CCNA 4 Chapter 8: Monitoring the Network Flashcards

1
Q

Refer to the exhibit. Which two conclusions can be drawn from the syslog message that was generated by the router? (Choose two.)

A
  1. This message is a level 5 notification message.

2. This message indicates that service timestamps have been configured.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A network technician has issued the service timestamps log datetime command in the configuration of the branch router. Which additional command is required to include the date and time in logged events?

A

Branch1# clock set 08:00:00 05 AUG 2013

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Refer to the exhibit. From what location have the syslog messages been retrieved?

A

router RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Refer to the exhibit. What does the number 17:46:26.143 represent?

A

the time when the syslog message was issued

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are SNMP trap messages?

A

unsolicited messages that are sent by the SNMP agent and alert the NMS to a condition on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How can SNMP access be restricted to a specific SNMP manager?

A

Define an ACL and reference it by using the snmp-server community command.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A network administrator issues two commands on a router:
R1(config)# snmp-server host 10.10.50.25 version 2c campus
R1(config)# snmp-server enable traps
What can be concluded after the commands are entered?

A

If an interface comes up, a trap is sent to the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a difference between SNMP and NetFlow?

A

NetFlow collects more detailed traffic statistics on IP networks than SNMP does.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does NetFlow function on a Cisco router or multilayer switch?

A

One user connection to an application exists as two NetFlow flows.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which type of information can an administrator obtain with the show ip cache flow command?

A

the protocol that uses the largest volume of traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the most common purpose of implementing NetFlow in a networked environment?

A

to support accounting and monitoring with consumer applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which destination do Cisco routers and switches use by default when sending syslog messages for all severity levels?

A

console

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which SNMP feature provides a solution to the main disadvantage of SNMP polling?

A

SNMP trap messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which statement describes SNMP operation?

A

A set request is used by the NMS to change configuration variables in the agent device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A network administrator has issued the logging trap 4 global configuration mode command. What is the result of this command?

A

The syslog client will send to the syslog server any event message that has a severity level of 4 and lower.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

When logging is used, which severity level indicates that a device is unusable?

A

Emergency-Level 0

17
Q

Refer to the exhibit. While planning an upgrade, a network administrator uses the Cisco NetFlow utility to analyze data flow in the current network. Which protocol used the greatest amount of network time?

A

UDP-other

18
Q

Which two statements describe items to be considered in configuring NetFlow? (Choose two.)

A
  1. Netflow can only be used in a unidirectional flow.

2. Netflow consumes additional memory.

19
Q

When SNMPvl or SNMPv2 is being used, which feature provides secure access to MIB objects?

A

community strings

20
Q

Refer to the exhibit. What can be concluded from the produced output?

A

An ACL was configured to restrict SNMP access to an SNMP manager.

21
Q

What are the most common syslog messages?

A

linkup and link down messages

22
Q

A network administrator has issued the snmp-server user adminl admin v3 encrypted auth md5 abc789 priv des 256 key99 command. What are two features of this command? (Choose two.)

A
  1. It uses the MD5 authentication of the SNMP messages.

2. It adds a new user to the SNMP group.

23
Q

Fill in the blank.
The “___” protocol uses UDP port 514 and is the most common method to access system messages provided by networking devices.

A

syslog

24
Q

When SNMPv1 or SNMPv2 is being used, which feature provides secure access to MIB objects?

A

community strings

25
Q

A network administrator has issued the snmp-server user admin1 admin v3 encrypted auth md5 abc789 priv des 256 key99 command. What are two features of this command? (Choose two.)

A
  1. It uses the MD5 authentication of the SNMP messages.

2. It adds a new user to the SNMP group