4-8: Monitoring the Network Flashcards Preview

CISA-2120 Switching > 4-8: Monitoring the Network > Flashcards

Flashcards in 4-8: Monitoring the Network Deck (25):
1

The ______ protocol uses UDP port 514 and is the most common method to access system messages provided by networking devices.

syslog

2

Which destination do Cisco routers and switches use by default when sending syslog messages for all severity levels?

console

3

Refer to the exhibit. Which two conclusions can be drawn from the syslog message that was generated by the router?

Q image thumb

  1. This message is a level 5 notification message.
  2. This message indicates that service timestamps have been configured.

3

What are SNMP trap messages?

unsolicited messages that are sent by the SNMP agent and alert the NMS to a condition on the network

5

Refer to the exhibit. From what location have the syslog messages been retrieved?

Q image thumb

router RAM

6

Which statement describes SNMP operation?

A set request is used by the NMS to change configuration variables in the agent device.

6

A network administrator has issued the snmp-server user adminl admin v3 encrypted auth md5 abc789 priv des 256 key99 command. What are two features of this command? (Choose two.)

  1. It uses the MD5 authentication of the SNMP messages.
  2. It adds a new user to the SNMP group.

7

How can SNMP access be restricted to a specific SNMP manager?

Define an ACL and reference it by using the snmp-server community command.

7

What is the most common purpose of implementing NetFlow in a networked environment?

to support accounting and monitoring with consumer applications

8

When logging is used, which severity level indicates that a device is unusable?

Emergency-Level 0 

9

What are the most common syslog messages?

linkup and link down messages

9

A network administrator has issued the snmp-server user admin1 admin v3 encrypted auth md5 abc789 priv des 256 key99 command. What are two features of this command? (Choose two.)

  1. It uses the MD5 authentication of the SNMP messages. 
  2. It adds a new user to the SNMP group. 

10

What is a difference between SNMP and NetFlow?

NetFlow collects more detailed traffic statistics on IP networks than SNMP does.

11

Refer to the exhibit. What does the number 17:46:26.143 represent?

the time when the syslog message was issued

13

A network administrator issues two commands on a router:
R1(config)# snmp-server host 10.10.50.25 version 2c campus
R1(config)# snmp-server enable traps
What can be concluded after the commands are entered?

If an interface comes up, a trap is sent to the server.

16

A network administrator has issued the logging trap 4 global configuration mode command. What is the result of this command?

The syslog client will send to the syslog server any event message that has a severity level of 4 and lower.

17

How does NetFlow function on a Cisco router or multilayer switch?

One user connection to an application exists as two NetFlow flows.

18

When SNMPvl or SNMPv2 is being used, which feature provides secure access to MIB objects?

community strings

19

While planning an upgrade, a network administrator uses the Cisco NetFlow utility to analyze data flow in the current network. Which protocol used the greatest amount of network time?

Q image thumb

UDP-other

20

Which SNMP feature provides a solution to the main disadvantage of SNMP polling?

SNMP trap messages

21

Which two statements describe items to be considered in configuring NetFlow? (Choose two.)

  1. Netflow can only be used in a unidirectional flow.
  2. Netflow consumes additional memory.

22

Which type of information can an administrator obtain with the show ip cache flow command?

the protocol that uses the largest volume of traffic

23

What can be concluded from the produced output?

Q image thumb

An ACL was configured to restrict SNMP access to an SNMP manager.

24

A network technician has issued the service timestamps log datetime command in the configuration of the branch router. Which additional command is required to include the date and time in logged events?

Branch1# clock set 08:00:00 05 AUG 2013

25

When SNMPv1 or SNMPv2 is being used, which feature provides secure access to MIB objects?

community strings