Deck 8: Network Infrastructure and Troubleshooting
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/39
Play
Full screen (f)
Deck 8: Network Infrastructure and Troubleshooting
1

Examine the exhibit above.
Host B is sending an email intended for the user on Host A to the email server. What protocol is being used to send the message through the router?
A) None
B) SMTP
C) POP3
D) SNMP

Examine the exhibit above.
Host B is sending an email intended for the user on Host A to the email server. What protocol is being used to send the message through the router?
A) None
B) SMTP
C) POP3
D) SNMP
B
2
A server or service is responsible for sending the contents of cengage.com to your browser when you type cengage.com into the location bar. If this service is malfunctioning, your browser will display a page not found error.
What server provides this service?
A) Print server
B) File server
C) DNS server
D) Web server Web server
E) Authentication server
What server provides this service?
A) Print server
B) File server
C) DNS server
D) Web server Web server
E) Authentication server
D
3
You are tasked with securing a small network for a client in which the following requirements must be met:
• If a user on the private network attempts to send confidential company information to an unauthorized entity, an alert should be triggered.
• The private trusted network should not be accessible from the public untrusted network.
• If attacks are coming from the external network, the system should detect and prevent malicious activity.
• All incoming and outgoing email should be scanned for malware.
Which of the following would best meet the requirements of the client?
A) Implement a firewall.
B) Implement an IPS.
C) Implement a UTM appliance.
D) Implement identity-based ACLs.
E) Implement an IDS.
• If a user on the private network attempts to send confidential company information to an unauthorized entity, an alert should be triggered.
• The private trusted network should not be accessible from the public untrusted network.
• If attacks are coming from the external network, the system should detect and prevent malicious activity.
• All incoming and outgoing email should be scanned for malware.
Which of the following would best meet the requirements of the client?
A) Implement a firewall.
B) Implement an IPS.
C) Implement a UTM appliance.
D) Implement identity-based ACLs.
E) Implement an IDS.
C
4
Consider the following configuration.
Computer "A"
IP address: 172.16.100.100
Subnet mask: 255.255.0.0
Computer "B"
IP address: 172.16.200.200
Subnet mask: /16
What should be done to allow these computers to send and receive data to and from each other?
A) Nothing needs to be changed.
B) Delete the subnet mask from each computer.
C) A router must be configured and placed between the two computers.
D) Remove the hub between the two computers and replace it with a switch.
Computer "A"
IP address: 172.16.100.100
Subnet mask: 255.255.0.0
Computer "B"
IP address: 172.16.200.200
Subnet mask: /16
What should be done to allow these computers to send and receive data to and from each other?
A) Nothing needs to be changed.
B) Delete the subnet mask from each computer.
C) A router must be configured and placed between the two computers.
D) Remove the hub between the two computers and replace it with a switch.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
5
A company requires an Ethernet connection from the north end of its office building to the south end. The distance between connections is 161 meters and will need to provide speeds of up to 10 Gbps in full duplex mode.
Which of the following cable combinations will meet these requirements?
A) Coaxial cable with BNC connectors
B) Cat6 STP cable with RJ-45 connectors
C) Multimode fiber cable with MT-RJ connectors
D) Cat5e UTP cable with RJ-45 connectors
Which of the following cable combinations will meet these requirements?
A) Coaxial cable with BNC connectors
B) Cat6 STP cable with RJ-45 connectors
C) Multimode fiber cable with MT-RJ connectors
D) Cat5e UTP cable with RJ-45 connectors
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
6
A technician is installing UTP cable and needs to terminate the connections on the patch panel shown in the following image.

What tool should be used to terminate and complete this installation?
A) Crimper tool
B) Punchdown tool
C) Cable stripper
D) Network multimeter

What tool should be used to terminate and complete this installation?
A) Crimper tool
B) Punchdown tool
C) Cable stripper
D) Network multimeter
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
7
A server provides the necessary IP configuration to your network host so the host can communicate on the network. If this service malfunctions, your device will not be able to utilize the network.
What server provides this service?
A) DHCP server
B) DNS server
C) Proxy server
D) Syslog server
What server provides this service?
A) DHCP server
B) DNS server
C) Proxy server
D) Syslog server
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
8
You replaced the LCD panel in a laptop computer and verified full system functionality, including wireless connectivity. The customer picked up the laptop and now reports he can no longer access his wireless network regardless of how close the computer is positioned to the WAP. Other users can connect to the WAP without any problem.
Which of the following is the most likely reason for this problem?
A) The laptop wireless profile is still assigned to your office WLAN.
B) The user's WAP is powered off and needs to be turned on.
C) All wireless network profiles were deleted when the LCD was replaced.
D) The laptop's wireless radio is toggled to the off position.
E) The antenna wires were not reconnected after the LCD replacement.
Which of the following is the most likely reason for this problem?
A) The laptop wireless profile is still assigned to your office WLAN.
B) The user's WAP is powered off and needs to be turned on.
C) All wireless network profiles were deleted when the LCD was replaced.
D) The laptop's wireless radio is toggled to the off position.
E) The antenna wires were not reconnected after the LCD replacement.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
9
While assisting a Windows user over the phone, you need to determine the IP address for the DHCP server along with the MAC address of the Ethernet NIC. The user has successfully opened a command prompt.
What command will you have the user type at the command line to determine these two addresses?
A) ipconfig /all
B) tracert
C) ipconfig /release
D) ping
E) netstat
F) net use
What command will you have the user type at the command line to determine these two addresses?
A) ipconfig /all
B) tracert
C) ipconfig /release
D) ping
E) netstat
F) net use
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
10
You require a protocol in order for your Windows network hosts to have access to shared files and folders.
Which of the following protocols will provide the necessary file services? (Select TWO.)
A) CIFS
B) SNMP
C) SMTP
D) SLP
E) RDP
F) SMB
Which of the following protocols will provide the necessary file services? (Select TWO.)
A) CIFS
B) SNMP
C) SMTP
D) SLP
E) RDP
F) SMB
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
11
A technician has been dispatched to a client's office to diagnose wireless network issues and suspects that channel overlap may be the problem.
Which of the following tools will the technician use to help in determining whether her suspicions are correct?
A) Toner probe
B) Cable tester
C) Loopback plug
D) Wi-Fi analyzer
Which of the following tools will the technician use to help in determining whether her suspicions are correct?
A) Toner probe
B) Cable tester
C) Loopback plug
D) Wi-Fi analyzer
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
12
You are using a crimper to attach an RJ-45 connector to a Cat 6 UTP cable. Your company requires that all cabling follow the TIA/EIA 568B standard.
Which wire color code will you use starting with pin 1 of the modular plug?
A) Orange/white, orange, green/white, blue, blue/white, green, brown/white, brown
B) Green/white, green, orange/white, blue, blue/white, orange, brown/white, brown
C) Orange/white, orange, green/white, green, blue/white, blue, brown/white, brown
D) Green/white, green, orange/white, orange, blue/white, blue, brown/white, brown
Which wire color code will you use starting with pin 1 of the modular plug?
A) Orange/white, orange, green/white, blue, blue/white, green, brown/white, brown
B) Green/white, green, orange/white, blue, blue/white, orange, brown/white, brown
C) Orange/white, orange, green/white, green, blue/white, blue, brown/white, brown
D) Green/white, green, orange/white, orange, blue/white, blue, brown/white, brown
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
13

Examine the exhibit above.
Which network tool most likely produced the output?
A) Loopback plug
B) Tone generator
C) Tone probe
D) Network multimeter
E) Cable tester
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following is a function of an endpoint management server appliance?
A) Filtering the web content delivered to users on the local area network.
B) Scanning incoming and outgoing corporate email for spam, malware, and viruses.
C) Restricting a device's access to the network until security requirements are met.
D) Providing authentication services for all network-connected devices.
A) Filtering the web content delivered to users on the local area network.
B) Scanning incoming and outgoing corporate email for spam, malware, and viruses.
C) Restricting a device's access to the network until security requirements are met.
D) Providing authentication services for all network-connected devices.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
15
Your company is experiencing an increase in malware incidents. Your manager is asking for advice on how best to verify that company-owned workstations are up-to-date with security patches, anti-malware requirements, and software application updates. The manager is also concerned that employee-owned devices connecting to the corporate LAN have the same level of security as the company devices.
Which of the following protections and services should you recommend?
A) Implement a firewall with packet inspection.
B) Implement an intrusion detection system appliance.
C) Implement an endpoint management server appliance.
D) Implement an intrusion prevention system.
Which of the following protections and services should you recommend?
A) Implement a firewall with packet inspection.
B) Implement an intrusion detection system appliance.
C) Implement an endpoint management server appliance.
D) Implement an intrusion prevention system.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
16
You received a call from a user who brought her own device to the office but cannot find or connect to the company WLAN. The laptop shows other available wireless networks in the building. This user and the other users in her department are connected to the company WLAN and can browse to multiple websites with no problems from their company-assigned laptops.
Which of the following is the most likely reason the user cannot find the company WLAN from her own device?
A) The company WAP has its radio turned off.
B) The company WAP is powered down or disconnected.
C) The laptop's wireless network is toggled to the off position.
D) The company WAP has SSID broadcast disabled.
E) The user's laptop NIC has MAC address filtering enabled.
Which of the following is the most likely reason the user cannot find the company WLAN from her own device?
A) The company WAP has its radio turned off.
B) The company WAP is powered down or disconnected.
C) The laptop's wireless network is toggled to the off position.
D) The company WAP has SSID broadcast disabled.
E) The user's laptop NIC has MAC address filtering enabled.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following indicates the most concise abbreviation of the IPv6 address FEFE:0000:0000:0000:0002:0000:0000:0001?
A) FEFE::2::1
B) FEFE::0002:0000:0000:0001
C) FEFE::2:0:0:1
D) FEFE:0:0:0:2:0:0:1
E) ::1
A) FEFE::2::1
B) FEFE::0002:0000:0000:0001
C) FEFE::2:0:0:1
D) FEFE:0:0:0:2:0:0:1
E) ::1
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
18

Examine the exhibit above.
"Device A" is an 8-port layer 2 managed switch and "Device C" is a 4-port hub.
Which of the following describes "Device B," assuming all workstations can communicate with each under normal circumstances?
A) Layer 2 switch
B) Router
C) Bridge
D) Repeater
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
19
Your company received a call from a historical society inquiring about the possibility of networking a two-century-old building with no existing network. In 1924, someone added electrical outlets to the building, but the layout and design of the building prohibits adding any additional copper or fiber cable. You completed a wireless site survey and concluded that wireless networking is out of the question and will not properly function due to environmental interference.
Which of the following could be used to network this building?
A) PoE
B) EoP
C) WAP
D) NIC
E) NAT
Which of the following could be used to network this building?
A) PoE
B) EoP
C) WAP
D) NIC
E) NAT
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
20
A technician is troubleshooting a small network with cable Internet service in which a user is receiving a message in her web browser stating a site cannot be found. While interviewing users, it is determined that every host on the network is experiencing the same issue with all websites.
Which of the following is the first step in troubleshooting this issue?
A) Use a cable tester to test the patch cable for the first user who reported the issue.
B) Reboot the SOHO router connecting the LAN to the cable modem.
C) Call the Internet service provider and report the problem.
D) Replace the patch cable from the SOHO router to the cable modem.
E) Connect a computer directly to the cable modem and attempt to access the Internet.
Which of the following is the first step in troubleshooting this issue?
A) Use a cable tester to test the patch cable for the first user who reported the issue.
B) Reboot the SOHO router connecting the LAN to the cable modem.
C) Call the Internet service provider and report the problem.
D) Replace the patch cable from the SOHO router to the cable modem.
E) Connect a computer directly to the cable modem and attempt to access the Internet.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
21
You are troubleshooting a Windows workstation that is having problems communicating with the host at IP address 1.2.3.4.
What utility will you use at the command line to determine where the communication is stopping?
A) ipconfig /all
B) ping 1.2.3.4
C) tracert 1.2.3.4
D) netstat
What utility will you use at the command line to determine where the communication is stopping?
A) ipconfig /all
B) ping 1.2.3.4
C) tracert 1.2.3.4
D) netstat
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the following are secure protocols, ports, services, or applications? (Select TWO.)
A) SLP
B) Port 443
C) SMTP
D) SSH
E) Ports 161/162
A) SLP
B) Port 443
C) SMTP
D) SSH
E) Ports 161/162
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
23
Which of the following are valid IPv4 private IP addresses? (Select TWO.)
A) 10.20.30.40
B) 1.2.3.4
C) 192.168.256.12
D) 172.29.29.254
E) 1::9034:12:1:1:0
F) FEC2::AHBC:1908:0
A) 10.20.30.40
B) 1.2.3.4
C) 192.168.256.12
D) 172.29.29.254
E) 1::9034:12:1:1:0
F) FEC2::AHBC:1908:0
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
24
What methods are used to assign TCP/IP parameters to network hosts? (Select TWO.)
A) DNS
B) Dynamic
C) Static
D) Default gateway
E) Subnet mask
A) DNS
B) Dynamic
C) Static
D) Default gateway
E) Subnet mask
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
25
You are installing network cabling and require a cable solution that provides the best resistance to EMI.
Which of the following will you choose for this installation?
A) UTP
B) STP
C) Plenum
D) PVC
Which of the following will you choose for this installation?
A) UTP
B) STP
C) Plenum
D) PVC
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
26
A new Cat6 cable run and keystone jack were installed for a workstation that was moved from the sales department to the shipping department. Since the move, the user has been complaining of slow transfer speeds on both Internet and local network communications. The technician ran a test and is viewing the following output on the tester.

Which of the following is the most likely reason for the sluggish network speeds?
A) The cable run exceeds the specifications for Ethernet over twisted pair.
B) The NIC in the workstation is statically set to 10 Mbps/Half-duplex.
C) The network switch port is statically set to 10 Mbps/Half-duplex.
D) The ISP is experiencing issues with its service to this customer.

Which of the following is the most likely reason for the sluggish network speeds?
A) The cable run exceeds the specifications for Ethernet over twisted pair.
B) The NIC in the workstation is statically set to 10 Mbps/Half-duplex.
C) The network switch port is statically set to 10 Mbps/Half-duplex.
D) The ISP is experiencing issues with its service to this customer.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
27
A network host with an IP address of 192.168.10.200 wants to send a message to a destination computer with an assigned IP address of 192.168.10.100.
Which of the following will the sending host use to determine whether the destination computer is on its own network or another network?
A) DHCP server
B) Default gateway address
C) Subnet mask
D) DNS server
Which of the following will the sending host use to determine whether the destination computer is on its own network or another network?
A) DHCP server
B) Default gateway address
C) Subnet mask
D) DNS server
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
28
In which of the following situations should you install an IPS instead of an IDS?
A) You want to improve access times to frequently accessed websites.
B) You want to document any instance of malicious activity on your LAN.
C) You want to block a single MAC address from accessing your LAN.
D) You want to block unauthorized activity on your LAN from the Internet.
A) You want to improve access times to frequently accessed websites.
B) You want to document any instance of malicious activity on your LAN.
C) You want to block a single MAC address from accessing your LAN.
D) You want to block unauthorized activity on your LAN from the Internet.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
29
A server provides the services to take you to the correct website domain when you type cengage.com in your web browser. If this service were not functioning, you would have to remember the IP address for cengage.com.
What server performs this service?
A) DHCP server
B) Proxy server
C) Web server
D) DNS server
What server performs this service?
A) DHCP server
B) Proxy server
C) Web server
D) DNS server
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
30
While investigating an email issue, a support technician discovers no users can access their email accounts on the company's email server connected to the private LAN. Pinging the email server from several workstations on the LAN results in 0% packet loss.
Which of the following is the next step the technician should take in troubleshooting this issue?
A) Contact the ISP, inform the provider of the issue, and ask the provider to check the server.
B) Verify the server has a valid assigned IP address on the LAN subnet.
C) Escalate the problem to a server administrator to check for issues with the server.
D) Check the workstations on the LAN for APIPA configuration.
Which of the following is the next step the technician should take in troubleshooting this issue?
A) Contact the ISP, inform the provider of the issue, and ask the provider to check the server.
B) Verify the server has a valid assigned IP address on the LAN subnet.
C) Escalate the problem to a server administrator to check for issues with the server.
D) Check the workstations on the LAN for APIPA configuration.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
31
A coworker is asking for your advice on a problem with a computer that will not communicate on the network. While assisting the coworker, you suspect that the wired NIC may have failed.
Which of the following will you recommend to your coworker as the best tool to diagnose this issue? (Select TWO.)
A) Wi-Fi analyzer
B) Loopback plug
C) Network multimeter
D) Punchdown tool
E) Cable tester
Which of the following will you recommend to your coworker as the best tool to diagnose this issue? (Select TWO.)
A) Wi-Fi analyzer
B) Loopback plug
C) Network multimeter
D) Punchdown tool
E) Cable tester
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
32
The accounting department moved its network-attached printer from one side of the office to a more centralized location, making the printer much more accessible to all accounting users. Since the move, the users have not been able to print to the printer. The printer powers on and shows it is ready to accept print jobs. The printer configuration page shows the following output.

You disconnect the patch cable from the keystone jack at the new location and move the printer and cable to reconnect it at the original location. The printer begins printing the jobs that failed to print earlier.
Which of the following are the most likely reasons for the printer failing to print at the new location? (Select TWO.)
A) The DHCP server is down or has a problem with the DHCP service.
B) The cable run connecting the new keystone jack to the patch panel is bad.
C) The printer needs to have static IP configuration parameters assigned.
D) The printer does not have a valid default gateway assigned.
E) The patch panel connector for the new location's cable run is not connected to a switch.
F) The printer's integrated network interface controller is faulty.

You disconnect the patch cable from the keystone jack at the new location and move the printer and cable to reconnect it at the original location. The printer begins printing the jobs that failed to print earlier.
Which of the following are the most likely reasons for the printer failing to print at the new location? (Select TWO.)
A) The DHCP server is down or has a problem with the DHCP service.
B) The cable run connecting the new keystone jack to the patch panel is bad.
C) The printer needs to have static IP configuration parameters assigned.
D) The printer does not have a valid default gateway assigned.
E) The patch panel connector for the new location's cable run is not connected to a switch.
F) The printer's integrated network interface controller is faulty.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
33
Which of the following describes an IPv6 link -local address assigned to a node on a network?
A) An address used to deliver messages to all participating nodes in a multicast group with prefixes that begin with FF00::/8.
B) A private unicast address assigned by a DHCPv6 server used to communicate with neighboring nodes across subnets.
C) A global address that is routable on the public Internet and assigned by an Internet service provider.
D) A private unicast address used for limited communication with neighboring nodes in the same link.
A) An address used to deliver messages to all participating nodes in a multicast group with prefixes that begin with FF00::/8.
B) A private unicast address assigned by a DHCPv6 server used to communicate with neighboring nodes across subnets.
C) A global address that is routable on the public Internet and assigned by an Internet service provider.
D) A private unicast address used for limited communication with neighboring nodes in the same link.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
34
A technician has verified that a bad Cat6 cable run in the wall is responsible for a workstation's lack of communication on the network.
Which of the following tools can be used to pinpoint the location of the cable inside the wall?
A) Wi-Fi analyzer
B) Network multimeter
C) Cable tester
D) Toner probe
Which of the following tools can be used to pinpoint the location of the cable inside the wall?
A) Wi-Fi analyzer
B) Network multimeter
C) Cable tester
D) Toner probe
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
35
A technician wants to consolidate and log specific alerts from network devices into a database so maintenance tasks and potential device problems can be addressed in a timely manner.
Which of the following should the technician implement?
A) IDS appliance
B) Syslog server
C) IPS appliance
D) UTM appliance
Which of the following should the technician implement?
A) IDS appliance
B) Syslog server
C) IPS appliance
D) UTM appliance
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
36
A Windows user has been successfully saving documents to the file server all morning. However, the latest attempt resulted in the following message, "Could not find this item. Verify the location of '\\FileServer\Docs' and try again."
Which of the following is the most likely cause for this message?
A) The user signed out of directory services
B) The user's PC is out of local hard disk space.
C) The file server could not contact directory services.
D) The share to the file server is disconnected.
Which of the following is the most likely cause for this message?
A) The user signed out of directory services
B) The user's PC is out of local hard disk space.
C) The file server could not contact directory services.
D) The share to the file server is disconnected.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
37
The network icon in the notification area of a Windows 7 machine is displaying a yellow triangle with a black exclamation point indicating limited connectivity.
Checking the computer's network connection properties will most likely indicate which of the following single-assigned host IP addresses? (Select TWO.)
A) FE80::feba:123:8:9343
B) 192.168.0.1
C) 169.254.1.1
D) 2000:db08:1919:100:feba:123:8:9343
E) 10.0.0.1
F) 172.16.1.1
Checking the computer's network connection properties will most likely indicate which of the following single-assigned host IP addresses? (Select TWO.)
A) FE80::feba:123:8:9343
B) 192.168.0.1
C) 169.254.1.1
D) 2000:db08:1919:100:feba:123:8:9343
E) 10.0.0.1
F) 172.16.1.1
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
38
What is the purpose for the twists in twisted pair Ethernet cabling?
A) Increase the maximum cable distance.
B) Reduce crosstalk between wire pairs.
C) Decrease the signal strength over distance.
D) Increase fire resistance in ceiling cavities.
A) Increase the maximum cable distance.
B) Reduce crosstalk between wire pairs.
C) Decrease the signal strength over distance.
D) Increase fire resistance in ceiling cavities.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
39
A technician is working at a client's office after hours and needs two cables to finish the work but does not have immediate access to prebuilt cables. One cable needed is for a dial-up connection from the dial-up modem to the existing analog POTS jack on the wall. The other cable is for an Ethernet connection from the computer to the existing keystone jack on the wall. The technician has the necessary wire and connectors to make the cables.
Which of the following tools will the technician use to make the cables and then verify that they both work properly? (Select THREE.)
A) Crimper
B) Toner probe
C) Cable tester
D) Cable stripper
E) Punchdown tool
F) Loopback plug
Which of the following tools will the technician use to make the cables and then verify that they both work properly? (Select THREE.)
A) Crimper
B) Toner probe
C) Cable tester
D) Cable stripper
E) Punchdown tool
F) Loopback plug
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck