Vous êtes sur la page 1sur 5

Assessment Results

Item Feedback Report

CCNP TSHOOT: Maintaining and Troubleshooting IP Networks (Version 6.0) - TSHOOT Chapter 2
Below is the feedback on items for which you did not receive full credit. Some interactive items may not display your response. Subscore:

1 The help desk receives several calls on Monday morning stating that users cannot connect to a local print server that was working on Friday. Which statement about the problem would be correct?
Correct Response Your Response The inability to connect to the print server is a symptom of a problem. The inability to connect to the print server is the problem. The connectivity problem occurred Monday morning. The inability to connect to the print server caused the problem.

2 What is a symptom of an incorrectly applied network command when issued under the routing process?
Correct Response Your Response a down status on an interface a timeout message when attempting to ping a device on another network a routing protocol that is not running a user who is unable to connect to machines that are located on the same subnet

3 After a network change that occurred during a scheduled maintenance window, users were complaining about not being able to access a local file server. Upon investigation, the administrator determined that the problem was with the recently entered routing configurations. Because of company policy, the administrator is not allowed to correct the routing configuration outside of a scheduled maintenance window. Instead, the administrator moved the file server to an accessible subnet. Which statement describes what the administrator did?
Correct Response Your Response The administrator determined a solution to the problem. The administrator determined a workaround for the problem. The administrator applied the "move the problem" troubleshooting approach. The administrator applied the "spot the difference" troubleshooting approach.

4 What are two limitations of an ad hoc troubleshooting approach? (Choose two.)


Correct Your

Response

Response inefficient use of time and resources only applicable to physical layer problems difficult to transfer the job to someone else can only be used after a structured approach has failed requires more technical knowledge than a structured approach

5 What is an important element of troubleshooting, regardless of the method used?


Correct Response Your Response using a single troubleshooting process executing the steps in the same order every time following a structured and systematic process spending a significant amount of time analyzing the information

6 A network engineer initially uses the ping command to help troubleshoot a connection problem. Which troubleshooting approach best describes this scenario?
Correct Response Your Response bottom-up approach divide-and-conquer approach follow-the-path approach move-the-problem approach spot-the-difference approach top-down approach

7 A user creates a trouble ticket indicating that the Internet is inaccessible. The network administrator receives the ticket and determines that this user is the only one having problems. A ping command issued from the administrative PC to the user PC is successful. What should the administrator do next?
Correct Response Your Response Escalate the issue to the desktop support group. Contact the ISP to determine if there is an issue on the ISP side. View the route table on the core router to determine if there is a routing issue. Swap out the patch cable between the user PC and the switch to determine if that solves the problem.

8 What is a situation where escalation of an issue is inadvisable?


Correct Response Your Response Management has not been consulted. Escalation will slow the procedure. The problem is actually a set of problems. The problem has an impact on the performance of the entire network. Solving the problem would showcase the skills and knowledge of the troubleshooter.

9 After a proposed solution has been implemented, the network administrator realizes that new problems have been introduced by the changes. What is the next step in the troubleshooting process?
Correct Your

Response

Response Propose a hypothesis. Execute the rollback plan. Determine an appropriate workaround. Escalate the problem to another department.

10 To correct an issue that was discovered a few days earlier, an administrator makes a change during a regularly scheduled maintenance window. After making the change, the administrator discovers that a new problem has occurred. What should the administrator do next?
Correct Response Your Response Rollback the change and resume the troubleshooting process. Continue making changes until the symptoms disappear. Leave the change in place and troubleshoot the new problems at a later time. Gather information about the new problem and form a new hypothesis.

11 What is a benefit of change control during the processes of regular network maintenance?
Correct Response Your Response simplification of the process for creating a network baseline reduction in the frequency and duration of unplanned outages elimination of the need to troubleshoot planned outages elimination of the need to perform a regular network backup

12 Which two components are normally considered part of change control? (Choose two.)
Correct Response Your Response the cost of network changes the time when changes can be made the technology that is used to implement changes the authorization that is required to make changes the staff changes that are required to carry out repairs

13 In which structured troubleshooting process phase would a network engineer ask questions such as "When did it last work?" or "Has it ever worked?"
Correct Response Your Response analyze information phase define the problem phase eliminate possibilities phase gather facts phase propose a hypothesis phase solve the problem phase

14 In which phase of the structured troubleshooting process should a network administrator clearly communicate to the affected network users what is going to be done and why it is being done?
Correct Response Your Response

the analysis of information the definition of the problem the elimination of possibilities the gathering of facts the proposal and testing of a hypothesis

15 Which three types of data are useful for creating a baseline? (Choose three.)
Correct Response Your Response number of infrastructure routers and switches Remote Monitoring (RMON), Network Based Application Recognition (NBAR), and NetFlow statistics DHCP and NAT translation statistics network performance characteristics switch interface statistics of all access ports basic performance statistics like the interface load for critical network links and the CPU load and memory usage of routers and switches

16 What are two facts regarding the information that is collected for baseline creation? (Choose two.)
Correct Response Your Response The information is the same for all networks. It can be used for capacity planning. It should be limited to only a few key performance statistics. It can be collected using tools such as NBAR, NetFlow, and SNMP. It should be collected only once and then archived for future reference.

17 A network administrator executes the show processes cpu command on a production router and notices that the average CPU load over the past 5 seconds was 97% and over the last one minute was around 39%. What should the administrator do next?
Correct Response Your Response Nothing. This is normal behavior for an ISR router. Contact the service provider because the contract is not being fulfilled as specified in the SLA. Compare the result to the baseline for an accurate assessment. Replace the router as soon as possible because it has reached capacity.

18 What type of information can be gathered by using SNMP during the process of collecting baseline information?
Correct Response Your Response basic performance statistics via the use of show commands basic performance statistics for Layer 2 and Layer 3 protocols basic performance statistics about the interface load for critical network links basic performance statistics to profile different types of traffic on the network

19 Which two procedures can be implemented to ensure that current backups of all device configurations are maintained? (Choose two.)

Correct Response

Your Response Log all configuration change events to a syslog server. Password protect all devices to prevent configuration changes. Implement a system to create automatic configuration backups. Update configuration backups only after major network outages. Create configuration backups as soon as an issue is reported with network performance.

20 Which three IOS features can be used to keep the network documentation accurate? (Choose three.)
Correct Response Your Response rollback feature policy compliance configuration archive performance monitoring basic performance statistics Embedded Event Manager

Vous aimerez peut-être aussi