Module 6: Device Monitoring and Management Flashcards

1
Q

What is Cisco IOS Resilient Configuration Feature?

A

It allows for faster recovery of the OS if the router is wiped or formats the flash memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does the command: secure boot-image do?

A

Takes a snapshot of the OS image file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does the command: secure boot-config do?

A

Takes a snapshot of the running config file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does the command: show secure bootset do?

A

verifies the archives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Cisco Secure Copy

A

Allows for remote copying of the IOS files and config files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does the the no service password-recovery command do?

A

disables the ability to recover the password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a dynamic routing protocol?

A

Network discovery and maintaining routing tables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are some benefits of dynamic routing?

A

the ability to select a best path, and the ability to automatically discover a new best path when there is a change in the topology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does ip ospf message-digest-key key md5 password interface configuration command do?

A

Enables OSPF on the router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the 2 types of management access

A

In-bound and out-of-bound

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is in-band management access

A

Information flows across an enterprise production network, the Internet, or both, using regular data channels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is out-of-band management access

A

Information flows on a dedicated management network on which no production traffic resides. generally used in large enterprises

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is syslog?

A

A method to access system messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the 3 primary functions of syslog?

A

The ability to gather logging information for monitoring and troubleshooting

The ability to select the type of logging information that is captured

The ability to specify the destinations of captured syslog messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How many levels of alerts does syslog have?

A

7 alert levels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are syslog servers?

A

Also known as log hosts, these systems accept and process log messages from syslog clients.

17
Q

What are syslog clients?

A

Routers or other types of equipment that generate and forward log messages to syslog servers.

18
Q

What is NTP

A

Network Time Protocol

19
Q

What is a stratum?

A

NTP networks use a hierarchical system of time sources. Each level in this hierarchical system is called a stratum.

20
Q

What does the show clock detail command do?

A

displays the current time source

21
Q

What does ntp server ip-address do?

A

configures the NTP server the device should connect to

22
Q

What does the show ntp associations and show ntp status?

A

verifies the device is synchronised

23
Q

What is Simple Network Management Protocol (SNMP) ?

A

Is a way for different devices on a network to share information with one another.

24
Q

What does the get request do?

A

Used by the NMS to query the device for data.

25
Q

What does the set request do?

A

Used by the NMS to change configuration variables in the agent device.