CCNA 4 v6 Chapter 8: Check Your Understanding Questions Answers

CCNA 4 v6.0 (Connecting Networks v6) Chapter 8: Network Troubleshooting: Check Your Understanding Questions Answers

1. Which statement describes the physical topology for a LAN?

  • It defines how hosts and network devices connect to the LAN.
  • It depicts the addressing scheme that is employed in the LAN.
  • It describes whether the LAN is a broadcast or token-passing network.
  • It shows the order in which hosts access the network.

Explanation: A physical topology defines the way in which computers and other network devices are connected to a network.

2. When should a network performance baseline be measured?

  • After normal work hours to reduce possible interruptions
  • During normal work hours of an organization
  • Immediately after the main network devices are restarted
  • When a denial-of-service attack to the network is detected and blocked

Explanation: Baseline measurements should not be performed during times of unique traffic patterns because the data would provide an inaccurate picture of normal network operations. Baseline analysis of the network should be conducted on a regular basis during normal work hours of an organization. Perform an annual analysis of the entire network or baseline different sections of the network on a rotating basis. Analysis must be conducted regularly to understand how the network is affected by growth and other changes.

3. In which step of gathering symptoms does the network engineer determine if the problem is at the core, distribution, or access layer of the network?

  • Determine ownership.
  • Determine the symptoms.
  • Document the symptoms.
  • Gather information.
  • Narrow the scope.

Explanation: In the “narrow the scope” step of gathering symptoms, a network engineer will determine if the network problem is at the core, distribution, or access layer of the network. After this step is complete and the layer is identified, the network engineer can determine which pieces of equipment are the most likely cause.

4. A network technician is troubleshooting an email connection problem. Which question to the end user will provide clear information to better define the problem?

  • How big are the emails you tried to send?
  • Is your email working now?
  • What kind of equipment are you using to send emails?
  • When did you first notice your email problem?

Explanation: To efficiently establish exactly when the user first experienced email problems, the technician should ask an open-ended question so that the user can state the day and time that the problem was first noticed. Closed questions require only a yes or no answer, which will require further questions to determine the actual time of the problem.

5. A team of engineers has identified a solution to a significant network problem. The proposed solution is likely to affect critical network infrastructure components. What should the team follow while implementing the solution to avoid interfering with other processes and infrastructure?

  • Change-control procedures
  • Knowledge base guidelines
  • One of the layered troubleshooting approaches
  • Syslog messages and reports

Explanation: Change-control procedures should be established and applied for each stage to ensure a consistent approach to implementing the solutions and to enable changes to be rolled back if they cause other unforeseen problems.

6. A network engineer is troubleshooting a network problem and can successfully ping between two devices. However, Telnet between the same two devices does not work. Which OSI layers should the administrator investigate next?

  • All the layers
  • From the network layer to the application layer
  • From the network layer to the physical layer
  • Only the network layer

Explanation: A successful ping indicates that everything is working on the physical, data link, and network layer. All of the other layers should be investigated.

7. Which troubleshooting method begins by examining cable connections and wiring issues?

  • Bottom-up
  • Divide-and-conquer
  • Substitution
  • Top-down

Explanation: In bottom-up troubleshooting, you start with the physical components of the network and move up through the layers of the OSI model until the cause of the problem is identified.

CCNA 4 v6 Chapter 8: Check Your Understanding Questions Answers 1

8. An administrator is troubleshooting an Internet connectivity problem on a router. The output of the show interfaces gigabitethernet 0/0 command reveals higher than normal framing errors on the interface that connects to the Internet. At what layer of the OSI model is the problem likely occurring?

  • Layer 1
  • Layer 2
  • Layer 3
  • Layer 4
  • Layer 7

Explanation: Framing errors are symptoms of problems at the data-link layer, Layer 2, of the OSI model.

9. Users report that the new website http://www.company1.biz cannot be accessed. The helpdesk technician checks and verifies that the website can be accessed with http://www.company1.biz:90. Which layer in the TCP/IP model is involved in troubleshooting this issue?

  • Application
  • Internet
  • Network access
  • Transport

Explanation: The issue is that the new website is configured with TCP port 90 for HTTP, which is different from the normal TCP port 80. Therefore, this is a transport layer issue.

10. A user reports that after an OS patch of the networking subsystem has been applied to a workstation, it performs very slowly when connecting to network resources. A network technician tests the link with a cable analyzer and notices that the workstation sends an excessive number of frames smaller than 64 bytes and also other meaningless frames. What is the possible cause of the problem?

  • Cabling faults
  • Corrupted application installation
  • Corrupted NIC driver
  • Ethernet signal attenuation

Explanation: The symptom of excessive runt packets and jabber is typically a Layer 1 issue, such as caused by a corrupted NIC driver, which could be the result of a software error during the NIC driver upgrade process. Cable faults would cause intermittent connections, but in this case, the network is not touched and the cable analyzer has detected frame problems, not signal problems. Ethernet signal attenuation is caused by an extended or long cable, but in this case, the cable has not been changed. A NIC driver is part of the operating system; it is not an application.

11. A networked PC is having trouble accessing the Internet, but it can print to a local printer and ping other computers in the area. Other computers on the same network are not having any issues. What is the problem?

  • The default gateway router does not have a default route.
  • The link between the switch to which the PC connects and the default gateway router is down.
  • The PC has a missing or incorrect default gateway.
  • The switch port to which the PC connects has an incorrect VLAN configured.

Explanation: Because other computers on the same network work properly, the default gateway router has a default route, and the link between the workgroup switch and the router works. An incorrectly configured switch port VLAN would not cause these symptoms.

12. Which three pieces of information are typically recorded in a logical topology diagram? (Choose three.)

  • Cable specifications
  • Device locations
  • Device models and manufacturers
  • IP address and prefix lengths
  • Routing protocols
  • Static routes

Explanation: Information recorded on a logical network diagram may include device identifiers, IP address and prefix lengths, interface identifiers, connection type, Frame Relay DLCI for virtual circuits (if applicable), site-to-site VPNs, routing protocols, static routes, data-link protocols, and WAN technologies used.

13. A company is setting up a website with SSL technology to protect the authentication credentials required to access the website. A network engineer needs to verify that the setup is correct and that the authentication is indeed encrypted. Which tool should be used?

  • Baselining tool
  • Cable analyzer
  • Fault-management tool
  • Protocol analyzer

Explanation: Protocol analyzers are useful to investigate packet content while flowing through the network. A protocol analyzer decodes the various protocol layers in a recorded frame and presents this information in a relatively easy-to-use format.

14. Which number represents the most severe level of syslog logging?

  • 0
  • 1
  • 6
  • 7

Explanation: The lower the level number, the higher the severity level. By default, all messages from level 0 to 7 are logged to the console.

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x