




已阅读5页,还剩4页未读, 继续免费阅读
版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
CCNA Exploration 4 Accessing the WAN Chapter 81Which two statements are true concerning logical networking models? (Choose two.)26TCP/IP splits the lowest layer of the OSI model into two separate layers.The top layer of the TCP/IP model combines the functions of the top three OSI layers.Troubleshooting with the TCP/IP model requires different techniques than with the OSI model.The network access layer is responsible for exchanging packets between devices on a TCP/IP network.The Internet layer provides communication between applications, such as FTP, HTTP, and SMTP on separate hosts.The TCP/IP network access layer corresponds to the OSI physical and data link layers.2Excessive broadcasts are generally a symptom of a problem at which layer?2physicaldata linknetworktransport3Information about which OSI layers of connected Cisco devices can be verified with the show cdp neighbors command?2All layersLayer 1, Layer 2, and Layer 3Layer 1, Layer 2, Layer 3, and Layer 4Layer 6 and Layer 74Users are complaining of very long wait times to access resources on the network. The show interface command reveals collision counts far above the network baseline. At which OSI layer should the administrator begin troubleshooting?5applicationtransportnetworkdata linkphysical5Refer to the exhibit. Users at Branch B are reporting trouble accessing a corporate website running on a server that is located at HQ. HQ and Branch A users can access the website. R3 is able to ping successfully but not . The users at Branch B can access servers at Branch A. Which two statements are true aboutthe troubleshooting efforts? (Choose two.)24The web server should be tested for an application layer problem.Frame Relay at R3 and R2 should be tested to narrow the scope of the problem.The fact that users at Branch A are working normally proves that there is no problem at R2.An ACL entry error could cause the failure at Layer 4 in either R3 or R2.The successful ping from R3 to R1 proves that the WAN is functioning normally. Therefore, the problem has to be in the upper layers.6Which two pieces of information are typically found on a logical network diagram? (Choose two.)34cable typesconnector typesinterface identifiersDLCI for virtual circuitsoperating system versions7A technician has been asked to troubleshoot an existing switched network but is unable to locate documentation for the VLAN configuration. Which troubleshooting tool allows the technician to map and discover VLAN and port assignments?2cable analyzernetwork analyzerprotocol analyzerknowledge base8Encapsulation errors from mismatched WAN protocols on a serial link between two routers indicate a problem at which OSI layer?2physicaldata linknetworktransport9What is one example of a physical layer problem?4incorrect encapsulationincorrect STP configurationincorrect ARP mappingincorrect clock rate10Clients across the company are reporting poor performance across all corporate applications running in the data center. Internet access and applications running across the corporate WAN are performing normally. The network administrator observes a continual broadcast of random meaningless traffic (jabber) on the application server LAN in the data center on a protocol analyzer. How should the administrator start troubleshooting?1The jabber in the data center indicates a local physical layer problem. Use the protocol analyzer to determine the source of the jabber, and then check for a recent NIC driver update or bad cabling.Because all clients are experiencing application problems, the administrator should use a top-down approach with the application servers in the data center.The scope of the problem indicates a likely routing or spanning-tree problem. Begin by checking routing tables, and follow up using appropriate STP show commands to find a loop if routing is working normally.Poll the staff to determine if any recent changes have been made. Back out all the changes one by one until the error condition is fixed.11Refer to the exhibit. Which two steps should be taken during the process of creating network documentation? (Choose two.)23Record the information about the devices discovered in the Campus network only.Record the information about the devices discovered in the entire network, including the remote locations.Transfer any information about the devices from the network configuration table that corresponds to a component of the topology diagram.Transfer only the Layer 2 and Layer 3 information about the devices from the network configuration table that corresponds to a component of the topology diagram.Transfer the recorded information about the devices from the network configuration table gathered during peak network utilization that corresponds to a component of the topology diagram.12 Refer to the exhibit. Which three pieces of information can be determined by analyzing the output shown? (Choose three.)126A carrier detect signal is present.Keepalives are being received successfully.Default encapsulation is used on this serial link.Packets passing this interface cannot exceed 1 KB in size.The reliability of this link is very low.The LCP negotiation phase is complete.13When gathering symptoms for troubleshooting a network problem, which step could result in getting an external administrator involved in the process?4narrowing the scopegathering symptoms from suspect devicesanalyzing existing symptomsdetermining ownership14A technician has been asked to make several changes to the configuration and topology of a network and then determine the outcome of the changes. What tool can be used to determine the overall effect caused by the changes?1baselining toolknowledge baseprotocol analyzercable tester15Which two components should be taken into consideration when establishing a network baseline? (Choose two.)15information about the network designIP addressing allocation on the networkrequirements about the service provider setuprequirements for access control lists to regulate trafficexpected performance under normal operating conditions16Which troubleshooting approach is suggested for dealing with a complex problem that is suspected of being caused by faulty network cabling?1bottom uptop downdivide and conquermiddle out17A network administrator has received complaints that users on a local LAN can retrieve e-mail from a remote e-mail server but are unable to open web pages on the same server. Services at which two layers of the OSI model should be investigated during the troubleshooting process? (Choose two.)45physical layerdata link layernetwork layertransport layerapplication layer18Refer to the exhibit. Users on the Internal LAN are unable to connect to the www server. The network administrator pings the server and verifies that NAT is functioning correct
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2025年度居民区噪音控制与声级检测合同
- 2025年智能办公空间改造及消防系统全面升级服务合同
- 2025年专业户外运动基地设施租赁与维护管理合同
- 2025年科技企业知识产权维权与运营辅导服务协议
- 2025年环保型石油钻探设备租赁及绿色施工协议
- 2025年度绿色出行电动车租赁保养与维修服务合同
- 2025年度国际货物运输合同纠纷调解与国际贸易规则遵循指南
- 2025年银行承兑汇票保理业务保证合同范本
- 二零二五年企业内部网络安全风险评估及整改服务合同
- 2025年人工智能算法技术共享与保密约束合同
- 字画装裱合同协议
- 热连轧知识培训课件
- 保险合规培训课件
- 某房地产开发公司工程质量管理制度
- 2025年消控证考试题及答案
- 2023年全国电赛高职高专组综合测评题目时分闪光灯电路
- 校园反霸凌教育课件
- 全国卫生健康系统职业技能竞赛(传染病防治监督)参考试题库(含答案)
- 烟草专卖知识培训课件
- 北师大版四年级数学下册第六单元 2栽蒜苗(一) 同步练习(含答案)
- 采伐作业安全课件
评论
0/150
提交评论