Chapter 13 Flashcards
Which of the following statements are true regarding NTP when implemented on Cisco devices? (Select two.)
- NTP packets are sent every 100 milliseconds to provide extremely accurate time synchronization.
- When NTP is enabled, NTP packets are received on all interfaces.
- NTP runs over UDP port 123.
- The NTP protocol uses TCP packets to send time data .
- By default, NTP services are enabled on all interfaces.
- When NTP is enabled, NTP packets are received on all interfaces.
- NTP runs over UDP port 123.
You check the time on a router and find that it is off by several minutes. To fix this issue, you configure NTP on the router to get time from a Stratum 2 time provider on the internet.
The time difference is large, and it is taking some time for NTP to synchronize the time on the local router. To speed synchronization, you use NTP commands to immediately synchronize the time on the router with the time on the time provider.
Which NTP term best describes this process?
- Skew
- Slew
- Jitter
- Slam
Slam
You check the time on a router and find that it is off by about 10 minutes. To fix this issue, you configure NTP on the router to get time from a Stratum 2 time provider on the internet.
It is taking some time for NTP to synchronize the time on the local router. After about 15 minutes, the time finally synchronizes.
Which NTP term best describes this process?
- Slew
- Slam
- Skew
- Jitter
Slew
You check the time on a router and find that it is behind by several minutes. To fix this issue, you decide to configure NTP on the router to get time from a Stratum 2 time provider on the internet with a hostname of 0.pool.ntp.org.
Which command should you use?
- ntp status
- ntp server 0.pool.ntp.org
- feature ntp 0.pool.ntp.org
- ntp master 0.pool.ntp.org
ntp server 0.pool.ntp.org
You check the time on a router and find that it is out of sync with the time on the other routers and switches in your network. To fix this issue, you decide to configure NTP on the router to get time from an internal authoritative (master) NTP server with an IP address of 172.17.8.254.
Which command should you use?
- ntp status
- ntp server 172.17.8.254
- ntp master 172.17.8.254
- feature ntp 172.17.8.254
ntp server 172.17.8.254
Currently, all of the routers in your network are configured to use NTP to synchronize time with a public Stratum 2 time provider on the internet. To reduce redundant network traffic, you decide to configure one internal router as an authoritative NTP time provider with a stratum value of 5 and then configure all other routers to synchronize time with it. This router has an IP address of 172.17.8.254 assigned.
Which commands should you use? (Select two. Each response is a part of the complete solution.)
- ntp master 5 172.17.8.254 on all routers except the time provider.
- ntp master 5 on the NTP time provider router.
- ntp server 172.17.8.254 on the NTP time provider router.
- ntp server 172.17.8.254 on all routers except the time provider.
- ntp master on the NTP time provider router.
ntp master 5 on the NTP time
ntp server 172.17.8.254 on all routers except the time provider. provider router.
You need to verify that time is synchronized on a router.
Which commands could you use to do this? (Select two. Each response is a complete solution.)
- clock summer-time
- ntp server <address></address>
- show ntp associations
- show ntp status
- feature ntp
- show ntp associations
- show ntp status
You have noticed that every two weeks or so, a client’s clock is off by two minutes, even after you have adjusted it. What is this issue known as?
- Stratum level
- Slew
- Time drift
- Jitter
Time drift
You need to set the time zone for Pacific Daylight Time. Which two of the following commands will allow you to do this?
- Clock timezone -8
- Clock timezone -6
- Clock timezone PST
- Clock timezone UTC
Clock timezone PST
Clock timezone -8
How many packets per minutes are required to keep two machines synchronized to an accuracy of a millisecond of each other?
- 1
- 5
- 10
- 2
1
What is true regarding the following partial output in the running configuration file? (Select two.)
Router#show run
!interface fa 0/0
ip address 10.2.30.2 255.255.255.224
!
!
logging on
logging host 10.2.30.253
logging trap 4
logging source-interface fa 0/0
!
- A syslog server will receive debug messages sent from 10.2.30.2.
- A syslog server will receive warning messages sent from 10.2.30.2.
- A syslog server will receive alert messages sent from 10.2.30.253.
- A syslog server will receive notification messages sent from 10.2.30.2.
- A syslog server will receive error messages sent from 10.2.30.2.
A syslog server will receive warning messages sent from 10.2.30.2.
A syslog server will receive error messages sent from 10.2.30.2.
Consider the following log message generated by a router:
*Aug 8 11:18:12.081: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to down
What facility generated this message?
- -5-
- UPDOWN
- %LINEPROTO
- FastEthernet0/0
%LINEPROTO
Consider the following log message generated by a router:
*Aug 8 11:18:12.081: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to down
What is the severity level of this message?
%LINEPROTO
-5-
UPDOWN
FastEthernet0/0
-5-
Your router generates a log message with a severity level of 1.
What does this indicate?
- Immediate action is needed.
- The message is only informational in nature.
- A critical condition exists.
- The system is unusable.
Immediate action is needed.
Your router generates a log message with a severity level of 6.
What does this indicate?
Immediate action is needed.
A critical condition exists.
An informational message only.
The system is unusable.
An informational message only.
You want to redirect log messages from a router to a Syslog server. The IP address of the Syslog server is 172.17.8.5. You want only serious log messages with a severity level of emergency, alert, critical, error, or warning to be redirected. Notifications and informational messages as well as debug messages should not be redirected.
You just entered the logging on command. Which other commands must be used to accomplish this task? (Select two. Both responses are part of the complete solution.)
- logging trap 4
- logging server 172.17.8.5
- logging severity 4
- logging severity warning
- show logging
- logging host 172.17.8.5
- *logging trap 4**
- *logging host 172.17.8.5**
You want to redirect log messages from a router to a Syslog server. The IP address of the Syslog server is 192.168.1.2. You want only serious log messages with a severity level of Emergency, Alert, or Critical to be redirected. Notification, Error, Warning, Informational, and Debug messages should not be redirected.
Which commands are used to accomplish this? (Select three. All responses are part of the complete solution.)
- logging server 192.168.1.2
- logging severity 2
- logging source-interface < interface>
- logging trap 2
- logging host 192.168.1.2
- logging on
- logging trap 2
- logging host 192.168.1.2
- logging on
You are configuring a router to redirect and consolidate log messages to a Syslog server. The router has multiple interfaces. However, you want all log messages being sent to the Syslog server to be seen as coming from the same IP address on the router, regardless of which interface the message actually exits the router from.
Which command is used to accomplish this?
- show logging
- logging trap
- logging host <address></address>
- logging source-interface
logging source-interface
Consider the following log message generated by a router:
*00019: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to down
What is being used to identify when the message is generated?
- Facility
- Sequence number
- Timestamp
- Mnemonic
Sequence number
What happens to the history table and log files when the device loses power?
- Everything is retained in the system memory.
- The history table remains, but log files are lost.
- The history table is cleared, but the logs remain.
- The history table and log files are all lost.
The history table and log files are all lost.
Which of the following are true regarding SNMP? (Select two.)
- SNMPv2 implements message integrity verification to ensure that an SNMP packet has not been modified during transit.
- SNMPv2 implements encryption to obscure data during transmission.
- SNMPv2 requires authentication for the SNMP manager and agents to communicate with each other.
- SNMPv3 employs the encryption of packets to prevent unauthorized sources from snooping.
- SNMPv2c can be compromised because the community string for authentication is sent in clear text.
- SNMPv3 employs the encryption of packets to prevent unauthorized sources from snooping.
- SNMPv2c can be compromised because the community string for authentication is sent in clear text.
Which component is responsible for collecting and consolidating data from network devices that are being monitored with SNMP?
- SNMP Manager
- SNMP Management Information File (MIF)
- SNMP Management Information Base (MIB)
- SNMP Agent
SNMP Manager
Which SNMP component monitors individual network devices?
- SNMP Agent
- SNMP MIB
- SNMP Trap
- SNMP Manager
SNMP Agent
Which method is used by the SNMP manager when it contacts an SNMP agent and requests information about a monitored network device?
- Poll
- Broadcast
- Interrupt
- Trap
Poll
Polling is used when an SNMP manager contacts an SNMP agent and requests information about a monitored network device.
Which method is used when an SNMP agent detects that the system it monitors has exceeded a configured threshold and sends an event to the SNMP manager?
- Interrupt
- Poll
- Broadcast
- Trap
Trap
A configured threshold has been exceeded by a network host that is being monitored by an SNMP agent. The agent sends a trap to its SNMP manager with a notification that the threshold has been exceeded.
Which IP port does the agent use to send the trap?
- 123
- 80
- 162
- 161
- 389
162
You implemented SNMPv2 as a part of your overall network management plan. You configured an SNMP manager to gather traps from SNMP agents that run on monitored network devices. To secure communications between the manager and the agents, you configured a trap community name of abc123.
After running the system for some time, you notice that traps containing questionable events are being sent to the SNMP manager. Upon investigation, you discover that a malicious insider has been spoofing these events, attempting to cover her tracks as she tried to compromise several network hosts.
What could have been done to prevent this from happening?
- SNMPv3 should have been implemented instead of SNMPv2.
- SNMPv2 message integrity verification should have been enabled.
- Traps should have been disabled in favor of polling.
- A stronger community name should have been used.
Mark this question for review
SNMPv3 should have been implemented instead of SNMPv2.
SNMPv3 should have been implemented instead of SNMPv2. SNMPv2 can be compromised easily because the community name is sent in clear text during communications. SNMPv3 implements the following features to make it more secure than earlier versions:
- Authentication
- Encryption
- Message integrity verification
Because the community name is sent clear text, using a stronger community name would have no effect on the situation in this scenario.
Which SNMPv3 security level requires authentication with a username, but does not implement encryption?
- authPriv
- authNoPriv
- Community Name
- noAuthnoPriv
noAuthnoPriv
Which SNMPv3 security level requires MD5 or SHA authentication and implements DES encryption?
- authNoPriv
- authPriv
- Community Name
- noAuthnoPriv
authPriv
The following image shows a standard Object Identifier Tree structure. Based on this structure, what would the OID be for a Microsoft device?
- 1.9
- 3.6.1.4.1.311
311
1.3.6.1.311
1.3.6.1.4.1.311
Which fields in an IP packet header are examined by NetFlow to determine whether or not a given packet is part of a flow? (Select two.)
- Time To live
- Source address
- Type of service
- Fragment offset
- Header checksum
Source address
Type of service
You are configuring NetFlow on a router. You want to monitor both incoming and outgoing traffic on an interface.
You’ve used the interface command to allow you to configure the interface. What commands should you use next? (Select two. Both responses are part of the complete solution.)
- ip flow ingress
- ip flow-export source < interface>
- ip flow-import source
- ip flow egress
- ip flow-export destination <address></address>
ip flow ingress
ip flow egress
Currently, your NetFlow router is configured to redirect records to a NetFlow Collector with an IP address of 172.17.8.25 on UDP port 2055.
By default, NetFlow uses the IP address of the interface that packets are sent from as the source IP address for records. However, for security reasons, you want to obscure the source address of the NetFlow router by specifying that all NetFlow records originate from the loopback interface of the router.
Which command should you use?
- ip flow egress loopback 0
- ip flow-export source loopback 0
- ip flow-export version loopback 0
- ip flow-export destination loopback 0
ip flow-export source loopback 0
Consider the following output from the show ip cache flow command.
Which type of service was accessed on the destination host?
- DNS server
- Standard HTTP web server
- Email server
- Secure HTTP web server
Secure HTTP web server
Consider the output from the show ip cache flow command shown.
Which statements are true regarding the flow represented in the statistics? (Select two.)
- 128 incoming packets were monitored.
- 255 packets were monitored.
- 128 outgoing packets were monitored.
- Most of the packets monitored were 1536 bytes in size.
- Most of the packets monitored were 1024 bytes in size.
255 packets were monitored.
Most of the packets monitored were 1536 bytes in size.
Which of the following cannot be analyzed using the data collected by NetFlow?
- Departmental billings for network usage
- CPU usage
- Potential security issues
- Network baselines
CPU usage
Which device does NetFlow operate on?
- Network adapter
- Host device
- Operating system
- Network device
Network device
The storage area where NetFlow data is stored on a device is known as what?
- Export or transport mechanism
- NetFlow management collector
- NetFlow Ccche
- Packet header
NetFlow Ccche
Your NetFlow records are currently formatted for version 5. You need to change to version 9. Which of the following commands would you use?
- ip flow-export destination 5
- ip flow-export destination 9
- ip flow-export version 9
- ip flow-export version 5
ip flow-export version 9
You have set up a NetFlow collector using IP address 172.17.8.25 on UDP port 2055. Which of the following commands will redirect records to the new collector?
- ip flow-export destination 172.17.8.25 2055
- ip flow-export source 172.17.8.25 2055
- ip flow ingress 172.17.8.25 2055
- ip flow-export interface 172.17.8.25 2055
ip flow-export destination 172.17.8.25 2055