Вы находитесь на странице: 1из 6

TSHOOT Chapter 2 CCNP 6.

0 2012 100% Take

Assessment TSHOOT Chapter 2 CCNP TSHOOT:
Troubleshooting and Maintaining Cisco IP Networks
(Version 6.0) Answers 2011 2012
What are two limitations of an ad hoc troubleshooting approach? (Choose two.)
x inefficient use of time and resources
only applicable to physical layer problems
x difficult to transfer the job to someone else
can only be used after a structured approach has failed
requires more technical knowledge than a structured approach
What are two facts regarding the information that is collected for baseline creation? (Choose two.)
The information is the same for all networks.
x It can be used for capacity planning.
It should be limited to only a few key performance statistics.
x It can be collected using tools such as NBAR, NetFlow, and SNMP.
It should be collected only once and then archived for future reference.
After a proposed solution has been implemented, the network administrator realizes that new problems
have been introduced by the changes. What is the next step in the troubleshooting process?
Propose a hypothesis.
x Execute the rollback plan.
Determine an appropriate workaround.
Escalate the problem to another department.
A network engineer initially uses the ping command to help troubleshoot a connection problem. Which
troubleshooting approach best describes this scenario?
bottom-up approach
x divide-and-conquer approach
follow-the-path approach
move-the-problem approach
spot-the-difference approach
top-down approach
What is a situation where escalation of an issue is inadvisable?
Management has not been consulted.
x Escalation will slow the procedure.
The problem is actually a set of problems.
The problem has an impact on the performance of the entire network.
Solving the problem would showcase the skills and knowledge of the troubleshooter.
To correct an issue that was discovered a few days earlier, an administrator makes a change during a
regularly scheduled maintenance window. After making the change, the administrator discovers that a new
problem has occurred. What should the administrator do next?
x Rollback the change and resume the troubleshooting process.
Continue making changes until the symptoms disappear.
Leave the change in place and troubleshoot the new problems at a later time.
Gather information about the new problem and form a new hypothesis.
Which three types of data are useful for creating a baseline? (Choose three.)
number of infrastructure routers and switches
x Remote Monitoring (RMON), Network Based Application Recognition (NBAR), and NetFlow statistics
DHCP and NAT translation statistics
x network performance characteristics
switch interface statistics of all access ports
x basic performance statistics like the interface load for critical network links and the CPU load and memory
usage of routers and switches
After a network change that occurred during a scheduled maintenance window, users were complaining
about not being able to access a local file server. Upon investigation, the administrator determined that the
problem was with the recently entered routing configurations. Because of company policy, the administrator
is not allowed to correct the routing configuration outside of a scheduled maintenance window. Instead, the
administrator moved the file server to an accessible subnet. Which statement describes what the
administrator did?
The administrator determined a solution to the problem.
x The administrator determined a workaround for the problem.
The administrator applied the move the problem troubleshooting approach.
The administrator applied the spot the difference troubleshooting approach.
Which three IOS features can be used to keep the network documentation accurate? (Choose three.)
x rollback feature
policy compliance
x configuration archive
performance monitoring
basic performance statistics
x Embedded Event Manager
A network administrator executes the show processes cpu command on a production router and notices
that the average CPU load over the past 5 seconds was 97% and over the last one minute was around
39%. What should the administrator do next?
Nothing. This is normal behavior for an ISR router.
Contact the service provider because the contract is not being fulfilled as specified in the SLA.
x Compare the result to the baseline for an accurate assessment.
Replace the router as soon as possible because it has reached capacity.
Which two procedures can be implemented to ensure that current backups of all device configurations are
maintained? (Choose two.)
x Log all configuration change events to a syslog server.
Password protect all devices to prevent configuration changes.
x Implement a system to create automatic configuration backups.
Update configuration backups only after major network outages.
Create configuration backups as soon as an issue is reported with network performance.
A user creates a trouble ticket indicating that the Internet is inaccessible. The network administrator
receives the ticket and determines that this user is the only one having problems. A ping command issued
from the administrative PC to the user PC is successful. What should the administrator do next?
x Escalate the issue to the desktop support group.
Contact the ISP to determine if there is an issue on the ISP side.
View the route table on the core router to determine if there is a routing issue.
Swap out the patch cable between the user PC and the switch to determine if that solves the problem.
What is a symptom of an incorrectly applied network command when issued under the routing process?
a down status on an interface
x a timeout message when attempting to ping a device on another network
a routing protocol that is not running
a user who is unable to connect to machines that are located on the same subnet
Which two components are normally considered part of change control? (Choose two.)
the cost of network changes
x the time when changes can be made
the technology that is used to implement changes
x the authorization that is required to make changes
the staff changes that are required to carry out repairs
In which phase of the structured troubleshooting process should a network administrator clearly
communicate to the affected network users what is going to be done and why it is being done?
the analysis of information
the definition of the problem
the elimination of possibilities
the gathering of facts
x the proposal and testing of a hypothesis
What is a benefit of change control during the processes of regular network maintenance?
simplification of the process for creating a network baseline
x reduction in the frequency and duration of unplanned outages
elimination of the need to troubleshoot planned outages
elimination of the need to perform a regular network backup
In which structured troubleshooting process phase would a network engineer ask questions such as When
did it last work? or Has it ever worked?
analyze information phase
x define the problem phase
eliminate possibilities phase
gather facts phase
propose a hypothesis phase
solve the problem phase
What is an important element of troubleshooting, regardless of the method used?
using a single troubleshooting process
executing the steps in the same order every time
x following a structured and systematic process
spending a significant amount of time analyzing the information
The help desk receives several calls on Monday morning stating that users cannot connect to a local print
server that was working on Friday. Which statement about the problem would be correct?
x The inability to connect to the print server is a symptom of a problem.
The inability to connect to the print server is the problem.
The connectivity problem occurred Monday morning.
The inability to connect to the print server caused the problem.
What type of information can be gathered by using SNMP during the process of collecting baseline
basic performance statistics via the use of show commands
basic performance statistics for Layer 2 and Layer 3 protocols
x basic performance statistics about the interface load for critical network links
basic performance statistics to profile different types of traffic on the network
COMMENTSLeave a Comment
CATEGORIESCCNA Exploration 4.0
TSHOOT Chapter 1 CCNP 6.0 2012 100% Take
Assessment TSHOOT Chapter 1 CCNP TSHOOT:
Troubleshooting and Maintaining Cisco IP Networks
(Version 6.0) Answers 2011 2012
What are two motivations for measuring network performance? (Choose two.)
capacity planning
controlling traffic flow
diagnosing performance problems
increasing network security
monitoring user activity
troubleshooting logging activity
Refer to the exhibit. A network administrator is tasked with creating a backup of the startup configuration for
router R1 to a server with IP address Which option will provide the most secure way to transfer
the file?
R1# copy startup-config
R1# copy startup-config ftp://RED:san-fran@
R1# copy startup-config
R1# copy startup-config
An administrator needs to ensure a server is created to store all network device backups. Which service
should be enabled on the server to allow it to receive backups?
Which Cisco web-based resource provides a complete bill-of-materials based on selected hardware and
software configurations?
Cisco Power Calculator
Cisco Feature Navigator
Embedded Event Manager
x Dynamic Configuration Tool
CiscoWorks Resource Manager Essentials
What are two ways to simplify access to network maintenance documentation? (Choose two.)
a wiki
an issue tracking system
SNMP Object Navigator
Cisco Feature Navigator
Cisco Dynamic Configuration Tool
Which two statements are true about NTP servers in an enterprise network? (Choose two.)
There can only be one NTP server on an enterprise network.
All NTP servers synchronize directly to a stratum 1 time source.
NTP servers at stratum 1 are directly connected to an authoritative time source.
NTP servers ensure an accurate time stamp on logging and debugging information.
NTP servers control the mean time between failures (MTBF) for key network devices.
What are two benefits of scheduling maintenance as part of the network maintenance planning effort?
(Choose two.)
x reduced network downtime
more promotion of the use of a common calendar
less need for network monitoring
x predictable lead time for change requests
immediate solutions to noncritical issues
easier for budget planning purposes
Which two network maintenance tasks should be performed as part of a network maintenance plan?
(Choose two.)
network monitoring
IP address administration
service-level agreement compliance
command line device management
accommodating adds, moves, and changes
A network technician receives a report from a user about a connectivity issue to a branch office resource.
The details of the issue are documented and assigned a priority. Another team member reviews the issue
and researches how similar issues were resolved in the past. The issue is escalated to another team for
resolution. What type of maintenance tool matches the process described?
Management Information Base (MIB)
Dynamic Configuration Tool
x issue tracking system
syslog server logging system
What must be considered when creating configuration backups to be used during disaster recovery?
a clear versioning and naming system
service contract information
exact hardware serial numbers
location of single points of failure
When should high-impact network changes be made on a production network?
during regular business hours
during peak network traffic times
during scheduled maintenance windows
Why is it important to have a disaster recovery plan for a network?
to reduce network costs
x to reduce downtime when a device fails
to increase network capacity during peak times
to increase network throughput during peak times
Which two network procedures should all network maintenance plans include? (Choose two).
replacing failed devices
determining business hours
accommodating adds, moves, and changes
establishing a list of non-essential applications
responding to all external queries
Which two actions are considered part of network monitoring and performance measurement? (Choose
measurement of network delay, jitter, or packet loss
monitoring of interface status, interface load, CPU load, and memory usage
monitoring the procedures used to install software, configurations, and licenses
monitoring the performance of the tools required to transfer the software and configuration to the device
ensuring the availability of documentation of the exact hardware part, serial, and service contract numbers
for the devices
What are two benefits to a scheduled maintenance? (Choose two.)
x reduces network downtime
allows failed devices to be corrected immediately
allows the engineers to make the corrections during peak utilization times
x ensures software patches and backups are completed
Which network performance statistics should be measured in order to verify SLA compliance?
NAT translation statistics
device CPU and memory utilization
x packet round-trip time (RTT), jitter, and packet loss
number of error messages that are logged on the syslog server
Refer to the exhibit. Based on the information presented, why would a syslog server not receive debugging
Debugging information cannot be sent to a syslog server.
The logging trap 7 global configuration command still needs to be issued.
The logging buffer is too small to store debugging information and must be increased.
The logging console debugging global configuration command still needs to be issued.
The logging monitor debugging global configuration command still needs to be issued.
Successful disaster recovery is dependent on the existence of which two items? (Choose two.)
network management personnel on-site 24/7
up-to-date server patches
x software provisioning tools
x up-to-date hardware inventory
well-defined trust boundaries
An administrator has a written procedure of the steps to follow if a device fails. Which two items should the
administrator have in order to reduce the amount of downtime the failed device could cause? (Choose two.)
x existing IOS
SNMP logs
Cisco Feature Navigator
x copy of current configuration
Refer to the exhibit. A network administrator is tasked with creating a configuration archive for the
configuration of R1. What would be the outcome of the displayed configuration?
The current running configuration file will be archived after 10080 minutes on the remote server.
The current running configuration file will be archived every 10080 minutes in the local flash memory.
The current running configuration file will be archived any time running configuration is copied to NVRAM.
The current running configuration file will be archived every 10080 minutes in the local flash memory and
remote location.