Sie sind auf Seite 1von 29

Module 1 - 100

Vo Van Giap - Take Exam

Exam questions

Time remaining: 00: 15: 27

1 . When creating standards for network diagrams; which document characteristic should you use primarily?

Icons

Inventory

Configuration

Command syntax

None of the above.

2 . What categories of information should you take into consideration when you document the properties of a router for a Network
Configuration Table? (Choose three)

STP state

interface IP address

routing protocol information

EtherChannel configuration

management IP address

interface types

3 . Which of the following documentation traits have to be addressed when creating network diagram standards?

Inventory

Abbreviations

Configurations

Command syntax

None of the above

4 . In order to be more proactive in the management of the Cisco network, an action plan was created. What step should an
administrator take while in the process of implementing an action plan?

Document the topology of the network.

Delete access lists on routers to isolate traffic.

Create troubleshooting steps as needed during the process.


Restore your network to a known previous state if the action item does not solve the problem.

None of the above.

5 . You’ve just been hired as the new senior systems administrator at the Cisco Corporation and although the network is working
perfectly and efficiently the previous system administrator left no network documentation. In order to create a network baseline, what
three steps should you take in creating this initial baseline? (Choose three)

Determine all the variables in the network and record them.

Determine the scope of the domain responsibility.

Record the baseline data for the first two months.

Determine the network performance goals.

Start the baseline network model with the access layer.

Identify the devices and ports of interest.

6 . Documenting the network is important for any network administrator. In which three ways is documentation beneficial? (Select
three)

Annual review

Managed access

Revision history

Guaranteed accuracy

Distribution efficiency

7 . Which of the following components should you include in an End-System Topology Diagram? (Choose all that apply.)

Device illustration

Operating system

IP routing protocol

Connection to the network

Device name

VTP domain

8 . What is true about the characteristics of a network topology diagram? (Choose all that apply)

It is a detailed report about the capabilities of the network.

It is an illustration of how each network is connected to the Internet.

It contains the components that the network configuration table does not contain.

It illustrates how each device in a network is connected.

It is defined by the aspects of its logical architecture.

9 . Which of the following guidelines should you adhere to if you wanted to ensure proper network documentation as network devices
and conditions change? (Choose four)

Be consistent

Know your objective

Document everything

Keep the documents accessible

Establish new baselines weekly

Maintain the documentation

10 . What can you find in the Cisco Documentation CD-ROM that is provided from Cisco?

Information on the most popular topics only

A search facility to go directly to the needed information

Similar information to the CCO web site but it is not in HTML format

Command references and command summaries, but not product catalog information

None of the above

11 . Having a library of standardized symbols and templates contributes to which network documentation guideline?

Document objectives

Document accessibility

Document scope

Document consistency

Document maintenance

12 . While a network performs at an acceptable level, what should you do in order to create a snapshot of a network configuration?

Establish a baseline

Configure snapshot routing

Use Netsys Baseliner

Use Netsys Analyzer

None of the above.

13 . The Topology Builder is a network tool that is included with which of the following?

Router Configuration File Loader

Connectivity Baseliner

Connectivity Solver

Topology Builder

Diagnostic Report Generator


14 . Which of the following items should you include in a network topology diagram? (Choose two)

Individual end user systems.

Location of configuration files.

Illustrations of each network device.

Representations of logical and physical connections.

Speed and duplex of individual switch ports.

15 . Which one of the following is the leading cause of lost network availability?

Natural disasters

Operational errors

Network device software failures

Network device outage at single points of failure in the topology

End user error

16 . Network Topology Diagrams and Network Configuration Tables share two similarities. What are they? (Choose two)

Both share few components.

Both share many of the same components.

Both define physical memory components.

Both are used for troubleshooting.

Both use lines and symbols to represent network components.

17 . Which of the following pieces of information are relevant to an end-system network configuration table? Select four.

network media type

DNS server address

default gateway address

routing protocol characteristics

operating system and version

IP address and subnet mask

18 . Which of the following best describes the measurements of your network under normal conditions?

synchronized

baseline

average

log
19 . Which of the following is a network process characterized by the following: Log in, Interface discovery, and Device discovery?

Network testing

Network documentation

Network configuration

Network troubleshooting

All of the above

Showing page 1 of 1 : 1 Go!

© 2004 HanoiCTT. All rights reserved.


Module 2 - 94

Le Son - Take Exam

Exam questions

Time remaining: 00: 38: 40

1 . You have found that your solution to a problem doesn’t work. What should be the next step?

Undo all changes and reload all software

Replace the defective hardware

Undo one change at a time and test

Gather more facts

2 . Which of the following produces the lowest logging overhead?

console

buffer

syslog server

virtual terminal server

3 . When analyzing a network problem; in what terms should a network troubleshooter define the problem?

Symptoms and root causes

Root causes and root benefits

Benefits and ROI

Causes and benefits

Symptoms and potential causes

4 . Network trobleshooters are like detectives, sometimes they have to bring in network users for questioning in order to determine
what the problem is. In which troubleshooting step does this happen?

Verifying the information

Defining the problem

Isolating the problem

Gathering facts

Logging the trouble ticket

None of the above.


5 . The general troubleshooting process is composed of three essential stages. What are these three steps in the general
troubleshooting process? (Choose three)

Isolate Symptoms

Isolate the problem

Correct the problem

Identify the problem

Gather Symptoms

Document the problem

Research Solutions

6 . Which of the following is not a way for users to contact TAC (Technical Assistance Center)?

phone

email

postal service

CCO

Fax

7 . You are having problems with other vendor’s devices. What would you use to help you with this situation?

CCO Software Center

Stack Decoder

Troubleshooting Assistant

Open Forum

8 . Is the following statement true or false? Systematic approaches are very effective when troubleshooting networks.

True only when you are running IOS to manage the network gears.

False

True only when CWSI is in use.

True

True only when all network gear is Cisco based

9 . What are four reasons for proper handling of the Cisco troubleshooting tools? Choose four.

So you know how to stop the tool when you are done using it

Certain tools may cause router performance issues

So you can keep certain tools running at all times

So you know about the most selective and focused use of the diagnostic tool
So you know how you can minimize the impact of your troubleshooting in other processes competing for resources on the netwo
device

10 . You’re a network administrator, and while you were gone in vacation; your junior administrator installed a new router. Since then
response time for end users on the network has degraded to the point of concern. To begin troubleshooting you start by examining th
routing protocol operations, and then check the physical connections on the affected devices. What is the name of this troubleshootin
method?

Bottom-up

Experience based

Top-down

Divide-and-conquer

None of the above.

11 . What is the general idea of using a troubleshooting model?

You normally don’t need a troubleshooting model because this takes up too much time. You’re better off trying to solve the
problem using standard solutions and hoping that this brings up the network before you have to implement a systematic
troubleshooting method

To systematically reduce a large set of possible trouble causes to a small set of causes or a single cause. Using a troubleshootin
model also reduces the time to solve similar, future problems

To allow unexperienced network administrators a way to solve complex problems

To keep network documentation up-to-date

12 . What will a Cisco CSE consider when deciding how to work on a TAC case?

The severity of network degradation

The type of problem and the priority level

How many cases the CSE is currently working on

In the order they were received

13 . When troubleshooting a network, what are the advantages of using a logically layered network model?

Focus on physical, data link and network layers to isolate a problem.

Focus on specific elements to isolate a problem.

Focus on physical layers to isolate a problem

Focus on transport and application layers to isolate a problem.

None of the above.

14 . A Cisco Support Engineer (CSE) asks for the output from the “show interface” command. The problem is most likely:

A performance issue

A crash or hung system

A partial loss of system function


A serial link problem

15 . The CCO Software Center provides:

Online upgrades and maintenance releases of Cisco software products

Monitoring of network traffic and measuring data flow

Configuration management

you to see the effect that certain changes will make on a network without actually making the changes

16 . Which of the following is a network process characterized by the following: Log in, Interface discovery, and Device discovery?

Network testing

Network documentation

Network configuration

Network troubleshooting

All of the above

17 . According to Cisco’s problem-solving model, what should a network troubleshooter do after they have resolved a problem?

Gather facts about the problem.

Call TAC to have the case closed.

Document the changes that were made.

Try the same solution on another router to verify the fix.

Showing page 1 of 1 : 1 Go!

© 2004 HanoiCTT. All rights reserved.


Module 3 - 90

Le Son - Take Exam

Exam questions

Time remaining: 00: 45: 22

1 . When you use the “show interface” command, you see a number of overruns. This most likely indicates:

Buffers may be damaged

The receiver was unable to move data to a buffer because the input rate exceeded the receiver’s ability

Packets were received with CRC errors

Packets exceeded the maximum packet size

2 . Caution should be used when performing “debug” commands because (Choose three):

many are processor intensive

they can cause degraded performance

using them can sometimes result in loss of connectivity

you have to recycle the router to clear them from NVRAM

3 . What would you most likely use to check for attenuation?

Digital Multimeter

Breakout Box

Protocol Analyzer

Cable Tester

4 . You want to use the following two DNS servers for name resolution and you want the search order for domain name resolutions a
follows: First 10.1.1.1 and then 0.1.1.2. What would be the easiest way to do this?

B
C

5 . What tool should you use to check for attenuation and return loss in the three predominant wavelengths -- 850nm, 1300nm, and
1500nm?

TDR

Fiber Optic Cable Tester

Volt-Ohm Meter

Digital Multimeter

6 . By default, logging goes to the:

buffer

console

terminal

syslog server

7 . To what three destinations can a Cisco router send its logging processes and error messages to? (Choose three)

Message directory

External syslog server

Logging buffer

Terminal lines

History file

Configuration file

8 . What RJ-45 pins does ISDN use for transmit/receive?

1,2,3,4

1,8

3,4,5,6

1,2,7,8

9 . When done configuring an interface, what should you always do next?

Perform the “no shutdown” command

Exit the interface configuration mode

Ping the default gateway of the router

Shut down the interface

10 . What is not a reason for a complete interface reset?


Link congestion

Interface hardware problem

Clocking signal problem

Counters cleared with the “clear interface” command

11 . Which two inexpensive tools would you use to check cable continuity?

TDR

Volt-Ohm Meter

OTDR

Multimeter

12 . You are trying to reach a network other than your own. You notice that the packet does not reach its destination. What could be
the problem? Choose two.

There is no default gateway configured on the router

There is no “gateway of last resort” configured on the router

The domain SOA (Start of Authority) record is corrupt

There is not an entry for this destination in the DNS cache

13 . What tool could you use to check a damaged cable with NO shorts or breaks?

TDR

OTDR

Volt-Ohm Meter

Breakout Box

14 . What tool is used to record, interpret, and display network traffic.

Protocol Analyzer (Network Analyzer)

Network Monitor

Breakout Box

OTDR

15 . What tool should you use to check for shorts, sharp bends, crimps, kinks, impedance mismatches, and other defects in your
cabling?

Digital Multimeter

Volt-Ohm Meter

TDR

Network Monitor
16 . What is a good troubleshooting technique to use to eliminate uncertainties about cable breaks or problems?

Replace the cable in question using a known good external cable

Replace the network cards on both ends

Turn on half-duplex on the network cards on both ends

Use a higher quality cable

17 . Which IOS command could you use to keep track of the exact time and date that a debug output occurred at or the duration of
events?

debug all

service timestamps

access list

debug events

terminal monitor

18 . When you use the “show interface” command, you see a number of underruns. This most likely indicates:

Buffers may be damaged

The receiver was unable to move data to a buffer because the input rate exceeded the receiver’s ability

The transmitter has run faster than the router could handle

Packets exceeded the maximum packet size

19 . You have decided to manually create your own hostname table. What command will you have to use?

20 . A problem while troubleshooting fiber optic networks is called fiber optic asymmetric connectivity? Which of the following best
describes this?

Both sides of a transmit and receive cable pair fails

The transmit cable fails while the receive cable continues working

The receive cable fails while the transmit cable continues working

One side of a transmit and receive cable fails, but the remaining cable nonetheless forwards frames

21 . When you type an incorrect command at the router prompt, a broadcast is generated to look for a DNS server to try to resolve th
incorrect command. This can waste time, so what do you do to terminate this process?

Ctrl-Alt-Delete

Ctrl-Z

Ctrl-X

Ctrl-Shift-6-X

Ctrl-Shift-6

Showing page 1 of 1 : 1 Go!

© 2004 HanoiCTT. All rights reserved.


Module 4 - 100

Vo Van Giap - Take Exam

Exam questions

Time remaining: 00: 36: 18

1 . Only the local DLCI 0 and DLCI 1023 come up. What should you do?

Check again in 5 minutes because DLCIs take approximately 5 minutes to become active after being configured

Use the “show frame-relay map” command to check the status of the DLCIs

Change the encapsulation to ITU-T

Focus your troubleshooting at the other end of the connection

2 . What does the following output from the “debug isdn q931” command tell you?

A call teardown procedure from the router

A call teardown procedure from the network

A call setup procedure for an outgoing call

A call setup procedure for an incoming call

3 . You should not configure a VTP server offline because:

it doesn’t matter, you can configure a VTP server online or offline

it may automatically switch to transparent mode without first switching to client mode

the spanning tree root-bridge may become the root port

you run the risk of an inconsistency when it prevents a VTP advert revision that does not accurately reflect the domain
4 . What type of switching is used with debugging?

Process

Fast

CEF

Cut-through

5 . What is true regarding the LMI?

It must be configured manually

It is automatically auto-sensed on a router

Your LMI does not have to match the service providers LMI

If your router supports auto-sensing, you can’t manually configure the LMI

6 . The following is output from the “debug ppp negotiation” command. What does this output tell you?

The remote side is not responding

This is a normal negotiation, where both sides agree on Network Control Program (NCP) parameters

The local side is not responding

The router is not trying to bring up LCP

7 . What does the following output from the “debug isdn q931” command tell you?
A call teardown procedure from the router

A call teardown procedure from the network

A call setup procedure for an outgoing call

A call setup procedure for an incoming call

8 . What command would you use to view the bundle name of the connected client device?

show ppp bundle

debug ppp negotiation

show ppp multilink

show ppp authentication

9 . While using the “debug isdn q921” command, what is the first AI value after doing a “no shut” on the BRI 0 interface to start a TEI
(Terminal Endpoint Identifier)?

64

127

128

10 . When troubleshooting a problem in an NT/95 network, you should first:

Check the server configuration

Check the host configuration

Check the router configuration

Check IP addressing and subnetting

11 . Which is a cause of slow VLAN performance?

Too many instances of STP (Spanning Tree Protocol)

Too many VLAN changes being made

Poor traffic patterns


A campus-wide VLAN model following the 80/20 rule

12 . What does the following output from the “debug isdn q931” command tell you?

A call teardown procedure from the router

A call teardown procedure from the network

A call setup procedure for an outgoing call

A call setup procedure for an incoming call

13 . Look at the following output. What LMI type is being used as indicated by the question mark (?)?

CISCO

ANSI

q933a

802.1q

14 . What command would you use to display the LMI DLCI number on a Frame Relay interface?

show frame-relay map

show frame-relay pvc

show frame-relay dlci

show frame-relay stats

15 . When using a certain command, you see the following output: Advertisement version:2 What does this mean?

You are using the RIPv2 routing protocol on a device

You are using Cisco Discovery Protocol Version 2 (CDPv2) advertising functionality on a device
The advertising functionality of the routing table is using version 2

You must be using a post-IOS version that does not support CDPv1

You are using VTP version 2

16 . What does the following output from the “debug isdn q931” command tell you?

A call teardown procedure from the router

A call teardown procedure from the network

A call setup procedure for an outgoing call

A call setup procedure for an incoming call

17 . The most likely cause of a browsing problem in an NT/95 network is:

More than one master browser

Router failure

Interface hardware problem

Telnet not working correctly

18 . The following is output from the “debug ppp negotiation” command. What does this output tell you?
The remote side is not responding

This is a normal negotiation, where both sides agree on Network Control Program (NCP) parameters

The local side is not responding

The router is not trying to bring up LCP

19 . What command would you use to show the BRI 0 PPP status?

show ppp link

debug bri

show isdn status

show interface

20 . Look at the following output. What LMI type is being used as indicated by the question mark (?)?
CISCO

ANSI

q933a

802.1q

21 . How many VTP domains can a switch support?

128

1024

Showing page 1 of 1 : 1 Go!

© 2004 HanoiCTT. All rights reserved.


Module 7 - 100

Le Son - Take Exam

Exam questions

Time remaining: 00: 51: 48

1 . Your TFTP sessions are not completing. What is a troubleshooting step that you should take?

Verify that the TFTP server is not on the same network

Verify that the file you want to transfer is in the correct directory

Make sure that you are using Cisco’s TFTP server product

Make sure that the TFTP server is running on the switch

2 . You want to display the current TCP/IP network configuration parameters on a Windows 98 client. What command would you use

ipconfig

winipcfg

winipconfig

winipcfg /showclassid

3 . Which network management product provides configuration management?

TrafficDirector

NetSys

CiscoWorks 2000

CiscoView

4 . Which Cisco management product would you choose to manage Cisco switches?

TrafficDirector

CWSI

MRTG

Scion

5 . What layers does a given layer in the OSI model generally communicate with. Choose the best three answers.

The layer directly above it

All the layers above or below it


All the layers above it

The layer directly below it

Its peer layer in other networked computer systems

6 . What feature must you have to access additional RMON groups?

Spanning Tree

SPAN

RMON8

CWSI

7 . You’re working on a host PC and want to view the host routing table. What command do you use?

route view

route print

route add

route display

8 . Which Cisco network management product provides you with a real-time graphical representation of a router’s interfaces and
LED’s?

CiscoWorks

NetSys

Scion

CiscoView

9 . Where you send the system logs can affect the overhead of the system. What is the highest, in terms of the overhead produced.

virtual terminal logging

console logging

internal buffer logging

syslog server logging

10 . What four groups in the RMON specification (RFC 1757) does the Catalyst 5000 embedded RMON agent support?

Statistics Group

Supervisor Group

History Group

Alarms Group

Events Group

11 . When testing a prototype network and you are simulating normal network application load, a protocol analyzer can be used to:
Capture data

Identify errors

Verify network utilization

Determine percentage of broadcast traffic

All of the above

12 . You receive the following output: Router#traceroute 10.3.3.3 Type escape sequence to abort. Tracing the route to 10.3.3.3
Router# What does this output mean?

A timed-out request

An Unknown packet type

The network is not reachable

The port is not reachable

13 . Which network management product allows you to see the effect that certain changes will make on a network without actually
making the changes?

TrafficDirector

NetSys

CiscoWorks

CiscoView

14 . Which layer is responsible for flow control with sliding windows and reliability with sequence numbers and acknowledgments?

Application

Internet

Network Interface

Transport

15 . You’re working on a host PC and want to add a route to the host routing table. What command do you use?

route add

ip route

ip route add

route addition

16 . What are two major network management protocols?

SNMP

CHAP

PAP
RMON

Showing page 1 of 1 : 1 Go!

© 2004 HanoiCTT. All rights reserved.


Module 6 - 100

Nguyen Anh Dung - Take Exam

Exam questions

Time remaining: 00: 16: 05

1 . Which processes does TCP, but not UDP, use? Choose two.

Windowing

Acknowledgements

Source Port

Destination Port

2 . Which command would you use to clear all statistics from access list statements?

clear ip access-list counters

clear ip access list counters

clear access-list counters

clear access list counters

3 . What command would you use to display the contents of all current IP access lists?

show ip access-lists

show ip access lists

show ip acl

show ip access lists /all

4 . If you had to configure the router to forward DHCP broadcast packets through the use of a helper addresses, which two command
could you use? (Choose two)

ip forward-protocol

ip any helper-address

ip explicit-protocol

ip helper-address

5 . What would be a symptom of a connection-oriented protocol that would be an indication of a problem?

Errors not being reported back to the sender

Multiple retransmission of data segments


Data not being acknowledged

Data arriving out of order

6 . Ephemeral port numbers are known as:

ports that can be used as host ports and are temporary

ports that can be used as host ports and are permanent

well-known ports that are numbered from 1 through 1023

well-known ports that are numbered higher than 1023

7 . Two companies run different routing protocols after they are merged. Users experience intermittent IP communications problems.
All desktop protocols work correctly. What is the most likely cause of this problem?

There is a virus being inherited

NAT was not property configured

There is a spanning tree loop in the network.

The access list is not property implemented to stop feedback routes.

8 . Regarding the TCP Connect sequence, how are initial sequence numbers chosen?

Randomly

By the user

Initial sequence numbers always begin with 1

The TCP Connection sequence does not use sequence numbers because it uses SYN and ACK numbers

9 . 4. What should you check when troubleshooting a connectionless-oriented protocol? A. Check connection oriented upper layers B
Multiple retransmission of data segments C. Errors not being reported back to the sender D. Verify sequence numbers,
acknowledgements, and window sizes

Check connection oriented upper layers

Multiple retransmission of data segments

Errors not being reported back to the sender

Verify sequence numbers, acknowledgements, and window sizes

10 . Which network applications run over UDP?

SNMP

RPC

DNS

TFPT

IPX

11 . While looking at a datagram, you notice that the Protocol field contains 17. What protocol is being used to send the datagram?
TCP

IP

UDP

ICMP

12 . You need to ensure that NTP traffic can pass through access list 101, which is configured on router TK1. Which of the following
choices will allow NTP traffic?

access-list 101 permit ICMP 0.0.0.0 255.255.255.255 0.0.0.0 255.255.255.255

access-list 101 permit tcp 0.0.0.0 255.255.255.255 0.0.0.0 255.255.255.255

access-list 101 permit udp 0.0.0.0 255.255.255.255 0.0.0.0 255.255.255.255

access-list 101 permit tcp 0.0.0.0 255.255.255.255 0.0.0.0 255.255.255.255

13 . Which of the following are considered connection-oriented protocols? Choose two.

TCP

IP

SPX

IPX

14 . When comparing the OSI Reference Model to the DoD Model, UDP belongs in the __________ Layer of the DoD Model. This
DoD Layer maps to the _________ Layer in the OSI Reference Model.

Network, Transport

Application/Process, Session

Host to Host, Network

Host to Host, Transport

15 . Encryption and tunneling protocols that work with PAT Port/Address Translation) sometimes have problems. At which OSI level
PAT problems exist at?

Data Link Layer

Network Layer

Transport Layer

Presentation Layer

Physical Layer

16 . You are a mobile troubleshooter, and you've arrived to a jobsite to troubleshoot an old Windows NT network. The local MCSE
technician tells you that users are unable to browse the network neighborhood. What could be causing this problem? (Choose two)

Inaccurate routing entries in the LMHOSTS file.

Inaccurate resolution of non-IP entities into IP addresses.


Incomplete resolution of non-IP entities into IP addresses.

Incomplete configuration of IP entities to the IP routing table.

17 . What is the advantage of a connectionless protocol?

Robustness

Security

Speed

Error checking

18 . What command can you use to allow the forwarding of all UDP broadcasts using port 200?

ip 200 forward-protocol udp set

ip protocol udp 200

ip forward-protocol udp 200

ip forward 200 udp

ip forward-protocol tcp 200

19 . Which of the following best describes the process of the connection-oriented three-way handshake?

Three packets consisting of SYN, SYN/ACK, ACK

Two packets consisting of SYN, SYN/ACK (the second and third parts of the three-way handshake are including in the second
packet)

Three packets consisting of ACK, SYN, SYN/ACK

Three packets consisting of SYN, ACK, SYN

Showing page 1 of 1 : 1 Go!

© 2004 HanoiCTT. All rights reserved.

Das könnte Ihnen auch gefallen