32
Designing and Deploying Network Solutions for Small and Medium Business HPATA – Networks Study Guide Rev 1.1

Designing & Deploying Network Solutions - etrainIndiaetrainindia.com/doc/Study-Guide/HPATA-Net-Study-Guide.pdfDesigning & Deploying Network Solutions Study Guide 1 Table of Contents

Embed Size (px)

Citation preview

Designing and

Deploying Network

Solutions for Small

and Medium Business HPATA – Networks

Study Guide

Rev 1.1

Designing & Deploying Network Solutions

Study Guide 1

Table of Contents

1.1 Describe and recognize the most common Data Link protocols and their associated

physical connections (Layers 1 and 2) ................................................................................ 3

1.2 Describe Layer 3 routing concepts with detailed focus on IP ......................................... 4

1.3 Describe the common IP-based upper layer (Layers 5, 6, & 7) protocols and applications

......................................................................................................................................... 5

1.4 Describe multicast technology and how multicast traffic functions on a network ........... 6

2.1 Consult with an SMB customer to assess their business and technical needs and create a

plan for a networking solution ........................................................................................... 8

2.2 Design a networking solution to meet the customer needs identified in the planning

stage ................................................................................................................................. 9

3.1 Prepare for and install networking equipment ............................................................ 11

3.2 Install and configure management and administration solution .................................. 12

3.3 Validate installed solution .......................................................................................... 14

4.1 Manage network assets using HP and 3rd party tools ................................................. 16

4.2 Optimize L3 routing protocol convergence and scalability (RIP, RIPng, dynamic vs. static,

versions 1 and 2) ............................................................................................................. 17

4.3 Optimize network availability ..................................................................................... 18

4.4 Optimize and scale wireless network configuration .................................................... 19

4.5 Optimize security on wired/wireless networks and devices ......................................... 20

5.1 Troubleshoot routed and switched networks .............................................................. 22

5.2 Troubleshoot remote connectivity .............................................................................. 23

5.3 Troubleshoot Wireless networks ................................................................................. 25

5.4 Troubleshoot security faults and threats .................................................................... 26

5.5 Troubleshoot common network issues using the HP Troubleshooting methodology .... 27

6.1 Perform change management to network configuration and devices ........................... 29

6.2 Manage network events and policies .......................................................................... 30

6.3 Perform Network Administration tasks ....................................................................... 31

Designing & Deploying Network Solutions

Study Guide 2

Unit 1

Explain and Recognize Networking

technologies and their implications on

customer needs

1.1 Describe and recognize the most common Data Link protocols and

their associated physical connections (Layers 1 and 2)

1.2 Describe Layer 3 routing concepts with detailed focus on IP

1.3 Describe the common IP-based upper layer (Layers 5, 6, & 7) protocols

and applications

1.4 Describe multicast technology and how multicast traffic functions on a

network

Designing & Deploying Network Solutions

Study Guide 3

1.1 Describe and recognize the most common Data Link

protocols and their associated physical connections (Layers 1

and 2)

Question:

What is the primary reason to use a Layer 2 switch instead of a hub?

Answer choices:

A. To reduce collisions

B. To support multiple IP subnets

C. To implement dynamic IP addressing

D. To support NAT

Explanation:

The primary advantage to using a Layer 2 switch instead of a hub is to reduce collisions. A Layer 2

switch uses a media access control (MAC) table to determine which port to use as the destination for

a packet within a local area network (LAN). A hub simply broadcasts each packet to all devices

connected to it. All of the ports on a hub are part of the same collision domain. In a collision

domain, only one host can send at a time, and all other hosts must listen to avoid collisions. In a

Layer 2 switch, each port is connected to one host and is its own collision domain. A Layer 2 switch

can eliminate collisions.

You need to use a Layer 3 switch or a router to support multiple IP subnets. IP routing is performed

at Layer 3 of the Open Systems Interconnection (OSI) model.

You need to use a Dynamic Host Configuration Protocol (DHCP) server to implement dynamic IP

addressing. With dynamic IP addressing, you create scopes on the DHCP server that determine the

range from which addresses should be assigned. Clients that are configured to obtain their IP

configuration automatically, send out a broadcast to discover a DHCP server. The DHCP server

responds with an offer packet. The client can then request the address offered by the DHCP server.

You need to use a router to support Network Address Translation (NAT). NAT is used to allow

multiple hosts with private IP addresses to communicate on a public network. The NAT server

modifies the request so that it appears to come from a public address. It then forwards the response

to the appropriate private address.

Additional Information:

http://articles.techrepublic.com.com/5100-10878_11-5034317.html

http://technet.microsoft.com/en-us/library/bb726959.aspx

Designing & Deploying Network Solutions

Study Guide 4

1.2 Describe Layer 3 routing concepts with detailed focus on IP

Question:

Which of the following is a valid private address that supports communication throughout a

subnetted network?

Answer choices:

A. 127.200.191.1

B. 169.254.255.22

C. 192.169.1.1

D. 192.168.44.105

Explanation:

The address 192.168.44.105 is a valid private address. Private addresses can be used on

an internal network, but cannot be used to communicate on the Internet. Valid private

addresses are:

10.0.0.0/8 (10.0.0.1 to 10.255.255.254)

172.16.0.0/12 (172.16.0.1 to 172.31.255.254)

192.168.0.0/16 (192.168.0.1 to 192.168.255.254)

The address ranges can be subnetted as necessary for internal use.

You cannot have a network address that begins with 127, so 127.200.191.1 is not a valid

address. It is also outside of the private address ranges. Addresses beginning with 127 are

reserved for local loopback use.

The address 169.254.255.22 is an Automatic Private IP Addressing (APIPA) address. This

address range, 169.254.0.1 to 169.254.255.254, is used when a computer configured for

automatic IP address configuration is unable to lease an address and is not configured for

alternate addressing. A computer with an APIPA address can communicate on the local

subnet only.

The address 192.169.1.1 is not a valid private address because it falls out of the private

address range.

Additional Information:

http://technet.microsoft.com/en-us/library/cc958825.aspx

http://technet.microsoft.com/en-us/library/cc781931(WS.10).aspx

Designing & Deploying Network Solutions

Study Guide 5

1.3 Describe the common IP-based upper layer (Layers 5, 6, &

7) protocols and applications

Question:

Which protocol is implemented at the Application layer of the TCP model?

Answer choices:

A. TCP

B. FTP

C. IP

D. UTP

Explanation:

FTP (File Transfer Protocol) is implemented at the Application layer in the TCP model. The

TCP model is a four-layer model consisting of the Network Interface layer (lowest layer),

Internet layer, Transport layer, and Application layer. Other protocols implemented at the

application layer include Domain Name System (DNS) and Hypertext Transfer Protocol

(HTTP).

TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) are both

implemented at the Transport layer. A primary difference between the two is that TCP is a

connection-oriented transport protocol designed to guarantee data delivery while UDP is a

connectionless protocol with no guarantee of delivery.

IP (Internet Protocol) is implemented at the Internet layer and is primarily responsible for

addressing and routing. It is a connectionless protocol and operates underneath both TCP

and UDP.

Additional Information:

http://technet.microsoft.com/en-us/library/cc786900(WS.10).aspx

http://en.wikipedia.org/wiki/File_Transfer_Protocol

Designing & Deploying Network Solutions

Study Guide 6

1.4 Describe multicast technology and how multicast traffic

functions on a network

Question:

Which of the following is an IPv4 multicast address?

Answer choices:

A. ::1

B. 224.0.0.1

C. 127.0.0.1

D. FF00::1

Explanation:

224.0.0.1 is a valid IPv4 multicast address. The multicast address range is 224.0.0.0

through 239.255.255.255. For private multicast communications on a local area network

(LAN), the 239.192.0.0 address range is typically used with a subnet mask of 255.252.0.0.

127.0.0.1 is not a multicast address. It is the IPv4 local loopback address. A loopback

address is used for testing local communications. For example, when you run the following

command:

ping 127.0.0.1

The computer that executed the command will also respond to the ping. This verifies that

TCP/IP is loaded and working on the local machine.

::1 is not a multicast address. It is the IPv6 local loopback address. IPv6 is a TCP/IP revision.

One of the key changes is that IPv6 increases the address length from IPv4's 32 bits to 128

bits.

FF00::1 is not an IPv4 multicast address. It is an IPv6 multicast address.

Additional Information:

http://technet.microsoft.com/en-us/library/cc739600(WS.10).aspx

http://technet.microsoft.com/en-us/library/cc779122(WS.10).aspx

Designing & Deploying Network Solutions

Study Guide 7

Unit 2

Plan and design wired and wireless

network solutions for SMB customers

2.1 Consult with an SMB customer to assess their business and technical

needs and create a plan for a networking solution

2.2 Design a networking solution to meet the customer needs identified in

the planning stage

Designing & Deploying Network Solutions

Study Guide 8

2.1 Consult with an SMB customer to assess their business and

technical needs and create a plan for a networking solution

Question:

In which situation would you want to configure a virtual private network (VPN) for a

customer?

Answer choices:

A. A Web server needs to support public access as part of an e-commerce application.

B. Computers at different locations on a wide area network (WAN) need to act as if they

are on the same subnet.

C. Home-based telecommuters need intermittent connections over the Internet to the

internal network.

D. Wired and wireless network segments need to be connected.

Explanation:

You would use a VPN to support home-based telecommuters who need intermittent

connections over the Internet to the internal network. Users connect through the VPN server

and are authenticated by the network. Virtual private networking uses tunneling technology

to provide a secure communication path.

You would not use a VPN to configure public access for a Web server. In this situation, you

would create a perimeter network and deploy the Web server on the perimeter network.

You would not use a VPN to configure computers at different locations as a single logical

subnet. This is done by establishing a virtual LAN (VLAN).

You would not use a VPN to connect wired and wireless network segments. This requires a

wireless access point (WAP).

Additional Information:

http://technet.microsoft.com/en-us/library/cc725734(WS.10).aspx

http://technet.microsoft.com/en-us/library/dd458955(WS.10).aspx

Designing & Deploying Network Solutions

Study Guide 9

2.2 Design a networking solution to meet the customer needs

identified in the planning stage

Question:

Your customer wants to allow external users access to a specific Web server, but block

access to resources on its intranet.

What should you configure?

Answer choices:

E. A perimeter network

F. An extranet

G. A wide area network (WAN)

H. A virtual local area network (VLAN)

Explanation:

You should configure a perimeter network. A perimeter network, also known as a

demilitarized zone (DMZ), sits between your internal network and the Internet. You can

deploy servers into the perimeter network that external users can access and provide access

without opening up your internal network. A perimeter network is typically bounded by

firewalls between the perimeter network and the Internet and between the perimeter

network and the internal network.

You do not need to configure an extranet. An extranet is used to give select external users

access to local network resources.

You do not need to configure a WAN. A WAN is an interconnected private network with at

least one connection over a public carrier, such as a phone line or the Internet.

You do not need to configure a VLAN. A VLAN is a subnet configured through software and

can contain local computers, computers in different physical or geographic locations, or

both. The defining feature is that it creates a virtual, rather than physical, subnetwork.

Additional Information:

http://technet.microsoft.com/en-us/library/cc767224.aspx

http://searchnetworking.techtarget.com/generic/0,295582,sid7_gci1435022,00.html

Designing & Deploying Network Solutions

Study Guide 10

Unit 3

Install, configure, startup, and upgrade

the network solutions for SMB customers

3.1 Prepare for and install networking equipment

3.2 Install and configure management and administration solution

3.3 Validate installed solution

Designing & Deploying Network Solutions

Study Guide 11

3.1 Prepare for and install networking equipment

Question:

You add a new network segment to a customer's routed network, which has a single DHCP

server. There are no DHCP Relay agents on the network. All clients are configured for

dynamic addressing.

What do you need to enable on the router?

Answer choices:

A. RIP

B. OSPF

C. BOOTP forwarding

D. NAT

Explanation:

You need to enable BOOTP forwarding. A Dynamic Host Configuration Protocol (DHCP)

client uses a broadcast to lease an address. The client sends a DHCPDISCOVER packet as a

broadcast. Any listening DHCP server that has a scope that is configured with an address

range associated with the subnet where the client is located can respond with a DHCPOFFER

packet. The client can accept the offer packet by issuing a DHCPREQUEST broadcast that

informs all DHCP servers that the client is requesting the address offered. The DHCP server

issuing the address then sends a DHCPACK packet to acknowledge that the address has

been leased. Routers do not forward broadcasts by default. However, you can configure a

router to support BOOTP forwarding, which causes DHCP broadcasts to be forwarded. You

do not need to enable Routing Information Protocol (RIP). RIP is a dynamic routing protocol

and is not required for DHCP broadcasts to traverse multiple subnets.

You do not need to enable Open Shortest Path First (OSPF). OSPF is a dynamic routing

protocol and is not required for DHCP broadcasts to traverse multiple subnets.

You do not need to enable Network Address Translation (NAT). NAT allows multiple

computers with private addresses to access the Internet using a single public address. A

NAT device connects to the Internet using a public address and the internal network using a

private address.

Additional Information:

http://technet.microsoft.com/en-us/library/cc779610(WS.10).aspx

http://technet.microsoft.com/en-us/library/cc785385(WS.10).aspx

Designing & Deploying Network Solutions

Study Guide 12

3.2 Install and configure management and administration

solution

Question:

Your customer's network has the following subnets:

You need to subdivide the address 132.40.40.0/22 to allow for the required number of

hosts in each subnet.

Which addressing ranges should you use?

Answer choices:

A.

SubA: 132.40.41.0/23

SubB: 132.40.43.0/24

SubC: 132.40.44.128/25

B.

SubA: 132.40.41.0/24

SubB: 132.40.42.0/25

SubC: 132.40.43.0/26

C.

SubA: 132.40.40.0/23

SubB: 132.40.41.0/25

SubC: 132.40.42.128/26

D.

SubA: 132.40.40.0/23

SubB: 132.40.42.0/25

SubC: 132.40.42.128/26

Designing & Deploying Network Solutions

Study Guide 13

Explanation:

You should use the following address ranges:

SubA: 132.40.40.0/23

SubB: 132.40.42.0/25

SubC: 132.40.42.128/26

When using variable-length subnet masks (VLSM), you subdivide the network into multiple

networks that have different length network addresses. However, you must still make sure

the networks do not overlap. In this scenario you have a total of 10 bits to subdivide

between the subnet part of the address and the host part of the address. For SubA, you

need 280 addresses. The smallest subnet mask that can support 280 addresses in the

assigned range is a 23-bit subnet mask, which can support 510 addresses (2 to the power

of 9 - 2). By using the range 132.40.40.0/23, you specify that all address in the range

132.40.40.1 through 132.40.41.254 belong to the subnet. SubB requires 68 addresses,

which means that you must use at least 25 bits for the subnet mask, which supports 126

addresses (2 to the power of 7 - 2). You cannot overlap the range taken by SubA, so you

should use the range 132.40.42.0/25, which provides addresses in the range 132.40.42.1

through 132.40.42.127. SubC requires only 25 addresses. Therefore, you need to use a

subnet mask with at least 30 addresses (2 to the power of 5 - 2). This would be the /27

subnet. You can use any larger subnet as well. In this case, you can use the

132.40.42.128/26 subnet, which would provide 64 addresses from 132.40.42.129 through

132.40.42.191.

Additional Information:

http://technet.microsoft.com/en-us/library/cc739633(WS.10).aspx

Designing & Deploying Network Solutions

Study Guide 14

3.3 Validate installed solution

Question:

Which command would you use to view detailed TCP/IP configuration information on a

computer?

Answer choices:

A. netstat

B. nslookup

C. ipconfig

D. nbtstat

Explanation:

The ipconfig command provides detailed TCP/IP configuration information about a

computer. The specific features supported by ipconfig are somewhat Windows version-

specific, but in all cases you can view a configuration summary (ipconfig), view detailed

configuration (ipconfig /all), release a leased address (ipconfig /release), or attempt to lease

an address (ipconfig /renew).

When you choose to view detailed information, this includes:

Media state

IPv4 addresses

IPv6 addresses

Domain Name System (DNS) suffix

Dynamic Host Configuration Protocol (DHCP) configuration information.

The netstat command provides network status information, but does not provide detailed

configuration information for a specific computer. By default, the command provides

connection information showing local address, remote address, and connection status.

The nslookup command is used to test name server functionality and DNS servers.

The nbtstat command is used to display NetBIOS network statistics and current connections

using NetBIOS over TCP/IP. Running the command without any options displays an option

list.

Additional Information:

http://support.microsoft.com/kb/117662

Designing & Deploying Network Solutions

Study Guide 15

Unit 4

Optimize wireless, switched, and routed

network infrastructures for SMB

customers

4.1 Manage network assets using HP and 3rd party tools

4.2 Optimize L3 routing protocol convergence and scalability (RIP, RIPng,

dynamic vs. static, versions 1 and 2)

4.3 Optimize network availability

4.4 Optimize and scale wireless network configuration

4.5 Optimize security on wired/wireless networks and devices

Designing & Deploying Network Solutions

Study Guide 16

4.1 Manage network assets using HP and 3rd party tools

Question:

You need to add a device to a customer's network that will allow you to create virtual local

area networks (VLANs). You must be able to manage the device remotely.

Which device should you use?

Answer choices:

A. Unmanaged switch

B. Router

C. Hub

D. Managed switch

Explanation:

You should use a managed switch. A managed switch supports VLANs. They also support

remote monitoring and management using various interfaces, including Simple Network

Management Protocol (SNMP).

An unmanaged switch is typically Plug-and-Play. It does not support remote management or

VLANs.

A router is a Layer 3 device used to route traffic between IP subnets. Some routers support

remote management, but they do not support VLANs.

A hub is used to connect devices on the same segment using a physical star topology. A

hub does not support VLANs and does not require configuration.

Additional Information:

http://searchnetworking.techtarget.com/expert/KnowledgebaseAnswer/0,289625,sid7_gci1

081375_mem1,00.html

Designing & Deploying Network Solutions

Study Guide 17

4.2 Optimize L3 routing protocol convergence and scalability

(RIP, RIPng, dynamic vs. static, versions 1 and 2)

Question:

What is the role of routing protocols?

Answer choices:

A. To enable administrator updates to static routing tables

B. To display routing tables on remote routers

C. To dynamically update route information

D. To report packet errors

Explanation:

Routing protocols dynamically update route information. There are two basic types of

routing protocols: distance vector routing protocols and link state routing protocols.

Distance vector routing protocols determine the best routes based on the number of hops

(routers) between the source and destination. The most common implementations of

distance vector routing are Routing Information Protocol (RIP) and RIPv2.

Link state routing protocols include other factors, such as the transmission speed of

different links and traffic levels, when determining the best routes. Link state routing

protocols can also respond more quickly to network conditions than distance vector routing

protocols. Open Shortest Path First (OSPF) protocol is the most common protocol of this

type.

Routing protocols do not enable administrator updates to static routing tables. Static

updates are typically made through commands that are executed at the router. The

commands used are somewhat manufacturer and operating system specific.

Routing protocols do not display routing tables on remote routers. This also typically

requires using commands run on the router. For Windows computers that are configured as

routers, the route command can be used to view and manage route information.

Routing protocols do not report packet errors. Some routers will log this information

internally and use manufacturer and operating system specific commands and utilities to

retrieve the information.

Additional Information:

http://technet.microsoft.com/en-us/library/cc758398(WS.10).aspx

Designing & Deploying Network Solutions

Study Guide 18

4.3 Optimize network availability

Question:

Which routing topology would most likely continue carrying traffic to all locations even if

one communication path fails at a customer's site?

Answer choices:

A. Ring

B. Mesh

C. Bus

D. Star

Explanation:

A mesh topology would most likely continue carrying traffic to all locations even if one

communication path fails. This is because a mesh topology is characterized by multiple

paths between each node on the network. If one fails, an alternate path can be used to

bypass it.

A ring topology, depending on how it is configured, could fail if a data path is lost because

there is often only a single path between the computers. In some configurations, the

network might be able to heal itself by reversing the ring direction, but communication

speed would be significantly impaired.

In a bus topology, you have a single communication path. If it fails, none of the connected

nodes will be able to communicate.

If a communication path fails in a star configuration, it is likely that only the connected

device will be affected, but that device will be unable to exchange communications with the

rest of the network. The central hub also represents a potential point of failure.

Additional Information:

http://whatis.techtarget.com/definition/network-topologies.html

http://technet.microsoft.com/en-us/library/cc700841.aspx

Designing & Deploying Network Solutions

Study Guide 19

4.4 Optimize and scale wireless network configuration

Question:

You are installing an 802.11n wireless router on the first floor of a customer's location.

The laptop computer that you use to test the network from an office on the second floor is

reporting a low signal strength. The computer has an 802.11g wireless network adapter.

Which three steps can you take to optimize the signal strength? (Choose three.)

Answer choices:

A. Change to a different channel on the wireless router.

B. Disable frame aggregation on the wireless router.

C. Replace the computer's wireless adapter with an 802.11n adapter

D. Change the frequency of the wireless router to the 5 GHz band.

E. Install a wireless repeater.

Explanation:

You can change to a different channel on the wireless router. For example, wireless

routers sold in the United States support channels 1, 6, and 11.

You can change to a different frequency on the wireless router. 2.4 GHz is used by many

devices - 802.11n can use either the 2.4GHZ or the 5 GHz frequency.

You can also install a wireless repeater, which will boost the signal to remote areas of the

office location.

You should not disable frame aggregation on the wireless router to optimize the signal

strength. Frame aggregation is a feature that optimizes performance by decreasing the time

needed to transmit data.

You do not need to replace the computer's wireless adapter with an 802.11n adapter. An

802.11n router is compatible with an 802,11g adapter.

Additional Information:

http://en.wikipedia.org/wiki/IEEE_802.11

http://www.microsoft.com/athome/setup/wirelesstips.aspx

Designing & Deploying Network Solutions

Study Guide 20

4.5 Optimize security on wired/wireless networks and devices

Question:

Which two steps should you take to optimize security for your wireless network? (Choose

two.)

Answer choices:

A. Use the 5 GHz band on your wireless router.

B. Use Standard Wired Equivalent Privacy (WEP).

C. Use Wi-Fi Protected Access 2 (WPA2).

D. Configure each wireless access point (AP) to suppress its Service Set Identifier (SSID).

Explanation:

You should configure each wireless AP to suppress its SSID. Doing this will avoid

broadcasting your wireless network ID to the public.

You should use WPA2. This is the most secure method.

Using the 5 GHz band on your wireless router will not secure your wireless network, but

doing so may help reduce interference with other devices - 2.4 GHz is used by many

devices,

You should not use WEP. This is the least secure method.

Additional Information:

http://technet.microsoft.com/en-us/library/bb457091.aspx

Designing & Deploying Network Solutions

Study Guide 21

Unit 5

Troubleshoot wireless, switched, and

routed network infrastructures for SMB

customers

5.1 Troubleshoot routed and switched networks

5.2 Troubleshoot remote connectivity

5.3 Troubleshoot Wireless networks

5.4 Troubleshoot security faults and threats

5.5 Troubleshoot common network issues using the HP Troubleshooting

methodology

Designing & Deploying Network Solutions

Study Guide 22

5.1 Troubleshoot routed and switched networks

Question:

After you start up a computer at a customer's site, the computer is unable to communicate

with any other computers on the network. The computer has an IP address of

169.254.19.21.

What is most likely wrong?

Answer choices:

A. The computer cannot locate a Domain Controller.

B. The computer cannot locate a Domain Name System (DNS) server.

C. The computer cannot locate a Dynamic Host Configuration Protocol (DHCP) server.

D. The computer cannot locate a Windows Internet Name Service (WINS) server.

Explanation:

The most likely problem is that the computer cannot locate a DHCP server. The address

given, 169.254.19.21, is in the Automatic Private IP Addressing (APIPA) range of

169.254.0.1 to 169.254.255.254.

Unless configured with an alternate address, a computer configured to receive a dynamic

address will configure itself with an address from the APIPA address range if it is unable to

lease an address from a DHCP server. A computer with an APIPA address can only

communicate with other computers on the same subnet that have APIPA addresses.

The problem is not related to finding a DNS server. A DNS server is used for host name and

IP address resolution. A missing DNS server will not prevent IP address assignment.

The problem is not related to finding a WINS Server. WINS is used for managing NetBIOS

machine names and is rarely used in modern network configurations.

The problem is not related to locating a Domain Controller. Inability to locate a Domain

Controller can lead to server problems, but address assignment is not one of them. Instead,

you would see problems such as being unable to log onto a domain.

Additional Information:

http://technet.microsoft.com/en-us/library/cc780760(WS.10).aspx

Designing & Deploying Network Solutions

Study Guide 23

5.2 Troubleshoot remote connectivity

Question:

You recently deployed Windows Server 2008 R2 at the central office of one of your

customers.

The company has a branch office, which is connected to the central office through a virtual

private network (VPN) tunnel. The company's network is configured as shown in the

illustration below. Both the routers, A and B, have dynamic routing enabled.

None of the client computers at the branch office are able to access the central server for

running remote applications hosted on the server. From a client computer at the branch

office, you can ping router A and router B, but not the central server.

What should you do to resolve the problem?

Answer choices:

A. Assign the default gateway for the central office server as 172.16.16.1.

B. Assign the default gateway for the central office server as 172.16.8.2.

C. Assign the default gateway for the client computers as 172.16.16.2.

D. Assign the default gateway for the client computers as 172.16.8.1.

Designing & Deploying Network Solutions

Study Guide 24

Explanation:

You should assign the default gateway for the central office server as 172.16.8.2, because

only then will the client computers be able to communicate with the central server. To make

the central server and client computers communicate, the local IP address of router A

should be configured as the default gateway for the central office server. All client

computers have their default gateway as the local IP address of router B, that is, 17.16.24.1.

Routers A and B have dynamic routing enabled, so they have each other's IP addresses in

their respective routing tables. Router A will forward requests to the central office server.

When the central office server tries to respond to the request, it will not find the next device

to forward the request to, as the default gateway on the central office server is 172.16.16.2.

Therefore, you will have to change the default gateway of the central office server to

172.16.8.2, which is the local IP address of router A.

You should not assign the default gateway for the central office server as 172.16.16.1,

because this is the IP address for router B to communicate with router A. Therefore, this IP

address will be present in the routing table of router A.

You should not assign the default gateway for the client computers as 172.16.16.2, because

this is the IP address for router A to communicate with router B. Therefore, this IP address

will be present in the routing table of router B.

You will not assign the default gateway for the client computers as 172.16.8.1, because this

IP address is assigned to the central office server and is present in the routing table of

router A. This IP address is used by router A to forward requests to the central office server.

Additional Information:

http://technet.microsoft.com/en-us/library/bb727001.aspx

Designing & Deploying Network Solutions

Study Guide 25

5.3 Troubleshoot Wireless networks

Question:

You try to connect to the wireless network at the office of one of your customers after using

your laptop computer at a coffee shop, but you cannot connect.

What are the two most likely causes of this? (Choose two.)

Answer choices:

A. Your Service Set Identifier (SSID) is mismatched between the laptop computer and the

router.

B. Your laptop computer needs a static IP address.

C. Your laptop computer needs the IP address renewed.

D. Your laptop computer's signal antenna is damaged.

Explanation:

If the SSIDs are mismatched, then you cannot authenticate to the wireless router,

Your laptop computer may still be using the IP address from the coffee shop - releasing and

then acquiring a new IP address should solve the problem.

You do not need to configure a static address to connect to a wireless router - most routers

use DHCP to connect devices.

The antenna could be damaged, but since it worked at the coffee shop, this is not the most

likely cause.

Additional Information:

http://searchnetworking.techtarget.com/news/945257/Wireless-network-troubleshooting-

Connectivity

Designing & Deploying Network Solutions

Study Guide 26

5.4 Troubleshoot security faults and threats

Question:

You are troubleshooting a communication problem that has occurred between your

customer's home office and a remote branch. Recently, you enabled MD5 authentication on

the routers that are running Routing Information Protocol (RIP).

What are the two most likely reasons that communications are failing? (Choose two.)

Answer choices:

A. The key chain names are mismatched.

B. The key chain identification numbers are mismatched.

C. The key string is different between the routers.

D. The routers need to be rebooted for changes to take effect.

Explanation:

The key chain identifier and key string must match between the routers.

The key chain name can be different on the two routers.

Changes in routers take place in real-time, so a reboot is not necessary.

Additional Information:

http://www.cisco.com/en/US/tech/tk365/technologies_configuration_example09186a0080

093f1c.shtml

Designing & Deploying Network Solutions

Study Guide 27

5.5 Troubleshoot common network issues using the HP

Troubleshooting methodology

Question:

A customer's Windows computer is configured to automatically receive an IP address and it

also has Automatic Private IP Addressing (APIPA) enabled.

You use the ipconfig command to view the TCP/IP settings on the computer and discover

that it has an IP address of 0.0.0.0.

What is most likely wrong?

Answer choices:

A. The network Dynamic Host Configuration Protocol (DHCP) server is down.

B. The TCP/IP protocol suite did not initialize during startup.

C. Windows cannot detect a connection to the network media.

D. There is no Windows Internet Name Service (WINS) server available.

Explanation:

The most likely problem is that Windows cannot detect a connection to the network

media. An unknown address (0.0.0.0) is assigned to the network adapter when the network

is not detected.

The problem is likely not with the DHCP server. Because APIPA is enabled, if the DHCP server

is not available, the computer would have an address in the format 169.254.xxx.xxx.

The problem is not that the TCP/IP protocol did not initialize. If the protocol did not

initialize, your computer would not be able to report any kind of TCP/IP information.

WINS has no part in dynamic address configuration. It is used for NetBIOS name resolution.

Additional Information:

http://technet.microsoft.com/en-us/library/cc940095.aspx

Designing & Deploying Network Solutions

Study Guide 28

Unit 6

Perform administrative, operational, and

network management tasks for SMB

customers

6.1 Perform change management to network configuration and devices

6.2 Manage network events and policies

6.3 Perform Network Administration tasks

Designing & Deploying Network Solutions

Study Guide 29

6.1 Perform change management to network configuration and

devices

Question:

One of your customers asks you to update the IOS Version of its routers.

What three steps should you take before you do the update? (Choose three.)

Answer choices:

A. Document the existing IOS Versions on each router.

B. Purchase additional routers in case the update fails.

C. Research the impact on the company if down time will be necessary to complete the

upgrade.

D. Have a backup plan ready if the upgrade is unsuccessful.

E. Monitor the I/O performance on all routers.

Explanation:

Documenting existing versions of the IOS is a key step of change management.

Researching downtime is also an important step.

Having a backup plan in case the upgrade causes problems is also recommended.

Purchasing equipment is not recommended because the new equipment should not be

needed and may not have the correct version of IOS software you are using.

Monitoring router performance is a good practice, but doing so is not necessary during an

IOS upgrade.

Additional Information:

http://www.itsm.info/ITSM%20Change%20Management%20Best%20Practices.pdf

Designing & Deploying Network Solutions

Study Guide 30

6.2 Manage network events and policies

Question:

Which device should you use for a customer who wants to prevent traffic destined for a

specific port from being received from the Internet?

Answer choices:

A. Switch

B. Bridge

C. IDS

D. Firewall

Explanation:

A firewall is used to prevent traffic destined for a specific port from traveling between one

network and another. You can create firewall rules that allow or disallow traffic sent or

received on a specific port. A firewall can be implemented using a hardware device or

software.

A switch is a device used to connect networks. A switch can operate at Layer 2 or Layer 3 of

the Open Systems Interconnect (OSI) model. Although some switches can include firewall

functionality, it is the firewall that is filtering the traffic, not the switch.

A bridge is a Layer 2 device that is used to connect two networks that use the same access

method. For example, it can be used to connect an Ethernet network to a different Ethernet

network. It does not filter traffic.

An Intrusion Detection System (IDS) watches for patterns that indicate that an attack is

underway. An IDS does not filter traffic sent between networks.

Additional Information:

http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci212125,00.html

Designing & Deploying Network Solutions

Study Guide 31

6.3 Perform Network Administration tasks

Question:

Which type of firewall filtering would you configure for a customer to filter traffic based on

packet content?

Answer choices:

A. Stateful inspection

B. Intrusion detection

C. Application-level

D. Port and address

Explanation:

Application-level filtering filters traffic based on packet content. The firewall opens the

packets and inspects the content to determine whether or not to pass the packet. The

Windows internal firewall does not support this feature, but most external firewalls

designed for business applications do support application-level filtering.

Port and address filtering does not filter traffic based on content, but instead based on

source and destination. This is the most common filtering method.

Stateful inspection filtering allows or blocks packets based on access policy, not on packet

content.

Intrusion detection is not a filtering method. It is a monitoring process used to detect

attempted attacks. Intrusion detection detects attacks based on traffic characteristics,

referred to as the attack signature, and generates an alert so that appropriate action can be

taken.

Additional Information:

http://searchsoftwarequality.techtarget.com/sDefinition/0,,sid92_gci1188694,00.html