Network Operations (2) Flashcards

1
Q

What is the first step in the troubleshooting model?

Implement the solution.

Test the solution.

Identify the problem.

A

Identify the problem.

The first step when troubleshooting a problem is to identify the problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Asking a user “Can you start your e-mail program?” is what type of question?

Closed-ended

Open-ended

Leading

A

Closed-ended

Because this question can be answered with a simple “yes” or “no,” it is closed-ended

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A brand new employee is complaining on his second day of work that he can’t log into his computer. What is the most probable cause?

The server is down.

His network card is bad.

He forgot or is mistyping his password.

A

He forgot or is mistyping his password.

While all the choices are possible, forgetting or mistyping the password is the most probable cause because the employee is new

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When should you use a cable tester to troubleshoot a network cable?

When you have a host experiencing a very slow connection

When you have an intermittent connection problem

When you have a dead connection and you suspect a broken cable

A

When you have a dead connection and you suspect a broken cable

Cable testers can only show that you have a broken or poorly wired cable, not if the cable is up to proper specification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which command shows you detailed IP information, including DHCP server addresses and MAC addresses?

ipconfig

ipconfig -a

ipconfig /all

A

ipconfig /all

ipconfig /all displays detailed IP configuration information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

One of your users calls you with a complaint that she can’t reach the site www.rit.edu. You try and access the site and discover you can’t connect either, but you can ping the site with its IP address. What is the most probable culprit?

The workgroup switch is down.

The gateway is down.

The DNS server is down.

A

The DNS server is down.

In this case, the DNS server is probably at fault. By pinging the site with its IP address, you have established that the site is up and your LAN and gateway are functioning properly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The weakening of a signal over distances is called what?

Attenuation

Latency

Jitter

A

Attenuation

Attenuation is the weakening of a signal over distances

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

hich of the following statements is true?

Latency is a variance of jitter.

Jitter is a variance of latency.

Crosstalk is a variance of latency.

A

Jitter is a variance of latency.

When the latency and response rate starts to vary, and becomes inconsistent, this is known as jitter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which one of these scenarios is the least likely to cause an issue on today’s networks?

Damaged cables

Duplex/speed mismatch

Bad port

A

Duplex/speed mismatch

With devices defaulting to auto for both duplex and speed, a mismatch is the least likely to cause an issue today

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is not something that would affect a wireless signal?

Reflection

Absorption

Crosstalk

A

Crosstalk

Crosstalk involves cables, while the other choices are only applicable to wireless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following measures RFI?

SSID

SNR

VLAN

A

SNR

The signal-to-noise ratio measures radio frequency interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A security type mismatch means what?

The encryption type is correct, but the encryption key isn’t.

The encryption key is correct, but the encryption type isn’t.

Either the encryption key or the encryption type (or both) is incorrect

A

Either the encryption key or the encryption type (or both) is incorrect

A security type mismatch means either the encryption key or the encryption type (or both) is incorrect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following network service issues would not be a problem found on a client device?

Incorrect gateway

Duplicate IP address

Untrusted SSL certificate

A

Untrusted SSL certificate

The untrusted SSL certificates are sent from servers to clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Where should a permit any be placed in an ACL?

At the very beginning.

At the very end.

At the very beginning and the very end.

A

At the very end.

The permit any will allow all packets not blocked from previous statements to go through

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How can you tell from a DHCP Offer if a rogue DHCP server is present?

The IP address in the DHCP Offer will be from a different scope.

The subnet mask in the DHCP Offer will be incorrect.

The default gateway IP address in the DHCP Offer will not be one of your DHCP servers’ IP addresses.

A

The default gateway IP address in the DHCP Offer will not be one of your DHCP servers’ IP addresses.

When a rogue DHCP server hands out DHCP Offers, listing itself as the default gateway, it is ready to perform a MITM (man-in-the-middle) attack, since all outbound traffic will be sent to the attacker, and not the legitimate default gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly