SlideShare a Scribd company logo
1 of 5
Download to read offline
1) What should a network administrator do first after receiving a call from a user who cannot access the company
web server?
Reboot the web server.
Replace the NIC of the computer.
Ask the user to log off and log on again.
* Ask the user what URL has been typed and what error message displays.

2) A customer called the cable company to report that the Internet connection is unstable. After trying several
configuration changes, the technician decided to send the customer a new cable modem to try. What troubleshooting
technique does this represent?
top-down
bottom-up
* substitution
trial-and-error
divide-and-conquer

3) Only one workstation on a particular network cannot reach the Internet. What is the first troubleshooting step if the
divide-and-conquer method is being used?
Check the NIC, and then check the cabling.
* Check the workstation TCP/IP configuration.
Test all cables, and then test layer by layer up the OSI model.
Attempt to Telnet, and then test layer by layer down the OSI model.

4) Which two troubleshooting techniques are suitable for both home networks and large corporate networks?
(Choose two.)
having a backup ISR
running network monitoring applications
* documenting the troubleshooting process
* keeping a record of system upgrades and software versions
keeping spare switches, routers, and other equipment available

5) Identify two physical-layer network problems. (Choose two.)
* hardware failure
software configuration
devices not able to ping
* loose cable connections
device driver configuration

6) Which ipconfig command requests IP configuration from a DHCP server?
ipconfig
ipconfig /all
* ipconfig /renew
ipconfig /release

7) What command is used to determine the location of delay for a packet traversing the Internet?
ipconfig
netstat
nslookup
ping
* tracert

8) What command is used to determine if a DNS server is providing name resolution?
ipconfig
netstat
* nslookup
tracert

9) Which troubleshooting method begins by examining cable connections and wiring issues?
top-down
* bottom-up
substitution
divide-and-conquer

10) A technician suspects that a Linksys integrated router is the source of a network problem. While troubleshooting,
the technician notices a blinking green activity LED on some of the ports. What does this indicate?
Self-diagnostics have not completed.
The power supply is the source of the problem.
* The ports are operational and are receiving traffic.
The ports are operational, but no traffic is flowing.
There are no cables plugged into those ISR ports.
The ports have cables plugged in, but they are not functional.

11) A PC is plugged into a switch and is unable to connect to the network. The UTP cable is suspected. What could
be the problem?
A straight-through cable is being used
The connectors at both ends of the cable are RJ-45.
The RJ-45 connectors are crimped onto the cable jacket.
* A crossover cable is being used.




12)




Refer to the graphic. What configuration is incorrect in the network shown?
The host IP address is incorrect.
The host subnet mask is incorrect.
The host default gateway is incorrect.
* The wired connection is the wrong type of cable.
The Linksys integrated router does not support wireless.

13) Which three settings must match on the client and access point for a wireless connection to occur? (Choose
three.)
* SSID
* authentication
MD5 checksum
antennae type
* encryption key
MAC address filters

14) A technician is troubleshooting a security breach on a new wireless access point. Which three configuration
settings make it easy for hackers to gain access? (Choose three.)
configuring NAT
* broadcasting the SSID
* using open authentication
enabling MAC address filters
* using the default internal IP address
using DHCP to provide IP addresses




15)




Refer to the graphic. The wireless host cannot access the Internet, but the wired host can. What is the problem?
* The host WEP key is incorrect.
The host IP address is incorrect.
The host subnet mask is incorrect.
The host default gateway is incorrect.
The integrated router internal IP address is incorrect.
The integrated router Internet IP address is incorrect.




16)
Refer to the graphic. What configuration is incorrect in the network shown?
* The host IP address is incorrect.
The host subnet mask is incorrect.
The host default gateway is incorrect.
The wired connection is the wrong type of cable.
The Linksys integrated router does not support wireless.

17) When acting as a DHCP server, what three types of information can an ISR provide to a client? (Choose three.)
physical address
MAC address
* default gateway
static IP address
* dynamic IP address
* DNS server address

18) What two items could be checked to verify connectivity between the router and the ISP? (Choose two.)
* router status page
wireless card settings
router operating system version
local host operating system version
* connectivity status as indicated by LEDs

19) A technician is unsuccessful in establishing a console session between a PC and a Linksys integrated router.
Both devices have power, and a cable is connected between them. Which two troubleshooting steps could help to
diagnose this problem? (Choose two.)
* Ensure the correct cable is used.
Ensure the SSID is the same on both devices.
Ensure both devices have the same IP address.
Ensure both devices have different subnet masks.
Ensure the encryption type on both devices match.
* Ensure the link status LED on the integrated router is lit.

20) Network baselines should be performed in which two situations? (Choose two.)
* after the network is installed and running optimally
after a virus outbreak is discovered on the network
* after major changes are implemented on the network
after several computers are added to the network
at the end of the work week

21) Typically, help desk personnel assist end users in which two tasks? (Choose two.)
* identifying when the problem occurred
determining if other users are currently logged into the computer
updating network diagrams and documentation
* implementing the solution to the problem
running a network baseline test
determining the cost of fixing the problem
22) How does remote-access software help in the troubleshooting process?
Remote access uses a live chat feature.
Users have to be present so that they can view LEDs and change cables if necessary.
* Diagnostics can be run without a technician being present at the site.
FAQs can be consulted more easily.

23) Which two items should be added to the documentation following a troubleshooting event? (Choose two.)
* final resolution
repetitive measures
number of people involved in the problem
accurate current network infrastructure diagrams
* results of successful and unsuccessful troubleshooting steps

More Related Content

What's hot

Smart Home Using IOT simulation In cisco packet tracer
Smart Home Using IOT simulation In cisco packet tracerSmart Home Using IOT simulation In cisco packet tracer
Smart Home Using IOT simulation In cisco packet tracerKhyathiNandankumar
 
Ip, subnet, gateway and routers
Ip, subnet, gateway and routersIp, subnet, gateway and routers
Ip, subnet, gateway and routersAdrian Suarez
 
Wireless router
Wireless routerWireless router
Wireless routerroza921
 
WiFi Hotspot-Wireless Router
WiFi Hotspot-Wireless RouterWiFi Hotspot-Wireless Router
WiFi Hotspot-Wireless RouterWispot
 
Muo Network Manual
Muo Network ManualMuo Network Manual
Muo Network Manualprashant0001
 
TLE 10 (ICT): Configuring a Wireless Router
TLE 10 (ICT): Configuring a Wireless RouterTLE 10 (ICT): Configuring a Wireless Router
TLE 10 (ICT): Configuring a Wireless RouterRomne Ryan Portacion
 
หน่วยที่ 1ความหมายและความสำคัญของเครือข่ายคอมพิวเตอร์
หน่วยที่ 1ความหมายและความสำคัญของเครือข่ายคอมพิวเตอร์หน่วยที่ 1ความหมายและความสำคัญของเครือข่ายคอมพิวเตอร์
หน่วยที่ 1ความหมายและความสำคัญของเครือข่ายคอมพิวเตอร์natnathapong
 
Configuration of hybrid topology in cisco packet tracer by Tanjilur Rahman
Configuration of hybrid topology in cisco packet tracer by Tanjilur RahmanConfiguration of hybrid topology in cisco packet tracer by Tanjilur Rahman
Configuration of hybrid topology in cisco packet tracer by Tanjilur RahmanTanjilurRahman6
 
Group 5 IoT Architecture Layer
Group 5 IoT Architecture LayerGroup 5 IoT Architecture Layer
Group 5 IoT Architecture LayerMarcus Maneja
 
Testing for wireless nic, helpful guide.
Testing for wireless nic, helpful guide.Testing for wireless nic, helpful guide.
Testing for wireless nic, helpful guide.OriginalGSM
 
Computer Networking Lab File
Computer Networking Lab FileComputer Networking Lab File
Computer Networking Lab FileNitin Bhasin
 
Network Troubleshooting
Network TroubleshootingNetwork Troubleshooting
Network TroubleshootingJoy Sarker
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAAiman Hud
 
Assigning A Static IP Address
Assigning A Static IP AddressAssigning A Static IP Address
Assigning A Static IP AddressAurelio Eslawan
 
Ccna exploration exams
Ccna exploration examsCcna exploration exams
Ccna exploration examsHossam Zein
 
Networking
NetworkingNetworking
NetworkingISMAT CH
 
How to use packet tracer
How to use packet tracerHow to use packet tracer
How to use packet tracerYunita Siswanti
 

What's hot (20)

Ccna 1 4
Ccna 1  4Ccna 1  4
Ccna 1 4
 
Smart Home Using IOT simulation In cisco packet tracer
Smart Home Using IOT simulation In cisco packet tracerSmart Home Using IOT simulation In cisco packet tracer
Smart Home Using IOT simulation In cisco packet tracer
 
Ip, subnet, gateway and routers
Ip, subnet, gateway and routersIp, subnet, gateway and routers
Ip, subnet, gateway and routers
 
Wireless router
Wireless routerWireless router
Wireless router
 
WiFi Hotspot-Wireless Router
WiFi Hotspot-Wireless RouterWiFi Hotspot-Wireless Router
WiFi Hotspot-Wireless Router
 
Muo Network Manual
Muo Network ManualMuo Network Manual
Muo Network Manual
 
TLE 10 (ICT): Configuring a Wireless Router
TLE 10 (ICT): Configuring a Wireless RouterTLE 10 (ICT): Configuring a Wireless Router
TLE 10 (ICT): Configuring a Wireless Router
 
หน่วยที่ 1ความหมายและความสำคัญของเครือข่ายคอมพิวเตอร์
หน่วยที่ 1ความหมายและความสำคัญของเครือข่ายคอมพิวเตอร์หน่วยที่ 1ความหมายและความสำคัญของเครือข่ายคอมพิวเตอร์
หน่วยที่ 1ความหมายและความสำคัญของเครือข่ายคอมพิวเตอร์
 
Configuration of hybrid topology in cisco packet tracer by Tanjilur Rahman
Configuration of hybrid topology in cisco packet tracer by Tanjilur RahmanConfiguration of hybrid topology in cisco packet tracer by Tanjilur Rahman
Configuration of hybrid topology in cisco packet tracer by Tanjilur Rahman
 
Group 5 IoT Architecture Layer
Group 5 IoT Architecture LayerGroup 5 IoT Architecture Layer
Group 5 IoT Architecture Layer
 
Testing for wireless nic, helpful guide.
Testing for wireless nic, helpful guide.Testing for wireless nic, helpful guide.
Testing for wireless nic, helpful guide.
 
Computer Networking Lab File
Computer Networking Lab FileComputer Networking Lab File
Computer Networking Lab File
 
Network Troubleshooting
Network TroubleshootingNetwork Troubleshooting
Network Troubleshooting
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA
 
ip versions.pdf
ip versions.pdfip versions.pdf
ip versions.pdf
 
Assigning A Static IP Address
Assigning A Static IP AddressAssigning A Static IP Address
Assigning A Static IP Address
 
Ccna presentation
Ccna presentationCcna presentation
Ccna presentation
 
Ccna exploration exams
Ccna exploration examsCcna exploration exams
Ccna exploration exams
 
Networking
NetworkingNetworking
Networking
 
How to use packet tracer
How to use packet tracerHow to use packet tracer
How to use packet tracer
 

Viewers also liked

How to Find a Great VA!
How to Find a Great VA!How to Find a Great VA!
How to Find a Great VA!IVAAOrg
 
Technology and Operational Risks faced by banks - An Analysis
Technology and Operational Risks faced by banks - An AnalysisTechnology and Operational Risks faced by banks - An Analysis
Technology and Operational Risks faced by banks - An AnalysisDanial822
 
Dell Leverages the Internet Directly
Dell Leverages the Internet DirectlyDell Leverages the Internet Directly
Dell Leverages the Internet DirectlyDanial822
 
Financial Statement Analysis - TAQA
Financial Statement Analysis - TAQAFinancial Statement Analysis - TAQA
Financial Statement Analysis - TAQADanial822
 
Why Be Ethical ? - Report
Why Be Ethical ? - ReportWhy Be Ethical ? - Report
Why Be Ethical ? - ReportDanial822
 
Measuring and Managing Liquidity Risk
Measuring and Managing Liquidity RiskMeasuring and Managing Liquidity Risk
Measuring and Managing Liquidity RiskDanial822
 
Why Be Ethical ?
Why Be Ethical ?Why Be Ethical ?
Why Be Ethical ?Danial822
 
An analysis of the Ford- Firestone Case
An analysis of the Ford- Firestone CaseAn analysis of the Ford- Firestone Case
An analysis of the Ford- Firestone CaseDanial822
 
Measuring and Managing Market Risk
Measuring and Managing Market RiskMeasuring and Managing Market Risk
Measuring and Managing Market RiskDanial822
 
Managing Foreign Exchange Risk
Managing Foreign Exchange RiskManaging Foreign Exchange Risk
Managing Foreign Exchange RiskDanial822
 
Private cloud
Private cloudPrivate cloud
Private clouddhlzj
 
项目自动化实施
项目自动化实施项目自动化实施
项目自动化实施dhlzj
 
集群Session共享
集群Session共享集群Session共享
集群Session共享dhlzj
 

Viewers also liked (18)

How to Find a Great VA!
How to Find a Great VA!How to Find a Great VA!
How to Find a Great VA!
 
Technology and Operational Risks faced by banks - An Analysis
Technology and Operational Risks faced by banks - An AnalysisTechnology and Operational Risks faced by banks - An Analysis
Technology and Operational Risks faced by banks - An Analysis
 
Dell Leverages the Internet Directly
Dell Leverages the Internet DirectlyDell Leverages the Internet Directly
Dell Leverages the Internet Directly
 
Ccna 1 7
Ccna 1  7Ccna 1  7
Ccna 1 7
 
Ccna 1 8
Ccna 1  8Ccna 1  8
Ccna 1 8
 
Ccna 1 final
Ccna 1  finalCcna 1  final
Ccna 1 final
 
Ccna 1 1
Ccna 1  1Ccna 1  1
Ccna 1 1
 
Financial Statement Analysis - TAQA
Financial Statement Analysis - TAQAFinancial Statement Analysis - TAQA
Financial Statement Analysis - TAQA
 
Why Be Ethical ? - Report
Why Be Ethical ? - ReportWhy Be Ethical ? - Report
Why Be Ethical ? - Report
 
Measuring and Managing Liquidity Risk
Measuring and Managing Liquidity RiskMeasuring and Managing Liquidity Risk
Measuring and Managing Liquidity Risk
 
Why Be Ethical ?
Why Be Ethical ?Why Be Ethical ?
Why Be Ethical ?
 
An analysis of the Ford- Firestone Case
An analysis of the Ford- Firestone CaseAn analysis of the Ford- Firestone Case
An analysis of the Ford- Firestone Case
 
Measuring and Managing Market Risk
Measuring and Managing Market RiskMeasuring and Managing Market Risk
Measuring and Managing Market Risk
 
Managing Foreign Exchange Risk
Managing Foreign Exchange RiskManaging Foreign Exchange Risk
Managing Foreign Exchange Risk
 
Private cloud
Private cloudPrivate cloud
Private cloud
 
项目自动化实施
项目自动化实施项目自动化实施
项目自动化实施
 
集群Session共享
集群Session共享集群Session共享
集群Session共享
 
Enlace David y Vanessa
Enlace David y VanessaEnlace David y Vanessa
Enlace David y Vanessa
 

Similar to Ccna 1 9

Cisco discovery d homesb module 9 - v.4 in english.
Cisco discovery   d homesb module 9 - v.4 in english.Cisco discovery   d homesb module 9 - v.4 in english.
Cisco discovery d homesb module 9 - v.4 in english.igede tirtanata
 
ccna 1 v5.0 itn practice final exam answers
ccna 1 v5.0 itn practice final exam answersccna 1 v5.0 itn practice final exam answers
ccna 1 v5.0 itn practice final exam answersĐồng Quốc Vương
 
Ccnav5.org ccna 1-v50_itn_practice_final_exam_answers
Ccnav5.org ccna 1-v50_itn_practice_final_exam_answersCcnav5.org ccna 1-v50_itn_practice_final_exam_answers
Ccnav5.org ccna 1-v50_itn_practice_final_exam_answersĐồng Quốc Vương
 
IT Essentials (Version 7.0) - ITE Chapter 6 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 6 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 6 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 6 Exam AnswersITExamAnswers.net
 
manual on networking cabling with pratical guide
manual on networking cabling with pratical guidemanual on networking cabling with pratical guide
manual on networking cabling with pratical guideNuhuSamaila
 
CCNA-lab-Manual.pdf
CCNA-lab-Manual.pdfCCNA-lab-Manual.pdf
CCNA-lab-Manual.pdfDrPreethiD1
 
Ccnav5.org ccna 4-v50_practice_final_exam
Ccnav5.org ccna 4-v50_practice_final_examCcnav5.org ccna 4-v50_practice_final_exam
Ccnav5.org ccna 4-v50_practice_final_examĐồng Quốc Vương
 
Advance Applied Networking with classes.
Advance Applied Networking with classes.Advance Applied Networking with classes.
Advance Applied Networking with classes.ArcyJeromeGallardo2
 
Ccna 4 chapter 8 v4.0 answers 2011
Ccna 4 chapter 8 v4.0 answers 2011Ccna 4 chapter 8 v4.0 answers 2011
Ccna 4 chapter 8 v4.0 answers 2011Dân Chơi
 
IT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 5 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 5 Exam AnswersITExamAnswers.net
 
CCNA 1 v6.0 Final Exam Answers Option B 2018
CCNA 1 v6.0 Final Exam Answers Option B  2018CCNA 1 v6.0 Final Exam Answers Option B  2018
CCNA 1 v6.0 Final Exam Answers Option B 2018Download Mipdfcom
 
CSS-10-Q3-COC-2-Week-3-Day-1.pptx
CSS-10-Q3-COC-2-Week-3-Day-1.pptxCSS-10-Q3-COC-2-Week-3-Day-1.pptx
CSS-10-Q3-COC-2-Week-3-Day-1.pptxAngelito Villalon
 
Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reportsShakib Ansaar
 
Ccna 1 practice final exam answer v5
Ccna 1 practice final exam answer v5Ccna 1 practice final exam answer v5
Ccna 1 practice final exam answer v5friv4schoolgames
 
CCN CEP.pptx
CCN CEP.pptxCCN CEP.pptx
CCN CEP.pptxNOOR69810
 

Similar to Ccna 1 9 (20)

Cisco discovery d homesb module 9 - v.4 in english.
Cisco discovery   d homesb module 9 - v.4 in english.Cisco discovery   d homesb module 9 - v.4 in english.
Cisco discovery d homesb module 9 - v.4 in english.
 
ccna 1 v5.0 itn practice final exam answers
ccna 1 v5.0 itn practice final exam answersccna 1 v5.0 itn practice final exam answers
ccna 1 v5.0 itn practice final exam answers
 
Ccnav5.org ccna 1-v50_itn_practice_final_exam_answers
Ccnav5.org ccna 1-v50_itn_practice_final_exam_answersCcnav5.org ccna 1-v50_itn_practice_final_exam_answers
Ccnav5.org ccna 1-v50_itn_practice_final_exam_answers
 
IT Essentials (Version 7.0) - ITE Chapter 6 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 6 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 6 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 6 Exam Answers
 
manual on networking cabling with pratical guide
manual on networking cabling with pratical guidemanual on networking cabling with pratical guide
manual on networking cabling with pratical guide
 
CCNA-lab-Manual.pdf
CCNA-lab-Manual.pdfCCNA-lab-Manual.pdf
CCNA-lab-Manual.pdf
 
Ccnav5.org ccna 4-v50_practice_final_exam
Ccnav5.org ccna 4-v50_practice_final_examCcnav5.org ccna 4-v50_practice_final_exam
Ccnav5.org ccna 4-v50_practice_final_exam
 
Advance Applied Networking with classes.
Advance Applied Networking with classes.Advance Applied Networking with classes.
Advance Applied Networking with classes.
 
Ccna 4 chapter 8 v4.0 answers 2011
Ccna 4 chapter 8 v4.0 answers 2011Ccna 4 chapter 8 v4.0 answers 2011
Ccna 4 chapter 8 v4.0 answers 2011
 
IT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 5 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
 
CCNA 1 v6.0 Final Exam Answers Option B 2018
CCNA 1 v6.0 Final Exam Answers Option B  2018CCNA 1 v6.0 Final Exam Answers Option B  2018
CCNA 1 v6.0 Final Exam Answers Option B 2018
 
Cn lab-manual
Cn lab-manualCn lab-manual
Cn lab-manual
 
Cn lab-manual
Cn lab-manualCn lab-manual
Cn lab-manual
 
CSS-10-Q3-COC-2-Week-3-Day-1.pptx
CSS-10-Q3-COC-2-Week-3-Day-1.pptxCSS-10-Q3-COC-2-Week-3-Day-1.pptx
CSS-10-Q3-COC-2-Week-3-Day-1.pptx
 
Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reports
 
Ch5
Ch5Ch5
Ch5
 
35d70683c4fd405d89db4a5287aa4b89
35d70683c4fd405d89db4a5287aa4b8935d70683c4fd405d89db4a5287aa4b89
35d70683c4fd405d89db4a5287aa4b89
 
Ccna 1 practice final exam answer v5
Ccna 1 practice final exam answer v5Ccna 1 practice final exam answer v5
Ccna 1 practice final exam answer v5
 
Ccna 1 5
Ccna 1  5Ccna 1  5
Ccna 1 5
 
CCN CEP.pptx
CCN CEP.pptxCCN CEP.pptx
CCN CEP.pptx
 

Recently uploaded

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 

Recently uploaded (20)

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 

Ccna 1 9

  • 1. 1) What should a network administrator do first after receiving a call from a user who cannot access the company web server? Reboot the web server. Replace the NIC of the computer. Ask the user to log off and log on again. * Ask the user what URL has been typed and what error message displays. 2) A customer called the cable company to report that the Internet connection is unstable. After trying several configuration changes, the technician decided to send the customer a new cable modem to try. What troubleshooting technique does this represent? top-down bottom-up * substitution trial-and-error divide-and-conquer 3) Only one workstation on a particular network cannot reach the Internet. What is the first troubleshooting step if the divide-and-conquer method is being used? Check the NIC, and then check the cabling. * Check the workstation TCP/IP configuration. Test all cables, and then test layer by layer up the OSI model. Attempt to Telnet, and then test layer by layer down the OSI model. 4) Which two troubleshooting techniques are suitable for both home networks and large corporate networks? (Choose two.) having a backup ISR running network monitoring applications * documenting the troubleshooting process * keeping a record of system upgrades and software versions keeping spare switches, routers, and other equipment available 5) Identify two physical-layer network problems. (Choose two.) * hardware failure software configuration devices not able to ping * loose cable connections device driver configuration 6) Which ipconfig command requests IP configuration from a DHCP server? ipconfig ipconfig /all * ipconfig /renew ipconfig /release 7) What command is used to determine the location of delay for a packet traversing the Internet? ipconfig netstat nslookup ping * tracert 8) What command is used to determine if a DNS server is providing name resolution? ipconfig netstat
  • 2. * nslookup tracert 9) Which troubleshooting method begins by examining cable connections and wiring issues? top-down * bottom-up substitution divide-and-conquer 10) A technician suspects that a Linksys integrated router is the source of a network problem. While troubleshooting, the technician notices a blinking green activity LED on some of the ports. What does this indicate? Self-diagnostics have not completed. The power supply is the source of the problem. * The ports are operational and are receiving traffic. The ports are operational, but no traffic is flowing. There are no cables plugged into those ISR ports. The ports have cables plugged in, but they are not functional. 11) A PC is plugged into a switch and is unable to connect to the network. The UTP cable is suspected. What could be the problem? A straight-through cable is being used The connectors at both ends of the cable are RJ-45. The RJ-45 connectors are crimped onto the cable jacket. * A crossover cable is being used. 12) Refer to the graphic. What configuration is incorrect in the network shown? The host IP address is incorrect. The host subnet mask is incorrect. The host default gateway is incorrect. * The wired connection is the wrong type of cable. The Linksys integrated router does not support wireless. 13) Which three settings must match on the client and access point for a wireless connection to occur? (Choose three.) * SSID * authentication
  • 3. MD5 checksum antennae type * encryption key MAC address filters 14) A technician is troubleshooting a security breach on a new wireless access point. Which three configuration settings make it easy for hackers to gain access? (Choose three.) configuring NAT * broadcasting the SSID * using open authentication enabling MAC address filters * using the default internal IP address using DHCP to provide IP addresses 15) Refer to the graphic. The wireless host cannot access the Internet, but the wired host can. What is the problem? * The host WEP key is incorrect. The host IP address is incorrect. The host subnet mask is incorrect. The host default gateway is incorrect. The integrated router internal IP address is incorrect. The integrated router Internet IP address is incorrect. 16)
  • 4. Refer to the graphic. What configuration is incorrect in the network shown? * The host IP address is incorrect. The host subnet mask is incorrect. The host default gateway is incorrect. The wired connection is the wrong type of cable. The Linksys integrated router does not support wireless. 17) When acting as a DHCP server, what three types of information can an ISR provide to a client? (Choose three.) physical address MAC address * default gateway static IP address * dynamic IP address * DNS server address 18) What two items could be checked to verify connectivity between the router and the ISP? (Choose two.) * router status page wireless card settings router operating system version local host operating system version * connectivity status as indicated by LEDs 19) A technician is unsuccessful in establishing a console session between a PC and a Linksys integrated router. Both devices have power, and a cable is connected between them. Which two troubleshooting steps could help to diagnose this problem? (Choose two.) * Ensure the correct cable is used. Ensure the SSID is the same on both devices. Ensure both devices have the same IP address. Ensure both devices have different subnet masks. Ensure the encryption type on both devices match. * Ensure the link status LED on the integrated router is lit. 20) Network baselines should be performed in which two situations? (Choose two.) * after the network is installed and running optimally after a virus outbreak is discovered on the network * after major changes are implemented on the network after several computers are added to the network at the end of the work week 21) Typically, help desk personnel assist end users in which two tasks? (Choose two.) * identifying when the problem occurred determining if other users are currently logged into the computer updating network diagrams and documentation * implementing the solution to the problem running a network baseline test determining the cost of fixing the problem
  • 5. 22) How does remote-access software help in the troubleshooting process? Remote access uses a live chat feature. Users have to be present so that they can view LEDs and change cables if necessary. * Diagnostics can be run without a technician being present at the site. FAQs can be consulted more easily. 23) Which two items should be added to the documentation following a troubleshooting event? (Choose two.) * final resolution repetitive measures number of people involved in the problem accurate current network infrastructure diagrams * results of successful and unsuccessful troubleshooting steps