CCNA 1 Chapter 9

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Lytayquize
L
Lytayquize
Community Contributor
Quizzes Created: 5 | Total Attempts: 6,626
Questions: 23 | Attempts: 935

SettingsSettingsSettings
CCNA 1 Chapter 9 - Quiz

These quiz is prepared to take for whom want to measure the knowledge and ability only. This is not the only way to cheat other but it can improve your knowledge base on what you have learn.


Questions and Answers
  • 1. 

    What should a network administrator do first after receiving a call from a user who cannot access the company web server?

    • A.

      Reboot the web server.

    • B.

      Replace the NIC of the computer.

    • C.

      Ask the user to log off and log on again.

    • D.

      Ask the user what URL has been typed and what error message displays.

    Correct Answer
    D. Ask the user what URL has been typed and what error message displays.
    Explanation
    The correct answer is to ask the user what URL has been typed and what error message displays. This is the first step a network administrator should take in order to gather information about the issue and understand the specific problem the user is facing. By asking for the URL and error message, the administrator can start troubleshooting and determine if it is a configuration issue, a network problem, or any other potential cause for the inability to access the web server. Rebooting the web server, replacing the NIC, or asking the user to log off and log on again may not address the root cause of the problem.

    Rate this question:

  • 2. 

    A customer called the cable company to report that the Internet connection is unstable. After trying several configuration changes, the technician decided to send the customer a new cable modem to try. What troubleshooting technique does this represent?

    • A.

      Top-down

    • B.

      Bottom-up

    • C.

      Substitution

    • D.

      Trial-and-error

    • E.

      Divide-and-conquer

    Correct Answer
    C. Substitution
    Explanation
    The technician's decision to send the customer a new cable modem to try is an example of the troubleshooting technique known as substitution. Substitution involves replacing a component or device with a known working one to determine if the issue is resolved. In this case, by sending a new cable modem, the technician is substituting the existing modem to see if it resolves the unstable Internet connection problem.

    Rate this question:

  • 3. 

    Only one workstation on a particular network cannot reach the Internet. What is the first troubleshooting step if the divide-and-conquer method is being used?

    • A.

      Check the NIC, and then check the cabling.

    • B.

      Check the workstation TCP/IP configuration.

    • C.

      Test all cables, and then test layer by layer up the OSI model.

    • D.

      Attempt to Telnet, and then test layer by layer down the OSI model.

    Correct Answer
    B. Check the workstation TCP/IP configuration.
    Explanation
    In the divide-and-conquer method, the first troubleshooting step is to check the workstation TCP/IP configuration. This step is important because it helps identify any misconfigurations or issues with the network settings on the workstation that may be causing the inability to reach the Internet. By checking the TCP/IP configuration, it is possible to verify if the workstation has the correct IP address, subnet mask, default gateway, and DNS settings. This step helps narrow down the problem and determine if the issue lies within the workstation itself.

    Rate this question:

  • 4. 

    Which two troubleshooting techniques are suitable for both home networks and large corporate networks? (Choose two.)

    • A.

      Having a backup ISR

    • B.

      Running network monitoring applications

    • C.

      Documenting the troubleshooting process

    • D.

      Keeping a record of system upgrades and software versions

    • E.

      Keeping spare switches, routers, and other equipment available

    Correct Answer(s)
    C. Documenting the troubleshooting process
    D. Keeping a record of system upgrades and software versions
    Explanation
    The two troubleshooting techniques that are suitable for both home networks and large corporate networks are documenting the troubleshooting process and keeping a record of system upgrades and software versions. These techniques are important in both scenarios as they help in maintaining a systematic approach to troubleshooting and allow for better tracking of changes and upgrades made to the network. By documenting the troubleshooting process, it becomes easier to identify patterns and trends in network issues, while keeping a record of system upgrades and software versions ensures that any changes can be easily reverted if they cause problems.

    Rate this question:

  • 5. 

    Identify two physical-layer network problems. (Choose two.)

    • A.

      Hardware failure

    • B.

      Software configuration

    • C.

      Devices not able to ping

    • D.

      Loose cable connections

    • E.

      Device driver configuration

    Correct Answer(s)
    A. Hardware failure
    D. Loose cable connections
    Explanation
    The two physical-layer network problems mentioned in the answer are hardware failure and loose cable connections. Hardware failure refers to any malfunction or breakdown of the physical components of a network, such as routers, switches, or cables. Loose cable connections can cause disruptions in network connectivity and result in intermittent or no connection. These problems directly affect the physical infrastructure of the network and can lead to network outages or poor performance.

    Rate this question:

  • 6. 

    Which ipconfig command requests IP configuration from a DHCP server?

    • A.

      Ipconfig

    • B.

      Ipconfig /all

    • C.

      Ipconfig /renew

    • D.

      Ipconfig /release

    Correct Answer
    C. Ipconfig /renew
    Explanation
    The ipconfig /renew command is used to request a new IP configuration from a DHCP server. This command is typically used when a device's IP lease is about to expire or when the device needs to obtain a new IP address from the DHCP server. By running ipconfig /renew, the device sends a request to the DHCP server to allocate a new IP address and update its network configuration accordingly.

    Rate this question:

  • 7. 

    What command is used to determine the location of delay for a packet traversing the Internet?

    • A.

      Ipconfig

    • B.

      Netstat

    • C.

      Nslookup

    • D.

      Ping

    • E.

      Tracert

    Correct Answer
    E. Tracert
    Explanation
    The correct answer is "tracert." Tracert is a command used to trace the route that a packet takes from the source to the destination in the Internet. It displays the IP addresses and the time it takes for each hop along the path, allowing users to identify any delays or network congestion.

    Rate this question:

  • 8. 

    What command is used to determine if a DNS server is providing name resolution?

    • A.

      Ipconfig

    • B.

      Netstat

    • C.

      Nslookup

    • D.

      Tracert

    Correct Answer
    C. Nslookup
    Explanation
    The command "nslookup" is used to determine if a DNS server is providing name resolution. Nslookup is a command-line tool that allows users to query DNS servers to obtain information about domain names, IP addresses, and other DNS records. By using nslookup, users can verify if a DNS server is able to resolve domain names correctly and retrieve the corresponding IP addresses.

    Rate this question:

  • 9. 

    Which troubleshooting method begins by examining cable connections and wiring issues?

    • A.

      Top-down

    • B.

      Bottom-up

    • C.

      Substitution

    • D.

      Divide-and-conquer

    Correct Answer
    B. Bottom-up
    Explanation
    The bottom-up troubleshooting method begins by examining cable connections and wiring issues. This method involves starting with the physical components and working upwards to identify and resolve issues. By checking the cables and wiring first, any problems related to faulty connections or damaged wires can be identified and fixed before moving on to other troubleshooting steps. This approach ensures that the foundation of the system is stable before investigating other potential causes of the problem.

    Rate this question:

  • 10. 

    A technician suspects that a Linksys integrated router is the source of a network problem. While troubleshooting, the technician notices a blinking green activity LED on some of the ports. What does this indicate?

    • A.

      Self-diagnostics have not completed.

    • B.

      The power supply is the source of the problem.

    • C.

      The ports are operational and are receiving traffic.

    • D.

      The ports are operational, but no traffic is flowing.

    • E.

      There are no cables plugged into those ISR ports.

    Correct Answer
    C. The ports are operational and are receiving traffic.
    Explanation
    The blinking green activity LED on the ports indicates that the ports are operational and are receiving traffic. This means that the network problem is not caused by the Linksys integrated router itself, but rather by another component or issue in the network.

    Rate this question:

  • 11. 

    A PC is plugged into a switch and is unable to connect to the network. The UTP cable is suspected. What could be the problem?

    • A.

      A straight-through cable is being used

    • B.

      The connectors at both ends of the cable are RJ-45.

    • C.

      The RJ-45 connectors are crimped onto the cable jacket.

    • D.

      A crossover cable is being used.

    Correct Answer
    D. A crossover cable is being used.
    Explanation
    The problem could be that a crossover cable is being used. A crossover cable is used to directly connect two devices of the same type, such as two computers, without the need for a switch. However, in this scenario, a PC is plugged into a switch, which requires a straight-through cable. A straight-through cable is used to connect different types of devices, such as a PC and a switch. Therefore, if a crossover cable is being used, it would not allow the PC to connect to the network.

    Rate this question:

  • 12. 

    Refer to the graphic. What configuration is incorrect in the network shown?

    • A.

      The host IP address is incorrect.

    • B.

      The host subnet mask is incorrect.

    • C.

      The host default gateway is incorrect.

    • D.

      The wired connection is the wrong type of cable.

    • E.

      The Linksys integrated router does not support wireless.

    Correct Answer
    D. The wired connection is the wrong type of cable.
    Explanation
    The correct answer is that the wired connection is the wrong type of cable. This means that the physical connection between the host and the network is not properly established due to the use of an incompatible cable.

    Rate this question:

  • 13. 

    Which three settings must match on the client and access point for a wireless connection to occur? (Choose three.)

    • A.

      SSID

    • B.

      Authentication

    • C.

      MD5 checksum

    • D.

      Antennae type

    • E.

      Encryption key

    Correct Answer(s)
    A. SSID
    B. Authentication
    E. Encryption key
    Explanation
    For a wireless connection to occur, three settings that must match on the client and access point are SSID, authentication, and encryption key. The SSID (Service Set Identifier) is the name of the wireless network and must be the same on both the client and access point for them to connect. Authentication refers to the method used to verify the identity of the client, such as a password or certificate, and it must be set up the same way on both devices. The encryption key is used to secure the wireless connection and must be identical on both the client and access point for successful communication.

    Rate this question:

  • 14. 

    A technician is troubleshooting a security breach on a new wireless access point. Which three configuration settings make it easy for hackers to gain access? (Choose three.)

    • A.

      Configuring NAT

    • B.

      Broadcasting the SSID

    • C.

      Using open authentication

    • D.

      Enabling MAC address filters

    • E.

      Using the default internal IP address

    Correct Answer(s)
    B. Broadcasting the SSID
    C. Using open authentication
    E. Using the default internal IP address
    Explanation
    Broadcasting the SSID makes it easier for hackers to identify the wireless network. Using open authentication allows anyone to connect to the network without providing a password. Using the default internal IP address makes it easier for hackers to target the access point. Configuring NAT, enabling MAC address filters are security measures that would make it harder for hackers to gain access.

    Rate this question:

  • 15. 

    Refer to the graphic. The wireless host cannot access the Internet, but the wired host can. What is the problem?

    • A.

      The host WEP key is incorrect.

    • B.

      The host IP address is incorrect.

    • C.

      The host subnet mask is incorrect.

    • D.

      The host default gateway is incorrect.

    • E.

      The integrated router internal IP address is incorrect.

    Correct Answer
    A. The host WEP key is incorrect.
    Explanation
    The wireless host is unable to access the internet because the WEP key is incorrect. The WEP key is a security feature that is used to encrypt and decrypt data transmitted over the wireless network. If the WEP key is incorrect, the wireless host will not be able to establish a secure connection with the network, preventing it from accessing the internet.

    Rate this question:

  • 16. 

    Refer to the graphic. What configuration is incorrect in the network shown?

    • A.

      The host IP address is incorrect.

    • B.

      The host subnet mask is incorrect.

    • C.

      The host default gateway is incorrect.

    • D.

      The wired connection is the wrong type of cable.

    • E.

      The Linksys integrated router does not support wireless.

    Correct Answer
    A. The host IP address is incorrect.
    Explanation
    The incorrect configuration in the network shown is the host IP address.

    Rate this question:

  • 17. 

    When acting as a DHCP server, what three types of information can an ISR provide to a client? (Choose three.)

    • A.

      DNS server address

    • B.

      MAC address

    • C.

      Default gateway

    • D.

      Static IP address

    • E.

      Dynamic IP address

    Correct Answer(s)
    A. DNS server address
    C. Default gateway
    E. Dynamic IP address
    Explanation
    When acting as a DHCP server, an ISR can provide three types of information to a client. The first is the DNS server address, which is crucial for the client to resolve domain names to IP addresses. The second is the default gateway, which is the IP address of the router that connects the client to other networks. Lastly, the ISR can provide a dynamic IP address to the client, which is temporarily assigned from a pool of available addresses. These three pieces of information are essential for the client to establish network connectivity and access resources on the network.

    Rate this question:

  • 18. 

    What two items could be checked to verify connectivity between the router and the ISP? (Choose two.)

    • A.

      Router status page

    • B.

      Wireless card settings

    • C.

      Router operating system version

    • D.

      Local host operating system version

    • E.

      Connectivity status as indicated by LEDs

    Correct Answer(s)
    A. Router status page
    E. Connectivity status as indicated by LEDs
    Explanation
    To verify connectivity between the router and the ISP, two items that could be checked are the router status page and the connectivity status as indicated by LEDs. The router status page provides information about the router's connection to the ISP, including IP address, DNS settings, and connection status. The connectivity status as indicated by LEDs on the router can also provide a visual indication of whether the router is successfully connected to the ISP.

    Rate this question:

  • 19. 

    A technician is unsuccessful in establishing a console session between a PC and a Linksys integrated router. Both devices have power, and a cable is connected between them. Which two troubleshooting steps could help to diagnose this problem? (Choose two.)

    • A.

      Ensure the correct cable is used.

    • B.

      Ensure the SSID is the same on both devices.

    • C.

      Ensure both devices have the same IP address.

    • D.

      Ensure the link status LED on the integrated router is lit.

    • E.

      Ensure the encryption type on both devices match.

    Correct Answer(s)
    A. Ensure the correct cable is used.
    D. Ensure the link status LED on the integrated router is lit.
    Explanation
    The technician should first ensure that the correct cable is being used between the PC and the Linksys integrated router. Using the wrong cable could prevent a console session from being established. Additionally, the technician should check the link status LED on the integrated router to ensure that it is lit. If the LED is not lit, it could indicate a problem with the physical connection or the router itself. Checking these two factors will help diagnose the problem with establishing a console session.

    Rate this question:

  • 20. 

    Network baselines should be performed in which two situations? (Choose two.)

    • A.

      After the network is installed and running optimally

    • B.

      After a virus outbreak is discovered on the network

    • C.

      After major changes are implemented on the network

    • D.

      After several computers are added to the network

    • E.

      At the end of the work week

    Correct Answer(s)
    A. After the network is installed and running optimally
    C. After major changes are implemented on the network
    Explanation
    Network baselines should be performed after the network is installed and running optimally to establish a benchmark for normal network performance. This baseline can be used for comparison in the future to identify any deviations or abnormalities. Additionally, network baselines should be performed after major changes are implemented on the network to assess the impact of these changes on network performance and ensure that the changes have not negatively affected the network's functionality.

    Rate this question:

  • 21. 

    Typically, help desk personnel assist end users in which two tasks? (Choose two.)

    • A.

      Identifying when the problem occurred

    • B.

      Determining if other users are currently logged into the computer

    • C.

      Updating network diagrams and documentation

    • D.

      Implementing the solution to the problem

    • E.

      Running a network baseline test

    Correct Answer(s)
    A. Identifying when the problem occurred
    D. Implementing the solution to the problem
    Explanation
    Help desk personnel assist end users in identifying when the problem occurred by gathering information about the issue and troubleshooting its root cause. They also help in implementing the solution to the problem by providing step-by-step instructions or remotely accessing the user's computer to resolve the issue.

    Rate this question:

  • 22. 

    How does remote-access software help in the troubleshooting process?

    • A.

      Remote access uses a live chat feature.

    • B.

      Users have to be present so that they can view LEDs and change cables if necessary.

    • C.

      Diagnostics can be run without a technician being present at the site.

    • D.

      FAQs can be consulted more easily.

    Correct Answer
    C. Diagnostics can be run without a technician being present at the site.
    Explanation
    Remote-access software allows technicians to remotely access and control a computer or device from a different location. This means that they can troubleshoot and diagnose issues without physically being present at the site. They can run diagnostics, check settings, and make necessary changes without needing to travel to the location. This saves time and resources, making the troubleshooting process more efficient. It also allows for quicker resolution of problems as technicians can immediately address issues remotely.

    Rate this question:

  • 23. 

    Which two items should be added to the documentation following a troubleshooting event? (Choose two.)

    • A.

      Final resolution

    • B.

      Repetitive measures

    • C.

      Number of people involved in the problem

    • D.

      Accurate current network infrastructure diagrams

    • E.

      Results of successful and unsuccessful troubleshooting steps

    Correct Answer(s)
    A. Final resolution
    E. Results of successful and unsuccessful troubleshooting steps
    Explanation
    Following a troubleshooting event, it is important to add the final resolution to the documentation as it provides a clear and concise summary of how the problem was resolved. Additionally, including the results of successful and unsuccessful troubleshooting steps is crucial as it helps in understanding what worked and what did not, enabling future troubleshooting efforts to be more efficient and effective.

    Rate this question:

Related Topics

Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.