Topic 4: Network Management Flashcards
Which of the following would a technician do to monitor remote traffic through an access point? A. Enable an SNMP agent B. Enable network mapping C. Set monitoring SSID D. Select WPA2
Answer: A
Which of the following commands can a network technician use to check whether the DNS server for a given domain is reachable? A. nmap B. nbtstat C. dig D. arp
Answer: C
Explanation:
The command dig is a tool for querying DNS name servers for information about host addresses, mail exchanges, nameservers, and related information.
A client’s computer is unable to access any network resources. Which of the following utilities can a technician use to determine the IP address of the client’s machine? A. ipconfig B. nslookup C. dig D. tracert
Answer: A
A user’s computer is unable to access the Internet. Which of the following utilities can a technician use to determine if DNS is working? A. nbstat B. arp C. nslookup D. ipconfig
Answer: C
Joe, a network technician, is troubleshooting in a wiring closet in 2011. The cabling to all the equipment does not match the documentation from 2007. Which of the following configuration management methods has been overlooked? A. Change management B. System logs C. Asset management D. Baselining
Answer: A
Explanation: Change management is the request for to change any configuration which is documented.
After a technician has identified the problem and its impact, which of the following steps should be performed NEXT?
A. Implement preventative measures.
B. Establish a plan of action to resolve the problem.
C. Establish a theory of probable cause.
D. Implement the solution or escalate as necessary.
Answer: C
Explanation:
By sorting out the probable causes and establishing a theorey on them he will come to know wheather it is right cause or not.
Which of the following reasons would MOST likely be used to implement QoS and traffic shaping solutions? A. Redundancy B. Fault tolerance C. Unified communications D. Uptime requirements
Answer: C
Explanation: In unified communication video,voice,data have only one end gateway so to given priority to avoid delay in voice and video we use Qos.
Ann, a network technician, has been troubleshooting a connectivity problem in the LAN room. Ann has diagnosed the problem and implemented a solution. Which of the following would be the NEXT step? A. Test the theory B. Establish a plan of action C. Establish a theory D. Document findings
Answer: D
Explanation:
As to prove the cause of problem documents need to be attached so document finding is the first step after we implemented and diagnosed that problem.
A network technician is troubleshooting a user’s connectivity problem, and has determined a probable cause. The technician is at which step in the troubleshooting methodology? A. Verify full system functionality B. Identify the problem C. Establish a theory D. Implement the solution
Answer: C
Explanation:
Establish a theory means to correlate the finding and cause of a problem in order to fix the problem.
In a SOHO environment, placing a VoIP unit on the outside edge of a LAN router enhances which of the following network optimization methods? A. Load balancing B. Quality of service C. Fault tolerance D. Traffic shaping
Answer: B
A technician decides to upgrade a router before leaving for vacation. While away, users begin to report slow performance. Which of the following practices allows other technicians to quickly return the network to normal speeds? A. Change management B. Baselines C. Asset management D. Cable management
Answer: A
Explanation:
As soon as technician found a problem he generates a change management request to make changes to fast up the speed of router.
Which of the following will allow a technician to monitor all network traffic when connected to a mirror port? A. VLAN tags B. SNMP C. Packet sniffer D. Syslog
Answer: C
Explanation:
Mirror port just send the packet to the port which is selected to grab the packet of any destination port to capture that packets we need packet sniffer.
Which of the following would a network administrator recommend to satisfy fault tolerance needs within the datacenter? A. Multimode fiber B. Setting up a new hot site C. Central KVM system D. Central UPS system
Answer: D
Explanation:
For uninterrupted power supply we need ups as from this no power issue will come and our systems will remain safe.
Which of the following would MOST likely be used by a network administrator to test DNS resolution? A. dig B. ipconfig C. netstat D. nbtstat
Answer: A
Explanation:
The command dig is a tool for querying DNS nameservers for information about host addresses, mail exchanges, nameservers, and related information.
A technician is developing a shortcut sheet for the network to be able to assist in future troubleshooting scenarios. Which of the following should the network devices have to ease manageability efforts? A. MAC spoofing B. Dynamic IPs C. MAC filtering D. Static IPs
Answer: D
A technician is troubleshooting a computer that will not connect to the Internet. The PC is connected to the network. Which of the following tools should the technician use FIRST to understand the NIC configuration? A. Protocol analyzer B. ipconfig C. nslookup D. tracert
Answer: B
A customer is implementing a VoIP infrastructure using an existing network. The customer currently has all network devices on the same subnet and would like the phones to be powered without the use of an AC adapter. Which of the following features should be enabled and configured to allow for reliable performance of the VoIP system? (Select THREE). A. WEP B. PoE C. VLANs D. SSL VPN E. IDS F. QoS
Answer: B,C,F
Explanation:
As customer don’t want to use Ac adapter so Power over Ethernet is best option (PoE) as in this switch provide power to phones.Phones will transfer their power requirement via cdp to vlan assigned.And Qos provide the voice packet priority over the data packets to avoid jitter.
A company has just installed a new network switch for an expanding department. The company is also piloting the use of a VoIP phone system for this department. Which of the following should be enabled on the new network switch? A. WINS B. QoS C. NAT D. DHCP
Answer: B
Explanation:
Qos provide the voice packet priority over the data packets to avoid jitter and delay.
Which of the following network protocols is used for a secure command line interface for management of network devices? A. SSH B. TELNET C. IGMP D. HTTP
Answer: A
Explanation:
Secure Shell is a cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers.
A user is having difficulty connecting a laptop to the company’s network via a wireless connection. The user can connect to the network via a wired NIC. The technician suspects the laptop’s wireless NIC has failed. The technician performs hardware diagnostics on the wireless NIC and discovers the hardware is working fine. Which of the following network troubleshooting methodology steps should the technician do NEXT?
A. Establish a plan of action to resolve the problem.
B. Test the theory to determine a cause.
C. Re-establish a new theory or escalate.
D. Implement the solution or escalate as necessary.
Answer: C
Explanation:
As first theorey doesn’t work he will establish a new theorey or escalate it to the vendor hardware company to work on it.
An administrator is using a packet sniffer to try to determine what is causing the traffic on the network. The administrator sees a lot of packets on port 25. Which of the following traffic types is MOST likely using port 25? A. SMTP B. SSH C. DNS D. TELNET
Answer: A
Explanation: Port no. 25 is assigned to smtp as documented by iana.
Which of the following should be used when throughput to the destination network is a priority? A. MTU B. Hop count C. Reliability of the path D. Bandwidth
Answer: D
A network technician is concerned that a user is utilizing a company PC for file sharing and using a large amount of the bandwidth. Which of the following tools can be used to identify the IP and MAC address of the user’s PC? A. System log B. History log C. Network sniffer D. Nslookup
Answer: C
Explanation:
Network sniffer is a computer program or a piece of computer hardware that can intercept and log traffic passing over a digital network or part of a network. As data streams flow across the network, the sniffer captures each packet and, if needed, decodes the packet’s raw data, showing the values of various fields in the packet, and analyzes its content according to the appropriate RFC or other specifications.
A recent flood in the office caused a lot of equipment to be damaged and the manager of the IT department would like a way to prevent such an incident in the future. Which of the following is the BEST way to mitigate such an equipment failure?
A. Reduce the power input on the replacement servers.
B. Cover the servers with plastic tarps.
C. Purchase twice as many servers to create high availability clusters.
D. Transfer the replacement servers offsite to a data center.
Answer: D
Explanation:
As we replace replacement servers offsite to datacenter this will cause lower traffic on over lan and will not cause failure of these server also.
A user has network connectivity per the link lights on the NIC, but cannot access any network resources or the Internet. Which of the following commands should the technician run FIRST? A. arp B. ipconfig C. tracert D. route
Answer: B
Explanation:
As from ipconfig command technician will come to know wheather he has assigned right ip address to NIC or not.
A network administrator suspects that recent traffic problems could be caused by a high CPU load on company routers. Which of the following would BEST be used to monitor CPU cycles on the routers? A. TACACS+ B. SNMP C. Syslog D. DOCSIS
Explanation:
SNMP, which is widely used in local area networks (LANs), lets you monitor network nodes from a management host.
In order to discover the currently unknown IP address of the next-hop router, a network administrator would begin by using which of the following tools? A. NMAP B. ping C. nslookup D. tracert
Answer: D
A NAS appliance has had a failed NIC replaced. Now the NAS appliance is no longer visible on the network. Which of the following is the MOST likely cause of the problem?
A. The network cable connecting the NAS to the network switch is bad.
B. The network port that the appliance is connected to is assigned to the wrong VLAN.
C. Port security on the Ethernet switch has disabled the port.
D. Firewall needs to be updated for the new NAS device.
Answer: C
Explanation:
As by port security switch find the changes in mac address because nic is replaced so due to security reason switch shut that port.
A large company has experienced Internet slowdowns as users have increased their use of the Internet. Which of the following can the Network Administrator use to determine the amount of bandwidth used by type of application? A. Network maps B. Traffic analysis C. Syslog D. ICMP
Answer: B
Explanation:
By traffic analysis administrator will come to whether user are using bandwidth for right purpose or not.
A user reports intermittent network connectivity. Which of the following should a technician configure on the managed switch to help troubleshoot this issue? A. SMTP B. SNTP C. SNMP D. SNAT
Answer: C
Explanation:
SNMP, which is widely used in local area networks (LANs), lets you monitor network nodes from a management host.
When troubleshooting a connectivity issue, which of the following commands will give the technician a list of the host names connected to the network? A. ping B. nbtstat C. arp D. msconfig
Answer: B
Explanation:
The Nbtstat command is a great command to use when you need to display the NetBIOS over TCP/IP protocol statistics. The Nbtstat command can also be used to display NetBIOS name tables for both local and remote computers.
A network administrator wants to see what ports are open on a server. Which of the following commands will show open ports? A. netstat B. tracert C. nbtstat D. nslookup
Answer: A
Explanation:
Netstat command displays various network related information such as network connections, routing tables, interface statistics, masquerade connections, multicast memberships etc.
Users report that an internal file server is inaccessible. Of the following commands, which would be the MOST useful in determining network-layer connectivity? A. dig B. nbtstat C. netstat D. ping
Answer: D
Explanation:
The Nbstat command is a great command to use when you need to display the NetBIOS over TCP/IP protocol statistics. The Nbstat command can also be used to display NetBIOS name tables for both local and remote computers.
Users have reported choppy audio in phone conversations since the implementation of SIP phones on the network. Which of the following should be implemented to alleviate the delays? A. Caching B. VoIP C. QoS D. SMTP
Answer: C
Explanation:
By Qos we can prioritize the voice packets over data network.So delay and latency will get reduce.
A customer with a SOHO requires fast, secure, cost-effective access to the Internet. Which of the following would be the MOST appropriate solution? (Select TWO). A. OC3 line with built-in firewall B. DS3 line with a separate firewall C. Cable modem with a separate firewall D. Dial-up modem with separate firewall E. DSL router with firewall capabilities
Answer: C,E
Users report that they are unable to access any external websites. The local intranet is not affected. A network technician has isolated the problem to a Linux-based server. Which of the following commands will enable the technician to view DNS information on the Linux-based server? A. nbtstat B. ipconfig C. dig D. netstat
Answer: C
Explanation:
By dig command technician will come to know whether name resolution is happening in correct way or not.
Joe, a remote user, has called the helpdesk with an issue on his machine. The technician would like to remote into the machine for troubleshooting but does not know the IP address or host name. Which of the following commands can the technician ask Joe to execute to gain this information? A. netstat B. ipconfig C. ping D. traceroute
Answer: B
Explanation:
As ipconfig command will give the information which is assigned to nic for communication so that technician will contact joe with his ip.
A user’s workstation is experiencing multiple errors when trying to open programs. Which of the following log files should the technician review to assist in troubleshooting these errors? A. History Log B. Application Log C. System Log D. Security Log
Answer: B
Explanation:
As application logs provide the user wheather application is compatible with system or not.Or what is the cuase which is making trouble.
Which of the following allows an administrator to reference performance and configuration information if there is a problem on the network? A. Wire schemes B. Change management C. Network diagrams D. System baselines
Answer: D
Explanation:
System baseline is the record line or changes record that administrator keep to match the effect after new configuration with previous configuration.
Which of the following devices is utilized to ensure traffic does not become congested while traveling over redundant links? A. Access control list B. Load balancer C. Content filter D. Proxy server
Answer: B
Explanation:
Load balancing is a computer networking method for distributing workloads across multiple computing resources, such as computers, a computer cluster, network links, central processing units or disk drives. Load balancing aims to optimize resource use, maximize throughput, minimize response time, and avoid overload of any one of the resources.
Which of the following devices can be utilized to monitor and block websites accessible by a company? A. WINS server B. DNS server C. Content filter D. Reverse proxy
Answer: C
Explanation:
On the Internet, content filtering (also known as information filtering) is the use of a program to screen and exclude from access or availability Web pages or e-mail that is deemed objectionable. Content filtering is used by corporations as part of Internet firewall computers and also by home computer owners, especially by parents to screen the content their children have access to from a computer.
A technician sees suspicious traffic coming from a computer connected to a WAP. Which of the following can be used to stop this traffic while troubleshooting the problem? A. tracert B. QoS C. ipconfig D. MAC filtering
Answer: D
Explanation:
By doing MAC filtering technician can block the data coming from a specific mac address.
An organization finds that most of the outgoing traffic on the network is directed at several Internet sites viewed by multiple computers simultaneously. Which of the following performance optimization methods would BEST alleviate network traffic? A. Load balancing internal web servers B. Redundant network resources C. Implement fault tolerance on the WAN D. Implement caching engines
Answer: D
Explanation:
A cache server is a dedicated network server or service acting as a server that saves Web pages or other Internet content locally. By placing previously requested information in temporary storage, or cache, a cache server both speeds up access to data and reduces demand on an enterprise’s bandwidth.
Which of the following methods would be implemented to correct a network slowdown caused by excessive video streaming? A. Traffic shaping B. Proxy server C. VPN concentrator D. High availability
Answer: A
Explanation:
As traffic shaping will prioritize the video packets over another packets and then video packets will travel fast on bandwidth.
Users inform an administrator that the network is slow. The administrator notices the bulk of the traffic is SIP and RTP traffic. Which of the following could the administrator do to help BEST alleviate the traffic congestion for the users?
A. Create an ACL on the switches and routers that are dropping SIP and RTP packets.
B. Create a QoS policy prioritizing users over RTP and SIP traffic.
C. Create another VLAN for SIP and RTP traffic.
D. Create a rule to throttle SIP and RTP to 10Kbps or less.
Answer: C
Explanation:
As if we will create a vlan for sip and rtp traffic only this traffic will flow from the ports then
Which of the following is the control when observing network bandwidth patterns over time? A. Network log B. Baseline C. Flow data D. Interface statistics
Answer: B
Which of the following can assist when troubleshooting a cable that meets the 1000BaseLX specification? A. Multimeter B. OTDR C. Link state D. Protocol analyzer
Answer: B
Which of the following tools allows an administrator to identify a cable? A. Multimeter B. Cable stripper C. Toner D. Punch down tool
Answer: C
An administrator would like to decrease the load time of common websites that employees review daily. Which of the following can be installed? A. Load balancing B. VPN concentrator C. Caching server D. Fault tolerance
Answer: C
The technician is working on a DNS problem. Which of the following software tool is the technician MOST likely to use to troubleshoot this issue? A. nslookup B. ipconfig C. ping D. nbtstat
Answer: A
Which of the following security devices can receive and process HTTP requests from hosts to allow or deny traffic for web browsing purposes only? A. Load balancer B. VPN concentrator C. Proxy server D. DNS server
Answer: C
A technician suspects invalid information in the local DNS cache of a workstation. Which of the following commands can be used to clear this? A. nslookup B. ifconfig C. dig D. ipconfig
Answer: D
A technician is unable to easily trace physical connections within a network rack. Which of the following practices would save time in the future? A. Change management B. Cable management C. Asset management D. Setting baselines
Answer: B
Which of the following syslog severity codes indicates an emergency and that the system is unusable? A. 0 B. 1 C. 6 D. 7
Answer: A