hpata net study guide
TRANSCRIPT
-
8/10/2019 HPATA Net Study Guide
1/32
Designing and
Deploying Network
Solutions for Smalland Medium BusinessHPATA Networks
Study Guide
Rev 1.1
-
8/10/2019 HPATA Net Study Guide
2/32
Designing & Deploying Network Solutions
Study Guide 1
Table of Contents1.1 Describe and recognize the most common Data Link protocols and their associated
physical connections (Layers 1 and 2) ................................................................................ 3
1.2 Describe Layer 3 routing concepts with detailed focus on IP ......................................... 4
1.3 Describe the common IP-based upper layer (Layers 5, 6, & 7) protocols and applications ......................................................................................................................................... 5
1.4 Describe multicast technology and how multicast traffic functions on a network ........... 6
2.1 Consult with an SMB customer to assess their business and technical needs and create a
plan for a networking solution ........................................................................................... 8
2.2 Design a networking solution to meet the customer needs identified in the planning
stage ................................................................................................................................. 9
3.1 Prepare for and install networking equipment ............................................................ 11
3.2 Install and configure management and administration solution .................................. 123.3 Validate installed solution .......................................................................................... 14
4.1 Manage network assets using HP and 3rd party tools ................................................. 16
4.2 Optimize L3 routing protocol convergence and scalability (RIP, RIPng, dynamic vs. static,
versions 1 and 2) ............................................................................................................. 17
4.3 Optimize network availability ..................................................................................... 18
4.4 Optimize and scale wireless network configuration .................................................... 19
4.5 Optimize security on wired/wireless networks and devices ......................................... 20
5.1 Troubleshoot routed and switched networks .............................................................. 22
5.2 Troubleshoot remote connectivity .............................................................................. 23
5.3 Troubleshoot Wireless networks ................................................................................. 25
5.4 Troubleshoot security faults and threats .................................................................... 26
5.5 Troubleshoot common network issues using the HP Troubleshooting methodology .... 27
6.1 Perform change management to network configuration and devices ........................... 29
6.2 Manage network events and policies .......................................................................... 30
6.3 Perform Network Administration tasks ....................................................................... 31
-
8/10/2019 HPATA Net Study Guide
3/32
Designing & Deploying Network Solutions
Study Guide 2
Unit 1Explain and Recognize Networking
technologies and their implications oncustomer needs
1.1 Describe and recognize the most common Data Link protocols and
their associated physical connections (Layers 1 and 2)
1.2 Describe Layer 3 routing concepts with detailed focus on IP
1.3 Describe the common IP-based upper layer (Layers 5, 6, & 7) protocols
and applications
1.4 Describe multicast technology and how multicast traffic functions on a
network
-
8/10/2019 HPATA Net Study Guide
4/32
Designing & Deploying Network Solutions
Study Guide 3
1.1 Describe and recognize the most common Data Linkprotocols and their associated physical connections (Layers 1and 2)
Question:What is the primary reason to use a Layer 2 switch instead of a hub?
Answer choices:A. To reduce collisions
B. To support multiple IP subnets
C. To implement dynamic IP addressing
D. To support NAT
Explanation:
The primary advantage to using a Layer 2 switch instead of a hub is to reduce collisions. A Layer 2switch uses a media access control (MAC) table to determine which port to use as the destination for
a packet within a local area network (LAN). A hub simply broadcasts each packet to all devices
connected to it. All of the ports on a hub are part of the same collision domain. In a collision
domain, only one host can send at a time, and all other hosts must listen to avoid collisions. In a
Layer 2 switch, each port is connected to one host and is its own collision domain. A Layer 2 switch
can eliminate collisions.
You need to use a Layer 3 switch or a router to support multiple IP subnets. IP routing is performed
at Layer 3 of the Open Systems Interconnection (OSI) model.
You need to use a Dynamic Host Configuration Protocol (DHCP) server to implement dynamic IPaddressing. With dynamic IP addressing, you create scopes on the DHCP server that determine the
range from which addresses should be assigned. Clients that are configured to obtain their IP
configuration automatically, send out a broadcast to discover a DHCP server. The DHCP server
responds with an offer packet. The client can then request the address offered by the DHCP server.
You need to use a router to support Network Address Translation (NAT). NAT is used to allow
multiple hosts with private IP addresses to communicate on a public network. The NAT server
modifies the request so that it appears to come from a public address. It then forwards the response
to the appropriate private address.
Additional Information:
http://articles.techrepublic.com.com/5100-10878_11-5034317.html
http://technet.microsoft.com/en-us/library/bb726959.aspx
http://articles.techrepublic.com.com/5100-10878_11-5034317.htmlhttp://technet.microsoft.com/en-us/library/bb726959.aspxhttp://technet.microsoft.com/en-us/library/bb726959.aspxhttp://articles.techrepublic.com.com/5100-10878_11-5034317.html -
8/10/2019 HPATA Net Study Guide
5/32
Designing & Deploying Network Solutions
Study Guide 4
1.2 Describe Layer 3 routing concepts with detailed focus on IP
Question:Which of the following is a valid private address that supports communication throughout a
subnetted network?
Answer choices:A. 127.200.191.1
B. 169.254.255.22
C. 192.169.1.1
D. 192.168.44.105
Explanation:The address 192.168.44.105 is a valid private address. Private addresses can be used on
an internal network, but cannot be used to communicate on the Internet. Valid privateaddresses are:
10.0.0.0/8 (10.0.0.1 to 10.255.255.254)
172.16.0.0/12 (172.16.0.1 to 172.31.255.254)
192.168.0.0/16 (192.168.0.1 to 192.168.255.254)
The address ranges can be subnetted as necessary for internal use.
You cannot have a network address that begins with 127, so 127.200.191.1 is not a valid
address. It is also outside of the private address ranges. Addresses beginning with 127 are
reserved for local loopback use.
The address 169.254.255.22 is an Automatic Private IP Addressing (APIPA) address. This
address range, 169.254.0.1 to 169.254.255.254, is used when a computer configured for
automatic IP address configuration is unable to lease an address and is not configured for
alternate addressing. A computer with an APIPA address can communicate on the local
subnet only.
The address 192.169.1.1 is not a valid private address because it falls out of the private
address range.
Additional Information:
http://technet.microsoft.com/en-us/library/cc958825.aspx
http://technet.microsoft.com/en-us/library/cc781931(WS.10).aspx
http://technet.microsoft.com/en-us/library/cc958825.aspxhttp://technet.microsoft.com/en-us/library/cc781931(WS.10).aspxhttp://technet.microsoft.com/en-us/library/cc781931(WS.10).aspxhttp://technet.microsoft.com/en-us/library/cc958825.aspx -
8/10/2019 HPATA Net Study Guide
6/32
Designing & Deploying Network Solutions
Study Guide 5
1.3 Describe the common IP-based upper layer (Layers 5, 6, &7) protocols and applications
Question:
Which protocol is implemented at the Application layer of the TCP model?
Answer choices:A. TCP
B. FTP
C. IP
D. UTP
Explanation:FTP(File Transfer Protocol) is implemented at the Application layer in the TCP model. The
TCP model is a four-layer model consisting of the Network Interface layer (lowest layer),Internet layer, Transport layer, and Application layer. Other protocols implemented at the
application layer include Domain Name System (DNS) and Hypertext Transfer Protocol
(HTTP).
TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) are both
implemented at the Transport layer. A primary difference between the two is that TCP is a
connection-oriented transport protocol designed to guarantee data delivery while UDP is a
connectionless protocol with no guarantee of delivery.
IP (Internet Protocol) is implemented at the Internet layer and is primarily responsible foraddressing and routing. It is a connectionless protocol and operates underneath both TCP
and UDP.
Additional Information:
http://technet.microsoft.com/en-us/library/cc786900(WS.10).aspx
http://en.wikipedia.org/wiki/File_Transfer_Protocol
http://technet.microsoft.com/en-us/library/cc786900(WS.10).aspxhttp://en.wikipedia.org/wiki/File_Transfer_Protocolhttp://en.wikipedia.org/wiki/File_Transfer_Protocolhttp://technet.microsoft.com/en-us/library/cc786900(WS.10).aspx -
8/10/2019 HPATA Net Study Guide
7/32
Designing & Deploying Network Solutions
Study Guide 6
1.4 Describe multicast technology and how multicast trafficfunctions on a network
Question:
Which of the following is an IPv4 multicast address?
Answer choices:A. ::1
B. 224.0.0.1
C. 127.0.0.1
D. FF00::1
Explanation:224.0.0.1is a valid IPv4 multicast address. The multicast address range is 224.0.0.0
through 239.255.255.255. For private multicast communications on a local area network(LAN), the 239.192.0.0 address range is typically used with a subnet mask of 255.252.0.0.
127.0.0.1 is not a multicast address. It is the IPv4 local loopback address. A loopback
address is used for testing local communications. For example, when you run the following
command:
ping 127.0.0.1
The computer that executed the command will also respond to the ping. This verifies that
TCP/IP is loaded and working on the local machine.
::1 is not a multicast address. It is the IPv6 local loopback address. IPv6 is a TCP/IP revision.
One of the key changes is that IPv6 increases the address length from IPv4's 32 bits to 128
bits.
FF00::1 is not an IPv4 multicast address. It is an IPv6 multicast address.
Additional Information:
http://technet.microsoft.com/en-us/library/cc739600(WS.10).aspx
http://technet.microsoft.com/en-us/library/cc779122(WS.10).aspx
http://technet.microsoft.com/en-us/library/cc739600(WS.10).aspxhttp://technet.microsoft.com/en-us/library/cc779122(WS.10).aspxhttp://technet.microsoft.com/en-us/library/cc779122(WS.10).aspxhttp://technet.microsoft.com/en-us/library/cc779122(WS.10).aspxhttp://technet.microsoft.com/en-us/library/cc739600(WS.10).aspx -
8/10/2019 HPATA Net Study Guide
8/32
Designing & Deploying Network Solutions
Study Guide 7
Unit 2Plan and design wired and wireless
network solutions for SMB customers2.1 Consult with an SMB customer to assess their business and technical
needs and create a plan for a networking solution
2.2 Design a networking solution to meet the customer needs identified in
the planning stage
-
8/10/2019 HPATA Net Study Guide
9/32
Designing & Deploying Network Solutions
Study Guide 8
2.1 Consult with an SMB customer to assess their business andtechnical needs and create a plan for a networking solution
Question:
In which situation would you want to configure a virtual private network (VPN) for acustomer?
Answer choices:A. A Web server needs to support public access as part of an e-commerce application.
B. Computers at different locations on a wide area network (WAN) need to act as if they
are on the same subnet.
C. Home-based telecommuters need intermittent connections over the Internet to the
internal network.
D. Wired and wireless network segments need to be connected.
Explanation:You would use a VPN to support home-based telecommuterswho need intermittent
connections over the Internet to the internal network. Users connect through the VPN server
and are authenticated by the network. Virtual private networking uses tunneling technology
to provide a secure communication path.
You would not use a VPN to configure public access for a Web server. In this situation, you
would create a perimeter network and deploy the Web server on the perimeter network.
You would not use a VPN to configure computers at different locations as a single logicalsubnet. This is done by establishing a virtual LAN (VLAN).
You would not use a VPN to connect wired and wireless network segments. This requires a
wireless access point (WAP).
Additional Information:
http://technet.microsoft.com/en-us/library/cc725734(WS.10).aspx
http://technet.microsoft.com/en-us/library/dd458955(WS.10).aspx
http://technet.microsoft.com/en-us/library/cc725734(WS.10).aspxhttp://technet.microsoft.com/en-us/library/dd458955(WS.10).aspxhttp://technet.microsoft.com/en-us/library/dd458955(WS.10).aspxhttp://technet.microsoft.com/en-us/library/dd458955(WS.10).aspxhttp://technet.microsoft.com/en-us/library/cc725734(WS.10).aspx -
8/10/2019 HPATA Net Study Guide
10/32
-
8/10/2019 HPATA Net Study Guide
11/32
Designing & Deploying Network Solutions
Study Guide 10
Unit 3Install, configure, startup, and upgrade
the network solutions for SMB customers3.1 Prepare for and install networking equipment
3.2 Install and configure management and administration solution
3.3 Validate installed solution
-
8/10/2019 HPATA Net Study Guide
12/32
Designing & Deploying Network Solutions
Study Guide 11
3.1 Prepare for and install networking equipment
Question:You add a new network segment to a customer's routed network, which has a single DHCP
server. There are no DHCP Relay agents on the network. All clients are configured for
dynamic addressing.
What do you need to enable on the router?
Answer choices:A. RIP
B. OSPF
C. BOOTP forwarding
D. NAT
Explanation:You need to enable BOOTP forwarding. A Dynamic Host Configuration Protocol (DHCP)
client uses a broadcast to lease an address. The client sends a DHCPDISCOVER packet as a
broadcast. Any listening DHCP server that has a scope that is configured with an address
range associated with the subnet where the client is located can respond with a DHCPOFFER
packet. The client can accept the offer packet by issuing a DHCPREQUEST broadcast that
informs all DHCP servers that the client is requesting the address offered. The DHCP server
issuing the address then sends a DHCPACK packet to acknowledge that the address has
been leased. Routers do not forward broadcasts by default. However, you can configure a
router to support BOOTP forwarding, which causes DHCP broadcasts to be forwarded. Youdo not need to enable Routing Information Protocol (RIP). RIP is a dynamic routing protocol
and is not required for DHCP broadcasts to traverse multiple subnets.
You do not need to enable Open Shortest Path First (OSPF). OSPF is a dynamic routing
protocol and is not required for DHCP broadcasts to traverse multiple subnets.
You do not need to enable Network Address Translation (NAT). NAT allows multiple
computers with private addresses to access the Internet using a single public address. A
NAT device connects to the Internet using a public address and the internal network using a
private address.
Additional Information:
http://technet.microsoft.com/en-us/library/cc779610(WS.10).aspx
http://technet.microsoft.com/en-us/library/cc785385(WS.10).aspx
http://technet.microsoft.com/en-us/library/cc779610(WS.10).aspxhttp://technet.microsoft.com/en-us/library/cc785385(WS.10).aspxhttp://technet.microsoft.com/en-us/library/cc785385(WS.10).aspxhttp://technet.microsoft.com/en-us/library/cc779610(WS.10).aspx -
8/10/2019 HPATA Net Study Guide
13/32
Designing & Deploying Network Solutions
Study Guide 12
3.2 Install and configure management and administrationsolution
Question:
Your customer's network has the following subnets:
You need to subdivide the address 132.40.40.0/22 to allow for the required number of
hosts in each subnet.
Which addressing ranges should you use?
Answer choices:A.
SubA: 132.40.41.0/23
SubB: 132.40.43.0/24
SubC: 132.40.44.128/25
B.
SubA: 132.40.41.0/24
SubB: 132.40.42.0/25
SubC: 132.40.43.0/26
C.
SubA: 132.40.40.0/23
SubB: 132.40.41.0/25
SubC: 132.40.42.128/26
D.
SubA: 132.40.40.0/23
SubB: 132.40.42.0/25
SubC: 132.40.42.128/26
-
8/10/2019 HPATA Net Study Guide
14/32
Designing & Deploying Network Solutions
Study Guide 13
Explanation:You should use the following address ranges:
SubA: 132.40.40.0/23
SubB: 132.40.42.0/25
SubC: 132.40.42.128/26
When using variable-length subnet masks (VLSM), you subdivide the network into multiple
networks that have different length network addresses. However, you must still make sure
the networks do not overlap. In this scenario you have a total of 10 bits to subdivide
between the subnet part of the address and the host part of the address. For SubA, you
need 280 addresses. The smallest subnet mask that can support 280 addresses in the
assigned range is a 23-bit subnet mask, which can support 510 addresses (2 to the power
of 9 - 2). By using the range 132.40.40.0/23, you specify that all address in the range
132.40.40.1 through 132.40.41.254 belong to the subnet. SubB requires 68 addresses,
which means that you must use at least 25 bits for the subnet mask, which supports 126addresses (2 to the power of 7 - 2). You cannot overlap the range taken by SubA, so you
should use the range 132.40.42.0/25, which provides addresses in the range 132.40.42.1
through 132.40.42.127. SubC requires only 25 addresses. Therefore, you need to use a
subnet mask with at least 30 addresses (2 to the power of 5 - 2). This would be the /27
subnet. You can use any larger subnet as well. In this case, you can use the
132.40.42.128/26 subnet, which would provide 64 addresses from 132.40.42.129 through
132.40.42.191.
Additional Information:
http://technet.microsoft.com/en-us/library/cc739633(WS.10).aspx
http://technet.microsoft.com/en-us/library/cc739633(WS.10).aspxhttp://technet.microsoft.com/en-us/library/cc739633(WS.10).aspx -
8/10/2019 HPATA Net Study Guide
15/32
Designing & Deploying Network Solutions
Study Guide 14
3.3 Validate installed solution
Question:Which command would you use to view detailed TCP/IP configuration information on a
computer?
Answer choices:A. netstat
B. nslookup
C. ipconfig
D. nbtstat
Explanation:The ipconfig command provides detailed TCP/IP configuration information about a
computer. The specific features supported by ipconfig are somewhat Windows version-specific, but in all cases you can view a configuration summary (ipconfig), view detailed
configuration (ipconfig /all), release a leased address (ipconfig /release), or attempt to lease
an address (ipconfig /renew).
When you choose to view detailed information, this includes:
Media state
IPv4 addresses
IPv6 addresses
Domain Name System (DNS) suffix
Dynamic Host Configuration Protocol (DHCP) configuration information.
The netstat command provides network status information, but does not provide detailed
configuration information for a specific computer. By default, the command provides
connection information showing local address, remote address, and connection status.
The nslookup command is used to test name server functionality and DNS servers.
The nbtstat command is used to display NetBIOS network statistics and current connections
using NetBIOS over TCP/IP. Running the command without any options displays an option
list.
Additional Information:
http://support.microsoft.com/kb/117662
http://support.microsoft.com/kb/117662http://support.microsoft.com/kb/117662 -
8/10/2019 HPATA Net Study Guide
16/32
Designing & Deploying Network Solutions
Study Guide 15
Unit 4Optimize wireless, switched, and routed
network infrastructures for SMBcustomers
4.1 Manage network assets using HP and 3rd party tools
4.2 Optimize L3 routing protocol convergence and scalability (RIP, RIPng,
dynamic vs. static, versions 1 and 2)
4.3 Optimize network availability
4.4 Optimize and scale wireless network configuration
4.5 Optimize security on wired/wireless networks and devices
-
8/10/2019 HPATA Net Study Guide
17/32
Designing & Deploying Network Solutions
Study Guide 16
4.1 Manage network assets using HP and 3rd party tools
Question:You need to add a device to a customer's network that will allow you to create virtual local
area networks (VLANs). You must be able to manage the device remotely.
Which device should you use?
Answer choices:A. Unmanaged switch
B. Router
C. Hub
D. Managed switch
Explanation:You should use a managed switch. A managed switch supports VLANs. They also support
remote monitoring and management using various interfaces, including Simple Network
Management Protocol (SNMP).
An unmanaged switch is typically Plug-and-Play. It does not support remote management or
VLANs.
A router is a Layer 3 device used to route traffic between IP subnets. Some routers support
remote management, but they do not support VLANs.
A hub is used to connect devices on the same segment using a physical star topology. Ahub does not support VLANs and does not require configuration.
Additional Information:
http://searchnetworking.techtarget.com/expert/KnowledgebaseAnswer/0,289625,sid7_gci1
081375_mem1,00.html
http://searchnetworking.techtarget.com/expert/KnowledgebaseAnswer/0,289625,sid7_gci1081375_mem1,00.htmlhttp://searchnetworking.techtarget.com/expert/KnowledgebaseAnswer/0,289625,sid7_gci1081375_mem1,00.htmlhttp://searchnetworking.techtarget.com/expert/KnowledgebaseAnswer/0,289625,sid7_gci1081375_mem1,00.htmlhttp://searchnetworking.techtarget.com/expert/KnowledgebaseAnswer/0,289625,sid7_gci1081375_mem1,00.html -
8/10/2019 HPATA Net Study Guide
18/32
-
8/10/2019 HPATA Net Study Guide
19/32
Designing & Deploying Network Solutions
Study Guide 18
4.3 Optimize network availability
Question:Which routing topology would most likely continue carrying traffic to all locations even if
one communication path fails at a customer's site?
Answer choices:A. Ring
B. Mesh
C. Bus
D. Star
Explanation:A meshtopology would most likely continue carrying traffic to all locations even if one
communication path fails. This is because a mesh topology is characterized by multiplepaths between each node on the network. If one fails, an alternate path can be used to
bypass it.
A ring topology, depending on how it is configured, could fail if a data path is lost because
there is often only a single path between the computers. In some configurations, the
network might be able to heal itself by reversing the ring direction, but communication
speed would be significantly impaired.
In a bus topology, you have a single communication path. If it fails, none of the connected
nodes will be able to communicate.
If a communication path fails in a star configuration, it is likely that only the connected
device will be affected, but that device will be unable to exchange communications with the
rest of the network. The central hub also represents a potential point of failure.
Additional Information:
http://whatis.techtarget.com/definition/network-topologies.html
http://technet.microsoft.com/en-us/library/cc700841.aspx
http://whatis.techtarget.com/definition/network-topologies.htmlhttp://technet.microsoft.com/en-us/library/cc700841.aspxhttp://technet.microsoft.com/en-us/library/cc700841.aspxhttp://technet.microsoft.com/en-us/library/cc700841.aspxhttp://whatis.techtarget.com/definition/network-topologies.html -
8/10/2019 HPATA Net Study Guide
20/32
Designing & Deploying Network Solutions
Study Guide 19
4.4 Optimize and scale wireless network configuration
Question:You are installing an 802.11n wireless router on the first floor of a customer's location.
The laptop computer that you use to test the network from an office on the second floor isreporting a low signal strength. The computer has an 802.11g wireless network adapter.
Which three steps can you take to optimize the signal strength? (Choose three.)
Answer choices:A. Change to a different channel on the wireless router.
B. Disable frame aggregation on the wireless router.
C. Replace the computer's wireless adapter with an 802.11n adapter
D. Change the frequency of the wireless router to the 5 GHz band.
E.
Install a wireless repeater.
Explanation:You can change to a different channelon the wireless router. For example, wireless
routers sold in the United States support channels 1, 6, and 11.
You can change to a different frequencyon the wireless router. 2.4 GHz is used by many
devices - 802.11n can use either the 2.4GHZ or the 5 GHz frequency.
You can also install a wireless repeater, which will boost the signal to remote areas of the
office location.
You should not disable frame aggregation on the wireless router to optimize the signal
strength. Frame aggregation is a feature that optimizes performance by decreasing the time
needed to transmit data.
You do not need to replace the computer's wireless adapter with an 802.11n adapter. An
802.11n router is compatible with an 802,11g adapter.
Additional Information:
http://en.wikipedia.org/wiki/IEEE_802.11http://www.microsoft.com/athome/setup/wirelesstips.aspx
http://en.wikipedia.org/wiki/IEEE_802.11http://www.microsoft.com/athome/setup/wirelesstips.aspxhttp://www.microsoft.com/athome/setup/wirelesstips.aspxhttp://www.microsoft.com/athome/setup/wirelesstips.aspxhttp://en.wikipedia.org/wiki/IEEE_802.11 -
8/10/2019 HPATA Net Study Guide
21/32
Designing & Deploying Network Solutions
Study Guide 20
4.5 Optimize security on wired/wireless networks and devices
Question:Which two steps should you take to optimize security for your wireless network? (Choose
two.)
Answer choices:A. Use the 5 GHz band on your wireless router.
B. Use Standard Wired Equivalent Privacy (WEP).
C. Use Wi-Fi Protected Access 2 (WPA2).
D. Configure each wireless access point (AP) to suppress its Service Set Identifier (SSID).
Explanation:You should configure each wireless AP to suppress its SSID. Doing this will avoid
broadcasting your wireless network ID to the public.
You should use WPA2. This is the most secure method.
Using the 5 GHz band on your wireless router will not secure your wireless network, but
doing so may help reduce interference with other devices - 2.4 GHz is used by many
devices,
You should not use WEP. This is the least secure method.
Additional Information:
http://technet.microsoft.com/en-us/library/bb457091.aspx
http://technet.microsoft.com/en-us/library/bb457091.aspxhttp://technet.microsoft.com/en-us/library/bb457091.aspx -
8/10/2019 HPATA Net Study Guide
22/32
Designing & Deploying Network Solutions
Study Guide 21
Unit 5Troubleshoot wireless, switched, and
routed network infrastructures for SMBcustomers
5.1 Troubleshoot routed and switched networks
5.2 Troubleshoot remote connectivity
5.3 Troubleshoot Wireless networks
5.4 Troubleshoot security faults and threats
5.5 Troubleshoot common network issues using the HP Troubleshooting
methodology
-
8/10/2019 HPATA Net Study Guide
23/32
Designing & Deploying Network Solutions
Study Guide 22
5.1 Troubleshoot routed and switched networks
Question:After you start up a computer at a customer's site, the computer is unable to communicate
with any other computers on the network. The computer has an IP address of
169.254.19.21.
What is most likely wrong?
Answer choices:A. The computer cannot locate a Domain Controller.
B. The computer cannot locate a Domain Name System (DNS) server.
C. The computer cannot locate a Dynamic Host Configuration Protocol (DHCP) server.
D. The computer cannot locate a Windows Internet Name Service (WINS) server.
Explanation:The most likely problem is that the computer cannot locate a DHCP server. The address
given, 169.254.19.21, is in the Automatic Private IP Addressing (APIPA) range of
169.254.0.1 to 169.254.255.254.
Unless configured with an alternate address, a computer configured to receive a dynamic
address will configure itself with an address from the APIPA address range if it is unable to
lease an address from a DHCP server. A computer with an APIPA address can only
communicate with other computers on the same subnet that have APIPA addresses.
The problem is not related to finding a DNS server. A DNS server is used for host name andIP address resolution. A missing DNS server will not prevent IP address assignment.
The problem is not related to finding a WINS Server. WINS is used for managing NetBIOS
machine names and is rarely used in modern network configurations.
The problem is not related to locating a Domain Controller. Inability to locate a Domain
Controller can lead to server problems, but address assignment is not one of them. Instead,
you would see problems such as being unable to log onto a domain.
Additional Information:http://technet.microsoft.com/en-us/library/cc780760(WS.10).aspx
http://technet.microsoft.com/en-us/library/cc780760(WS.10).aspxhttp://technet.microsoft.com/en-us/library/cc780760(WS.10).aspx -
8/10/2019 HPATA Net Study Guide
24/32
Designing & Deploying Network Solutions
Study Guide 23
5.2 Troubleshoot remote connectivity
Question:You recently deployed Windows Server 2008 R2 at the central office of one of your
customers.
The company has a branch office, which is connected to the central office through a virtual
private network (VPN) tunnel. The company's network is configured as shown in the
illustration below. Both the routers, A and B, have dynamic routing enabled.
None of the client computers at the branch office are able to access the central server for
running remote applications hosted on the server. From a client computer at the branch
office, you can ping router A and router B, but not the central server.
What should you do to resolve the problem?
Answer choices:
A.
Assign the default gateway for the central office server as 172.16.16.1.B. Assign the default gateway for the central office server as 172.16.8.2.
C. Assign the default gateway for the client computers as 172.16.16.2.
D. Assign the default gateway for the client computers as 172.16.8.1.
-
8/10/2019 HPATA Net Study Guide
25/32
Designing & Deploying Network Solutions
Study Guide 24
Explanation:You should assign the default gateway for the central office server as 172.16.8.2, because
only then will the client computers be able to communicate with the central server. To make
the central server and client computers communicate, the local IP address of router A
should be configured as the default gateway for the central office server. All client
computers have their default gateway as the local IP address of router B, that is, 17.16.24.1.Routers A and B have dynamic routing enabled, so they have each other's IP addresses in
their respective routing tables. Router A will forward requests to the central office server.
When the central office server tries to respond to the request, it will not find the next device
to forward the request to, as the default gateway on the central office server is 172.16.16.2.
Therefore, you will have to change the default gateway of the central office server to
172.16.8.2, which is the local IP address of router A.
You should not assign the default gateway for the central office server as 172.16.16.1,
because this is the IP address for router B to communicate with router A. Therefore, this IP
address will be present in the routing table of router A.
You should not assign the default gateway for the client computers as 172.16.16.2, because
this is the IP address for router A to communicate with router B. Therefore, this IP address
will be present in the routing table of router B.
You will not assign the default gateway for the client computers as 172.16.8.1, because this
IP address is assigned to the central office server and is present in the routing table of
router A. This IP address is used by router A to forward requests to the central office server.
Additional Information:
http://technet.microsoft.com/en-us/library/bb727001.aspx
http://technet.microsoft.com/en-us/library/bb727001.aspxhttp://technet.microsoft.com/en-us/library/bb727001.aspx -
8/10/2019 HPATA Net Study Guide
26/32
Designing & Deploying Network Solutions
Study Guide 25
5.3 Troubleshoot Wireless networks
Question:You try to connect to the wireless network at the office of one of your customers after using
your laptop computer at a coffee shop, but you cannot connect.
What are the two most likely causes of this? (Choose two.)
Answer choices:A. Your Service Set Identifier (SSID) is mismatched between the laptop computer and the
router.
B. Your laptop computer needs a static IP address.
C. Your laptop computer needs the IP address renewed.
D. Your laptop computer's signal antenna is damaged.
Explanation:If the SSIDs are mismatched, then you cannot authenticate to the wireless router,
Your laptop computer may still be using the IP address from the coffee shop - releasing and
then acquiring a new IP addressshould solve the problem.
You do not need to configure a static address to connect to a wireless router - most routers
use DHCP to connect devices.
The antenna could be damaged, but since it worked at the coffee shop, this is not the most
likely cause.
Additional Information:
http://searchnetworking.techtarget.com/news/945257/Wireless-network-troubleshooting-
Connectivity
http://searchnetworking.techtarget.com/news/945257/Wireless-network-troubleshooting-Connectivityhttp://searchnetworking.techtarget.com/news/945257/Wireless-network-troubleshooting-Connectivityhttp://searchnetworking.techtarget.com/news/945257/Wireless-network-troubleshooting-Connectivityhttp://searchnetworking.techtarget.com/news/945257/Wireless-network-troubleshooting-Connectivity -
8/10/2019 HPATA Net Study Guide
27/32
Designing & Deploying Network Solutions
Study Guide 26
5.4 Troubleshoot security faults and threats
Question:You are troubleshooting a communication problem that has occurred between your
customer's home office and a remote branch. Recently, you enabled MD5 authentication on
the routers that are running Routing Information Protocol (RIP).
What are the two most likely reasons that communications are failing? (Choose two.)
Answer choices:A. The key chain names are mismatched.
B. The key chain identification numbers are mismatched.
C. The key string is different between the routers.
D. The routers need to be rebooted for changes to take effect.
Explanation:The key chain identifierand key stringmust match between the routers.
The key chain name can be different on the two routers.
Changes in routers take place in real-time, so a reboot is not necessary.
Additional Information:
http://www.cisco.com/en/US/tech/tk365/technologies_configuration_example09186a0080
093f1c.shtml
http://www.cisco.com/en/US/tech/tk365/technologies_configuration_example09186a0080093f1c.shtmlhttp://www.cisco.com/en/US/tech/tk365/technologies_configuration_example09186a0080093f1c.shtmlhttp://www.cisco.com/en/US/tech/tk365/technologies_configuration_example09186a0080093f1c.shtmlhttp://www.cisco.com/en/US/tech/tk365/technologies_configuration_example09186a0080093f1c.shtml -
8/10/2019 HPATA Net Study Guide
28/32
Designing & Deploying Network Solutions
Study Guide 27
5.5 Troubleshoot common network issues using the HPTroubleshooting methodology
Question:
A customer's Windows computer is configured to automatically receive an IP address and italso has Automatic Private IP Addressing (APIPA) enabled.
You use the ipconfig command to view the TCP/IP settings on the computer and discover
that it has an IP address of 0.0.0.0.
What is most likely wrong?
Answer choices:A. The network Dynamic Host Configuration Protocol (DHCP) server is down.
B. The TCP/IP protocol suite did not initialize during startup.
C.
Windows cannot detect a connection to the network media.
D. There is no Windows Internet Name Service (WINS) server available.
Explanation:The most likely problem is that Windows cannot detect a connection to the network
media. An unknown address (0.0.0.0) is assigned to the network adapter when the network
is not detected.
The problem is likely not with the DHCP server. Because APIPA is enabled, if the DHCP server
is not available, the computer would have an address in the format 169.254.xxx.xxx.
The problem is not that the TCP/IP protocol did not initialize. If the protocol did not
initialize, your computer would not be able to report any kind of TCP/IP information.
WINS has no part in dynamic address configuration. It is used for NetBIOS name resolution.
Additional Information:
http://technet.microsoft.com/en-us/library/cc940095.aspx
http://technet.microsoft.com/en-us/library/cc940095.aspxhttp://technet.microsoft.com/en-us/library/cc940095.aspx -
8/10/2019 HPATA Net Study Guide
29/32
Designing & Deploying Network Solutions
Study Guide 28
Unit 6Perform administrative, operational, and
network management tasks for SMBcustomers
6.1 Perform change management to network configuration and devices
6.2 Manage network events and policies
6.3 Perform Network Administration tasks
-
8/10/2019 HPATA Net Study Guide
30/32
Designing & Deploying Network Solutions
Study Guide 29
6.1 Perform change management to network configuration anddevices
Question:
One of your customers asks you to update the IOS Version of its routers.
What three steps should you take before you do the update? (Choose three.)
Answer choices:A. Document the existing IOS Versions on each router.
B. Purchase additional routers in case the update fails.
C. Research the impact on the company if down time will be necessary to complete the
upgrade.
D. Have a backup plan ready if the upgrade is unsuccessful.
E.
Monitor the I/O performance on all routers.
Explanation:Documentingexisting versionsof the IOS is a key step of change management.
Researching downtimeis also an important step.
Having a backup planin case the upgrade causes problems is also recommended.
Purchasing equipment is not recommended because the new equipment should not be
needed and may not have the correct version of IOS software you are using.
Monitoring router performance is a good practice, but doing so is not necessary during an
IOS upgrade.
Additional Information:
http://www.itsm.info/ITSM%20Change%20Management%20Best%20Practices.pdf
http://www.itsm.info/ITSM%20Change%20Management%20Best%20Practices.pdfhttp://www.itsm.info/ITSM%20Change%20Management%20Best%20Practices.pdfhttp://www.itsm.info/ITSM%20Change%20Management%20Best%20Practices.pdf -
8/10/2019 HPATA Net Study Guide
31/32
Designing & Deploying Network Solutions
Study Guide 30
6.2 Manage network events and policies
Question:Which device should you use for a customer who wants to prevent traffic destined for a
specific port from being received from the Internet?
Answer choices:A. Switch
B. Bridge
C. IDS
D. Firewall
Explanation:A firewallis used to prevent traffic destined for a specific port from traveling between one
network and another. You can create firewall rules that allow or disallow traffic sent orreceived on a specific port. A firewall can be implemented using a hardware device or
software.
A switch is a device used to connect networks. A switch can operate at Layer 2 or Layer 3 of
the Open Systems Interconnect (OSI) model. Although some switches can include firewall
functionality, it is the firewall that is filtering the traffic, not the switch.
A bridge is a Layer 2 device that is used to connect two networks that use the same access
method. For example, it can be used to connect an Ethernet network to a different Ethernet
network. It does not filter traffic.
An Intrusion Detection System (IDS) watches for patterns that indicate that an attack is
underway. An IDS does not filter traffic sent between networks.
Additional Information:
http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci212125,00.html
http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci212125,00.htmlhttp://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci212125,00.html -
8/10/2019 HPATA Net Study Guide
32/32
Designing & Deploying Network Solutions
6.3 Perform Network Administration tasks
Question:Which type of firewall filtering would you configure for a customer to filter traffic based on
packet content?
Answer choices:A. Stateful inspection
B. Intrusion detection
C. Application-level
D. Port and address
Explanation:Application-levelfiltering filters traffic based on packet content. The firewall opens the
packets and inspects the content to determine whether or not to pass the packet. TheWindows internal firewall does not support this feature, but most external firewalls
designed for business applications do support application-level filtering.
Port and address filtering does not filter traffic based on content, but instead based on
source and destination. This is the most common filtering method.
Stateful inspection filtering allows or blocks packets based on access policy, not on packet
content.
Intrusion detection is not a filtering method. It is a monitoring process used to detect
attempted attacks. Intrusion detection detects attacks based on traffic characteristics,referred to as the attack signature, and generates an alert so that appropriate action can be
taken.
Additional Information:
http://searchsoftwarequality.techtarget.com/sDefinition/0,,sid92_gci1188694,00.html
http://searchsoftwarequality.techtarget.com/sDefinition/0,,sid92_gci1188694,00.htmlhttp://searchsoftwarequality.techtarget.com/sDefinition/0,,sid92_gci1188694,00.html