Nelvi Zetri
02834
Pendidikan Teknik Informatika
1. What should a network administrator do first after receiving a call from a user who cannot access the company web server?
• Reboot the web server.
• Replace the NIC of the computer.
• Ask the user to log off and log on again.
• Ask the user what URL has been typed and what error message displays.
2. A customer called the cable company to report that the Internet connection is unstable. After trying several configuration changes, the technician decided to send the customer a new cable modem to try. What troubleshooting technique does this represent?
• top-down
• bottom-up
• substitution
• trial-and-error
• divide-and-conquer
3. Only one workstation on a particular network cannot reach the Internet. What is the first troubleshooting step if the divide-and-conquer method is being used?
• Check the NIC, and then check the cabling.
• Check the workstation TCP/IP configuration.
• Test all cables, and then test layer by layer up the OSI model.
• Attempt to Telnet, and then test layer by layer down the OSI model.
4. Which two troubleshooting techniques are suitable for both home networks and large corporate networks? (Choose two.)
• having a backup ISR
• running network monitoring applications
• documenting the troubleshooting process
• keeping a record of system upgrades and software versions
• keeping spare switches, routers, and other equipment available
5. Identify two physical-layer network problems. (Choose two.)
• hardware failure
• software configuration
• devices not able to ping
• loose cable connections
• device driver configuration
6. Which ipconfig command requests IP configuration from a DHCP server?
• ipconfig
• ipconfig /all
• ipconfig /renew
• ipconfig /release
7. What command is used to determine the location of delay for a packet traversing the Internet?
• ipconfig
• netstat
• nslookup
• ping
• tracert
8. What command is used to determine if a DNS server is providing name resolution?
• ipconfig
• netstat
• nslookup
• tracert
9. Which troubleshooting method begins by examining cable connections and wiring issues?
• top-down
• bottom-up
• substitution
• divide-and-conquer
10. A technician suspects that a Linksys integrated router is the source of a network problem. While troubleshooting, the technician notices a blinking green activity LED on some of the ports. What does this indicate?
• Self-diagnostics have not completed.
• The power supply is the source of the problem.
• The ports are operational and are receiving traffic.
• The ports are operational, but no traffic is flowing.
• There are no cables plugged into those ISR ports.
• The ports have cables plugged in, but they are not functional.
11. A PC is plugged into a switch and is unable to connect to the network. The UTP cable is suspected. What could be the problem?
• A straight-through cable is being used
• The connectors at both ends of the cable are RJ-45.
• The RJ-45 connectors are crimped onto the cable jacket.
• A crossover cable is being used.
12. Refer to the graphic. What configuration is incorrect in the network shown?
• The host IP address is incorrect.
• The host subnet mask is incorrect.
• The host default gateway is incorrect.
• The wired connection is the wrong type of cable.
• The Linksys integrated router does not support wireless.
13. Which three settings must match on the client and access point for a wireless connection to occur? (Choose three.)
• SSID
• authentication
• MD5 checksum
• antennae type
• encryption key
• MAC address filters
14. A technician is troubleshooting a security breach on a new wireless access point. Which three configuration settings make it easy for hackers to gain access? (Choose three.)
• configuring NAT
• broadcasting the SSID
• using open authentication
• enabling MAC address filters
• using the default internal IP address
• using DHCP to provide IP addresses
15. Refer to the graphic. The wireless host cannot access the Internet, but the wired host can. What is the problem?
• The host WEP key is incorrect.
• The host IP address is incorrect.
• The host subnet mask is incorrect.
• The host default gateway is incorrect.
• The integrated router internal IP address is incorrect.
• The integrated router Internet IP address is incorrect.
16. Refer to the graphic. What configuration is incorrect in the network shown?
• The host IP address is incorrect.
• The host subnet mask is incorrect.
• The host default gateway is incorrect.
• The wired connection is the wrong type of cable.
• The Linksys integrated router does not support wireless.
17. When acting as a DHCP server, what three types of information can an ISR provide to a client? (Choose three.)
• physical address
• MAC address
• default gateway
• static IP address
• dynamic IP address
• DNS server address
18. What two items could be checked to verify connectivity between the router and the ISP? (Choose two.)
• router status page
• wireless card settings
• router operating system version
• local host operating system version
• connectivity status as indicated by LEDs
19. A technician is unsuccessful in establishing a console session between a PC and a Linksys integrated router. Both devices have power, and a cable is connected between them. Which two troubleshooting steps could help to diagnose this problem? (Choose two.)
• Ensure the correct cable is used.
• Ensure the SSID is the same on both devices.
• Ensure both devices have the same IP address.
• Ensure both devices have different subnet masks.
• Ensure the encryption type on both devices match.
• Ensure the link status LED on the integrated router is lit.
20. Network baselines should be performed in which two situations? (Choose two.)
• after the network is installed and running optimally
• after a virus outbreak is discovered on the network
• after major changes are implemented on the network
• after several computers are added to the network
• at the end of the work week
21. Typically, help desk personnel assist end users in which two tasks? (Choose two.)
• identifying when the problem occurred
• determining if other users are currently logged into the computer
• updating network diagrams and documentation
• implementing the solution to the problem
• running a network baseline test
• determining the cost of fixing the problem
22. How does remote-access software help in the troubleshooting process?
• Remote access uses a live chat feature.
• Users have to be present so that they can view LEDs and change cables if necessary.
• Diagnostics can be run without a technician being present at the site.
• FAQs can be consulted more easily.
23. Which two items should be added to the documentation following a troubleshooting event? (Choose two.)
• final resolution
• repetitive measures
• number of people involved in the problem
• accurate current network infrastructure diagrams
• results of successful and unsuccessful troubleshooting steps
02834
Pendidikan Teknik Informatika
1. Why is IEEE 802.11 wireless technology able to transmit further distances than Bluetooth technology?
• transmits at much lower frequencies
• has higher power output
• transmits at much higher frequencies• uses better encryption methods
2. What are three advantages of wireless over wired technology? (Choose three.)
• more secure
• longer range
• anytime, anywhere connectivity
• easy and inexpensive to install
• ease of using licensed air space• ease of adding additional devices
3. What are two benefits of wireless networking over wired networking? (Choose two.)• speed
• security
• mobility
• reduced installation time
• allows users to share more resources• not susceptible to interference from other devices
4. A technician has been asked to provide wireless connectivity to the wired Ethernet network of a building. Which three factors affect the number of access points needed? (Choose three.)
• the size of the building
• the number of solid interior walls in the building
• the presence of microwave ovens in several offices
• the encryption method used on the wireless network• the use of both Windows and Appletalk operating systems
• the use of shortwave or infrared on the AP
5. Why is security so important in wireless networks?
• Wireless networks are typically slower than wired networks.
• Televisions and other devices can interfere with wireless signals.
• Wireless networks broadcast data over a medium that allows easy access.
• Environmental factors such as thunderstorms can affect wireless networks.6. What does the Wi-Fi logo indicate about a wireless device?
• IEEE has approved the device.
• The device is interoperable with all other wireless standards.
• The device is interoperable with other devices of the same standard that also display the Wi-Fi logo.
• The device is backwards compatible with all previous wireless standards.
7. Which statement is true concerning wireless bridges?
• connects two networks with a wireless link
• stationary device that connects to a wireless LAN• allows wireless clients to connect to a wired network
• increases the strength of a wireless signal
8. Which WLAN component is commonly referred to as an STA?
• cell
• antenna
• access point
• wireless bridge
• wireless client
9. Which statement is true concerning an ad-hoc wireless network?• created by connecting wireless clients in a peer-to-peer network
• created by connecting wireless clients to a single, centralized AP• created by connecting multiple wireless basic service sets through a distribution system
• created by connecting wireless clients to a wired network using an ISR
10. Refer to the graphic. In the Wireless menu option of a Linksys integrated router, what does the Network Mode option Mixed mean?
• The router supports encryption and authentication.
• The router supports both wired and wireless connections.
• The router supports 802.11b, 802.11g, and 802.11n devices.
• The router supports connectivity through infrared and radio frequencies.11. Refer to the graphic. In the Wireless menu of a Linksys integrated router, what configuration option allows the presence of the access point to be known to nearby clients?
• Network Mode
• Network Name (SSID)
• Radio Band
• Wide Channel
• Standard Channel
• SSID Broadcast
12. Which two statements about a service set identifier (SSID) are true? (Choose two.)• tells a wireless device to which WLAN it belongs
• consists of a 32-character string and is not case sensitive• responsible for determining the signal strength
• all wireless devices on the same WLAN must have the same SSID
• used to encrypt data sent across the wireless network13. Which two statements characterize wireless network security? (Choose two.)
• Wireless networks offer the same security features as wired networks.
• Wardriving enhances security of wireless networks.
• With SSID broadcast disabled, an attacker must know the SSID to connect.
• Using the default IP address on an access point makes hacking easier.
• An attacker needs physical access to at least one network device to launch an attack.14. What type of authentication does an access point use by default?
• Open
• PSK• WEP
• EAP
15. Which statement is true about open authentication when it is enabled on an access point?
• requires no authentication
• uses a 64-bit encryption algorithm• requires the use of an authentication server
• requires a mutually agreed upon password
16. What are two authentication methods that an access point could use? (Choose two.)
• WEP
• WPA
• EAP
• ASCII• pre-shared keys
17. What is the difference between using open authentication and pre-shared keys?• Open authentication requires a password. Pre-shared keys do not require a password.
• Open authentication is used with wireless networks. Pre-shared keys are used with wired networks.
• Pre-shared keys require an encrypted secret word. Open authentication does not require a secret word.
• Pre-shared keys require a MAC address programmed into the access point. Open authentication does not require this programming.18. What term describes the encoding of wireless data to prevent intercepted data from being read by a hacker?
• address filtering
• authentication
• broadcasting
• encryption
• passphrase encoding19. What access-point feature allows a network administrator to define what type of data can enter the wireless network?
• encryption
• hacking block
• traffic filtering
• MAC address filtering• authentication
20. What are the two WEP key lengths? (Choose two.)
• 8 bit
• 16 bit
• 32 bit
• 64 bit
• 128 bit
21. Complete the following sentence: WEP is used to ______ , and EAP is used to _____ wireless networks.• encrypt; authenticate users on
• filter traffic; select the operating frequency for• identify the wireless network; compress data on
• create the smallest wireless network; limit the number of users on