Network Topologies, Protocols, and Configuration Part 1
This flashcard set covers key networking concepts including physical and logical topologies, protocols for connecting branch offices, wireless communication methods, virtualization components, and types of internet connections. It helps reinforce foundational networking knowledge for IT professionals and students.
An engineer for a large firm documents the internal computer network. A diagram the engineer creates shows a top-down view of the Ethernet infrastructure in a hub and spoke layout. While considering the physical and logical topologies of the network, determine which choices qualify. (Select all that apply.)
a) LAN
b) Bus
c) Ring
d) Star
b) Bus
d) Star
-A star topology is a physical network design in which each node is connected to a central point. A star network is also referred to as a hub and spoke network.
Key Terms
An engineer for a large firm documents the internal computer network. A diagram the engineer creates shows a top-down view of the Ethernet infrastructure in a hub and spoke layout. While considering the physical and logical topologies of the network, determine which choices qualify. (Select all that apply.)
a) LAN
b) Bus
c) Ring
d) Star
b) Bus
d) Star
-A star topology is a physical network design in which each node is connected to a central poin...
An engineer begins the installation of a network for a new business. Ethernet cables run from desktop locations to a centralized patch panel in a data closet where a hub is placed until a new switch arrives. Evaluate the engineer's configuration, and conclude which types of physical and logical topologies the engineer implements. (Select all that apply.)
a) Star
b) Ring
c) LAN
d) Bus
a) Star
d) Bus
<...A network administrator is creating a plan for connecting multiple branch locations to the main database located in the headquarters. Which protocols can the administrator use to accomplish this link? (Select all that apply.)
a) MPLS
b) vNIC
c) mGRE
d) NFV
a) MPLS
c) mGRE
...A wireless access point is available on the floor for wireless users in the area. User 1 wants to send a file to user 2 using their laptop's wireless adapters. Which of the following is the most secure way of sending files to one another using their current wireless adapters?
a) Using an infrastructure connection
b) Using an ad hoc connection
c) Using a wireless mesh network
d) Using a bus network connection
b) Using an ad hoc connection
-ad ho...
A server administrator is adding a new Network Interface Card (NIC) to a virtual machine. What should the administrator modify to add the new NIC to the virtual machine?
a) Hypervisor
b) WAN
c) SD-WAN
d) Demarcation point
a) Hypervisor
-In a virtualization h...
An organization has asked a network engineer to suggest a type of connection the new office space will require. The chief executive officer (CEO) tells the engineer the organization wants a dedicated T1 line not slowed down by other businesses or Internet Service Provider (ISP) customers. What type of connection has the CEO described to the engineer?
a) Satellite
b) Demarcation point
c) Digital subscriber line (DSL)
d) Leased line
d) Leased line
-For leased line data...
Related Flashcard Decks
Study Tips
- Press F to enter focus mode for distraction-free studying
- Review cards regularly to improve retention
- Try to recall the answer before flipping the card
- Share this deck with friends to study together
| Term | Definition |
|---|---|
An engineer for a large firm documents the internal computer network. A diagram the engineer creates shows a top-down view of the Ethernet infrastructure in a hub and spoke layout. While considering the physical and logical topologies of the network, determine which choices qualify. (Select all that apply.) | b) Bus |
An engineer begins the installation of a network for a new business. Ethernet cables run from desktop locations to a centralized patch panel in a data closet where a hub is placed until a new switch arrives. Evaluate the engineer's configuration, and conclude which types of physical and logical topologies the engineer implements. (Select all that apply.) | a) Star d) Bus -A star topology is a physical network design in which each node is connected to a central point. A star network is also referred to as a hub and spoke network. |
A network administrator is creating a plan for connecting multiple branch locations to the main database located in the headquarters. Which protocols can the administrator use to accomplish this link? (Select all that apply.) | a) MPLS c) mGRE -Multipoint Generic Routing Encapsulation (mGRE) is a version of the Generic Routing Encapsulation (GRE) protocol that supports point-to-multipoint links, such as the hub and spoke dynamic multipoint VPN. -MPLS or Multiprotocol Label Switching (MPLS) can operate as an overlay network to configure point-to-point or point-to-multipoint links between nodes. |
A wireless access point is available on the floor for wireless users in the area. User 1 wants to send a file to user 2 using their laptop's wireless adapters. Which of the following is the most secure way of sending files to one another using their current wireless adapters? | b) Using an ad hoc connection -ad hoc means when necessary or needed. |
A server administrator is adding a new Network Interface Card (NIC) to a virtual machine. What should the administrator modify to add the new NIC to the virtual machine? | a) Hypervisor -In a virtualization host, the hypervisor—or virtual machine monitor (VMM)—manages the virtual environment and facilitates interaction with the computer hardware and network. |
An organization has asked a network engineer to suggest a type of connection the new office space will require. The chief executive officer (CEO) tells the engineer the organization wants a dedicated T1 line not slowed down by other businesses or Internet Service Provider (ISP) customers. What type of connection has the CEO described to the engineer? | d) Leased line -For leased line data services, the foundation level of the T-carrier is the DS1 or T1 digital signal circuit. This service comprises 24 channels multiplexed into a single 1.544 Mbps full duplex digital connection used for voice and data. The engineer can multiplex the T1 lines themselves to provide even more bandwidth. |
A server technician is shopping for new storage for data on the business network. The storage requirement has risen over the last year, and the servers currently have limited space. What is an option for the technician to purchase to increase the available storage on the local network? | c) SAN -A storage area network (SAN) provisions access to storage devices at the block level. A SAN is isolated from the main network. It is only accessed by servers, not by client PCs and laptops. |
Which of the following topologies is a network of two or more nodes that shares access to the network, but only one node can be active at any one time? | a) Bus -In a bus topology with more than two nodes, they all share access and bandwidth of the media. Only one node can be active at any one time. So, the nodes must contend to put signals on the media. |
A wireless access point is available on the floor for wireless users in the area. User 1 wants to send a file to user 2 using their laptop's wireless adapters. Which of the following is the most secure way of sending files to one another using their current wireless adapters? | a) Using an ad hoc connection -In an ad hoc topology, the wireless adapter allows connections to and from other devices. This makes it possible for two laptops to connect directly with each other wirelessly. This is also referred to as an Independent Basic Service Set (IBSS). |
A tech configures a network to use an E-lines service. Compare and evaluate the choices to determine which network type the tech configures. | a) MAN -A metropolitan area network (MAN) is a network that covers an area equivalent to a municipality. A MAN uses a service category such as an E-line, which establishes a point-to-point link or an E-LAN, which establishes a mesh topology. |
A college is upgrading their high-speed network infrastructure to support direct-connect Internet in all student buildings and dormitories. The network will connect to high-performing school servers that will provide computer lab environments for classes. What type of network is the school continuing to maintain? | d) CAN -The term campus area network (CAN) is sometimes used for a LAN that spans multiple nearby buildings. This high-speed network can connect directly with all students in all the buildings and dormitories. |
An engineer troubleshoots a network connectivity issue that the server team reported. The engineer notices that the trunk port is down between two routers. After checking the fiber link on the router, the engineer moves the cable and notices that the link light comes on. The issue is MOST likely a part of what layer of the OSI model? a) Physical layer b) Network layer c) Session layer d) Data link layer | a) Physical layer -The physical layer of the OSI model is responsible for the transmission and receipt of the signals that represent bits of data from one node to another node. |
Network layer | The network layer is responsible for moving data around a network of networks, known as an internetwork or the Internet. 3rd layer of the OSI model. |
Data Link Layer | 2nd layer of the OSI model. |
Session layer | The fifth layer in the OSI model. This layer establishes and maintains communication between two nodes on the network. It can be considered the "traffic cop" for network communications. -The session layer represents functions that administer the process of establishing a dialog, managing data transfer, and then ending (or tearing down) the session. -Most application protocols require the exchange of multiple messages between the client and server. This exchange of such a sequence of messages is called a session, thus, the Session layer. Sessions can work in three modes: simplex, half-duplex, or duplex. |
An organization has asked a network administrator to research and submit a purchase order for new network access points. The network administrator is attempting to choose between using wired and wireless access points. Which layer of the OSI model is the administrator making a decision? | a) Physical layer |
A network administrator is reviewing some packets flagged by the Intrusion Detection System (IDS). The administrator notices that the packets are ping packets, but the size of the packets is much larger than expected. What is the MOST likely cause of the oversized packets? | c) Modified payload. |
A network administrator is looking at an ARP table on a switch for connected devices. Which Open Systems Interconnection (OSI) layer are they looking at? | a) Data link -The Data Link layer (layer 2) transfers data between nodes on the same logical segment. This is where ARP tables are located. |
An engineer is building a backbone network in a new facility. The cabling going from one side of the building to the other is about 500 feet and will support a 5Gbps link between two routers. Which type of cabling should the engineer use? | c) 10GBASE-SR -A 10GBASE-SR is a fiber Ethernet standard best suited to implementing backbone cabling that does not exceed 200 m (656 feet) and can achieve at least 4 Gbps throughput. |
An engineer creates several Ethernet cables and chooses to use the widely deployed pinout standard when terminating the cable ends. Considering the standard choices, which of the following does the engineer choose to implement? | b) TIA/EIA 568b -There are two defined methods for terminating Ethernet connectors: T568A and T568B. While T568A is mandated, T568B is the more widely deployed of the two. |
A technician finishes running fiber optic cable across a large building to expand the internal network. The fiber connects to equipment in a rack with extremely limited space for a connector. Considering the situation and the types of available fiber connectors, which one will accomplish connectivity? | d) LC -A local connector (LC) is a small form factor version of the SC push-pull fiber optic connector. It is available in simplex and duplex versions. SFP+ use the LC form factor but run at speeds of 10Gb. |
subscriber connector (SC) | A fiber-optic cable connector that snaps and locks into place. |
Angled Physical Contact (APC) | Fiber-optic connector that makes physical contact between two fiber-optic cables. It specifies an 8-degree angle to the curved end, lowering signal loss. APC connectors have less connection degradation from multiple insertions compared to other connectors. -These connectors are usually deployed when the fiber is being used to carry analog signaling, as in cable access TV (CATV) networks. |
Ultra Physical Contact (UPC) Connector | Fiber-optic connector that makes physical contact between to two fiber-optic cables. The fibers within a UPC are polished extensively for a superior finish and better junction integrity. |
A server administrator has asked a junior network engineer to build a link between the server and the new SAN that the administrator just installed. The speed requirements for the link are more than 20Gbps, and the distance is about 20 feet. What medium should the network engineer use to build the required link? | b) 40GBASE-T -A 40GBASE-T refers to Gigabit Ethernet working over Cat 8 shielded cable with speeds up to 40 Gbps and a distance of 30 meters. |
A technician finishes running fiber optic cable across a large building to expand the internal network. The fiber connects to equipment in a rack with extremely limited space for a connector. Considering the situation and the types of available fiber connectors, which one will accomplish connectivity? | b) LC -A local connector (LC) is a small form factor version of the SC push-pull fiber optic connector. It is available in simplex and duplex versions. SFP+ use the LC form factor but run at speeds of 10Gb. |
A technician is building a new network link between a switch and a router. The switch only has ethernet ports, while the router only has fiber ports. What could the technician utilize to connect these two devices? | d) Transceiver/media converter -Enterprise switches and routers are available with modular, hot-swappable transceivers/media converters for different types of fiber optic patch cord connections. These allow connections between ethernet and fiber networks. -Permanent cables run through conduit to wall ports at the client access end and a fiber distribution panel at the switch end. Fiber patch cables complete the link from the wall port to the NIC and from the patch panel to the switch port. |
An engineer has installed a new router but is not connected to the core network yet. What type of connector should the engineer install to get the requested throughput of 30Gbps or more? | b) Enhanced quad small form-factor pluggable (QSFP+) -QSFP+ supports 40 GbE by provisioning 4 x 10 Gbps links. |
An engineer has a task to survey an old building and determine the current network infrastructure. Building owners state that some cabling is from a recent install. The engineer achieves a speed of 10 Gbps while testing the cable up to 100 meters and also determines the cable to be well shielded. Based on the engineer's findings, the cabling meets what specification? | c) Cat 7 |
A network technician is installing a new ethernet receptacle using a punch tool. Which blade type can the technician utilize to terminate the wires onto the punch block? | d) 110 -Technicians mostly use 110 format punch blocks for LAN technology and RJ-45 connections. They have a set blade on one end of the punch tool. |
A network engineer is troubleshooting an ethernet connection between two buildings. The engineer noticed that the network devices got upgraded, but the wiring did not. The engineer needs a connection that can handle 10Gbps at 500 MHz for a distance of 300 feet using RJ-45 connectors. What type of ethernet should the engineer replace the Cat 5 with to meet the connection standard? | b) Cat 6a -Cat 6A is an improved specification cable that can support 10 Gbps over 100 m. RJ-45 connectors terminate the Cat 6A cable. If the connectors didn't exist, it's not possible to achieve the distance of 300m. |
A network installer is building a long-distance link. The nodes are approximately 10 km apart. What type of fiber link should the installer build for this link? | b) 1000BASE-LX -The 1000BASE-LX is a Gigabit Ethernet standard and supports 1 Gbps and a distance of 10 km using single mode fiber. |
A network installer is installing new phone lines into the network room. The installer has many blades for the punch down panels in the building and needs a blade that is customizable on one end. Which blade should the installer use that has a customizable blade on one end of the punch tool? | d) Bix -BIX panels are rare but still used. The blades for these panels are adjustable on one end of the punch tool. They are similar to a 110 punch tool but are adjustable. |
An IT engineer chooses to use a fiber cable implementation that uses light emitting diode (LED) technology rather than one that uses lasers. Considering the optic technology in use, what does the engineer implement? | c) Multimode -Multimode fiber is inexpensive to deploy compared to single-mode fiber. As such, it does not support long distances as single-mode. Multimode uses light emitting diode (LED) technology. |
An organization has asked a junior network technician to retrieve some swappable ports that host a single LC connection per port. Since there are numerous inserts for network devices, which should the technician retrieve? | a) SFP -Also designed for Gigabit Ethernet, the small form-factor pluggable (SFP) uses local connectors (LCs). Gigabit Interface Converter (GBIC) was very bulky and largely replaced by SFP, also known as mini-GBIC. |
An engineer is installing a new connection between two database stacks. The engineer is using copper cable and needs a connection speed of 40GbE with a distance of about 12 feet. Which medium should the engineer utilize for this link? | d) Twinaxial -Twinax is for data center 10 GbE (unofficially referred to as 10GBASE-CR) and 40 GbE (40GBASE-CR4) interconnections of up to about 5 meters for passive cable types and 10 meters for active cable types. -Ethernet over Fiber uses the IEEE 802.3 10GBASE-LR and 10GBASE-ER specifications. |
All client machines configured for DHCP are up and running without issue. However, the clients not configured for IPv4 are not getting IP addresses. What should the server administrator configure so the IPv6 clients can receive automatic address configuration as well? | c) SLAAC -IPv4 depends heavily on the DHCP for address autoconfiguration. IPv6 uses a more flexible system of address autoconfiguration called the stateless address autoconfiguration (SLAAC). |
The DHCP server is offline and the server team is working on re-building corrupted scope information. The team notices that some clients have not had any issues since the DHCP server went down. After investigating the operational client machines, the team notices that they are all running IPV6. How do IPv6 hosts gain addressing without manual configuration? | c) SLAAC -IPv4 depends heavily on the Dynamic Host Configuration Protocol (DHCP) for address autoconfiguration. IPv6 uses a more flexible system of address autoconfiguration called stateless address autoconfiguration (SLAAC). |
A system sends a message to all link-local nodes via a multicast address. Compare private address types and conclude which address the system will use. | b) ff02:1 -A multicast address identifies multiple network interfaces. Unlike Internet Protocol version 4 (IPv4), Internet Protocol version 6 (IPv6) must support multicast. The first 8 bits indicate the address is within the multicast scope (1111 1111 or ff). The address ff02::1 has a target of all link-local nodes. #Fe80 is for link local addresses. |
What allows a network designer to allocate ranges of Internet Protocol (IP) addresses to subnets that match the predicted need for the number of subnets and hosts per subnet? | d) Variable Length Subnet Masks (VLSMs) -Variable Length Subnet Masks (VLSMs) allows a network designer to allocate ranges of Internet Protocol (IP) addresses to subnets that match the predicted need for numbers of subnets and hosts per subnet. |
Select the Internet Protocol (IP) address that is in the Class B private address range. | d) 172.20.105.003 |
A company has 725 hosts on the network that utilize public Internet Protocol (IP) addresses. The company has three contiguous class C addresses for the hosts. The company implemented Classless Inter-Domain Routing (CIDR) to assist with the maintenance of the three networks. What will CIDR provide to the network? | b) CIDR will use bits normally assigned to the network ID to mask the complexity of the subnet and host address scheme. -The company is using Classless Inter-Domain Routing (CIDR). CIDR uses bits normally assigned to the network ID to mask the complexity of the subnet and host addressing scheme within the network. CIDR collapses the three routing entries into one single entry. |
A new network administrator is going through the company's network and surveying current network configurations. After examining a few hosts, the general Internet Protocol (IP) scheme starts with the first octet at 10 and all are using a default mask of 255.0.0.0. Which of the following would be true for this network? (Select all that apply.) | a) Private IP addressing c) Class A network. -A Class A network can be identified by the first octet being in the range of 1-126. It supports large numbers of hosts over 16 million. -Private IP addresses are used for internal networks. They can be drawn from one of the pools of addresses defined in RFC 1918, or better known as Class A, B, and C private address ranges. |
A small office is utilizing a total of 25 Internet Protocol (IP) addresses to support various workstations and printers. One of the workstations has an IP address of 192.168.10.50. Which of the following are true about this network's subnet? (Select all that apply.) | b) Subnet mask of 255.255.255.224 c) CIDR notation of /27 -IP address 192.169.10.50 is part of the second subnet of the 192.168.10.0 network that is notated as 192.168.10.32/27. It's subnet mask is 255.255.255.224. -The Classless Inter-Domain Routing (CIDR) notation of /27 breaks down the 192.169.10.0 network into multiple sets of 30 usable IP addresses. This will supply enough IP addresses for the office. |
What is the Internet Protocol (IP) address of a router on the same IP network as the host? | a) Default gateway |
A host with a Media Access Control (MAC) of 00:72:8b:31:8b:cb uses a global scope addressing scheme. Compose the MAC-derived address for the Extended Unique Identifier (EUI) 64. | b) 0272:8bff:fe31:8bcb -Globally scoped unicast addresses are routable over the Internet and are the equivalent of public Internet Protocol version 4 (IPv4) addresses. A MAC address is 48 bits and an Extended Unique Identifier (EUI)-64 creates a 64-bit interface (16 bits set of 4) The digits fffe are added in the middle of the address and the Universally Administered (U)/Locally Administered (L) bit is flipped. The proper EUI-64 in this scenario is 0272:8bff:fe31:8bcb. |
A host with a Media Access Control (MAC) of 00:72:8b:31:8b:cb uses a global scope addressing scheme. One identifier for this host is 0272:8bff:fe31:8bcb. Consider Internet Protocol version 6 (IPv6) addressing schemes to determine what this identifier represents. | a) Extended Unique Identifier (EUI) 64 |
A network administrator is setting up a 192.168.1.0/24 network using variable length subnet masking (VLSM) to support the sales and marketing department. The sales department has 120 computers and the marketing department has 50 computers. Which of the following Internet Protocol (IP) address configurations will provide adequate support for the marketing department? (Select all that apply.) | a) 192.168.1.128/26 d) 255.255.255.192 -The 192.168.1.128/26 network provides 62 assignable IP addresses in the range of 192.168.1.129 - 192.168.1.190. This is enough addresses to support the 50 computers of the marketing department. #NOTE: don't forget and out of 64 IP addresses, 1 is for network ID and 1 is for broadcast IP. So, 62 are assignable. |
A new physical web server receives power from and connects to the network in the communications closet. To ensure the server is ready to communicate with users in the various offices of the building, a network administrator verifies network service installation and that the server can communicate with a Layer 3 switch in the same closet. How may the network administrator carry out these tests? (Select all that apply.) | b) Ping the loopback c) Ping the Default Gateway -The loopback address is a reserved address, typically an IPv4 address of 127.0.0.1. It is often used to check that TCP/IP is correctly installed on the local host. -The default gateway is the router. A layer 3 switch can operate on the network layer to route traffic. Pinging the gateway will verify that a path exists to eventually route to other offices. |
A user goes to the website www.shopping.com. A bastion host reviews the request to enter the site to verify the safety of the request. What has the company established to enable clients access to data on the private system without compromising the security of the internal network? | b) Demilitarized Zone (DMZ) -The company is using a Demilitarized Zone (DMZ), also referred to as a perimeter network. The idea of a DMZ is that traffic cannot pass through it directly. If communication is required between hosts on either side of a DMZ, a bastion host will take the request and check it. |
Which port will a Domain Name Server (DNS) use for record transfers over 512 bytes? | b) Transmission Control Protocol (TCP) port 53 -DNS server that needs to allow large record transfers over 512 bytes will be configured to allow connections over TCP port 53. -DNS server is usually configured to listen for queries on UDP port 53. |
Explain how the Simple Authentication and Security Layer (SASL) provides binding in Lightweight Directory Access Protocol Secure (LDAPS). | c) The client and server negotiate the use of a supported security mechanism. -Authentication, referred to as binding to the server, can be implemented in several ways to Lightweight Directory Access Protocol Secure (LDAPS). The Simple Authentication and Security Layer (SASL) completes binding by the client and server negotiating the use of a supported security mechanism. NOTE: if no authentication is used, anonymous access is granted to the directory. Also, need to understand that secure SSL/TLS can be used for this authentication process. |
A Simple Network Management Protocol (SNMP) agent informs the monitor of a port failure. Analyze the functions of an SNMP agent to determine what command the monitor uses for this notification. | d) Trap -The trap command is used when the agent informs the monitor of a notable event, such as a port failure. The threshold for triggering traps can be set for each value. |
A network engineer is troubleshooting interconnectivity between IPv4 hosts and IPv6 hosts. The engineer has found there is a need for a layer three tunneling protocol that can encapsulate different types of IPv6 and IPv4 packets. What type of encapsulation should the engineer enable on the network? | a) GRE -Generic Routing Encapsulation (GRE) Tunneling protocol allows the transmission of encapsulated frames or packets from different types of network protocol over an IP network. -On the other hand, LDAP is not a directory standard but a protocol used to query and update X.500-like directories that operates in port 389. |
What provides additional options, rather than only leases, for host Internet Protocol (IP) addresses? | d) DHCPv6 -IPv6 can locate routers and generate a host address with a suitable network prefix. In this context, the role of a DHCP server in IPv6 is different. DHCPv6 is used to provide additional option settings, rather than leases for host IP addresses. |
Which protocol uses Network Level Authentication (NLA) which requires the client to authenticate before a full remote session starts? | a) Remote Desktop Protocol (RDP) -Key word here is "FULL". RDP provides access to the graphical interface of the client or server, which allows the user to have full control over the RDP software. |
A system administrator for ABC Company receives a request for a new account. A new employee is onboarding and will receive a Voice over Internet Protocol (VoIP) phone. The employee's name is Sam Smith and the phone number will be 1234567890. The company's domain is @abccompany.com. Develop a Session Initiation Protocol (SIP) Uniform Resource Indicator (URI). (Select all that apply.) a) sip:sam.smith@1234567890 b) sip:sam.smith.abccompany.com c) sip:sam.smith@abccompany.com d) sip:123456789.abccompany.com | a) sip:sam.smith@1234567890 c)sip:sam.smith@abccompany.com -Session initiation Protocol (SIP) endpoints are the end-user devices, also known as user agents. In this scenario, the VoIP is the SIP endpoint. One example of an SIP for this VoIP is sip:sam.smith@abccompany.com. This is a unique URI that includes the user's name and the company domain. NOTE: both domain address and the phone number needs to have @. Also, sip:sam (colon) exists on both SIP URI. |
A network administrator is monitoring network traffic and notices a severe spike on port 993. Which protocol is causing the spike in network traffic? | d) IMAP over SSL -POP3 over SSL port number is 995. -POP3 port number is 110 and IMAP port number is 143. -SMTP port number is 25. |
A router downloads configuration files over User Datagram Protocol (UDP) port 69. The router does not have access to browse the directory or to delete files. Analyze File Transfer Protocols (FTPs) and determine what protocol the router is using. | a) Trivial File Transfer Protocol (TFTP) |
Which protocol allows for a protected dialog between the client and server by assigning the web server a digital certificate issued by a Certificate Authority? | b) Hypertext Transfer Protocol Secure (HTTPS) -HTTPS is a subset of HTTP that allows for a secure dialog between the client and server using SSL/TLS. To implement HTTPS, the web server is assigned a digital certificate by a trusted certificate authority (CA). -SSL/TLS works as a layer between the Application and Transport layers of the Transmission Control Protocol/Internet Protocol (TCP/IP) stack. It is normally used to encrypt TCP connections. |
Which delivery method and protocol may send data out of order and over different paths? (Select all that apply.) | a) Connectionless d) UDP |
After plugging a cable into a computer, a user reports there is no network access. Which of the following tools would the technician most likely check to verify that the cable was crimped correctly? | d) Cable certifier -A cable certifier is used to verify that a cable meets it's specifications, such as the bandwidth and frequency. For e.g: it can verify a CAT 5e cable meets specifications and supports speeds of 1000Mbps, and can verify a CAT 6 cable supports speeds of 10 Gbps. NOTE: CAT 6 cable supports speeds of up to 10 Gbps but distance of up to 55 meters only. CAT 6a cable supports speed of up to 10 Gbps and distance of up to 100 meters. -A loopback plug is a connector used for diagnosing transmission problems on parallel and serial ports. It plugs into a port on the back of the computer. |
A physical server has been plugged in, powered on, and networked into the communication closet. Using a KVM (key, video, mouse) device, the network technician notices there is no network connectivity. Examining the back of the server, the LED status indicators for the port are off. After identifying the issue, which course of action should take place next? | b) Step 1. Test the theory Step 2. Implement a solution Step 3. |
A network engineer troubleshoots an issue where clients are not receiving IP addresses from a new, properly configured DHCP server on another subnet. Statically addressed clients can get onto the same network with no issues. Which of the following is causing the issue? | c) Missing helper addresses #DHCP IP Helper addresses are configured on a routed interface that allows that specific device to act as a “middle man,” which forwards Broadcast DHCP to the DHCP server. -VLAN tagging is a method through which more than one VLAN is handled on a port. IT is used to tell which packet belongs to which VLAN. |
In the situation where default gateway is configured incorrectly, what happens to the PC? | If the PC is configured with an incorrect default gateway, the PC will attempt to forward to what is configured and arp for the address that is configured. |
A technician tries to duplicate a reported problem on a user's computer. Which of the following troubleshooting steps is the technician's focus? | b) Problem identification -It is important to take enough time to determine what has caused a problem. Identifying the problem includes a variety of steps that help to understand what is and is not working. This includes interviewing users and identifying symptoms for a diagnosis. |
A manager has reported a network outage at a remote branch office. After gathering some information and asking the manager and local IT personnel about the issue, a theory of probable cause cannot be established. Consider and determine what else the network support personnel can do to eventually resolve the issue? (Select all that apply.) | b) Look at system logs d) Verify LED status indicators. -Looking at system logs on the switch or the affected servers will show symptoms of the outage. For e.g: If servers cannot communicate with FQDN (Fully Qualified Domain Name) but are able to ping IP addresses, then the issue may be DNS (Domain Name System) related. -Verify LED status indicators on the network ports will help determine if anything has changed physically. If there is no link light, the port or the cable may be damaged. NOTE: Verification is key here, except when it comes to the verification of the full system functionality. Full system functionality verification come after a solution has been implemented. |
A technician tries the suggested troubleshooting steps to remedy a computer issue. The steps do not fix the problem. Additional suggestions are at a support website that discuss a different cause and potential fix for the problem. What troubleshooting path should the technician follow? | a) If the theory is not confirmed, reestablish a new theory or escalate. -Often problems may have several different possible causes. When a theory is not confirmed, the next in line can be considered. Escalation means referring the problem to a more knowledgeable entity such as senior technician, manager, or 3rd party. |
A user calls to report that email is not working and that there is a printer jam. Which troubleshooting approach is best? a) Establish a theory of probable cause. b) Divide and conquer. c) Implement the solution or escalate as necessary. d) Approach multiple problems individually. | d) Approach multiple problems individually. -Discovering symptoms of more than one problem is common. When problems do not seem to be related, it is best to treat each issue as a separate case. NOTE: Approach multiple problems individually is the 1st step (identify the problem), of the 7 steps of the troubleshooting. |
When considering a troubleshooting methodology, which of the following topics concern finding a problem? (Select all that apply.) | a) Duplicate the problem, if possible c) Identify symptoms d) Gather information -Except for the "Question the Obvious", rest of them are the step 1 or "Identify the problem" section. -It is important to take enough time to determine what caused the problem so that a recurrence can be avoided. Gathering information is an important 1st step in identifying the problem. -When troubleshooting an issue, it is important to identify symptoms. Doing so goes hand-in-hand with gathering information to identify the problem. -If possible, duplicating the problem is helpful when gathering information about the issue. This includes trying to take the same steps as the user. |
In the OSI model, physical addressing takes place at which layer? | b) Data Link Layer -The data link layer is responsible for the node-to-node delivery of the message. When a packet arrives in a network, it is the responsibility of DLL to transmit it to the host using its MAC address. Physical address is MAC address that identifies a device to other devices on the same local network. IP address identifies the device globally. And a network packet needs both addresses to get to it's destination. |
An administrator has just finished installing a new switch and connected two servers with IPs of 192.168.105.20 and .30. The servers can communicate with each other but are unable to reach the Internet. What information does the admin see in the switch configuration? | b) The server is missing default-gateway information -The default gateway is the path used to pass information when the device does not know where the destination is. It is a router that connects the host to remote network segments. |
A newly deployed stack with servers, network switches, a KVM (Key, Video, Mouse), storage unit, and uninterruptible power supplies has just been fully cabled. After powering on the stack, there seems to be a network connectivity issue between the switch and servers. What is the best approach when trying to resolve this type of network issue? | c) Bottom-to-top -A bottom-to-top approach of the OSI (Open System Interconnection) model is a methodical validation of network components starting from the bottom or layer 1 (Physical) and going up. This is most appropriate because cables have just been connected. -For "divide and conquer" approach, it starts with the layer most likely to be causing the problem, then work either down or up depending on the test results. NOTE: bottom-to-top, top-to-bottom, divide and conquer are all "step 2" (establish a theory of probable cause) of the 7 steps of the troubleshooting process. |
A system that contains custom applications routinely crashes. IT decides to upgrade the operating system after speaking with application support personnel. In which of the following ways should IT troubleshoot the matter? | a) Establish a plan of action to resolve the problem and identify potential effects. -Establishing a plan of action such as a maintenance window or scheduled down time to fix an issue is best practice. Researching impacts of any fixes should also be considered. |
A user took a laptop on vacation and made changes to the configuration in order to use the device at the hotel. The user can reach the Internet, but cannot access any internal network resources. Which of the following is the most likely reason? | b) Incorrect DNS -DNS servers translate domain names into IP addresses, making it possible for DNS clients to reach the origin server. It is the phonebook of the internet, connecting web browsers with websites. Having an incorrect DNS would case issues connecting to internal resources as described. -Subnet mask separates IP addresses into network and host addresses. |
Which of the following would a technician find in a network map? | c) MDF/IDFs -MDF stands for Main Distribution Frame and IDF stands for Independent Distribution Frame. |
The admin can ping the router at 192.168.105.1 from the switch. Which of the following is the most likely cause of the problem? (Select all that apply.) | c) Implement preventive measures. d) Verify full system functionality. -Verifying full system functionality is useful to identify the results and effects of a solution. Having a user try to recreate the issue after a fix is a good test. -Implementing preventive measures helps to protect a system from future issues. For e.g: antivirus software can be installed and updated to prevent a virus infection or user rights can be modified to protect system resources, files and applications from being deleted or tampered with. |
A technician determines that a faulty network connection caused a system error. Which logical approach allows for methodical steps to diagnosing the cause? | a) OSI (Open Systems Interconnection) reference model guidance |
A cable installer configures the insulation-displacement connection (IDC) terminals on a patch panel; what tool will the installer need for the cabling? | a) Punchdown tool -A punchdown tool has replaceable blades and fixes conductors into an IDC. Different IDC formats require different blades on the punchdown tool. -Insulation-displacement connection is also known as insulation-piercing contact (IPC). #IDC or IPC is an electrical connector designed to be connected to the conductor(s) of an insulated cable by a connection process which forces a selectively sharpened blade or blades through the insulation, bypassing the need to strip the conductors of insulation before connecting. |
A server has stopped communicating on the network, and the administrator suspects the network interface card (NIC) or the switch port may be bad. What tools can the administrator use to verify? (Select all that apply.) | a) LED status indicators d) Loopback adapter -A network loopback adapter (or loopback plug) is a specially wired RJ-45 plug with a 6" stub of cable that sends the packet back to itself to test for bad ports and network cards. -LED status indicators are link lights located on the NIC at one end and the switch/router port at the other and indicate the device's status. |