. They may not have the correct password or passphrase, and they may type in the SSID name incorrectly. Checking for the correct SSID is often the first step to wireless troubleshooting. Also, most wireless devices “remember” the previous SSID, even if you move to a new network. Always check the SSID when troubleshooting. Passwords and passphrases are case sensitive, and the number/letter/symbol combinations are easy to miskey.

174
Q

Different type of SSID?

A

For the Network+ exam, you will need to understand the different service sets that SSIDs can have. A basic service set identifier (BSSID) BSSID is used in infrastructure mode to help identify the MAC address of an access point. Unlike a SSID, every access point will have its own unique BSSID as well as a unique MAC address.

Another type of SSID is the Extended Service Set Identifier (ESSID). An ESSID is like a SSID, but this identifier is used across multiple access points as part of the WLAN. The ESSID will function as an electronic marker to identify and address for computers or other network devices and connect to a wireless router to then access the internet.

An independent basic service set, also known as an ad-hoc service set, is the simplest of the service sets as no network infrastructure is needed. An ad-hoc service set consists of one or more stations that will communicate directly with each other rather than utilizing access points.

The last concept for SSIDs you will need to understand is roaming. Roaming is when client devices can move or roam between different access points without disruption any applications or data flows that require a persistent network connection.

175
Q

You administer computers on a Windows network. You suspect a problem with automatic NetBIOS name resolution on a Windows 7 computer on the network. Which command should you use to troubleshoot the name resolution problem?

A) the nbtstat -r command
B) the netstat command
C) the tracert dnsname command
D) the ipconfig /all command

A

Of the listed commands, you should use the nbtstat -r command to troubleshoot the automatic NetBIOS name resolution problem on the Windows 7 computer. On a Windows network, NetBIOS is used to locate computers in a server domain. If TCP/IP is being used on the network, then NetBIOS names need to be resolved to IP addresses. NetBIOS name resolution can be accomplished in two ways in a Windows NT 4.0 server domain: LMHOSTS and Windows Internet Name Service (WINS). The LMHOSTS file is a flat-text file that contains NetBIOS name to IP address resolutions. Each computer on a Windows network that uses LMHOSTS name resolution must have an LMHOSTS file, which must be manually updated when changes are made to NetBIOS name-to-IP address resolution on the network. WINS provides an automatic NetBIOS name-to-IP address resolution system. You can view WINS statistics by using the nbtstat -r command to determine the number of NetBIOS name resolutions on a computer. If the number of name resolutions is zero, then you can assume that there is a problem with a computer’s WINS configuration.

176
Q

Technicians have recently reported to you that the type of lighting in your company’s building can affect the network communication. Which of the following statements is TRUE?

A) Incandescent bulbs emit high frequency electromagnetic waves that can resonate with 100 Mbps transmissions, causing them to amplify beyond the capacity of the media.

B) Halogen lights emit a full spectrum of light that can interfere with fiber-optic transmissions.

C) Fluorescent lighting fixtures emit high levels of EMI.

D) The outer jacket of UTP and STP cable deteriorates when exposed to some types of fluorescent lighting.

A

Fluorescent light fixtures emit high levels of electromagnetic interference (EMI). EMI is essentially noise that is picked up on the network cable. EMI from fluorescent lights can corrupt data; therefore, you should consider your choice of network cable carefully if you must place the cable near fluorescent lights. Halogen lights and incandescent bulbs do not interfere with fiber-optic transmissions. UTP and STP cable does NOT deteriorate in the presence of fluorescent lighting. EMI affects cable placement. Cable placement issues may vary depending on the type of media (twisted pair, coaxial, or fiber) used. You should avoid running cables near objects that may cause problems with the cabling. You should arrange cables to minimize interference. Ideally, Ethernet cables should not be placed close to high voltage cables, generators, motors, or radio transmitters. Often using shielded cabling will prevent this problem. You could also move the interfering device or the cable.

177
Q

You are troubleshooting a problem in which several users have called the help desk to report problems connecting to parts of the WAN. They were able to access the entire WAN earlier in the day, but when they returned from their lunch breaks they were not able to access parts of the WAN. You have been able to gather information about the problem, duplicate the problem, question the users, and adequately establish the symptoms of the problem. What should you do next?

A) Recognize the potential effects of the solution.

B) Establish what has changed.

C) Test the result.

D) Select the most probable cause.

A

According to the general troubleshooting strategy, after establishing the symptoms, you should establish what has changed. This will allow you to make educated guesses as to what might be causing the problem and then select the most probable cause of the problem.

178
Q

Your organization has both UTP and STP cabling available for wiring a new building. What is the main difference in the physical composition of these cables?

A)Separators between the wire pairs
B)Wire gauge
C)Number of twists in the wires
D)Shielding

A

Shielded twisted-pair (STP) cable is identical to unshielded twisted-pair (UTP) cable except for the shielding that encloses the twisted pairs in STP. This metallic shield protects the cable from interference caused by fluorescent light fixtures, motors, and other electromagnetic interference (EMI) sources. STP cable can be used in any implementation where UTP is used, but it is generally only used when shielding from EMI is required because it is more expensive than UTP cable.

Fiber-optic cable is also NOT affected by EMI. Either STP or fiber-optic cable should be used around light fixtures.

179
Q

You want to determine the route a packet takes to reach a remote system. Which Windows utility should you use?

A) telnet
B) netstat
C) ipconfig
D) tracert

A

Tracert is a command-line utility that will show every router interface a TCP/IP packet passes through on its way to a destination. Asterisks seen in any one of the columns mean that the corresponding router took longer than expected, indicating a possible slow link, a link experiencing high traffic, or ICMP filtering being turned on. Syntax: tracert <DNS>An example of Tracert is: tracert www.domain.com</DNS>

Another example of Tracert is: tracert 64.14.46.18

180
Q

You administer a network for your company. You determine that there is a network connectivity problem on one of the computers on the network. You re-create the problem and determine that the problem is located in the NIC. You establish a theory of probable cause. Which step should you take next to troubleshoot the problem?

A) Test the theory.
B) Provide feedback to the users of the computer.
C) Form a correction plan.
D) Implement a correction plan.

A

You have already identified the problem, re-created the problem, and established a theory of probably cause. You should now test the theory. In this scenario, the correction plan might involve running diagnostics on the network interface card (NIC) or simply replacing the NIC. If the test confirms you theory, you should then proceed through the other troubleshooting steps.

181
Q

You have been called to troubleshoot a workstation problem in the oldest building on your company’s corporate campus. The network workstations in that building are unreliable. When the room lights are on, connectivity is lost, but when the room lights are off, the network is functional. Upon arrival, you quickly survey the work environment. You observe the following conditions:

Lighting consists mainly of fluorescent lights.
Temperature is 65 degrees Fahrenheit (18 degrees Celsius).
Humidity is 75%.
Employees own space heaters, but they are not using them.
Electrical outlets appear outdated.

What is most likely causing the loss of connectivity?

A) Low temperature
B) Defective network hubs
C) Fluorescent lighting in the room
D) Voltage fluctuation in the outlets

A

Because the loss of connectivity is only occurring when the fluorescent lights are turned on, it points to electromagnetic interference (EMI) being emitted by fluorescent lighting. EMI is essentially electrical noise that is picked up on the network cable. EMI from fluorescent lights can corrupt data; therefore, you should consider your choice of network cable carefully if you must place the cable near fluorescent lights. Ideally, network equipment should be maintained at a room temperature of 70 degrees Fahrenheit (21 degrees Celsius). However, even lower-than-ideal temperatures would not affect equipment.

182
Q

How can you avoid Voltage fluctuation?

A

Voltage fluctuation in the outlets would not affect network connectivity. Instead, computers rebooting, computer power supply failures, or temporary loss of power could result from voltage fluctuation. EMI affects cable placement. Cable placement issues may vary depending on the type of media (twisted pair, coaxial, or fiber) used. You should avoid running cables near objects that may cause problems with the cabling. You should arrange cables to minimize interference. Ideally, Ethernet cables should not be placed close to high voltage cables, generators, motors, or radio transmitters. Often using shielded cabling will prevent this problem. You could also move the interfering device or the cable.

183
Q

You are a desktop administrator for Nutex Corporation. A user reports that he is unable to access network resources. You notice a break in the network cable. You need to create a new network cable to connect the computer physically to the RJ-45 jack in the wall. What tool should you use to splice the end of the cable to an RJ-45 connector?

A) wire crimper
B) time domain reflectometer
C) optical tester
D) pliers

A

A wire crimper, also referred to as a cable crimper, should be used to splice the end of an Ethernet cable to an RJ-45 connector.

184
Q

You need to determine the length of a network cable. Which device should you use?

A) a tone generator
B) a crossover cable
C) a TDR
D) a hardware loopback

A

You can use a time domain reflectometer (TDR) to determine the length of a network cable. A TDR sends an electric pulse through a cable and measures the time required for the pulse to return. The TDR can then use this information to calculate the length of the cable. If the cable length calculated by the TDR is shorter than the expected length, then you can reasonably deduce that there is a break in the cable. TDRs can detect a variety of cable problems, including short circuits, open circuits, splices, cable breaks, and taps.

185
Q

Your manager suspects that your network is under attack. You have been asked to provide information regarding traffic flow and statistical information for your network. Which tool should you use?

A) penetration test
B) port scanner
C) protocol analyzer
D) vulnerability test

A

A protocol analyzer provides information regarding traffic flow and statistical information for your network. A protocol analyzer is also referred to as a network analyzer or packet sniffer. None of the other tools can provide this information. A port scanner provides a list of open ports and services on your network. A penetration test determines whether network security is properly configured to rebuff hacker attacks. A vulnerability test checks your network for known vulnerabilities and provides methods for protection against the vulnerabilities.

186
Q

You are installing a second wireless access point in your office. When you place the second wireless access point, you notice it is experiencing interference intermittently. You want to prevent the interference. Which method would NOT prevent interference?

A) Decrease the signal strength of the new wireless access point.
B) Move the new wireless access point.
C) Change the channel used on the new wireless access point.
D) Increase the signal strength of the new wireless access point.

A

You should NOT increase the signal strength of the new wireless access point. This would probably increase the interference. Decreasing the signal or power strength can ensure that the wireless LAN does not extend beyond a certain area.

You could move the new wireless access point, change the channel used on the new wireless access point, or decrease the signal strength of the new wireless access point. One other method for preventing wireless interference is changing the wireless telephone used. The scenario only stated that intermittent interference was occurring. It did not state what was causing the interference.

Another potential wireless issue is the wrong antenna type. Antenna types can affect the area that a wireless signal will cover. Unidirectional antennas only transmit in a single direction, while omnidirectional antennas transmit in a defined radius from the antenna placement. In both cases, you should ensure that the wireless access point is placed in an area where the antenna type will be most effective.

187
Q

While troubleshooting a network outage on a 10GBase-SW network, a technician finds a 500-meter fiber cable with a small service loop and suspects it might be the cause of the outage. Which of the following is MOST likely the issue?

A) bend radius exceeded
B) RF interference caused by impedance mismatch
C) maximum cable length exceeded
D) dirty connectors

A

The most likely cause of the issues is the maximum cable length has been exceeded. On a 10GBase-SW network, the maximum cable length is 300 meters. A 10GBase-SW network uses multi-mode fiber cable. It is unlikely that the problem is a dirty connector. Because most connectors spend the majority of the time plugged in, they don’t tend to get dirty.

188
Q

What are some of the cable issues?

A

For the Network+ exam, you also need to understand the following fiber cable issues:

Attenuation/Db loss − Attenuation is the reduction in power of the light signal as it is transmitted. Attenuation is caused by passive media components, such as cables, cable splices, and connectors.

SFP/GBIC cable mismatch − This occurs when you use the wrong cable type. Make sure to ensure that you are using single-mode or multi-mode fiber cable based on the specification needed for the network type you deploy.

Bad SFP/GBIC cable or transceiver − If this occurs, you will need to replace the component that is bad.

Wavelength mismatch − Multi-mode fiber is designed to operate at 850 and 1300 nanometers (nm), while single-mode fiber is optimized for 1310 and 1550 nm. If the wrong wavelength is implemented or a device is added to the network that operates at the wrong wavelength, signal loss will occur.

Fiber type mismatch − If you use different types of fiber cable on the same network, you will experience Db loss. It can cause systems to malfunction or have high error rates.

Connector mismatch − If you use the wrong connectors on your network, devices will be unable to communicate.

189
Q

You have an 802.11g wireless network that uses a single wireless access point. For security purposes, you do not broadcast the SSID. You have noticed wireless latency issues on your wireless network. What should you do to fix this issue?

A) Install another wireless access point that uses a different non-overlapping channel and the same SSID.

B) Disable channel bonding.

C) Install another wireless access point that uses the same non-overlapping channel and a different SSID.

D) Enable channel bonding.

A

You should install another wireless access point that uses a different non-overlapping channel and the same SSID. This will allow the connections to be distributed between the two access points, thereby increasing user throughput.

190
Q

You have been called to assist a user with a network connectivity problem. The user is unable to access an application stored on a server. You want to determine if this problem is network-wide or a workstation problem. Which step should be taken to make this determination?

A) Try opening other applications on the user’s workstation.
B) Shut down the server and reset the network.
C) Reset the user’s rights/permissions for the application.
D) Try opening the application from other workstations.

A

When determining if a problem is network-wide or limited to a workstation, the first step is to try to duplicate the problem on other workstations. If the problem can be duplicated on other workstations, it points to a network-wide problem. Problems that cannot be duplicated on other workstations point to a workstation problem.

191
Q

A user is complaining about poor network connectivity. Upon examining the workstation, you notice it is connected to a patch cable that your new network technician made earlier in the week. You suspect there is interference between two pairs in the cable. What is the most likely culprit for the connectivity issue?

A) Damaged cables
B) Crosstalk
C) Latency
D) EMI

A

Because you suspect interference between two pairs in the cable, the most likely culprit for the issue is crosstalk. Crosstalk occurs when the data signal on one cable “hops” to another cable. This issue is most often found in unshielded twisted pair (UTP) cabling, particularly when the ends of the cable that feed into the RJ-45 jack are too long. Those types of connection issues are common with cables made by new employees. Solutions include purchasing professionally assembled cables, rerouting cables, adding new RJ-45 connections, and upgrading to a higher grade of cable, such as Cat6 or Cat7.

192
Q

You need to verify a network’s transmission speed. Which tool should you use?

A) bit-error rate tester
B) throughput tester
C) connectivity software
D) loopback plug

A

A throughput tester is best used to verify a network’s transmission speed.

Connectivity software is any type of software that allows you to remotely connect to a network. Microsoft’s proprietary Remote Desktop Protocol (RDP) and Remote Desktop Connection (RDC) are both types of connectivity software. RDC is a Microsoft technology that allows a local computer to connect to and control another computer remotely. With RDC, organizations can attach a remote desktop gateway. A remote desktop gateway is a role service that will enable authorized remote users to connect to and utilize the resources on an internal private network from any device that can run a RDC client. These gateways utilize both SSL and RDP protocols to improve security, provide encryption, and ensure proper authentication with remote connections.

193
Q

You install a network analyzer to capture your network’s traffic as part of your company’s security policy. Later, you examine the captured packets and discover that the only packets that were captured are from Subnet 1. You need to capture packets from all four subnets on your network. Two routers are used on your network.

What could you do? (Choose two. Each answer is a complete solution.)

A) Install the network analyzer on the firewall.
B) Install a port scanner.
C) Install the network analyzer on a router.
D) Install a distributed network analyzer.
E) Install the network analyzer on all four subnets.

A

You could either install the network analyzer on all four subnets, or install a distributed network analyzer. Standard network analyzers only capture packets on the local subnet. To capture packets on a multi-subnet network, you could install the network analyzer on all four subnets. Alternatively, you could purchase a network analyzer that can capture all packets across the subnets. Typically, a distributed network analyzer consists of a dedicated workstation network analyzer installed on one subnets and software probes installed on the other subnets.

194
Q

You have recently been hired by a small company to assess its network security. You need to determine which TCP/IP ports are open on the network. Which tool should you use?

A) a port scanner
B) whois
C) a packet analyzer
D) a wardialer

A

You can use a port scanner to determine which Transmission Control Protocol (TCP) ports are open on a private network. A port scanner is a device that automatically attempts to communicate with different protocols over all ports and records which ports are open to which protocols. For example, File Transfer Protocol (FTP) generally communicates over port 21. For security reasons, however, an administrator might close port 21 and map FTP traffic to a different port. By attempting FTP communications over all ports, a port scanner might allow a hacker to find the open FTP port and bypass the security measure. You can also use stealth scanning and port scanning to determine which operating systems are being used on a network.

195
Q

You are the network administrator for a corporate network that includes a DNS server, a DHCP server, a file/print server, and a wireless subnet. Computers on the wireless subnet are having trouble connecting to internal resources and to the Internet.

Upon troubleshooting the problem, you discover that some of the wireless computers can only access resources on other wireless computers. However, some of the wireless computers can access internal resources and the Internet.

What is causing some of the wireless computers to be able to access other wireless computers only?

A) The computers are configured to operate in infrastructure mode.
B) The computers are configured to operate in ad hoc mode.
C) The computers are configured with the wrong subnet mask.
D) The computers are configured with static IP addresses.

A

Ad hoc mode allows wireless computers to be configured much more quickly than infrastructure mode. Ad hoc mode wireless computers all participate in the same network. This means that the ad hoc wireless computers can access each other, but cannot access network resources on a LAN, WAN, or Internet. Ad hoc mode is cheaper to implement than infrastructure mode. In addition, it is easy to set up and configure and can provide better performance than infrastructure mode. However, it is difficult to manage an ad hoc mode wireless network.

Infrastructure mode allows wireless computers to connect to a LAN, WAN, or the Internet. This means that infrastructure mode wireless computers can access all computers on the LAN, WAN, and Internet. Infrastructure mode is much more expensive than ad hoc mode to implement because you must configure wireless access points. While infrastructure mode is harder to set up and configure, management is much easier than with ad hoc mode.

The problem is not with static IP addresses or the subnet mask. The ad hoc mode wireless computers are configured with dynamic IP address information, but have not received that information from the corporate DHCP server.

196
Q

In your fiber network, some users are reporting connectivity issues, while others are not. You suspect a faulty or broken cable. Which tool would help you locate the fault?

A) Loopback adapter
B) Multimeter
C) OTDR
D) Spectrum analyzer

A

An optical time domain reflectomer (OTDR) is a tool that analyzes the quality of a connection in a fiber optic cable. It is most often used to find breaks in the cable.

197
Q

You are the network admin at a small college. For most of the day, your school’s wireless network performs as it should. Between classes, however, performance is abysmally slow. What is the most likely cause?

A) Refraction
B) Channel overlap
C) Overcapacity
D) Signal-to-noise ratio

A

You should look at overcapacity. Overcapacity is an issue in wireless performance. The proliferation of wireless devices will put an enormous drain on a wireless network originally designed for a few devices. In today’s environment, the network may need to provide service to tablet computers, smartphones, personal performance monitors, and smart watches, in addition to the few laptops the network was originally designed to support. From the symptoms being described, more students are connecting their devices between classes, causing the performance of the network to degrade.

198
Q

What does refraction do a signal?

A

Refraction “bends” the signal as it passes through, or the signal curves as it tries to go around the object. Think of a stick where part of the stick is in the water and part of the stick is out of the water. The stick appears ‘‘bent” because the water causes refraction of the image. If refraction were the issue, the problem would be throughout the day, not just at certain times.

199
Q

An employee has just relocated to the New York office, after working in Paris for the past five years. Both offices use DHCP to issue IP addresses. She brought her company laptop with her. The laptop was issued in Paris. As she is settling in to the new office, she is not able to connect to the network. What is the most likely cause of her problem?

A) Hardware failure
B) Untrusted SSL certificate
C) Expired IP addresses
D) Duplicate MAC addresses

A

The most likely cause of the problem is a duplicate MAC address. Duplicate MAC addresses can be caused by MAC address spoofing or by manufacturers reusing MAC addresses in their devices. Manufacturers will often ship NICs with duplicate MAC addresses to different geographic areas. With regard to manufacturers recycling MAC addresses, as long as two NICs with the same MAC address have at last one router between them, there will not be a conflict. Routers direct traffic via IP addresses, while switches direct traffic via MAC addresses, with an ARP table showing the relationship between MAC address and IP address.

200
Q

Your Windows 7 computer is located on a TCP/IP network that uses DHCP. You want your computer to release its lease on the TCP/IP configuration that it received from the DHCP server. Which command should you issue to release the configurations?

A) the ipconfig command
B) the ping command
C) the arp command
D) the tracert command

A

You should issue the ipconfig command with the /release switch to release your computer’s lease on the TCP/IP configuration that it received from the Dynamic Host Configuration Protocol (DHCP) server. If other computers cannot locate your computer on the network, then you might need to renew the DHCP lease for your TCP/IP configuration. You can renew the lease by issuing the ipconfig /renew command at a command

201
Q

A user is experiencing network connectivity issues after a faulty NIC was replaced. You want the user to have excellent throughput, so you configure the NIC for full-duplex (auto configuration off). The corresponding switch port is configured as auto-config, so you should be OK, but the throughput is lower than expected. What is the issue?

A) TX/RX reverse
B) Bottlenecks
C) Incorrect pin-out
D) Duplex/speed mismatch

A

When you manually set a device to full-duplex (auto-config off), the device will assume it should use half-duplex transmission. Duplex/speed mismatch is a misconfiguration of an NIC, switch port, or router port. Duplex refers to whether the traffic is talk only/listen only or bidirectional traffic, like a phone call. Speed relates to the data transfer rate, such as 100mbs or 1000mbs. If one port is configured at half duplex and the other port is configured at full duplex, the user will notice a severe drop in performance, because the network will operate at the slower half duplex speed.

202
Q

You have implemented an Ethernet CSMA/CD network for your company. Users complain of delays. When you research the issues, you discover that the network has low throughput. What is the most likely cause of delay on this network?

A) broadcast storms
B) collisions
C) switching loops
D) improper termination

A

Collisions on an Ethernet CSMA/CD network are normal and generally do not cause any negative effects. In fact, they are required for proper operation. However, an excessively high number of collisions occurring for a sustained length of time can cause delays and slow throughput. CSMA/CD will negotiate standoff timers to allow multiple devices to communicate on congested network segments.

You can determine if a network is experiencing problems due to collisions by using the show controller ethernet [ interface number ] command. This command displays the collisions counter, which includes the number of excessive collisions. The “excessive collisions” number refers to the number of frames that were not transmitted due to excessive collisions detected on the network. This usually indicates a problem. Common causes are devices improperly configured as full-duplex, malfunctioning network interface cards, or too many stations on the network medium.

CSMA/CD network devices “sense,” or listen, for network traffic before transmitting. If the network is free of traffic, the device will send its data, still listening to determine if another device is sending data at the same time. If more than one device sends data, a collision will occur. When the devices detect a collision, they stop transmitting and wait a random amount of time before retransmitting the data. Although CSMA/CD does not stop collisions, it does provide a way to manage them.

203
Q

You are nearing the completion of a project that involves implementing a new network infrastructure and upgrading the operating systems running on your network servers. Currently, static IP addresses and HOSTS files are used. The upgrade has included implementing DNS, implementing DHCP, and moving servers and other resources to a new location with new IP addresses. However, now you cannot access the resources that were moved using their host names from any of the client workstations. You can access them by their IP addresses. What should you do first?

A) Enable NetBIOS over TCP/IP.

B) Configure DHCP to supply a different range of IP addresses to the workstations.

C) Import the workstations’ names and address mappings to DNS.

D) Delete the HOSTS file on each workstation.

A

Workstations read entries in their HOSTS files before making requests to DNS. In this scenario, this behavior would cause the workstation to use the incorrect IP address when attempting to access a server by its host name. For example, suppose an FTP server with an original IP address of 172.35.2.100 and the host name ftp.domain.com was moved and its address changed to 172.25.2.300. When a user typed in the URL for the server in a browser, the client would search its HOSTS file and find an entry for ftp.domain.com at IP address 172.35.2.100. It would then attempt to contact the server using IP address 172.35.2.100, which is the wrong IP address. However, if you delete the HOSTS file, or remove the entry for the server, the workstation will search DNS to resolve the server’s host name when it does not find an entry for the server the local HOSTS file.

203
Q

The company network that you administer has four LANs: accounting, receiving, shipping, and development. Each LAN is connected to the other LANs by a router. The user of the computer named LeadDev on the development LAN reports that he cannot connect to a computer named DevServ, which is also on the development LAN. The user of a computer named Shipmaster on the shipping LAN reports that she can connect to the DevServ computer.

Which situation is the most likely cause of the connectivity problem?

A) The Shipmaster computer has a faulty NIC.
B) The network cable is disconnected from the NIC on the LeadDev computer.
C) The router is defective.
D) The NIC in the DevServ computer is defective.

A

Of the choices provided, the most likely cause of the problem in this scenario is that the network cable is disconnected from the network interface card (NIC) on the LeadDev computer. Because the Shipmaster computer can connect to the DevServ computer, the communication path between these two computers is functioning normally. This path includes the NIC on the Shipmaster computer, the router between the shipping and the development LANs, and the NIC on the DevServ computer.

If the router were defective, then the Shipmaster computer would not be able to connect to the DevServ computer. Therefore, the most likely source of the problem is a faulty connection between the LeadDev computer and the development network; the disconnected cable is the only possibility offered that would cause the faulty connection.

203
Q

You have discovered that hackers are gaining access to your WEP wireless network. After researching, you discover that the hackers are using war-driving methods. You need to protect against this type of attack.

What should you do? (Choose 3)

A)Configure the WEP protocol to use a 128-bit key.
B)Change the default SSID.
C)Configure the network to use authenticated access only.
D)Disable SSID broadcast.

A

You should complete the following steps to protect against war-driving attacks:

Change the default SSID.
Disable SSID broadcast.
Configure the network to use authenticated access only.

You should not configure the WEP protocol to use a 128-bit key. In recent years, WEP has been proven to be an ineffective security protocol for wireless networks, regardless of whether you use low or high encryption. It is a protocol that is very easy to crack using a brute force attack.

Some other suggested steps include the following:

Implement Wi-Fi Protected Access (WPA) or WPA2 instead of WEP.
Reduce the access point’s signal strength.
Use MAC filtering.

204
Q

You are about to install several wireless access points in different areas of the building. You want maximum coverage, so you opt for the longer-range 2.4 Ghz frequency. Which item below should most likely also be of concern?

A) Channel overlap
B) Power levels
C) Security type mismatch
D) Interference

A

You should be concerned with channel overlap. Channel overlap can cause performance issues. Even though 11 channels are available in the US, there is a high degree of overlap. When using multiple wireless access points in 2.4 GHz mode, you should set the wireless channels at 1, 6, and 11 to provide the best coverage.

205
Q

During a recent troubleshooting incident, you discovered a problem with some network transmission media. The communication over the media was distorted. Which issue most likely caused this problem?

A) Attenuation
B) EMI
C) Crosstalk
D) ESD

A

Electromagnetic interference (EMI) is interference in the operation of other electrical devices caused by electromagnets, which distorts the signal. Electromagnetic fields can be found in large industrial equipment or smaller equipment such as air conditioners and heaters. If you move network devices to new locations and then start experiencing performance problems, you should examine the new location to see if EMI is causing the problem.

EMI can affect network communications through the network cabling. The source of the EMI is often difficult to find. One simple method you can use to locate an EMI source is to place a compass close to the suspected EMI source, looking for unusual needle movements. Once the source of the EMI is found, there are two possible solutions. The first is to move the existing cable away from the EMI source. The second is to replace the existing cabling with shielded cabling or fiber-optic cabling, which are resistant to EMI.

206
Q

Your network is experiencing a problem that a technician suspects is concerning a Cisco router. The technician provides you the following command results:

1 14.0.0.2 4 msec 4 msec 4 msec 2 63.0.0.3 20 msec 16 msec 16 msec 3 33.0.0.4 16 msec * 16 msec

Which Cisco command produced the results you were given?

A) ping
B) traceroute
C) extended ping
D) tracert

A

The output displayed is a part of the output from executing the traceroute command on a Cisco router. The traceroute command finds the path a packet takes while being transmitted to a remote destination. It is also used to track down routing loops or errors in a network. Each of the following numbered sections represents a router being traversed and the time the packet took to go through the router:

1 14.0.0.2 4 msec 4 msec 4 msec 2 63.0.0.3 20 msec 16 msec 16 msec 3 33.0.0.4 16 msec * 16 msec

207
Q

You are a system administrator. A user calls you complaining that every time she tries to log on to the network, she gets an error message. Other users are not having any problems. Which question is best to ask first when attempting to troubleshoot the problem?

A) Which error message do you receive?
B) What is your username and password?
C) Have you rebooted your computer?
D) How much memory is installed in your computer?

A

Knowing the exact error message would be the best first step in solving this problem. The message itself may point to the cause of the problem. Information pertaining to the amount of memory, the user name and password, and whether the computer has been rebooted could be useful in other scenarios. This type of information would not enable you to determine the problem in this scenario.

208
Q

You are implementing an 802.11g wireless network in your office. What is the maximum number of wireless access points that you can implement within 30 meters of each other?

A) three
B) four
C) five
D) two

A

You can implement a maximum of three 802.11g wireless access points within 30 meters of each other. The 802.11g wireless access points only have three non-overlapping channels (1, 6, and 11 in the United States; 1, 6, and 13 in Europe.) Therefore, to prevent interference, you need to configure the three wireless access points with different channels.

209
Q

You notice that the new cabling that was purchased is rated as “plenum.” Which statement is true about the cable?

A) It is rated for speeds of 1000 Mbps.
B) It is less fire-resistant than a riser cable.
C) It cannot be tapped without detection.
D) It will not produce toxic gas when it burns.

A

A plenum-rated cable will not produce toxic gas when it burns; therefore, it can be used in plenum areas, such as ventilation ducts and other areas that carry breathable air. When deciding whether or not to use plenum-rated cables, you should consider the ceiling airflow condition. Workstation models, window placement, or floor composition will not affect the decision on whether to use plenum cabling.

The coating of non-plenum cables produces toxic gas when it burns. Most fire codes require plenum-rated cable in any area that carries breathable air.

Plenum cable is more fire-resistant than riser-rated cable, not less. Both plenum and riser-rated cables are more fire-resistant than general purpose cables, but the fire code requirements are the most stringent for plenum cables.

Unlike plenum-rated cables, riser-rated cables are suited to go into non-plenum spaces and between the floors of buildings. Usually, riser cables are installed in between the walls of buildings as well as areas that do not pose danger in the event of a fire. Riser cables are typically installed in vertical runs to form the telecommunications backbone of a commercial building’s network.

210
Q

You need to implement a wireless network to provide users in an outdoor sitting area with Internet connections. Which signal-absorbing obstructions should be noted when performing a WLAN site survey?

A) microwave ovens
B) plastic material
C) trees
D) local telephone lines

A

Trees should be considered as signal-absorption objects when performing 802.11b Wireless Local Area Network (WLAN) site surveys. Water pools, trees, and construction materials, such as steel and wood, can absorb the radio frequency signal. Objects with water content should be avoided to prevent radio frequency signal absorption. Some objects act as reflectors of the signal, thereby causing multipath distortion. Concrete walls, metal studs, or even window film could affect the quality of the wireless network signals.

211
Q

You are the network administrator for your company. One of your trainees configured the company’s network. However, the network is not working. You ran the ipconfig command on Host A and found that the subnet mask on Host A is not properly configured. The network is shown in the following image:

IP address: 172.32.2.3
Subnet Mask:
Default Gateway: 172.32.2.1
Broadcast Address: 172.32.3.255

Which subnet mask should you configure on Host A to solve the problem?

A)255.255.0.0
B)255.255.240.0
C)255.255.254.0
D)255.255.192.0

A

According to the diagram in this scenario, the IP address configured on Host A is 172.32.2.3 and the broadcast address is 172.32.3.255. If the broadcast address for this network is 172.32.3.255, then the network ID of the next subnet in the series of subnets created by the mask is 172.32.4.0. Because the gateway address (which must be in the same subnet as the hosts) is 172.32.2.1, it indicates that the subnet that contains the three addresses (IP address, gateway and broadcast address) has a network ID of 172.32.2.0. The mask must be 255.255.254.0. It would yield the following subnet IDs:

172.32.0.0
172.32.2.0
172.32.4.0
172.32.6.0
…and so on.

The mask could not be 255.255.0.0. This is a standard class B mask, and when used the broadcast address would be 172.32.255.255, not 172.32.3.255.

The mask could not be 255.255.240.0. This would create an interval of 16 between subnets in the third octet, which would yield the following subnet IDs:

172.32.0.0
172.32.16.0
172.32.32.0
…and so on.

If this were the case, the broadcast address for these addresses’ subnet would be 172.32.15.255, not 172.32.3.255.

The mask could not be 255.255.192.0. This would create an interval between subnets of 64 in the third octet, which would yield the following subnet IDs:

172.32.0.0
172.32.64.0
172.32.128.0
…and so on.

If this were the case, the broadcast address for the subnet hosting these addresses would be 172.32.63.255, not 172.32.3.255.

212
Q

Your client is experiencing what appears to be a decrease in network throughput. However, the symptoms the client is reporting to you are not detailed enough for you to diagnose the issue and make a recommendation. What will best assist you in pinpointing the bottleneck the next time it occurs?

A) Wiring and port locations
B) Standard operating procedures/work instructions
C) Network configuration and performance baselines
D) Rack diagrams

A

Network configuration and performance baselines are parts of the network documentation that assist with troubleshooting. In particular, performance baselines show how the network performs under typical loads, in terms of bandwidth used, packets dropped, throughput, or other metrics, for a given period of time. Later, when network issues occur, such as a perceived drop in network speed, the administrator can compare current conditions to the previously recorded baseline.

213
Q

You are the network administrator for your company. You are in the process of verifying the configuration of the network devices to ensure smooth network connectivity. You want information on the routes taken by packets from a Cisco router so that you are able to identify the network points where packets are being dropped. Which command should you use to accomplish this task in the most efficient manner?

A) tracert
B) ping
C) traceroute
D) extended ping

A

You should use the traceroute command. The traceroute command finds the path a packet takes while being transmitted to a remote destination. It is also used to track down routing loops or errors in a network. The following code is a sample output of the traceroute command:

Type escape sequence to abort. Tracing the route to 33.0.0.4 1 11.0.0.2 4 msec 4 msec 4 msec 2 24.0.0.3 20 msec 16 msec 16 msec 3 33.0.0.4 16 msec * 16 msec Jan 20 16:42:48.611: IP: s=12.0.0.1 (local), d=33.0.0.4 (Serial0), len 28,sendingJan 20 16:42:48.615: UDP src=39911, dst=33434Jan 20 16:42:48.635: IP: s=11.0.0.2 (Serial0), d=11.0.0.1 (Serial0), len 56,rcvd 3Jan 20 16:42:48.639: ICMP type=11, code=0

The tracert command is incorrect because this command is used by Windows operating systems, not the Cisco command-line interface. However, the purpose of the tracert command is similar to the Cisco traceroute utility, namely to test the connectivity or “reachability” of a network device or host. The tracert command uses Internet Control Message Protocol (ICMP).

214
Q

You instruct a user to issues the ipconfig command with the /release and /renew options. In which two situations would it be appropriate to ask a user to do this? (Choose 2)

A) when no IP helper address has been configured on the router between the client and the DHCP server

B) when the result of running the ipconfig /all command indicates a 169.254.163.6 address

C) when recent scope changes have been made on the DHCP server

D) when the no ip directed-broadcast command has been issued in the router interface local to the client, and no IP helper address has been configured on the router between the client and the DHCP server

A

It would it be appropriate to issue the ipconfig command with the /release and /renew options when the result of running the ipconfig /all command indicates a 169.254.163.6 address, or when recent scope changes have been made on the DHCP server. When a computer has an address in the 169.254.0.0 network, it indicates that the computer has not been issued an address from the DHCP server. Instead, the computer has utilized Automatic Private IP Addressing (APIPA) to issue itself an address. If the reason for this assignment is a temporary problem with the DHCP server or some other transitory network problem, issuing the ipconfig /release command followed by the ipconfig /renew command could allow the computer to receive the address from the DHCP sever.

Similarly, if changes have been made to the settings on the DHCP server, such as a change in the scope options (such as gateway or DNS server), issuing this pair of commands would update the DHCP client with the new settings when this address is renewed.

215
Q

Users are reporting Internet connectivity issues. After researching, you discover that the routing protocols in use on your network are experiencing routing loops. You must prevent this from happening. What should you do?

A) Replace the routers on your network.

B) Implement split horizon.

C) Reconfigure your routers so that only a single routing protocol is used throughout the network.

D) Test all of the routing interfaces to determine which is experiencing problems.

A

You should implement split horizon to prevent routing loops. Split-horizon route advertisement prevents routing loops in distance-vector routing protocols by prohibiting a router from advertising a route back onto the interface from which it was learned. None of the other options would solve the routing loop issue.

216
Q

Your organization has several wireless access points located in the building. Access point usage is based on department membership. Many users report that they are able to see multiple access points. You research this issue and discover that their computers are not connecting to the appropriate access point due to an SSID mismatch. You must ensure that the computers connect to the correct access point if that access point is available. Computers should be able to connect to other access points only if their main access point is down. What should you do?

A) Reduce the signal strength on the wireless access points.

B) Ensure that the wireless access points in close proximity use different channels.

C) Configure the preferred wireless network on the user’s computer.

D) Configure MAC filtering on the wireless access points.

A

You should configure the preferred wireless network on the user’s computer. After this is completed, the user’s computer will automatically connect to the preferred wireless network if it is available. If a computer is connected to the wrong SSID, you need to change to the correct access point and then set that access point as the preferred network.

217
Q

Your company is researching different wireless antennas. Antennas that you research are high-gain antennas. Which statement describes a property of high-gain antennas?

A) High-gain antennas provide a wide coverage area.
B) High-gain antennas provide a small vertical beamwidth.
C) High-gain antennas are best suited for point-to-multipoint bridging.
D) High-gain antennas avoid multipath distortion.

A

A high-gain antenna has a small vertical beamwidth.

The beamwidth parameter of the antenna defines the angle of the radio signal radiated. The angle of radiation of the signal is defined in degrees. The antenna properties include the gain, beamwidth, and transmission angle.

Antennas with higher gain have less beamwidth than antennas with lower gain. The high-gain antennas have very narrow beamwidth. For example, typical 6-dBi patch antenna has a 65-degree beamwidth, but the 21-dBi parabolic dish antenna has a 12-degree radiation pattern.

218
Q

You are installing a known good NIC in a computer, and a spark jumps from your hand to the NIC. You install the NIC and discover that the NIC no longer operates correctly. What has most likely caused the NIC to malfunction?

A) RFI
B) a power sag
C) ESD
D) EMI

A

Of the choices listed, an electrostatic discharge (ESD) has most likely caused the network interface card (NIC) to malfunction. ESD occurs when static electricity jumps from an object with a higher electrical charge to an object with a lower electrical charge. You can build up static electricity in your body by walking across a carpet. This static electricity can then be discharged in the form of ESD into the circuits on a microchip, which can destroy such circuits. NICs are expansion cards that contain microchips that ESD can destroy. You should take measures to prevent ESD before you handle the expansion cards in a computer. For example, you can wear an anti-static wrist strap, or you can discharge the static electricity in your body by touching a grounded object such as a computer case before you touch a circuit board. Companies should make employees aware of electrical safety if personnel may be required for perform work that could result in electric shock, such as computer repair. Proper grounding techniques should be covered as part of personnel training.

219
Q

Your company needs to deploy a wireless network to allow users to connect to the network using mobile devices. You are concerned that the radio signal will not cover the amount of area you need. Another technician instructs you to research the angle of radiation of the wireless access point’s antenna. Which term is used to refer to this?

A) sensitivity
B) gain
C) bandwidth
D) beamwidth

A

The term used to refer to the angle of radiation of an antenna is beamwidth.

There are many differences between the types of antennas that you can use, including beamwidth, gain, transmission angle, and frequency. The beamwidth parameter of the antenna defines the angle of the radio signal radiated. The angle of radiation of the signal is defined in degrees. Antenna properties include the gain, beamwidth, and transmission angle. The gain is a measure of how much of the input power is concentrated in a particular direction.

Antennas with higher gain have less beamwidth than antennas with lower gain. The high-gain antennas have a very narrow beamwidth.

For example, typical 6-dBi patch antenna has a 65-degree beamwidth, but the 21-dBi parabolic dish antenna has a 12-degree radiation pattern.

You also need to understand signal strength. In most wireless access points, you can adjust the signal strength. This feature is particularly useful if you want to prevent the signal from reaching outside a building. Then you would adjust (lower) the signal strength and possibly change the access point placement to prevent the signal from reaching there. The coverage of the signal depends on the type of access point you are deploying, the location where it is deployed, and the frequency used.

For the Network+ exam, you will also need to understand antenna polarization. Polarization refers to the radiated field that is produced by an antenna. These vibrations can be configured to go in a vertical angle, horizontal angle, or any angle perpendicular to the string. Antennas can be sensitive to this polarization, which can cause issues with signal strength, so IT professionals should be cognizant of antenna placement.

220
Q

You are shopping for a new wireless access point. The access point will be mounted to the wall. With which one of these should you be concerned during the selection process?

A) Wrong passphrase
B) Incorrect antenna type
C) Incorrect antenna placement
D) Security type mismatch

A

You should be concerned with incorrect antenna placement during the selection process. Antenna placement can cause issues with Wi-Fi performance. Check the manufacturer’s placement recommendation – some wireless access points are designed for wall mounting, while others are designed for ceiling mounts. Also, placing a wireless access point near metal ductwork, larger metallic lamps, on top of a ceiling panel, or next to a thick wall can cause performance issues.

221
Q

You are investigating possible unauthorized access to a Windows Server 2008 computer. The first step in your company’s investigation policy states that the current network connections must be documented. Which command should you use?

A)tracert
B)netstat
C)ping
D)ipconfig

A

You should use the netstat command. This tool displays incoming and outgoing connections, routing tables, and network interface statistics.