Network Troubleshooting Flashcards

Net+ certification (49 cards)

1
Q

What is the first step when troubleshooting a network problem?

A. Establish a probable cause theory.
B. Change the most obvious potential cause.
C. Identify the problem.
D. Establish a plan of action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

At what point in a troubleshooting methodology is it appropriate to escalate a problem? (Choose TWO.)

A. If no appropriate solution is available.
B. If the problem results in downtime.
C. If the technician is unable to confirm a theory and unable to establish a new theory.
D. If the information gathered indicates multiple possible theories.
E. If it is determined that preventive measures are appropriate.

A

A. If no appropriate solution is available.
C. If the technician is unable to confirm a theory and unable to establish a new theory.

Troubleshooting network problems
Given a scenario, implement the following network troubleshooting methodology
Troubleshooting Methodology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A service technician tests and confirms a theory for the probable cause of a problem.
What should the technician do next?

A. Escalate the problem.
B. Create a plan of action.
C. Implement a solution.
D. Apply preventive measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the last step in a systematic troubleshooting methodology?

A. Verify that the system is fully functional.
B. Apply applicable preventive measures.
C. Document the solution and the process.
D. Implement the solution in the plan of action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Users complain about intermittent connection issues with a file server. A junior technician has gathered all information and determined that no changes have been made in the network. What should the technician do next?

A. Escalate the problem to a senior engineer.
B. Test the most common solutions.
C. Use the OSI model to establish a theory of probable cause.
D. Establish a plan of action to fix the issue.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A technician has established a plan of action to resolve a problem on a network switch. The solution has been tested in a lab environment, and the technician has a list of commands to execute. After logging into the device, the technician realizes that the TACACS server blocks the commands they have to implement.
What should the technician do?

A. Assign the task to another person or department.
B. Document the findings and close the ticket.
C. Try alternative commands and scripts.
D. Reload the switch and try again.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A network administrator implements a change on a switch to fix a network issue. According to the troubleshooting methodology, what should the network administrator do next?

A. Duplicate the problem, if possible, in a lab environment.
B. Identify potential effects of the change.
C. Implement preventative measures.
D. Document all findings in a final report.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Users report that they have lost access to a network shared drive. They open a new help ticket and expect a quick resolution to the problem. What should the technician do next?

A. Escalate the issue to the server team.
B. Reboot the servers.
C. Check and replace the cabling in the communication room.
D. Gather more information from users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A network technician has confirmed that faulty DNS records are causing connection timeouts. Which step of the troubleshooting methodology should the technician take NEXT?

A. Establish a theory
B. Verify system functionality
C. Establish an action plan
D. Document action taken

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A user reports their laptop cannot connect to the network. Which action is a network technician MOST likely to perform after establishing a theory of probable cause?

A. Determine if the user recently made changes.
B. Test connectivity to a remote server with ping.
C. Search a knowledge base for related issues.
D. Create an image of the laptop’s hard drive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A network administrator wants to ensure duplex mismatches are identified quickly. Which statistic should the administrator monitor?

A. Giants
B. CRC errors
C. Link state
D. Latency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A company routes Cat 5e UTP cabling through a part of its manufacturing floor that generates a great deal of Electromagnetic interference (EMI). The cables are routed loosely through the ceiling, about 3 meters above the equipment. Computers connected to the cabling experience communication errors any time the equipment is running.
The company needs a reliable, cost-effective solution. Management will not authorize converting to fiber optic cabling.
What should the company do?

A. Replace the Cat 5e UTP cable with Cat 6 UTP cable.
B. Reroute the cable through existing power conduit.
C. Reroute the cable along the floor.
D. Replace the Cat 5e UTP cable with Cat 5e STP cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An on-site inspection fins that one fiber optic cable exceeds the bend radius that is recommended by the manufacturer. What should be the main concern for the company?

A. Duplex
B. Near end crosstalk
C. EMI
D. Attenuation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A technician is troubleshooting a faulty single mode connection between two network switches. The technician has determined that the issue is with the cabling. What should the technician do to address this issue?

A. Ensure that the cable core diameter is 9 microns.
B. Ensure that the cables support transmissions at the 1300nm wavelength.
C. Ensure that the cable classification is OM3 or OM4.
D. Ensure that the cables support transmissions at the 850nm wavelength.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A technician attempts to install a device that requires power over Ethernet. However, the device will not power on. The technician has verified that the device is functional and suspects that the upstream switch is not providing enough power. The device requires a port that supports a maximum power of 100 watts. What should the technician do to ensure that the device functions properly while optimizing power usage?

A. Verify that the switch supports PoE+.
B. Verify that the switch supports Type 1 PoE.
C. Verify that the switch supports IEEE 802.3bt Type 3.
D. Verify that the switch supports Type 4 PoE++.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A network administrator connects all top-of-rack switches using a mesh architecture. Which of the following is required for error-free operations in this environment?

A. PoE
B. LACP
C. VLANs
D. STP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A company is deploying a new computer as shown in the exhibit. The company will have a static IPv4 address.
What should the technicians use as the computer’s default gateway?

A. 192.168.1.193
B. 192.168.1.129
C. 192.168.1.1
D. 192.168.1.65

A

C. 192.168.1.1

IP Subnet Calculator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A company deploys six new computers that are configured for automatic address assignment to the 192.168.4.0/26 subnet. The DHCP server that hosts the scope for the subnet is deployed on the same subnet.
Four of the new computers are able to lease valid IP addresses. The remaining two computers have the following addresses:
169.254.12.7
169.254.14.2
What is most likely wrong?

A. The DHCP server is failing.
B. The two computers were initially assigned duplicate IP addresses.
C. The DHCP scope is exhausted.
D. The TCP/IP stack did not load correctly on the two computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Part of a company’s network is shown in the exhibit. Client computers are configured to receive IP addresses automatically from the DHCP server. All client computers currently have valid IP addresses.
Computers on the 192.168.1.0 subnet are unable to resolve host names in other subnets but can access resources by IP address. Computers on other subnets are not experiencing this problem.
What is the most likely cause?

A. The 192.168.1.1 interface is failing.
B. Port 53 is blocked on the 192.168.1.129 interface.
C. The DNS server is failing.
D. Port 53 is blocked on the 192.168.1.1 interface.

A

D. Port 53 is blocked on the 192.168.1.1 interface.

Allow Both TCP and UDP Port 53 to Your DNS Servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A company’s network is shown in the exhibit. PC1 is unable to access any resources in network B. What should the company do to fix the issue?

A. Change the subnet mask on PC1.
B. Change the subnet mask on the router.
C. Change the IP address on PC1.
D. Change the IP address on the router.

21
Q

PC1 is unable to access the internet in the network shown in the exhibit. What is the MOST likely cause?

A. A duplicate IP address
B. A rogue DHCP server
C. An expired IP address.
D. An invalid static IP address

22
Q

A systems administrator cannot ping a file server running Windows Server. Users can access files on the server without any problems. What should the administrator check?

A. TCP/IP settings
B. ARP cache
C. Local firewall rules
D. NTFS permissions

23
Q

Users report that they cannot access any resources on the Internet using an FTP client. It is determined that the connections have been denied by the firewall. All hosts from the local subnet of 192.168.1.0/25 should have access. Which ACL rule should the company implement?

A. An inbound rule: permit hosts from 192.168.1.0 255.255.255.128 to access any hosts on TCP ports 22 and 23.
B. An outbound rule: permit host from 192.168.1.0 255.255.255.0 to access any hosts on TCP ports 20 and 21.
C. An outbound rule: permit host from 192.168.1.0 255.255.255.128 to access any hosts on TCP ports 20 and 21.
D. An inbound rule: permit host from 192.168.1.0 255.255.255.128 to access any hosts on TCP ports 20 and 21.
E. An inbound rule: permit host from 192.168.1.0 255.255.255.0 to access any hosts on TCP ports 20 and 21.
F. An outbound rule: permit host from 192.168.1.0 255.255.255.128 to access any hosts on TCP ports 22 and 23.

A

C. An outbound rule: permit host from 192.168.1.0 255.255.255.128 to access any hosts on TCP ports 20 and 21.

FTP Configuration on a Firewall
Subnet Mask Cheat Sheet
Difference between SSH and Telnet

24
Q

A user complains they are unable to connect to the corporate network. A network administrator has verified other users are able to browse network resources without issues. The administrator runs ipconfig on the user’s workstation, which returns the following result:
Ethernet adapter ETH0:
Connection-specific DNS Suffix:
IPv4 Address. . . . . : 169.254.0.255
Subnet Mask . . . . . : 255.255.0.0
Default Gateway . . :
What should the administrator do to troubleshoot the issue?

A. Manually enter a default gateway address.
B. Enter a correct subnet mask for the address.
C. Verify the DHCP scope is not exhausted.
D. Verify the local firewall is deactivated.

25
A user reports their VoIP calls seem choppy. A network administrator is concerned congestion may be causing variation in packet delays. What should the administrator monitor to confirm this concern? A. Duplex B. CRC errors C. Latency D. Jitter
D. Jitter [Jitter](https://www.nextiva.com/support/articles/what-is-jitter.html) [What is latency? | How to fix latency](https://www.cloudflare.com/learning/performance/glossary/what-is-latency/) [Difference between Simplex, Half duplex and Full Duplex Transmission Modes](https://www.geeksforgeeks.org/difference-between-simplex-half-duplex-and-full-duplex-transmission-modes/) [What Causes CRC Errors?](https://www.reference.com/world-view/causes-crc-errors-a470d1eebdb4b056)
26
A company is wiring a new office space to support 1000BaseT Ethernet. The network design calls for UTP cable. The majority of the cable will be routed through a suspended ceiling. A. Cat 7 plenum B. Cat 5e plenum C. Cat 5e PVC D. Cat 7 PVC
B. Cat 5e plenum [Category Cable Comparison: Cat 5 vs. Cat 6 vs. Cat 7](https://blog.westpennwire.com/category-cable-comparison-cat-5-vs.-cat-6-vs.-cat-7) [PVC vs. Plenum & LS0H](https://www.blackboxab.se/en-se/page/29591/Information/Technical/Black-Box-Explains/Cables/Cablegroup3/PVC-vs-Plenum-LS0H)
27
A company opens new warehouse space on its company campus. Network wiring for the warehouse is routed through a 110 punch block and patch panel. Wiring out to devices uses Cat 5e UTP cable. Several devices in the warehouse experience communication problems. After extensive testing, the problem is determined to be crosstalk. The company needs to correct the problem. Infrastructure changes should be kept to a minimum. What should the company do? A. Replace the 110 punchdown block with a 66 punchdown block. B. Replace all cabling with fiber optic cable. C. Replace the failing cables with Cat 6 cables. D. Replace the failing cables with Cat 5e STP cables.
C. Replace the failing cables with Cat 6 cables. [Key Factors to Differentiate Cat5 vs Cat5e vs Cat6 vs Cat7 vs Cat8](https://www.cablek.com/fr_CA/cat5-vs-cat5e-vs-cat6-vs-cat7-vs-cat8-what-are-their-differences) [What is Fiber Optic Cable?](https://www.firefold.com/blogs/news/what-is-fiber-optic-cable) [What is the difference between a 66 block and a 110 block?](https://findanyanswer.com/what-is-the-difference-between-a-66-block-and-a-110-block#google_vignette)
28
Network devices in one area of the office building experience communication problems. A cable tester shows that the signal on the RX pair is lower than expected. What is this an indication of? A. Electromagnetic interference (EMI) B. Crosstalk C. Attenuation D. Latency
C. Attenuation [Cable Interference](https://www.comms-express.com/infozone/article/cable-interference/) [Fiber-optic Cable](https://www.brainbell.com/tutorials/Networking/Fiber-optic_Cable.html) [Latency vs Throughput – Understanding the Difference](https://www.comparitech.com/net-admin/latency-vs-throughput/)
29
A company deploys a new computer. When the cable to the computer is plugged in at the switch, the network link LED does not light. When the cable is plugged in to a different open port, the LED lights up. When plugged back in to the original port, the LED does not light. What is the most likely problem? A. VLAN mismatch B. Incorrect cable type C. Bad port D. Duplicate IP address E. Bad computer network adapter
C. Bad port [No link light on 3750](https://community.spiceworks.com/t/no-link-light-on-3750/353939) [Troubleshoot VLANs and Trunks](https://www.ciscopress.com/articles/article.asp?p=2181837&seqNum=9) [Troubleshoot Switch Port and Interface Problems](https://www.cisco.com/c/en/us/support/docs/switches/catalyst-6500-series-switches/12027-53.html)
30
Following updates to A records, a client is no longer able to connect a web server. What should be done FIRST? A. Run traceroute on the client. B. Check for errors with a packet analyzer. C. Run netstat on the web server. D. Run ipconfig /flushdns on the client.
D. Run ipconfig /flushdns on the client. [How to flush DNS: A step-by-step guide for Windows, macOS, Linux, and web browsers](https://www.hostinger.com/tutorials/how-to-flush-dns) [How to Use TRACERT to Troubleshoot TCP/IP Problems in Windows](https://support.microsoft.com/en-us/topic/how-to-use-tracert-to-troubleshoot-tcp-ip-problems-in-windows-e643d72b-2f4f-cdd6-09a0-fd2989c7ca8e) [netstat](https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/netstat) [What Is a Packet Analyzer?](https://www.garlandtechnology.com/blog/what-is-a-packet-analyzer)
31
An office is configured with APs as shown in the exhibit. The office was originally configured with AP1 only, but the users farthest from the AP had problems connecting. There were also intermittent problems with bandwidth saturation. After installing AP2, users near the center of the office have trouble connecting and communicating and are experiencing latency problems. What should technicians do to correct the problem? A. Change the SSID for AP2 to OfficeAp2. B. Uninstall AP2 and move AP1 to the center of the room. C. Move both APs to the center of the room. D. Change AP2 to channel 6. E. Change AP1 to channel 3.
D. Change AP2 to channel 6. [5 Phenomena That Impact Wi-Fi Signal](https://www.mirazon.com/5-phenomena-that-impact-wi-fi-signal/) [Top Reasons Your Wi-Fi Drops at Work](https://www.everound.com/insights/top-reasons-your-wi-fi-drops-at-work) [Selecting Channel Frequencies for Wireless APs](https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2003/cc783011(v=ws.10)) [When Wireless LANs Collide: How To Beat The Wireless Crowd](https://www.smallnetbuilder.com/wireless/wireless-howto/when-wireless-lans-collide-how-to-beat-the-wireless-crowd/)
32
A. The user is connecting to an AP operating on a different channel. B. The user is connecting to an AP with a different passphrase. C. The user is blocked by MAC filtering. D. The user is outside of the operational range of any AP.
B. The user is connecting to an AP with a different passphrase. [5 Phenomena That Impact Wi-Fi Signal](https://www.mirazon.com/5-phenomena-that-impact-wi-fi-signal/) [Top Reasons Your Wi-Fi Drops at Work](https://www.everound.com/insights/top-reasons-your-wi-fi-drops-at-work) [When Wireless LANs Collide: How To Beat The Wireless Crowd](https://www.smallnetbuilder.com/wireless/wireless-howto/when-wireless-lans-collide-how-to-beat-the-wireless-crowd/) [MAC Address Filtering: What It Is and How It Works](https://www.lifewire.com/enabling-mac-address-filtering-wireless-router-816571)
33
Threat of flooding causes a company to move large vertical filing cabinets from the basement to the main office area. Users start complaining of problems connecting to the WLAN and delayed response from the network. Network analysis shows a high level of corrupted packets. What is the most likely cause? A. Interference B. Absorption C. Reflection D. Attenuation
C. Reflection [Why WiFi is Complicated: WiFi Signal Issues](https://www.accoladewireless.com/wlan-wifi-signal-issues/) [10 Things In Your Home That Interfere With And Block Wi-Fi Signals](https://eyenetworks.no/en/10-things-that-disturb-and-block-wi-fi-signals/) [5 Phenomena That Impact Wi-Fi Signal](https://www.mirazon.com/5-phenomena-that-impact-wi-fi-signal/)
34
A company has two access points, as shown in the exhibit. Users report intermittent access issues. What could the company do to fix the problem? (Choose two.) A. Change to 5 Ghz. B. Change the overlapping area to 5%. C. Assign AP1 to channel 11. D. Change the authentication method on AP1. E. Assign a different SSID to AP1.
A. Change to 5 Ghz. C. Assign AP1 to channel 11. [Channel Planning Best Practices for Better Wi-Fi](https://www.ekahau.com/blog/channel-planning-best-practices-for-better-wi-fi/) [Aerohive WLAN Best Practices Guide](https://docs.aerohive.com/330000/docs/guides/Aerohive-WLAN-Best-Practices.pdf)
35
A technician has configured a new SSID on an AP using the 5Ghz frequency. He has connected to it with a mobile phone. A test laptop is unable to show the new SSID in the list of available networks. What would be the MOST likely reason for that? A. There is a pre-shared key mismatch between the AP and the laptop. B. There is an issue with the AP. C. The laptop has a driver issue. D. The laptop has a single-band wireless card.
D. The laptop has a single-band wireless card. [Single band vs. dual band Wi-Fi adapters](https://store.rokland.com/blogs/news/single-band-vs-dual-band-wi-fi-adapters) [802.11x: Wi-Fi standards and speeds explained](https://www.networkworld.com/article/964778/80211x-wi-fi-standards-and-speeds-explained.html)
36
Users connect to a network using wireless laptops and report intermittent access issues with a NAS server. The access point and the NAS server are connected to a switch using a 100 Mbps link. The status of the access point is shown in the exhibit. What should the support team do to fix the connectivity issue? A. Change the IEEE mode to 802.11n. B. Change security to WPA2-AES. C. Enable SSID isolation. D. Install more access points.
D. Install more access points. [Maximum Devices and WLANs per AP?](https://www.mist.com/documentation/maximum-devices-and-wlans-per-ap/) [What Are 802.11ac and 802.11ac Wave 2](https://support.huawei.com/enterprise/en/doc/EDOC1100081215) [Recommended settings for Wi-Fi routers and access points](https://support.apple.com/en-gb/102766) [Wireless Client Isolation](https://documentation.meraki.com/MR/Firewall_and_Traffic_Shaping/Wireless_Client_Isolation)
37
A wireless client reports their VoIP calls are choppy and sometimes drop. What should a network administrator do FIRST to troubleshoot this issue? A. Install omnidirectional antennas. B. Add another SSID. C. Check the client's RSSI. D. Reduce EIRP.
C. Check the client's RSSI. [What is Wi-Fi Strength and RSSI?](https://support.simplisafe.com/articles/wifi-troubleshooting/what-is-wifi-strength-and-rssi/634478878e3e4c348d43ebdb) [What is Effective Isotropic Radiated Power (EIRP)](https://www.tutorialspoint.com/what-is-effective-isotropic-radiated-power-eirp) [What Is an SSID, or Service Set Identifier?](https://www.howtogeek.com/334935/what-is-an-ssid-or-service-set-identifier/)
38
A network administrator prepares to install an outdoor WAP and determines EIRP is lower than the install requires. What should the administrator do to address this issue? A. Disable SSID broadcast. B. Reorient the WAP. C. Replace the antenna cables. D. Decrease the WAP transmit power.
C. Replace the antenna cables. [Wi-Fi EIRP Calculator](https://wifinigel.blogspot.com/2015/03/wi-fi-eirp-calculator.html) [How to adjust orientation of outdoor AP for better signal coverage](https://www.tp-link.com/us/support/faq/1044/) [Your Go-To-Guide for Channel & Transmit Power on Wi-Fi Networks (Part 1)](https://www.engeniustech.com/go-guide-channel-transmit-power-wi-fi-networks/) [What Is an SSID, or Service Set Identifier?](https://www.howtogeek.com/334935/what-is-an-ssid-or-service-set-identifier/)
39
Users complain that as they walk from one location to another in an office complex, they lose wireless connectivity. What should a network administrator do to troubleshoot this issue? A. Increase WAP transmit power. B. Ensure a low signal-to-noise ratio. C. Configure unique SSIDs per WAP. D. Architect overlapping wireless cells.
D. Architect overlapping wireless cells. [Channel Planning Best Practices](https://documentation.meraki.com/MR/Wi-Fi_Basics_and_Best_Practices/Channel_Planning_Best_Practices) [Your Go-To-Guide for Channel & Transmit Power on Wi-Fi Networks (Part 1)](https://www.engeniustech.com/go-guide-channel-transmit-power-wi-fi-networks/) [What Is an SSID, or Service Set Identifier?](https://www.howtogeek.com/334935/what-is-an-ssid-or-service-set-identifier/) [Signal-to-Noise Ratio (SNR) and Wireless Signal Strength](https://documentation.meraki.com/MR/Wi-Fi_Basics_and_Best_Practices/Signal-to-Noise_Ratio_(SNR)_and_Wireless_Signal_Strength)
40
Users report that messages about duplicate IP addresses keep displaying on their computers. What should technicians suspect as a cause? A. Host firewall settings B. Rogue DHCP server C. Name resolution errors. D. Exhausted DHCP scope
B. Rogue DHCP server [Dealing with Rogue DHCP Servers](https://www.auvik.com/franklyit/blog/rogue-dhcp-server/) [How to Prevent Rogue DHCP Servers on your Network](https://learn.microsoft.com/en-us/archive/technet-wiki/25660.how-to-prevent-rogue-dhcp-servers-on-your-network)
41
The network support team needs to determine whether data is being encrypted when it is sent over the network. Which process should the team use? A. Port scanning B. Log review C. Packet analysis D. Vulnerability scanning
C. Packet analysis [How to Read Packets in Wireshark](https://www.alphr.com/read-packets-wireshark/) [What is Port Scanning and Why is it Important?](https://www.rapidfiretools.com/blog/port-scanning/) [Why is Network Monitoring and Network Log Management So Crucial?](https://www.whatsupgold.com/blog/network-monitoring-network-log-management-crucial)
42
In-house technicians plan to emulate a penetration attempt. They want to see if they can learn what services are running on network servers. What should they use? A. Traffic analysis B. Vulnerability scanning C. Packet analysis D. Port scanning
D. Port scanning [What is a Port Scan?](https://www.paloaltonetworks.com/cyberpedia/what-is-a-port-scan) [Vulnerability Scanning Tools](https://owasp.org/www-community/Vulnerability_Scanning_Tools) [How to Use Wireshark: Comprehensive Tutorial + Tips](https://www.varonis.com/blog/how-to-use-wireshark)
43
A company collects network traffic data from multiple subnets. Detailed analysis indicates that packers are being dropped by one of the routers. Technicians suspect this is due to misconfigured firewall ACLs. Where should technicians look for more detailed information? A. Event logs B. Vulnerability scans C. Firewall logs D. Port scans
C. Firewall logs [Logging AWS WAF web ACL traffic](https://docs.aws.amazon.com/waf/latest/developerguide/logging.html) [What Is the Windows Event Viewer, and How Can I Use It?](https://www.howtogeek.com/123646/htg-explains-what-the-windows-event-viewer-is-and-how-you-can-use-it/) [Vulnerability Scanning Tools](https://owasp.org/www-community/Vulnerability_Scanning_Tools) [What is a Port Scan?](https://www.paloaltonetworks.com/cyberpedia/what-is-a-port-scan)
44
Which command line interface command should a systems administrator use to verify the hardware address of a device connected to a local area network? A. pathping B. arp C. nslookup D. ipconfig
B. arp [Basic Networking Commands Explained with Examples](https://www.computernetworkingnotes.com/networking-tutorials/basic-networking-commands-explained-with-examples.html) [How to use ping, winipcfg, and other network commands](https://www.computerhope.com/issues/ch000444.htm)
45
The marketing team uses a SaaS service to store raw video files. The team reports slow access to some resources on the SaaS platform. What should the network team do? A. Check the bandwidth. B. Deploy a SAN network. C. Verify the ACL on the firewall. D. Migrate all users to a PaaS solution.
A. Check the bandwidth. [What is Bandwidth in Networking?](https://www.bobcloud.net/what-is-bandwidth-in-networking/?cn-reloaded=1) [Cloudy Concepts: IaaS, PaaS, SaaS, MaaS, CaaS & XaaS](https://www.zdnet.com/article/cloudy-concepts-iaas-paas-saas-maas-caas-xaas/) [Access Control List (ACL)](https://www.imperva.com/learn/data-security/access-control-list-acl/) [NAS vs SAN Storage](https://hypertecsp.com/knowledge-base/nas-vs-san/)
46
A. nslookup B. netstat C. dig D. tracert
C. dig [How to use BIND’s Domain Information Groper (dig) Tool](https://help.dyn.com/how-to-use-binds-dig-tool/) [How to Use TRACERT to Troubleshoot TCP/IP Problems in Windows](https://support.microsoft.com/en-us/topic/how-to-use-tracert-to-troubleshoot-tcp-ip-problems-in-windows-e643d72b-2f4f-cdd6-09a0-fd2989c7ca8e) [nslookup](https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/nslookup) [netstat](https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/netstat)
47
A network engineer is troubleshooting a network performance issue. Which tool can the engineer use to view packet headers and content in ASCII or hex? A. NetFlow B. tcpdump C. netstat D. nmap
B. tcpdump [A tcpdump Tutorial with Examples](https://danielmiessler.com/blog/tcpdump) [netstat](https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/netstat) [What Is NetFlow?](https://blog.gigamon.com/2018/01/08/what-is-netflow/) [https://nmap.org/](https://nmap.org/)
48
A network administrator wants to secure a server. Which is the BEST tool for determining which services or applications are responding to network requests? A. Protocol analyzer B. SIEM C. Port scanner D. dig
C. Port scanner [What is a Port Scanner and How Does it Work?](https://www.varonis.com/blog/port-scanning-techniques) [What is SIEM? Improving security posture through event log data](https://www.csoonline.com/article/524286/what-is-siem-security-information-and-event-management-explained.html) [Protocol analyzer](https://www.manageengine.com/products/netflow/what-is-a-protocol-analyzer.html) [How to use BIND’s Domain Information Groper (dig) Tool](https://help.dyn.com/how-to-use-binds-dig-tool/)
49
A network technician troubleshoots connectivity to a server. The technician needs to determine if a connection from a client is active as well as the port being used for the connection. Which tool should the technician use? A. route B. netstat C. tracert D. arp
B. netstat [netstat](https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/netstat) [route](https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/route_ws2008) [tracert](https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/tracert) [arp](https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/arp)