Domain 5: Network Troubleshooting and Tools Flashcards
Which of the following troubleshooting steps involves prioritizing trouble tickets based on the severity of the problem?
A. Identify the problem
B. Establish a theory of probable cause
C. Test the theory to determine cause
D. Establish a plan of action to resolve the problem and identify potential effects
E. Implement the solution or escalate as necessary
F. Verify full system functionality and, if applicable, implement preventive measures
G. Document findings, actions, and outcomes
A. Identify the problem
The first step in troubleshooting is to identify the problem by establishing symptoms related to the network issue being reported. In this step, problems are typically reported as trouble tickets, which are prioritized based on the severity of the problem. You complete the other steps after the trouble ticket has been prioritized and is being investigated.
Which of the following is considered a system-wide error?
A. A problem with an order entry or customer service call center resource
B. A problem with a router that affects only one local area network (LAN)
C. A fatal error that causes a single computer to fail
D. A problem with an email server that affects all network users
C. A fatal error that causes a single computer to fail
A system-wide error is a problem that renders an individual user’s system (computer) completely unusable. All the other problems listed would affect more than one system or user.
Which of the following is a network-wide problem?
A. A problem with an order entry or customer service call center resource
B. A fatal error that causes a single computer to fail
C. A problem with an application server that affects a single local area network (LAN)
D. A problem with a router that connects an entire network to the Internet
D. A problem with a router that connects an entire network to the Internet
Any problem that affects all the users on the network is a network-wide problem and should be given the highest priority. An example of this would be a problem with an Internet router. All other problems listed do not affect the entire network.
A user reports that she can’t connect to a server on her network. Ed wants to identify the scope of the problem, so he tries to reproduce the problem on the user’s computer. The problem still remains. No other users are reporting this problem. What is the next logical step that Ed should perform to identify the affected area?
A. Verify that the local router is forwarding traffic
B. Try performing the same task on a computer attached to the same segment
C. Verify that the server is configured properly
D. Verify that the switch the client is connected to is functioning
B. Try performing the same task on a computer attached to the same segment
In this scenario only one user is reporting a problem. Therefore, the likeliest next step is to perform the same task on another computer attached to the same segment. If Ed can perform the task successfully, the problem most likely lies within the user’s computer or the connection to the switch. Since no other users are reporting the same problem, the server and switches on the network are probably up and functioning. Checking the router isn’t necessary since the user and server are on the same network.
Which of the following troubleshooting steps involves asking the user preliminary questions such as, “What were you doing when the problem occurred?”
A. Identify the problem
B. Establish a theory of probable cause
C. Test the theory to determine cause
D. Establish a plan of action to resolve the problem and identify potential effects
E. Implement the solution or escalate as necessary
F. Verify full system functionality and, if applicable, implement preventative measures
G. Document findings, actions, and outcomes
A. Identify the problem
The first step in troubleshooting is to identify the problem by establishing symptoms related to the network problem being reported. In this step you ask the user many questions to identify and define the symptoms of the problem and prioritize the trouble ticket. Although you might continue to ask the user questions throughout the troubleshooting process, this is typically associated with the first step of the troubleshooting process.
When troubleshooting, you begin by taking steps to identify the problem. After you do this, which of the following steps should you perform next?
A. Implement the solution
B. Establish a plan of action
C. Establish a theory of probable cause
D. Verify full system functionality
C. Establish a theory of probable cause
After identifying the problem, the next step is to establish a theory for the probable cause of the problem. After that, you can test your theory, establish a plan of action, implement a solution, verify the functionality of the system, and document the entire process.
In which troubleshooting step do you try to duplicate a network problem to “divide and conquer” by logically and methodically eliminate elements that aren’t the source of the problem?
A. Identify the problem
B. Establish a theory of probable cause
C. Test the theory to determine cause
D. Establish a plan of action to resolve the problem and identify potential effects
E. Implement the solution or escalate as necessary
F. Verify full system functionality and, if applicable, implement preventative measures
G. Document findings, actions, and outcomes
B. Establish a theory of probable cause
The second step in troubleshooting is to attempt to duplicate a problem and develop a theory of its probable cause. As you troubleshoot a problem, you then test your theory to confirm your findings. You complete the other troubleshooting steps after the specific cause has been identified.
You have a problem with a server or other network component that prevents many users from working. What type of problem is this?
A. A network-wide problem
B. A shared resource problem
C. A system-wide problem
D. A user application problem
B. A shared resource problem
If a problem lies within a specific server or other network component that prevents many users from working, it is a shared resource problem.
A single Windows user suddenly can’t connect to any hosts on the network (local or remote). Alice interviews the user and finds out that he made some changes to his computer’s Internet Protocol (IP) configuration properties. What should she do next?
A. Run the ipconfig command to view the local configuration
B. Check the Domain Name System (DNS) server to see if it is resolving IP hostnames
C. Check the Windows Internet Name Service (WINS) server to see if it is resolving Network Basic Input/Output System (NetBIOS) names
D. Verify that the router is functioning
A. Run the ipconfig command to view the local configuration
Since only one user is reporting the problem and he had admitted to making changes to his IP configuration, Alice should probably start by checking the configuration using the ipconfig command.
Alice has a network with a Domain Name System (DNS) server, a proxy server, and an Internet router. A user is complaining that she suddenly can’t connect to hosts on her own local area network (LAN) and other internal LANs, and she can’t access hosts on the Internet. What is the likeliest problem?
A. The user’s local configuration
B. The proxy server
C. The DNS server
D. The router
A. The user’s local configuration
Since only one user is reporting the problem, the user’s computer and its configuration are the likeliest suspect components. ADNS, proxy, or router problem would affect more than one user.
Alice is working the help desk when a user calls and reports that she is unable to connect to the Internet. Which of the following steps is the one Alice is least likely to perform first when troubleshooting the problem?
A. Check the configuration of the router connecting the LAN to the Internet.
B. Ask the user if she can access resources on the local network.
C. Check to see if anyone else is experiencing the same problem.
D. Check the user’s job title to see if she is an important person in the company.
A. Check the configuration of the router connecting the LAN to the Internet.
There are many possible causes for the problem that are more likely than a router configuration error, so this is not something Alice would check first. Asking if the user can access the local network attempts to isolate the problem. If she cannot, the problem could be in her computer; if she can, then the problem lies somewhere in the Internet access infrastructure. If other users are experiencing the problem, then the issue should receive a higher priority, and Alice knows that the problem does not lie in the user’s computer. While it might not be the first thing she checks, it is a political reality that higher ranking users get preferential treatment.
In the standard troubleshooting methodology, which of the following steps appears last but must actually be practiced throughout the troubleshooting process?
A. Test the theory to determine cause
B. Document findings, actions, and outcomes
C. Verify full system functionality and, if applicable, implement preventive measures
D. Implement the solution or escalate as necessary
E. Establish a plan of action to resolve the problem and identify potential effects
F. Establish a theory of probable cause
G. Identify the problem
B. Document findings, actions, and outcomes
Documenting everything you discover and everything you do is a crucial part of the troubleshooting method that must begin before you take any other action whatsoever. However, it appears as the last step in the troubleshooting methodology.
In which troubleshooting step is a trouble ticket created?
A. Establish a theory of probable cause
B. Verify full system functionality and, if applicable, implement preventive measures
C. Implement the solution or escalate as necessary
D. Test the theory to determine cause
E. Identify the problem
F. Document findings, actions, and outcomes
G. Establish a plan of action to resolve the problem and identify potential effects
E. Identify the problem
The first step in troubleshooting involves identifying the problem and creating a trouble ticket. You complete the other troubleshooting steps after the trouble ticket has been prioritized.
Which step of the troubleshooting model involves identifying whether hardware or software has been recently installed or reconfigured?
A. Identify symptoms
B. Establish a theory of probable cause
C. Establish a plan of action to resolve the problem and identify potential effects
D. Determine if anything has changed.
E. Test the theory to determine cause
F. Document findings, actions, and outcomes
D. Determine if anything has changed.
During the troubleshooting process, you must establish whether anything has changed. This typically involves asking the user whether any new or existing hardware or software has been installed or reconfigured.
Which step of the troubleshooting model involves replacing components until a faulty hardware device is identified?
A. Duplicate the problem
B. Gather information
C. Test the theory to determine the cause
D. Establish a plan of action to resolve the problem
E. Verify full system functionality
F. Document findings, actions, and outcomes
C. Test the theory to determine the cause
After you have established a theory of probable cause, you can try to test the theory by replacing hardware components one by one until you find the faulty device.
Ed is a first-tier support technician. He receives the help calls listed here. His job is to assign them priorities based on their severity. Which of the following should be the problem that receives the highest priority?
A. A problem with an order entry or customer service call center resource that affects an entire department, with multiple local area networks (LANs)
B. A fatal error that causes a single computer to fail
C. A problem with a mission-critical backbone router that affects an entire network
D. A problem with an application server that affects a single LAN
C. A problem with a mission-critical backbone router that affects an entire network
A problem that affects the entire network should be given highest priority. This includes a mission-critical backbone router. Problems that affect multiple LANs or an entire department are generally given the next highest priority. An application problem that affects a shared application server on a LAN should be given the next highest priority. A problem with a single user’s computer should be given the lowest priority if the other problems have been reported.
Ed is a first-tier support technician. He receives the help calls listed here. His job is to assign them priorities based on their severity. Which of the following should be the problem that receives the lowest priority?
A. A problem with an order entry or customer service call center resource that affects an entire department, with multiple local area networks (LANs)
B. A fatal error that causes a single computer to fail
C. A problem with a mission-critical backbone router that affects an entire network
D. A problem with an application server that affects a single LAN
B. A fatal error that causes a single computer to fail
A problem that affects the entire network should be given highest priority. This includes a mission-critical backbone router. Problems that affect multiple LANs or an entire department are generally given the next highest priority. An application problem that affects a shared application server on a LAN should be given the next highest priority. A problem with a single user’s computer should be given the lowest priority if the other problems have been reported.
When you troubleshoot a network problem, it is possible to introduce another problem while attempting to fix the original one. In which step of the troubleshooting process should you be aware of the residual effects that changes might have on the network?
A. Identify the problem
B. Establish a theory of probable cause
C. Test the theory to determine cause
D. Establish a plan of action to resolve the problem
E. Implement the solution or escalate as necessary
F. Verify full system functionality
G. Document findings, actions, and outcomes
D. Establish a plan of action to resolve the problem
After you identify a problem and establish and test a theory of its probable cause, you must create a plan of action to resolve the problem and identify any potential effects (positive or negative) your solution might have. Then, you implement your solution, test the results, and finish documenting the incident.
In which troubleshooting step do you create a record of your activities and inform the user of what happened and why?
A. Identify the problem
B. Establish a theory of probable cause
C. Test the theory to determine cause
D. Establish a plan of action to resolve the problem and identify potential effects
E. Implement the solution or escalate as necessary
F. Verify full system functionality and, if applicable, implement preventive measures
G. Document findings, actions, and outcomes
G. Document findings, actions, and outcomes
The last step of the troubleshooting process is to document the solution and explain to the user what happened and why. In reality, documentation should begin when the problem is reported, and the documentation should be updated throughout the troubleshooting process.
Which of the following Windows tools uses ICMP messages and manipulates IPv4 time-to-live values to illustrate the route packets take through an internetwork?
A. Ping
B. Netstat
C. Route
D. Tracert
E. Nslookup
D. Tracert
he Windows tracert tool transmits a series of ICMP messages with incrementing time-to-live (TTL) values, which identify each router on the path the packets take through the network. ping uses ICMP, but it does not manipulate TTLvalues.
Users are having trouble connecting to Internet hosts. Alice suspects that there is a problem with the Domain Name System (DNS) server, and she wants to verify this. Which of the following steps can she take to determine whether the DNS server is resolving Internet hostnames?
A. Issue the ipconfig command from a local workstation
B. Try to connect to a host using the Internet Protocol (IP) address instead of the hostname
C. Ping the DNS server to see if it is functioning
D. Use the tracert command to test the functionality of the DNS server
B. Try to connect to a host using the Internet Protocol (IP) address instead of the hostname
If Alice suspects that a DNS server isn’t resolving hostnames, she should try connecting to a remote host using the IP address instead of the name. If she can connect, she knows that all internal local area network (LAN) components and the Internet gateway are functioning, and the remote host is functioning. The problem most likely lies within the DNS server itself. If Alice can’t connect to a remote host using the IP address, the problem isn’t the DNS server. She would need to do more testing to isolate the problem device and the affected area.
Which of the following types of wiring faults cannot be detected by a wiremap tester?
A. Split pairs
B. Open circuits
C. Short circuits
D. Transposed wires
A. Split pairs
A wiremap tester consists of a main unit that connects to all eight wires of a UTP cable at once and a loopback device that you connect to the other end, enabling you to test all of the wires at once. A wiremap tester can detect opens and shorts, as well as transposed wires. However, it cannot detect split pairs because, in that fault, the pins are properly connected.
After connecting a tone generator to the green wire at one end of a twisted pair cable run, Ralph proceeds to the other end of the cable and touches the locator to each of the eight pins in turn. The green wire and the green striped wire both produce a tone. What type of wiring fault has Ralph discovered?
A. Split pair
B. Far-end crosstalk
C. Transposed wires
D. Short circuit
E. Delay skew
D. Short circuit
The first and most essential test that installers must perform on every cable run is a continuity test, which ensures that each wire on both ends of the cable is connected to the correct pin and only the correct pin. If a pin on one end of a cable run is connected to two or more pins on the other end, you have a short circuit.
Which of the following Windows command-line utilities produced the output shown here?
A. ping
B. tracert
C. netstat
D. arp
D. arp
Running the arp utility with the -a parameter on a Windows system displays the contents of the Address Resolution Protocol (ARP) cache. The cache contains records of the IP addresses on the network that arp has resolved into MAC addresses. The ping, tracert, and netstat utilities are not capable of producing this output.