1. What should a network administrator do first after receiving a call from a user who cannot access the company web server?
• Reboot the web server.
• Replace the NIC of the computer.
• Ask the user to log off and log on again.
• Ask the user what URL has been typed and what error message displays.
2. A customer called the cable company to report that the Internet connection is unstable. After trying several configuration changes, the technician decided to send the customer a new cable modem to try. What troubleshooting technique does this represent?
• top-down
• bottom-up
• substitution
• trial-and-error
• divide-and-conquer
3. Only one workstation on a particular network cannot reach the Internet. What is the first troubleshooting step if the divide-and-conquer method is being used?
• Check the NIC, and then check the cabling.
• Check the workstation TCP/IP configuration.
• Test all cables, and then test layer by layer up the OSI model.
• Attempt to Telnet, and then test layer by layer down the OSI model.
4. Which two troubleshooting techniques are suitable for both home networks and large corporate networks? (Choose two.)
• having a backup ISR
• running network monitoring applications
• documenting the troubleshooting process
• keeping a record of system upgrades and software versions
• keeping spare switches, routers, and other equipment available
5. Identify two physical-layer network problems. (Choose two.)
• hardware failure
• software configuration
• devices not able to ping
• loose cable connections
• device driver configuration
6. Which ipconfig command requests IP configuration from a DHCP server?
• ipconfig
• ipconfig /all
• ipconfig /renew
• ipconfig /release
7. What command is used to determine the location of delay for a packet traversing the Internet?
• ipconfig
• netstat
• nslookup
• ping
• tracert
8. What command is used to determine if a DNS server is providing name resolution?
• ipconfig
• netstat
• nslookup
• tracert
9. Which troubleshooting method begins by examining cable connections and wiring issues?
• top-down
• bottom-up
• substitution
• divide-and-conquer
10. A technician suspects that a Linksys integrated router is the source of a network problem. While troubleshooting, the technician notices a blinking green activity LED on some of the ports. What does this indicate?
• Self-diagnostics have not completed.
• The power supply is the source of the problem.
• The ports are operational and are receiving traffic.
• The ports are operational, but no traffic is flowing.
• There are no cables plugged into those ISR ports.
• The ports have cables plugged in, but they are not functional.
11. A PC is plugged into a switch and is unable to connect to the network. The UTP cable is suspected. What could be the problem?
• A straight-through cable is being used
• The connectors at both ends of the cable are RJ-45.
• The RJ-45 connectors are crimped onto the cable jacket.
• A crossover cable is being used.
12. Refer to the graphic. What configuration is incorrect in the network shown?
• The host IP address is incorrect.
• The host subnet mask is incorrect.
• The host default gateway is incorrect.
• The wired connection is the wrong type of cable.
• The Linksys integrated router does not support wireless.
13. Which three settings must match on the client and access point for a wireless connection to occur? (Choose three.)
• SSID
• authentication
• MD5 checksum
• antennae type
• encryption key
• MAC address filters
14. A technician is troubleshooting a security breach on a new wireless access point. Which three configuration settings make it easy for hackers to gain access? (Choose three.)
• configuring NAT
• broadcasting the SSID
• using open authentication
• enabling MAC address filters
• using the default internal IP address
• using DHCP to provide IP addresses
15. Refer to the graphic. The wireless host cannot access the Internet, but the wired host can. What is the problem?
• The host WEP key is incorrect.
• The host IP address is incorrect.
• The host subnet mask is incorrect.
• The host default gateway is incorrect.
• The integrated router internal IP address is incorrect.
• The integrated router Internet IP address is incorrect.
16. Refer to the graphic. What configuration is incorrect in the network shown?
• The host IP address is incorrect.
• The host subnet mask is incorrect.
• The host default gateway is incorrect.
• The wired connection is the wrong type of cable.
• The Linksys integrated router does not support wireless.
17. When acting as a DHCP server, what three types of information can an ISR provide to a client? (Choose three.)
• physical address
• MAC address
• default gateway
• static IP address
• dynamic IP address
• DNS server address
18. What two items could be checked to verify connectivity between the router and the ISP? (Choose two.)
• router status page
• wireless card settings
• router operating system version
• local host operating system version
• connectivity status as indicated by LEDs
19. A technician is unsuccessful in establishing a console session between a PC and a Linksys integrated router. Both devices have power, and a cable is connected between them. Which two troubleshooting steps could help to diagnose this problem? (Choose two.)
• Ensure the correct cable is used.
• Ensure the SSID is the same on both devices.
• Ensure both devices have the same IP address.
• Ensure both devices have different subnet masks.
• Ensure the encryption type on both devices match.
• Ensure the link status LED on the integrated router is lit.
20. Network baselines should be performed in which two situations? (Choose two.)
• after the network is installed and running optimally
• after a virus outbreak is discovered on the network
• after major changes are implemented on the network
• after several computers are added to the network
• at the end of the work week
21. Typically, help desk personnel assist end users in which two tasks? (Choose two.)
• identifying when the problem occurred
• determining if other users are currently logged into the computer
• updating network diagrams and documentation
• implementing the solution to the problem
• running a network baseline test
• determining the cost of fixing the problem
22. How does remote-access software help in the troubleshooting process?
• Remote access uses a live chat feature.
• Users have to be present so that they can view LEDs and change cables if necessary.
• Diagnostics can be run without a technician being present at the site.
• FAQs can be consulted more easily.
23. Which two items should be added to the documentation following a troubleshooting event? (Choose two.)
• final resolution
• repetitive measures
• number of people involved in the problem
• accurate current network infrastructure diagrams
• results of successful and unsuccessful troubleshooting steps
TimE
Labels
- CCNA Discovery 1 Version 4 Networking for Home and Small Businesses (9)
- CCNA Discovery 2 : Working at a Small-to-Medium Business or ISP (9)
- CCNA Discovery 3 : Introducing Routing and Switching in the Enterprise (10)
- CCNA Discovery 4 : Designing and Supporting Computer Networks (Version 4.0) (9)
- HardwarE (28)
- healty (3)
- Hot news IT (43)
- Lain-lain (4)
- LinuX (10)
- SoftWare (13)
Blog Archive
-
▼
2009
(150)
-
▼
Juli
(102)
- Final eXam Discovery 2 versi 4.0
- CCNA Discovery 2 : Module 8 Exam Answers
- CCNA Discovery 2 : Module 7 Exam Answers
- CCNA Discovery 2 : Module 6 Exam Answers
- CCNA Discovery 2 : Module 5 Exam Answers
- CCNA Discovery 2 : Module 4 Exam Answers
- CCNA Discovery 2 : Module 3 Exam Answers
- CCNA Discovery 2 : Module 2 Exam Answers
- CCNA Discovery 2 : Module 1 Exam Answers
- CCNA Discovery 1 : Module 2 Exam Answers
- CCNA Discovery 1 : Module 9 Exam Answers
- CCNA Discovery 1 : Module 8 Exam Answers
- CCNA Discovery 1 : Module 7 Exam Answers
- CCNA Discovery 1 : Module 6 Exam Answers
- CCNA Discovery 1 : Module 5 Exam Answers
- CCNA Discovery 1 : Module 4 Exam Answers
- CCNA Discovery 1 : Module 3 Exam Answers
- CCNA Discovery 1 : Module 1 Exam Answers
- Software BlackBerry Juga Bisa Berbahaya
- Situs Forum PHPBB.com dihack
- Telah Dirilis patch untuk Mengatasi Bug security p...
- Sniffing Keystrokes via Laser dan Keyboard
- BlankOn 5.0 Resmi Dirilis
- Linux: Netbook Open Source Harusnya Gratis!
- Microsoft Mulai Rayu Komunitas Linux Kernel
- Mana yang Lebih Baik, Moblin, Windows 7 Atau Chrom...
- 60 Persen Perusahaan Tak Ingin Pakai Windows 7
- Thunderbird 3 beta 3 Ready for Download
- 10 Trik Membuat Linux Lebih Cepat
- Linux Firewall Distribution iPCop versi 1.4.20
- Linux Gibraltar Firewall 2.6 Telah Diluncurkan
- Dell Gunakan Ubuntu Untuk Laptop Terbarunya
- Gawat, AVG Deteksi Malware Baru di Windows
- Hati-Hati, Trojan Michael Jackson Lebih Mengganas
- Trojan Sexy Space Asal China Racuni Ponsel Symbian
- Virus VBS/Cryf.A,Canggih Bisa Rusak CD/DV ROM
- Gawat, Hacker Curi Data Rahasia Keamanan Twitter
- Microsoft Bikin 6 Paket Multitouch untuk Windows 7
- Free Download Windows 7 Release Candidate
- Inilah Salah Satu Kelemahan Windows 7
- Akhirnya, Microsoft Jual Windows 7 Tanpa IE
- Windows 7 Hadir Lebih Murah Dibandingkan Vista
- Microsoft Gratiskan Upgrade Windows 7 untuk Vista
- AVG LinkScanner, Proteksi Handal untuk Ancaman Online
- Chrome OS, System Buatan Google Saingi Windows
- AD-AWARE Pro 8.0.2, Better Than Antivirus Program
- Office 2010 32 Bit dan 64 Bit Bakal Hadir dalam 1 DVD
- Adobe Launching ColdFusion 9 dan ColdFusion Builder
- Stirling dan Geneva, Solusi Keamanan Terbaru dari ...
- F-Secure Mobile Security, Program Pengaman Ponsel ...
- Logitech Totally Rad G19 Gaming Keyboard Telah Dip...
- Notebook ASUS K Series K40IN-A1 Siap Gebrak Amerika
- MacBook Upgrade Laptop 13 Inch Low-End Namun Harga...
- mCubed RipNAS SSD Berkapasitas 500GB 46 Juta Rupiah
- AMD Hadirkan Prosesor Athlon II X2 250 dan Phenom ...
- InnoDisk Luncurkan nanoSSD 128 GB
- A-Data NH92, Hardisk Portable Tertipis di Dunia
- NVidia Luncurkan Kartu Memori EVGA untuk Mac Pros
- OCZ SSD Terbaru Berukuran Mungil 2,5 Inchi
- Linksys Perkenalkan Router WRT160NL Berbasis Linux...
- Lenovo S12 Dapatkan Opsi VIA Nano
- Acer Perkenalkan PC Desktop Aspire M5800 dan M3800
- TSMC Mendorong Kisaran 130nm Sebagai Standar Sel T...
- Proyektor iJector Lancer Seharga 700 USD Menjadi P...
- eMachines Hadirkan PC Desktop ET1300-02, ET 1810-0...
- EMTEC Jadi Saingan Baru Pada Pasaran Nettop Dengan...
- Fujitsu Perkenalkan FUTRO S100 Dengan Tambahan VIA...
- Intel Core i5 750 Hadir Bersama Core i7 Pada Tangg...
- hField Technologies Perkenalkan Adaptor WiFi Jarak...
- Hitachi SATA Desktar, Harddisk 2TB Paling oke...
- Intel Luncurkan Nehalem Bulan Depan
- Jam Audio Player Plus Bluetooth dari Sony Ericsson
- Asus P6X58 Premium, Motherbard Pertama Support USB...
- Lebih Hemat Tempat, Desktop All-In-One Dell Vostro
- Asus P6TD Deluxe, Support Intel Core i7 dan RAM 24GB
- 2 Flashdisk 4GB dalam 1 Tempat? Pakai Split Stick
- EnCore, Processor Hemat Energi Baru Telah Dikemban...
- Belum Rilis, Windows 7 Sudah Kena Hack?
- Beli Motor, Dapat Laptop Plus Akses MX-Speedy Gratis?
- Microsoft Siapkan Windows 8
- Sambut Akses Internet Wireless Kecepatan Tinggi WiMAX
- Acer Bocorkan Rahasia Peluncuran Windows 7
- Windows 7, New System Vista Killer
- Gmail telah siap dengan versi Basic HTML untuk ko...
- SATA Revision 3.0, Harddisk Kecepatan Transfer 6 Gbps
- Bayi 9 Bulan Sudah Kenal Laptop?
- Google Tanamkan Pelacak di 92 Persen Website
- Google Squared, Tool Baru Cukup ‘Menyesatkan
- Apple Safari 4, Capai 11 Juta Download dalam 3 Hari
- 2009, Pengguna Internet Bakal Melebihi 10 Juta Orang
- Printer HP Photosmart Premium, Cetak Gambar Tanpa PC
- Kalah dari Facebook, Friendster Dijual ke Asia
- Pemakai Microsoft Bing ( Search Engine) Bertambah ...
- Perang Sengit Microsoft-Google, Office 2010 Digrat...
- Menggali Fenomena Maraknya Hotspot
- Ular Berbisa’ Incar Account Yahoo Anda
- 2010, Nokia Gelontorkan Ponsel 4G
- CEO Microsoft Kunjungi Indonesia
- ATI Radeon HD 4770, VGA Pertama dengan Chip 40nm
- Pendiri Yahoo Bertandang ke Indonesia
-
▼
Juli
(102)
Translate
Counter
Diposting oleh
vanz blog
Jumat, 31 Juli 2009
Langganan:
Posting Komentar (Atom)