CCNA 4 Chapter 8 V6.0 Answers
1. When should a network performance baseline be measured?
when a denial of service attack to the network is detected and blocked
during normal work hours of an organization
immediately after the main network devices restarted
after normal work hours to reduce possible interruptions
2. After which step in the network troubleshooting process would one of the layered troubleshooting methods be used?
narrowing the scope
After which step in the network troubleshooting process would one of the layered troubleshooting methods be used?
gathering symptoms from suspect devices
determining ownership
3. An administrator is troubleshooting an Internet connectivity problem on a router. The output of the show interfaces gigabitethernet 0/0 command reveals higher than normal framing errors on the interface that connects to the Internet. At what layer of the OSI model is the problem likely occurring?
Layer 7
Layer 2
Layer 4
Layer 3
Layer 1
4. A networked PC is having trouble accessing the Internet, but can print to a local printer and ping other computers in the area. Other computers on the same network are not having any issues. What is the problem?
The PC has a missing or incorrect default gateway.
The link between the switch to which the PC connects and the default gateway router is down.
The switch port to which the PC connects has an incorrect VLAN configured.
The default gateway router does not have a default route.
5. Which troubleshooting method begins by examining cable connections and wiring issues?
Top-down
divide-and-conquer
substitution
bottom-up
6. A user in a large office calls technical support to complain that a PC has suddenly lost connectivity to the network. The technician asks the caller to talk to nearby users to see if other machines are affected. The caller reports that several immediate neighbors in the same department have a similar problem and that they cannot ping each other. Those who are seated in other departments have connectivity. What should the technician check as the first step in troubleshooting the issue?
the cable connection between a PC and a network outlet that is used by a neighbor
the status of the departmental workgroup switch in the wiring closet
the power outlet to the PC that is used by the caller
the trunks between switches in the wiring closet
the cable that connects the PC of the caller to the network jack
7. Users report that the new web site http://www.company1.biz cannot be accessed. The helpdesk technician checks and verifies that the web site can be accessed with http://www.company1.biz:90. Which layer in the TCP/IP model is involved in troubleshooting this issue?
internet
network access
transport
application
8. In which step of gathering symptoms does the network engineer determine if the problem is at the core, distribution, or access layer of the network?
Narrow the scope.
Determine the symptoms.
Determine ownership.
Document the symptoms.
Gather information.
9. Refer to the exhibit. On the basis of the information presented, which two IP SLA related statements are true? (Choose two.)
IP SLA 99 is measuring jitter.
IP SLA 99 is configured with the type dns target-addr 192.168.2.1 command.
IP SLA 99 is sending echo requests from IP address 192.168.2.1.
IP SLA 99 is sending echo requests every 10 seconds.
IP SLA 99 is scheduled to begin in 2 hours.
IP SLA 99 will run forever unless explicitly disabled.
10. Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.
A user reports that PC0 cannot visit the web server www.server.com. Troubleshoot the network configuration to identify the problem.
What is the cause of the problem?
A serial interface encapsulation is configured incorrectly.
A default route on HQ is not configured.
The clock rate on Branch S0/0/0 is configured incorrectly.
The DNS server address on PC0 is configured incorrectly.
11. A network engineer is troubleshooting a network problem and can successfully ping between two devices. However, Telnet between the same two devices does not work. Which OSI layers should the administrator investigate next?
only the network layer
from the network layer to the application layer
from the network layer to the physical layer
all of the layers
12. Which two specialized troubleshooting tools can monitor the amount of traffic that passes through a switch? (Choose two.)
NAM
DTX cable analyzer
TDR
digital multimeter
portable network analyzer
13. A network administrator is having issues with a newly installed network not appearing in other routers. At which layer of the OSI model is the network administrator going to start the troubleshooting process when using a top-down approach?
session
network
internet
application
transport
14. A user reports that after an OS patch of the networking subsystem has been applied to a workstation, it performs very slowly when connecting to network resources. A network technician tests the link with a cable analyzer and notices that the workstation sends an excessive number of frames smaller than 64 bytes and also other meaningless frames. What is the possible cause of the problem?
Ethernet signal attenuation
cabling faults
corrupted NIC driver
corrupted application installation
15. What is a purpose of establishing a network baseline?
It creates a point of reference for future network evaluations.
It manages the performance of network devices.
It checks the security configuration of network devices.
It provides a statistical average for network performance.
16. Fill in the blank.
Use the _ ARP_ cache to verify IPv4 address to Layer 2 Ethernet address mappings on a host computer.
17. Which three pieces of information are typically recorded in a logical topology diagram? (Choose three.)
routing protocols
static routes
device locations
cable specifications
device models and manufacturers
IP address and prefix lengths
18. A company is setting up a web site with SSL technology to protect the authentication credentials required to access the web site. A network engineer needs to verify that the setup is correct and that the authentication is indeed encrypted. Which tool should be used?
protocol analyzer
fault-management tool
cable analyzer
baselining tool
19. A team of engineers has identified a solution to a significant network problem. The proposed solution is likely to affect critical network infrastructure components. What should the team follow while implementing the solution to avoid interfering with other processes and infrastructure?
Knowledge base guidelines
one of the layered troubleshooting approaches
syslog messages and reports
change-control procedures
20. Refer to the exhibit. What action occurs at stage 3 of the general troubleshooting process?
Correct the problem.
Question end users.
Narrow the scope.
Document symptoms.
21. An internal corporate server can be accessed by internal PCs, but not by external Internet users that should have access. What could be the issue?
The switch port to which the server connects has an incorrect VLAN configured.
Static NAT has not been configured properly or at all.
The server does not have a private IP address assigned.
The default gateway router for the server does not have a default route.
22. Which number represents the most severe level of syslog logging?
1
6
0
7
23. A group of Windows PCs in a new subnet has been added to an Ethernet network. When testing the connectivity, a technician finds that these PCs can access local network resources but not the Internet resources. To troubleshoot the problem, the technician wants to initially confirm the IP address and DNS configurations on the PCs, and also verify connectivity to the local router. Which three Windows CLI commands and utilities will provide the necessary information? (Choose three.)
arp -a
nslookup
ipconfig
tracert
netsh interface ipv6 show neighbor
telnet
ping
24. Which category of software troubleshooting tools provides device-level monitoring, configuration, and fault-management?
host-based protocol analyzers
network management system tools
knowledge bases
baselining tools
25. A network technician is troubleshooting an email connection problem. Which question to the end-user will provide clear information to better define the problem?
How big are the emails you tried to send?
When did you first notice your email problem?
What kind of equipment are you using to send emails?
Is your email working now?
26. The newly configured ASBR that connects a company to the Internet has a default route configured and has the default-information originate command entered. Devices connected through this router can access the Internet. The problem is that no other OSPF routers have a default route in the routing table and no other users throughout the organization can access the Internet. What could be the problem?
The other routers are not configured to accept LSA type 4s.
The ASBR does not have an OSPF neighbor.
The ASBR does not have OSPF configured.
The ASBR should use the exit_interface argument instead of next-hop on the default route.
Leave a Reply