Extra Flashcards
Which of the following solutions enables simultaneous digital transmission of voice, video, data, and other network services over a PSTN?
ISDN
T1 lines support data transfer rates of up to:
1.544 Mbps
Which of the answers listed below refers to the maximum data transfer rate of E1 connection?
2.048 Mbps
T3 lines support data transfer rates of up to:
44.736 Mbps
Which of the following answers refers to the maximum data transfer rate of E3 connection?
34.368 Mbps
Optical Carrier (OC) transmission rate specifications adhere to a pattern where the OC prefix is followed by a number designating a multiple of the base unit of 51.84 Mbps.
True
An OC-3 line supports transmission rates of up to:
155.52 Mbps
Which of the answers listed below refers to the maximum data transfer rate of OC-192 connection?
9953.28 Mbps (9.95 Gbps)
What is the most common type of a DSL Internet access?
ADSL
The term “Metropolitan Ethernet” refers to an Ethernet-based Metropolitan Area Network (MAN).
True
The use of cable modems within a standard cable television infrastructure for Internet access is commonly referred to as:
Cable broadband
Which of the following Internet access types takes advantage of the traditional analog telephone lines?
Dial-up
Which of the answers listed below refers to an ISDN service designed for larger organizations that take advantage of digital PBX systems?
PRI
What are the characteristic features of satellite Internet connections? (Select 3 answers)
High signal latency
Interference (weather dependent)
Relatively high cost in comparison to terrestrial links
Which command in MS Windows displays a table consisting of IP addresses and their resolved physical addresses?
arp -a
The arp command can be used to perform what kind of resolution?
IP to MAC
Which command-line command in MS Windows is used to display the contents of a routing table?
route print
Which network command-line utility in MS Windows combines the features of ping and tracert?
pathping
Which netstat parameter allows to display the names of applications and executable file components that are accessing the network?
-b
Which of the netstat utility parameters listed below allows to display the contents of an IP routing table?
-r
Which netstat parameter allows to display all active TCP connections and the TCP/UDP ports on which the computer is listening?
-a
Which of the answers listed below refer to iptables? (Select 2 answers)
Linux command-line tool
Packet filtering utility
Which of the following command-line commands in MS Windows are used for resetting the DHCP configuration settings for all adapters? (Select 2 answers)
ipconfig /release
ipconfig /renew
Which ipconfig parameter allows to view the physical address of a Network Interface Card (NIC)?
/all
Which of the answers listed below refers to an ipconfig command parameter used for displaying the full TCP/IP configuration information for all adapters?
/all
Which of the following network administration command-line utilities can be used for DNS queries?
nslookup
Which of the software tools listed below allows for obtaining a domain name to IP address mapping?
nslookup
Domain information groper (dig) and nslookup are command-line tools used for DNS queries. Both utilities are available on Windows and Linux. Of the two, nslookup is the preferred tool on UNIX-like systems; dig is the default DNS query tool for MS Windows.
False
Troubleshooting Steps
- Identify the problem.
- Establish a theory of probable cause.
- Test the theory to determine cause.
- Establish a plan of action to resolve the problem and identify potential effects.
- Implement the solution or escalate as necessary. 6. Verify full system functionality, and if applicable, implement preventative measures.
- Document findings, actions, and outcomes.
OBVIOUS CAUSES:
Port speed, Port duplex mismatch, Mismatched MTU, Incorrect VLAN, Incorrect IP address/duplicate IP address, Wrong gateway, Wrong DNS, Wrong subnet mask, Incorrect interface/interface misconfiguration, Duplicate MAC addresses, Expired IP address, Rogue DHCP server, Untrusted SSL certificate, Incorrect time, Exhausted DHCP scope, Blocked TCP/UDP ports, Incorrect host-based firewall settings, Incorrect ACL settings, Unresponsive service