A Unique Quiz On CCNA WAN 4 Ch 8

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Dave Martin
D
Dave Martin
Community Contributor
Quizzes Created: 1 | Total Attempts: 157
Questions: 20 | Attempts: 157

SettingsSettingsSettings
A Unique Quiz On CCNA WAN 4 Ch 8 - Quiz

Welcome to the eighth chapter of our quiz series on wide area networks, as taught by the Cisco Certified Network Associate to give you knowledge on how these networks are able to span radiuses in excess of a kilometre in length. What do you know about how they work? Let’s find out.


Questions and Answers
  • 1. 

    1. Which two pieces of information are typically found on a logical network diagram? (Choose two.)

    • A.

      • cable types

    • B.

      • connector types

    • C.

      • interface identifiers

    • D.

      • DLCI for virtual circuits

    • E.

      • operating system versions

    Correct Answer(s)
    C. • interface identifiers
    D. • DLCI for virtual circuits
    Explanation
    A logical network diagram typically includes interface identifiers, which are used to identify the specific network interfaces or ports on devices. This helps in understanding the connectivity and flow of data within the network. Additionally, the diagram may also include the DLCI (Data Link Connection Identifier) for virtual circuits. DLCIs are used in Frame Relay networks to identify the virtual circuit between devices.

    Rate this question:

  • 2. 

    2. Excessive broadcasts are generally a symptom of a problem at which layer?

    • A.

      • physical

    • B.

      • data link

    • C.

      • network

    • D.

      • transport

    Correct Answer
    B. • data link
    Explanation
    Excessive broadcasts are generally a symptom of a problem at the data link layer. The data link layer is responsible for the reliable transmission of data between two directly connected nodes on a network. Excessive broadcasts occur when a node sends out a broadcast message that is received by all other nodes on the same network segment. This can happen due to issues such as network congestion, misconfigured network devices, or faulty network cables.

    Rate this question:

  • 3. 

    3. What is one example of a physical layer problem?

    • A.

      • incorrect encapsulation

    • B.

      • incorrect STP configuration

    • C.

      • incorrect ARP mapping

    • D.

      • incorrect clock rate

    Correct Answer
    D. • incorrect clock rate
    Explanation
    One example of a physical layer problem is an incorrect clock rate. This refers to the timing synchronization between devices in a network. If the clock rate is set incorrectly, it can result in data transmission errors and communication issues between devices. This can lead to a degradation in network performance and connectivity problems.

    Rate this question:

  • 4. 

    4. Which two components should be taken into consideration when establishing a network baseline? (Choose two.)

    • A.

      • information about the network design

    • B.

      • IP addressing allocation on the network

    • C.

      • requirements about the service provider setup

    • D.

      • requirements for access control lists to regulate traffic

    • E.

      • expected performance under normal operating conditions

    Correct Answer(s)
    A. • information about the network design
    E. • expected performance under normal operating conditions
    Explanation
    When establishing a network baseline, it is important to consider information about the network design. This includes understanding the layout, topology, and architecture of the network. This information helps in identifying the various components and devices that make up the network.

    Additionally, expected performance under normal operating conditions is another crucial factor to consider. This involves understanding the baseline performance metrics of the network, such as bandwidth utilization, latency, and packet loss. By establishing a baseline for expected performance, any deviations or abnormalities can be easily identified and addressed.

    Considering both the network design and expected performance allows for a comprehensive understanding of the network's capabilities and performance, helping to optimize its efficiency and troubleshoot any issues that may arise.

    Rate this question:

  • 5. 

    Refer to the exhibit. Which two steps should be taken during the process of creating network documentation? (Choose two.)

    • A.

      • Record the information about the devices discovered in the Campus network only.

    • B.

      • Record the information about the devices discovered in the entire network, including the remote locations.

    • C.

      • Transfer any information about the devices from the network configuration table that corresponds to a component of the topology diagram.

    • D.

      • Transfer only the Layer 2 and Layer 3 information about the devices from the network configuration table that corresponds to a component of the topology diagram.

    • E.

      • Transfer the recorded information about the devices from the network configuration table gathered during peak network utilization that corresponds to a component of the topology diagram.

    Correct Answer(s)
    B. • Record the information about the devices discovered in the entire network, including the remote locations.
    C. • Transfer any information about the devices from the network configuration table that corresponds to a component of the topology diagram.
    Explanation
    During the process of creating network documentation, it is important to record the information about the devices discovered in the entire network, including the remote locations. This ensures that the documentation is comprehensive and includes all relevant devices. Additionally, it is necessary to transfer any information about the devices from the network configuration table that corresponds to a component of the topology diagram. This helps in accurately representing the network configuration and allows for easy reference when troubleshooting or making changes to the network.

    Rate this question:

  • 6. 

    6. Which two statements are true concerning logical networking models? (Choose two.)

    • A.

      • TCP/IP splits the lowest layer of the OSI model into two separate layers.

    • B.

      • The top layer of the TCP/IP model combines the functions of the top three OSI layers.

    • C.

      • Troubleshooting with the TCP/IP model requires different techniques than with the OSI model.

    • D.

      • The network access layer is responsible for exchanging packets between devices on a TCP/IP network.

    • E.

      • The TCP/IP network access layer corresponds to the OSI physical and data link layers.

    Correct Answer(s)
    B. • The top layer of the TCP/IP model combines the functions of the top three OSI layers.
    E. • The TCP/IP network access layer corresponds to the OSI physical and data link layers.
    Explanation
    The first true statement is that the top layer of the TCP/IP model combines the functions of the top three OSI layers. This means that the application, presentation, and session layers of the OSI model are combined into the application layer of the TCP/IP model.

    The second true statement is that the TCP/IP network access layer corresponds to the OSI physical and data link layers. This means that the network access layer in TCP/IP is responsible for exchanging packets between devices on a TCP/IP network, just like the physical and data link layers in the OSI model.

    Rate this question:

  • 7. 

    7. Clients across the company are reporting poor performance across all corporate applications running in the data center. Internet access and applications running across the corporate WAN are performing normally. The network administrator observes a continual broadcast of random meaningless traffic (jabber) on the application server LAN in the data center on a protocol analyzer. How should the administrator start troubleshooting?

    • A.

      • The jabber in the data center indicates a local physical layer problem. Use the protocol analyzer to determine the source of the jabber, and then check for a recent NIC driver update or bad cabling.

    • B.

      • Because all clients are experiencing application problems, the administrator should use a top-down approach with the

    • C.

      • application servers in the data center.

    • D.

      • The scope of the problem indicates a likely routing or spanning-tree problem. Begin by checking routing tables, and follow up using appropriate STP show commands to find a loop if routing is working normally.

    • E.

      • Poll the staff to determine if any recent changes have been made. Back out all the changes one by one until the error condition is fixed.

    Correct Answer
    A. • The jabber in the data center indicates a local physical layer problem. Use the protocol analyzer to determine the source of the jabber, and then check for a recent NIC driver update or bad cabling.
    Explanation
    The correct answer suggests that the jabber observed on the protocol analyzer indicates a physical layer problem in the data center. To troubleshoot, the network administrator should use the protocol analyzer to identify the source of the jabber and then investigate for potential issues such as a recent NIC driver update or bad cabling. This approach focuses on addressing the local physical layer problem that is causing the poor performance across all corporate applications.

    Rate this question:

  • 8. 

    8. Which troubleshooting approach is suggested for dealing with a complex problem that is suspected of being caused by faulty network cabling?

    • A.

      • bottom up

    • B.

      • top down

    • C.

      • divide and conquer

    • D.

      • middle out

    Correct Answer
    A. • bottom up
    Explanation
    When dealing with a complex problem that is suspected of being caused by faulty network cabling, the suggested troubleshooting approach is "bottom up". This means starting with the basic components and gradually moving up the network layers to identify and isolate the problem. By checking the physical connections, cables, and network devices first, any issues related to faulty network cabling can be identified and resolved before moving on to higher-level troubleshooting steps. This approach allows for a systematic and efficient way of troubleshooting complex network problems.

    Rate this question:

  • 9. 

    9. A technician has been asked to make several changes to the configuration and topology of a network and then determine the outcome of the changes. What tool can be used to determine the overall effect caused by the changes?

    • A.

      • baselining tool

    • B.

      • knowledge base

    • C.

      • protocol analyzer

    • D.

      • cable tester

    Correct Answer
    A. • baselining tool
    Explanation
    A baselining tool can be used to determine the overall effect caused by the changes made to the configuration and topology of a network. This tool allows the technician to establish a baseline or reference point for the network's performance before the changes are made. After the changes are implemented, the baselining tool can be used to compare the current performance to the baseline, helping the technician to identify any improvements or issues caused by the changes. This tool provides valuable insights into the impact of the changes on the network's overall performance.

    Rate this question:

  • 10. 

    10. A technician has been asked to troubleshoot an existing switched network but is unable to locate documentation for the VLAN configuration. Which troubleshooting tool allows the technician to map and discover VLAN and port assignments?

    • A.

      • cable analyzer

    • B.

      • network analyzer

    • C.

      • protocol analyzer

    • D.

      • knowledge base

    Correct Answer
    B. • network analyzer
    Explanation
    A network analyzer is a troubleshooting tool that allows a technician to map and discover VLAN and port assignments. It can capture and analyze network traffic, helping the technician identify VLANs and their associated port assignments. By examining the network traffic, the technician can determine which devices are communicating on which VLANs and ports, helping to troubleshoot any issues with the switched network.

    Rate this question:

  • 11. 

    Refer to the exhibit. Users on the Internal LAN are unable to connect to the www server. The network administrator pings the server and verifies that NAT is functioning correctly. Which OSI layer should the administrator begin to troubleshoot next?

    • A.

      • physical

    • B.

      • data link

    • C.

      • network

    • D.

      • application

    Correct Answer
    D. • application
    Explanation
    The network administrator should begin troubleshooting at the application layer. Since NAT is functioning correctly and the server is reachable, the issue is most likely related to the application or the protocols being used. By starting at the application layer, the administrator can check if there are any issues with the specific application or if there are any problems with the protocols being used to connect to the server.

    Rate this question:

  • 12. 

    12. When gathering symptoms for troubleshooting a network problem, which step could result in getting an external administrator involved in the process?

    • A.

      • narrowing the scope

    • B.

      • gathering symptoms from suspect devices

    • C.

      • analyzing existing symptoms

    • D.

      • determining ownership

    Correct Answer
    D. • determining ownership
    Explanation
    Determining ownership could result in getting an external administrator involved in the process. This step involves identifying who is responsible for the network or devices experiencing the problem. If the issue is outside the control or expertise of the internal team, they may need to involve an external administrator who has the necessary knowledge and authority to address the problem.

    Rate this question:

  • 13. 

    Refer to the exhibit. Which three pieces of information can be determined by analyzing the output shown? (Choose three.)

    • A.

      • A carrier detect signal is present.

    • B.

      • Keepalives are being received successfully.

    • C.

      • Default encapsulation is used on this serial link.

    • D.

      • The reliability of this link is very low.

    • E.

      • The LCP negotiation phase is complete.

    Correct Answer(s)
    A. • A carrier detect signal is present.
    B. • Keepalives are being received successfully.
    E. • The LCP negotiation phase is complete.
    Explanation
    The output shown indicates that a carrier detect signal is present, as indicated by the "CD" status of the line. Additionally, the output shows that keepalives are being received successfully, as indicated by the "KA" status of the line. Finally, the output also indicates that the LCP (Link Control Protocol) negotiation phase is complete, as indicated by the "OPEN" status of the line.

    Rate this question:

  • 14. 

    Refer to the exhibit. Users at Branch B are reporting trouble accessing a corporate website running on a server that is located at HQ. HQ and Branch A users can access the website. R3 is able to ping 10.10.10.1 successfully but not 10.10.10.2. The users at Branch B can access servers at Branch A. Which two statements are true about the troubleshooting efforts? (Choose two.) 

    • A.

      • The web server should be tested for an application layer problem.

    • B.

      • Frame Relay at R3 and R2 should be tested to narrow the scope of the problem.

    • C.

      • The fact that users at Branch A are working normally proves that there is no problem at R2.

    • D.

      • An ACL entry error could cause the failure at Layer 4 in either R3 or R2.

    • E.

      • The successful ping from R3 to R1 proves that the WAN is functioning normally. Therefore, the problem has to be in the upper layers.

    Correct Answer(s)
    B. • Frame Relay at R3 and R2 should be tested to narrow the scope of the problem.
    D. • An ACL entry error could cause the failure at Layer 4 in either R3 or R2.
    Explanation
    The first statement is true because if users at Branch B are able to access servers at Branch A but not the corporate website at HQ, it suggests that there may be an issue specific to the website or its application layer. Testing the web server for an application layer problem would help identify and resolve any issues in this area.

    The second statement is also true because if R3 is able to ping one IP address (10.10.10.1) successfully but not another (10.10.10.2), it indicates that there may be a problem with the Frame Relay connection between R3 and R2. Testing the Frame Relay at R3 and R2 would help narrow down the scope of the problem and potentially identify any issues with the connection.

    The other statements are not necessarily true. The fact that users at Branch A are able to access the website does not necessarily prove that there is no problem at R2. An ACL entry error could indeed cause failure at Layer 4 in either R3 or R2, but this cannot be concluded based on the given information. The successful ping from R3 to R1 only proves that the WAN connection is functioning normally, but it does not necessarily mean that the problem lies in the upper layers.

    Rate this question:

  • 15. 

    15. Users are complaining of very long wait times to access resources on the network. The show interface command reveals collision counts far above the network baseline. At which OSI layer should the administrator begin troubleshooting?

    • A.

      • application

    • B.

      • transport

    • C.

      • network

    • D.

      • data link

    • E.

      • physical

    Correct Answer
    E. • physical
    Explanation
    The correct answer is "physical". In this scenario, the collision counts being far above the network baseline indicate that there may be issues at the physical layer of the OSI model. Collisions occur when multiple devices try to transmit data at the same time, causing delays and congestion. By troubleshooting at the physical layer, the administrator can address any problems with cables, connectors, or network interface cards that may be causing the high collision counts and long wait times for accessing resources on the network.

    Rate this question:

  • 16. 

    16. Encapsulation errors from mismatched WAN protocols on a serial link between two routers indicate a problem at which OSI layer?

    • A.

      • physical

    • B.

      • data link

    • C.

      • network

    • D.

      • transport

    Correct Answer
    B. • data link
    Explanation
    Encapsulation errors on a serial link between two routers indicate a problem at the data link layer of the OSI model. The data link layer is responsible for providing error-free transmission of data frames over the physical layer. In this case, the mismatched WAN protocols are causing the encapsulation errors, which suggests that there is an issue with the way the data is being framed and transmitted between the routers.

    Rate this question:

  • 17. 

    17. What combination of IP address and wildcard mask should be used to specify only the last 8 addresses in the subnet 192.168.3.32/28?

    • A.

      • 192.168.3.32 0.0.0.7

    • B.

      • 192.168.3.32 0.0.0.15

    • C.

      • 192.168.3.40 0.0.0.7

    • D.

      • 192.168.3.40 0.0.0.15

    Correct Answer
    C. • 192.168.3.40 0.0.0.7
    Explanation
    The correct answer is "192.168.3.40 0.0.0.7".

    To specify only the last 8 addresses in the subnet 192.168.3.32/28, we need to find the range of addresses that fall within this subnet.

    The subnet 192.168.3.32/28 has a total of 16 addresses. The first address in the subnet is 192.168.3.32 and the last address is 192.168.3.47.

    To specify only the last 8 addresses, we need to start from 192.168.3.40 (the ninth address in the subnet) and use a wildcard mask of 0.0.0.7, which allows for 8 addresses.

    Therefore, the combination of IP address and wildcard mask that should be used is 192.168.3.40 0.0.0.7.

    Rate this question:

  • 18. 

    18. A network administrator has received complaints that users on a local LAN can retrieve e-mail from a remote e-mail server but are unable to open web pages on the same server. Services at which two layers of the OSI model should be investigated during the troubleshooting process? (Choose two.)

    • A.

      • physical layer

    • B.

      • data link layer

    • C.

      • network layer

    • D.

      • transport layer

    • E.

      • application layer

    Correct Answer(s)
    D. • transport layer
    E. • application layer
    Explanation
    The network administrator should investigate the transport layer and application layer during the troubleshooting process. The transport layer is responsible for the reliable delivery of data between hosts and ensures that the correct data is received in the correct order. If there is an issue with retrieving web pages, it could be related to the transport layer protocols such as TCP or UDP. The application layer is responsible for providing services to the end-user, such as web browsing. If users are unable to open web pages, it could indicate a problem with the application layer protocols or settings. Investigating these two layers will help identify and resolve the issue.

    Rate this question:

  • 19. 

    19. Information about which OSI layers of connected Cisco devices can be verified with the show cdp neighbors command?

    • A.

      • All layers

    • B.

      • Layer 1, Layer 2, and Layer 3

    • C.

      • Layer 1, Layer 2, Layer 3, and Layer 4

    • D.

      • Layer 6 and Layer 7

    Correct Answer
    B. • Layer 1, Layer 2, and Layer 3
    Explanation
    The show cdp neighbors command in Cisco devices can be used to verify information about Layer 1 (Physical layer), Layer 2 (Data Link layer), and Layer 3 (Network layer) of the OSI model. This command provides details about the neighboring devices connected to the current device, including their interface, platform, capabilities, and addresses. It does not provide information about Layer 4 (Transport layer), Layer 6 (Presentation layer), or Layer 7 (Application layer).

    Rate this question:

  • 20. 

    20. Which three approaches should be used when attempting to gather data from users for troubleshooting? (Choose three.)

    • A.

      • Get to know the user to build trust.

    • B.

      • Obtain information by asking simple pertinent questions.

    • C.

      • Impress the user with use of technical language and skills.

    • D.

      • Determine if the problem is related to time or a specific event.

    • E.

      • Determine if the user can re-create the problem or events leading to the problem.

    Correct Answer(s)
    B. • Obtain information by asking simple pertinent questions.
    D. • Determine if the problem is related to time or a specific event.
    E. • Determine if the user can re-create the problem or events leading to the problem.
    Explanation
    When attempting to gather data from users for troubleshooting, it is important to use three approaches. First, obtaining information by asking simple pertinent questions helps to gather necessary details about the problem. Second, determining if the problem is related to time or a specific event helps in identifying the root cause. Lastly, determining if the user can re-create the problem or events leading to the problem helps in replicating the issue and finding a solution. These three approaches ensure a systematic and effective approach to troubleshooting.

    Rate this question:

Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.