CCNP TSHOOT Exam Back to Exams Page 1. Which of the following steps is not part of the simplified troubleshooting flow? Problem resolution Problem undestanding Problem report Problem diagnosisQuestion 1 of 50 2. What is this method of troubleshooting called? Following the traffic method Divide-and-Conquer method Top-Down method Down-Top methodQuestion 2 of 50 3. Which is not a well known network maintenance model? Fault management, configuration management, accounting management, performance management and security management(FCAPS) Maintenance Model 0 Infrastructure Library(ITIL) Cisco Lifecycle ServicesQuestion 3 of 50 4. Which components are part of a set of network documentation? Logical topology diagram Inventory of network equipment Configuration information IP addresses assignmentQuestion 4 of 50 5. Which of the following commands backs up the startup configuration to an FTP server using the username lab and the password cisco? copy startup-config ftp://lab:cisco@192.168.1.74 copy startup-config ftp://cisco:lab@192.168.1.74 copy startup-config ftp://192.168.1.74 username lab password cisco copy startup-config ftp://192.168.1.74@lab:ciscoQuestion 5 of 50 6. Considering the output below, how is the archive feature configured? A B C DQuestion 6 of 50 7. Which of the following describes the correct security levels/name associations? A B C DQuestion 7 of 50 8. Considering the trimmed output, what is the configuration of the logging feature that is applied to the router? A B C DQuestion 8 of 50 9. What are some characteristics of SNMP? Collects device statistics (for example, platform resource utilization, traffic counts, and error counts) Uses a push model(that is, statistics are pushed to a network management station) Uses a pull model (that is, statistics pulled from a monitored device by a network management station) Available on nearly all enterprise network devicesQuestion 9 of 50 10. What are some of the characteristics of NetFlow? Collects information only about IPv6 traffic Collects detailed information about traffic flows Uses a push model (that is, statistics pushed from the monitored device to a NetFlow collector) Available on routers and high-end switchesQuestion 10 of 50 11. What is the correct configuration to enable a router to send SNMP traps to a monitoring server using version 2c and the community cisco? A B C DQuestion 11 of 50 12. You want to ensure that ICMP echo packets are not fragmented by the intermediary devices when you are checking the connectivity for a host. What ping option do you need to use? source timeout df-bit sizeQuestion 12 of 50 13. If a ping is successful, which layers of the OSI model are confirmed to be functioning as they should? Layer 4 Layer 3 Layer 2 Layer 1Question 13 of 50 14. What command returns this output: Type escape sequence to abort.Tracing the route to 10.10.23.3VRF info: (vrf in name/id, vrf out name/id)1 10.10.12.2 3 msec 2 msec 1 msec2 10.10.23.3 4 msec * 5 msec ping telnet traceroute sshQuestion 14 of 50 15. Which of the following commands provide detailed information about a router or switch hardware platform? show memory show controllers platform show controllers show platformQuestion 15 of 50 16. What feature instructs a switch to send copies of packets seen on one port (or one VLAN) to another port where a packet capturing device is connected? Switched Protocol Analyzer (SPAN) Switched Probe Analyzer (SPAN) Switched Port Analyzer (SPAN) Switched Packet Analyzer (SPAN)Question 16 of 50 17. Which set of commands produce the following output on a Catalyst switch? A B C DQuestion 17 of 50 18. What is the keyword that needs to be used under vlan configuration hierarchy to create a RSPAN vlan? remote-vlan-span remote-span-vlan rspan-vlan remote-spanQuestion 18 of 50 19. Based on the below output, which statements are correct? A cisco 3750 is connected on interface gi1/0/2 The interface on the remote device towards the local device is gi1/0/2 There is a loop cable connected in the local switch The remote switch currently can act as a routerQuestion 19 of 50 20. Which of the following statements are true based on the output below? The IOS version is 15.0(2)SE1 The IOS version is 12.2(44)SE5 The switch has 28 GigabitEthernet ports The switch was rebooted the last time by being power cycledQuestion 20 of 50 21. You see the following output. What might be a possible cause for the counter UnderSize increasing? A connected host is sourcing invalid frame sizes The checksum of the frames is wrong A connected host is sending frames smaller than 64B that have a bad checksum A connected host is sending frames larger than 1518B that have a bad checksumQuestion 21 of 50 22. What command do you need to use to see the errors counters on an interface on a Catalyst switch? show interfaces gi1/0/2 errors show interfaces gi1/0/2 show interfaces gi1/0/2 counters errors show interfaces gi1/0/2 errors countersQuestion 22 of 50 23. Based on the output below, which of the following statement is incorrect? Additional IPv4 direct and indirect routes can still be placed in TCAM The MAC address table is maxed out Multicast routes can be placed in TCAM A new MAC address can be learned without aging another MAC address that is already in the CAM tableQuestion 23 of 50 24. What are some of the processes that commonly cause excessive CPU utilization? ARP Input process Net Background process IP Background process TCP Timer processQuestion 24 of 50 25. Which statements are true about TCP Timer process? The process runs for each TCP router connection Many connections can result in high CPU utilization by the TCP Timer process The process handles an interface changing its state The process is in charge of sending Address Resolution Protocol (ARP) requestsQuestion 25 of 50 26. Considering the diagram and the output below, why isn’t the link between the two switches coming up? The links are shutdown There is a physical problem with the fiber connecting the two switches There is an encapsulation mismatch The operational mode is trunk although the administrative mode is accessQuestion 26 of 50 27. Considering the below diagram and output, what statement is true? The interfaces between the switches will be down The trunk link between the two switches will carry VLANs 1-4094 The interfaces between the switches will be up There will be no trunk link between the two switchesQuestion 27 of 50 28. You see the following output. Why do you see n-isl? SWITCH-2#show interfaces trunkPort Mode Encapsulation Status Native vlanGi1/0/2 desirable n-isl trunking 1 The switches will use anything, but not ISL encapsulation for the trunk link ISL is not eligible as encapsulation for the trunk link The switches negotiated ISL as encapsulation of the trunk link This is an output cosmetic errorQuestion 28 of 50 29. Considering the following diagram and output, which statements are true? SWITCH-2 will try to negotiate the link as access The link between the two switches will not come up as trunk SWITCH-2 will try to negotiate the link as trunk SWITCH-1 will try to negotiate the link as trunkQuestion 29 of 50 30. Considering the below output and diagram, which statements are false? The link will not come up because both sides of the link have to be configured with dynamic desirable trunking mode The link will come up as trunk link although the VTP domains are different The link will not come up as trunk link because the VTP domains are different SWITCH-1 will have an administrative trunking mode set to dynamic autoQuestion 30 of 50 31. Considering the diagram and output below, why can a host connected on SWITCH-1 in VLAN 100 not ping a host connected on SWITCH-2 in VLAN 100? The link between the two switches will stay down because of the allowed VLAN mismatch The link between the switches is in access mode because of the allowed VLAN mismatch SWITCH-2 doesn’t allow VLAN 100 on the trunk link SWITCH-1 doesn’t allow VLAN 100 on the trunk linkQuestion 31 of 50 32. The port allows VLAN 400 on the trunk link, but for some reasons, a host connected on SWITCH-1 cannot reach another host connected on SWITCH-2 in VLAN 400. Based on the configuration of the port on SWITCH-2 and the output shown, what is the problem? The port configuration on SWITCH-2 doesn’t allow VLAN 1 needed for the two hosts to communicate VLAN 400 is not configured on SWITCH-2 The link between the two switches is not a trunk The link between the two switches can’t come up using this configurationQuestion 32 of 50 33. You are adding a previously used switch into the network and once the VTP parameters are configured, you notice that the other switches from the network have the VLANs that were configured on the newly added switch. What could be the reason for this? The VTP password didn’t match between the new switch and the present switches, hence the configuration of the new switch took precedence The newly added switch had a higher revision number than the one used by the other switches, hence the VLANs were overwritten Someone accidentally deleted the VLANs from the all other switches exactly in the same time the new switch was added All the aboveQuestion 33 of 50 34. The two hosts cannot communicate in VLAN 400. SWITCH-1 should inform other switches what VLANs are available in the network through VTP messages. After a basic troubleshooting, you find out that VLAN 400 is not created on SWITCH-2. Based on the below output, what seems to be the problem? The maximum VLANs supported locally doesn’t match The device ID doesn’t match SWITCH-2 is in transparent mode, hence is not updating its VLAN database based on the VTP messages Someone deleted VLAN 400 from SWITCH-2Question 34 of 50 35. What could be the reasons why VTP might not be sharing VLAN configuration with other switches? Domain name mismatch Mode mismatch VTP prunning mode Password mismatchQuestion 35 of 50 36. Why would a switch not forward a VTP message that it receives? The VTP mode is Off The VTP mode is Transparent The VTP mode is Client The VTP mode is ServerQuestion 36 of 50 37. What rules are true with regards to MSTP configuration? The switches part of MSTP instance have to belong to the same vendor The MSTP revision number must match The MSTP instance to VLAN mappings must be the same on all the switches The MSTP region name must matchQuestion 37 of 50 38. Considering the diagram and output below, why is there no communication between PC-1 and PC-2? VLAN 400 is not created on SWITCH-1 VLAN 500 should be present on SWITCH-2 to match the current VLANs on SWITCH-1 VLAN 400 is not created on SWITCH-2 gi1/0/2 is in access mode for VLAN 1Question 38 of 50 39. The PortChannel interface between the two switches is not coming up. Based on the diagram and the output shown, what is the reason for this? Both sides are using desirable mode for PAgP Both sides are using auto mode for PAgP Both sides are using passive mode for LACP Both sides are using active mode for LACPQuestion 39 of 50 40. The PortChannel interface between the two switches is not coming up. Based on the below diagram and output, why is this happening? Both sides are using passive mode for LACP Both sides are using active mode for LACP Both sides are using desirable mode for PAgP Both sides are using auto mode for PAgPQuestion 40 of 50 41. Considering the diagram and output below, why can’t SWITCH-1 ping SWITCH-2 in VLAN 100? SWITCH-2 configured root guard feature SWITCH-1 had root guard protection and SWITCH-2 claimed itself as root, hence SWITCH-1 blocked the port in VLAN 100 SWITCH-2 doesn’t have VLAN 100 configured SWITCH-1 configured BPDU guard featureQuestion 41 of 50 42. Considering the diagram and output below, why can’t SWITCH-1 ping SWITCH-2 in VLAN 100? SWITCH-1 has root guard enabled and it has received a BPDU from SWITCH-2 which led to disabling the interface for VLAN 100 SWITCH-2 has BPDU guard enabled and it has received a BPDU from SWITCH-1 which led to disabling the interface for VLAN 100 SWITCH-1 has BPDU guard enabled and it has received a BPDU from SWITCH-2 which led to disabling the interface for VLAN 100 SWITCH-2 has root guard enabled and it has received a BPDU from SWITCH-1 which led to disabling the interface for VLAN 100Question 42 of 50 43. Considering the output and the correct diagram below, why can’t the two hosts reach each other? VLAN 200 is not allowed on the trunk between the router and the switch The port where PC_1 is connected is not in VLAN 100 The port where PC_2 is connected is not in VLAN 100 VLAN 100 is not allowed on the trunk between the router and the switchQuestion 43 of 50 44. Considering the output and the correct diagram below, why can’t the two hosts reach each other? VLAN 100 is not allowed on the interface between the router and the switch VLAN 200 is not allowed on the interface between the router and the switch The port connecting PC_1 is in the wrong VLAN The port connecting PC_2 is in the wrong VLANQuestion 44 of 50 45. Based on the diagram and output below, what has happened on e0/0 interface? The interface e0/0 will not forward any traffic regardless the MAC address that sends the traffic The switch can learn any number of MAC addresses on e0/0 as long the total number of MAC addresses doesn’t go above the platform limit The traffic will be accepted from 2 MAC addresses and the traffic from additional MAC addresses will be dropped The traffic will be accepted from 2 MAC addresses and the traffic from additional MAC addresses will be dropped and a log message will be recordedQuestion 45 of 50 46. Based on the diagram and output below, which statement is true? e0/0 will forward traffic only for the two MAC addresses on the diagram e0/0 is in err-disable state e0/0 will forward traffic for all the MAC addresses in the MAC table e0/0 will forward traffic only for MAC 0050.7966.6803Question 46 of 50 47. Look at the output below. What do you need to do to bring back up e0/0 interface? SWITCH-3#show interfaces e0/0Ethernet0/0 is down, line protocol is down (err-disabled) Clear the errdisable error from the interface Perform a shutdown and no shutdown on the interface There is nothing wrong with the interface status. It can forward traffic. Do default interface e0/0″ “Question 47 of 50 48. What command configures DHCP Snooping for VLAN 100? SWITCH-3(config)# ip dhcp snooping 100 SWITCH-3(config)# ip dhcp vlan 100 SWITCH-3(config)# dhcp snooping vlan 100 SWITCH-3(config)# ip dhcp snooping vlan 100Question 48 of 50 49. What statements are true about protected ports? A port is configured as protected if the switchport protected interface” configuration is performed under the interface stanza” When troubleshooting protected ports an issue can be that the traffic is flowing between two interfaces when it should not be When troubleshooting protected ports an issue can be that the traffic is not flowing between two interfaces when it should be A port is configured as protected if the switchport protected” configuration is performed under the interface stanza”Question 49 of 50 50. Which of the following rules related to Private VLAN are true? Community ports can communicate with other community ports in the same community Community ports cannot communicate with other community ports in a different community Isolated ports can communicate with other isolated ports Isolated ports cannot communicate with other isolated portsQuestion 50 of 50 Loading…