NTP Flashcards

1
Q
Which command should you enter to configure a device as an NTP server?
A. ntp server
B. ntp peer
C. ntp authenticate
D. ntp master
A

D. ntp master

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which two pieces of information can you determine from the output of the show ntp status command? (Choose two)
A. whether the NTP peer is statically configured
B. the IP address of the peer to which the clock is synchronized
C. the configured NTP servers
D. whether the clock is synchronized
E. the NTP version number of the peer

A

B. the IP address of the peer to which the clock is synchronized
D. whether the clock is synchronized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which two tasks must be performed to configure NTP to a trusted server in client mode on a single network device? (Choose two)
A. Enable NTP authentication
B. Verify the time zone
C. Disable NTP broadcasts
D. Specify the IP address of the NTP server
E. Set the NTP server private key

A

A. Enable NTP authentication

D. Specify the IP address of the NTP server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What will happen if you configure the logging trap debug command on a router?
A. It causes the router to send messages with lower severity levels to the syslog server
B. It causes the router to send all messages with the severity levels Warning, Error, Critical, and
Emergency to the syslog server
C. It causes the router to send all messages to the syslog server
D. It causes the router to stop sending all messages to the syslog server

A

C. It causes the router to send all messages to the syslog server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
If a notice-level messaging is sent to a syslog server, which event has occurred?
A. A network device has restarted
B. An ARP Inspection has failed
C. A routing instance has flapped
D. A debug operation is running
A

C. A routing instance has flapped

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
Which command must you enter to guarantee that an HSRP router with higher priority becomes the HSRP primary router after it is reloaded?
A. standby 10 preempt
B. standby 10 version 1
C. standby 10 priority 150
D. standby 10 version 2
A

A. standby 10 preempt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
Which command should you enter to verify the priority of a router in an HSRP group?
A. show hsrp
B. show sessions
C. show interfaces
D. show standby
A

D. show standby

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
Which MAC address is recognized as a VRRP virtual address?
A. 0000.5E00.010a
B. 0005.3711.0975
C. 0000.0C07.AC99
D. 0007.C070.AB01
A

A. 0000.5E00.010a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which two outcomes are predictable behaviors for HSRP? (Choose two)
A. The two routers share a virtual IP address that is used as the default gateway for devices on the LAN
B. The two routers negotiate one router as the active router and the other as the standby router
C. Each router has a different IP address both routers act as the default gateway on the LAN, and traffic is load balanced between them
D. The two routers synchronize configurations to provide consistent packet forwarding
E. The two routed share the same IP address, and default gateway traffic is load-balanced between
them

A

A. The two routers share a virtual IP address that is used as the default gateway for devices on the LAN
B. The two routers negotiate one router as the active router and the other as the standby router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does HSRP provide first hop redundancy?
A. It load-balances traffic by assigning the same metric value to more than one route to the same destination in the IP routing table
B. It load-balances Layer 2 traffic along the path by flooding traffic out all interfaces configured with the same VLAN
C. It forwards multiple packets to the same destination over different routed links and data path
D. It uses a shared virtual IMC and a virtual IP address to a group of routers that serve as the default gateway for hosts on a LAN

A

D. It uses a shared virtual IMC and a virtual IP address to a group of routers that serve as the default gateway for hosts on a LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

AAA stands for authentication, authorization, and accounting.
A. False
B. True

A

B. True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which effect does the aaa new-model configuration command have?
A. It configures the device to connect to a RADIUS server for AAA.
B. It configures a local user on the device.
C. It associates to RADIUS server to an AAA group.
D. It enables AAA services on the device.

A

D. It enables AAA services on the device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the primary difference between AAA authentication and authorization?
A. Authentication verifies a username and password, and authorization handles the communication between the authentication agent and the user database
B. Authentication identifies a user who is attempting to access a system, and authorization validates the users password
C. Authentication identifies and verifies a user who is attempting to access a system, and authorization controls the tasks the user can perform
D. Authentication controls the system processes a user can access and authorization logs 9ie activities the user initiates

A

C. Authentication identifies and verifies a user who is attempting to access a system, and authorization controls the tasks the user can perform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
Refer to the exhibit. Which password must an engineer use to enter the enable mode?
----
Atlanta#config t
Atlanta(config)#aaa new-model
Atlanta(config)#aaa authentication login default local Atlanta(config)#line vty 0 4 Atlanta(config-line)#login authentication default
Atlanta(config-line)#exit
Atlanta(config)#username ciscoadmin password adminadmin123 Atlanta(config)#username ciscoadmin privilege 15 Atlanta(config)#enable password cisco123 Atlanta(config)#enable secret testing1234
Atlanta(config)#end
----
A. adminadmin123 
B. default
C. testing1234
D. cisco123
A

C. testing1234

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
An email user has been lured into clicking a link in an email sent by their company’s security organization. The webpage that opens reports that it was safe but the link could have contained malicious code. Which type of security program is in place?
A. Physical access control 
B. Social engineering attack 
C. brute force attack
D. user awareness
A

D. user awareness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An engineer is asked to protect unused ports that are configured in the default VLAN on a switch. Which two steps will fulfill the request? (Choose two)
A. Configure the ports in an EtherChannel
B. Administratively shut down the ports
C. Configure the port type as access and place in VLAN 99
D. Configure the ports as trunk ports
E. Enable the Cisco Discovery Protocol

A

B. Administratively shut down the ports

C. Configure the port type as access and place in VLAN 99

17
Q
Which configuration is needed to generate an RSA key for SSH on a router?
A. Configure the version of SSH 
B. Configure VTY access
C. Create a user with a password 
D. Assign a DNS domain name
A

D. Assign a DNS domain name

18
Q

Which two must be met before SSH can operate normally on a Cisco IOS switch? (Choose two)
A. The switch must be running a k9 (crypto) IOS image
B. The ip domain-name command must be configured on the switch
C. IP routing must be enabled on the switch
D. A console password must be configured on the switch
E. Telnet must be disabled on the switch

A

A. The switch must be running a k9 (crypto) IOS image

B. The ip domain-name command must be configured on the switch

19
Q
When a site-to-site VPN is used, which protocol is responsible for the transport of user data?
A. IKEv2 
B. IKEv1 
C. IPsec 
D. MD5
A

C. IPsec

20
Q

Which set of action satisfy the requirement for multi-factor authentication?
A. The user swipes a key fob, then clicks through an email link
B. The user enters a user name and password, and then clicks a notification in an authentication app on a mobile device
C. The user enters a PIN into an RSA token, and then enters the displayed RSA key on a login screen
D. The user enters a user name and password and then re-enters the credentials on a second screen

A

B. The user enters a user name and password, and then clicks a notification in an authentication app on a mobile device

21
Q
Which command prevents passwords from being stored in the configuration as plaintext on a router or switch?
A. enable secret
B. service password-encryption
C. username Cisco password encrypt 
D. enable password
A

B. service password-encryption