Assessment TSHOOT Chapter 2 CCNP TSHOOT: Troubleshooting and Maintaining Cisco IP Networks (Version 6.0) Answers 2011 2012 31AUG NOTE CHOOSE x FOR TRUE 1 What are two limitations of an ad hoc troubleshooting approach? (Choose two.) x inefficient use of time and resources only applicable to physical layer problems x difficult to transfer the job to someone else can only be used after a structured approach has failed requires more technical knowledge than a structured approach 2 What are two facts regarding the information that is collected for baseline creation? (Choose two.) The information is the same for all networks. x It can be used for capacity planning. It should be limited to only a few key performance statistics. x It can be collected using tools such as NBAR, NetFlow, and SNMP. It should be collected only once and then archived for future reference. 3 After a proposed solution has been implemented, the network administrator realizes that new problems have been introduced by the changes. What is the next step in the troubleshooting process? Propose a hypothesis. x Execute the rollback plan. Determine an appropriate workaround. Escalate the problem to another department. 4 A network engineer initially uses the ping command to help troubleshoot a connection problem. Which troubleshooting approach best describes this scenario? bottom-up approach x divide-and-conquer approach follow-the-path approach move-the-problem approach spot-the-difference approach top-down approach 5 What is a situation where escalation of an issue is inadvisable? Management has not been consulted. x Escalation will slow the procedure. The problem is actually a set of problems. The problem has an impact on the performance of the entire network. Solving the problem would showcase the skills and knowledge of the troubleshooter. 6 To correct an issue that was discovered a few days earlier, an administrator makes a change during a regularly scheduled maintenance window. After making the change, the administrator discovers that a new problem has occurred. What should the administrator do next? x Rollback the change and resume the troubleshooting process. Continue making changes until the symptoms disappear. Leave the change in place and troubleshoot the new problems at a later time. Gather information about the new problem and form a new hypothesis. 7 Which three types of data are useful for creating a baseline? (Choose three.) number of infrastructure routers and switches x Remote Monitoring (RMON), Network Based Application Recognition (NBAR), and NetFlow statistics DHCP and NAT translation statistics x network performance characteristics switch interface statistics of all access ports x basic performance statistics like the interface load for critical network links and the CPU load and memory usage of routers and switches 8 After a network change that occurred during a scheduled maintenance window, users were complaining about not being able to access a local file server. Upon investigation, the administrator determined that the problem was with the recently entered routing configurations. Because of company policy, the administrator is not allowed to correct the routing configuration outside of a scheduled maintenance window. Instead, the administrator moved the file server to an accessible subnet. Which statement describes what the administrator did? The administrator determined a solution to the problem. x The administrator determined a workaround for the problem. The administrator applied the move the problem troubleshooting approach. The administrator applied the spot the difference troubleshooting approach. 9 Which three IOS features can be used to keep the network documentation accurate? (Choose three.) x rollback feature policy compliance x configuration archive performance monitoring basic performance statistics x Embedded Event Manager 10 A network administrator executes the show processes cpu command on a production router and notices that the average CPU load over the past 5 seconds was 97% and over the last one minute was around 39%. What should the administrator do next? Nothing. This is normal behavior for an ISR router. Contact the service provider because the contract is not being fulfilled as specified in the SLA. x Compare the result to the baseline for an accurate assessment. Replace the router as soon as possible because it has reached capacity. 11 Which two procedures can be implemented to ensure that current backups of all device configurations are maintained? (Choose two.) x Log all configuration change events to a syslog server. Password protect all devices to prevent configuration changes. x Implement a system to create automatic configuration backups. Update configuration backups only after major network outages. Create configuration backups as soon as an issue is reported with network performance. 12 A user creates a trouble ticket indicating that the Internet is inaccessible. The network administrator receives the ticket and determines that this user is the only one having problems. A ping command issued from the administrative PC to the user PC is successful. What should the administrator do next? x Escalate the issue to the desktop support group. Contact the ISP to determine if there is an issue on the ISP side. View the route table on the core router to determine if there is a routing issue. Swap out the patch cable between the user PC and the switch to determine if that solves the problem. 13 What is a symptom of an incorrectly applied network command when issued under the routing process? a down status on an interface x a timeout message when attempting to ping a device on another network a routing protocol that is not running a user who is unable to connect to machines that are located on the same subnet 14 Which two components are normally considered part of change control? (Choose two.) the cost of network changes x the time when changes can be made the technology that is used to implement changes x the authorization that is required to make changes the staff changes that are required to carry out repairs 15 In which phase of the structured troubleshooting process should a network administrator clearly communicate to the affected network users what is going to be done and why it is being done? the analysis of information the definition of the problem the elimination of possibilities the gathering of facts x the proposal and testing of a hypothesis 16 What is a benefit of change control during the processes of regular network maintenance? simplification of the process for creating a network baseline x reduction in the frequency and duration of unplanned outages elimination of the need to troubleshoot planned outages elimination of the need to perform a regular network backup 17 In which structured troubleshooting process phase would a network engineer ask questions such as When did it last work? or Has it ever worked? analyze information phase x define the problem phase eliminate possibilities phase gather facts phase propose a hypothesis phase solve the problem phase 18 What is an important element of troubleshooting, regardless of the method used? using a single troubleshooting process executing the steps in the same order every time x following a structured and systematic process spending a significant amount of time analyzing the information 19 The help desk receives several calls on Monday morning stating that users cannot connect to a local print server that was working on Friday. Which statement about the problem would be correct? x The inability to connect to the print server is a symptom of a problem. The inability to connect to the print server is the problem. The connectivity problem occurred Monday morning. The inability to connect to the print server caused the problem. 20 What type of information can be gathered by using SNMP during the process of collecting baseline information? basic performance statistics via the use of show commands basic performance statistics for Layer 2 and Layer 3 protocols x basic performance statistics about the interface load for critical network links basic performance statistics to profile different types of traffic on the network COMMENTSLeave a Comment CATEGORIESCCNA Exploration 4.0 TSHOOT Chapter 1 CCNP 6.0 2012 100% Take Assessment TSHOOT Chapter 1 CCNP TSHOOT: Troubleshooting and Maintaining Cisco IP Networks (Version 6.0) Answers 2011 2012 31AUG NOTE CHOOSE X FOR TRUE 1 What are two motivations for measuring network performance? (Choose two.) capacity planning controlling traffic flow diagnosing performance problems increasing network security monitoring user activity troubleshooting logging activity 2 Refer to the exhibit. A network administrator is tasked with creating a backup of the startup configuration for router R1 to a server with IP address 10.1.15.1. Which option will provide the most secure way to transfer the file? R1# copy startup-config ftp://10.1.15.1/R1-test.cfg R1# copy startup-config ftp://RED:san-fran@10.1.15.1/R1-test.cfg R1# copy startup-config http://10.1.15.1/R1-test.cfg R1# copy startup-config https://10.1.15.1/R1-test.cfg 3 An administrator needs to ensure a server is created to store all network device backups. Which service should be enabled on the server to allow it to receive backups? Telnet CCP NTP FTP 4 Which Cisco web-based resource provides a complete bill-of-materials based on selected hardware and software configurations? Cisco Power Calculator Cisco Feature Navigator Embedded Event Manager x Dynamic Configuration Tool CiscoWorks Resource Manager Essentials 5 What are two ways to simplify access to network maintenance documentation? (Choose two.) a wiki an issue tracking system SNMP Object Navigator Cisco Feature Navigator Cisco Dynamic Configuration Tool 6 Which two statements are true about NTP servers in an enterprise network? (Choose two.) There can only be one NTP server on an enterprise network. All NTP servers synchronize directly to a stratum 1 time source. NTP servers at stratum 1 are directly connected to an authoritative time source. NTP servers ensure an accurate time stamp on logging and debugging information. NTP servers control the mean time between failures (MTBF) for key network devices. 7 What are two benefits of scheduling maintenance as part of the network maintenance planning effort? (Choose two.) x reduced network downtime more promotion of the use of a common calendar less need for network monitoring x predictable lead time for change requests immediate solutions to noncritical issues easier for budget planning purposes 8 Which two network maintenance tasks should be performed as part of a network maintenance plan? (Choose two.) network monitoring IP address administration service-level agreement compliance command line device management accommodating adds, moves, and changes 9 A network technician receives a report from a user about a connectivity issue to a branch office resource. The details of the issue are documented and assigned a priority. Another team member reviews the issue and researches how similar issues were resolved in the past. The issue is escalated to another team for resolution. What type of maintenance tool matches the process described? Management Information Base (MIB) Dynamic Configuration Tool x issue tracking system syslog server logging system 10 What must be considered when creating configuration backups to be used during disaster recovery? a clear versioning and naming system service contract information exact hardware serial numbers location of single points of failure 11 When should high-impact network changes be made on a production network? immediately during regular business hours during peak network traffic times during scheduled maintenance windows 12 Why is it important to have a disaster recovery plan for a network? to reduce network costs x to reduce downtime when a device fails to increase network capacity during peak times to increase network throughput during peak times 13 Which two network procedures should all network maintenance plans include? (Choose two). replacing failed devices determining business hours accommodating adds, moves, and changes establishing a list of non-essential applications responding to all external queries 14 Which two actions are considered part of network monitoring and performance measurement? (Choose two.) measurement of network delay, jitter, or packet loss monitoring of interface status, interface load, CPU load, and memory usage monitoring the procedures used to install software, configurations, and licenses monitoring the performance of the tools required to transfer the software and configuration to the device ensuring the availability of documentation of the exact hardware part, serial, and service contract numbers for the devices 15 What are two benefits to a scheduled maintenance? (Choose two.) x reduces network downtime allows failed devices to be corrected immediately allows the engineers to make the corrections during peak utilization times x ensures software patches and backups are completed 16 Which network performance statistics should be measured in order to verify SLA compliance? NAT translation statistics device CPU and memory utilization x packet round-trip time (RTT), jitter, and packet loss number of error messages that are logged on the syslog server 17 Refer to the exhibit. Based on the information presented, why would a syslog server not receive debugging information? Debugging information cannot be sent to a syslog server. The logging trap 7 global configuration command still needs to be issued. The logging buffer is too small to store debugging information and must be increased. The logging console debugging global configuration command still needs to be issued. The logging monitor debugging global configuration command still needs to be issued. 18 Successful disaster recovery is dependent on the existence of which two items? (Choose two.) network management personnel on-site 24/7 up-to-date server patches x software provisioning tools x up-to-date hardware inventory well-defined trust boundaries 19 An administrator has a written procedure of the steps to follow if a device fails. Which two items should the administrator have in order to reduce the amount of downtime the failed device could cause? (Choose two.) x existing IOS SNMP logs Cisco Feature Navigator x copy of current configuration 20 Refer to the exhibit. A network administrator is tasked with creating a configuration archive for the configuration of R1. What would be the outcome of the displayed configuration? The current running configuration file will be archived after 10080 minutes on the remote server. The current running configuration file will be archived every 10080 minutes in the local flash memory. The current running configuration file will be archived any time running configuration is copied to NVRAM. The current running configuration file will be archived every 10080 minutes in the local flash memory and remote location.