100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Network Troubleshooting and Tools (5.0) study set Questions with 100% Correct Answers Graded A+ | Verified | Latest Update 2024, Actual Complete Solutions ,Garanteed Distinction $7.99
Add to cart

Exam (elaborations)

Network Troubleshooting and Tools (5.0) study set Questions with 100% Correct Answers Graded A+ | Verified | Latest Update 2024, Actual Complete Solutions ,Garanteed Distinction

 9 views  0 purchase
  • Course
  • CompTIA
  • Institution
  • CompTIA

Network Troubleshooting and Tools (5.0) study set Questions with 100% Correct Answers Graded A+ | Verified | Latest Update 2024, Actual Complete Solutions ,Garanteed Distinction

Preview 4 out of 88  pages

  • August 2, 2024
  • 88
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • CompTIA
  • CompTIA
avatar-seller
AnswersCOM
100%
Network
Troubleshooting
and
Tools
(5.0)
study
set
A
client
reports
that
half
of
the
marketing
department
is
unable
to
access
network
resources.
The
technician
determines
that
the
switch
has
failed
and
needs
replacement.
What
would
be
the
MOST
helpful
in
regaining
connectivity?
VLAN
configuration
Network
diagram
Configuration
backup
Router
image
-
✔✔
Configuration
backup
If
you
have
a
configuration
backup
of
the
switch,
a
new
piece
of
hardware
(new
switch)
can
be
installed
quickly
and
the
configuration
can
be
restored
to
the
new
switch.
A
company
has
added
many
new
users
to
the
network
that
is
causing
an
increase
in
network
traffic
by
200%.
The
engineers'
original
projection
was
that
the
new
users
would
only
add
20-30%
more
network
traffic,
not
200%.
The
network
administrator
suspects
that
a
compromise
of
the
network
may
have
occurred.
What
should
the
network
administrator
have
done
previously
to
prevent
this
network
breach?
Create
VLANs
to
segment
the
network
traffic
Place
a
network
sniffer
on
segments
with
new
employees
Provide
end-user
awareness
and
training
for
employees
Ensure
best
practices
were
implemented
when
creating
new
user
accounts
-
✔✔
Provide
end-user
awareness
and
training
for
employees
With
new
employees
entering
a
company,
they
are
often
not
fully
aware
of
its
Internet
usage
policy
and
safe
Internet
practices.
Providing
end-user
awareness
and
training
for
new
employees
help
reduce
the
company's
vulnerability
to
malicious
entities
on
the
Internet.
A
company
is
experiencing
accessibility
issues
reaching
services
on
a
cloud-based
system.
What
monitoring
tools
should
be
used
to
locate
possible
outages?
Packet
analyzer
Protocol
analyzer
Network
sniffer
Network
analyzer
-
✔✔
Network
analyzer
A
network
analyzer
is
a
useful
tool,
helping
you
do
things
like
track
traffic
and
malicious
usage
on
the
network.
A
software
tool
like
Wireshark
is
a
network
analyzer
and
protocol
analyzer.
A
company
suffers
an
outage
due
to
a
bad
module
in
a
core
switch.
What
is
the
NEXT
step
to
conduct
troubleshooting? 100%
Gather
information,
start
at
the
top
of
the
OSI
model,
and
work
down
Establish
a
plan
of
action
to
solve
the
problem
Establish
a
theory,
identify
the
problem,
duplicate
the
problem,
test
the
theory,
and
repeat
Gather
information,
start
at
the
bottom
of
the
OSI
model,
and
work
up
-
✔✔
Establish
a
plan
of
action
to
solve
the
problem
The
troubleshooting
steps
are
to
(1)
Identify
the
problem,
(2)
Establish
a
theory
of
probable
cause,
(3)
Test
the
theory
to
determine
the
cause,
(4)
Establish
a
plan
of
action
to
resolve
the
problem
and
identify
potential
effects,
(5)
Implement
the
solution
or
escalate
as
necessary,
and
(6)
Verify
full
system
functionality
and
if
applicable
implement
preventative
measures.
Since
the
cause
of
the
problem
is
already
known
(a
bad
module),
we
can
skip
directly
to
establishing
a
plan
of
action
to
solve
the
problem.
A
customer's
email
service
is
not
sending
emails
anymore.
What
is
the
correct
order
that
you
should
follow
to
perform
the
troubleshooting
steps?
Implement
the
solution;
Verify
full
system
functionality;
Establish
a
theory
of
probable
cause;
Determine
if
any
recent
changes
have
been
made
to
the
server;
Document
findings,
actions,
and
outcomes;
Establish
a
plan
of
action
to
resolve
the
problem;
Test
the
theory
to
determine
the
cause;
Implement
preventative
measures
Determine
if
any
recent
changes
have
been
made
to
the
server;
Establish
a
theory
of
probable
cause;
Test
the
theory
to
determine
the
cause;
Establish
a
plan
of
action
to
resolve
the
problem;
Implement
the
solution;
Verify
full
system
functionality;
Implement
preventative
measures;
Document
findings,
actions,
and
outcomes
Determine
if
any
recent
changes
have
been
made
to
the
server;
Document
findings,
actions,
and
outcomes;
Establish
a
plan
of
action
to
re
-
✔✔
Determine
if
any
recent
changes
have
been
made
to
the
server;
Establish
a
theory
of
probable
cause;
Test
the
theory
to
determine
the
cause;
Establish
a
plan
of
action
to
resolve
the
problem;
Implement
the
solution;
Verify
full
system
functionality;
Implement
preventative
measures;
Document
findings,
actions,
and
outcomes
A
desktop
computer
is
connected
to
the
network
and
receives
an
APIPA
address
but
cannot
reach
the
VLAN
gateway
of
10.10.100.254.
Other
PCs
in
the
VLAN
subnet
can
reach
the
Internet.
What
is
the
MOST
likely
source
of
the
problem?
802.1q
is
configured
on
the
switch
port
APIPA
has
been
misconfigured
on
the
VLAN
Bad
SFP
in
the
PC's
10/100
NIC
OS
updates
have
not
been
installed
-
✔✔
802.1q
is
configured
on
the
switch
port
APIPA
addresses
are
self-configured
and
used
when
the
client
cannot
get
proper
IP
configuration
from
a
DHCP
server.
One
possible
source
of
this
problem
is
a
misconfigured
switch
port
that
the
computer
is 100%
connected
to.
The
802.1q
protocol
is
used
to
configure
VLAN
trunking
and
be
configured
on
the
trunk
port,
not
the
switch
port.
A
network
administrator
is
configuring
a
VLAN
across
multiple
switches.
The
administrator
wants
to
configure
the
VLAN
once
and
have
that
configuration
propagate
to
all
of
the
network
switches.
Which
of
the
following
should
the
administrator
do?
Configure
the
switches
to
utilize
IGRP
Implement
port
bonding
on
the
switches
Configure
the
switches
to
utilize
STP
Configure
the
switches
to
utilize
VTP
-
✔✔
Configure
the
switches
to
utilize
VTP
VLAN
Trunking
Protocol
(VTP)
shares
VLAN
information
to
all
switches
in
a
network.
VTP
enables
you
to
create
the
VLAN
only
on
a
single
switch.
That
switch
can
then
propagate
information
about
the
VLAN
to
every
other
switch
on
the
network
and
cause
other
switches
to
create
it.
A
network
administrator
is
noticing
slow
response
times
from
the
server
to
hosts
on
the
network.
After
adding
several
new
hosts,
the
administrator
realizes
that
CSMA/CD
results
in
network
slowness
due
to
congestion
at
the
server
NIC.
What
should
the
network
administrator
do?
Add
a
honeypot
to
reduce
traffic
to
the
server
Update
the
Ethernet
drivers
to
use
802.3
Add
additional
network
cards
to
the
server
Disable
CSMA/CD
on
the
network
-
✔✔
Add
additional
network
cards
to
the
server
Adding
dual
NICs
to
the
server
can
increase
the
bandwidth
at
the
server
and
minimize
congestion.
You
can
establish
load
balancing
between
the
two
cards
or
create
a
bonded
NIC
to
increase
the
throughput
by
combining
them
into
one
virtual
interface.
A
network
administrator
is
troubleshooting
an
issue
with
unstable
wireless
connections
in
a
residence
hall.
Users
on
the
first
and
second
floors
report
that
the
hall's
SSID
is
not
visible
in
the
evenings.
The
network
administrator
has
verified
that
the
wireless
system
is
operating
normally.
What
is
the
cause
of
the
issue
being
reported
by
the
users?
Internet
router
maintenance
is
scheduled
An
ARP
attack
is
underway
The
SSID
is
set
to
hidden
A
jammer
is
being
used
-
✔✔
Internet
router
maintenance
is
scheduled
a
jammer
being
used
would
show
some
possible
"wrong"
traffic
in
the
logs
of
the
wireless.
Internet
router
maintenance
would
simply
take
the
network
down
for
the
duration
of
the
update/maintenance. 100%
A
network
administrator
recently
set
up
a
network
computer
lab
and
discovered
some
connectivity
issues.
The
administrator
can
ping
the
fiber
uplink
interface,
but
none
of
the
new
PCs
plugged
into
the
switch
respond
to
ICMP
requests.
What
should
the
technician
do
next?
Check
if
there
are
link
lights
on
the
ports
Check
the
ports
on
the
switch
for
full-duplex
Check
to
see
if
port
security
is
enabled
Check
to
see
if
the
uplink
interface
is
configured
correctly
-
✔✔
Check
if
there
are
link
lights
on
the
ports
By
checking
the
link
lights
on
the
ports,
the
administrator
can
verify
if
there
is
any
activity
on
the
network,
if
the
ports
are
enabled,
and
if
the
Layer
1
components
are
working
correctly.
A
network
technician
discovers
an
issue
with
the
spanning
tree
on
the
core
switch.
Which
step
should
the
network
technician
perform
NEXT
when
troubleshooting
to
resolve
the
issue?
Test
a
theory
to
determine
the
cause
Escalate
to
a
senior
technician
Identify
the
symptoms
Establish
a
theory
of
probable
cause
-
✔✔
Establish
a
theory
of
probable
cause
The
troubleshooting
steps
are
to
(1)
Identify
the
problem,
(2)
Establish
a
theory
of
probable
cause,
(3)
Test
the
theory
to
determine
the
cause,
(4)
Establish
a
plan
of
action
to
resolve
the
problem
and
identify
potential
effects,
(5)
Implement
the
solution
or
escalate
as
necessary,
and
(6)
Verify
full
system
functionality
and
if
applicable
implement
preventative
measures.
Since
the
cause
of
the
problem
is
already
known
(a
bad
module),
we
can
skip
directly
to
establishing
a
plan
of
action
to
solve
the
problem.
A
network
technician
has
configured
a
point-to-point
interface
on
a
router.
Once
the
fiber
optic
cables
have
been
run,
though,
the
interface
will
not
come
up.
The
technician
has
cleaned
the
fiber
connectors
and
used
an
optical
power
meter
to
confirm
that
light
passes
in
both
directions
without
excessive
loss.
What
is
the
MOST
likely
cause
of
this
issue?
Wavelength
mismatch
Distance
limitation
Cross-talk
EMI
-
✔✔
Wavelength
mismatch
A
network
technician
is
connecting
three
temporary
office
trailers
with
a
point-to-multipoint
microwave
radio
solution
in
a
wooded
area.
The
microwave
radios
are
up
and
the
network
technician
can
ping
devices
in
all
office
trailers,
however,
connectivity
is
sporadic.
What
is
the
cause
of
this
issue?
Latency
Throttling
Interference
Split
Horizon
-
✔✔
Interference

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller AnswersCOM. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $7.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

50064 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$7.99
  • (0)
Add to cart
Added