1. Excessive broadcasts are generally a symptom of a problem at which layer?
2. Refer to the exhibit. Users at Branch B are reporting trouble accessing a corporate website running on a server that is located at HQ. HQ and Branch A users can access the website. R3 is able to ping 10.10.10.1 successfully but not 10.10.10.2. The users at Branch B can access servers at Branch A. Which two statements are true aboutthe troubleshooting efforts? (Choose two.)
Frame Relay at R3 and R2 should be tested to narrow the scope of the problem.
An ACL entry error could cause the failure at Layer 4 in either R3 or R2.
3. What is one example of a physical layer problem?
incorrect clock rate
4. Which two components should be taken into consideration when establishing a network baseline? (Choose two.)
information about the network design
expected performance under normal operating conditions
5. Refer to the exhibit. Which two steps should be taken during the process of creating network documentation? (Choose two.)
Record the information about the devices discovered in the entire network, including the remote locations.
Transfer any information about the devices from the network configuration table that corresponds to a component of the topology diagram.
6. A technician has been asked to troubleshoot an existing switched network but is unable to locate documentation for the VLAN configuration. Which troubleshooting tool allows the technician to map and discover VLAN and port assignments?
7. What combination of IP address and wildcard mask should be used to specify only the last 8 addresses in the subnet 192.168.3.32/28?
8. Information about which OSI layers of connected Cisco devices can be verified with the show cdp neighbors command?
Layer 1, Layer 2, and Layer 3
9. A technician has been asked to make several changes to the configuration and topology of a network and then determine the outcome of the changes. What tool can be used to determine the overall effect caused by the changes?
10. Which two pieces of information are typically found on a logical network diagram? (Choose two.)
DLCI for virtual circuits
11. Refer to the exhibit. Which three pieces of information can be determined by analyzing the output shown? (Choose three.)
A carrier detect signal is present.
Keepalives are being received successfully.
The LCP negotiation phase is complete.
12. Clients across the company are reporting poor performance across all corporate applications running in the data center. Internet access and applications running across the corporate WAN are performing normally. The network administrator observes a continual broadcast of random meaningless traffic (jabber) on the application server LAN in the data center on a protocol analyzer. How should the administrator start troubleshooting?
The jabber in the data center indicates a local physical layer problem. Use the protocol analyzer to determine the source of the jabber, and then check for a recent NIC driver update or bad cabling.
13. When gathering symptoms for troubleshooting a network problem, which step could result in getting an external administrator involved in the process?
14. A network administrator has received complaints that users on a local LAN can retrieve e-mail from a remote e-mail server but are unable to open web pages on the same server. Services at which two layers of the OSI model should be investigated during the troubleshooting process? (Choose two.)
15. Users are complaining of very long wait times to access resources on the network. The show interface command reveals collision counts far above the network baseline. At which OSI layer should the administrator begin troubleshooting?
16. Which troubleshooting approach is suggested for dealing with a complex problem that is suspected of being caused by faulty network cabling?
17. Which two statements are true concerning logical networking models? (Choose two.)
The top layer of the TCP/IP model combines the functions of the top three OSI layers.
The TCP/IP network access layer corresponds to the OSI physical and data link layers.
18. Which three approaches should be used when attempting to gather data from users for troubleshooting? (Choose three.)
Obtain information by asking simple pertinent questions.
Determine if the problem is related to time or a specific event.
Determine if the user can re-create the problem or events leading to the problem.
19. Refer to the exhibit. Users on the Internal LAN are unable to connect to the www server. The network administrator pings the server and verifies that NAT is functioning correctly. Which OSI layer should the administrator begin to troubleshoot next?
20. Encapsulation errors from mismatched WAN protocols on a serial link between two routers indicate a problem at which OSI layer?