Vous êtes sur la page 1sur 4

1 What are two limitations of an ad hoc troubleshooting approach? (Choose two.

) inefficient use of time and resources only applicable to physical layer problems difficult to transfer the job to someone else can only be used after a structured approach has failed requires more technical knowledge than a structured approach 2 What are two facts regarding the information that is collected for baseline crea tion? (Choose two.) The information is the same for all networks. It can be used for capacity planning. It should be limited to only a few key performance statistics. It can be collected using tools such as NBAR, NetFlow, and SNMP. It should be collected only once and then archived for future reference. 3 After a proposed solution has been implemented, the network administrator realiz es that new problems have been introduced by the changes. What is the next step in the troubleshooting process? Propose a hypothesis. Execute the rollback plan. Determine an appropriate workaround. Escalate the problem to another department. 4 A network engineer initially uses the ping command to help troubleshoot a connec tion problem. Which troubleshooting approach best describes this scenario? bottom-up approach divide-and-conquer approach follow-the-path approach move-the-problem approach spot-the-difference approach top-down approach 5 What is a situation where escalation of an issue is inadvisable? Management has not been consulted. Escalation will slow the procedure. The problem is actually a set of problems. The problem has an impact on the performance of the entire network. Solving the problem would showcase the skills and knowledge of the troubleshoote r. 6 To correct an issue that was discovered a few days earlier, an administrator mak es a change during a regularly scheduled maintenance window. After making the ch ange, the administrator discovers that a new problem has occurred. What should t he administrator do next? Rollback the change and resume the troubleshooting process. Continue making changes until the symptoms disappear. Leave the change in place and troubleshoot the new problems at a later time. Gather information about the new problem and form a new hypothesis. 7 Which three types of data are useful for creating a baseline? (Choose three.) number of infrastructure routers and switches Remote Monitoring (RMON), Network Based Application Recognition (NBAR), and NetF low statistics

DHCP and NAT translation statistics network performance characteristics switch interface statistics of all access ports basic performance statistics like the interface load for critical network links and the CPU load and memory usage of routers and switches 8 After a network change that occurred during a scheduled maintenance window, user s were complaining about not being able to access a local file server. Upon inve stigation, the administrator determined that the problem was with the recently e ntered routing configurations. Because of company policy, the administrator is n ot allowed to correct the routing configuration outside of a scheduled maintenan ce window. Instead, the administrator moved the file server to an accessible sub net. Which statement describes what the administrator did? The administrator determined a solution to the problem. The administrator determined a workaround for the problem. The administrator applied the move the problem troubleshooting approach. The administrator applied the spot the difference troubleshooting approach. 9 Which three IOS features can be used to keep the network documentation accurate? (Choose three.) rollback feature policy compliance configuration archive performance monitoring basic performance statistics Embedded Event Manager 10 A network administrator executes the show processes cpu command on a production router and notices that the average CPU load over the past 5 seconds was 97% and over the last one minute was around 39%. What should the administrator do next? Nothing. This is normal behavior for an ISR router. Contact the service provider because the contract is not being fulfilled as spec ified in the SLA. Compare the result to the baseline for an accurate assessment. Replace the router as soon as possible because it has reached capacity. 11 Which two procedures can be implemented to ensure that current backups of all de vice configurations are maintained? (Choose two.) Log all configuration change events to a syslog server. Password protect all devices to prevent configuration changes. Implement a system to create automatic configuration backups. Update configuration backups only after major network outages. Create configuration backups as soon as an issue is reported with network perfor mance. 12 A user creates a trouble ticket indicating that the Internet is inaccessible. Th e network administrator receives the ticket and determines that this user is the only one having problems. A ping command issued from the administrative PC to t he user PC is successful. What should the administrator do next? Escalate the issue to the desktop support group. Contact the ISP to determine if there is an issue on the ISP side. View the route table on the core router to determine if there is a routing issue . Swap out the patch cable between the user PC and the switch to determine if that solves the problem.

13 What is a symptom of an incorrectly applied network command when issued under th e routing process? a down status on an interface a timeout message when attempting to ping a device on another network a routing protocol that is not running a user who is unable to connect to machines that are located on the same subnet 14 Which two components are normally considered part of change control? (Choose two .) the cost of network changes the time when changes can be made the technology that is used to implement changes the authorization that is required to make changes the staff changes that are required to carry out repairs 15 In which phase of the structured troubleshooting process should a network admini strator clearly communicate to the affected network users what is going to be do ne and why it is being done? the analysis of information the definition of the problem the elimination of possibilities the gathering of facts the proposal and testing of a hypothesis 16 What is a benefit of change control during the processes of regular network main tenance? simplification of the process for creating a network baseline reduction in the frequency and duration of unplanned outages elimination of the need to troubleshoot planned outages elimination of the need to perform a regular network backup 17 In which structured troubleshooting process phase would a network engineer ask q uestions such as When did it last work? or Has it ever worked? analyze information phase define the problem phase eliminate possibilities phase gather facts phase propose a hypothesis phase solve the problem phase 18 What is an important element of troubleshooting, regardless of the method used? using a single troubleshooting process executing the steps in the same order every time following a structured and systematic process spending a significant amount of time analyzing the information 19 The help desk receives several calls on Monday morning stating that users cannot connect to a local print server that was working on Friday. Which statement abo ut the problem would be correct? The inability to connect to the print server is a symptom of a problem. The inability to connect to the print server is the problem. The connectivity problem occurred Monday morning.

The inability to connect to the print server caused the problem. 20 http://www.putlockerdownload.net/down/dl_put2.php?name=JBEQ8SRY%C3%91QE.ene&file =uggc%3A%2F%2Fjjj.chgybpxre.pbz%2Fsvyr%2F8N7509033432OQ3O&pub=ap384146--topbar&d ld=0

What type of information can be gathered by using SNMP during the process of col lecting baseline information? basic performance statistics via the use of show commands basic performance statistics for Layer 2 and Layer 3 protocols basic performance statistics about the interface load for critical network links basic performance statistics to profile different types of traffic on the networ k

Vous aimerez peut-être aussi