Net+ Session 5 Post-lab follow-up Flashcards

1
Q

A user calls the help desk stating that he/she cannot get on the Internet. What troubleshooting step should the help desk agent do first?
A - Identify the problem
B - Go visit the user’s desk
C - Establish a theory of probable cause
D - Establish a plan of action to resolve the problem

A

A - Identify the problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A user calls the help desk and is complaining that the network speed on the machine has been very slow in the past few days. What is the best question to ask the user?
A - What did you install or change on the machine?
B - Did you install or change anything on the machine?
C - Has anything been installed or changed on the machine?
D - Ask the user nothing. Remote into the machine and look for the problem.

A

C - Has anything been installed or changed on the machine?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An executive vice-president cannot get an email message to send. Meanwhile, multiple customer service agents report that they cannot log into their service application. What would be the best way to approach this situation?
A - Work on both at the same time
B - Work on neither and escalate both issues
C - Work on one problem as it could fix the other problem
D - Work on the vice-president’s problem and ignore the customer service agents

A

C - Work on one problem as it could fix the other problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A printer was working but now it is not. A help desk technician cannot ping the printer. What would be the most obvious thing to check?
A - If the printer is on
B - If the printer has an IP address
C - If the printer has a static IP address
D - If the printer has a static IP address but someone changed it

A

A - If the printer is on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
A department has moved to a new building. Upon attempting to connect machines to the network, many users in many areas of the building are unable to connect to the network. A supervisor sends a team member to each area to check on ports. What troubleshooting method is this?
	A - Divide and conquer
	B - Question the obvious
	C - Bottom-to-top OSI model
	D - Top-to-bottom OSI model
A

A - Divide and conquer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

For a network problem, a theory of probable cause has been established. What is the next step in troubleshooting?
A - Test the theory
B - Document findings
C - Establish a plan of action
D - Implement a solution or escalate it as necessary

A

A - Test the theory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
In the order of troubleshooting a network problem, a technician was unable to confirm a theory. The technician can establish a new theory or do what?
	A - Document findings
	B - Escalate the problem
	C - Determine next steps
	D - Implement preventative measures
A

B - Escalate the problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A network technician has determined a switch is faulty and needs to be replaced. What troubleshooting step should the technician do next?
A - Document findings
B - Escalate the problem
C - Implement the solution
D - Establish a plan of action to resolve the problem

A

D - Establish a plan of action to resolve the problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A junior administrator realized during troubleshooting a network connection that a faulty cable was the cause. The junior administrator has replaced the cable. What should the junior administrator do next?
A - Verify the cable works
B - Escalate this to the supervisor
C - Document that the cable has been replaced
D - Identify potential effects of replacing the cable

A

A - Verify the cable works

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A help desk associate has reset a user’s password. What should the help desk person do as a final step in resolving this issue?
A - Close the ticket
B - Verify the user can log in
C - Document how the problem was resolved
D - Document every step in the process and every conversation with the user

A

C - Document how the problem was resolved

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
A junior administrator needs to locate a DNS server for a local network. Which command will the junior administrator run to locate the server?
	A - netstat
	B - ipconfig
	C - nslookup
	D - dnslookup
A

C - nslookup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

If a default gateway is incorrectly set on a machine, what will happen?
A - The machine will not be able to print
B - The machine will not be able to reach a DNS server
C - The machine will not be able to get onto the Internet
D - The machine will not see any other machines on the network

A

C - The machine will not be able to get onto the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
Which are legitimate loopback addresses? Choose two.
	A - ::1
	B - 127.0.0.1
	C - 169.254.22.24
	D - FEC0::2342:a325
A

A - ::1

B - 127.0.0.1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
Which command-line tool will display the NetBIOS name and MAC address of a machine named ss-vmm?
	A - nbtstat -a ss-wmm
	B - netstat -a ss-wmm
	C - nbtstat -A ss-wmm
	D - netstat -A ss-wmm
A

A - nbtstat -a ss-wmm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
A large industrial building has a single wireless access point. To get better wireless coverage for the network, what should be added?
	A - Hub
	B - Router
	C - Switch
	D - Repeater
A

D - Repeater

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
Of the following obstructions, which one typically causes the most interference in a wireless network?
	A - Birds
	B - People
	C - Windows
	D - Fountains
A

D - Fountains

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What formula comprises signal-to-noise ratio in wireless networks?
A - Absolute of noise floor in decibels divided by absolute of decibels of received signals
B - Absolute of noise floor in decibels minus absolute of decibels of received signals
C - Absolute of decibels of received signals minus absolute of noise floor in decibels
D - Absolute of decibels of received signals divided by absolute of noise floor in decibels

A

B - Absolute of noise floor in decibels minus absolute of decibels of received signals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
A junior network technician, in response to a network analyzer indicating a huge saturation of access points on channel 6, changes the channel of a wireless access point to channel 11. Now, no one can connect to the wireless access point. What problem has been caused here?
	A - Channel saturation
	B - Overlapping channels
	C - Mismatched channels
	D - Mismatched frequencies
A

C - Mismatched channels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
In a wireless network connected to an ISP, many of the users on the network are downloading and streaming large files. What effect can this cause on the wireless network?
	A - Bottleneck
	B - Device saturation
	C - Increased baseline
	D - Bandwidth saturation
A

D - Bandwidth saturation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A business wants to upgrade its wireless access points. What would be the best first step to perform the upgrade?
A - Replace each access point one at a time
B - Test the new devices in the production environment
C - Test the new devices in the nonproduction environment
D - Add the access points to the production network while leaving the old ones in place until the new access points have been verified to work

A

C - Test the new devices in the nonproduction environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
A network administrator is trying to make sure a signal for a wireless access point is not transmitted outside of a building. What setting on the access point can be adjusted to accomplish this?
	A - SSID
	B - Power
	C - Standard
	D - Encryption
A

B - Power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
What would be an effective way to avoid an open network for a SOHO wireless network?
	A - Enable SSID
	B - MAC filtering
	C - Disable SSID
	D - WPA2 encryption
A

B - MAC filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A wireless access point is running 802.11n at 2.4 GHz. A device with an 802.11ac wireless adapter cannot connect to the wireless access point. Other devices on the network can connect to the access point without fail. What should a technician check first for troubleshooting?
A - If the device in question is using the correct SSID
B - If the access point has the 5 GHz band turned off
C - If the device in question is using encryption that is the same as the access point
D - If any other devices are trying to connect or can connect with an 802.11ac adapter

A

B - If the access point has the 5 GHz band turned off

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
To try to improve a wireless signal, what should the signal be bounced off of?
	A - Metal stud
	B - Window film
	C - Concrete wall
	D - Reflective surface
A

D - Reflective surface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A network administrator has used MIMO to set up a wireless network. Recently, the performance of the network is about half of what it once was. What is the most likely issue here?
A - A router stopped working
B - A switch stopped working
C - An antenna stopped working
D - A wireless access point stopped working

A

C - An antenna stopped working

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q
What, when added to a window, can impede a wireless signal?
	A - Film
	B - Blinds
	C - Shades
	D - Caulking
A

A - Film

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q
What types of studs in a wall can cause interference in a wireless network?
	A - Metal
	B - Wood
	C - Corner
	D - Trimmer
A

A - Metal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is the role of LWAPP in wireless networks?
A - To allow signals to bounce
B - To create thick access points
C - To configure and monitor multiple access points
D - To allow access points to stream to multiple clients at once

A

C - To configure and monitor multiple access points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is true about thin and thick wireless access points?
A - Thick wireless access points never perform the DHCP role
B - Thick wireless access points rely on LWAPP for authentication and configuration
C - Thin wireless access points are not dependent on another device for tasks such as authentication and configuration
D - Thick wireless access points are not dependent on another device for tasks such as authentication and configuration

A

D - Thick wireless access points are not dependent on another device for tasks such as authentication and configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

A junior network administrator replaced the current wireless access point with an 802.11ac wireless access point. Now, users with older laptops say they cannot connect to the wireless access point even though the SSID and password are the same. What is the most likely cause of the problem?
A - The signal strength needs to be adjusted
B - The channel setting needs to be adjusted
C - The standard setting needs to be adjusted
D - The previous access point was an 802.11n access point

A

D - The previous access point was an 802.11n access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Several users are connected to an 802.11n wireless network. They all use 802.11n adapters and the wireless network is in an open-cubicle type building with no microwaves nearby. Several users are complaining about slow speeds. What is the most likely cause of this issue?
A - The users with slower speeds are on the wrong channel
B - The users with slower speeds are on a different frequency than the other users
C - The users with slower speeds are further away from the access point than others
D - The users with slower speeds are streaming video in addition to doing their normal work

A

C - The users with slower speeds are further away from the access point than others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q
Where can a technician go to easily measure the speed of an Internet connection?
	A - Speed test site
	B - Network monitor
	C - Looking glass site
	D - Performance monitor
A

A - Speed test site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q
What type of site can allow a user to view routing information from a server's perspective?
	A - Speed test site
	B - Routing test site
	C - Looking glass site
	D - Border gateway site
A

C - Looking glass site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q
What type of network analysis tool is best used to monitor incoming ping attempts?
	A - Port scanner
	B - Packet analyzer
	C - Protocol analyzer
	D - Wireless analyzer
A

C - Protocol analyzer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q
A junior network administrator is assigned to find a faulty telephone wire in a network. What tool should the administrator use?
	A - Line tester
	B - Multimeter
	C - Toner probe
	D - Cable tester
A

A - Line tester

36
Q
Which tool is used to measure voltage, current, and resistance for an electrical object?
	A - Multimeter
	B - Line tester
	C - Toner probe
	D - Cable tester
A

A - Multimeter

37
Q
A network administrator suspects a cable may have an open or a short in it. Which tool should the administrator use to test the cable?
	A - Line tester
	B - Multimeter
	C - Toner probe
	D - Cable tester
A

D - Cable tester

38
Q
Which tool would a technician use to locate the opposite end of a cable?
	A - Line tester
	B - Toner probe
	C - Cable tester
	D - Cable certifier
A

B - Toner probe

39
Q

What causes a short in a network cable?
A - A wire is exposed
B - A connector is loose
C - The cables are not making a full circuit
D - The data attempts to travel on wires other than the ones intended

A

D - The data attempts to travel on wires other than the ones intended

40
Q
A technician indicates to you that a connection between a computer and a switch worked with a straight-through cable but after plugging in a different switch, the connection no longer works. What type of port does the switch not have?
	A - STP
	B - VLAN
	C - Gigabit
	D - Auto MDI-X
A

D - Auto MDI-X

41
Q

A crossover cable is connected from a computer to a console port. The connection is not working. Why?
A - A rollover cable is needed
B - A straight-through cable is needed
C - The cable needs to be plugged into an MDI port
D - The cable needs to be plugged into an MDI-X port

A

A - A rollover cable is needed

42
Q

In far-end crosstalk, where is interference between two pairs of cable measured?
A - The opposite connector
B - The opposite end of the cable
C - The opposite end of the twisted pair
D - The opposite end of the interfering transmitter

A

D - The opposite end of the interfering transmitter

43
Q
Which cable type is least susceptible to EMI?
	A - UTP
	B - STP
	C - Coaxial
	D - Fiber-optic
A

D - Fiber-optic

44
Q
What device is needed for a signal using UTP cable to avoid attenuation?
	A - Hub
	B - Switch
	C - Router
	D - Repeater
A

D - Repeater

45
Q

A user calls the help desk reporting that the network cable (a twisted-pair cable) keeps unplugging from the back of the machine. What is the most likely problem?
A - The user keeps moving the machine
B - The user keeps stepping on the cable
C - The cable was not plugged in properly
D - The flange on the RJ-45 connector broke off

A

D - The flange on the RJ-45 connector broke off

46
Q
If a split pair is unintentional, what is a likely problem with the cable? Choose two.
	A - Open
	B - Short
	C - Crosstalk
	D - Attenuation
A

A - Open

B - Short

47
Q

A twisted-pair cable was used to connect two computers directly. Now, the cable is plugged from a computer into a wall port instead of another computer. The computer in question has no network connectivity. The wall port has been verified that it is working. What is the most likely cause of the problem?
A - The cable is a rollover cable
B - The cable is a crossover cable
C - The computer needs its IP address reset
D - The computer needs its DNS address reset

A

B - The cable is a crossover cable

48
Q
If an SFP transceiver is plugged into port 20 on a switch, what happens to the port?
	A - Ethernet port 20 is enabled
	B - Ethernet port 20 is disabled
	C - Ethernet port 20 has 1G speed
	D - Ethernet port 20 has 10G speed
A

B - Ethernet port 20 is disabled

49
Q

What can cause a ricochet effect in fiber-optic transmissions?
A - Too many bends in the fiber-optic cable
B - A mismatch of cable and transceiver types
C - Too long a distance to try to carry a signal
D - Using a single-mode fiber with a multimode interface

A

B - A mismatch of cable and transceiver types

50
Q
When connectors collect dust and static and thus have problems with performance, what is this condition known as?
	A - Dirty connectors
	B - Cable interference
	C - Connector mismatch
	D - Transceiver problems
A

A - Dirty connectors

51
Q
What is the equivalent of attenuation called for fiber-optic cables?
	A - Degradation
	B - Fiber dispersion
	C - Optic dispersion
	D - Chromatic dispersion
A

D - Chromatic dispersion

52
Q
A technician is trying to diagnose a fiber-optic connection that is not working. The cable and interface are both multimode. The distance is short and there are no bends in the cable. What else could be wrong, assuming everything is plugged in properly?
	A - Cable mismatch
	B - Fiber type mismatch
	C - Connector mismatch
	D - Wavelength mismatch
A

D - Wavelength mismatch

53
Q

Which factors contribute to signal loss due to connector problems in fiber cables? Choose two.
A - Improper alignment
B - Core diameter differences
C - Multimode fiber plugged into single-mode interface
D - Single-mode fiber plugged into multimode interface

A

A - Improper alignment

B - Core diameter differences

54
Q
A technician is running 10GBase-SR cable in place of twisted-pair cable. The cable speeds are below standard for a connection from the west side of a building to the east side of a building. What is the most likely problem the 10GBase-SR cable is having?
	A - EMI
	B - Crosstalk
	C - Distance limitations
	D - Bend radius limitations
A

C - Distance limitations

55
Q
What is the most likely cause of a broadcast storm within a network segment?
	A - Routing loop
	B - Switching loop
	C - Hardware failure
	D - Interface misconfiguration
A

B - Switching loop

56
Q
A user has a static IP address set and can log in to the network but cannot reach most of the network servers by name. What is most likely incorrect in the user's NIC settings?
	A - DNS
	B - APIPA
	C - Subnet Mask
	D - Default Gateway
A

A - DNS

57
Q
In a speed and duplex mismatch, at least one of the ends of the connection probably does not have its NIC set to which setting?
	A - Full duplex
	B - Half duplex
	C - Simple duplex
	D - Autonegotiation
A

D - Autonegotiation

58
Q
A user is reporting that the network connection icon occasionally flashes a yellow exclamation point and then the user temporarily cannot connect to any network resources. What should the technician check first?
	A - NIC
	B - Cable
	C - Switch
	D - Wall port
A

B - Cable

59
Q

A user is complaining about having to enter a password every time he/she accesses a wireless connection that connects to the wired network. What should be suggested to the user to solve the problem?
A - Connect the user to a different access point
B - Have the computer forget and then redo the connection
C - Go into the connection’s settings and tell it to save the password
D - Check the Connect Automatically box the next time the connection is made

A

D - Check the Connect Automatically box the next time the connection is made

60
Q

A machine logs into the network without incident. Nine days later, it attempts to log in again. This time a message appears indicating a duplicate IP address exists on the network. What is the most likely cause of the error?
A - The DHCP server service needs to be restarted
B - A DHCP lease never expired for the IP address this machine has
C - Another device was added to the network with the same IP address
D - The DHCP scope’s range of IP addresses includes one or more static IP addresses

A

D - The DHCP scope’s range of IP addresses includes one or more static IP addresses

61
Q
A user calls the help desk saying that he or she sees two access points with the same name when trying to connect to a wireless network. The user has not seen two access points before. What could the second wireless access point be? Choose two.
	A - Evil twin
	B - Load balancer
	C - Rogue access point
	D - Point of redundancy
A

A - Evil twin

C - Rogue access point

62
Q
A power reduction has taken place and has lasted several hours, during which time a network administrator has had to power down several devices to avoid further power issues. What has taken place?
	A - Sag
	B - Spike
	C - Blackout
	D - Brownout
A

D - Brownout

63
Q
A router is removed from a network. As a result, an entry in a static routing table is incorrect. What should be set on the route to prevent it from being used?
	A - Route hiding
	B - Route splitting
	C - Route disabling
	D - Route poisoning
A

D - Route poisoning

64
Q
A technician is attempting to make sure that each NIC in a two-NIC setup on a server has its own MAC address. Yet, the server is only showing one NIC, no matter which NIC a cable is plugged into. What type of NIC redundancy mode is currently configured?
	A - Active-Active
	B - Passive-Active
	C - Active-Passive
	D - Passive-Passive
A

C - Active-Passive

65
Q
A network administrator runs netstat and notices that many more ports are open than usual. What is most likely misconfigured?
	A - Hub
	B - Switch
	C - Router
	D - Firewall
A

D - Firewall

66
Q
A network administrator wants to make sure that no one can use RDP to remote into desktops from outside of the company. What tool should the administrator use to close the port so that it cannot be used?
	A - Firewall
	B - Proxy server
	C - Port scanner
	D - Port analyzer
A

A - Firewall

67
Q

If a default gateway is unreachable, what will a user not be able to do?
A - Access the local servers
B - Access an external hard drive
C - See any local network resources
D - See anything outside the local network resources

A

D - See anything outside the local network resources

68
Q
A network group should be able to read and write to a folder but the group can only read the folder. What needs to be adjusted?
	A - The folder
	B - The folder's ACL
	C - The folder's attributes
	D - The folder's properties
A

B - The folder’s ACL

69
Q
Which protocol, when blocked, helps to mitigate the chances of a Ping of Death attack?
	A - TCP
	B - UDP
	C - ICMP
	D - IGMP
A

C - ICMP

70
Q
What is the biggest type of vulnerability to firmware and/or an operating system as a result of not patching firmware and/or an operating system?
	A - Code
	B - Feature
	C - Security
	D - Versioning
A

C - Security

71
Q
What type of users have no access to network resources yet attack a network?
	A - Rogue
	B - Trusted
	C - Outside
	D - Untrusted
A

D - Untrusted

72
Q
What can a malicious user use to eavesdrop on unencrypted traffic on a network?
	A - Port scanner
	B - Port analyzer
	C - Packet sniffer
	D - Packet analyzer
A

C - Packet sniffer

73
Q
A technician has just installed a wireless router on a SOHO network. What setting on the router should be changed first?
	A - SSID
	B - Password
	C - IP address
	D - MAC filters
A

B - Password

74
Q

What constitutes a back door attack in networking?
A - An attacker bypasses standard security checks
B - A programmer leaves malicious code in a program
C - An attacker injects code into a user form to access data
D - An unauthorized person follows an authorized person into a building

A

A - An attacker bypasses standard security checks

75
Q
What is the process of hacking a network to see header information on data and obtain the MAC address and OUI of a system known as?
	A - OUI grabbing
	B - MAC grabbing
	C - Banner grabbing
	D - Header grabbing
A

C - Banner grabbing

76
Q
To best harden a desktop, users connected to a domain should not have which kind of permissions on their machines?
	A - Local user
	B - Local guest
	C - Local administrator
	D - Local backup operator
A

C - Local administrator

77
Q

In a business environment, what is the best way to not lose Internet connectivity?
A - Have a backup connection
B - Make sure the cables are all working
C - Have the fastest connection possible
D - Make sure the router has all the necessary updates

A

A - Have a backup connection

78
Q

What is the best way to avoid interface errors when changing configuration on a NIC?
A - Backup the NIC configuration first
B - Document everything that is changed
C - Take a snapshot of the NIC configuration
D - Have a second NIC with the original settings

A

B - Document everything that is changed

79
Q

What is one way to avoid a name resolution problem with a DNS?
A - Add an A record for each host
B - Set a static address for each host
C - Have DHCP always define the address for each host
D - Have two DNS server addresses defined for each host

A

C - Have DHCP always define the address for each host

80
Q
Which are forms of cable interference? Choose two.
	A - EMI
	B - Crosstalk
	C - Attenuation
	D - Degradation
A

A - EMI

B - Crosstalk

81
Q
What hardware piece sits at the demarcation point in a network?
	A - Loopback
	B - Smart jack
	C - Remote alarm
	D - Surge protector
A

B - Smart jack

82
Q
A box outside a business contains telephone wiring and an indicator of where the telephone company's responsibility for a phone line ends and the business' responsibility begins. What is this point called?
	A - Loopback
	B - CSU/DSU
	C - Smart jack
	D - Demarcation point
A

D - Demarcation point

83
Q
What device is needed to translate LAN data into WAN data and vice versa?
	A - Gateway
	B - CSU/DSU
	C - Smart jack
	D - Media Converter
A

B - CSU/DSU

84
Q
What is a transformer used to extend a signal from a demarcation point known as?
	A - Signal booster
	B - Signal repeater
	C - Copper line booster
	D - Copper line driver or repeater
A

D - Copper line driver or repeater

85
Q
A network administrator needs to stop employees from being able to visit social networking sites. What is this action known as?
	A - Blocking
	B - Throttling
	C - Utilization Limits
	D - Fair Access Policy
A

A - Blocking

86
Q

An Internet Service Provider allows its customers up to 250 GB of bandwidth each month, after which time their connection speed is cut in half. What is this an example of?
A - QoS
B - Blocking
C - Throttling
D - Fair access policy/utilization limits

A

C - Throttling