hpata net study guide

Upload: myscribddocs

Post on 02-Jun-2018

227 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/10/2019 HPATA Net Study Guide

    1/32

    Designing and

    Deploying Network

    Solutions for Smalland Medium BusinessHPATA Networks

    Study Guide

    Rev 1.1

  • 8/10/2019 HPATA Net Study Guide

    2/32

    Designing & Deploying Network Solutions

    Study Guide 1

    Table of Contents1.1 Describe and recognize the most common Data Link protocols and their associated

    physical connections (Layers 1 and 2) ................................................................................ 3

    1.2 Describe Layer 3 routing concepts with detailed focus on IP ......................................... 4

    1.3 Describe the common IP-based upper layer (Layers 5, 6, & 7) protocols and applications ......................................................................................................................................... 5

    1.4 Describe multicast technology and how multicast traffic functions on a network ........... 6

    2.1 Consult with an SMB customer to assess their business and technical needs and create a

    plan for a networking solution ........................................................................................... 8

    2.2 Design a networking solution to meet the customer needs identified in the planning

    stage ................................................................................................................................. 9

    3.1 Prepare for and install networking equipment ............................................................ 11

    3.2 Install and configure management and administration solution .................................. 123.3 Validate installed solution .......................................................................................... 14

    4.1 Manage network assets using HP and 3rd party tools ................................................. 16

    4.2 Optimize L3 routing protocol convergence and scalability (RIP, RIPng, dynamic vs. static,

    versions 1 and 2) ............................................................................................................. 17

    4.3 Optimize network availability ..................................................................................... 18

    4.4 Optimize and scale wireless network configuration .................................................... 19

    4.5 Optimize security on wired/wireless networks and devices ......................................... 20

    5.1 Troubleshoot routed and switched networks .............................................................. 22

    5.2 Troubleshoot remote connectivity .............................................................................. 23

    5.3 Troubleshoot Wireless networks ................................................................................. 25

    5.4 Troubleshoot security faults and threats .................................................................... 26

    5.5 Troubleshoot common network issues using the HP Troubleshooting methodology .... 27

    6.1 Perform change management to network configuration and devices ........................... 29

    6.2 Manage network events and policies .......................................................................... 30

    6.3 Perform Network Administration tasks ....................................................................... 31

  • 8/10/2019 HPATA Net Study Guide

    3/32

    Designing & Deploying Network Solutions

    Study Guide 2

    Unit 1Explain and Recognize Networking

    technologies and their implications oncustomer needs

    1.1 Describe and recognize the most common Data Link protocols and

    their associated physical connections (Layers 1 and 2)

    1.2 Describe Layer 3 routing concepts with detailed focus on IP

    1.3 Describe the common IP-based upper layer (Layers 5, 6, & 7) protocols

    and applications

    1.4 Describe multicast technology and how multicast traffic functions on a

    network

  • 8/10/2019 HPATA Net Study Guide

    4/32

    Designing & Deploying Network Solutions

    Study Guide 3

    1.1 Describe and recognize the most common Data Linkprotocols and their associated physical connections (Layers 1and 2)

    Question:What is the primary reason to use a Layer 2 switch instead of a hub?

    Answer choices:A. To reduce collisions

    B. To support multiple IP subnets

    C. To implement dynamic IP addressing

    D. To support NAT

    Explanation:

    The primary advantage to using a Layer 2 switch instead of a hub is to reduce collisions. A Layer 2switch uses a media access control (MAC) table to determine which port to use as the destination for

    a packet within a local area network (LAN). A hub simply broadcasts each packet to all devices

    connected to it. All of the ports on a hub are part of the same collision domain. In a collision

    domain, only one host can send at a time, and all other hosts must listen to avoid collisions. In a

    Layer 2 switch, each port is connected to one host and is its own collision domain. A Layer 2 switch

    can eliminate collisions.

    You need to use a Layer 3 switch or a router to support multiple IP subnets. IP routing is performed

    at Layer 3 of the Open Systems Interconnection (OSI) model.

    You need to use a Dynamic Host Configuration Protocol (DHCP) server to implement dynamic IPaddressing. With dynamic IP addressing, you create scopes on the DHCP server that determine the

    range from which addresses should be assigned. Clients that are configured to obtain their IP

    configuration automatically, send out a broadcast to discover a DHCP server. The DHCP server

    responds with an offer packet. The client can then request the address offered by the DHCP server.

    You need to use a router to support Network Address Translation (NAT). NAT is used to allow

    multiple hosts with private IP addresses to communicate on a public network. The NAT server

    modifies the request so that it appears to come from a public address. It then forwards the response

    to the appropriate private address.

    Additional Information:

    http://articles.techrepublic.com.com/5100-10878_11-5034317.html

    http://technet.microsoft.com/en-us/library/bb726959.aspx

    http://articles.techrepublic.com.com/5100-10878_11-5034317.htmlhttp://technet.microsoft.com/en-us/library/bb726959.aspxhttp://technet.microsoft.com/en-us/library/bb726959.aspxhttp://articles.techrepublic.com.com/5100-10878_11-5034317.html
  • 8/10/2019 HPATA Net Study Guide

    5/32

    Designing & Deploying Network Solutions

    Study Guide 4

    1.2 Describe Layer 3 routing concepts with detailed focus on IP

    Question:Which of the following is a valid private address that supports communication throughout a

    subnetted network?

    Answer choices:A. 127.200.191.1

    B. 169.254.255.22

    C. 192.169.1.1

    D. 192.168.44.105

    Explanation:The address 192.168.44.105 is a valid private address. Private addresses can be used on

    an internal network, but cannot be used to communicate on the Internet. Valid privateaddresses are:

    10.0.0.0/8 (10.0.0.1 to 10.255.255.254)

    172.16.0.0/12 (172.16.0.1 to 172.31.255.254)

    192.168.0.0/16 (192.168.0.1 to 192.168.255.254)

    The address ranges can be subnetted as necessary for internal use.

    You cannot have a network address that begins with 127, so 127.200.191.1 is not a valid

    address. It is also outside of the private address ranges. Addresses beginning with 127 are

    reserved for local loopback use.

    The address 169.254.255.22 is an Automatic Private IP Addressing (APIPA) address. This

    address range, 169.254.0.1 to 169.254.255.254, is used when a computer configured for

    automatic IP address configuration is unable to lease an address and is not configured for

    alternate addressing. A computer with an APIPA address can communicate on the local

    subnet only.

    The address 192.169.1.1 is not a valid private address because it falls out of the private

    address range.

    Additional Information:

    http://technet.microsoft.com/en-us/library/cc958825.aspx

    http://technet.microsoft.com/en-us/library/cc781931(WS.10).aspx

    http://technet.microsoft.com/en-us/library/cc958825.aspxhttp://technet.microsoft.com/en-us/library/cc781931(WS.10).aspxhttp://technet.microsoft.com/en-us/library/cc781931(WS.10).aspxhttp://technet.microsoft.com/en-us/library/cc958825.aspx
  • 8/10/2019 HPATA Net Study Guide

    6/32

    Designing & Deploying Network Solutions

    Study Guide 5

    1.3 Describe the common IP-based upper layer (Layers 5, 6, &7) protocols and applications

    Question:

    Which protocol is implemented at the Application layer of the TCP model?

    Answer choices:A. TCP

    B. FTP

    C. IP

    D. UTP

    Explanation:FTP(File Transfer Protocol) is implemented at the Application layer in the TCP model. The

    TCP model is a four-layer model consisting of the Network Interface layer (lowest layer),Internet layer, Transport layer, and Application layer. Other protocols implemented at the

    application layer include Domain Name System (DNS) and Hypertext Transfer Protocol

    (HTTP).

    TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) are both

    implemented at the Transport layer. A primary difference between the two is that TCP is a

    connection-oriented transport protocol designed to guarantee data delivery while UDP is a

    connectionless protocol with no guarantee of delivery.

    IP (Internet Protocol) is implemented at the Internet layer and is primarily responsible foraddressing and routing. It is a connectionless protocol and operates underneath both TCP

    and UDP.

    Additional Information:

    http://technet.microsoft.com/en-us/library/cc786900(WS.10).aspx

    http://en.wikipedia.org/wiki/File_Transfer_Protocol

    http://technet.microsoft.com/en-us/library/cc786900(WS.10).aspxhttp://en.wikipedia.org/wiki/File_Transfer_Protocolhttp://en.wikipedia.org/wiki/File_Transfer_Protocolhttp://technet.microsoft.com/en-us/library/cc786900(WS.10).aspx
  • 8/10/2019 HPATA Net Study Guide

    7/32

    Designing & Deploying Network Solutions

    Study Guide 6

    1.4 Describe multicast technology and how multicast trafficfunctions on a network

    Question:

    Which of the following is an IPv4 multicast address?

    Answer choices:A. ::1

    B. 224.0.0.1

    C. 127.0.0.1

    D. FF00::1

    Explanation:224.0.0.1is a valid IPv4 multicast address. The multicast address range is 224.0.0.0

    through 239.255.255.255. For private multicast communications on a local area network(LAN), the 239.192.0.0 address range is typically used with a subnet mask of 255.252.0.0.

    127.0.0.1 is not a multicast address. It is the IPv4 local loopback address. A loopback

    address is used for testing local communications. For example, when you run the following

    command:

    ping 127.0.0.1

    The computer that executed the command will also respond to the ping. This verifies that

    TCP/IP is loaded and working on the local machine.

    ::1 is not a multicast address. It is the IPv6 local loopback address. IPv6 is a TCP/IP revision.

    One of the key changes is that IPv6 increases the address length from IPv4's 32 bits to 128

    bits.

    FF00::1 is not an IPv4 multicast address. It is an IPv6 multicast address.

    Additional Information:

    http://technet.microsoft.com/en-us/library/cc739600(WS.10).aspx

    http://technet.microsoft.com/en-us/library/cc779122(WS.10).aspx

    http://technet.microsoft.com/en-us/library/cc739600(WS.10).aspxhttp://technet.microsoft.com/en-us/library/cc779122(WS.10).aspxhttp://technet.microsoft.com/en-us/library/cc779122(WS.10).aspxhttp://technet.microsoft.com/en-us/library/cc779122(WS.10).aspxhttp://technet.microsoft.com/en-us/library/cc739600(WS.10).aspx
  • 8/10/2019 HPATA Net Study Guide

    8/32

    Designing & Deploying Network Solutions

    Study Guide 7

    Unit 2Plan and design wired and wireless

    network solutions for SMB customers2.1 Consult with an SMB customer to assess their business and technical

    needs and create a plan for a networking solution

    2.2 Design a networking solution to meet the customer needs identified in

    the planning stage

  • 8/10/2019 HPATA Net Study Guide

    9/32

    Designing & Deploying Network Solutions

    Study Guide 8

    2.1 Consult with an SMB customer to assess their business andtechnical needs and create a plan for a networking solution

    Question:

    In which situation would you want to configure a virtual private network (VPN) for acustomer?

    Answer choices:A. A Web server needs to support public access as part of an e-commerce application.

    B. Computers at different locations on a wide area network (WAN) need to act as if they

    are on the same subnet.

    C. Home-based telecommuters need intermittent connections over the Internet to the

    internal network.

    D. Wired and wireless network segments need to be connected.

    Explanation:You would use a VPN to support home-based telecommuterswho need intermittent

    connections over the Internet to the internal network. Users connect through the VPN server

    and are authenticated by the network. Virtual private networking uses tunneling technology

    to provide a secure communication path.

    You would not use a VPN to configure public access for a Web server. In this situation, you

    would create a perimeter network and deploy the Web server on the perimeter network.

    You would not use a VPN to configure computers at different locations as a single logicalsubnet. This is done by establishing a virtual LAN (VLAN).

    You would not use a VPN to connect wired and wireless network segments. This requires a

    wireless access point (WAP).

    Additional Information:

    http://technet.microsoft.com/en-us/library/cc725734(WS.10).aspx

    http://technet.microsoft.com/en-us/library/dd458955(WS.10).aspx

    http://technet.microsoft.com/en-us/library/cc725734(WS.10).aspxhttp://technet.microsoft.com/en-us/library/dd458955(WS.10).aspxhttp://technet.microsoft.com/en-us/library/dd458955(WS.10).aspxhttp://technet.microsoft.com/en-us/library/dd458955(WS.10).aspxhttp://technet.microsoft.com/en-us/library/cc725734(WS.10).aspx
  • 8/10/2019 HPATA Net Study Guide

    10/32

  • 8/10/2019 HPATA Net Study Guide

    11/32

    Designing & Deploying Network Solutions

    Study Guide 10

    Unit 3Install, configure, startup, and upgrade

    the network solutions for SMB customers3.1 Prepare for and install networking equipment

    3.2 Install and configure management and administration solution

    3.3 Validate installed solution

  • 8/10/2019 HPATA Net Study Guide

    12/32

    Designing & Deploying Network Solutions

    Study Guide 11

    3.1 Prepare for and install networking equipment

    Question:You add a new network segment to a customer's routed network, which has a single DHCP

    server. There are no DHCP Relay agents on the network. All clients are configured for

    dynamic addressing.

    What do you need to enable on the router?

    Answer choices:A. RIP

    B. OSPF

    C. BOOTP forwarding

    D. NAT

    Explanation:You need to enable BOOTP forwarding. A Dynamic Host Configuration Protocol (DHCP)

    client uses a broadcast to lease an address. The client sends a DHCPDISCOVER packet as a

    broadcast. Any listening DHCP server that has a scope that is configured with an address

    range associated with the subnet where the client is located can respond with a DHCPOFFER

    packet. The client can accept the offer packet by issuing a DHCPREQUEST broadcast that

    informs all DHCP servers that the client is requesting the address offered. The DHCP server

    issuing the address then sends a DHCPACK packet to acknowledge that the address has

    been leased. Routers do not forward broadcasts by default. However, you can configure a

    router to support BOOTP forwarding, which causes DHCP broadcasts to be forwarded. Youdo not need to enable Routing Information Protocol (RIP). RIP is a dynamic routing protocol

    and is not required for DHCP broadcasts to traverse multiple subnets.

    You do not need to enable Open Shortest Path First (OSPF). OSPF is a dynamic routing

    protocol and is not required for DHCP broadcasts to traverse multiple subnets.

    You do not need to enable Network Address Translation (NAT). NAT allows multiple

    computers with private addresses to access the Internet using a single public address. A

    NAT device connects to the Internet using a public address and the internal network using a

    private address.

    Additional Information:

    http://technet.microsoft.com/en-us/library/cc779610(WS.10).aspx

    http://technet.microsoft.com/en-us/library/cc785385(WS.10).aspx

    http://technet.microsoft.com/en-us/library/cc779610(WS.10).aspxhttp://technet.microsoft.com/en-us/library/cc785385(WS.10).aspxhttp://technet.microsoft.com/en-us/library/cc785385(WS.10).aspxhttp://technet.microsoft.com/en-us/library/cc779610(WS.10).aspx
  • 8/10/2019 HPATA Net Study Guide

    13/32

    Designing & Deploying Network Solutions

    Study Guide 12

    3.2 Install and configure management and administrationsolution

    Question:

    Your customer's network has the following subnets:

    You need to subdivide the address 132.40.40.0/22 to allow for the required number of

    hosts in each subnet.

    Which addressing ranges should you use?

    Answer choices:A.

    SubA: 132.40.41.0/23

    SubB: 132.40.43.0/24

    SubC: 132.40.44.128/25

    B.

    SubA: 132.40.41.0/24

    SubB: 132.40.42.0/25

    SubC: 132.40.43.0/26

    C.

    SubA: 132.40.40.0/23

    SubB: 132.40.41.0/25

    SubC: 132.40.42.128/26

    D.

    SubA: 132.40.40.0/23

    SubB: 132.40.42.0/25

    SubC: 132.40.42.128/26

  • 8/10/2019 HPATA Net Study Guide

    14/32

    Designing & Deploying Network Solutions

    Study Guide 13

    Explanation:You should use the following address ranges:

    SubA: 132.40.40.0/23

    SubB: 132.40.42.0/25

    SubC: 132.40.42.128/26

    When using variable-length subnet masks (VLSM), you subdivide the network into multiple

    networks that have different length network addresses. However, you must still make sure

    the networks do not overlap. In this scenario you have a total of 10 bits to subdivide

    between the subnet part of the address and the host part of the address. For SubA, you

    need 280 addresses. The smallest subnet mask that can support 280 addresses in the

    assigned range is a 23-bit subnet mask, which can support 510 addresses (2 to the power

    of 9 - 2). By using the range 132.40.40.0/23, you specify that all address in the range

    132.40.40.1 through 132.40.41.254 belong to the subnet. SubB requires 68 addresses,

    which means that you must use at least 25 bits for the subnet mask, which supports 126addresses (2 to the power of 7 - 2). You cannot overlap the range taken by SubA, so you

    should use the range 132.40.42.0/25, which provides addresses in the range 132.40.42.1

    through 132.40.42.127. SubC requires only 25 addresses. Therefore, you need to use a

    subnet mask with at least 30 addresses (2 to the power of 5 - 2). This would be the /27

    subnet. You can use any larger subnet as well. In this case, you can use the

    132.40.42.128/26 subnet, which would provide 64 addresses from 132.40.42.129 through

    132.40.42.191.

    Additional Information:

    http://technet.microsoft.com/en-us/library/cc739633(WS.10).aspx

    http://technet.microsoft.com/en-us/library/cc739633(WS.10).aspxhttp://technet.microsoft.com/en-us/library/cc739633(WS.10).aspx
  • 8/10/2019 HPATA Net Study Guide

    15/32

    Designing & Deploying Network Solutions

    Study Guide 14

    3.3 Validate installed solution

    Question:Which command would you use to view detailed TCP/IP configuration information on a

    computer?

    Answer choices:A. netstat

    B. nslookup

    C. ipconfig

    D. nbtstat

    Explanation:The ipconfig command provides detailed TCP/IP configuration information about a

    computer. The specific features supported by ipconfig are somewhat Windows version-specific, but in all cases you can view a configuration summary (ipconfig), view detailed

    configuration (ipconfig /all), release a leased address (ipconfig /release), or attempt to lease

    an address (ipconfig /renew).

    When you choose to view detailed information, this includes:

    Media state

    IPv4 addresses

    IPv6 addresses

    Domain Name System (DNS) suffix

    Dynamic Host Configuration Protocol (DHCP) configuration information.

    The netstat command provides network status information, but does not provide detailed

    configuration information for a specific computer. By default, the command provides

    connection information showing local address, remote address, and connection status.

    The nslookup command is used to test name server functionality and DNS servers.

    The nbtstat command is used to display NetBIOS network statistics and current connections

    using NetBIOS over TCP/IP. Running the command without any options displays an option

    list.

    Additional Information:

    http://support.microsoft.com/kb/117662

    http://support.microsoft.com/kb/117662http://support.microsoft.com/kb/117662
  • 8/10/2019 HPATA Net Study Guide

    16/32

    Designing & Deploying Network Solutions

    Study Guide 15

    Unit 4Optimize wireless, switched, and routed

    network infrastructures for SMBcustomers

    4.1 Manage network assets using HP and 3rd party tools

    4.2 Optimize L3 routing protocol convergence and scalability (RIP, RIPng,

    dynamic vs. static, versions 1 and 2)

    4.3 Optimize network availability

    4.4 Optimize and scale wireless network configuration

    4.5 Optimize security on wired/wireless networks and devices

  • 8/10/2019 HPATA Net Study Guide

    17/32

    Designing & Deploying Network Solutions

    Study Guide 16

    4.1 Manage network assets using HP and 3rd party tools

    Question:You need to add a device to a customer's network that will allow you to create virtual local

    area networks (VLANs). You must be able to manage the device remotely.

    Which device should you use?

    Answer choices:A. Unmanaged switch

    B. Router

    C. Hub

    D. Managed switch

    Explanation:You should use a managed switch. A managed switch supports VLANs. They also support

    remote monitoring and management using various interfaces, including Simple Network

    Management Protocol (SNMP).

    An unmanaged switch is typically Plug-and-Play. It does not support remote management or

    VLANs.

    A router is a Layer 3 device used to route traffic between IP subnets. Some routers support

    remote management, but they do not support VLANs.

    A hub is used to connect devices on the same segment using a physical star topology. Ahub does not support VLANs and does not require configuration.

    Additional Information:

    http://searchnetworking.techtarget.com/expert/KnowledgebaseAnswer/0,289625,sid7_gci1

    081375_mem1,00.html

    http://searchnetworking.techtarget.com/expert/KnowledgebaseAnswer/0,289625,sid7_gci1081375_mem1,00.htmlhttp://searchnetworking.techtarget.com/expert/KnowledgebaseAnswer/0,289625,sid7_gci1081375_mem1,00.htmlhttp://searchnetworking.techtarget.com/expert/KnowledgebaseAnswer/0,289625,sid7_gci1081375_mem1,00.htmlhttp://searchnetworking.techtarget.com/expert/KnowledgebaseAnswer/0,289625,sid7_gci1081375_mem1,00.html
  • 8/10/2019 HPATA Net Study Guide

    18/32

  • 8/10/2019 HPATA Net Study Guide

    19/32

    Designing & Deploying Network Solutions

    Study Guide 18

    4.3 Optimize network availability

    Question:Which routing topology would most likely continue carrying traffic to all locations even if

    one communication path fails at a customer's site?

    Answer choices:A. Ring

    B. Mesh

    C. Bus

    D. Star

    Explanation:A meshtopology would most likely continue carrying traffic to all locations even if one

    communication path fails. This is because a mesh topology is characterized by multiplepaths between each node on the network. If one fails, an alternate path can be used to

    bypass it.

    A ring topology, depending on how it is configured, could fail if a data path is lost because

    there is often only a single path between the computers. In some configurations, the

    network might be able to heal itself by reversing the ring direction, but communication

    speed would be significantly impaired.

    In a bus topology, you have a single communication path. If it fails, none of the connected

    nodes will be able to communicate.

    If a communication path fails in a star configuration, it is likely that only the connected

    device will be affected, but that device will be unable to exchange communications with the

    rest of the network. The central hub also represents a potential point of failure.

    Additional Information:

    http://whatis.techtarget.com/definition/network-topologies.html

    http://technet.microsoft.com/en-us/library/cc700841.aspx

    http://whatis.techtarget.com/definition/network-topologies.htmlhttp://technet.microsoft.com/en-us/library/cc700841.aspxhttp://technet.microsoft.com/en-us/library/cc700841.aspxhttp://technet.microsoft.com/en-us/library/cc700841.aspxhttp://whatis.techtarget.com/definition/network-topologies.html
  • 8/10/2019 HPATA Net Study Guide

    20/32

    Designing & Deploying Network Solutions

    Study Guide 19

    4.4 Optimize and scale wireless network configuration

    Question:You are installing an 802.11n wireless router on the first floor of a customer's location.

    The laptop computer that you use to test the network from an office on the second floor isreporting a low signal strength. The computer has an 802.11g wireless network adapter.

    Which three steps can you take to optimize the signal strength? (Choose three.)

    Answer choices:A. Change to a different channel on the wireless router.

    B. Disable frame aggregation on the wireless router.

    C. Replace the computer's wireless adapter with an 802.11n adapter

    D. Change the frequency of the wireless router to the 5 GHz band.

    E.

    Install a wireless repeater.

    Explanation:You can change to a different channelon the wireless router. For example, wireless

    routers sold in the United States support channels 1, 6, and 11.

    You can change to a different frequencyon the wireless router. 2.4 GHz is used by many

    devices - 802.11n can use either the 2.4GHZ or the 5 GHz frequency.

    You can also install a wireless repeater, which will boost the signal to remote areas of the

    office location.

    You should not disable frame aggregation on the wireless router to optimize the signal

    strength. Frame aggregation is a feature that optimizes performance by decreasing the time

    needed to transmit data.

    You do not need to replace the computer's wireless adapter with an 802.11n adapter. An

    802.11n router is compatible with an 802,11g adapter.

    Additional Information:

    http://en.wikipedia.org/wiki/IEEE_802.11http://www.microsoft.com/athome/setup/wirelesstips.aspx

    http://en.wikipedia.org/wiki/IEEE_802.11http://www.microsoft.com/athome/setup/wirelesstips.aspxhttp://www.microsoft.com/athome/setup/wirelesstips.aspxhttp://www.microsoft.com/athome/setup/wirelesstips.aspxhttp://en.wikipedia.org/wiki/IEEE_802.11
  • 8/10/2019 HPATA Net Study Guide

    21/32

    Designing & Deploying Network Solutions

    Study Guide 20

    4.5 Optimize security on wired/wireless networks and devices

    Question:Which two steps should you take to optimize security for your wireless network? (Choose

    two.)

    Answer choices:A. Use the 5 GHz band on your wireless router.

    B. Use Standard Wired Equivalent Privacy (WEP).

    C. Use Wi-Fi Protected Access 2 (WPA2).

    D. Configure each wireless access point (AP) to suppress its Service Set Identifier (SSID).

    Explanation:You should configure each wireless AP to suppress its SSID. Doing this will avoid

    broadcasting your wireless network ID to the public.

    You should use WPA2. This is the most secure method.

    Using the 5 GHz band on your wireless router will not secure your wireless network, but

    doing so may help reduce interference with other devices - 2.4 GHz is used by many

    devices,

    You should not use WEP. This is the least secure method.

    Additional Information:

    http://technet.microsoft.com/en-us/library/bb457091.aspx

    http://technet.microsoft.com/en-us/library/bb457091.aspxhttp://technet.microsoft.com/en-us/library/bb457091.aspx
  • 8/10/2019 HPATA Net Study Guide

    22/32

    Designing & Deploying Network Solutions

    Study Guide 21

    Unit 5Troubleshoot wireless, switched, and

    routed network infrastructures for SMBcustomers

    5.1 Troubleshoot routed and switched networks

    5.2 Troubleshoot remote connectivity

    5.3 Troubleshoot Wireless networks

    5.4 Troubleshoot security faults and threats

    5.5 Troubleshoot common network issues using the HP Troubleshooting

    methodology

  • 8/10/2019 HPATA Net Study Guide

    23/32

    Designing & Deploying Network Solutions

    Study Guide 22

    5.1 Troubleshoot routed and switched networks

    Question:After you start up a computer at a customer's site, the computer is unable to communicate

    with any other computers on the network. The computer has an IP address of

    169.254.19.21.

    What is most likely wrong?

    Answer choices:A. The computer cannot locate a Domain Controller.

    B. The computer cannot locate a Domain Name System (DNS) server.

    C. The computer cannot locate a Dynamic Host Configuration Protocol (DHCP) server.

    D. The computer cannot locate a Windows Internet Name Service (WINS) server.

    Explanation:The most likely problem is that the computer cannot locate a DHCP server. The address

    given, 169.254.19.21, is in the Automatic Private IP Addressing (APIPA) range of

    169.254.0.1 to 169.254.255.254.

    Unless configured with an alternate address, a computer configured to receive a dynamic

    address will configure itself with an address from the APIPA address range if it is unable to

    lease an address from a DHCP server. A computer with an APIPA address can only

    communicate with other computers on the same subnet that have APIPA addresses.

    The problem is not related to finding a DNS server. A DNS server is used for host name andIP address resolution. A missing DNS server will not prevent IP address assignment.

    The problem is not related to finding a WINS Server. WINS is used for managing NetBIOS

    machine names and is rarely used in modern network configurations.

    The problem is not related to locating a Domain Controller. Inability to locate a Domain

    Controller can lead to server problems, but address assignment is not one of them. Instead,

    you would see problems such as being unable to log onto a domain.

    Additional Information:http://technet.microsoft.com/en-us/library/cc780760(WS.10).aspx

    http://technet.microsoft.com/en-us/library/cc780760(WS.10).aspxhttp://technet.microsoft.com/en-us/library/cc780760(WS.10).aspx
  • 8/10/2019 HPATA Net Study Guide

    24/32

    Designing & Deploying Network Solutions

    Study Guide 23

    5.2 Troubleshoot remote connectivity

    Question:You recently deployed Windows Server 2008 R2 at the central office of one of your

    customers.

    The company has a branch office, which is connected to the central office through a virtual

    private network (VPN) tunnel. The company's network is configured as shown in the

    illustration below. Both the routers, A and B, have dynamic routing enabled.

    None of the client computers at the branch office are able to access the central server for

    running remote applications hosted on the server. From a client computer at the branch

    office, you can ping router A and router B, but not the central server.

    What should you do to resolve the problem?

    Answer choices:

    A.

    Assign the default gateway for the central office server as 172.16.16.1.B. Assign the default gateway for the central office server as 172.16.8.2.

    C. Assign the default gateway for the client computers as 172.16.16.2.

    D. Assign the default gateway for the client computers as 172.16.8.1.

  • 8/10/2019 HPATA Net Study Guide

    25/32

    Designing & Deploying Network Solutions

    Study Guide 24

    Explanation:You should assign the default gateway for the central office server as 172.16.8.2, because

    only then will the client computers be able to communicate with the central server. To make

    the central server and client computers communicate, the local IP address of router A

    should be configured as the default gateway for the central office server. All client

    computers have their default gateway as the local IP address of router B, that is, 17.16.24.1.Routers A and B have dynamic routing enabled, so they have each other's IP addresses in

    their respective routing tables. Router A will forward requests to the central office server.

    When the central office server tries to respond to the request, it will not find the next device

    to forward the request to, as the default gateway on the central office server is 172.16.16.2.

    Therefore, you will have to change the default gateway of the central office server to

    172.16.8.2, which is the local IP address of router A.

    You should not assign the default gateway for the central office server as 172.16.16.1,

    because this is the IP address for router B to communicate with router A. Therefore, this IP

    address will be present in the routing table of router A.

    You should not assign the default gateway for the client computers as 172.16.16.2, because

    this is the IP address for router A to communicate with router B. Therefore, this IP address

    will be present in the routing table of router B.

    You will not assign the default gateway for the client computers as 172.16.8.1, because this

    IP address is assigned to the central office server and is present in the routing table of

    router A. This IP address is used by router A to forward requests to the central office server.

    Additional Information:

    http://technet.microsoft.com/en-us/library/bb727001.aspx

    http://technet.microsoft.com/en-us/library/bb727001.aspxhttp://technet.microsoft.com/en-us/library/bb727001.aspx
  • 8/10/2019 HPATA Net Study Guide

    26/32

    Designing & Deploying Network Solutions

    Study Guide 25

    5.3 Troubleshoot Wireless networks

    Question:You try to connect to the wireless network at the office of one of your customers after using

    your laptop computer at a coffee shop, but you cannot connect.

    What are the two most likely causes of this? (Choose two.)

    Answer choices:A. Your Service Set Identifier (SSID) is mismatched between the laptop computer and the

    router.

    B. Your laptop computer needs a static IP address.

    C. Your laptop computer needs the IP address renewed.

    D. Your laptop computer's signal antenna is damaged.

    Explanation:If the SSIDs are mismatched, then you cannot authenticate to the wireless router,

    Your laptop computer may still be using the IP address from the coffee shop - releasing and

    then acquiring a new IP addressshould solve the problem.

    You do not need to configure a static address to connect to a wireless router - most routers

    use DHCP to connect devices.

    The antenna could be damaged, but since it worked at the coffee shop, this is not the most

    likely cause.

    Additional Information:

    http://searchnetworking.techtarget.com/news/945257/Wireless-network-troubleshooting-

    Connectivity

    http://searchnetworking.techtarget.com/news/945257/Wireless-network-troubleshooting-Connectivityhttp://searchnetworking.techtarget.com/news/945257/Wireless-network-troubleshooting-Connectivityhttp://searchnetworking.techtarget.com/news/945257/Wireless-network-troubleshooting-Connectivityhttp://searchnetworking.techtarget.com/news/945257/Wireless-network-troubleshooting-Connectivity
  • 8/10/2019 HPATA Net Study Guide

    27/32

    Designing & Deploying Network Solutions

    Study Guide 26

    5.4 Troubleshoot security faults and threats

    Question:You are troubleshooting a communication problem that has occurred between your

    customer's home office and a remote branch. Recently, you enabled MD5 authentication on

    the routers that are running Routing Information Protocol (RIP).

    What are the two most likely reasons that communications are failing? (Choose two.)

    Answer choices:A. The key chain names are mismatched.

    B. The key chain identification numbers are mismatched.

    C. The key string is different between the routers.

    D. The routers need to be rebooted for changes to take effect.

    Explanation:The key chain identifierand key stringmust match between the routers.

    The key chain name can be different on the two routers.

    Changes in routers take place in real-time, so a reboot is not necessary.

    Additional Information:

    http://www.cisco.com/en/US/tech/tk365/technologies_configuration_example09186a0080

    093f1c.shtml

    http://www.cisco.com/en/US/tech/tk365/technologies_configuration_example09186a0080093f1c.shtmlhttp://www.cisco.com/en/US/tech/tk365/technologies_configuration_example09186a0080093f1c.shtmlhttp://www.cisco.com/en/US/tech/tk365/technologies_configuration_example09186a0080093f1c.shtmlhttp://www.cisco.com/en/US/tech/tk365/technologies_configuration_example09186a0080093f1c.shtml
  • 8/10/2019 HPATA Net Study Guide

    28/32

    Designing & Deploying Network Solutions

    Study Guide 27

    5.5 Troubleshoot common network issues using the HPTroubleshooting methodology

    Question:

    A customer's Windows computer is configured to automatically receive an IP address and italso has Automatic Private IP Addressing (APIPA) enabled.

    You use the ipconfig command to view the TCP/IP settings on the computer and discover

    that it has an IP address of 0.0.0.0.

    What is most likely wrong?

    Answer choices:A. The network Dynamic Host Configuration Protocol (DHCP) server is down.

    B. The TCP/IP protocol suite did not initialize during startup.

    C.

    Windows cannot detect a connection to the network media.

    D. There is no Windows Internet Name Service (WINS) server available.

    Explanation:The most likely problem is that Windows cannot detect a connection to the network

    media. An unknown address (0.0.0.0) is assigned to the network adapter when the network

    is not detected.

    The problem is likely not with the DHCP server. Because APIPA is enabled, if the DHCP server

    is not available, the computer would have an address in the format 169.254.xxx.xxx.

    The problem is not that the TCP/IP protocol did not initialize. If the protocol did not

    initialize, your computer would not be able to report any kind of TCP/IP information.

    WINS has no part in dynamic address configuration. It is used for NetBIOS name resolution.

    Additional Information:

    http://technet.microsoft.com/en-us/library/cc940095.aspx

    http://technet.microsoft.com/en-us/library/cc940095.aspxhttp://technet.microsoft.com/en-us/library/cc940095.aspx
  • 8/10/2019 HPATA Net Study Guide

    29/32

    Designing & Deploying Network Solutions

    Study Guide 28

    Unit 6Perform administrative, operational, and

    network management tasks for SMBcustomers

    6.1 Perform change management to network configuration and devices

    6.2 Manage network events and policies

    6.3 Perform Network Administration tasks

  • 8/10/2019 HPATA Net Study Guide

    30/32

    Designing & Deploying Network Solutions

    Study Guide 29

    6.1 Perform change management to network configuration anddevices

    Question:

    One of your customers asks you to update the IOS Version of its routers.

    What three steps should you take before you do the update? (Choose three.)

    Answer choices:A. Document the existing IOS Versions on each router.

    B. Purchase additional routers in case the update fails.

    C. Research the impact on the company if down time will be necessary to complete the

    upgrade.

    D. Have a backup plan ready if the upgrade is unsuccessful.

    E.

    Monitor the I/O performance on all routers.

    Explanation:Documentingexisting versionsof the IOS is a key step of change management.

    Researching downtimeis also an important step.

    Having a backup planin case the upgrade causes problems is also recommended.

    Purchasing equipment is not recommended because the new equipment should not be

    needed and may not have the correct version of IOS software you are using.

    Monitoring router performance is a good practice, but doing so is not necessary during an

    IOS upgrade.

    Additional Information:

    http://www.itsm.info/ITSM%20Change%20Management%20Best%20Practices.pdf

    http://www.itsm.info/ITSM%20Change%20Management%20Best%20Practices.pdfhttp://www.itsm.info/ITSM%20Change%20Management%20Best%20Practices.pdfhttp://www.itsm.info/ITSM%20Change%20Management%20Best%20Practices.pdf
  • 8/10/2019 HPATA Net Study Guide

    31/32

    Designing & Deploying Network Solutions

    Study Guide 30

    6.2 Manage network events and policies

    Question:Which device should you use for a customer who wants to prevent traffic destined for a

    specific port from being received from the Internet?

    Answer choices:A. Switch

    B. Bridge

    C. IDS

    D. Firewall

    Explanation:A firewallis used to prevent traffic destined for a specific port from traveling between one

    network and another. You can create firewall rules that allow or disallow traffic sent orreceived on a specific port. A firewall can be implemented using a hardware device or

    software.

    A switch is a device used to connect networks. A switch can operate at Layer 2 or Layer 3 of

    the Open Systems Interconnect (OSI) model. Although some switches can include firewall

    functionality, it is the firewall that is filtering the traffic, not the switch.

    A bridge is a Layer 2 device that is used to connect two networks that use the same access

    method. For example, it can be used to connect an Ethernet network to a different Ethernet

    network. It does not filter traffic.

    An Intrusion Detection System (IDS) watches for patterns that indicate that an attack is

    underway. An IDS does not filter traffic sent between networks.

    Additional Information:

    http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci212125,00.html

    http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci212125,00.htmlhttp://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci212125,00.html
  • 8/10/2019 HPATA Net Study Guide

    32/32

    Designing & Deploying Network Solutions

    6.3 Perform Network Administration tasks

    Question:Which type of firewall filtering would you configure for a customer to filter traffic based on

    packet content?

    Answer choices:A. Stateful inspection

    B. Intrusion detection

    C. Application-level

    D. Port and address

    Explanation:Application-levelfiltering filters traffic based on packet content. The firewall opens the

    packets and inspects the content to determine whether or not to pass the packet. TheWindows internal firewall does not support this feature, but most external firewalls

    designed for business applications do support application-level filtering.

    Port and address filtering does not filter traffic based on content, but instead based on

    source and destination. This is the most common filtering method.

    Stateful inspection filtering allows or blocks packets based on access policy, not on packet

    content.

    Intrusion detection is not a filtering method. It is a monitoring process used to detect

    attempted attacks. Intrusion detection detects attacks based on traffic characteristics,referred to as the attack signature, and generates an alert so that appropriate action can be

    taken.

    Additional Information:

    http://searchsoftwarequality.techtarget.com/sDefinition/0,,sid92_gci1188694,00.html

    http://searchsoftwarequality.techtarget.com/sDefinition/0,,sid92_gci1188694,00.htmlhttp://searchsoftwarequality.techtarget.com/sDefinition/0,,sid92_gci1188694,00.html