Module 8: Network Infrastructure and Troubleshooting Flashcards
Which of the following are valid IPv4 private IP addresses? (Select TWO.)
- 20.30.40
- 29.29.254
This is a valid IPv4 private IP address in the range of 10.0.0.0–10.255.255.255.
This is a valid IPv4 private IP address in the range of 172.16.0.0–172.31.255.255.
What is the purpose for the twists in twisted pair Ethernet cabling?
Reduce crosstalk between wire pairs.
The twists in a twisted pair cable reduce crosstalk between pairs. Crosstalk is interference induced by a wire that interferes with neighboring wires.
Consider the following configuration.
Computer “A”
IP address: 172.16.100.100 Subnet mask: 255.255.0.0
Computer “B”
IP address: 172.16.200.200 Subnet mask: /16
What should be done to allow these computers to send and receive data to and from each other?
Nothing needs to be changed.
Start by comparing the two assigned subnet masks, and you determine that the two computers are using the same subnet mask (255.255.0.0 and /16). Next, compare the network ID for each computer, and you can see they are both on the same network (172.16.0.0). Now, verify that both computers are using valid host addresses (0.0.100.100 and 0.0.200.200). These two computers will communicate with no changes.
A technician is troubleshooting a small network with cable Internet service in which a user is receiving a message in her web browser stating a site cannot be found. While interviewing users, it is determined that every host on the network is experiencing the same issue with all websites.
Which of the following is the first step in troubleshooting this issue?
Connect a computer directly to the cable modem and attempt to access the Internet.
The first step is to eliminate all devices except the cable modem and ISP connection. Connecting a PC directly to the RJ-45 port on the cable modem eliminates all other devices. An alternative first step could be to reboot the cable modem and reattempt Internet access.
The accounting department moved its network-attached printer from one side of the office to a more centralized location, making the printer much more accessible to all accounting users. Since the move, the users have not been able to print to the printer. The printer powers on and shows it is ready to accept print jobs. The printer configuration page shows the following output.
You disconnect the patch cable from the keystone jack at the new location and move the printer and cable to reconnect it at the original location. The printer begins printing the jobs that failed to print earlier.
Which of the following are the most likely reasons for the printer failing to print at the new location? (Select TWO.)
The cable run connecting the new keystone jack to the patch panel is bad.
The patch panel connector for the new location’s cable run is not connected to a switch.
The printer is set for DHCP configuration and is assigning itself APIPA parameters at the new location. Because the printer will function properly at the original location, the printer does not have layer 1 network connectivity at the new location. There is an issue with the keystone jack, cable run, patch panel, patch cable at the patch panel, or switch.
The printer is set for DHCP configuration and is assigning itself APIPA parameters at the new location. Because the printer will function properly at the original location, the printer does not have layer 1 network connectivity at the new location. There is an issue with the keystone jack, cable run, patch panel, patch cable at the patch panel, or switch.
A coworker is asking for your advice on a problem with a computer that will not communicate on the network. While assisting the coworker, you suspect that the wired NIC may have failed.
Which of the following will you recommend to your coworker as the best tool to diagnose this issue? (Select TWO.)
Loopback plug
Network multimeter
A loopback plug is used to reroute a network port’s output signal back to the same port’s input pins. Performing a loopback test will verify whether the port on the NIC is functioning.
An electrical multimeter is used to test for voltage, amperage, resistance, and continuity. A network multimeter is used to test cables, ports, and network adapters. When you connect a network multimeter to your network, it can also detect the Ethernet speed, duplex status, default router on the network, lengths of cables, voltage levels of PoE, and other network statistics and details.
Your company is experiencing an increase in malware incidents. Your manager is asking for advice on how best to verify that company-owned workstations are up-to-date with security patches, anti-malware requirements, and software application updates. The manager is also concerned that employee-owned devices connecting to the corporate LAN have the same level of security as the company devices.
Which of the following protections and services should you recommend?
Implement an endpoint management server appliance.
An endpoint management server will monitor endpoint devices on the network to ensure they meet the most current security requirements. If security requirements are met, the device is granted access to the network. The user or device will still be required to authenticate on the network. If the endpoint management server determines a device does not meet the minimum security requirements, the device’s access to the network is blocked.
A technician is working at a client’s office after hours and needs two cables to finish the work but does not have immediate access to prebuilt cables. One cable needed is for a dial-up connection from the dial-up modem to the existing analog POTS jack on the wall. The other cable is for an Ethernet connection from the computer to the existing keystone jack on the wall. The technician has the necessary wire and connectors to make the cables.
Which of the following tools will the technician use to make the cables and then verify that they both work properly? (Select THREE.)
Crimper
Cable tester
Cable stripper
A crimper tool is used to attach connectors onto the ends of a cable. The crimper must be compatible with the crimp (or connector). Common network and telephone connectors that are attached using a crimper are RJ-45, RJ-11, F-type, and BNC. This question will require RJ-11 crimps as well as RJ-45 crimps.
A cable tester is used to determine whether a cable is good. A good cable is wired correctly (based on the type of cable desired) and provides a complete circuit from end to end for all wires. This question will require the use of a cable tester after each cable is made.
A cable stripper is used to remove the outer sheath from a cable, thus exposing the individual wires or conductors. A cable stripper will be required for this scenario for both cables.
A new Cat6 cable run and keystone jack were installed for a workstation that was moved from the sales department to the shipping department. Since the move, the user has been complaining of slow transfer speeds on both Internet and local network communications. The technician ran a test and is viewing the following output on the tester.
Which of the following is the most likely reason for the sluggish network speeds?
The cable run exceeds the specifications for Ethernet over twisted pair.
The workstation was functioning properly prior to the move, indicating the problem is related to the move. The cable run is the only change made.
Examine the exhibit above.
Which network tool most likely produced the output?
Network multimeter
An electrical multimeter is used to test for voltage, amperage, resistance, and continuity. A network multimeter is used to test cables, ports, and network adapters. When you connect a network multimeter to your network, it can also detect the Ethernet speed, duplex status, default router on the network, lengths of cables, voltage levels of PoE, and other network statistics and details.
Which of the following are secure protocols, ports, services, or applications? (Select TWO.)
Port 443
SSH
Port 443 is used for secure HTTP (Hypertext Transfer Protocol) web transmissions. HTTPS refers to HTTP working with a security protocol such as SSL (Secure Sockets Layer) or TLS (Transport Layer Security).
SSH (Secure Shell) protocol is assigned port 22 and is used in various situations for encryption, making SSH secure. One application for SSH is as a secure alternative for Telnet.
Examine the exhibit above.
Host B is sending an email intended for the user on Host A to the email server. What protocol is being used to send the message through the router?
SMTP
SMTP (Simple Mail Transfer Protocol) is used to send email to its destination. The email server listens on port 25 to receive email from a client. An email server using secure SMTPS listens on port 465 and utilizes SSL/TLS (Secure Sockets Layer/Transport Layer Security).
A technician wants to consolidate and log specific alerts from network devices into a database so maintenance tasks and potential device problems can be addressed in a timely manner.
Which of the following should the technician implement?
Syslog server
A Syslog server collects events, such as errors, failures, maintenance tasks, and security events, from network-connected devices and organizes these events into a database for sorting and viewing. Many Syslog servers can also be used to notify network administrators of problems that may require their attention.
You replaced the LCD panel in a laptop computer and verified full system functionality, including wireless connectivity. The customer picked up the laptop and now reports he can no longer access his wireless network regardless of how close the computer is positioned to the WAP. Other users can connect to the WAP without any problem.
Which of the following is the most likely reason for this problem?
The laptop’s wireless radio is toggled to the off position.
Laptop computers and mobile devices provide a method of turning off the wireless network and Bluetooth radios independently of each other. Many devices also have an airplane mode in which all radios can be turned off simultaneously. This is the most likely reason for the problem given that the laptop wireless was tested and the other users on the client’s WLAN are functioning properly.
Which of the following is a function of an endpoint management server appliance?
Restricting a device’s access to the network until security requirements are met.
An endpoint management server will monitor endpoint devices on the network to ensure they meet the most current security requirements. If security requirements are met, the device is granted access to the network. The user or device will still be required to authenticate on the network. If the endpoint management server determines a device does not meet the minimum security requirements, the device’s access to the network is blocked.