Topic 4: Network Management Flashcards
Which of the following would a technician do to monitor remote traffic through an access point? A. Enable an SNMP agent B. Enable network mapping C. Set monitoring SSID D. Select WPA2
Answer: A
Which of the following commands can a network technician use to check whether the DNS server for a given domain is reachable? A. nmap B. nbtstat C. dig D. arp
Answer: C
Explanation:
The command dig is a tool for querying DNS name servers for information about host addresses, mail exchanges, nameservers, and related information.
A client’s computer is unable to access any network resources. Which of the following utilities can a technician use to determine the IP address of the client’s machine? A. ipconfig B. nslookup C. dig D. tracert
Answer: A
A user’s computer is unable to access the Internet. Which of the following utilities can a technician use to determine if DNS is working? A. nbstat B. arp C. nslookup D. ipconfig
Answer: C
Joe, a network technician, is troubleshooting in a wiring closet in 2011. The cabling to all the equipment does not match the documentation from 2007. Which of the following configuration management methods has been overlooked? A. Change management B. System logs C. Asset management D. Baselining
Answer: A
Explanation: Change management is the request for to change any configuration which is documented.
After a technician has identified the problem and its impact, which of the following steps should be performed NEXT?
A. Implement preventative measures.
B. Establish a plan of action to resolve the problem.
C. Establish a theory of probable cause.
D. Implement the solution or escalate as necessary.
Answer: C
Explanation:
By sorting out the probable causes and establishing a theorey on them he will come to know wheather it is right cause or not.
Which of the following reasons would MOST likely be used to implement QoS and traffic shaping solutions? A. Redundancy B. Fault tolerance C. Unified communications D. Uptime requirements
Answer: C
Explanation: In unified communication video,voice,data have only one end gateway so to given priority to avoid delay in voice and video we use Qos.
Ann, a network technician, has been troubleshooting a connectivity problem in the LAN room. Ann has diagnosed the problem and implemented a solution. Which of the following would be the NEXT step? A. Test the theory B. Establish a plan of action C. Establish a theory D. Document findings
Answer: D
Explanation:
As to prove the cause of problem documents need to be attached so document finding is the first step after we implemented and diagnosed that problem.
A network technician is troubleshooting a user’s connectivity problem, and has determined a probable cause. The technician is at which step in the troubleshooting methodology? A. Verify full system functionality B. Identify the problem C. Establish a theory D. Implement the solution
Answer: C
Explanation:
Establish a theory means to correlate the finding and cause of a problem in order to fix the problem.
In a SOHO environment, placing a VoIP unit on the outside edge of a LAN router enhances which of the following network optimization methods? A. Load balancing B. Quality of service C. Fault tolerance D. Traffic shaping
Answer: B
A technician decides to upgrade a router before leaving for vacation. While away, users begin to report slow performance. Which of the following practices allows other technicians to quickly return the network to normal speeds? A. Change management B. Baselines C. Asset management D. Cable management
Answer: A
Explanation:
As soon as technician found a problem he generates a change management request to make changes to fast up the speed of router.
Which of the following will allow a technician to monitor all network traffic when connected to a mirror port? A. VLAN tags B. SNMP C. Packet sniffer D. Syslog
Answer: C
Explanation:
Mirror port just send the packet to the port which is selected to grab the packet of any destination port to capture that packets we need packet sniffer.
Which of the following would a network administrator recommend to satisfy fault tolerance needs within the datacenter? A. Multimode fiber B. Setting up a new hot site C. Central KVM system D. Central UPS system
Answer: D
Explanation:
For uninterrupted power supply we need ups as from this no power issue will come and our systems will remain safe.
Which of the following would MOST likely be used by a network administrator to test DNS resolution? A. dig B. ipconfig C. netstat D. nbtstat
Answer: A
Explanation:
The command dig is a tool for querying DNS nameservers for information about host addresses, mail exchanges, nameservers, and related information.
A technician is developing a shortcut sheet for the network to be able to assist in future troubleshooting scenarios. Which of the following should the network devices have to ease manageability efforts? A. MAC spoofing B. Dynamic IPs C. MAC filtering D. Static IPs
Answer: D
A technician is troubleshooting a computer that will not connect to the Internet. The PC is connected to the network. Which of the following tools should the technician use FIRST to understand the NIC configuration? A. Protocol analyzer B. ipconfig C. nslookup D. tracert
Answer: B
A customer is implementing a VoIP infrastructure using an existing network. The customer currently has all network devices on the same subnet and would like the phones to be powered without the use of an AC adapter. Which of the following features should be enabled and configured to allow for reliable performance of the VoIP system? (Select THREE). A. WEP B. PoE C. VLANs D. SSL VPN E. IDS F. QoS
Answer: B,C,F
Explanation:
As customer don’t want to use Ac adapter so Power over Ethernet is best option (PoE) as in this switch provide power to phones.Phones will transfer their power requirement via cdp to vlan assigned.And Qos provide the voice packet priority over the data packets to avoid jitter.
A company has just installed a new network switch for an expanding department. The company is also piloting the use of a VoIP phone system for this department. Which of the following should be enabled on the new network switch? A. WINS B. QoS C. NAT D. DHCP
Answer: B
Explanation:
Qos provide the voice packet priority over the data packets to avoid jitter and delay.
Which of the following network protocols is used for a secure command line interface for management of network devices? A. SSH B. TELNET C. IGMP D. HTTP
Answer: A
Explanation:
Secure Shell is a cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers.
A user is having difficulty connecting a laptop to the company’s network via a wireless connection. The user can connect to the network via a wired NIC. The technician suspects the laptop’s wireless NIC has failed. The technician performs hardware diagnostics on the wireless NIC and discovers the hardware is working fine. Which of the following network troubleshooting methodology steps should the technician do NEXT?
A. Establish a plan of action to resolve the problem.
B. Test the theory to determine a cause.
C. Re-establish a new theory or escalate.
D. Implement the solution or escalate as necessary.
Answer: C
Explanation:
As first theorey doesn’t work he will establish a new theorey or escalate it to the vendor hardware company to work on it.
An administrator is using a packet sniffer to try to determine what is causing the traffic on the network. The administrator sees a lot of packets on port 25. Which of the following traffic types is MOST likely using port 25? A. SMTP B. SSH C. DNS D. TELNET
Answer: A
Explanation: Port no. 25 is assigned to smtp as documented by iana.
Which of the following should be used when throughput to the destination network is a priority? A. MTU B. Hop count C. Reliability of the path D. Bandwidth
Answer: D
A network technician is concerned that a user is utilizing a company PC for file sharing and using a large amount of the bandwidth. Which of the following tools can be used to identify the IP and MAC address of the user’s PC? A. System log B. History log C. Network sniffer D. Nslookup
Answer: C
Explanation:
Network sniffer is a computer program or a piece of computer hardware that can intercept and log traffic passing over a digital network or part of a network. As data streams flow across the network, the sniffer captures each packet and, if needed, decodes the packet’s raw data, showing the values of various fields in the packet, and analyzes its content according to the appropriate RFC or other specifications.
A recent flood in the office caused a lot of equipment to be damaged and the manager of the IT department would like a way to prevent such an incident in the future. Which of the following is the BEST way to mitigate such an equipment failure?
A. Reduce the power input on the replacement servers.
B. Cover the servers with plastic tarps.
C. Purchase twice as many servers to create high availability clusters.
D. Transfer the replacement servers offsite to a data center.
Answer: D
Explanation:
As we replace replacement servers offsite to datacenter this will cause lower traffic on over lan and will not cause failure of these server also.