Session 5 Flashcards
A user calls the help desk stating that he/she cannot get on the Internet. What troubleshooting step should the help desk agent do first?
Choices:
A - Identify the problem
B - Go visit the user’s desk
C - Establish a theory of probable cause
D - Establish a plan of action to resolve the problem
A - Identify the problem
A user calls the help desk and is complaining that the network speed on the machine has been very slow in the past few days. What is the best question to ask the user?
Choices:
A - What did you install or change on the machine?
B - Did you install or change anything on the machine?
C - Has anything been installed or changed on the machine?
D - Ask the user nothing. Remote into the machine and look for the problem.
C - Has anything been installed or changed on the machine?
An executive vice-president cannot get an email message to send. Meanwhile, multiple customer service agents report that they cannot log into their service application. What would be the best way to approach this situation?
Choices:
A - Work on both at the same time
B - Work on neither and escalate both issues
C - Work on one problem as it could fix the other problem
D - Work on the vice-president’s problem and ignore the customer service agents
C - Work on one problem as it could fix the other problem
A printer was working but now it is not. A help desk technician cannot ping the printer. What would be the most obvious thing to check?
Choices:
A - If the printer is on
B - If the printer has an IP address
C - If the printer has a static IP address
D - If the printer has a static IP address but someone changed it
A - If the printer is on
A department has moved to a new building. Upon attempting to connect machines to the network, many users in many areas of the building are unable to connect to the network. A supervisor sends a team member to each area to check on ports. What troubleshooting method is this?
Choices:
A - Divide and conquer
B - Question the obvious
C - Bottom-to-top OSI model
D - Top-to-bottom OSI model
A - Divide and conquer
For a network problem, a theory of probable cause has been established. What is the next step in troubleshooting?
Choices:
A - Test the theory
B - Document findings
C - Establish a plan of action
D - Implement a solution or escalate it as necessary
A - Test the theory
In the order of troubleshooting a network problem, a technician was unable to confirm a theory. The technician can establish a new theory or do what?
Choices:
A - Document findings
B - Escalate the problem
C - Determine next steps
D - Implement preventative measures
B - Escalate the problem
A network technician has determined a switch is faulty and needs to be replaced. What troubleshooting step should the technician do next?
Choices:
A - Document findings
B - Escalate the problem
C - Implement the solution
D - Establish a plan of action to resolve the problem
D - Establish a plan of action to resolve the problem
A junior administrator realized during troubleshooting a network connection that a faulty cable was the cause. The junior administrator has replaced the cable. What should the junior administrator do next?
Choices:
A - Verify the cable works
B - Escalate this to the supervisor
C - Document that the cable has been replaced
D - Identify potential effects of replacing the cable
A - Verify the cable works
A help desk associate has reset a user’s password. What should the help desk person do as a final step in resolving this issue?
Choices:
A - Close the ticket
B - Verify the user can log in
C - Document how the problem was resolved
D - Document every step in the process and every conversation with the user
C - Document how the problem was resolved
A junior administrator needs to locate a DNS server for a local network. Which command will the junior administrator run to locate the server?
Choices:
A - netstat
B - ipconfig
C - nslookup
D - dnslookup
C - nslookup
If a default gateway is incorrectly set on a machine, what will happen?
Choices:
A - The machine will not be able to print
B - The machine will not be able to reach a DNS server
C - The machine will not be able to get onto the Internet
D - The machine will not see any other machines on the network
C - The machine will not be able to get onto the Internet
Which are legitimate loopback addresses? Choose two.
Choices:
A - ::1
B - 127.0.0.1
C - 169.254.22.24
D - FEC0::2342:a325
A - ::1
B - 127.0.0.1
Which command-line tool will display the NetBIOS name and MAC address of a machine named ss- vmm?Choices:
A - nbtstat -a ss-wmm
B - netstat -a ss-wmm
C - nbtstat -A ss-wmm
D - netstat -A ss-wmm
A - nbtstat -a ss-wmm
A large industrial building has a single wireless access point. To get better wireless coverage for the network, what should be added?
Choices:
A - Hub
B - Router
C - Switch
D - Repeater
D - Repeater
Of the following obstructions, which one typically causes the most interference in a wireless network?
Choices:
A - Birds
B - People
C - Windows
D - Fountains
D - Fountains
What formula comprises signal-to-noise ratio in wireless networks?
Choices:
A - Absolute of noise floor in decibels divided by absolute of decibels of received signals
B - Absolute of noise floor in decibels minus absolute of decibels of received signals
C - Absolute of decibels of received signals minus absolute of noise floor in decibels
D - Absolute of decibels of received signals divided by absolute of noise floor in decibels
B - Absolute of noise floor in decibels minus absolute of decibels of received signals
A junior network technician, in response to a network analyzer indicating a huge saturation of access points on channel 6, changes the channel of a wireless access point to channel 11. Now, no one can connect to the wireless access point. What problem has been caused here?
Choices:
A - Channel saturation
B - Overlapping channels
C - Mismatched channels
D - Mismatched frequencies
C - Mismatched channels
In a wireless network connected to an ISP, many of the users on the network are downloading and streaming large files. What effect can this cause on the wireless network?
Choices:
A - Bottleneck
B - Device saturation
C - Increased baseline
D - Bandwidth saturation
D - Bandwidth saturation
A business wants to upgrade its wireless access points. What would be the best first step to perform the upgrade?
Choices:
A - Replace each access point one at a time
B - Test the new devices in the production environment
C - Test the new devices in the nonproduction environment
D - Add the access points to the production network while leaving the old ones in place until the
C - Test the new devices in the nonproduction environment
A network administrator is trying to make sure a signal for a wireless access point is not transmitted outside of a building. What setting on the access point can be adjusted to accomplish this?
Choices:
A - SSID
B - Power
C - Standard
D - Encryption
B - Power
What would be an effective way to avoid an open network for a SOHO wireless network?
Choices:
A - Enable SSID
B - MAC filtering
C - Disable SSID
D - WPA2 encryption
B - MAC filtering
A wireless access point is running 802.11n at 2.4 GHz. A device with an 802.11ac wireless adapter cannot connect to the wireless access point. Other devices on the network can connect to the access point without fail. What should a technician check first for troubleshooting?
Choices:
A - If the device in question is using the correct SSID
B - If the access point has the 5 GHz band turned off
C - If the device in question is using encryption that is the same as the access point
D - If any other devices are trying to connect or can connect with an 802.11ac adapter
B - If the access point has the 5 GHz band turned off
To try to improve a wireless signal, what should the signal be bounced off of?
Choices:
A - Metal stud
B - Window film
C - Concrete wall
D - Reflective surface
D - Reflective surface
A network administrator has used MIMO to set up a wireless network. Recently, the performance of the network is about half of what it once was. What is the most likely issue here?
Choices:
A - A router stopped working
B - A switch stopped working
C - An antenna stopped working
D - A wireless access point stopped working
C - An antenna stopped working
What, when added to a window, can impede a wireless signal?
Choices:
A - Film
B - Blinds
C - Shades
D - Caulking
A - Film
What types of studs in a wall can cause interference in a wireless network?
Choices:
A - Metal
B - Wood
C - Corner
D - Trimmer
A - Metal
What is the role of LWAPP in wireless networks?
Choices:
A - To allow signals to bounce
B - To create thick access points
C - To configure and monitor multiple access points
D - To allow access points to stream to multiple clients at once
C - To configure and monitor multiple access points
What is true about thin and thick wireless access points?
Choices:
A - Thick wireless access points never perform the DHCP role
B - Thick wireless access points rely on LWAPP for authentication and configuration
C - Thin wireless access points are not dependent on another device for tasks such as
D - Thick wireless access points are not dependent on another device for tasks such as
D - Thick wireless access points are not dependent on another device for tasks such as
A junior network administrator replaced the current wireless access point with an 802.11ac wireless access point. Now, users with older laptops say they cannot connect to the wireless access point even though the SSID and password are the same. What is the most likely cause of the problem?
Choices:
A - The signal strength needs to be adjusted
B - The channel setting needs to be adjusted
C - The standard setting needs to be adjusted
D - The previous access point was an 802.11n access point
D - The previous access point was an 802.11n access point
Several users are connected to an 802.11n wireless network. They all use 802.11n adapters and the wireless network is in an open-cubicle type building with no microwaves nearby. Several users are complaining about slow speeds. What is the most likely cause of this issue?
Choices:
A - The users with slower speeds are on the wrong channel
B - The users with slower speeds are on a different frequency than the other users
C - The users with slower speeds are further away from the access point than others
D - The users with slower speeds are streaming video in addition to doing their normal work
C - The users with slower speeds are further away from the access point than others
Where can a technician go to easily measure the speed of an Internet connection?
Choices:
A - Speed test site
B - Network monitor
C - Looking glass site
D - Performance monitor
A - Speed test site
What type of site can allow a user to view routing information from a server’s perspective?
Choices:
A - Speed test site
B - Routing test site
C - Looking glass site
D - Border gateway site
C - Looking glass site
What type of network analysis tool is best used to monitor incoming ping attempts?
Choices:
A - Port scanner
B - Packet analyzer
C - Protocol analyzer
D - Wireless analyzer
C - Protocol analyzer
A junior network administrator is assigned to find a faulty telephone wire in a network. What tool should the administrator use?
Choices:
A - Line tester
B - Multimeter
C - Toner probe
D - Cable tester
A - Line tester
Which tool is used to measure voltage, current, and resistance for an electrical object?
Choices:
A - Multimeter
B - Line tester
C - Toner probe
D - Cable tester
A - Multimeter
A network administrator suspects a cable may have an open or a short in it. Which tool should the administrator use to test the cable?
Choices:
A - Line tester
B - Multimeter
C - Toner probe
D - Cable tester
D - Cable tester
Which tool would a technician use to locate the opposite end of a cable?
Choices:
A - Line tester
B - Toner probe
C - Cable tester
D - Cable certifier
B - Toner probe
What causes a short in a network cable?
Choices:
A - A wire is exposed
B - A connector is loose
C - The cables are not making a full circuit
D - The data attempts to travel on wires other than the ones intended
D - The data attempts to travel on wires other than the ones intended
A technician indicates to you that a connection between a computer and a switch worked with a straight- through cable but after plugging in a different switch, the connection no longer works. What type of port does the switch not have?
Choices:
A - STP
B - VLAN
C - Gigabit
D - Auto MDI-X
D - Auto MDI-X
A crossover cable is connected from a computer to a console port. The connection is not working. Why?
Choices:
A - A rollover cable is needed
B - A straight-through cable is needed
C - The cable needs to be plugged into an MDI port
D - The cable needs to be plugged into an MDI-X port
A - A rollover cable is needed
In far-end crosstalk, where is interference between two pairs of cable measured?
Choices:
A - The opposite connector
B - The opposite end of the cable
C - The opposite end of the twisted pair
D - The opposite end of the interfering transmitter
D - The opposite end of the interfering transmitter
Which cable type is least susceptible to EMI?
Choices:
A - UTP
B - STP
C - Coaxial
D - Fiber-optic
D - Fiber-optic
What device is needed for a signal using UTP cable to avoid attenuation?
Choices:
A - Hub
B - Switch
C - Router
D - Repeater
D - Repeater
A user calls the help desk reporting that the network cable (a twisted-pair cable) keeps unplugging from the back of the machine. What is the most likely problem?
Choices:
A - The user keeps moving the machine
B - The user keeps stepping on the cable
C - The cable was not plugged in properly
D - The flange on the RJ-45 connector broke off
D - The flange on the RJ-45 connector broke off
If a split pair is unintentional, what is a likely problem with the cable? Choose two.
Choices:
A - Open
B - Short
C - Crosstalk
D - Attenuation
A - Open
B - Short
A twisted-pair cable was used to connect two computers directly. Now, the cable is plugged from a computer into a wall port instead of another computer. The computer in question has no network connectivity. The wall port has been verified that it is working. What is the most likely cause of the problem?
Choices:
A - The cable is a rollover cable
B - The cable is a crossover cable
C - The computer needs its IP address reset
D - The computer needs its DNS address reset
B - The cable is a crossover cable
If an SFP transceiver is plugged into port 20 on a switch, what happens to the port?
Choices:
A - Ethernet port 20 is enabled
B - Ethernet port 20 is disabled
C - Ethernet port 20 has 1G speed
D - Ethernet port 20 has 10G speed
B - Ethernet port 20 is disabled
What can cause a ricochet effect in fiber-optic transmissions?
Choices:
A - Too many bends in the fiber-optic cable
B - A mismatch of cable and transceiver types
C - Too long a distance to try to carry a signal
D - Using a single-mode fiber with a multimode interface
B - A mismatch of cable and transceiver types
When connectors collect dust and static and thus have problems with performance, what is this condition known as?
Choices:
A - Dirty connectors
B - Cable interference
C - Connector mismatch
D - Transceiver problems
A - Dirty connectors
What is the equivalent of attenuation called for fiber-optic cables?
Choices:
A - Degradation
B - Fiber dispersion
C - Optic dispersion
D - Chromatic dispersion
D - Chromatic dispersion
A technician is trying to diagnose a fiber-optic connection that is not working. The cable and interface are both multimode. The distance is short and there are no bends in the cable. What else could be wrong, assuming everything is plugged in properly?
Choices:
A - Cable mismatch
B - Fiber type mismatch
C - Connector mismatch
D - Wavelength mismatch
D - Wavelength mismatch
Which factors contribute to signal loss due to connector problems in fiber cables? Choose two.
Choices:
A - Improper alignment
B - Core diameter differences
C - Multimode fiber plugged into single-mode interface
D - Single-mode fiber plugged into multimode interface
A - Improper alignment
B - Core diameter differences
A technician is running 10GBase-SR cable in place of twisted-pair cable. The cable speeds are below standard for a connection from the west side of a building to the east side of a building. What is the most likely problem the 10GBase-SR cable is having?
Choices:
A - EMI
B - Crosstalk
C - Distance limitations
D - Bend radius limitations
C - Distance limitations
What is the most likely cause of a broadcast storm within a network segment?
Choices:
A - Routing loop
B - Switching loop
C - Hardware failure
D - Interface misconfiguration
B - Switching loop
A user has a static IP address set and can log in to the network but cannot reach most of the network servers by name. What is most likely incorrect in the user’s NIC settings?
Choices:
A - DNS
B - APIPA
C - Subnet Mask
D - Default Gateway
A - DNS
In a speed and duplex mismatch, at least one of the ends of the connection probably does not have its NIC set to which setting?
Choices:
A - Full duplex
B - Half duplex
C - Simple duplex
D - Autonegotiation
D - Autonegotiation
A user is reporting that the network connection icon occasionally flashes a yellow exclamation point and then the user temporarily cannot connect to any network resources. What should the technician check first?
Choices:
A - NIC
B - Cable
C - Switch
D - Wall port
B - Cable
A user is complaining about having to enter a password every time he/she accesses a wireless connection that connects to the wired network. What should be suggested to the user to solve the problem?
Choices:
A - Connect the user to a different access point
B - Have the computer forget and then redo the connection
C - Go into the connection’s settings and tell it to save the password
D - Check the Connect Automatically box the next time the connection is made
D - Check the Connect Automatically box the next time the connection is made
A machine logs into the network without incident. Nine days later, it attempts to log in again. This time a message appears indicating a duplicate IP address exists on the network. What is the most likely cause of the error?
Choices:
A - The DHCP server service needs to be restarted
B - A DHCP lease never expired for the IP address this machine has
C - Another device was added to the network with the same IP address
D - The DHCP scope’s range of IP addresses includes one or more static IP addresses
D - The DHCP scope’s range of IP addresses includes one or more static IP addresses
A user calls the help desk saying that he or she sees two access points with the same name when trying to connect to a wireless network. The user has not seen two access points before. What could the second wireless access point be? Choose two.
Choices:
A - Evil twin
B - Load balancer
C - Rogue access point
D - Point of redundancy
A - Evil twin
C - Rogue access point
A power reduction has taken place and has lasted several hours, during which time a network administrator has had to power down several devices to avoid further power issues. What has taken place?
Choices:
A - Sag
B - Spike
C - Blackout
D - Brownout
D - Brownout
A router is removed from a network. As a result, an entry in a static routing table is incorrect. What should be set on the route to prevent it from being used?
Choices:
A - Route hiding
B - Route splitting
C - Route disabling
D - Route poisoning
D - Route poisoning
A technician is attempting to make sure that each NIC in a two-NIC setup on a server has its own MAC address. Yet, the server is only showing one NIC, no matter which NIC a cable is plugged into. What type of NIC redundancy mode is currently configured?
Choices:
A - Active-Active
B - Passive-Active
C - Active-Passive
D - Passive-Passive
C - Active-Passive
A network administrator runs netstat and notices that many more ports are open than usual. What is most likely misconfigured?
Choices:
A - Hub
B - Switch
C - Router
D - Firewall
D - Firewall
A network administrator wants to make sure that no one can use RDP to remote into desktops from outside of the company. What tool should the administrator use to close the port so that it cannot be used?
Choices:
A - Firewall
B - Proxy server
C - Port scanner
D - Port analyzer
A - Firewall
If a default gateway is unreachable, what will a user not be able to do?
Choices:
A - Access the local servers
B - Access an external hard drive
C - See any local network resources
D - See anything outside the local network resources
D - See anything outside the local network resources
A network group should be able to read and write to a folder but the group can only read the folder. What needs to be adjusted?
Choices:
A - The folder
B - The folder’s ACL
C - The folder’s attributes
D - The folder’s properties
B - The folder’s ACL
Which protocol, when blocked, helps to mitigate the chances of a Ping of Death attack?
Choices:
A - TCP
B - UDP
C - ICMP
D - IGMP
C - ICMP
What is the biggest type of vulnerability to firmware and/or an operating system as a result of not patching firmware and/or an operating system?
Choices:
A - Code
B - Feature
C - Security
D - Versioning
C - Security
What type of users have no access to network resources yet attack a network?
Choices:
A - Rogue
B - Trusted
C - Outside
D - Untrusted
D - Untrusted
What can a malicious user use to eavesdrop on unencrypted traffic on a network?
Choices:
A - Port scanner
B - Port analyzer
C - Packet sniffer
D - Packet analyzer
C - Packet sniffer
A technician has just installed a wireless router on a SOHO network. What setting on the router should be changed first?
Choices:
A - SSID
B - Password
C - IP address
D - MAC filters
B - Password
What constitutes a back door attack in networking?
Choices:
A - An attacker bypasses standard security checks
B - A programmer leaves malicious code in a program
C - An attacker injects code into a user form to access data
D - An unauthorized person follows an authorized person into a building
A - An attacker bypasses standard security checks
What is the process of hacking a network to see header information on data and obtain the MAC address and OUI of a system known as?
Choices:
A - OUI grabbing
B - MAC grabbing
C - Banner grabbing
D - Header grabbing
C - Banner grabbing
To best harden a desktop, users connected to a domain should not have which kind of permissions on their machines?
Choices:
A - Local user
B - Local guest
C - Local administrator
D - Local backup operator
C - Local administrator
In a business environment, what is the best way to not lose Internet connectivity?
Choices:
A - Have a backup connection
B - Make sure the cables are all working
C - Have the fastest connection possible
D - Make sure the router has all the necessary updates
A - Have a backup connection
What is the best way to avoid interface errors when changing configuration on a NIC?
Choices:
A - Backup the NIC configuration first
B - Document everything that is changed
C - Take a snapshot of the NIC configuration
D - Have a second NIC with the original settings
B - Document everything that is changed
What is one way to avoid a name resolution problem with a DNS?
Choices:
A - Add an A record for each host
B - Set a static address for each host
C - Have DHCP always define the address for each host
D - Have two DNS server addresses defined for each host
C - Have DHCP always define the address for each host
Which are forms of cable interference? Choose two.
Choices:
A - EMI
B - Crosstalk
C - Attenuation
D - Degradation
A - EMI
B - Crosstalk
What hardware piece sits at the demarcation point in a network?
Choices:
A - Loopback
B - Smart jack
C - Remote alarm
D - Surge protector
B - Smart jack
A box outside a business contains telephone wiring and an indicator of where the telephone company’s responsibility for a phone line ends and the business’ responsibility begins. What is this point called?
Choices:
A - Loopback
B - CSU/DSU
C - Smart jack
D - Demarcation point
D - Demarcation point
What device is needed to translate LAN data into WAN data and vice versa?
Choices:
A - Gateway
B - CSU/DSU
C - Smart jack
D - Media Converter
B - CSU/DSU
What is a transformer used to extend a signal from a demarcation point known as?
Choices:
A - Signal booster
B - Signal repeater
C - Copper line booster
D - Copper line driver or repeater
D - Copper line driver or repeater
A network administrator needs to stop employees from being able to visit social networking sites. What is this action known as?
Choices:
A - Blocking
B - Throttling
C - Utilization Limits
D - Fair Access Policy
A - Blocking
An Internet Service Provider allows its customers up to 250 GB of bandwidth each month, after which time their connection speed is cut in half. What is this an example of?
Choices:
A - QoS
B - Blocking
C - Throttling
D - Fair access policy/utilization limits
C - Throttling