Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Network Troubleshooting Techniques, Exams of Computer Science

Various network troubleshooting techniques and tools, including commands like nbtstat, route, traceroute, nmap, and others. It explains concepts related to the osi model, such as the presentation layer, port mirroring, and wireless standards like 802.11a/b/g/n. The document also discusses network optimization methods, network security measures, and protocols like snmp, ntp, and csma/ca. Overall, the document provides a comprehensive overview of common network troubleshooting and management practices, making it a valuable resource for network administrators, it professionals, and students interested in network technologies.

Typology: Exams

2024/2025

Available from 10/28/2024

Docgiana
Docgiana 🇺🇸

3.3

(12)

683 documents

1 / 298

Toggle sidebar

Partial preview of the text

Download Network Troubleshooting Techniques and more Exams Computer Science in PDF only on Docsity! 1 C. Improper VLAN assignment Explanation: Finance Server is placed in same VLAN which is assigned to finance users if they are able to access internet that's means connectivity to switch is good, so we have to check the VLAN assigned to users. - correct answer Several users from the finance department report that they are able to access the Internet, but unable to connect to their financial applications. The network technician is unable to ping the finance server. The technician decides to check the switch and determines that Internet access is working. Which of the following is a possible cause of the access issues? A. Faulty cable B. Remote management disabled C. Improper VLAN assignment D. Mismatched duplex C. WAP radio power Explanation: WAP radio power is the signal strength through which you can specify the range from which you can stay connected to the network and access internet. Here, when the user is not able to maintain a stable connection then it is a problem with the signal strength for sure so you can try to increase the signal strength by increasing the radio power. - correct answer A user's laptop is unable to keep a stable network connection. Which of the following measures would MOST likely need to be configured? A. SSID name B. WAP encryption strength 2 C. WAP radio power D. Channel overlay D. Physical E. Data Link Explanation: The network layer is responsible for packet forwarding including routing through intermediate routers, whereas the data link layer is responsible for media access control, flow control and error checking - correct answer The Network Interface Layer of the TCP/IP model corresponds to which of the following layers of the OSI model? (Select TWO). A. Network B. Session C. Transport D. Physical E. Data link C. Data Link Explanation: The ITU-T G.hn standard, which provides high-speed local area networking over existing wires (power lines, phone lines and coaxial cables), includes a complete data link layer which provides both error correction and flow control by means of a selective repeat Sliding Window Protocol. - correct answer In which of the following layers of the OSI model would MAC addressing be found? A. Network B. Application 5 A. Latency B. Attenuation C. Crosstalk D. Frequency hopping C. Application The Application layer provides applications the ability to access the services of the other layers and defines the protocols that applications use to exchange data. There are many Application layer protocols and new protocols are always being developed. - correct answer Which of the following TCP/IP model layers does the OSI model Presentation layer map to? A. Transport B. Internet C. Application D. Network Interface C. PAT Port Address Translation (PAT), is an extension to network address translation (NAT) that permits multiple devices on a local area network (LAN) to be mapped to a single public IP address. The goal of PAT is to conserve IP addresses. - correct answer A customer wants to keep cost to a minimum and has only ordered a single static IP address from the ISP. Which of the following must be configured on the router to allow for all the computers to share the same public IP address? A. VLANs B. PoE C. PAT 6 D. VPN D. 1000BaseX Explanation: 1000BaseX identifies various Gigabit Ethernet physical layer standards as defined in IEEE802.3z, such as 1000BaseLX, 1000BaseSX, 1000BaseCX and 1000BaseLH. Basically, all standards included in 1000BaseX uses 8B/10B coding scheme with 8 bits of data and 2 bits of error- correction data. Each specification allows various cable (fiber or copper) lengths, and uses different cable media. - correct answer Which of the following LAN technologies is used to provide a MAXIMUM bandwidth of 1Gbps through singlemode fiber? A. 10GBaseLR B. 100BaseFX C. 100BaseTX D. 1000BaseX A. Reservations Explanation: Reservations are permanent lease assignments that are used to ensure that a specified client on a subnet can always use the same IP address. You can use DHCP reservations for hosts that require a consistent IP address, but do not need to be statically configured. - correct answer Which of the following properties of DHCP would a technician use to ensure an IP address is not leased out from the active scope? A. Reservations B. Lease times C. Removing IPs from the active leases D. Configuring the DNS options 7 C. Switch Explanation: Spanning Tree Protocol (STP) is a Layer 2 protocol that runs on bridges and switches. The specification for STP is IEEE 802.1D. The main purpose of STP is to ensure that you do not create loops when you have redundant paths in your network. Loops are deadly to a network. - correct answer Spanning-Tree Protocol is used with which of the following network devices? A. Router B. NIC C. Switch D. DHCP server A. DHCP lease Explanation: By default, each IP address assigned by a DHCP Server comes with a one-day lease, which is the amount of time that the address is valid. - correct answer Which of the following defines the amount of time a host retains a specific IP address before it is renewed or released? A. DHCP lease B. DNS suffix C. Subnet mask D. DHCP reservation C. Tracert Explanation: Tracet command will tell the administrator which route is not present or which is present so he will 10 Explanation: The Internet Message Access Protocol (commonly known as IMAP) is an Application Layer Internet protocol that allows an e-mail client to access e-mail on a remote mail server. The current version, IMAP version 4 revision 1 (IMAP4rev1), is defined by RFC 3501. An IMAP server typically listens on well-known port 143 - correct answer Which of the following is the common port used for IMAP? A. 25 B. 53 C. 143 D. 443 A. DNS Explanation: An Internet service that translates domain names into IP addresses. Because domain names are alphabetic, they're easier to remember. The Internet however, is really based on IP addresses. Every time you use a domain name, therefore, a DNS service must translate the name into the corresponding IP address. For example, the domain name www.example.com might translate to 198.105.232.4. - correct answer Which of the following network protocols is used to resolve FQDNs to IP addresses? A. DNS B. FTP C. DHCP D. APIPA 11 D. SMTP Explanation: While electronic mail servers and other mail transfer agents use SMTP to send and receive mail messages, user-level client mail applications typically use SMTP only for sending messages to a mail server for relaying - correct answer Which of the following network protocols is used to transport email between servers? A. IMAP4 B. POP3 C. SNMP D. SMTP B. An incorrect subnet mask has been entered in the WAP configuration. Explanation: Due to wrong subnet entered user is unable to communicate with anyone so to communicate he needs to be in right subnet. - correct answer Ann, a technician, installs a new WAP and users are able to connect; however, users cannot access the Internet. Which of the following is the MOST likely cause of the problem? A. The signal strength has been degraded and latency is increasing hop count. B. An incorrect subnet mask has been entered in the WAP configuration. C. The signal strength has been degraded and packets are being lost. D. Users have specified the wrong encryption type and routes are being rejected. A. ping Explanation: Ping is a computer network administration utility used to test the reachability of a host on an Internet Protocol (IP) network and to measure the round-trip time for messages sent from the 12 originating host to a destination computer. - correct answer Users have reported issues accessing an Internet website. The network technician wants to verify network layer connectivity. Which of the following tools can provide the verification? A. ping B. netstat C. route D. arp A. 10GBaseSR Explanation: 10GBASE-SR ("short range") is a port type for multi-mode fiber and uses 850 nm lasers. Its Physical Coding Sublayer 64b/66b PCS is defined in IEEE 802.3 Clause 49 and its Physical Medium Dependent PMD in Clause 52. It delivers serialized data at a line rate of 10.3125 Gbit/s. - correct answer Which of the following is the FASTEST Ethernet technology? A. 10GBaseSR B. 10BaseT C. 100BaseFX D. 1000BaseT B. Port filtering Explanation: TCP/IP port filtering is the practice of selectively enabling or disabling Transmission Control Protocol (TCP) ports and User Datagram Protocol (UDP) ports on computers or network devices. When used in conjunction with other security practices, such as deploying firewall software at your Internet access point, applying port filters to intranet and Internet servers insulates those servers from many TCP/IP-based security attacks, including internal attacks by 15 A. RDP B. RTP C. RIP D. RAS C. DHCP Explanation: when we install a dhcp server into our network then dhcp server works on the basis of dora process first dhcp server sends a hello message in to the network to discover the clients pc and when any client pc found in the network then, dhcp server offers the IP to client pc. When client pc selects any IP from dhcp server then client pc request for selected IP to dhcp server then dhcp server provide that IP to client pc and both send ackonledgement to each other. - correct answer Discover, Offer, Request, and Acknowledge are the steps for which of the following protocols? A. DNS B. DOS C. DHCP D. DSL B. route Explanation: Explanation: The route command allows you to make manual entries into the network routing tables. The route command distinguishes between routes to hosts ... - correct answer Which of the following commands displays the routing table on a server or workstation? 16 A. nbtstat B. route C. traceroute D. nmap C. Presentation Explanation: The presentation layer is responsible for the delivery and formatting of information to the application layer for further processing or display. It relieves the application layer of concern regarding syntactical differences in data representation within the end-user systems. An example of a presentation service would be the conversion of an EBCDIC-coded text computer file to an ASCII-coded file. - correct answer At which of the following layers of the OSI model does ASCII work? A. Session B. Transport C. Presentation D. Application A. TELNET Explanation: Telnet is a network protocol used on the Internet or local area networks to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection. User data is interspersed in-band with Telnet control information in an 8-bit byte oriented data connection over 17 the Transmission Control Protocol (TCP). - correct answer Which of the following uses port 23 by default? A. TELNET B. IMAP C. FTP D. SNMP C. Reservation Explanation: You might want to assign network printers and certain servers DHCP reservations to ensure that they always have the same IP address, but continue to receive updated configuration information from the DHCP server. For example, create reservations for servers that must always have the same IP address. - correct answer Assigning the same IP address to a network device is which of the following? A. SSID B. Scope C. Reservation D. Lease A. OSI model Data link layer B. TCP/IP model Network Interface layer Explanation: The data link layer is concerned with local delivery of frames between devices on the same LAN. Data-link frames, as these protocol data units are called, do not cross the boundaries of a local network. Inter-network routing and global addressing are higher layer functions, allowing data- link 20 B. 21 C. 22 D. 23 E. 25 F. 80 B. TFTP Explanation: Trivial File Transfer Protocol (TFTP) is a file transfer protocol notable for its simplicity. It is generally used for automated transfer of configuration or boot files between machines in a local environment. Compared to FTP, TFTP is extremely limited, providing no authentication, and is rarely used interactively by a user. - correct answer Which of the following protocols is MOST commonly used for the transfer of router configuration files? A. SSL B. TFTP C. DNS D. IMAP B. ARP Explanation: ARP is used to convert an IP address to a physical address such as an Ethernet address. ARP has been implemented with many combinations of network and data link layer technologies, such as IPv4, Chaosnet, DECnet and Xerox PARC Universal Packet (PUP) using IEEE 802 standards, FDDI, X.25, Frame Relay and Asynchronous Transfer Mode (ATM). IPv4 over IEEE 802.3 and 21 IEEE 802.11 is the most common case. - correct answer Which of the following protocols resolves IP addresses to MAC addresses? A. DNS B. ARP C. RARP D. NTP C. 161 Explanation: Simple Network Management Protocol (SNMP) is an "Internet-standard protocol for managing devices on IP networks". Devices that typically support SNMP include routers, switches, servers, workstations, printers, modem racks, UPSes and more. It is used mostly in network management systems to monitor network-attached devices for conditions that warrant administrative attention. - correct answer Which of the following port numbers is used for SNMP? A. 61 B. 151 C. 161 D. 1611 B. Translates FQDN's to IP addresses Explanation: Domain Name System (DNS) is the name resolution protocol for TCP/IP networks, such as the Internet. Client computers query a DNS server to resolve memorable, alphanumeric DNS names to the IP addresses that computers use to communicate with each other. - correct answer Which of the following is the definition of a DNS server? 22 A. Hosts proprietary business applications B. Translates FQDN's to IP addresses C. Provides network IDS/IPS security D. Assigns IP addresses to network devices A. VPN concentrator Explanation: The VPN Concentrator is used for Remote Access VPN's. In typical use, a Remote Access VPN allows users to use an encrypted tunnel to securely access a corporate or other network via the Internet. - correct answer Which of the following features can BEST be used to facilitate authorized remote access to a network? A. VPN concentrator B. Proxy server C. Content filter D. Load balancer A. 10.4.0.1 Explanation: Class A ip address ranges from 10.0.0.0 to 10.255.255.255 - correct answer Which of the following is a Class A IP address? A. 10.4.0.1 B. 169.254.0.1 C. 192.168.0.1 D. 254.200.0.1 D. Star 25 Explanation: Because BGP involves a table of IP networks or "prefixes" which designate network reachability among autonomous systems (AS). - correct answer Which of the following is a path vector routing protocol? A. RIP B. EIGRP C. ISIS D. OSPF E. BGP A. EIGRP Explanation: Diffusing Update Algorithm guarantees loop-free operation and provides a mechanism for fast convergence. - correct answer Which of the following routing protocols utilizes the DUAL algorithm for determining best path? A. EIGRP B. RIPv2 C. OSPF D. RIP D. Physical layer F. Data link layer Explanation: The lowest layer of the OSI Reference Model is the physical layer, which is responsible for the "nitty gritty" details of transmitting information from one place to another on a network. The layer 26 just above the physical layer is the data link layer, called the network interface layer or just the link layer in the TCP/IP architectural model. Its primary job is to implement networks at the local level, and to interface between the hardware-oriented physical layer, and the more abstract, softwareoriented functions of the network layer and those above it. - correct answer The network interface layer of the TCP/IP model corresponds with which of the following layers of the OSI model? (Select TWO). A. Transport layer B. Network layer C. Session layer D. Physical layer E. Presentation layer F. Data link layer A. DHCP is utilized to dynamically lease IP addresses to hosts. Explanation: Because DHCP server maintains a database of available IP addresses and configuration information. When the server receives a request from a client, the DHCP server determines the network to which the DHCP client is connected, and then allocates an IP address or prefix that is appropriate for the client, and sends configuration information appropriate for that client - correct answer Which of the following BEST describes the definition of DHCP? A. DHCP is utilized to dynamically lease IP addresses to hosts. B. DHCP is utilized to statically lease IP address to hosts. 27 C. DHCP is utilized to permanently lease IP address dynamically to hosts. D. DHCP is utilized to permanently lease IP address statically to hosts. D. The administrator should create exclusions for the servers IP addresses. Explanation: Whenever you define the ip pool from which IP addresses are to be dynamically assigned to the users then in order to avoid assignment of static ip address we can creat exclusion for the static ip addresses so that they are not assigned to any other host and this is how we can avoid ip address conflict on the network. - correct answer Multiple servers' IP addresses fall within the DHCP scope assigned by the administrator. Which of the following should be implemented to ensure these static IP addresses are not assigned to workstations? A. The administrator should create exclusions for the workstations IP addresses. B. The administrator should change the servers to utilize DHCP to obtain IP addresses. C. The administrator should change the workstations to utilize static IP addresses. D. The administrator should create exclusions for the servers IP addresses. B. B Explanation: As the range for class B is from 128.0.0.0 to 191.255.255.255 - correct answer The APIPA address 169.254.10.123 falls into which of the following class of addresses? A. A B. B C. C D. D C. The router is not the only DHCP server 30 B. OSPF C. BGP D. RIP B. CIDR Explanation: Classless Inter-Domain Routing is based on variable-length subnet masking (VLSM), which allows a network to be divided into variously sized subnets, providing the opportunity to size a network more appropriately for local needs and also CIDR allows an address or routing prefix to be written with a suffix indicating the number of bits of the prefix, such as 192.168.2.0/24. - correct answer Which of the following uses classless subnet masks across a network? A. Subnetting B. CIDR C. Supernetting D. Summarization A. Logical network diagrams Explanation: A logical network diagram illustrates the network architecture of a group of interconnected computers and other devices, such as printers, modems, switches, routers, and even mobile devices. These electronic components form the physical network that provides local area network (LAN) and wide area network (WAN) access to users. Once you know the layout and you have an 31 idea about the packet flow then your job becomes easy and you can create an action plan to go for the implementation. - correct answer Enterprise IP routing policy is MOST clearly depicted in which of the following configuration management documents? A. Logical network diagrams B. Physical network diagrams C. Wiring schematics D. Group security role assignments A. It is the default route. Explanation: The address 0.0.0.0 generally means "any address". If a packet destination doesn't match an individual address in the table, it must match a 0.0.0.0 gateway address. In other words, default gateway is always pointed by 0.0.0.0: - correct answer While working on a PC, a technician notices 0.0.0.0 in the routing table. Which of the following does this indicate? A. It is the default route. B. This is the address for the DHCP server. C. The PC has not been assigned an IP address. D. The firewall is down. A. Physical Explanation: The NIC does not have light refers to a situation that there could be a fault in the LAN cable or the ports are down and all of these fall under the physical layer. To make it simple, it falls in physical layer because blinking lights refers to the physical connectivity. - correct answer If a NIC does not have a link light, there is a failure at which of the following OSI layers? 32 A. Physical B. Session C. Data link D. Presentation D. Layer 7 Explanation: Basically File Transfer protocol (FTP) is responsible for file transfer which lies under Application layer (Layer 7) of OSI layers. - correct answer Which of the following OSI layers allows users to access network services such as file sharing? A. Layer 1 B. Layer 3 C. Layer 4 D. Layer 7 A. SNMPv3 Explanation: SNMPv3 makes no changes to the protocol aside from the addition of cryptographic security, it looks much different due to new textual conventions, concepts, and terminology. SNMPv3 primarily added security and remote configuration enhancements to SNMP - correct answer Which of the following can function in an unsecure mode? A. SNMPv3 B. SSH C. SSL D. SCP B. DNS server 35 Explanation: A content-filtering web proxy server provides administrative control over the content that may be relayed in one or both directions through the proxy. A caching proxy server accelerates service requests by retrieving content saved from a previous request made by the same client or even other clients. - correct answer A proxy server would MOST likely be installed to provide which of the following functions? (Select TWO). A. Combined DNS and DHCP hosting B. Encryption C. Content filtering D. Fault tolerance E. Website caching B. MPLS Explanation: MPLS is a mechanism in high-performance telecommunications networks that directs data from one network node to the next based on short path labels rather than long network addresses, avoiding complex lookups in a routing table. The labels identify virtual links (paths) between distant nodes rather than endpoints - correct answer Which of the following would the telecommunications carrier use to segregate customer traffic over long fiber links? A. VLAN B. MPLS C. VPN D. PSTN A. 25 36 Explanation: SMTP is an Internet standard for electronic mail (e-mail) transmission across Internet Protocol (IP) networks. SMTP uses TCP port 25. - correct answer An administrator notices SMTP traffic is being blocked by the company firewall. Which of the following ports should be opened? A. 25 B. 53 C. 110 D. 443 C. Bus Explanation: A bus network topology is a network topology in which a set of clients are connected via a shared communications line/cables, called a bus. - correct answer Which of the following network topologies would be separated into two networks if a client in the middle is removed or the cable is cut? A. Mesh B. Ring C. Bus D. Star D. 192.168.1.105 Explanation: Class C address range varies from 192.0.0.0 to 223.255.255.255 - correct answer Which of the following is an example of a Class C address? A. 10.19.0.79 B. 127.34.8.197 37 C. 176.96.1.222 D. 192.168.1.105 D. 802.11n Explanation: The 2.4 GHz ISM band is fairly congested. With 802.11n, there is the option to double the bandwidth per channel to 40 MHz which results in slightly more than double the data rate. However, when in 2.4 GHz, enabling this option takes up to 82%[10] of the unlicensed band, which in many areas may prove to be infeasible. The specification calls for requiring one primary 20 MHz channel as well as a secondary adjacent channel spaced ±20 MHz away. The primary channel is used for communications with clients incapable of 40 MHz mode. When in 40 MHz mode, the center frequency is actually the mean of the primary and secondary channels. - correct answer Which of the following standards can operate at either 20MHz or 40MHz channel spacing? A. 802.11a B. 802.11b C. 802.11g D. 802.11n C. The network gateway is set incorrectly. Explanation: When user is able to ping everything in its own subnet that means that all the hosts are reachable however when you are not able to ping anything outside of this subnet then please check if the 40 can. - correct answer A customer has requested a solution using multiple WAPs for wireless access. Which of the following should be different on each WAP to prevent wireless problems? A. Firewalls B. VLANs C. Channels D. Antenna types B. 802.11b Explanation: The 802.11b standard allows for a maximum data transfer speed of 11 Mbps, at a range of about 100 m indoors and up to 200 metres outdoors (or even beyond that, with directional antennas.) Hypothetical speed Range(indoors) Range(outdoors) 11 Mbits/s (speed) 50 m (indoors) 200 m (outdoors) 5.5 Mbits/s (speed) 75 m (indoors) 300 m (outdoors) 2 Mbits/s (speed) 100 m (indoors) 41 400 m (outdoors) 1 Mbit/s (speed) 150 m (indoors) 500 m (outdoors) - correct answer Which of the following wireless standards has a MAXIMUM transfer rate of 11Mbps? A. 802.11a B. 802.11b C. 802.11g D. 802.11n B. PoE Explanation: Power over Ethernet or PoE describes any of several standardized or ad-hoc systems which pass electrical power along with data on Ethernet cabling. This allows a single cable to provide both data connection and electrical power to devices such as wireless access points or IP cameras. - correct answer A network technician needs to configure a port on a switch to provide connectivity and electrical support to a WAP being installed in a warehouse. Which of the following features needs to be configured on the switch? A. STP B. PoE C. VTP trunking D. Port forwarding B. Low signal strength or interference Explanation: 42 This generally happens when the signals are weak in any particular area and any movement can make you lose connectivity to the internet. In this case you can try to increase the radio power so that the signal strength can be increased. - correct answer The network support team is constantly getting calls from users in a specific area of an office building. The users are able to connect to the office wireless network, but they sometimes disconnect or experience very slow download speeds. Which of the following is MOST likely the problem? A. Incorrect service set identifier B. Low signal strength or interference C. Incorrect encryption scheme D. Incorrect IP address or subnet mask C. Port mirroring E. VLANs Explanation: Port mirroring is used on a network switch to send a copy of network packets seen on one switch port (or an entire VLAN) to a network monitoring connection on another switch port. This is commonly used for network appliances that require monitoring of network traffic, such as an intrusion detection system, passive probe or real user monitoring (RUM) technology that is used to support application performance management (APM). In computer networking, a single layer-2 network may be partitioned to create multiple distinct broadcast domains, which are mutually isolated so that packets can only pass between them via one or more routers; such a domain is referred to as a Virtual Local Area Network, Virtual LAN or VLAN. - correct answer A technician needs multiple networks, high speeds, and redundancy on a system. Which of the following configurations should be considered for these requirements? (Select TWO). 45 C. Speed D. Transmission power B. LC Explanation: LC connector is used in SFP modules. - correct answer Which of the following connectors is usable in SFP modules? A. ST B. LC C. LX D. SX B. Channel overlap Explanation: To reduce interference between wireless APs, ensure that wireless APs with overlapping signals use unique channel frequencies. The 802.11b standard reserves 14 frequency channels for use with wireless APs. - correct answer A user reports that several spots within the company's office have intermittent connectivity issues with the newly installed wireless network. There are several WAPs located around the office to provide a strong signal wherever the users are. Which of the following is the MOST likely cause of the problem? A. Incompatible network card B. Channel overlap C. Latency D. WEP encryption C. Change the channel to a different channel than the other wireless networks. 46 Explanation: To reduce interference between wireless APs, ensure that wireless APs with overlapping signals use unique channel frequencies. The 802.11b standard reserves 14 frequency channels for use with wireless APs. You can use any other channel instead of the one that you are using. - correct answer A customer is having problems connecting to a wireless network in a shared office space. The customer can detect several other wireless network signals. All of the wireless networks have different SSIDs but several are using the same encryption type. Which of the following should be configured on the customer's wireless network to improve connectivity to the wireless network? A. Change the SSID to match other wireless networks for increased throughput. B. Change the encryption type to a different mechanism to avoid interference. C. Change the channel to a different channel than the other wireless networks. D. Change the WAP to a different manufacturer than the other wireless networks. C. MAC address filtering Explanation: MAC Filtering (or EUI filtering, or layer 2 address filtering) refers to a security access control method whereby the 48-bit address assigned to each network card is used to determine access to the network. MAC addresses are uniquely assigned to each card, so using MAC filtering on a network permits and denies network access to specific devices through the use of blacklists and whitelists. While the restriction of network access through the use of lists is straightforward, an individual person is not identified by a MAC address, rather a device only, so an authorized person will need to have a whitelist entry for each device that he or she would use to access the network. - correct answer A network technician is setting up a wireless access point that would only allow a certain laptop to be able to access the WAP. By using ACL, which of the following would be filtered to ensure only the authorized laptop can access the WAP? 47 A. NetBIOS name filtering B. IP address filtering C. MAC address filtering D. Computer name filtering A. Create a MAC filter containing the current users. Explanation: MAC Filtering (or EUI filtering, or layer 2 address filtering) refers to a security access control method whereby the 48-bit address assigned to each network card is used to determine access to the network. MAC addresses are uniquely assigned to each card, so using MAC filtering on a network permits and denies network access to specific devices through the use of blacklists and whitelists. While the restriction of network access through the use of lists is straightforward, an individual person is not identified by a MAC address, rather a device only, so an authorized person will need to have a whitelist entry for each device that he or she would use to access the network. - correct answer Which of the following is the BEST way to prevent new users from connecting to a wireless access point, but still allow already connected users to continue to connect? A. Create a MAC filter containing the current users. B. Turn off SSID broadcast. C. Change the encryption type to AES 256-bit for current users. D. Reduce the signal strength to 0 percent. A. WAP placement Explanation: Before going ahead with the deployment, the first thing that need to be check is where you are 50 C. Short distance between antennas D. WPA 2 encryption C. PuTTY Explanation: PuTTY is a free and open-source terminal emulator, serial console and network file transfer application. It supports several network protocols, including SCP, SSH, Telnet and rlogin. - correct answer Which of the following is a terminal emulator used to manage a network device? A. VPN B. IDS C. PuTTY D. IPS D. Protocol analyzer Explanation: A "Protocol analyzer" is a tool (hardware or software) used to capture and analyze signals and data traffic over a communication channel. - correct answer A network administrator suspects a broadcast storm is causing performance issues on the network. Which of the following would be used to verify this situation? A. Environmental monitor B. Multimeter C. Toner probe D. Protocol analyzer C. Bad wiring 51 Explanation: Bad wiring refers to the state when you do not follow a pattern and everything seems messed up and you are not able to figure out the cause. - correct answer Ann, a technician, is installing network cables for an office building. Some of the cables are not showing active on the switch even when moved to different ports. Which of the following is MOST likely the cause? A. Port speed mismatch B. Faulty F-connectors C. Bad wiring D. Bad switch C. Bad connectors D. Bad patch cable Explanation: It could be problem with the bad connector because the user just moved furniture to the cubicle and it is quite possible that the movement of the furniture has created problem by disrupting the cabling and connections. These two are the important things which can be broken down whenever there is a physical movement. - correct answer After a new user moves furniture into a cubicle, the computer does not connect to the network any longer. Which of the following would be the MOST likely reason? (Select TWO). A. Bad Ethernet switch port B. TX/RX reversed C. Bad connectors D. Bad patch cable E. Mismatched MTU 52 A. Fault tolerance Explanation: Fault-tolerant design is a design that enables a system to continue its intended operation, possibly at a reduced level, rather than failing completely, when some part of the system fails. The term is most commonly used to describe computer-based systems designed to continue more or less fully operational with, perhaps, a reduction in throughput or an increase in response time in the event of some partial failure. - correct answer Which of the following performance benefits would multiple domain controllers BEST provide? A. Fault tolerance B. Caching engine C. Proxy server D. Quality of service D. A switching loop was created. Explanation: A Switching loop or Bridge loop occurs in computer networks when there is more than one Layer 2 (OSI model) path between two endpoints (e.g. multiple connections between two network switches or two ports on the same switch connected to each other). The loop creates broadcast radiation as broadcasts and multicasts are forwarded by switches out every port, the switch or switches will repeatedly rebroadcast the broadcast messages flooding the network. - correct answer After a network technician has added a new workstation and cabling to the network, users report the network is very slow. The activity lights on all switches are blinking rapidly, showing large amounts of traffic. Which of the following is the BEST explanation for the traffic? A. The new user is downloading large files. B. The router failed, flooding the network with beacons. C. The new user's IP address is a duplicate. 55 A. That there is strong encryption enabled and configured on the access point. D. There are no conflicts of channels in use by neighboring wireless networks. Explanation: Strong encryption is required to keep the user's internet safe and secure so as to avoid misuse of the internet connection and to ensure that channel conflicts are not there so that the signals do not compete with each other and user start to face intermittent connection. - correct answer A technician has been given the task to install a wireless network in a user's home. Which of the following should the technician consider when implementing the network? (Select TWO). A. That there is strong encryption enabled and configured on the access point. B. The user's home network has a correctly completed WHOIS entry. C. The access point is broadcasting the SSID based upon manufacturer's standards. D. There are no conflicts of channels in use by neighboring wireless networks. E. There are redundant internal DNS names set in the access point's settings. F. That the access point's MAC address is properly set in its configuration settings. B. rogue access point Explanation: A rogue access point is a wireless access point that has either been installed on a secure company network without explicit authorization from a local network administrator, or has been created to allow a hacker to conduct a man-in-the-middle attack. - correct answer A technician working for a company with a wireless network named WirelessA notices a second wireless network named WirelessB. WirelessB is MOST likely a: A. man-in-the-middle attack B. rogue access point C. evil twin D. packet sniffer 56 C. Patch cable Explanation: A patch cable or patch cord or patch lead is an electrical or optical cable used to connect ("patchin") one electronic or optical device to another for signal routing. - correct answer A user cannot access the LAN after working successfully most of the day. Which of the following should the network administrator check FIRST? A. VLAN settings B. History logs C. Patch cable D. Port security C. MAC address filtering Explanation: Wireless access can be filtered by using the Media Access Control (MAC) addresses of the wireless devices transmitting within your wireless network. You can either permit or prevent specific wireless computers and devices access to your wireless network. - correct answer Which of the following can be used to limit wireless network access to a single computer? A. Configure PPP B. Packet sniffing C. MAC address filtering D. Omni-directional antennas C. A router Explanation: A router is a device which is capable of performing entire task required by the business owner. - correct answer A small business owner is setting up a SOHO office. The business owner needs one device that will allow for Internet access, trunk VLANs, translate multiple private IP 57 addresses into public IP addresses, and filter packets. Which of the following network devices will allow for all functions? A. A VPN concentrator B. A switch C. A router D. A firewall D. Run the ifconfig command on the workstation. Explanation: The "ifconfig" command allows the linux/unix operating system to setup network interfaces and allow the user to view information about the configured network interfaces. - correct answer A Linux-based workstation is unable to connect to an IP printer on the same network segment. The printer IP address settings have been verified. How would a network technician verify IP address settings on the Linux-based workstation? A. Run the dig command on the workstation. B. Run the nslookup command on the workstation. C. Run the ipconfig command on the workstation. D. Run the ifconfig command on the workstation. C. Implement a software solution that facilitates single sign-on authentication. Explanation: A single sign-on permits a user to enter one name and password in order to access multiple applications - correct answer Users have been stating that they need to logon to too many applications and web apps with different credentials that use different rule sets. Which of the following would BEST address these concerns? A. Alter the domain account login policies to reflect the most common application rule sets. 60 Syslog server logs are the logs that are saved on a system whenever an instance happens of the wireless device. Reviewing the logs can help him understand the behavior of the WAP as well as the client. - correct answer A technician is reviewing the following aggregated information on a server to determine the cause of a user's connection problem: Which of the following is the technician reviewing? A. Syslog server logs B. Application logs C. Network sniffer logs D. SNMPv2 queries A. 802.1q Explanation: Encapsulation is the term associated with 802.1q which is enabled by default on many devices. - correct answer When a packet that is entering a switch port is encapsulated, which of the following is the switch performing? A. 802.1q B. Collision avoidance C. Port mirroring D. STP A. Ask the users for more information, such as which applications were not functioning. Explanation: Because the system was up and running when the technician reached there, he can ask for applications that were not working or can ask for more information so that he can isolate the problem. Power cycling will not help because the system is already up and recycling can wipe 61 out logs. Escalation will also not help because the system is now up and running. Closing the call will be unfair because the same instance can occur again. - correct answer A technician has been dispatched to investigate an issue where several users in the same aisle have stated they have had no network connection for over an hour. When the technician gets there, the network seems to be up and running. Which of the following should the technician do NEXT? A. Ask the users for more information, such as which applications were not functioning. B. Power-cycle the switch that the users share to clear out cached DNS records. C. Escalate the issue to the network administrator to have their domain credentials reset. D. Close and document the service call, as there was no actual issue affecting the users. D. Re-run the network cabling so that they are 12 inches or more away from the electrical lines. Explanation: The electric cables create electric field around them and can interrupt in internet connectivity as well. It is quite possible that this is the cause which is creating the connectivity issue. - correct answer A technician has been dispatched to investigate connectivity problems of a recently renovated office. The technician has found that the cubicles were wired so that the network cables were run inside the conduit with the electrical cabling. Which of the following would MOST likely resolve the connectivity issue? A. Power-cycle the computers and switches to re-establish the network connection. B. Re-run the network cabling through the ceiling alongside the lights to prevent interference. C. Test the wiring in the network jacks for faults using a cable verifier. D. Re-run the network cabling so that they are 12 inches or more away from the electrical lines. C. QoS Explanation: QoS is the service where you can prioritize traffic running over one protocol as 62 compared to the other. It is very similar to the term where you are opening a VIP queue for allowing that traffic to pass. - correct answer A company is looking for the simplest solution to help prioritize VoIP traffic on its congested network. Which of the following would BEST accomplish this? A. MPLS B. Caching engines C. QoS D. Load balancing C. Signal bounce Explanation: Bouncing is the tendency of any two metal contacts in an electronic device to generate multiple signals as the contacts close or open. - correct answer A technician has received a trouble ticket from a user who has intermittent wireless access. Moving the computer farther from the WAP results in a more stable connection. Which of the following is MOST likely the cause of this instability? A. Wrong encryption type B. SSID mismatch C. Signal bounce D. Incorrect channel B. SSID Mismatch Explanation: the first thing which will be checked is the SSID and it is case sensitive but in the above shown example, it is not same so it will stop user from connecting. - correct answer Compare the settings below to determine which of the following issues is preventing the user from connecting to a wireless network. 65 - correct answer A customer's email server is not sending emails. Arrange the troubleshooting steps in the order the technician should perform them: Drag and Drop Started (Green) Finished(Red) - correct answer GigSwitch1 is currently configured with a speed of 100 and Duplex is set to Auto on all interfaces. Interface 2 will be connected to GigSwitch2 which is used for all departments. Interface 1 will be used for HR traffic only. GigSwitch1 needs to be configured with the following parameters: Configure the necessary protocol to prevent switching loops Configure GigSwitch1 with a /24 IP address for management Traffic across Interface 1 needs to be forced to accept and receive up to 100Mbps data at the same time Traffic across Interface 2 needs to be forced to use Gigabit speeds and maximum performance Drag and drop the appropriate configurations to their corresponding requirements. All placeholders must be filled. Not all configurations will be used. ============== Started (Green) Finished(Red) 66 Answer: The switches are not connected properly. Connect Switch 1 to switch three on the last port and then connect the last port of the switch 3 to the first port of switch 2. In this way the switches will be connected properly. Click Enable All to enable the switches - correct answer Workstations are unable to access the internet after a recent power outage. Configure the appropriate devices to ensure All workstations have internet connectivity. See image Answer: AP2 configuration is not correct. The wireless mode should be 'G' and channel should be '11'. For the wired interface, the speed should be set to 100 and duplex to 'Full'. Click 'Submit'. - correct answer Wireless network users recently began experiencing speed and performance issues after access point 2 (AP2) was replaced due to faulty hardware. The original network was installed according to a consultant's specifications and has always worked without a problem. You a network technician, have been tasked with evaluating the situation and resolving the issues to improve both performance and connectivity. Refer to the following diagram and perform any necessary changes to the wireless and wired infrastructure by adjusting devices. Note: Adjust the LEAST number of devices needed to fix the issue all blue icons in the image are clickable. D. Cable is run too close to a fluorescent light. Explanation: Cat 5 is a twisted pair cable for carrying signals. This type of cable is used in structured cabling for computer networks such as Ethernet. The cable standard provides performance of up to 100 MHz and is suitable for 10BASE-T, 100BASE-TX (Fast Ethernet), and 1000BASE-T (Gigabit Ethernet). - correct answer Which of the following can MOST likely cause intermittent connection problems with a CAT5 network cable? A. Cable has been looped too many times. 67 B. Cable has a twist tie attached too close to the connector. C. Cable is too warm. D. Cable is run too close to a fluorescent light. D. Ethernet Explanation: CSMA/CD is a Media Access Control method in which a carrier sensing scheme is used and also a transmitting data station that detects another signal while transmitting a frame, stops transmitting that frame, transmits a jam signal, and then waits for a random time interval before trying to resend the frame. - correct answer Which of the following is an example of a CSMA/CD medium? A. WEP B. SONET C. Token ring D. Ethernet D. Plenum CAT5e Explanation: Cat 5e is a twisted pair cable for carrying signals. This type of cable is used in structured cabling for computer networks such as Ethernet. The cable standard provides performance of up to 100 MHz and is suitable for 10BASE-T, 100BASE-TX (Fast Ethernet), and 1000BASE-T (Gigabit Ethernet). - correct answer Which of the following copper cable types should be chosen to run gigabit speeds through a dropped ceiling that returns airflow? A. Non-Plenum CAT5 B. Non-Plenum CAT5e C. Plenum CAT5 D. Plenum CAT5e D. White Green 70 B. Solid Brown C. Solid Orange D. White Green A. MDF Explanation: MDF stands for Main Distribution Frame and is the main computer room for servers, hubs, routers, DSL's, etc. to reside. - correct answer Which of the following components of wiring distribution is referred to as the core communications closet for an organization? A. MDF B. Smart jack C. IDF D. Demarc extension D. EMI Explanation: External Machine Interface (EMI), an extension to Universal Computer Protocol (UCP), is a protocol primarily used to connect to short message service centers (SMSCs) for mobile telephones. - correct answer Users notice a problem with their network connectivity when additional lights are turned on. Which of the following would be the cause for this problem? A. DDOS B. Cross talk C. Open short D. EMI D. Redo the cable's connectors 71 Explanation: Incomplete/Incorrect Question. - correct answer A user does not have network connectivity. While testing the cable the technician receives the below reading on the cable tester: 1-----------1 2-----------2 3-----------3 4-----------4 5-----------5 6-----------6 7-----------7 8-----------8 Which of the following should the technician do NEXT? A. Cable is a crossover, continue troubleshooting B. Pin 3 is not used for data, continue troubleshooting C. Pin 3 is not used for data, replace the NIC D. Redo the cable's connectors A. Cable certifier Explanation: A cable certifier is used to verify that a cable meets its specifications such as the bandwidth and frequency. For example, it can verify a CAT 5e cable meets specifications and supports speeds of 1000Mbps. - correct answer Management wants to be sure that the existing wiring infrastructure conforms to CAT5e standards. Which of the following is the correct tool? A. Cable certifier B. Cable tester C. OTDR 72 D. Protocol analyzer B. MIMO, OFDM Explanation: 802.11n builds upon previous 802.11 standards by adding multiple-input multipleoutput (MIMO). The additional transmitter and receiver antennas allow for increased data throughput through spatial multiplexing and increased range by exploiting the spatial diversity through coding schemes like Alamouti coding. The speed is 150 Mbit/s (even 250 Mbit/s in PHY level) - correct answer In contrast to earlier Wi-Fi speeds, which of the following BEST describes the antenna and channelization properties used in 802.11n? A. MIMO, DSSS B. MIMO, OFDM C. CSMA, DSSS D. CSMA, CDMA D. STP Explanation: Shielded twisted pair is a special kind of copper telephone wiring used in some business installations. An outer covering or shield is added to the ordinary twisted pair telephone wires; the shield functions as a ground. Twisted pair is the ordinary copper wire that connects home and many business computers to the telephone company. To reduce crosstalk or electromagnetic induction between pairs of wires, two insulated copper wires are twisted around each other. Each signal on twisted pair requires both wires. - correct answer A CAT5e network cable run needs to be installed over fluorescent lighting arrays in an office building. Which of the following cable types would be BEST suited for such an installation? A. UTP B. Plenum C. Coaxial D. STP 75 Explanation: A split cable is invisible to wire maps and continuity testers, making it very difficult to troubleshoot. - correct answer Multiple computers are connected to a hub near a wall plate. In order to get to the computers, students step on and around the cable that connects the teacher's station, a few feet away, to the same hub. The teacher is experiencing no network connectivity. Which of the following is MOST likely the problem? A. Cross-talk B. Split cables C. Distance D. EMI B. Wi-MAX Explanation: Explanation: Wi-MAX (Worldwide Interoperability for Microwave Access) is a wireless communications standard designed to provide 30 to 40 megabit-per-second data rates with the 2011 update providing up to 1 G bit/s for fixed stations. - correct answer Which of the following supports faster wireless broadband speeds? A. Satellite B. Wi-MAX C. ISDN D. OC-3 A. Decreasing radio strength Explanation: Decreasing Radio Strength will reduce signal strength outside the house and will accomplish what she is intending to do. - correct answer Ann, a home user, wishes to confine a wireless network to devices ONLY inside of her house. Which of the following will accomplish this? 76 A. Decreasing radio strength B. MAC filtering C. WEP encryption D. SSID broadcast disable C. Satellite Explanation: Satellite WAN latency is the delay caused by the physical distance a signal must travel from earth, to the satellite, and back to earth to complete a round-trip transmission. Because of the physics involved in the round-trip-time (RTT), end-to-end latency can take 600 milliseconds or more due to geosynchronous satellites orbiting miles above the earth. - correct answer Which of the following WAN technologies has the HIGHEST latency? A. ADSL B. LTE C. Satellite D. WiMAX D. RJ-11 Explanation: The six-position plug and jack commonly used for telephone line connections may be used for RJ11, RJ14 or even RJ25, all of which are actually names of interface standards that use this physical connector. The RJ11 standard dictates a 2-wire connection, while RJ14 uses a 4-wire configuration, and RJ25 uses all six wires. The RJ abbreviations, though, only pertain to the wiring of the jack (hence the name "registered jack"); it is commonplace but not strictly correct to refer to 77 an unwired plug connector by any of these names. Typically you'll find the RJ-11 and RJ-14 on your Plain Old Telephone Service (POTS). - correct answer Which of the following connectors are MOST commonly used on a POTS line? A. RJ-45 B. MTRJ C. DB-9 D. RJ-11 C. Mesh Explanation: In a true mesh topology every node has a connection to every other node in the network. - correct answer Which of the following network topologies describes a network where each node is connected to every other node? A. Bus B. Star C. Mesh D. Ring D. Plenum Explanation: Plenum rated cable has a special insulation that has low smoke and low flame characteristics. Plenum cable is mandated to be installed in any "air handling" space. For example, most large office buildings use the ceiling to return air to the AC unit. This qualifies this ceiling as a plenum ceiling, and all the cables that go through that ceiling must be plenum rated. - correct answer Which of the following cable types is required to run through an air duct? A. UTP B. Fiber 80 allows for 90metres of solid-core permanent wiring, two connectors and two stranded patch cables of 5metres, one at each end. - correct answer A technician notices a newly installed CAT5 cable is longer than the standard maximum length. Which of the following problems would this MOST likely cause? A. Split cable B. EMI C. DB loss D. Crosstalk C. Broadband over powerline Explanation: Internet access service through existing power lines is often marketed as broadband over power lines (BPL), also known as power-line Internet or powerband. A computer (or any other device) would need only to plug a BPL modem into any outlet in an equipped building to have high-speed Internet access - correct answer Which of the following could be installed to allow a home user with one desktop computer to economically have Internet access in every room in the house? A. Fiber optic B. CAT6 C. Broadband over powerline D. CAT5 D. n Explanation: 81 802.11n uses multiple antennas to increase data rates - correct answer Which of the following 802.11 standards transmits the signals the GREATEST distance? A. a B. b C. g D. n C. Multimode Explanation: Multi-mode optical fiber is a type of optical fiber mostly used for communication over short distances, such as within a building or on a campus. Typical multimode links have data rates of 10 Mbit/s to 10 Gbit/s over link lengths of up to 600 meters (2000 feet) and 10 Gbit/s for 300m (1000 feet) — more than sufficient for the majority of premises applications. - correct answer Which of the following fiber types is MOST often used indoors? A. Plenum B. Modal conditioning C. Multimode D. Singlemode D. Cable certifier Explanation: A cable certifier is an electronic device used to verify the source of electric current, voltage and a switching matrix used to connect the current source and the volt meter to all of the contact points in a cable. - correct answer Users are reporting wired connectivity drops in a new office with brand new CAT6 infrastructure. 82 Which of the following tools should a technician use to BEST troubleshoot this issue? A. OTDR B. Protocol analyzer C. Toner probe D. Cable certifier A. A Explanation: 802.11a standard uses the same core protocol as the original standard, operates in 5 GHz band, and uses a 52-subcarrier orthogonal frequency-division multiplexing (OFDM) with a maximum raw data rate of 54 Mbit/s, which yields realistic net achievable throughput in the mid-20 Mbit/s. The data rate is reduced to 48, 36, 24, 18, 12, 9 then 6 Mbit/s if required. - correct answer Which of the following wireless technologies only uses the 5GHz spectrum but reaches a theoretical throughput of only 54Mbps? A. A B. B C. G D. N C. Satellite Explanation: Because satellites provide a microwave radio relay technology complementary to that of communication cables. They are also used for mobile applications such as communications to ships, vehicles, planes and hand-held terminals, and for TV and radio broadcasting. - correct answer Which of the following WAN technology types has the GREATEST latency? A. ISDN B. Fiber 85 D. Crimper E. Cable tester Explanation: A cable tester is an electronic device used to verify the source of electric current, voltage and a switching matrix used to connect the current source and the volt meter to all of the contact points in a cable. - correct answer A newly hired technician is sent to an alternate site to complete the build out of large scale LAN. Which of the following tools should the technician have on hand to install the bulk CAT6 cable? (Select TWO). A. Loopback plug B. Multimeter C. OTDR D. Crimper E. Cable tester F. TDR D. 2.4Ghz F. 5Ghz Explanation: 802.11n is an amendment which improves upon the previous 802.11 standards by adding multiple-input multiple-output antennas (MIMO). 802.11n operates on both the 2.4 GHz and the lesser used 5 GHz bands - correct answer 802.11n can operate at which of the following frequencies? (Select TWO). A. 2.4Mhz B. 2.5Mhz 86 C. 5Mhz D. 2.4Ghz E. 2.5Ghz F. 5Ghz A. LC F. SC Explanation: A variety of optical fiber connectors are available, but SC and LC connectors are the most common types of connectors on the market.[citation needed] Typical connectors are rated for 500-1,000 mating cycles. The main differences among types of connectors are dimensions and methods of mechanical coupling. Generally, organizations will standardize on one kind of connector, depending on what equipment they commonly use. Different connectors are required for multi-mode, and for single-mode fibers - correct answer Which of the following connector types are used in terminating singlemode fiber cables? (Select TWO). A. LC B. F-connector C. DB-9 D. BNC E. RJ-11 F. SC C. Singlemode Explanation: 87 Single-mode optical fiber (SMF) is an optical fiber designed to carry only a single ray of light (mode). These modes define the way the wave travels through space, i.e. how the wave is distributed in space. - correct answer Which of the following cable types supports the FURTHEST distance when connecting various MDFs? A. Multimode B. UTP C. Singlemode D. CAT6 A. Media converter Explanation: Media converters support many different data communication protocols including Ethernet, Fast Ethernet, Gigabit Ethernet, T1/E1/J1, DS3/E3, as well as multiple cabling types such as coax, twisted pair, multi-mode and single-mode fiber optics. - correct answer Which of the following would be used to connect a singlemode fiber cable to a CAT6 connection? A. Media converter B. T1-crossover C. Multimode cable D. Coaxial D. The wired network should be run with at least CAT6 cabling. Explanation: 90 in structured cabling for computer networks such as Ethernet. The cable standard provides performance of up to 100 MHz and is suitable for 10BASE-T, 100BASE-TX (Fast Ethernet), and 1000BASE-T (Gigabit Ethernet). - correct answer Which of the following is the MAXIMUM potential speed of CAT5e UTP cable? A. 10BaseT B. 100BaseT C. 100BaseFX D. 1000BaseT B. Use a wireless controller Explanation: A wireless controller is used in combination with the Lightweight Access Point Protocol (LWAPP) to manage light-weight access points in large quantities by the network administrator or network operations center. The wireless LAN controller is part of the Data Plane within the Cisco Wireless Model. The WLAN controller automatically handles the configuration of anywhere from 6 to 6000 wireless access-points, depending on the model. - correct answer A network administrator is deploying a new wireless network with over 50 thin WAPs and needs to ensure all WAPs use consistent firmware and settings. Which of the following methods provides this functionality? A. Use WAP auto-configuration B. Use a wireless controller C. Use PXE to load and track WAPs D. Use DHCP scope options A. Toner Explanation: Toner® connects to any voice, data, or video cable to detect open/short circuits, continuity, AC/DC voltage* and dial tone* all while protecting up to 52 volt. - correct answer While preparing to replace an old CAT3 cable with a CAT6 cable to implement VoIP, a facilities 91 employee mistakenly disconnects the entire patch panel, including valid wiring to live workstations. Which of the following should an administrator use in order to connect those ports FIRST? A. Toner B. Multimeter C. Reflectometer D. Cable tester B. CDMA Explanation: CDMA is an example of multiple access, which is where several transmitters can send information simultaneously over a single communication channel. This allows several users to share a band of frequencies (see bandwidth). To permit this to be achieved without undue interference between the users CDMA employs spread-spectrum technology and a special coding scheme. - correct answer Which of the following technologies is used on cellular networks? A. Ethernet B. CDMA C. CSMA/CA D. POTS B. VPN Explanation: VPN enables a computer to send and receive data across shared or public networks as if it were directly connected to the private network, while benefiting from the functionality, security and management policies of the private network. This is done by establishing a virtual point-to-point connection through the use of dedicated connections, encryption, or a combination of the two. - correct answer Which of the following technologies allows multiple staff members to connect back to a centralized office? 92 A. Peer to Peer B. VPN C. PKI D. VLAN C. PSTN Explanation: The PSTN consists of telephone lines, fiber optic cables, microwave transmission links, cellular networks, communications satellites, and undersea telephone cables, all interconnected by switching centers, thus allowing any telephone in the world to communicate with any other. - correct answer Which of the following technologies is used to connect public networks using POTS lines? A. OC3 B. OC12 C. PSTN D. Cable C. PoE Explanation: PoE provides both data and power connections in one cable, so equipment doesn't require a separate cable for each need. - correct answer An administrator needs to install a WAP in a location where there is no electrical wiring. Which of the following should the administrator use to complete a successful installation? A. Coaxial B. Wireless bridge C. PoE D. Multimode fiber - correct answer Drag and drop the fiber cable connection types to the appropriate image. 95 D. ipconfig A. Change management Explanation: Change management is the request for to change any configuration which is documented. - correct answer Joe, a network technician, is troubleshooting in a wiring closet in 2011. The cabling to all the equipment does not match the documentation from 2007. Which of the following configuration management methods has been overlooked? A. Change management B. System logs C. Asset management D. Baselining C. Establish a theory of probable cause. Explanation: By sorting out the probable causes and establishing a theorey on them he will come to know wheather it is right cause or not. - correct answer After a technician has identified the problem and its impact, which of the following steps should be performed NEXT? A. Implement preventative measures. B. Establish a plan of action to resolve the problem. C. Establish a theory of probable cause. D. Implement the solution or escalate as necessary. C. Unified communications 96 Explanation: In unified communication video,voice,data have only one end gateway so to give priority to avoid delay in voice and video we use Qos. - correct answer Which of the following reasons would MOST likely be used to implement QoS and traffic shaping solutions? A. Redundancy B. Fault tolerance C. Unified communications D. Uptime requirements D. Document findings Explanation: As to prove the cause of problem documents need to be attached so document finding is the first step after we implemented and diagnosed that problem. - correct answer Ann, a network technician, has been troubleshooting a connectivity problem in the LAN room. Ann has diagnosed the problem and implemented a solution. Which of the following would be the NEXT step? A. Test the theory B. Establish a plan of action C. Establish a theory D. Document findings C. Establish a theory Explanation: Establish a theory means to correlate the finding and cause of a problem in order to fix the problem. - correct answer A network technician is troubleshooting a user's connectivity problem, and has determined a probable cause. The technician is at which step in the troubleshooting methodology? 97 A. Verify full system functionality B. Identify the problem C. Establish a theory D. Implement the solution B. Quality of service Explanation: In unified communication video, voice, data have only one end gateway so to give priority to avoid delay in voice and video we use Qos. - correct answer In a SOHO environment, placing a VoIP unit on the outside edge of a LAN router enhances which of the following network optimization methods? A. Load balancing B. Quality of service C. Fault tolerance D. Traffic shaping A. Change management Explanation: As soon as technician found a problem he generates a change management request to make changes to fast up the speed of router. - correct answer A technician decides to upgrade a router before leaving for vacation. While away, users begin to report slow performance. Which of the following practices allows other technicians to quickly return the network to normal speeds? A. Change management B. Baselines C. Asset management