9
HEISER DEV ZONE Developer Zone for Network Self-study! Search this website… You are here: Home / Cisco Associate / CCNA / CCNA Exploration / EWAN Chapter 8 CCNA 4 4.0 2012 2013 100% EWAN Chapter 8 CCNA 4 4.0 2012 2013 100% January 26, 2012 by Son Trinh Leave a Comment Take Assessment – EWAN Chapter 8 – CCNA Exploration: Accessing the WAN (Version 4.0) - Answers – 2012 – 2013 1. What combination of IP address and wildcard mask should be used to specify only the last 8 addresses in the subnet 192.168.3.32/28? 192.168.3.32 0.0.0.7 192.168.3.32 0.0.0.15 192.168.3.40 0.0.0.7 192.168.3.40 0.0.0.15 2. Excessive broadcasts are generally a symptom of a problem at which layer? physical data link network transport HOME CISCO PROFESSIONAL CISCO EXPERT VIRTUALIZATION JOB About HealthUS is a free medical journal providing Medical Information

EWAN Chapter 8 CCNA 4 4.0 2012 2013 100% - HeiseR Dev Zone

Embed Size (px)

Citation preview

Page 1: EWAN Chapter 8 CCNA 4 4.0 2012 2013 100% - HeiseR Dev Zone

HEISER DEV ZONEDeveloper Zone for Network Self-study!

Search this website…

You are here: Home / Cisco Associate / CCNA / CCNA Exploration / EWAN Chapter 8 CCNA 4 4.0 20122013 100%

EWAN Chapter 8 CCNA 4 4.0 2012 2013 100%January 26, 2012 by Son Trinh — Leave a Comment

Take Assessment – EWAN Chapter 8 – CCNAExploration: Accessing the WAN (Version 4.0) -Answers – 2012 – 20131. What combination of IP address and wildcard mask should be used to specify only thelast 8 addresses in the subnet 192.168.3.32/28?192.168.3.32 0.0.0.7192.168.3.32 0.0.0.15192.168.3.40 0.0.0.7192.168.3.40 0.0.0.15

2. Excessive broadcasts are generally a symptom of a problem at which layer?physicaldata linknetworktransport

HOME CISCO ASSOCIATE CISCO PROFESSIONAL CISCO EXPERT VIRTUALIZATION

JOB TOOL

About HealthUS is a free medical journal

providing Medical Information

Page 2: EWAN Chapter 8 CCNA 4 4.0 2012 2013 100% - HeiseR Dev Zone

3. Refer to the exhibit. Which three pieces of information can be determined by analyzingthe output shown? (Choose three.)A carrier detect signal is present.Keepalives are being received successfully.Default encapsulation is used on this serial link.Packets passing this interface cannot exceed 1 KB in size.The reliability of this link is very low.The LCP negotiation phase is complete.

4. A network administrator has received complaints that users on a local LAN can retrievee-mail from a remote e-mail server but are unable to open web pages on the same server.Services at which two layers of the OSI model should be investigated during thetroubleshooting process? (Choose two.)physical layerdata link layernetwork layertransport layerapplication layer

5. When gathering symptoms for troubleshooting a network problem, which step couldresult in getting an external administrator involved in the process?narrowing the scopegathering symptoms from suspect devicesanalyzing existing symptomsdetermining ownership

6. Encapsulation errors from mismatched WAN protocols on a serial link between tworouters indicate a problem at which OSI layer?physicaldata linknetworktransport

7. Refer to the exhibit. Users at Branch B are reporting trouble accessing a corporatewebsite running on a server that is located at HQ. HQ and Branch A users can access thewebsite. R3 is able to ping 10.10.10.1 successfully but not 10.10.10.2. The users at Branch Bcan access servers at Branch A. Which two statements are true aboutthe troubleshooting

Page 3: EWAN Chapter 8 CCNA 4 4.0 2012 2013 100% - HeiseR Dev Zone

efforts? (Choose two.)The web server should be tested for an application layer problem.Frame Relay at R3 and R2 should be tested to narrow the scope of the problem.The fact that users at Branch A are working normally proves that there is no problem at R2.An ACL entry error could cause the failure at Layer 4 in either R3 or R2.The successful ping from R3 to R1 proves that the WAN is functioning normally. Therefore, theproblem has to be in the upper layers.

8. Which troubleshooting approach is suggested for dealing with a complex problem that issuspected of being caused by faulty network cabling?bottom uptop downdivide and conquermiddle out

9. Users are complaining of very long wait times to access resources on the network. Theshow interface command reveals collision counts far above the network baseline. At whichOSI layer should the administrator begin troubleshooting?applicationtransportnetworkdata linkphysical

10. Refer to the exhibit. Users on the Internal LAN are unable to connect to the www server.The network administrator pings the server and verifies that NAT is functioning correctly.Which OSI layer should the administrator begin to troubleshoot next?physicaldata linknetworkapplication

11. Which two statements are true concerning logical networking models? (Choose two.)TCP/IP splits the lowest layer of the OSI model into two separate layers.The top layer of the TCP/IP model combines the functions of the top three OSI layers.Troubleshooting with the TCP/IP model requires different techniques than with the OSI model.The network access layer is responsible for exchanging packets between devices on a TCP/IP

Page 4: EWAN Chapter 8 CCNA 4 4.0 2012 2013 100% - HeiseR Dev Zone

network.The Internet layer provides communication between applications, such as FTP, HTTP, and SMTP onseparate hosts.The TCP/IP network access layer corresponds to the OSI physical and data link layers.

12. Refer to the exhibit. Which two steps should be taken during the process of creatingnetwork documentation? (Choose two.)Record the information about the devices discovered in the Campus network only.Record the information about the devices discovered in the entire network, including the remotelocations.Transfer any information about the devices from the network configuration table that corresponds to acomponent of the topology diagram.Transfer only the Layer 2 and Layer 3 information about the devices from the network configurationtable that corresponds to a component of the topology diagram.Transfer the recorded information about the devices from the network configuration table gatheredduring peak network utilization that corresponds to a component of the topology diagram.

13. What is one example of a physical layer problem?incorrect encapsulationincorrect STP configurationincorrect ARP mappingincorrect clock rate

14. Clients across the company are reporting poor performance across all corporateapplications running in the data center. Internet access and applications running across thecorporate WAN are performing normally. The network administrator observes a continualbroadcast of random meaningless traffic (jabber) on the application server LAN in the datacenter on a protocol analyzer. How should the administrator start troubleshooting?The jabber in the data center indicates a local physical layer problem. Use the protocol analyzer todetermine the source of the jabber, and then check for a recent NIC driver update or bad cabling.Because all clients are experiencing application problems, the administrator should use a top-downapproach with the application servers in the data center.The scope of the problem indicates a likely routing or spanning-tree problem. Begin by checkingrouting tables, and follow up using appropriate STP showcommands to find a loop if routing isworking normally.Poll the staff to determine if any recent changes have been made. Back out all the changes one byone until the error condition is fixed.

Page 5: EWAN Chapter 8 CCNA 4 4.0 2012 2013 100% - HeiseR Dev Zone

15. A technician has been asked to make several changes to the configuration and topologyof a network and then determine the outcome of the changes. What tool can be used todetermine the overall effect caused by the changes?baselining toolknowledge baseprotocol analyzercable tester

16. A technician has been asked to troubleshoot an existing switched network but is unableto locate documentation for the VLAN configuration. Which troubleshooting tool allows thetechnician to map and discover VLAN and port assignments?cable analyzernetwork analyzerprotocol analyzerknowledge base

17. Which two pieces of information are typically found on a logical network diagram?(Choose two.)cable typesconnector typesinterface identifiersDLCI for virtual circuitsoperating system versions

18. Which two components should be taken into consideration when establishing a networkbaseline? (Choose two.)information about the network designIP addressing allocation on the networkrequirements about the service provider setuprequirements for access control lists to regulate trafficexpected performance under normal operating conditions

19. Which three approaches should be used when attempting to gather data from users fortroubleshooting? (Choose three.)Determine fault.Get to know the user to build trust.Obtain information by asking simple pertinent questions.

Page 6: EWAN Chapter 8 CCNA 4 4.0 2012 2013 100% - HeiseR Dev Zone

Share this:

Impress the user with use of technical language and skills.Determine if the problem is related to time or a specific event.Determine if the user can re-create the problem or events leading to the problem.

20. Information about which OSI layers of connected Cisco devices can be verified with theshow cdp neighbors command?All layersLayer 1, Layer 2, and Layer 3Layer 1, Layer 2, Layer 3, and Layer 4Layer 6 and Layer 7

Related posts:

1. EWAN Chapter 7 CCNA 4 4.0 2012 2013 100%2. EWAN Final Exam CCNA 4 4.0 2012 2013 100%3. EWAN Skill Exam CCNA 4 4.0 2012 2013 100%4. EWAN Chapter 1 CCNA 4 4.0 2012 2013 100%

Filed Under: CCNA Exploration, Cisco, NetworkTagged With: Accessing the WAN, Chapter 8, Semester 4

Twitter 1 1 1 Google Facebook 8 8 8 More

Page 7: EWAN Chapter 8 CCNA 4 4.0 2012 2013 100% - HeiseR Dev Zone

0 comments

WHAT'S THIS?ALSO ON HEISER DEV ZONE

DCompNtwk Chapter 4 CCNA Discovery 4 4.02012 100%1 comment • a year ago

disqus_MHrnZLlifk — 28. Which two majordifferences are associated with IP telephony whencompared to traditional telephony that uses aPBX? (Choose two.)***manages phonescentrallyutilizes centralized call routing***createspeer-to-peer relationships betweenphonesrequires a separate infrastructure tosupport data transfer - wrong!!!requires significantmanual configuration when adding, moving, orchanging phones

DCompNtwk Chapter 7 CCNA Discovery 4 4.02012 100%2 comments • a year ago

NARAN — When a switch port is recovering from afailure, which protocol allows the port to transitiondirectly to the forwarding state? RSTP

ROUTE Chapter 8 CCNP 6.0 2012 100%2 comments • a year ago

disqus_evIKchOPBD — 16. Answer is Anycastaddress

ESwitching Chapter 4 CCNA 3 4.0 2012 100%1 comment • a year ago

Tinley Student — Terrific study guide, thank you somuch!!

Start the discussion…

BestBest CommunityCommunity ShareShare

No one has commented yet.

Subscribe Add Disqus to your site

0

ONLINE

Page 8: EWAN Chapter 8 CCNA 4 4.0 2012 2013 100% - HeiseR Dev Zone

Search this website…

CATEGORIES

Select Category

POPULAR POSTS

Cisco Packet Tracer 6.0.1 for Windows, Linux, MAC OS

DsmbISP Final Exam CCNA Discovery 2 4.1 2012 2013

100%

ROUTE Chapter 8 CCNP 6.0 2012 2013 100%

DCompNtwk Final Exam CCNA Discovery 4 4.0 2012 2013

100%

ERouting Chapter 4 CCNA 2 4.0 2012 2013 100%

Cisco IOS Collection (originally Internetwork Operating

System)

ESwitching Chapter 7 CCNA 3 4.0 2012 2013 100%

Cisco IOS 2600 Series Routers

CCNA Exploration 4.0 Answers 2012

ENetwork Chapter 7 CCNA 1 4.0 2012 2013 100%

RECENT POSTS

Cisco Packet Tracer 6.0.1 for Windows, Linux,MAC OS

Cisco IOS Collection (originally Internetwork

TAGS

Accessing the WAN Chapter 1 Chapter 2Chapter 3 Chapter 4 Chapter 5 Chapter 6Chapter 8 Chapter 9 Final Exam LAN Switching and

Page 9: EWAN Chapter 8 CCNA 4 4.0 2012 2013 100% - HeiseR Dev Zone

Operating System)

Cisco IOS 3745 Series Routers

Cisco IOS 3725 Series Routers

Cisco IOS 7200 Series Routers

Cisco IOS 3660 Series Routers

Cisco IOS 3640 Series Routers

Cisco IOS 2600 Series Routers

Cisco IOS 1710 Series Routers

Cisco IOS 1700 Series Routers

Wireless Network FundamentalsNetworking for Home and Small Businesses RoutingProtocols and Concepts Semester1 Semester 2 Semester 3 Semester 4 TSHOOT

Working at a Small-to-Medium Business or ISP

FOLLOW US

Facebook

Twitter

Google+

Feed / Atom / Feedburner

Copyright © 2013 · Genesis Sample Theme on Genesis Framework · WordPress · Log in