Domain 5: Network Troubleshooting and Tools Flashcards
Which of the following troubleshooting steps involves prioritizing trouble tickets based on the severity of the problem?
A. Identify the problem
B. Establish a theory of probable cause
C. Test the theory to determine cause
D. Establish a plan of action to resolve the problem and identify potential effects
E. Implement the solution or escalate as necessary
F. Verify full system functionality and, if applicable, implement preventive measures
G. Document findings, actions, and outcomes
A. Identify the problem
The first step in troubleshooting is to identify the problem by establishing symptoms related to the network issue being reported. In this step, problems are typically reported as trouble tickets, which are prioritized based on the severity of the problem. You complete the other steps after the trouble ticket has been prioritized and is being investigated.
Which of the following is considered a system-wide error?
A. A problem with an order entry or customer service call center resource
B. A problem with a router that affects only one local area network (LAN)
C. A fatal error that causes a single computer to fail
D. A problem with an email server that affects all network users
C. A fatal error that causes a single computer to fail
A system-wide error is a problem that renders an individual user’s system (computer) completely unusable. All the other problems listed would affect more than one system or user.
Which of the following is a network-wide problem?
A. A problem with an order entry or customer service call center resource
B. A fatal error that causes a single computer to fail
C. A problem with an application server that affects a single local area network (LAN)
D. A problem with a router that connects an entire network to the Internet
D. A problem with a router that connects an entire network to the Internet
Any problem that affects all the users on the network is a network-wide problem and should be given the highest priority. An example of this would be a problem with an Internet router. All other problems listed do not affect the entire network.
A user reports that she can’t connect to a server on her network. Ed wants to identify the scope of the problem, so he tries to reproduce the problem on the user’s computer. The problem still remains. No other users are reporting this problem. What is the next logical step that Ed should perform to identify the affected area?
A. Verify that the local router is forwarding traffic
B. Try performing the same task on a computer attached to the same segment
C. Verify that the server is configured properly
D. Verify that the switch the client is connected to is functioning
B. Try performing the same task on a computer attached to the same segment
In this scenario only one user is reporting a problem. Therefore, the likeliest next step is to perform the same task on another computer attached to the same segment. If Ed can perform the task successfully, the problem most likely lies within the user’s computer or the connection to the switch. Since no other users are reporting the same problem, the server and switches on the network are probably up and functioning. Checking the router isn’t necessary since the user and server are on the same network.
Which of the following troubleshooting steps involves asking the user preliminary questions such as, “What were you doing when the problem occurred?”
A. Identify the problem
B. Establish a theory of probable cause
C. Test the theory to determine cause
D. Establish a plan of action to resolve the problem and identify potential effects
E. Implement the solution or escalate as necessary
F. Verify full system functionality and, if applicable, implement preventative measures
G. Document findings, actions, and outcomes
A. Identify the problem
The first step in troubleshooting is to identify the problem by establishing symptoms related to the network problem being reported. In this step you ask the user many questions to identify and define the symptoms of the problem and prioritize the trouble ticket. Although you might continue to ask the user questions throughout the troubleshooting process, this is typically associated with the first step of the troubleshooting process.
When troubleshooting, you begin by taking steps to identify the problem. After you do this, which of the following steps should you perform next?
A. Implement the solution
B. Establish a plan of action
C. Establish a theory of probable cause
D. Verify full system functionality
C. Establish a theory of probable cause
After identifying the problem, the next step is to establish a theory for the probable cause of the problem. After that, you can test your theory, establish a plan of action, implement a solution, verify the functionality of the system, and document the entire process.
In which troubleshooting step do you try to duplicate a network problem to “divide and conquer” by logically and methodically eliminate elements that aren’t the source of the problem?
A. Identify the problem
B. Establish a theory of probable cause
C. Test the theory to determine cause
D. Establish a plan of action to resolve the problem and identify potential effects
E. Implement the solution or escalate as necessary
F. Verify full system functionality and, if applicable, implement preventative measures
G. Document findings, actions, and outcomes
B. Establish a theory of probable cause
The second step in troubleshooting is to attempt to duplicate a problem and develop a theory of its probable cause. As you troubleshoot a problem, you then test your theory to confirm your findings. You complete the other troubleshooting steps after the specific cause has been identified.
You have a problem with a server or other network component that prevents many users from working. What type of problem is this?
A. A network-wide problem
B. A shared resource problem
C. A system-wide problem
D. A user application problem
B. A shared resource problem
If a problem lies within a specific server or other network component that prevents many users from working, it is a shared resource problem.
A single Windows user suddenly can’t connect to any hosts on the network (local or remote). Alice interviews the user and finds out that he made some changes to his computer’s Internet Protocol (IP) configuration properties. What should she do next?
A. Run the ipconfig command to view the local configuration
B. Check the Domain Name System (DNS) server to see if it is resolving IP hostnames
C. Check the Windows Internet Name Service (WINS) server to see if it is resolving Network Basic Input/Output System (NetBIOS) names
D. Verify that the router is functioning
A. Run the ipconfig command to view the local configuration
Since only one user is reporting the problem and he had admitted to making changes to his IP configuration, Alice should probably start by checking the configuration using the ipconfig command.
Alice has a network with a Domain Name System (DNS) server, a proxy server, and an Internet router. A user is complaining that she suddenly can’t connect to hosts on her own local area network (LAN) and other internal LANs, and she can’t access hosts on the Internet. What is the likeliest problem?
A. The user’s local configuration
B. The proxy server
C. The DNS server
D. The router
A. The user’s local configuration
Since only one user is reporting the problem, the user’s computer and its configuration are the likeliest suspect components. ADNS, proxy, or router problem would affect more than one user.
Alice is working the help desk when a user calls and reports that she is unable to connect to the Internet. Which of the following steps is the one Alice is least likely to perform first when troubleshooting the problem?
A. Check the configuration of the router connecting the LAN to the Internet.
B. Ask the user if she can access resources on the local network.
C. Check to see if anyone else is experiencing the same problem.
D. Check the user’s job title to see if she is an important person in the company.
A. Check the configuration of the router connecting the LAN to the Internet.
There are many possible causes for the problem that are more likely than a router configuration error, so this is not something Alice would check first. Asking if the user can access the local network attempts to isolate the problem. If she cannot, the problem could be in her computer; if she can, then the problem lies somewhere in the Internet access infrastructure. If other users are experiencing the problem, then the issue should receive a higher priority, and Alice knows that the problem does not lie in the user’s computer. While it might not be the first thing she checks, it is a political reality that higher ranking users get preferential treatment.
In the standard troubleshooting methodology, which of the following steps appears last but must actually be practiced throughout the troubleshooting process?
A. Test the theory to determine cause
B. Document findings, actions, and outcomes
C. Verify full system functionality and, if applicable, implement preventive measures
D. Implement the solution or escalate as necessary
E. Establish a plan of action to resolve the problem and identify potential effects
F. Establish a theory of probable cause
G. Identify the problem
B. Document findings, actions, and outcomes
Documenting everything you discover and everything you do is a crucial part of the troubleshooting method that must begin before you take any other action whatsoever. However, it appears as the last step in the troubleshooting methodology.
In which troubleshooting step is a trouble ticket created?
A. Establish a theory of probable cause
B. Verify full system functionality and, if applicable, implement preventive measures
C. Implement the solution or escalate as necessary
D. Test the theory to determine cause
E. Identify the problem
F. Document findings, actions, and outcomes
G. Establish a plan of action to resolve the problem and identify potential effects
E. Identify the problem
The first step in troubleshooting involves identifying the problem and creating a trouble ticket. You complete the other troubleshooting steps after the trouble ticket has been prioritized.
Which step of the troubleshooting model involves identifying whether hardware or software has been recently installed or reconfigured?
A. Identify symptoms
B. Establish a theory of probable cause
C. Establish a plan of action to resolve the problem and identify potential effects
D. Determine if anything has changed.
E. Test the theory to determine cause
F. Document findings, actions, and outcomes
D. Determine if anything has changed.
During the troubleshooting process, you must establish whether anything has changed. This typically involves asking the user whether any new or existing hardware or software has been installed or reconfigured.
Which step of the troubleshooting model involves replacing components until a faulty hardware device is identified?
A. Duplicate the problem
B. Gather information
C. Test the theory to determine the cause
D. Establish a plan of action to resolve the problem
E. Verify full system functionality
F. Document findings, actions, and outcomes
C. Test the theory to determine the cause
After you have established a theory of probable cause, you can try to test the theory by replacing hardware components one by one until you find the faulty device.
Ed is a first-tier support technician. He receives the help calls listed here. His job is to assign them priorities based on their severity. Which of the following should be the problem that receives the highest priority?
A. A problem with an order entry or customer service call center resource that affects an entire department, with multiple local area networks (LANs)
B. A fatal error that causes a single computer to fail
C. A problem with a mission-critical backbone router that affects an entire network
D. A problem with an application server that affects a single LAN
C. A problem with a mission-critical backbone router that affects an entire network
A problem that affects the entire network should be given highest priority. This includes a mission-critical backbone router. Problems that affect multiple LANs or an entire department are generally given the next highest priority. An application problem that affects a shared application server on a LAN should be given the next highest priority. A problem with a single user’s computer should be given the lowest priority if the other problems have been reported.
Ed is a first-tier support technician. He receives the help calls listed here. His job is to assign them priorities based on their severity. Which of the following should be the problem that receives the lowest priority?
A. A problem with an order entry or customer service call center resource that affects an entire department, with multiple local area networks (LANs)
B. A fatal error that causes a single computer to fail
C. A problem with a mission-critical backbone router that affects an entire network
D. A problem with an application server that affects a single LAN
B. A fatal error that causes a single computer to fail
A problem that affects the entire network should be given highest priority. This includes a mission-critical backbone router. Problems that affect multiple LANs or an entire department are generally given the next highest priority. An application problem that affects a shared application server on a LAN should be given the next highest priority. A problem with a single user’s computer should be given the lowest priority if the other problems have been reported.
When you troubleshoot a network problem, it is possible to introduce another problem while attempting to fix the original one. In which step of the troubleshooting process should you be aware of the residual effects that changes might have on the network?
A. Identify the problem
B. Establish a theory of probable cause
C. Test the theory to determine cause
D. Establish a plan of action to resolve the problem
E. Implement the solution or escalate as necessary
F. Verify full system functionality
G. Document findings, actions, and outcomes
D. Establish a plan of action to resolve the problem
After you identify a problem and establish and test a theory of its probable cause, you must create a plan of action to resolve the problem and identify any potential effects (positive or negative) your solution might have. Then, you implement your solution, test the results, and finish documenting the incident.
In which troubleshooting step do you create a record of your activities and inform the user of what happened and why?
A. Identify the problem
B. Establish a theory of probable cause
C. Test the theory to determine cause
D. Establish a plan of action to resolve the problem and identify potential effects
E. Implement the solution or escalate as necessary
F. Verify full system functionality and, if applicable, implement preventive measures
G. Document findings, actions, and outcomes
G. Document findings, actions, and outcomes
The last step of the troubleshooting process is to document the solution and explain to the user what happened and why. In reality, documentation should begin when the problem is reported, and the documentation should be updated throughout the troubleshooting process.
Which of the following Windows tools uses ICMP messages and manipulates IPv4 time-to-live values to illustrate the route packets take through an internetwork?
A. Ping
B. Netstat
C. Route
D. Tracert
E. Nslookup
D. Tracert
he Windows tracert tool transmits a series of ICMP messages with incrementing time-to-live (TTL) values, which identify each router on the path the packets take through the network. ping uses ICMP, but it does not manipulate TTLvalues.
Users are having trouble connecting to Internet hosts. Alice suspects that there is a problem with the Domain Name System (DNS) server, and she wants to verify this. Which of the following steps can she take to determine whether the DNS server is resolving Internet hostnames?
A. Issue the ipconfig command from a local workstation
B. Try to connect to a host using the Internet Protocol (IP) address instead of the hostname
C. Ping the DNS server to see if it is functioning
D. Use the tracert command to test the functionality of the DNS server
B. Try to connect to a host using the Internet Protocol (IP) address instead of the hostname
If Alice suspects that a DNS server isn’t resolving hostnames, she should try connecting to a remote host using the IP address instead of the name. If she can connect, she knows that all internal local area network (LAN) components and the Internet gateway are functioning, and the remote host is functioning. The problem most likely lies within the DNS server itself. If Alice can’t connect to a remote host using the IP address, the problem isn’t the DNS server. She would need to do more testing to isolate the problem device and the affected area.
Which of the following types of wiring faults cannot be detected by a wiremap tester?
A. Split pairs
B. Open circuits
C. Short circuits
D. Transposed wires
A. Split pairs
A wiremap tester consists of a main unit that connects to all eight wires of a UTP cable at once and a loopback device that you connect to the other end, enabling you to test all of the wires at once. A wiremap tester can detect opens and shorts, as well as transposed wires. However, it cannot detect split pairs because, in that fault, the pins are properly connected.
After connecting a tone generator to the green wire at one end of a twisted pair cable run, Ralph proceeds to the other end of the cable and touches the locator to each of the eight pins in turn. The green wire and the green striped wire both produce a tone. What type of wiring fault has Ralph discovered?
A. Split pair
B. Far-end crosstalk
C. Transposed wires
D. Short circuit
E. Delay skew
D. Short circuit
The first and most essential test that installers must perform on every cable run is a continuity test, which ensures that each wire on both ends of the cable is connected to the correct pin and only the correct pin. If a pin on one end of a cable run is connected to two or more pins on the other end, you have a short circuit.
Which of the following Windows command-line utilities produced the output shown here?
A. ping
B. tracert
C. netstat
D. arp
D. arp
Running the arp utility with the -a parameter on a Windows system displays the contents of the Address Resolution Protocol (ARP) cache. The cache contains records of the IP addresses on the network that arp has resolved into MAC addresses. The ping, tracert, and netstat utilities are not capable of producing this output.
Which of the following Windows command-line utilities produced the output shown here?
A. ping
B. tracert
C. netstat
D. arp
B. tracert
The Windows tracert utility functions by transmitting a series of Internet Control Message Protocol (ICMP) Echo Request messages to a specified destination with incrementing time-to-live (TTL) values. Each successive message reaches one hop farther on the route to the destination before timing out. The tracert display therefore lists the names and addresses of the routers packets must traverse to reach the destination. The ping, netstat, and arp utilities are not capable of producing this output.
Which of the following Windows command-line utilities produced the output shown here?
A. ping
B. tracert
C. netstat
D. arp
A. ping
The Windows ping utility functions by transmitting a series of Internet Control Message Protocol (ICMP) Echo Request messages to a specified destination. The destination system responds with ICMP Echo Reply messages that are listed in the output display. The tracert, netstat, and arp utilities are not capable of producing this output.
Which of the following Windows command-line utilities produced the output shown here?
A. ping
B. tracert
C. netstat
D. arp
C. netstat
Running the Windows netstat utility with no parameters generates a list of the workstation’s active connections. The ping, tracert, and arp utilities are not capable of producing this output.
Which of the following command-line utilities is capable of performing the same basic function as traceroute or tracert?
A. ping
B. pathping
C. netstat
D. route
B. pathping
Like traceroute and tracert, pathping is capable of generating a list of the routers that packets pass through on the way to a specific destination system. pathping also displays the percentage of lost packets for each hop, which traceroute and tracert cannot do. The ping, netstat, and routeutilities are not capable of displaying route traces
What is the name for a device that determines the length of a cable by transmitting a signal at one end and measuring how long it takes for a reflection of the signal to return from the other end?
A. Fox and hound tester
B. Wiremap tester
C. Time domain reflectometer
D. Voltage event recorder
E. Butt set
C. Time domain reflectometer
The technique that provides this capability is called time domain reflectometry (TDR). The tester transmits a signal over the cable and measures how long it takes for a reflection of the signal to return from the other end. Using this information and the cable’s nominal velocity of propagation (NVP)—a specification supplied by the cable manufacturer—the device can calculate the length of a cable run.
Which TCP/IP utility should you use to most easily identify a malfunctioning router on your network?
A. ifconfig
B. ping
C. traceroute
D. netstat
C. traceroute
The traceroute (or tracert) utility can locate a malfunctioning router by using an Echo Request messages with incrementing TTL values. ifconfig is a network configuration utility for Unix and Linux systems; ping can test connectivity to another TCP/IP system, but it cannot locate a malfunctioning router; and netstat displays information about network connections and traffic but cannot locate a malfunctioning router.
Which of the following protocols does the ping program never use to carry its messages?
A. Ethernet
B. ICMP
C. IP
D. UDP
E. TCP
E. TCP
All Windows ping transactions use ICMP messages. ICMP messages are encapsulated directly within IP datagrams; they do not use transport layer protocols, such as UDP. ping transactions to destinations on the local network are encapsulated within Ethernet frames. On Unix and Linux, ping uses UDP, which is also encapsulated in IP datagrams.
Which of the following commands displays the routing table on the local computer?
A. arp –r
B. netstat –r
C. ifconfig –r
D. telnet –r
B. netstat –r
The netstat utility can display the routing table, along with other types of network traffic and port information. The arp utility is for adding addresses to the ARP cache; it cannot display the routing table. The ifconfig command displays TCP/IP configuration information on Unix and Linux systems; it cannot display the routing table. Telnet is a terminal emulation program; it cannot display the routing table.
A routine test of a newlyinstalled twisted pair cable run with a wiremap tester indicates that there is a short circuit on one of the wires. Which of the following procedures might possibly correct the fault?
A. Use a different pinout on both ends of the cable
B. Replace the connectors at both ends of the cable run
C. Move the cable away from any potential sources of electromagnetic interference
D. Use a higher grade of UTP cable
B. Replace the connectors at both ends of the cable run
A short circuit is a wiring fault indicating that a pin at one end of a cable run is connected to two pins at the other end. To correct the problem, you must replace the connector with the faulty wiring. None of the other suggestions are solutions for a wiring fault.
Ralph is a new hire working on a network that uses Cat5 unshielded twisted pair cable, which was installed several years ago. Over time, some of the paper labels that the original cable installers used to identify the wall plates and patch panel connectors have worn away or fallen off. As a result, Ralph has quite a few cable runs that he is unable to identify. After checking with his supervisor, Ralph discovers that the company has no cable testing equipment and is unwilling to hire a consultant just to identify cable runs. What is the most inexpensive tool Ralph can use to associate unlabeled wall plates with the correct patch panel ports?
A. A wiremap tester
B. A cable certifier
C. A tone generator and locator
D. A time domain reflectometer
C. A tone generator and locator
All of the suggested tools are cable of associating wall plates with the correct patch panel ports, but the tone generator and locator is by far the most inexpensive solution.
Which of the following devices is an essential tool for technicians working on telephone cables but is not needed for data networking cable installations?
A. Tone generator and locator
B. Wiremap tester
C. Cable certifier
D. Butt set
D. Butt set
Telephone cable technicians have their own specialized tools, such as the butt set, a one-piece telephone handset with alligator clips that enables its operator to connect to a line anywhere that the cables are accessible.
Which of the following command lines will produce the output shown in the figure?
A. ping 10.0.0.1 -t
B. ping 10.0.0.1 -n 2048
C. ping 10.0.0.1 -l 2048 -n 11
D. ping 10.0.0.1 -l 2048 -t
E. ping 10.0.0.1 -n 2048 -t 11
C. ping 10.0.0.1 -l 2048 -n 11
Running ping with the -l parameter enables you to specify the size of the messages sent to the target, in this case, 2028 bytes. The -n parameter enables you to specify the number of messages the ping tool should transmit, in this case 11. Combining these two parameters generates the output in the figure. The -t parameter causes the ping tool to transmit messages until manually halted.
Which of the following parameters causes the ping tool to transmit messages continually until manually halted?
A. -n
B. -t
C. -i
D. -a
B. -t
Running the ping tool with the -t parameter causes it to send messages to the target continuously until you manually stop it. The -n parameter enables you to specify the number of messages the ping tool should transmit. The -i parameter enables you to specify the time-to-live (TTL) value of the messages ping transmits. The -a parameter resolves an IP address you specify as the target to a hostname.
Which of the following tools can you use to test the optical loss in a fiber-optic cable?
A. An OLTS
B. A TDR
C. A light meter
D. A wiremap tester
A. An OLTS
An optical loss test set (OLTS) identifies signal loss in fiber optic cabling. A time domain reflectometer (TDR) measures electrical signals in copper-based cabling, not light signals. A light meter measures the strength of light signals on fiber optic cable, but it cannot generate the signal needed to test optical loss. Wiremap testers are used only on copper cables, not fiber optic.
Which of the following commands enables you to view the ARP table stored in memory?
A. arp -c
B. arp -d
C. arp -a
D. arp -s
C. arp -a
The arp -a command displays the entries in the ARP table stored in its cache. The arp -dcommand is for deleting entries, and the arp -s command is for adding entries. The arp -ccommand is not a valid option.
Which of the following command-line utilities enables you to generate Domain Name System (DNS) request messages?
A. ifconfig
B. nslookup
C. nbtstat
D. netstat
B. nslookup
The nslookup tool enables you to generate DNS request messages from the command line and send them to a specific DNS server. The other options listed are not DNS utilities.
Which of the following troubleshooting tools can test cabling for length, attenuation, near end crosstalk (NEXT), equal level far end crosstalk (ELFEXT), propagation delay, delay skew, and return loss?
A. Wiremap tester
B. Cable certifier
C. Time domain reflectometer (TDR)
D. Optical loss test set (OLTS)
B. Cable certifier
You can use a cable certifier to identify a variety of cable performance characteristics, typically including cabling lengths, signal attenuation, crosstalk, propagation delay, delay skew, and return loss, in addition to providing all the functionality of a wiremap tester. The other tools listed are dedicated to a single testing modality and do not test for crosstalk.
Which of the following command-line utilities enables you to view the Internet Protocol (IP) configuration on a Unix or Linux host?
A. ifconfig
B. nslookup
C. ipconfig
D. netstat
A. ifconfig
On a Unix or Linux host, the ifconfig command displays the system’s current IP configuration settings and parameters. ipconfig is a Windows command-line utility that performs the same basic function. The other options are command-line utilities that do not display IP configuration information.
Which of the following Windows commands enables you to delete the entire ARP cache?
A. arp -c *
B. arp -d *
C. arp -a
D. arp -s
B. arp -d *
The arp -d command is for deleting cache entries, and by running it with the asterisk wildcard, the command deletes all of the entries in the cache. The arp -a command displays the entries in the ARP table stored in its cache, and the arp -s command is for adding entries. The arp -c * command is not a valid option.
Which of the following troubleshooting tools is not used to test copper cabling installations?
A. Wiremap tester
B. Multimeter
C. Tone generator and locator
D. OTDR
D. OTDR
An optical time domain reflectometer (OTDR) is a device that transmits light pulses over a fiber-optic network and measures the time interval and strength of the returning pulse, to measure the length of the cable run. An OTDR can be used to locate fiber-optic cable breaks, as well as characterize a cable run’s reflectance, optical return loss, and other characteristics. Multimeters, tone generators, and wiremap testers are all devices that work only with copper networks.
Ralph has been advised to check his Linux web servers for open ports that attackers might be able to use to penetrate the servers’ security. Which of the following utilities can Ralph use to do this?
A. tcpdump
B. dig
C. iptables
D. nmap
D. nmap
The nmap utility is capable of scanning a system for open ports that might be a security hazard. The tcpdump, dig, and iptables utilities cannot do this.
Which of the following parameters enables you to specify the time-to-live (TTL) value of the messages ping transmits?
A. -n
B. -t
C. -i
D. -a
C. -i
Running the ping tool with the -i parameter enables you to specify the time-to-live (TTL) value of the messages ping transmits. The -t parameter causes the ping tool to send messages to the target continuously until you manually stop it. The -n parameter enables you to specify the number of messages the ping tool should transmit. The -a parameter resolves an IP address you specify as the target to a hostname.
Ralph is the network administrator of his company’s network. He has had three users call the help desk to report that they are having problems connecting to the local application server. Comparing their stories, Ralph suspects that their Transmission Control Protocol (TCP) connections are being dropped. The users are not having problems connecting to any other hosts on the network. To troubleshoot this problem, Ralph decides to use a protocol analyzer. He wants to store and view only the traffic relating to the hosts and server that are having problems. How can Ralph do this?
A. Configure a display filter.
B. Configure a capture filter.
C. Set a trap on the analyzer.
D. Configure both a capture and a display filter.
B. Configure a capture filter.
Ralph wants to store and view only the traffic relating to the hosts that are experiencing problems. The best way to do this is to set a capture filter. Capture filters determine what is stored in the buffer. Display filters only determine what is displayed from the contents of the buffer. You do not set a trap on an analyzer—you set traps on Simple Network Management Protocol (SNMP) agents. Also, there is no need to configure both a capture filter and a display filter. If you set a capture filter that blocks all other traffic from entering the buffer, the display filter would be redundant.
Ralph is a new hire for a consulting firm that frequently performs cable installations. He is trying to learn more about the tools needed to install internal cable runs. To that end, which of the following statements about cable crimpers has Ralph found to be true?
A. Cable installers use a crimper to attach keystone connectors to lengths of bulk cable.
B. Cable installers use a crimper to attach RJ45 connectors to lengths of bulk cable.
C. You need to purchase a separate crimper for each type of cable to which you want to attach connectors.
D. Making your own patch cables by applying connectors yourself is always more economical than buying prefabricated patch cables.
B. Cable installers use a crimper to attach RJ45 connectors to lengths of bulk cable.
A crimper is a plier-like device that cable installers use to create patch cables by attaching RJ45 connectors to lengths of bulk cable.
Which of the following troubleshooting tools enables you to copy all of the packets transmitted over a network to a buffer, interpret the protocols used in the packets, and display the output?
A. Event Viewer
B. Traffic monitor
C. Protocol analyzer
D. Management console
C. Protocol analyzer
A protocol analyzer copies all network traffic, interprets the protocol headers and fields, and displays the output. The Event Viewer displays system, application, and security event logs on a single computer. There is no network troubleshooting tool called a traffic monitor. A management console is a remote monitoring and management device that queries Simple Network Management Protocol (SNMP) agents.
Which of the following are tools that run only on Unix or Linux systems?
A. tcpdump
B. dig
C. iptables
D. ifconfig
E. route
E. route
Of the utilities listed, tcpdump, dig, iptables, and ifconfig are all tools that run on Unix/Linux systems only. The route utility runs on both Unix/Linux and Windows.
Which of the following Windows command-line utilities produced the output shown here?
A. nslookup
B. pathping
C. netstat
D. route
A. nslookup
nslookup is a command-line utility that generates DNS resource record requests and sends them to a specific DNS server. The output shown here specifies first the name and address of the DNS server to which the request was sent and then the response to the request, containing the name to be resolved and the IP addresses contained in the server’s resource record for that name. The pathping, netstat, and route utilities cannot perform DNS queries.
Which of the following parameters enables you to specify the number of messages the pingtool transmits?
A. -n
B. -t
C. -i
D. -a
A. -n
Running the ping tool with the -n parameter enables you to specify the number of messages the ping tool should transmit with each execution. The -t parameter causes the ping tool to send messages to the target continuously until you manually stop it. The -i parameter enables you to specify the time-to-live (TTL) value of the messages ping transmits. The -aparameter resolves an IP address you specify as the target to a hostname.
Which of the following cable testing tools are used only on fiber-optic networks?
A. OTDR
B. Multimeter
C. Tone generator
D. Punchdown tool
A. OTDR
An optical time domain reflectometer (OTDR) is a device that transmits light pulses over a fiber-optic network and measures the time interval and strength of the returning pulse, to measure the length of the cable run. An OTDR can be used to locate fiber-optic cable breaks, as well as characterize a cable run’s reflectance, optical return loss, and other characteristics. Multimeters, tone generators, and punchdown tools are all devices that work only with copper networks.
Which of the following command-line utilities can only run on Unix and Linux systems?
A. ping
B. ipconfig
C. tracert
D. ifconfig
E. netstat
D. ifconfig
The ifconfig command runs only on Unix and Linux systems. The ping and netstatutilities run on both Windows and Unix/Linux systems. The ipconfig and tracertcommands run only on Windows, although there is a Unix/Linux version of tracert called traceroute.
Which of the following command-line utilities can only run on Windows systems?
A. ping
B. ipconfig
C. traceroute
D. ifconfig
E. netstat
B. ipconfig
The ipconfig command runs only on Windows, although there is a similar Unix/Linux-only command called ifconfig. The ping and netstat utilities run on both Windows and Unix/Linux systems. The traceroute utility runs only on Unix/Linux systems, although there is a Windows version called tracert.
Which of the following netstat commands can tell you how many IPv6 packets have been received on a particular Windows workstation?
A. netstat -a
B. netstat -s
C. netstat -e
D. netstat -r
B. netstat -s
The netstat -s command displays packet counts and other traffic statistics for the IPv6, IPv4, ICMP, TCP, and UDP protocols. The netstat -a command displays all of a workstation’s current connections and ports on which it is listening. The netstat -ecommand displays Ethernet statistics, such as the number of bytes and packets sent and received. The netstat -r command displays the computer’s routing table.
Which of the following commands can Ralph use to display the number of bytes that a Windows workstation has transmitted?
A. netstat
B. tcpdump
C. ipconfig
D. iptables
A. netstat
Running netstat with the -e parameter on a Windows workstation displays Ethernet statistics, including the number of bytes and packets the workstation has sent and received. The ipconfig command displays TCP/IP configuration data; it does not display network traffic statistics. The tcpdump and iptables commands both run only on Unix and Linux workstations.
Alice is troubleshooting a Windows server, and while doing so she runs the following command: ping 127.0.0.1. The command completes successfully. What has Alice proven by doing this?
A. That the computer’s network adapter is functioning properly
B. That the computer’s TCP/IP networking stack is loaded and functioning
C. That the computer’s IP address is correct for the network
D. Nothing at all
B. That the computer’s TCP/IP networking stack is loaded and functioning
The IP address 127.0.0.1 is a dedicated loopback address that directs outgoing IP traffic directly into the incoming IP traffic buffer. A successful ping test using that address indicates that the computer’s TCP/IP stack is functioning properly, but the traffic never reaches the network adapter or the network, so the test does not confirm that the adapter is functioning or that the computer has a correct IP address for the network.
Ralph is the administrator of his company’s network. He has a Dynamic Host Configuration Protocol (DHCP) server configured to supply Internet Protocol (IP) addresses and configuration information to all of the Windows computers on the network. One of the Windows users reports that she cannot connect to the network. Which of the following commands can Ralph run on her computer to verify the status of the computer’s IP settings and configuration parameters?
A. ifconfig
B. ipconfig
C. msinfo32
D. tracert
B. ipconfig
ipconfig is a Windows command that displays a computer’s current IP address and TCP/IP configuration settings, including whether the computer has obtained its address from a DHCP server.
Which of the following cable installation tools is likely to be the most expensive?
A. A crimper
B. A cable certifier
C. A punchdown tool
D. A wiremap tester
B. A cable certifier
Crimpers and punchdown tools are relatively simple and inexpensive mechanical devices that cable installers use to connect bulk cable to connectors. A wiremap tester is an electronic device for cable testing, but it is still relatively simple. A cable certifier is a complex electronic device that can perform a battery of tests on a cable run, confirm that the cable conforms to the required wiring standards, and maintains records of the testing procedure. Cable certifiers are by far the most expensive of the devices listed.
\Which of the following route commands displays the contents of a Windows computer’s IPv6 routing table only?
A. route print
B. route print -6
C. route list -6
D. route list
B. route print -6
The route print command displays both the IPv4 and IPv6 routing tables. To display only the IPv6 routing table, you add the -6 parameter to the route print command. route list and route list -6 are not valid commands.
What is the function of the tool shown in the following figure?
A. By placing the tool at one end of a wire, it generates a tone that can be detected at the other end.
B. To connect a bulk cable to a keystone connector, you use the tool to punch each wire down into the correct receptacle on the connector.
C. By touching the end of the tool to a copper cable, you can detect and measure the electrical current flowing through it.
D. By connecting the tool to the end of a fiber-optic cable, you can measure the length of the cable run.
C. By touching the end of the tool to a copper cable, you can detect and measure the electrical current flowing through it.
The device shown in the figure is a multimeter, which is used to measure the electric current on a copper conductor, such as an unshielded twisted pair network. This tool is not capable of performing any of the tasks described in the other options.