IP Services Flashcards

1
Q

Which network protocols does DNS use? (Choose two).
A. TCP
B. TFTP
C. FTP
D. SCP
E. UDP

A

Which network protocols does DNS use? (Choose two).
** A. TCP**
B. TFTP
C. FTP
D. SCP
E. UDP

DNS can use either the User Datagram Protocol (UDP) or Transmission Control Protocol (TCP) with a destination port of 53.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DNS servers provide what service?
A. They map individual hosts to their specific IP addresses.
B. Given an IP address, they determine the name of the host that is sought.
C. They run a spell check on host names to ensure accurate routing.
D. The convert domain names into IP addresses.

A

DNS servers provide what service?
A. They map individual hosts to their specific IP addresses.
B. Given an IP address, they determine the name of the host that is sought.
C. They run a spell check on host names to ensure accurate routing.
D. The convert domain names into IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which protocol should be used to establish a secure terminal connection to a remote network device?
A. SSH
B. ARP
C. Telnet
D. SNMPv2
E. SNMPv1
f. WEP

A

Which protocol should be used to establish a secure terminal connection to a remote network device?
A. SSH
B. ARP
C. Telnet
D. SNMPv2
E. SNMPv1
F. WEP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which statement is correct regarding the operation of DHCP?
A. A DHCP server uses a gratuitous ARP to detect DHCP clients.
B. If an address conflict is detected, the address removed from the pool for an amount of time configurable by the administrator.
C. A DHCP client uses a ping to detect address conflicts. D. A DHCP client uses a gratuitous ARP to detect DHCP server.
E. If an address conflict is detected, the address is removed from the pool and will not be reused until server is rebooted.
F. If an address conflict is detected, the address is removed from the pool and an administrator must resolve the conflict.

A

Which statement is correct regarding the operation of DHCP?
A. A DHCP server uses a gratuitous ARP to detect DHCP clients.
B. If an address conflict is detected, the address removed from the pool for an amount of time configurable by the administrator.
C. A DHCP client uses a ping to detect address conflicts. D. A DHCP client uses a gratuitous ARP to detect DHCP server.
E. If an address conflict is detected, the address is removed from the pool and will not be reused until server is rebooted.
F. If an address conflict is detected, the address is removed from the pool and an administrator must resolve the conflict.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which statement describes the process of dynamically assigning IP addresses by the DHCP server?
A. Addresses are assigned for a fixed period of time, at the end of the period, a new request for an address must be made.
B. Addresses are leased to hosts, which periodically contact the DHCP server to renew the lease.
C. Addresses are permanently assigned so that the hosts use the same address at all time.
D. Addresses are allocated after a negotiation between the server and the host to determine the length of the agreements.

A

Which statement describes the process of dynamically assigning IP addresses by the DHCP server?
A. Addresses are assigned for a fixed period of time, at the end of the period, a new request for an address must be made.
B. Addresses are leased to hosts, which periodically contact the DHCP server to renew the lease.
C. Addresses are permanently assigned so that the hosts use the same address at all time.
D. Addresses are allocated after a negotiation between the server and the host to determine the length of the agreements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When a DHCP server is configured, which two IP addresses should never be assignable to hosts? (Choose two).
A. Broadcast address on the network.
B. Manually assigned address to the clients.
C. IP address used by the interfaces.
D. Designated IP address to the DHCP server.
E. IP address leased to the LAN.
F. Network or subnetwork IP address.

A

When a DHCP server is configured, which two IP addresses should never be assignable to hosts? (Choose two).
A. Broadcast address on the network.
B. Manually assigned address to the clients.
C. IP address used by the interfaces.
D. Designated IP address to the DHCP server.
E. IP address leased to the LAN.
F. Network or subnetwork IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which two tasks does the Dynamic Host Configuration Protocol perform? (Choose two).
A. Configure IP address parameters from a DHCP server to a host.
B. Set the IP gateway to be used by the network.
C. Perform host discovery by using DHCPDISCOVER messages.
D. Assign and renew IP addresses from the default pool. E. Monitor IP performance using the DHCP server.
F. Provide an easy management of layer 3 devices.

A

Which two tasks does the Dynamic Host Configuration Protocol perform? (Choose two).
**A. Configure IP address parameters from a DHCP server to a host. **
B. Set the IP gateway to be used by the network.
C. Perform host discovery by using DHCPDISCOVER messages.
D. Assign and renew IP addresses from the default pool. E. Monitor IP performance using the DHCP server.
F. Provide an easy management of layer 3 devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the first step in the NAT configuration process?
A. Define inside and outside interfaces.
B. Define public and private IP addresses.
C. Define IP address pools.
D. Define global and local interfaces.

A

What is the first step in the NAT configuration process?
A. Define inside and outside interfaces.
B. Define public and private IP addresses.
C. Define IP address pools.
D. Define global and local interfaces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following are true statements regarding the NAT definition? (Choose two).
A. Inside local = Name of the inside source address before translation
B. Outside local = Name of the outside interface address after translation
C. Inside global = Name of the inside DMZ address host after translation
D. Outside global = Name of the outside destination host before translation

A

Which of the following are true statements regarding the NAT definition? (Choose two).
A. Inside local = Name of the inside source address before translation
B. Outside local = Name of the outside interface address after translation
C. Inside global = Name of the inside DMZ address host after translation
D. Outside global = Name of the outside destination host before translation

Cisco defines these terms as:
Inside local address—The IP address assigned to a host on the inside network. This is the address configured as a parameter of the computer OS or received via dynamic address allocation protocols such as DHCP. The address is likely not a legitimate IP address assigned by the Network Information Center (NIC) or service provider.
Inside global address—A legitimate IP address assigned by the NIC or service provider that represents one or more inside local IP addresses to the outside world.
Outside local address—The IP address of an outside host as it appears to the inside network. Not necessarily a legitimate address, it is allocated from an address space routable on the inside.
Outside global address—The IP address assigned to a host on the outside network by the host owner. The address is allocated from a globally routable address or network space.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which two statements about static NAT translations are true? (Choose two).
A. They are always present in the NAT table
B. The allow connections to be initiated from the outside C. They require no inside or outside interface marking because addresses are statically defined
D. They can be configured with access-lists, to allow two or more connections to be initiated from the outside

A

Which two statements about static NAT translations are true? (Choose two).
A. They are always present in the NAT table
B. The allow connections to be initiated from the outside C. They require no inside or outside interface marking because addresses are statically defined
D. They can be configured with access-lists, to allow two or more connections to be initiated from the outside

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In the configuration of NAT, what does the keyword overload signify?
A. If the number of available IP addresses is exceeded, excess traffic will use the specified address pool.
B. When the bandwidth is insufficient, some hosts will not be allowed to access network translation.
C. Multiple internal hosts will use one IP address to access external network resources.
D. The pool of IP addresses have been exhausted.

A

In the configuration of NAT, what does the keyword overload signify?
A. If the number of available IP addresses is exceeded, excess traffic will use the specified address pool.
B. When the bandwidth is insufficient, some hosts will not be allowed to access network translation.
C. Multiple internal hosts will use one IP address to access external network resources.
D. The pool of IP addresses have been exhausted.

By adding the keyword “overload” at the end of a NAT statement, NAT becomes PAT (Port Address Translation). This is also a kind of dynamic NAT that maps multiple private IP addresses to a single public IP address (many-to-one) by using different ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What will happen if a private IP address is assigned to a public interface connected to an ISP?
A. Addresses in a private range will be not routed on the internet backbone.
B. Only the ISP router will have the capability to access the public network.
C. The NAT process will be used to translate this address into a valid IP address.
D. A conflict of IP addresses happens, because other public routers can use the same range.

A

What will happen if a private IP address is assigned to a public interface connected to an ISP?
**A. Addresses in a private range will be not routed on the internet backbone. **
B. Only the ISP router will have the capability to access the public network.
C. The NAT process will be used to translate this address into a valid IP address.
D. A conflict of IP addresses happens, because other public routers can use the same range.

By default, routers do not forward any traffic from the private IP range as defined by RFC 1918. Addresses in the 10/8, 172.16/12, and 192.16/16 will not be routed to an interface with a public IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When is it necessary to use a public IP address on a routing interface?
A. Connect a router on a local network.
B. Connect a router to another router.
C. Allow distribution of routes between networks.
D. Translate a private IP address.
E. Connect a network to the internet.

A

When is it necessary to use a public IP address on a routing interface?
A. Connect a router on a local network.
B. Connect a router to another router.
C. Allow distribution of routes between networks.
D. Translate a private IP address.
E. Connect a network to the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are two benefits of using NAT? (Choose two).
A. NAT facilitates end-to-end communication when IPsec is enabled.
B. NAT protects network security because private networks are not advertised.
C. NAT eliminates the need to re-address all hosts that require external access.
D. NAT conserves addresses through host MAC-level multiplexing.
E. NAT accelerates the routing process because no modifications are made on the packets.
F. Dynamic NAT facilitates connections from the outside network.

A

What are two benefits of using NAT? (Choose two).
A. NAT facilitates end-to-end communication when IPsec is enabled.
B. NAT protects network security because private networks are not advertised.
C. NAT eliminates the need to re-address all hosts that require external access.
D. NAT conserves addresses through host MAC-level multiplexing.
E. NAT accelerates the routing process because no modifications are made on the packets.
F. Dynamic NAT facilitates connections from the outside network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Identify the advantages of using NAT. (Choose four).
A. Conserves legally registered addresses.
B. Translation introduces switching path delays.
C. Remedies address overlap occurrence.
D. Causes loss of end-to-end IP traceability.
E. Increases flexibility when connecting to the internet.
F. Certain applications will not function with NAT enabled. G. Eliminates address renumbering as network changes.

A

Identify the advantages of using NAT. (Choose four).
A. Conserves legally registered addresses.
B. Translation introduces switching path delays.
C. Remedies address overlap occurrence.
D. Causes loss of end-to-end IP traceability.
E. Increases flexibility when connecting to the internet.
F. Certain applications will not function with NAT enabled. G. Eliminates address renumbering as network changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Identify the disadvantages of using NAT. (Choose three). A. Conserves legally registered addresses.
B. Translation introduces switching path delays.
C. Remedies address overlap occurrence.
D. Causes loss of end-to-end IP traceability.
E. Increases flexibility when connecting to the internet.
F. Certain applications will not function with NAT enabled. G. Eliminates address renumbering as network changes.

A

Identify the disadvantages of using NAT. (Choose three). A. Conserves legally registered addresses.
B. Translation introduces switching path delays.
C. Remedies address overlap occurrence.
D. Causes loss of end-to-end IP traceability.
E. Increases flexibility when connecting to the internet.
F. Certain applications will not function with NAT enabled.
G. Eliminates address renumbering as network changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Identify the different types of NAT. (Choose three).
A. Dynamic
B. Auto-configure
C. Global
D. Static
E. Overload

A

Identify the different types of NAT. (Choose three).
A. Dynamic
B. Auto-configure
C. Global
D. Static
E. Overload

Dynamic NAT - private IP addresses are mapped to the pool of public IP addresses.
Static NAT - translates one private IP address to a public one. The public IP address is always the same.
NAT Overload – one public IP address is used for all internal devices, but a different port is assigned to each private IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following are true statements regarding the NAT definition? (Choose two).
A. Inside global = Name of the inside host after translation.
B. Inside local = Name of the inside DMZ address before translation.
C. Outside local = Name of the destination host after translation.
D. Outside global = Name of the outside DMZ address before translation.

A

Which of the following are true statements regarding the NAT definition? (Choose two).
A. Inside global = Name of the inside host after translation.
B. Inside local = Name of the inside DMZ address before translation.
C. Outside local = Name of the destination host after translation.
D. Outside global = Name of the outside DMZ address before translation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

When using NAT Overload (PAT), all inside hosts get translated into what?
A. One single IP address
B. Outside global IP address
C. Inside local IP address
D. One private IP address

A

When using NAT Overload (PAT), all inside hosts get translated into what?
A. One single IP address
B. Outside global IP address
C. Inside local IP address
D. One private IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Identify the correct static NAT configuration.
A. ip nat inside static source 10.1.1.1 170.46.2.2
B. ip nat inside source static 10.1.1.1 170.46.2.2
C. ip nat static 10.1.1.1 170.46.2.2
D. ip nat inside source 10.1.1.1 170.46.2.2 static

A

Identify the correct static NAT configuration.
A. ip nat inside static source 10.1.1.1 170.46.2.2
B. ip nat inside source static 10.1.1.1 170.46.2.2
C. ip nat static 10.1.1.1 170.46.2.2
D. ip nat inside source 10.1.1.1 170.46.2.2 static

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What command will display NAT translations on your router?
A. show ip nat
B. show ip nat /all
C. show ip nat translations
D. show ip nat transactions

A

What command will display NAT translations on your router?
A. show ip nat
B. show ip nat /all
C. show ip nat translations
D. show ip nat transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What command will display a summary of the NAT configuration and number of active translation types on your router?
A. show ip nat
B. debug ip nat translations
C. debug ip nat
D. show ip nat statistics

A

What command will display a summary of the NAT configuration and number of active translation types on your router?
A. show ip nat
B. debug ip nat translations
C. debug ip nat
D. show ip nat statistics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which command can you enter to display the hits counter for NAT traffic?
A. show ip nat statistics
B. debug ip nat
C. show ip debug nat
D. clear ip nat statistics

A

Which command can you enter to display the hits counter for NAT traffic?
A. show ip nat statistics
B. debug ip nat
C. show ip debug nat
D. clear ip nat statistics

24
Q

Which NAT function can map multiple inside addresses to a single outside address?
A. PAT
B. SFTP
C. RARP
D. ARP
E. TFTP

A

Which NAT function can map multiple inside addresses to a single outside address?
A. PAT
B. SFTP
C. RARP
D. ARP
E. TFTP

25
Q

What command will clear your NAT entries from the translation table?
A. clear ip nat
B. clear ip nat /all
C. clear ip nat translations
D. clear ip nat translations *

A

What command will clear your NAT entries from the translation table?
A. clear ip nat
B. clear ip nat /all
C. clear ip nat translations
**D. clear ip nat translations ***

26
Q

What statement can you use instead of the netmask command?
A. mask
B. prefix-length
C. subnet
D. subnetmask

A

What statement can you use instead of the netmask command?
A. mask
B. prefix-length
C. subnet
D. subnetmask

If a subnet mask is in dotted decimal version of the binary subnet mask, the prefix length is a shorthand way of expressing the subnet mask. The prefix length is the number of bits set in the subnet mask. If the subnet mask is 255.255.255.0, there are 24 bits in the binary version of the subnet mask, so the prefix length is 24 bits.

27
Q

Which of the following would be a good starting point for troubleshooting if your router is not translating?
A. Reload
B. Run debug
C. Check the interfaces for the correct configuration.
D. Change the pool name.

A

Which of the following would be a good starting point for troubleshooting if your router is not translating?
A. Reload
B. Run debug
C. Check the interfaces for the correct configuration.
D. Change the pool name.

28
Q

What does the asterisk () represent in the following output? NAT: s=172.16.2.2, d=192.168.2.1->10.1.1.1 [1]

A. The packet was destined for a local interface on the router
B. The packet was translated and fast switched to the destination
C. The packet attempted to be translated but failed
D. The packet was translated but there was no response from the remote host

A

What does the asterisk () represent in the following output? NAT: s=172.16.2.2, d=192.168.2.1->10.1.1.1 [1]

A. The packet was destined for a local interface on the router
B. The packet was translated and fast switched to the destination
C. The packet attempted to be translated but failed
D. The packet was translated but there was no response from the remote host

Fast witching allows higher throughput by switching a packet using a cache created by the initial packet sent to a particular destination. Destination addresses are stored in the high-speed cache to expedite forwarding.

29
Q

What happens when computers on a private network attempt to connect to the Internet through a Cisco router running PAT?
A. The router uses the same IP address but a different TCP source port number for each connection.
B. An IP address is assigned based on the priority of the computer requesting the connection.
C. The router selects an address from a pool of one-to-one address mappings held in the lookup table.
D. The router assigns a unique IP address from a pool of legally registered addresses for the duration of the connection.

A

What happens when computers on a private network attempt to connect to the Internet through a Cisco router running PAT?
A. The router uses the same IP address but a different TCP source port number for each connection.
B. An IP address is assigned based on the priority of the computer requesting the connection.
C. The router selects an address from a pool of one-to-one address mappings held in the lookup table.
D. The router assigns a unique IP address from a pool of legally registered addresses for the duration of the connection.

30
Q

When configuring NAT, the Internet interface is considered to be what?
A. local
B. inside
C. global
D. outside

A

When configuring NAT, the Internet interface is considered to be what?
A. local
B. inside
C. global
D. outside

31
Q

Refer to the exhibit.
What statement is true of the configuration for this network?
A. The configuration that is shown provides inadequate outside address space for translation of the number of inside addresses that are supported.
B. Because of the addressing on interface FastEthernet0/1, the Serial0/0 interface address will not support the NAT configuration as shown.
C. The number 1 referred to in the ip nat inside source command references access-list number 1.
D. External Router must be configured with static routes to networks 172.16.1.0/24 and 172.16.2.0/24.

A

Refer to the exhibit.
What statement is true of the configuration for this network?
A. The configuration that is shown provides inadequate outside address space for translation of the number of inside addresses that are supported.
B. Because of the addressing on interface FastEthernet0/1, the Serial0/0 interface address will not support the NAT configuration as shown.
C. The number 1 referred to in the ip nat inside source command references access-list number 1.
D. External Router must be configured with static routes to networks 172.16.1.0/24 and 172.16.2.0/24.

32
Q

How many addresses will be available for dynamic NAT translation when a router is configured with the following commands?
Router(config)#ip nat pool TAME 209.165.201.23 209.165.201.30 netmask 255.255.255.224 Router(config)#ip nat inside source list 9 pool TAME
A. 7
B. 8
C. 9
D. 10
E. 24
F. 32

A

How many addresses will be available for dynamic NAT translation when a router is configured with the following commands?
Router(config)#ip nat pool TAME 209.165.201.23 209.165.201.30 netmask 255.255.255.224 Router(config)#ip nat inside source list 9 pool TAME
A. 7
B. 8
C. 9
D. 10
E. 24
F. 32

33
Q

Refer to the exhibit.
A company wants to use NAT in the network shown. Which commands will apply the NAT configuration to the proper interfaces? (Choose two).
A. R1(config)# interface serial0/1
R1(config-if)# ip nat inside

B. R1(config)# interface serial0/1
R1(config-if)# ip nat outside

C. R1(config)# interface fastethernet0/0
R1(config-if)# ip nat inside

D. R1(config)# interface fastethernet0/0
R1(config-if)# ip nat outside

E. R1(config)# interface serial0/1
R1(config-if)# ip nat outside source pool 200.2.2.18 255.255.255.252

F. R1(config)# interface fastethernet0/0
R1(config-if)# ip nat inside source 10.10.0.0 255.255.255.0

A

Refer to the exhibit.
A company wants to use NAT in the network shown. Which commands will apply the NAT configuration to the proper interfaces? (Choose two).
A. R1(config)# interface serial0/1
R1(config-if)# ip nat inside

B. R1(config)# interface serial0/1
R1(config-if)# ip nat outside

**C. R1(config)# interface fastethernet0/0
R1(config-if)# ip nat inside **

D. R1(config)# interface fastethernet0/0
R1(config-if)# ip nat outside

E. R1(config)# interface serial0/1
R1(config-if)# ip nat outside source pool 200.2.2.18 255.255.255.252

F. R1(config)# interface fastethernet0/0
R1(config-if)# ip nat inside source 10.10.0.0 255.255.255.0

34
Q

What does the “Inside Global” address represent in the configuration of NAT?
A. The summarized address for all of the internal subnetted addresses.
B. The MAC address of the router used by inside hosts to connect to the Internet.
C. A globally unique, private IP address assigned to a host on the inside network.
D. A registered address that represents an inside host to an outside network.

A

What does the “Inside Global” address represent in the configuration of NAT?
A. The summarized address for all of the internal subnetted addresses.
B. The MAC address of the router used by inside hosts to connect to the Internet.
C. A globally unique, private IP address assigned to a host on the inside network.
D. A registered address that represents an inside host to an outside network.

35
Q

Which technology allows a large number of private IP addresses to be represented by a smaller number of public IP addresses?
A. NAT
B. NTP
C. RFC 1631
D. RFC 1918

A

Which technology allows a large number of private IP addresses to be represented by a smaller number of public IP addresses?
A. NAT
B. NTP
C. RFC 1631
D. RFC 1918

36
Q

What is the effect of the overload keyword in a static NAT translation configuration?
A. It enables port address translation.
B. It enables the use of a secondary pool of IP addresses when the first pool is depleted.
C. It enables the inside interface to receive traffic.
D. It enables the outside interface to forward traffic.

A

What is the effect of the overload keyword in a static NAT translation configuration?
A. It enables port address translation.
B. It enables the use of a secondary pool of IP addresses when the first pool is depleted.
C. It enables the inside interface to receive traffic.
D. It enables the outside interface to forward traffic.

37
Q

Which two types of NAT addresses are used in a Cisco NAT device? (Choose two).
A. inside local
B. inside global
C. inside private
D. outside private
E. external global
F. external local

A

Which two types of NAT addresses are used in a Cisco NAT device? (Choose two).
A. inside local
B. inside global
C. inside private
D. outside private
E. external global
F. external local

38
Q

What is the danger of the permit any entry in a NAT access list?
A. It can lead to overloaded resources on the router.
B. It can cause too many addresses to be assigned to the same interface.
C. It can disable the overload command.
D. It prevents the correct translation of IP addresses on the inside network.

A

What is the danger of the permit any entry in a NAT access list?
A. It can lead to overloaded resources on the router.
B. It can cause too many addresses to be assigned to the same interface.
C. It can disable the overload command.
D. It prevents the correct translation of IP addresses on the inside network.

39
Q

Which type of address is the public IP address of a NAT device?
A. outside global
B. outside local
C. inside global
D. inside local
E. outside public
F. inside public

A

Which type of address is the public IP address of a NAT device?
A. outside global
B. outside local
C. inside global
D. inside local
E. outside public
F. inside public

40
Q

Of the following, identify the term that is a collection of information that’s organized hierarchically and can be accessed by protocols like SNMP.
A. Management database (MDB)
B. Information management database (IMD)
C. Management Information Base (MIB)
D. Management database information (MDI)

A

Of the following, identify the term that is a collection of information that’s organized hierarchically and can be accessed by protocols like SNMP.
A. Management database (MDB)
B. Information management database (IMD)
C. Management Information Base (MIB)
D. Management database information (MDI)

41
Q

You want to send a console message to a syslog server, but you only want to send status messages of 6 and lower. Which of the following commands will you use?
A. logging trap alerts
B. logging trap errors
C. logging trap debugging
D. logging trap notifications
E. logging trap informational

A

You want to send a console message to a syslog server, but you only want to send status messages of 6 and lower. Which of the following commands will you use?
A. logging trap alerts
B. logging trap errors
C. logging trap debugging
D. logging trap notifications
E. logging trap informational

42
Q

What are three components that comprise the SNMP framework? (Choose three).
A. MIB B. agent
C. set
D. AES
E. supervisor F. manager

A

What are three components that comprise the SNMP framework? (Choose three).
A. MIB
B. agent
C. set
D. AES
E. supervisor
F. manager

43
Q

What SNMP message alerts the manager to a condition on the network?
A. response
B. get
C. trap
D. capture

A

What SNMP message alerts the manager to a condition on the network?
A. response
B. get
C. trap
D. capture

44
Q

What authentication type is used by SNMPv2?
A. HMAC-MD5
B. HMAC-SHA
C. CBC-DES
D. community strings

A

What authentication type is used by SNMPv2?
A. HMAC-MD5
B. HMAC-SHA
C. CBC-DES
D. community strings

45
Q

Which three statements about the features of SNMPv2 and SNMPv3 are true? (Choose three).
A. SNMPv3 enhanced SNMPv2 security features.
B. SNMPv3 added the Inform protocol message to SNMP. C. SNMPv2 added the Inform protocol message to SNMP. D. SNMPv3 added the GetBulk protocol messages to SNMP.
E. SNMPv2 added the GetBulk protocol message to SNMP.
F. SNMPv2 added the GetNext protocol message to SNMP.

A

Which three statements about the features of SNMPv2 and SNMPv3 are true? (Choose three).
A. SNMPv3 enhanced SNMPv2 security features.
B. SNMPv3 added the Inform protocol message to SNMP. C. SNMPv2 added the Inform protocol message to SNMP. D. SNMPv3 added the GetBulk protocol messages to SNMP.
E. SNMPv2 added the GetBulk protocol message to SNMP.
F. SNMPv2 added the GetNext protocol message to SNMP.

46
Q

Which three statements about Syslog utilization are true? (Choose three).
A. Utilizing Syslog improves network performance.
B. The Syslog server automatically notifies the network administrator of network problems.
C. A Syslog server provides the storage space necessary to store log files without using router disk space.
D. There are more Syslog messages available within Cisco IOS than there are comparable SNMP trap messages.
E. Enabling Syslog on a router automatically enables NTP for accurate time stamping.
F. A Syslog server helps in aggregation of logs and alerts.

A

Which three statements about Syslog utilization are true? (Choose three).
A. Utilizing Syslog improves network performance.
B. The Syslog server automatically notifies the network administrator of network problems.
C. A Syslog server provides the storage space necessary to store log files without using router disk space.
D. There are more Syslog messages available within Cisco IOS than there are comparable SNMP trap messages.
E. Enabling Syslog on a router automatically enables NTP for accurate time stamping.
F. A Syslog server helps in aggregation of logs and alerts.

47
Q

What is the default Syslog facility level?
A. local4
B. local5
C. local6
D. local7

A

What is the default Syslog facility level?
A. local4
B. local5
C. local6
D. local7

48
Q

What command instructs the device to timestamp Syslog debug messages in milliseconds?
A. service timestamps log datetime localtime
B. service timestamps debug datetime msec
C. service timestamps debug datetime localtime
D. service timestamps log datetime msec

A

What command instructs the device to timestamp Syslog debug messages in milliseconds?
A. service timestamps log datetime localtime
B. service timestamps debug datetime msec
C. service timestamps debug datetime localtime
D. service timestamps log datetime msec

49
Q

Refer to the exhibit.
What is the cause of the Syslog output messages?
A. The EIGRP neighbor on Fa0/1 went down due to a failed link.
B. The EIGRP neighbor connected to Fa0/1 is participating in a different EIGRP process, causing the adjacency to go down.
C. A shut command was executed on interface Fa0/1, causing the EIGRP adjacency to go down.
D. Interface Fa0/1 has become error disabled, causing the EIGRP adjacency to go down.

A

Refer to the exhibit.
What is the cause of the Syslog output messages?
A. The EIGRP neighbor on Fa0/1 went down due to a failed link.
B. The EIGRP neighbor connected to Fa0/1 is participating in a different EIGRP process, causing the adjacency to go down.
C. A shut command was executed on interface Fa0/1, causing the EIGRP adjacency to go down.
D. Interface Fa0/1 has become error disabled, causing the EIGRP adjacency to go down.

50
Q

What are the popular destinations for syslog messages to be saved? (Choose three).
A. Flash
B. The logging buffer .RAM
C. The console terminal
D. Other terminals
E. Syslog server

A

What are the popular destinations for syslog messages to be saved? (Choose three).
A. Flash
B. The logging buffer .RAM
C. The console terminal
D. Other terminals
E. Syslog server

51
Q

Which protocol can cause overload on a CPU of a managed device?
A. Netflow
B. WCCP
C. IP SLA
D. SNMP

A

Which protocol can cause overload on a CPU of a managed device?
A. Netflow
B. WCCP
C. IP SLA
D. SNMP

52
Q

What is the alert message generated by SNMP agents called? (Choose two).
A. TRAP
B. INFORM
C. GET
D. SET

A

What is the alert message generated by SNMP agents called? (Choose two).
A. TRAP
B. INFORM
C. GET
D. SET

53
Q

Which three features are added in SNMPv3 over SNMPv2? (Choose three).
A. Message Integrity
B. Compression
C. Authentication
D. Encryption
E. Error Detection

A

Which three features are added in SNMPv3 over SNMPv2? (Choose three).
A. Message Integrity
B. Compression
C. Authentication
D. Encryption
E. Error Detection

54
Q

Syslog was configured with a level 3 trap. Which types of logs would be generated? (Choose four).
A. Emergencies
B. Warnings
C. Alerts
D. Errors
E. Critical

A

Syslog was configured with a level 3 trap. Which types of logs would be generated? (Choose four).
A. Emergencies
B. Warnings
C. Alerts
D. Errors
E. Critical

The syslog levels and descriptions are as follows:
0 Emergency system is unusable
1-Alert action must be taken immediately
2-Critical Critical conditions
3-Error Error conditions
4-Warning Warning conditions
5-Notice normal but significant condition
6-Informational Informational message
7-Debug Debug-level message

55
Q

Refer to the exhibit.
What three actions will the switch take when a frame with an unknown source MAC address arrives at the interface? (Select three).
A. Send an SNMP trap.
B. Send a syslog message.
C. Increment the Security Violation counter.
D. Forward the traffic.
E. Write the MAC address to the startup-config.
F. Shut down the port.

A

Refer to the exhibit.
What three actions will the switch take when a frame with an unknown source MAC address arrives at the interface? (Select three).
A. Send an SNMP trap.
B. Send a syslog message.
C. Increment the Security Violation counter.
D. Forward the traffic.
E. Write the MAC address to the startup-config.
F. Shut down the port.