Network Topologies, Protocols, and Configuration Part 3
This flashcard set covers key networking concepts including physical and logical topologies, protocols for connecting branch offices, wireless communication methods, virtualization components, and types of internet connections.
An administrator is using existing cabling to supply power to PoE switches. When an administrator plugs a device into the switch port, the PoE switch will determine the device's power consumption and set the supply voltage level appropriately. What is the lowest standard of cabling that the PoE switches can operate on with the most efficiency? (Select all that apply.)
a) Cat 3 cable or better
b) Unshielded cabling
c) Shielded cabling
d) Cat 5e cable or better.
a) Cat 3 cable or better
c) Shielded cabling
-PoE requires Cat 3 cable or better while PoE+ must use Cat 5e cable or better. Drawing power down the cable generates more heat that can adversely affect data rates.
-PoE should use shielded cabling as it is capable of dispersing heat more efficiently than unshielded cabling.
Key Terms
An administrator is using existing cabling to supply power to PoE switches. When an administrator plugs a device into the switch port, the PoE switch will determine the device's power consumption and set the supply voltage level appropriately. What is the lowest standard of cabling that the PoE switches can operate on with the most efficiency? (Select all that apply.)
a) Cat 3 cable or better
b) Unshielded cabling
c) Shielded cabling
d) Cat 5e cable or better.
a) Cat 3 cable or better
c) Shielded cabling
A cable installer is using a special tool to affix an RJ-45 connector to an Ethernet cable. What tool has this purpose?
a) Punchdown tool
b) Cable crimper
c) Snips
d) Fusion splicer
b) Cable crimper
-A cable crimper cr...
An administrator manually configured a server's network interface card (NIC) settings to run at 100Mbps and connected the server to the switch. However, communications between the server and other hosts on the network were extremely slow. When the administrator checked the light on the server's switch port, it was blinking amber. What kind of issue does this indicate?
a) Shielded cable issue
b) Duplexing issue
c) Short issue
d) Transceiver issue
b) Duplexing issue
-Setting ...
b) Duplexing issue
-Setting both a NIC and switch port to auto-negotiate will solve a duplex mismatch which will slow the link down by causing high packet loss and late collisions.
-A short happens when two conductors join, usually because the insulating wire is damaged or poorly wired connectors.
a) Decibels
-Decibels (dB) express a...
A fiber optic cable is experiencing significant signal loss. Which of the following items should the engineer investigate to determine the cause? (Select all that apply.)
a) Incorrect transceivers
b) Dirty optical cables
c) Mismatched coupled cables
d) Electromagnetic interference
a) Incorrect transceivers
b) Dirty optical cables
...Computers connected to a network in a new building are experiencing slow network speeds. An administrator is troubleshooting the issue and sees that the new building uses the plenum space for the ethernet cable runs. How could this cause slow network speeds?
a) By reversing the transmit and receive
b) By causing a short
c) By causing an open
d) By causing interference
d) By causing interference
-nstaller...
Related Flashcard Decks
Study Tips
- Press F to enter focus mode for distraction-free studying
- Review cards regularly to improve retention
- Try to recall the answer before flipping the card
- Share this deck with friends to study together
| Term | Definition |
|---|---|
An administrator is using existing cabling to supply power to PoE switches. When an administrator plugs a device into the switch port, the PoE switch will determine the device's power consumption and set the supply voltage level appropriately. What is the lowest standard of cabling that the PoE switches can operate on with the most efficiency? (Select all that apply.) a) Cat 3 cable or better b) Unshielded cabling c) Shielded cabling d) Cat 5e cable or better. | a) Cat 3 cable or better c) Shielded cabling -PoE requires Cat 3 cable or better while PoE+ must use Cat 5e cable or better. Drawing power down the cable generates more heat that can adversely affect data rates. -PoE should use shielded cabling as it is capable of dispersing heat more efficiently than unshielded cabling. |
A cable installer is using a special tool to affix an RJ-45 connector to an Ethernet cable. What tool has this purpose? | b) Cable crimper -A cable crimper creates a patch cord and fixes a plug to a cable. The tools are specific to the connector and cable type, though some may have modular dies to support a range of RJ-type plugs. |
An administrator manually configured a server's network interface card (NIC) settings to run at 100Mbps and connected the server to the switch. However, communications between the server and other hosts on the network were extremely slow. When the administrator checked the light on the server's switch port, it was blinking amber. What kind of issue does this indicate? | b) Duplexing issue -Setting both a NIC and switch port to auto-negotiate will solve a duplex mismatch which will slow the link down by causing high packet loss and late collisions. -A short happens when two conductors join, usually because the insulating wire is damaged or poorly wired connectors. |
b) Duplexing issue -Setting both a NIC and switch port to auto-negotiate will solve a duplex mismatch which will slow the link down by causing high packet loss and late collisions. -A short happens when two conductors join, usually because the insulating wire is damaged or poorly wired connectors. | a) Decibels -Decibels (dB) express attenuation or the loss of signal strength. dB expresses the ratio between two measurements: signal strength at origin and signal strength at the destination. -Noise is anything transmitted within or close to the channel that is not the intended signal, causing errors in data and forcing retransmissions. This is known as the signal-to-noise ratio (SNR). |
A fiber optic cable is experiencing significant signal loss. Which of the following items should the engineer investigate to determine the cause? (Select all that apply.) | a) Incorrect transceivers b) Dirty optical cables c) Mismatched coupled cables -In fiber optic cables, dirt, dust, or grease in the transmission path will greatly reduce signal strength or block transmission completely. -Manufacturers make the transceivers used in each optical interface, whether SFP, GBIC, or another type of media converter, for a specific type of optical fiber. Using incorrect transceivers can cause signal loss. -Any mismatch between fiber optic cables coupled together will result in data loss. This can occur if the coupling does not properly align the cables, if they are different sizes, or if they are damaged. NOTE: Fiber optic cables are not susceptible to electromagnetic interference which is noise that occurs when a magnetic filed around one electrical circuit or device interferes with the signal on an adjacent circuit. |
Computers connected to a network in a new building are experiencing slow network speeds. An administrator is troubleshooting the issue and sees that the new building uses the plenum space for the ethernet cable runs. How could this cause slow network speeds? | d) By causing interference -nstallers normally route the cable through conduits or wall spaces, avoiding excessive bends and proximity to electrical power cables and fittings, such as fluorescent lights, as these could cause interference. -Reversing the transmit and receive (TX/RX reverse) happens when an installer connects the conductors from one pair to pins belonging to a different pair. |
What is a device designed to filter and transfer data packets between dissimilar types of computer networks called? | d) Router -A router connects two or more packet-switched networks. It serves two primary functions: managing network traffic by forwarding data packets to their intended IP addresses and allowing multiple devices to use the same Internet connection. |
A network administrator is setting up new address pools on a Dynamic Host Configuration Protocol (DHCP) server and is having difficulty remembering available Internet Protocol (IP) addresses. Which of the following would make the management of allocated IP addresses on the network easier? | d) An IPAM service -IPAM or IP address management is designed to scan DHCP and DNS servers and log IP address usage to a database. It can be used to manage and reconfigure DHCP and DNS servers remotely. |
A wireless access point (WAP) resides in the middle of an office area. A network administrator wants to gather information about data packets coming through the WAP for subsequent examination. Which of the following will provide the minimum level of support for completion of this task? a) A Wi-Fi analyzer b) A packet sniffer c) A port scanner d) A protocol analyzer | b) A packet sniffer -A packet sniffer is the minimum the network admin needs to gather information for examination later. A packet sniffer such as winpcap for Windows is able to read packets on a port and save the information to a file on disk. -A packet sniffer will interrogate the frames received by a network adapter using a special driver; Windows uses winpcap. It can save the captured frame into a file such as a .pcap file. -A protocol analyzer is a tool (hardware or software) used to capture and analyze signals and data traffic over a communication channel. |
Users in an organization report that email is not working properly. An IT engineer uses a command with the set type argument to check for valid email servers and discovers that inbound delivery is a problem. Considering the following utilities, which of the following does the engineer use to troubleshoot the problem? | d) nslookup -The nslookup command is a Windows utility that is used to troubleshoot domain name system (DNS) records. The command returns host (A) records by default and the set type argument is used to specify a record type. A mail exchanger (MX) record specifies an email server. An incorrect or missing MX record will cause mail delivery problems. |
A network technician installed a Wi-Fi analyzer app on a personal smart phone to analyze the recently installed wireless access point (AP). Evaluate and select useful information available for a site survey. | c) Signal Strength -Depending on the position of the smart phone, the Wi-Fi analyzer can display how strong the signal is from the location of the access point (AP). This can be used to troubleshoot signal loss in certain areas. -An AP list will show all available wireless access points that the smart phone is able to hear. The Service Set Identifier (SSID) of the AP will be listed. |
Which of the following is an example of a modern network bridging device? | d) WAP -Wireless Access Points (WAP) allows wireless capable devices and wired networks to connect through a wireless standard. A WAP is a separate network device with a built-in antenna, transmitter, and adapter. -A WiFi extender is used to extend the coverage area of a WiFi network. It works by receiving the existing WiFi signal, amplifying it, and then transmitting the boosted signal. #WLAN controller enables centralized management of WAPs. #NOTE: When comptia talks about a network device used for improving wireless signal strength within homes and small offices, then they're just talking about wireless range extender. |
TFTP is a simple protocol for transferring files from one device to another, such as a Cisco IOS or configuration file. Which device can be configured as a TFTP server? | a) Cisco router -The ability to use a router as a TFTP server can be quite useful. The Cisco router is the best device to use to be configured as a TFTP server. -A CSU/DSU (Channel Service Unit/Data Service Unit) is a hardware device about the size of a modem that converts digital data frames from the communications technology used on a LAN into frames appropriate to a WAN and vice versa. |
A Linux server is unable to ping remote hosts, but other hosts can ping the server. Using the iptables command-line utility, what should a network technician examine to ensure the ping command can work for the Linux server? | c) The OUTPUT chain -The OUTPUT chain is a firewall ruleset for outgoing connections. Verify that this chain does not prevent the outgoing connection using ping or the remote host's IP (Internet Protocol) address or name. Remote hosts need the connection going from the internal network. -INPUT chain is a firewall ruleset for incoming connections. Other hosts are able to ping the LINUX server, so this chain does not have any issues. -The FORWARD chain is a firewall ruleset for connections that are passing through the server. -PREROUTING chain is processed before INPUT, OUTPUT or FORWARD chains. |
All telnet operations are sent as: | a) 8 bits -Telnet provides a bi-directional, 8-bit byte-oriented communications facility through which operations are sent as 8-bit bytes for the server to interpret. Telnet commonly provides remote access to a variety of communications systems. Telnet is often used for remote maintenance of network communications devices. |
The 802.11n wireless network is experiencing a significant amount of latency. The IPERF utility determines that the wireless network is experiencing a significant number of packets arriving out of order, arriving late, and being completely lost. What should be done? | b) Try using a different channel on the WAP to reduce interference from other 2.4 GHz devices. -A variety of factors can cause latency. In this scenario, interference is the most likely culprit. Checking for interference emitters is a good place to start. Also, check if the WAP is set to use the same channel as another WAP or a 2.4 GHz cordless phone system. -NOTE: Moving the WAP to a lower physical location would most likely decrease the signal quality and increase latency. |
Which command in MS Windows displays a table consisting of IP addresses and their resolved physical addresses? | d) arp -a -To display the ARP table in this system, enter "arp -a." This command will also show the ARP table in the Windows command prompt. ARP Command is a TCP/IP utility used for viewing and modifying the local Address Resolution Protocol (ARP) cache. ARP cache contains recently resolved MAC addresses of IP hosts on the network. #arp -e is not a valid command & will not display any results....LOL!!! |
What command visualizes the general NetFlow data on the command line? | b) Show ip cache flow -The show ip cache flow command displays the NetFlow accounting statistics. This would show a visualization of general NetFlow data. -To obtain more administrative privileges and display the statistics for NetFlow accounting data export, including the main cache, use the command: show ip flow-export (in user EXEC or privileged EXEC mode) This command shows more advanced accounting statistics than the show ip cache flow command. -Iperf is a network performance utility that can generate TCP and UDP traffic to test bandwidth, latency and packet loss. -The show mls NetFlow ip displays NetFlow IP entries. |
A systems admin is unable to ping remote hosts from a Debian server. Remote hosts can ping the server. The admin troubleshoots the issue by examining the OUTPUT chain. Determine which tool meets the admin's needs to troubleshoot the issue. | b) iptables -The iptables command line utility is used to edit the rules enforced by the Linux kernel firewall. It can change INPUT, OUTPUT and FORWARD chains that are firewall rulesets. |
An attacker exploited basic human trust by manipulating victims into performing actions they otherwise would not perform. Then, the attacker was able to disguise the victim's computer resources as something else. Which of the following attacks execute these malicious techniques? (Select all that apply.) | a) Phishing b) Social Engineering d) Spoofing -Phishing is a combination of social engineering and spoofing (disguising one computer resource as another). -Spoofing uses social engineering. This is an attack technique where the attacker disguises their identity. -Pharming is a means of redirecting users from a legitimate website to a malicious one. Pharming does not use social engineering techniques to trick the user, but corrupts the way the computer performs Internet name resolution. |
Which of the following best describes an attack used for pharming, denial of service (DoS), traffic interception, and corrupting clients' caches? (Select all that apply.) | a) Address Resolution Protocol (ARP) b) Domain Name System (DNS) -DNS poisoning compromises name resolution. It can redirect users to fraudulent sites (pharming), involve DoS attacks by directing traffic to an invalid IP, intercept and modify traffic, or pollute the client's name cache. -ARP poisoning is where an attacker redirects an IP address to the MAC address of a computer that is not the intended recipient, and can be used to perform DoS, spoofing, and man-in-the-middle (MitM) attacks. -War driving is a practice of using a Wi-Fi sniffer to detect WLANs and then either making use of them (if they are open/unsecured) or trying to break into them (using WEP and WPA cracking tools). Previous Next |
Identify which type of attack a rogue access point (AP) CANNOT be coupled with when an attacker sends spoofed frames to disconnect a client from the AP. (Select all that apply.) | a) VLAN hopping b) On-path d) Brute force -Brute force is password attack. -An on-path attack is a form of eavesdropping where the attacker makes an independent connection between two victims and steals information to use fraudulently. -A rogue AP can be combined with de-authentication attack. This sends a stream of spoofed death frame to cause a client to de-authenticate from an AP. |
While experiencing a Denial of Service Attack (DoS) on the corporate WiFi, a network engineer noticed two Service Set Identifiers (SSIDs) with the same name on the company’s wireless infrastructure. Which of the following is most likely associated with this type of attack? (Select all that apply.) | a) Spoofing d) Rogue access point -Rogue AP is an unauthorized device or service, such as a wireless AP DHCP server or DNS, on a corporate or private network that allows unauthorized individuals to connect to the network. -Spoofing is defined as disguising one computer resource as another. (two SSIDs with the same name is a hint of spoofing) |
Which of the following is spoofing associated with? (Select all that apply.) | a) Phishing c) Biometrics d) De-authentication -De-authentication sendsspoofed death frames to de-authenticate a client from an AP, which allows an attacker to interpose a rogue AP or perform a DoS attack. -Biometrics is vulnerable to spoofing methods. |
An attacker implemented a malicious access point (AP) with the same name as a legitimate one. The result was a Denial of Service (DoS) and a Wiphishing attack on a corporate WiFi. Which of the following did the attacker most likely execute in this scenario? (Select all that apply.) | a) Spoofing d) Evil Twin -A rogue AP masquerading as a legitimate one is called an evil twin, and is sometimes known as Wiphishing. An evil twin might have a similar or same name (SSID) to the legitimate one, and the attacker might use some DoS technique to overcome the legitimate AP. |
An end-user's computer crashed. Upon rebooting the machine the user noticed popups while trying to access files. The popups read that the files were encrypted, and access to the data would not be granted without the private encryption key that is held by the attacker. Unfortunately, the victim did not backup any of the data to recover it. Analyze the scenario and determine what types of attacks the end-user may have fallen victim to. (Select all that apply.) | a) Ransomware d) Crypto-malware -Crypto-malware is ransomware that encrypts data files, and the user is unable to access files without obtaining the private encryption key. This attack is difficult to mitigate unless the user has backups of the encrypted files. |
An attacker compromised multiple machines and installed backdoors on them. Then, the attacker triggered the compromised victim machines to all launch at the same time. What type of attack does this situation describe? (Select all that apply.) | b) Distributed Denial of Service (DDoS) c) Amplification Attack d) Distributed Reflection Denial of Service (DRDoS) |
A help desk technician is assisting the sysadmin in determining the best location for wireless access points. What kind of report should the technician generate? | a) Site survey -A site survey is a critical planning tool to ensure that the Wireless Local Area Network (WLAN) delivers acceptable data rates to the supported number of devices in all the physical locations expected. -A wiring diagram (or pin-out) shows detailed information about the termination of twisted pairs in an RJ-45 or RJ-48C jack or Insulation Displacement Connector (IDC). -Rack diagram records the position of each appliance in the rack. |
What is a basic document that helps employees complete the same task with the same steps to ensure quality and success? | b) SOP -Standard Operating Procedure (SOP) sets out the principal goals and considerations, such as budget, security, or customer contact standards, for performing a task. It also identifies lines of responsibility and authorization for performing it. -An acceptable use policy (AUP) sets out the permitted uses of a product or service. It might also state explicitly prohibited uses. Organizations might use such a policy in different contexts. |
A company's main file server crashed, requiring the sysadmin to restore data. However, the information technology department received complaints that no one sent any communication informing employees of the issue. What kind of plan would have helped to prevent these complaints? | a) Incident -An incident response plan sets out the procedures, tools, methods of communication, and guidelines for dealing with security incidents. An incident occurs when there is a security breach or an attempted breach. -Data loss prevention (DLP) is a software solution that detects and prevents sensitive information from being stored on unauthorized systems or transmitted over unauthorized networks. |
What kind of contract helps shield both the customer and vendor from legal risk and enforces a standard for what the customer should expect from a vendor? | a) Service level -A service level agreement (SLA) is a contractual agreement setting out the detailed terms provided under an ongoing service. NOTE: if it's a report completed by managed service providers , then it's an audit. |
What kind of diagram shows the architecture of a network without involving a precise layout based on a floor plan? | d) Logical |
An organization recently renovated its office. The IT department has tasked an entry-level technician with moving equipment to the proper cubicles and setting the equipment up for each employee. However, there are no labels at each cubicle. What kind of document would help the technician place each computer at the correct cubicle? | a) Floor plan -A floor plan is a detailed diagram of wiring and port locations. For example, the IT department might use floor plans to document wall port locations and cable runs in an office. |
A network engineer reset a switch back to factory settings and is trying to set up the device again. However, the engineer does not remember what settings need configuring. What kind of configuration did the engineer NOT reset? | a) Baseline -A baseline is a snapshot of a known good configuration and how a device operates at that known good configuration. |
A network contractor is reviewing the algorithms used for path selection. What algorithm allows a router to store the complete network topology and assess the least-cost paths from this topology database? a) Link state b) Static route c) Hybrid routing protocol d) Distance vector | a) Link state -A link state algorithm allows a router to store the complete network topology and assess the least-cost paths from the topology database. -For e.g: OSPF |
A network uses a dynamic routing protocol that requires the administrator to provide weighted elements such as reliability, bandwidth and load. Which routing protocol is in use? a) Routing Information Protocol (RIP) b) Open Shortest Path First (OSPF) c) Enhanced Interior Gateway Routing Protocol (EIGRP) d) Border Gateway Protocol (BGP) | c) Enhanced Interior Gateway Routing Protocol (EIGRP) -EIGRP is a distance vector-based routing protocol and uses a metric composed of several administrator weighted elements. |
Which networking protocol provides routing capabilities on the Internet, primarily between Internet Service Providers (ISPs)? | b) Border Gateway Protocol (BGP) -The Border Gateway Protocol (BGP) is designed between routing domains and used as the routing protocol on the Internet, primarily between Internet Service Providers (ISPs). |
A network administrator is maintaining the lab network, including several routers using Open Shortest Path First (OSPF). The administrator adds a specific route to a new router. This new route will get which default value for administrative distance? | d) 1 -A static route (which is not OSPF, OSPF default AD value is 110) has a default administrative distance (AD) value of 1. The value expresses the relative trustworthiness of the protocol supplying the route. -BGP has default AD value of 20, EIGRP > 90, OSPF > 110. |
A technician is evaluating the organization's autonomous system to determine if it can use paths through another organization's network. What is the technician trying to determine? | c) Exterior gateway protocol -An Exterior Gateway Protocol (EGP) is one that can advertise routes between autonomous systems. An EGP includes a field to communicate the network's autonomous system ID and allows network owners to determine whether they can use paths through another organization's network. |
A network contractor is reviewing the algorithms used for path selection. The algorithms categorize according to the topology and metrics used to build and update a routing information base. It also prioritizes optimal or least-cost paths. What algorithm uses the number of hops to determine the destination as a metric? | c) Distance vector -Distance vector protocols use the number of hops to the destination as the metric. The route with the fewest hops is the least-cost path, and the network will select it for use. |
The network monitoring software alerts to issues where packets are circulating between two routers before they get discarded. How would a network administrator confirm this routing issue on the network? | d) Check if the TTL goes to 0. -The TTL IP header field reduces by one every time a router (referred to as a hop) forwards a packet. When pinging a destination, the routing loop will eventually reduce the TTL value to 0. -The IP header field has the pin sticking out, this is the TTL. |
A network administrator needs to build a network that can account for network reliability with a default routing element such as "delay" to carry time-sensitive data such as voice or video. The network needs to also apply the cost to route traffic at the lowest bandwidth link available. Which routing protocol would be appropriate for this network? | d) Enhanced Interior Gateway Routing Protocol (EIGRP) -The EIGRP is a distance vector-based routing protocol and uses a metric composed of several administrator weighted elements such as "bandwidth" and "delay". |
A network architect has positioned multiple routers in different floor levels of a 10-story office building that will support the internal network of a large software company. Each routing device has redundant paths and connections. Which routing protocol would benefit the organization's hierarchical structure? | b) OSPF -As the name implies open shortest path first (OSPF) is a link state type of routing protocol ideal for hierarchical systems and networks. OSPF is suitable for organizations with multiple redundant paths between networks. |
A company invited an IT Consulting company to recommend network changes in an office building that will feature multiple teleconferencing rooms and open space for public Internet access. This is a shared office space for new small businesses. What benefits of the Quality of Service (QoS) protocol could the IT consulting company share to improve the building's network performance, especially for video conferences? (Select all that apply.) | b) The control plane decides how to prioritize traffic. c) The service is basically a traffic shaper. d) The data plane handles the switching of traffic. #In terms of QoS, network functions divide into three planes. -The control plane makes decisions about how to prioritize traffic and where it should switch them. -The data plane handles the actual switching of traffic. This basically forwards packets through the router to their destination. -Protocols, appliances, and software that can apply these three functions are known as traffic shapers or bandwidth shapers. |
A new network administrator in the lab is not able to get a server from one subnet talking to another server in a different subnet. Unsure about the multiple routes configured on the layer 3 switches, the administrator decides to do rapid troubleshooting to at least get the two servers communicating with each other. What should the network administrator configure to fix the network issues? | c) Configure a static route -A static route is manually added to the routing table and only changes if edited by the administrator. This is ideal for temporary solutions to rapidly set up a route for network testing or quick troubleshooting. |
A network engineer is investigating an issue in which redirects are not working when attempting to authenticate to the hotspot provider's network. Further exploration identifies that the redirect was transferring to an HTTP link and not an HTTPS link. What is the name of this issue? a) Disassociation b) Captive portal c) Encryption protocol mismatch d) Channel utilization | b) Captive portal -Most captive portal issues arise because the redirect does not work. The captive portal should use HTTPS. Most modern browsers will block redirection to sites that do not use TLS. - An encryption protocol mismatch will cause the connection to fail, even if the correct credentials are supplied. Same with disassociation or de-authentication. |
A wireless engineer implements a new Wi-Fi network organization. The engineer carefully planned the deployment of access points (APs) to maintain a configuration spacing of 25 MHz. Consider the given wireless network symptoms and determine which relates to the configured value. (Select all that apply.) | a) Channel overlap b) Interference -At least 25 MHz spacing should be allowed to avoid channel overlap. -Interference could be caused by number of factors including neighboring equipment that may use the same frequency of radio waves. -Absorption refers to the degree to which walls and windows will reduce signal strength. -NOTE: The most likely cause of a frequency mismatch is where the AP is configured for 5 GHz operation, but a station does not have a 5 GHz radio. |
A network engineer is investigating a complaint where clients are claiming they are having difficulties connecting to the WLAN. Which of the following should be confirmed for accuracy when attempting to connect to the WLAN? | d) Passphrase -If SSID broadcast is suppressed, a station can still connect to a WLAN by entering the network name manually. If a passphrase is used, make sure it is entered correctly. -RSSI is the strength of the signal from the transmitter at the client end. |
An employee submitted a ticket stating that the wireless signal is only 10 strength at their desk, making it hard for the employee to browse the shared drive and internet. What would a network engineer completing a site survey be able to determine is the cause? | a) Distance -Wireless access points can only broadcast radio signals a certain distance. The further away from the wireless access point, the less signal strength, leading to poor connections. |
A computer has difficulty connecting to a wireless access point. What common wireless properties does a user need knowledge of to properly access a Wi-Fi network? (Choose all that apply.) | a) SSID b) Passphrase |
Which of the following terms relates to the bending of radio waves? | b) Refraction -Glass or water can cause radio waves to bend and take a different path to a receiver and cause the data rate to drop. This is known as refraction. |
A company technical support representative troubleshoots a wireless network. Users state that the wireless signal barely spans across a large auditorium. According to the owner's manual, the signal should go beyond the current space. Which of the following wireless properties is likely causing the signal problem? a) Interference b) Incorrect antenna type c) Incorrect antenna placement d) Frequency mismatch | c) Incorrect antenna placement -Incorrect antenna placement can cause signal issues. Some antennas are meant to be ceiling mounted while others are designed for wall placement. This is because some antenna signals function in certain directions. -Keyword to distinguish if it's antenna type or antenna placement is by understanding that it is talking abt "beyond the current space". Just by placing the antenna at the correct space, this problem could be solved, saving u time & money that's required to replace a new antenna. |
An IT engineer installs outdoor weatherproof wireless antennas on the sides of two buildings. The intention of the installation is to create a bridge between the two without having to connect physical media. The engineer uses omnidirectional antennas. Considering the implementation, which of the following describes the outcome of the connection? a) Incorrect antenna placement b) Incorrect antenna type c) Distance limitation d) Interference | b) Incorrect antenna type -A unidirectional (not omnidirectional) antenna is suitable for direct point-to-point connections. |
A network engineer is determining where an antenna should be installed on the businesses' property. What is the engineer considering when they refer to the orientation of the wave propagating from the antenna? | b) Polarization -Polarization refers to the orientation of the wave propagating from the antenna to maximize signal strength; the transmission and reception antennas should normally use the same polarization. |
A wireless AP (access point) is placed on a table on the corner of an office floor with many furniture items and cubicles. Which of the following is most likely causing a weak or loss of signal in some areas of the office? (Select all that apply.) | c) AP is in the wrong location d) Furniture is absorbing the signal. -Cubicles are used in an office situation, so even though it mentions furniture, we should understand these don't contain mirrors. -Signal absorption that occurs through walls, windows, furniture, and even people will reduce signal strength. Concrete is the most effective absorber of radio signals. -The best location for an AP is at the center of the office floor and on the ceiling to minimize the signal absorption from furniture and cubicle walls. |
Employees in a certain office area are complaining that it is difficult to browse the web while on wireless. The network engineer reconfigured the access point to a lesser-used frequency to limit the surrounding businesses' wireless issues. What is the most likely issue that the network engineer resolved? a) Channel utilization b) Frequency mismatch c) Distance d) Incorrect passphrase | a) Channel utilization -When multiple APs use the same channel, opportunities to transmit are reduced. Channel utilization can be measured from the AP or using a Wi-Fi analyzer. As a design goal, a channel should exhibit no more than 50% utilization. |
A Wi-Fi router is unable to reach all users on the office floor due to radio interference. Which of the following tools have the capability to pinpoint the origin of the interference? a) Tone generator b) Protocol analyzer c) Power meter d) Spectrum analyzer | d) Spectrum analyzer -Received signal strength indication (RSSI) signal strength can help identify WiFi signal issues. A spectrum analyzer, usually a handheld device, is used to analyze radio or electrical interferences. The exact location can be pinpointed using this device. -A power meter or light meter is used to test a fiber optic cable to determine if there is a break in the cable. -A protocol analyzer is a software tool like Wireshark. Working in conjunction with a packet sniffer, it can decode a captured frame to reveal its contents in a readable format. |
In terms of radio wave signals, which term describes the bouncing of signals? a) Absorption b) Attenuation c) Reflection d) Refraction | c) Reflection -Mirrors or shiny surfaces cause signals to reflect, meaning that a variable delay is introduced. Reflection causes packets to be lost and consequently the data rate to drop. -Refraction just means glass or water can cause radio waves to bend!!!!!!!!!!!! |
An IT engineer notices that wireless network performance is at an all-time low. After reviewing the wireless console settings, the engineer makes changes to eliminate device saturation. Which problem does the engineer address? a) Jitter b) Overcapacity c) Channel overlap d) Interference | b) Overcapacity -"Saturation" is the keyword here. Overcapacity or device saturation occurs when too many client devices connect to the same AP. The maximum no. of clients that an AP can support varies, depending on the Wi-Fi standard used and the type of network traffic generated. -Jitter is similar to latency, however, rather than steady delays, jitter is a variable delay in the Round Trip Time (RTT) of packets. |
A user submitted a ticket and reported that while they were on a business trip at the airport, they could not connect to the wireless. After researching the issue, the support technician realized the user never signed into the free wireless system that the airport provided. What kind of wireless system was set up at the airport? | a) Captive portal -A captive portal is a type of wireless setup with a web page or website to which a client is redirected before being granted full network access. |
A wireless laptop at an organization is not able to access any internal network resources, but can browse the Internet. An IT support specialist finds the cause of the problem after examining the laptop. Based on the functionality, what does the specialist most likely conclude the cause to be? | d) Wrong service set identifier (SSID) -A Service Set Identifier (SSID) identifies a network. Connecting to an incorrect network is common when a location has multiple networks with varying access to resources (such as found with a guest network versus a private network). -A variety of security types can be used in a wireless network. A mismatch will cause a connection to fail. In this case the connection does not fail but internal resources cannot be accessed. |
Users mention that in a certain part of a company building, the wireless signal is weak. Which areas should IT support investigate to help remedy the problem? (Select all that apply.) | a) Signal-to-noise ratio b) Power level d) Channel Overlap. -Some devices allow for power level adjustments to help to cover longer distances. -Channel overlap can cause signal issues. At least 25 MHz spacing should be allowed to avoid channel overlap. In practice, therefore, no more than three nearby 802.11b/g APs can have non-overlapping channels. -The comparative strength of the data signal to the background noise is called the Signal-to-Noise Ratio (SNR). This figure should be at least 25 dB or higher. |
While determining the amount of power that an access point is transmitting, a network engineer calculates the sum of the transmit power, antenna cable/connection loss, and the antenna gain. What is the engineer attempting to calculate? | a) Effective isotropic radiated power (EIRP) -The power at which an access point transmits is configurable. EIRP is calculated as the sum of transmit power, antenna cable/connector loss, and antenna gain. |
The same hub has Host A1 and Host B1 connected. Host A1 sends a request to communicate with Host C2. Host B1 is communicating with Host C3. There is a delay in communications between Hosts A1 and C2 until the media is clear. Which Ethernet Protocol is providing this function? | c) Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) -CSMA/CA protocol uses schemes, such as "request to send", to gain access to the media. Nodes listen to the media before transmitting and transmit when the media is clear. A node wanting to transmit but detecting activity, must wait and try later. -CSMA/CD protocol defines methods for detecting a collision. When a signal present on the interface transmits and receives lines simultaneously, the node broadcasts a jam signal. |
Ethernet's collision detection mechanism results in any network communications to happen in which way? | b) Half-duplex -The collision detection mechanism means that only half-duplex transmission is possible. This means that a node can transmit or receive, but it cannot do both at the same time. -Full-duplex communication is not possible with collision detection. |
Identify the function that copies packets sent to one or more source ports to a destination port. | d) Port mirroring -Port mirroring copies all of the packets sent to one or more source ports to a mirror (or destination) port. On a Cisco switch, this refers to a Switched Port Analyzer (SPAN). -A spanning tree is a means for bridges to organize themselves into a hierarchy. The bridge at the top of the hierarchy is the root bridge. -STP information is packaged as a Bridge Protocol Data Unit (BPDU) |
Network switches at a small manufacturing firm use the neighbor discovery (ND) protocol. Which features will the network benefit from as a result? (Select all that apply.) | c) Hosts are allowed to discover other nodes. d) Hosts can configure IPv6 addresses automatically. -ND protocol features address auto-configuration that enables a host to configure IPv6 addresses for its interfaces automatically and detect whether an address is already in use on the local network. -The ND protocol features local address resolution, which allows a host to discover other nodes and routers on the local network. |
A network engineer configures network connectivity. Identify how switches will work if the engineer configures the spanning tree protocol (STP). (Select all that apply.) | a) Each switch determines the shortest path to the root. d) Switches are organized into a hierarchy. -Each switch determines the shortest path to the root bridge by exchanging information with other switches. This STP information gets packaged as bridge protocol data unit (BPDU) multicast frames. -Switches are organized into hierarchy, with the switch at the top of the hierarchy being the root. The switch with the lowest ID, comprising a priority value and the MAC address, will be selected as the root. |
An engineer configures a voice over IP (VoIP) implementation on an existing data network. What approach does the engineer use while avoiding the use of trunk ports? (Select all that apply.) | b) Auxiliary VLAN d) Multiple broadcast domains -Auxiliary means supplementing or supporting. So, in this case, voice or auxiliary VLAN is used to distinguish a PC/data & VoIP without having to configure a trunk. Most switches now support the concept of a voice or auxiliary VLAN. -A VLAN creates its own broadcast domain. Therefore, the engineer uses multiple broadcast domains when integrating a data and voice network with VLANs. |
A systems administrator troubleshoots a problematic network. In doing so, a packet sniffer captures all suspected garbage traffic from numerous source ports to a single destination port on a Cisco switch. What configuration does the systems administrator use to achieve this? (Select all that apply.) | a) Switched port analyzer d) Port mirroring. -By default, sniffing of unicast traffic by hosts attached to the same switch is prevented. Port mirroring copies all packets sent to one or more source ports to a mirror (or destination) port. -There are circumstances in which capturing and analyzing the network traffic is a legitimate activity. This capability can be configured on a Cisco switch and referred to as a switched port analyzer (SPAN). |
A systems administrator looks to restrict access to a small LAN. How can the administrator achieve this goal when configuring a switch? | b) Link aggregation -Port aggregation combines two or more separate links into a single channel. The Link Aggregation Control Protocol (LACP) can recover from a failed link between a switch port and end system. -A tagged port refers to a virtual LAN (VLAN) configuration and will normally be the port operating as a trunk. That is, it is capable of transporting traffic addressed to multiple VLANs. -A port security configuration validates the MAC address of end systems that connect to a switch port. |
A systems administrator establishes a failover solution while configuring network systems. What technology does the systems administrator use to accomplish this? | b) Port aggregation -Failover is the ability to seamlessly and automatically switch to a reliable backup system. Either redundancy or moving into a standby operational mode when a primary system component fails should achieve failover and reduce or eliminate negative user impact. The Link Aggregation Control Protocol (LACP) can auto-negotiate the bonded link between the switch ports and end systems. |
A network manager is designing a network for a new company. The company will have over 300 hosts and will interconnect multiple switches to build the network fabric. What will the network manager use to connect the switches? | b) Trunks -A trunk interconnects between switches on large networks. A sysadmin will configure each switch as a trunk port for this purpose. |
A sysadmin has set a network switch to auto-negotiate. What does this setting impact? | d) Speed -Switches support a range of Ethernet standards so older and newer network adapters can all connect to the same network. In most cases, a sysadmin sets a port on the switch to autonegotiate speed (10/100/1000 Mbps.) |
Two systems receive split communications from ARP (Address Resolution Protocol) queries. What would cause this configuration issue to occur? | b) Duplicate MAC address -A duplicate MAC address causes both hosts to contend with each other when responding to ARP queries. Then, communications could be split between them or reach only one of the hosts. |
An engineer notices a large number of frames traversing a network. While frames are not getting dropped, the traffic from the frames is taxing switches in a network closet. What will the engineer implement to rectify this situation? | a) Jumbo frames -A jumbo frame supports a data payload of up to around 9,000 bytes (rather than 1500). This reduces the number of frames that need transmitting, which reduces the number of processing that switches and routers do. |
Ethernet is known to use which type of contention-based system? | a) MAC -MAC refers to the methods a network technology uses. Ethernet uses a contention-based MAC system. Each network node connected to the same media is in the same collision domain. -Contention is a media access method that is used to share a broadcast medium. In contention, any computer in the network can transmit data at any time. This system breaks down when two computers attempt to transmit at the same time (also called collision.) |
An engineer troubleshoots a recent network configuration. Two switches that connect via a crossover cable can not communicate. Which statements help the engineer describe the current configuration? (Select all that apply.) | b) The crossover cable uses T568A on one end and T568B on the other end. d) Transmit occurs on pins 3 and 6 of the switch. -As an intermediate system, a switch port uses MDI-X and receives on pins 1 and 2 and transmits on pins 3 and 6. The cable between the host interface port and switch interface port should be straight through (either T568A on both ends or T568B on both ends) and not a crossover cable. |
What will cause a switch to act like a hub and transmit a frame out of all ports, except the source port? | d) When the MAC address table cannot find the MAC address -If the system cannot find a MAC address in the MAC address table, then the switch acts like a hub and transmits the frame out of all of the ports, except for the source port. |
Which cellular technology provides an estimated real-world download of up to 300 Megabits per second (Mbps)? | a) 5G -5G real-world speeds range from about 50 Mbps to 300 Mbps currently. 5G uses different spectrum bands from low (sub-6 GHz) to medium/high (20-60 GHz). -4G or LTE (Long Term Evolution) speed ==> 150 Mbps. Real world speed is 20 Mbps. -3G speed ==> 3.1 Mbps downlink and 1.8 Mbps uplink (CDMA2000/EV-DO) -2G speed ==> 14.4 kbps (GSM-based phones can only use SIM card if they're unlocked!!!!!!!!)GSM uses TDMA. |