ICND2 - Part 7 Quiz Flashcards
SNMP runs on which layer?
a. 2
b. 3
c. 4
d. 6
e. 7
f. 8
e. 7
A Network Management Station (NMS) is what?
a. A SNMP manager running on a PC or server.
b. A SNMP manager running on a router or switch.
c. A SNMP manager running on a SNMP program.
d. A SNMP manager running on a SMTP program.
a. A SNMP manager running on a PC or server.
An SNMP agent is any device running the agent service so that it can be polled and return a status.
a. True
b. False
a. True
Status, counters, and variables exist in a database called:
a. MEB
b. MBA
c. NIB
d. MIB
e. MBI
d. MIB
The NMS polls a device and can send texts, emails, and notifications.
a. True
b. False
a. True
A Get Request is initiated from the NMS and a ________ is sent back.
a. Get Sent
b. Get Message
c. Get Response
d. Get Alert
c. Get Response
An OID is:
a. A variable in a MIB
b. A variable in the MIB
c. A MIB with variables
d. A MBA with variables
a. A variable in a MIB
What are two ways to secure SNMP?
a. ACLs
b. SNMPv3
c. VLAN separation
d. SNMPv2
a. ACLs
b. SNMPv3
SNMPv3 uses the following secure methods: Message Integrity, Encryption (privacy), and:
a. Community Strings
b. Authentication
c. Clear text passwords
d. MD7 hashed passwords
b. Authentication
What command enables the SNMP agent?
a. Snmp-enable
b. Snmp-start
c. Snmp-server
d. Snmp-host
c. Snmp-server
Snmp-server communitystring RO does what?
a. Set a community string to use Read and Organize
b. Set a community string to use Read and Write
c. Set a community string to use Read and Options
d. Set a community string to use Read Only
d. Set a community string to use Read Only
Traps are acknowledged events while Informs are just unacknowledged events informing the NMS something happened.
a. True
b. False
b. False
In SNMPv3, you must set snmp-server group and :
a. Snmp-server contact
b. Snmp-server user
c. Snmp-server password
d. Snmp-server authentication
b. Snmp-server user
The SNMPv3 auth security level accomplishes what? (Choose all that apply)
a. Checks message integrity
b. Performs Authentication
c. Encrypts Messages
d. Uses authNoPriv as the keyword in messages
a. Checks message integrity
b. Performs Authentication
d. Uses authNoPriv as the keyword in messages
The snmp-server host x.x.x.x version 3 priv CISCO command does what?
a. Sets traps with auth
b. Sets inform with auth
c. Sets traps with priv
d. Sets inform with priv
c. Sets traps with priv
IP SLA of Cisco routers provides a means to measure and display several key performance and availability indicators.
a. True
b. False
a. True
What is normally the IP SLA Source?
a. The switch
b. The router
c. The NMS
d. The SNMP program
b. The router
What command can I issue to see the current IP SLA return code states?
a. Show ip sla
b. Show ip sla summary
c. Show ip sla brief
d. Show ip sla all
b. Show ip sla summary
SPAN is used on switches much like IP SLA is on routers.
a. True
b. False
a. True
RSPAN and ERSPAN accomplish what? (Choose 2)
a. Copying and sending the traffic to a local host.
b. Copying and sending the traffic to a remote host.
c. Copying and sending the traffic to a remote host via a GRE tunnel.
d. Copying and sending the traffic to a local host via a GRE tunnel.
b. Copying and sending the traffic to a remote host.
c. Copying and sending the traffic to a remote host via a GRE tunnel.
Server virtualization requires a special operating system called a:
a. Red Hat OS
b. Linux OS
c. Hypervisor
d. Windows OS
c. Hypervisor
VMs can be on their own VLAN, the same VLAN, or use VLAN trunking to itself.
a. True
b. False
a. True
A virtual switch accomplishes what?
a. Allowing multiple VMs to send data to themselves.
b. Giving each VM its own virtual NIC.
c. Allows multiple VMs to trunk.
d. Allows multiple VMs to have their own switch.
b. Giving each VM its own virtual NIC.
Cloud services are an on-demand and easily provisionable service that the user does not have to wait on.
a. True
b. False
a. True
What are the five criteria for a cloud computing service (NIST List)
a. On-demand self-service
b. Metered service
c. Highspeed network access
d. Broad network access
e. Resource segregation
f. Resource pooling
g. Rapid closure
h. Rapid elasticity
i. Easily configurable
j. Measured service
a. On-demand self-service
d. Broad network access
f. Resource pooling
h. Rapid elasticity
j. Measured service
What is a private cloud?
a. A cloud that is only usable to a single person
b. A cloud that is only usable to internal customers of a company
c. A cloud that is usable to internal employees that are considered customers of the service
d. A cloud that is usable to the outside and inside only if on the VPN and the user is a paying customer
c. A cloud that is usable to internal employees that are considered customers of the service
What is IaaS? (Choose all that apply)
a. Infrastructure as a Service
b. Institution as a Service
c. A service that a customer pays for and has full access to the specifications they paid for
d. A service that a customer pays for that has full access to the software they paid for
a. Infrastructure as a Service
c. A service that a customer pays for and has full access to the specifications they paid for
PaaS is similar to IaaS because it shares the same concepts in terms of the OS, specs, and full access but also adds what to the service to make it different?
a. Antivirus
b. Additional hardware
c. Software development tools
d. Network analyzing tools
c. Software development tools
What are some cons when dealing with a public cloud option? (Choose 2)
a. Agility
b. QoS
c. Distributed Users
d. Migration
e. Security
b. QoS
e. Security
Connecting to a cloud with a private WAN is considered secure.
a. True
b. False
b. False
An intercloud exchange connects a consumer to multiple….
a. Cloud providers
b. Cloud consumers
c. Cloud networking devices
a. Cloud providers
The control plane on a router accomplishes what?
a. Determines routes, conducts ARP, MAC table building ,etc.
b. Pushes data around the network
c. Permits telnet and protocols like SNMP
d. Manages the router
a. Determines routes, conducts ARP, MAC table building ,etc.
What component on a switch is responsible for switching traffic to the ports it needs to go as well as look up the MAC Address table?
a. CPU
b. RAM
c. TCAM
d. ASIC
d. ASIC
An SDN controller centralizes the control plane of all networking devices.
a. True
b. False
a. True
The southbound interface is typically the interface that:
a. Is between the controller and the API
b. Is between the API and the northbound interface
c. Is between the controller and the networking devices
d. Is a hardware interface
c. Is between the controller and the networking devices