Chapter 7 - Infrastracture Management Flashcards
1
Q
- Which version of Simple Network Management Protocol (SNMP) supports the Inform SNMP message?
A. SNMP version 1 B. SNMP version v2 C. SNMP version 2c
D. SNMP version 3
A
- C. The introduction of SNMP version 2c added the Inform and Get-bulk messages for SNMP.
2
Q
- Which protocol and port number does SNMP use for polling from the NMS?
A. UDP/161 B. TCP/162 C. UDP/162
D. UDP/514
A
- A. SNMP uses UDP port 161 for communication from an SNMP network management station to a network device for information requests.
3
Q
- Which version of SNMP offers authentication and encryption?
A. SNMP version 1 B. SNMP version 2e C. SNMP version 2c
D. SNMP version 3
A
- D. SNMP version 3 introduced message integrity, authentication, and encryption to the SNMP suite.
4
Q
- What is the database of variables that SNMP uses to allow for collection of data called?
A. Object identifiers
B. Management information base C. SNMPagent
D. SNMPcommunity
A
- B. The management information base, or MIB, is a database of variables in which SNMP allows retrieval of information. The attributes in the MIB are the description, variable type, and read-write status.
5
Q
- What is the component that an SNMP agent sends information to?
A. Syslog
B. Network management station C. Object identifier
D. Management Information Base
A
- B. The network management station (NMS) is a server to which SNMP is polled back or in which SNMP information is trapped. The NMS can escalate problems via email, text message, or even visual indicators. Examples of NMS systems are Tivoli Netcool and OpenNMS.
6
Q
- What type of SNMP message is sent to a network management station when an interface goes down?
A. Get-request message B. Get-response message C. Set-request message
D. Trapmessage
A
- D. Trap messages are sent from the network device to the SNMP network management station when an event has triggered over a set threshold on the device. An example of an event to be trapped is an interface going down or a restriction by port security.
7
Q
- Which of the following is a hierarchical set of variables that make up the management information base?
A. Object IDs
B. The SNMP community C. The SNMP agent
D. SNMPmessages
A
- A. Object IDs are the variables that make up the management information base. Each object has a unique ID in a hierarchical format in the form of a tree. As an example, 1.3.6.1.4.9.2.1.58.0 is the object that holds the router CPU utilization variables
8
Q
- What is the difference between trap messages and inform messages for SNMP?
A. Trap messages are always encrypted.
B. Inform messages do not use acknowledgment. C. Trap messages always use acknowledgment.
D. Inform messages always use acknowledgment.
A
- D. Inform messages differ from trap messages with respect to acknowledgment. Trap messages employ a best effort delivery utilizing UDP. Inform messages employ acknowledgment; while they use the User Datagram Protocol (UDP), they rely on the Application layer for acknowledgment.
9
Q
- Which security method does SNMP version 2c employ?
A. Encryption
B. Userauthentication C. Community strings
D. Message integrity
A
- C. SNMP version 2c is identical to SNMP version 1 with respect to security. Both transmit information in clear text and use the security of community strings to authenticate users for access to information.
10
Q
- Which command will configure the SNMP agent with a read-only community of “snmpreadonly”?
A. Switch(config)#snmp-agent community snmpreadonly ro
B. Switch(config)#snmp-server snmpreadonly ro
C. Switch(config)#ip snmp-server community snmpreadonly ro
D. Switch(config)#snmp-server community snmpreadonly read-only
A
- D. The command snmp-server community snmpreadonly ro will configure the SNMP agent with a community of “snmpreadonly” and set it to read only.
11
Q
- Which of the following can be used in conjunction with an SNMP agent
configuration for added security? A. Encryptedcommunities
B. Access control lists
C. SNMP callback security
D. SHA-256
A
- B. Standard access control lists can be used in conjunction with the SNMP agent configuration. First a standard ACL is created containing the NMS IP. Then, when the snmp-server command is used, it becomes the last argument. For example, a standard ACL of 2 would be added as follows: snmp-server community snmpreadonly read-only
12
Q
- Which command will allow you to configure contact information for SNMP for Sybex Publishing?
A. Switch(config)#snmp-agent location main-idf4-ru23
B. Switch(config)#snmp-server contact Sybex Publishing
C. Switch(config)#snmp-server contact-info Sybex Publishing
D. Switch(config)#snmp contact Sybex Publishing
A
- B. The command snmp-server contact Sybex Publishing will configure the contact information for the device. This information is polled into the network management station along with the snmp-server location. It is used in case of an outage so that the responsible person can be notified.
13
Q
- Which command(s) will configure SNMPv2c to trap messages to a network
management station in the event of component failure?
A. Switch(config)#snmp-server 192.168.1.5 version 2c C0mmun1ty
Switch(config)#snmp-server enable traps
B. Switch(config)#snmp-server host 192.168.1.5 version 2c Switch(config)#snmp-server enable traps
C. Switch(config)#snmp-server host 192.168.1.5 version 2c C0mmun1ty Switch(config)#snmp-server enable traps
D. Switch(config)#snmp contact trap 192.168.1.5 version 2c
A
- C. The command snmp-server host 192.168.1.5 version 2c C0mmun1ty will configure the SNMP agent to send traps to the host 192.168.1.5. The version 2c C0mmun1ty sets the SNMP version to 2c and the community to “C0mmun1ty”.
14
Q
- Which command will allow you to verify the configured ACL applied to the SNMP
agent?
A. Switch#show snmp
B. Switch#show snmp community C. Switch#show snmp acl
D. Switch#show ip interface
A
- B. The command show snmp community will display all of the configured SNMP community strings along with the applied access control list.
15
Q
- Which protocol and port number does SNMP use for trap and inform messages to
the NMS?
A. UDP/161 B. TCP/162 C. UDP/162
D. UDP/514
A
- C. SNMP uses UDP port 162 for communication from an SNMP agent to the network management station for trap and inform messages.
16
Q
16. Which command will allow you to verify the network management station that is configured to receive trap notifications? A. Switch#show snmp B. Switch#show snmp community C. Switch#show snmp host D. Switch#show snmp notifications
A
- C. The command show snmp host will display the host that is configured to receive notifications of trap or inform messages from the router or switch.
17
Q
- When you configure SNMPv3 for a restricted OID, what is the first step? A. Configuring a group
B. Configuring a view
C. Configuring a user
D. Configuring a community
A
- B. When you begin to configure SNMPv3 for a restricted OID, the first step is configuring a view. The view allows or restricts what the user will have access to.
18
Q
- When you configure an SNMPv3 group, which parameter will configure authentication and encryption of data?
A. auth B. noauth C. priv
D. enc
A
- C. When you’re configuring the SNMPv3 group, the priv parameter will configure privacy, which defines authentication and encryption. An example of the command is snmp-server group1 v3 priv read view1 access read.
19
Q
- Which command will configure an SNMP view named INT-VIEW, which will
include the ifIndex OID?
A. Switch(config)#snmp-server view INT-VIEW ifIndex include
B. Switch(config)#snmp-server v3 view INT-VIEW ifIndex include C. Switch(config)#snmp-server view INT-VIEW ifIndex
D. Switch(config)#snmp-server INT-VIEW ifIndex
A
- A. The command snmp-server view INT-VIEW ifIndex include will configure an SNMPv3 view named INT-VIEW. The two parameters ifIndex include will include the ifIndex OID. This can also be expressed as the numerical OID four, but if it is expressed in word form, it is case sensitive.
20
Q
- Which command will allow you to verify a user’s authentication and encryption
settings for SNMPv3?
A. Switch#show user auth B. Switch#show user priv C. Switch#show snmp user
D. Switch#show snmp user auth
A
- C. The command show snmp user will display all SNMPv3 users. In the output you will find the group name, the authentication protocol, and the encryption protocol.
21
Q
21. Which command will allow you to verify the view associated with a group? A. Switch#show group view B. Switch#show snmp group C. Switch#show snmp group view D. Switch#show snmp group-view
A
- B. The command show snmp group will display all SNMPv3 groups. In the output, you will find the group name and the defined read view, write view, and notify view.
22
Q
- Which protocol and port number does syslog use?
A. UDP/161 B. TCP/162 C. UDP/162
D. UDP/514
A
- D. The router or switch sends syslog messages to the syslog server on port 514 with UDP.
23
Q
- Which command will configure all event logs to be sent to a syslog server? A. Router(config)#logging server 192.168.1.6
B. Router(config)#logging 192.168.1.6
C. Router(config)#logging host 192.168.1.6
D. Router(config)#syslog server 192.168.1.6
A
- C. The command logging host 192.168.1.6 will configure all logs to be sent to the syslog server 192.168.1.6
24
Q
- Which command will allow you to verify the syslog server set for logging and the
logging level set?
A. Router#show logging
B. Router#show syslog
C. Router#show log-server D. Router#show ip logging
A
- A. The command show logging will display the configured syslog server and the current severity level, for logs to be sent to the syslog server.
25
Q
25. Which command will configure the severity level of syslog events that will be sent to the syslog server for debugging? A. Router(config)#syslog debugging B. Router(config)#logging debugging C. Router(config)#logging trap debugging D. Router(config)#log-level debugging
A
- C. The command logging trap debugging will configure syslog events to be sent to the syslog server for the severity levels of debugging(7) through emergency(0).
26
Q
- What is a service-level agreement (SLA) for network connectivity?
A. It is an agreement of bandwidth between the ISP and the customer.
B. It is a quality of service agreement between the ISP and the customer. C. It is an agreement of uptime between the ISP and the customer.
D. All of the above
A
- D. A service-level agreement (SLA) is a contracted agreement between the Internet service provider (ISP) and the customer. This agreement defines the level of service. SLAs are based on uptime, quality of service, bandwidth, and any other stipulations the customer might deem necessary. Uptime is usually the most important when shopping for a provider.
27
Q
27. Which feature in Cisco routers can a network administrator use to check the provider’s SLA? A. IPSLA B. Syslog C. ACLsandpolicy-basedrouting D. SNMP
A
- A. The IP service-level agreement (IP SLA) feature in a Cisco router provides the network administrator with statistics on the performance, uptime, and monitoring of the provider’s network connections.
28
Q
- On which device(s) can you configure the Cisco IP SLA feature to allow for statistics’ collection?
A. Routers and switches B. Switches only
C. Routers only
D. Router, switches, and all other Cisco devices
A
- C. Only Cisco routers contain the IP SLA feature; therefore, it can only be configured on Cisco routers for statistic collection. Switches with the LAN Base feature set can be used as responders, but they will lack the ability for the statistic collection.
29
Q
- Which type of IP SLA check does not require an SLA responder?
A. UDPjitterprobe B. VoIPjitterprobe C. ICMP echo probe
D. MPLSprobe
A
- C. The IP SLA responder in not required for ICMP echo testing. However, having an IP SLA responder allows for collection of more statistics.
30
Q
- What is the term used for the IP SLA router that sends packets and collects and compiles statistics on the packets?
A. IPSLAresponder B. IPSLAsender
C. IPSLAcollector
D. IPSLAsource
A
- D. The term used for the IP SLA router that sends packets and collects and compiles statistics on the packet is IP SLA source. The IP SLA source sends these packets to the IP SLA responder.
31
Q
- Which command(s) will configure an IP SLA for ICMP echo probe?
A. Router(config)#ip sla icmp-echo 192.168.1.2
B. Router(config)#ip sla 1
Router(config-ip-sla)#icmp-echo 192.168.1.2
C. Router(config)#ip sla 1 Router(config-ip-sla)#icmp 192.168.1.2
D. Router(config)#ip sla 1 icmp-echo 192.168.1.2
A
- B. When you’re configuring an IP SLA for ICMP echo, the first statement, ip sla 1, will configure the IP SLA operation. This command will present an IP SLA sub- configuration prompt, where you will enter icmp-echo 192.168.1.2. This command configures the ICMP echo probe to a destination of 192.168.1.2
32
Q
- What is the default timer (frequency) for an IP SLA ICMP echo probe?
A. 60seconds B. 120seconds C. 60minutes
D. 5 minutes
A
- A. The default timer for an IP SLA ICMP echo probe is 60 seconds. This can be overridden with the frequency {time in seconds} command.
33
Q
- Which command will configure an IP SLA schedule for a probe?
A. Router(config-ip-sla)#ip sla schedule life forever start-time now B. Router(config)#ip sla 1 schedule life forever start-time now
C. Router(config)#ip sla 1 schedule forever start-time now
D. Router(config)#ip sla 1 schedule life start-now
A
- B. The command ip sla 1 schedule life forever start-time now will configure the IP SLA operation of 1 to run forever and start immediately. Using this command, you could create a schedule to start the probe during business hours and run it for a finite period of time. This command must be configured in global config mode.
34
Q
- Which command will allow you to view the statistics of an IP SLA ICMP echo
probe for all configured buckets? A. Router#show ip sla
B. Router#show ip sla statistics 1 C. Router#show ip sla history 1
D. Router#show sla summary
A
- C. The command show ip sla history 1 will display the historical statistics collected from the ICMP echo probe for IP SLA operation 1. The command will allow you to see all of the buckets that were collected. The command ip sla statistics 1 will only show the last collected bucket’s statistical summary.
35
Q
- You have running on your router an IP SLA ICMP echo probe that checks the ISP connection. When you view the historical statistics, you notice that several of the tests in the probe have a result of 4 in the Sense column. What happened during those tests?
A. The test for the probe ran successfully.
B. The test for the probe did not receive a response. C. The test for the probe exceeded a set threshold.
D. The test for the probe was out of sequence.
A
- B. The Sense column of the statistics is the result code for the test. There are 10 different response codes, but only a few should be remembered. A result code of 1 means the test was OK, a result of 3 means the test was over the threshold, and a result code of 4 means the operation timed out and a response was not received.
36
Q
- Which command will allow you to verify the size of storage for flash as well as how much free space is available?
A. Switch#show storage
B. Switch#show file storage C. Switch#show file systems
D. Switch#show file free
A
- C. The command show file systems will display all of the file storage types connected to the switch or router. In this output, the size in bits and the free space in bits will be displayed.
37
Q
- Where is the startup-config stored?
A. Flash
B. NVRAM C. System
D. RAM
A
- B. The start-configuration for the router or switch is stored in non-volatile random-access memory (NVRAM). This memory is similar to flash memory in that it retains data well after the power is removed from the device.
38
Q
- If power is lost, which command will retain the configuration for bootup?
A. Router#copy running-config startup-config
B. Router#save running-config
C. Router#cp running-config startup-config
D. Router#write running-config startup-config
A
- A. The command copy running-config startup-config will copy the running- config in RAM to the startup-config in NVRAM.
39
Q
- You need to decommission a router. You want to clear only the configuration off
the router. Which command will achieve this? A. Router#clear startup-config
B. Router#format flash:
C. Router#format startup-config
D. Router#erase startup-config
A
- D. The command erase startup-config will erase the startup-config from NVRAM. The only copy left after that command is configured is in RAM. Once the power is removed, the RAM will be erased as well.
40
Q
- Which command will allow you to verify the IOS images you have on the flash file
system?
A. Router#show flash: filesystem
B. Router#show boot C. Router#dir flash: D. Router#dir /flash
A
- C. The command dir flash: will display all of the IOS images stored in the flash filesystem. The command show flash: will work also, but read-write attributes will be omitted.
41
Q
- Which command will back up the startup-config for a device to a server? A. Switch#archive startup-config tftp:
B. Switch#backup startup-config tftp://192.168.1.2 C. Switch#copy startup-config tftp:
D. Switch#copy startup-config server:
A
- C. The command copy startup-config tftp: will ask for the Trivial File Transfer Protocol (TFTP) server address, source filename, and destination filename. It will then proceed to copy the file over the network to the TFTP server.
42
Q
- Which command will restore configuration to the running-config for a device from
a server?
A. Switch#archive tftp: running-config
B. Switch#restore tftp://192.168.1.2 running-config C. Switch#copy tftp: running-config
D. Switch#copy server: running-config
A
- C. The command copy tftp: running-config will ask for the TFTP server address, source filename, and destination filename. It will then proceed to copy the file over the network from the TFTP server.
43
Q
- You have been given the task of mapping a network. You have several routers and
switches that are interconnected. Which Cisco tool will help you map the network? A. CDP
B. Running-config
C. OSPF neighbor table
D. EIGRPneighbortable
A
- A. All Cisco devices by default participate in the Cisco Discovery Protocol (CDP). By using CDP, you can begin mapping the network one node at a time, discovering all the nodes attached.
44
Q
- You are contracted to fix a networking issue. The technical staff has given you the network logins for all the routers and switches. You discover that the problem is not on the router you are connected to but on a neighboring router. How can you obtain the management IP address of the neighboring router?
A. RouterA#show ip route
B. RouterA#show ip interface C. RouterA#show ip protocols
D. RouterA#show cdp neighbors detail
A
- D. The command show cdp neighbors detail will display the IP addresses of the routers and switches connected to the current router. The show ip route command will only show the data plane IP addresses and not the management plane IP addresses.
45
Q
- You have neighboring equipment on the switch that is running LLDP. Which command(s) will allow you to see the neighboring equipment’s management IP addresses?
A. Switch(config)#enable lldp Switch(config)#exit Switch#show lldp neighbors
B. Switch(config)#lldp run Switch(config)#exit Switch#show lldp neighbors
C. Switch#show lldp neighbors
D. Switch(config)#enable lldp Switch(config)#exit Switch#show lldp neighbors
detail
detail detail
A
- B. By default, Cisco devices do not participate in Link Layer Discovery Protocol (LLDP). The first command that needs to be configured is lldp run, which starts the switch participating in LLDP. You then need to enter the command show lldp neighbors detail in the privileged exec mode prompt. This command will show all of the neighboring LLDP devices.
46
Q
- What is the term used to describe Cisco’s current IOS image naming convention, which contains all the feature sets and is licensed upon feature use?
A. Universal image B. Unifiedimage C. Fusion image
D. Central image
A
- A. The term used to describe Cisco’s current IOS image naming convention, which contains all the feature sets, is universal image. The universal image contains all of the features sets available, and a feature set can be “turned on” by providing a license key.
47
Q
- What allows you to download the current IOS from Cisco for your router or switch?
A. Cisco provides upgrades for free; nothing is required. B. You need a current SMARTnet contract for the device. C. One free upgrade is permitted per the life of the device
D. An activation key is required, which is purchased from a retailer.
A
- B. A current SMARTnet contract is required to download the latest IOS for your Cisco router or switch. SMARTnet contracts provide configuration support, parts replacement, and software maintenance on Cisco devices.
48
Q
- You have a new router and you have purchased the IP Base license along with it. You want to use the voice feature set on the router. What is required?
A. A current SMARTnet contract for the device is required.
B. Cisco provides one free feature set upgrade.
C. An activation key is required, which is purchased from a retailer.
D. A new Cisco IOS with the feature set included is required.
A
- C. An activation key is required to activate the features, which are already installed in the universal image. SMARTnet agreements only cover you for upgrades to the IP Base IOS. They do not provide upgrades of features sets called Technology Package Licenses.
49
Q
- Which tool allows you to manage all of your Cisco device licensing needs through a single user interface?
A. Cisco SMARTnet
B. Cisco License Manager C. Cisco Network Assistant
D. Cisco Prime Infrastructure
A
- B. The Cisco License Manager (CLM) can be installed on Windows, Solaris, or Linux. It allows for discovery of Cisco devices and inventory of Cisco device licenses and connects to Cisco for access to current and new licenses purchased. The CLM allows for management of the software activation process through its user interface.
50
Q
50. Which command would you use to obtain a device’s product ID (PID) and unique device identifier (UDI) for the activation process? A. Switch#show version B. Switch#show license C. Switch#show license udi D. Switch#show licensing
A
- C. The command show license udi will display the product ID (PID) and the unique device identifier (UDI). Both the PID and UDI are required when activating a license from Cisco’s license portal. The Cisco license portal will email or display the license key required to unlock the feature set purchased.
51
Q
- Which command will show which features are activated, available, and in
evaluation mode on a router or switch? A. Switch#show license feature
B. Switch#show version C. Switch#show features
D. Switch#show licensing
A
- A. The command show license feature will display a matrix of all the features in the IOS, including the enforcement, evaluation, subscription, enabled, and right to use status.
52
Q
- Which license will allow a Cisco router to enable a feature set for evaluation?
A. UDI license
B. Right-to-use license C. Evaluation license
D. Enforcement license
A
- B. A right-to-use license will allow a customer to evaluate a feature set for 60 days. After the 60-day period is expired, the feature set will remain active. However, after 60 days the customer is in violation of the license agreement if the feature set has not been purchased
53
Q
- You are connected to the console of a switch. As you are configuring the switch, console logging is disrupting your commands and making it hard to configure the switch properly. Which command will allow the console message to still appear but not disrupt what you are typing?
A. Switch#no logging inline
B. Switch(config)#logging synchronous
C. Switch(config-line)#logging synchronous
D. Switch#logging synchronous
A
- C. The command logging synchronous will configure console logging messages to synchronize with what is being typed so they will not disrupt the user’s input.