Network Operations (2) Flashcards
What is the first step in the troubleshooting model?
Implement the solution.
Test the solution.
Identify the problem.
Identify the problem.
The first step when troubleshooting a problem is to identify the problem
Asking a user “Can you start your e-mail program?” is what type of question?
Closed-ended
Open-ended
Leading
Closed-ended
Because this question can be answered with a simple “yes” or “no,” it is closed-ended
A brand new employee is complaining on his second day of work that he can’t log into his computer. What is the most probable cause?
The server is down.
His network card is bad.
He forgot or is mistyping his password.
He forgot or is mistyping his password.
While all the choices are possible, forgetting or mistyping the password is the most probable cause because the employee is new
When should you use a cable tester to troubleshoot a network cable?
When you have a host experiencing a very slow connection
When you have an intermittent connection problem
When you have a dead connection and you suspect a broken cable
When you have a dead connection and you suspect a broken cable
Cable testers can only show that you have a broken or poorly wired cable, not if the cable is up to proper specification
Which command shows you detailed IP information, including DHCP server addresses and MAC addresses?
ipconfig
ipconfig -a
ipconfig /all
ipconfig /all
ipconfig /all displays detailed IP configuration information
One of your users calls you with a complaint that she can’t reach the site www.rit.edu. You try and access the site and discover you can’t connect either, but you can ping the site with its IP address. What is the most probable culprit?
The workgroup switch is down.
The gateway is down.
The DNS server is down.
The DNS server is down.
In this case, the DNS server is probably at fault. By pinging the site with its IP address, you have established that the site is up and your LAN and gateway are functioning properly
The weakening of a signal over distances is called what?
Attenuation
Latency
Jitter
Attenuation
Attenuation is the weakening of a signal over distances
hich of the following statements is true?
Latency is a variance of jitter.
Jitter is a variance of latency.
Crosstalk is a variance of latency.
Jitter is a variance of latency.
When the latency and response rate starts to vary, and becomes inconsistent, this is known as jitter
Which one of these scenarios is the least likely to cause an issue on today’s networks?
Damaged cables
Duplex/speed mismatch
Bad port
Duplex/speed mismatch
With devices defaulting to auto for both duplex and speed, a mismatch is the least likely to cause an issue today
Which of the following is not something that would affect a wireless signal?
Reflection
Absorption
Crosstalk
Crosstalk
Crosstalk involves cables, while the other choices are only applicable to wireless
Which of the following measures RFI?
SSID
SNR
VLAN
SNR
The signal-to-noise ratio measures radio frequency interference
A security type mismatch means what?
The encryption type is correct, but the encryption key isn’t.
The encryption key is correct, but the encryption type isn’t.
Either the encryption key or the encryption type (or both) is incorrect
Either the encryption key or the encryption type (or both) is incorrect
A security type mismatch means either the encryption key or the encryption type (or both) is incorrect
Which of the following network service issues would not be a problem found on a client device?
Incorrect gateway
Duplicate IP address
Untrusted SSL certificate
Untrusted SSL certificate
The untrusted SSL certificates are sent from servers to clients
Where should a permit any be placed in an ACL?
At the very beginning.
At the very end.
At the very beginning and the very end.
At the very end.
The permit any will allow all packets not blocked from previous statements to go through
How can you tell from a DHCP Offer if a rogue DHCP server is present?
The IP address in the DHCP Offer will be from a different scope.
The subnet mask in the DHCP Offer will be incorrect.
The default gateway IP address in the DHCP Offer will not be one of your DHCP servers’ IP addresses.
The default gateway IP address in the DHCP Offer will not be one of your DHCP servers’ IP addresses.
When a rogue DHCP server hands out DHCP Offers, listing itself as the default gateway, it is ready to perform a MITM (man-in-the-middle) attack, since all outbound traffic will be sent to the attacker, and not the legitimate default gateway