Volume 2 - Chapter 17: SNMP, FTP, and TFTP Flashcards

1
Q

Describe the purpose of the SNMP Set message.

A

To set a variable on the SNMP agent running on the network device

Typically used for running commands remotely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 2 types of Get requests supported by SNMPv1?

A
  • Get
  • Get Next
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What additional Get request type was added by SNMPv2?

A

Get Bulk: used to get multiple sets of data without having to do multiple individual queries.

For example, using a Get Bulk command to get all of the information for an interface on a router.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe the difference between the SNMP trap versus inform.

A

The SNMP trap does not have to be acknowledged by the NMS, whereas the inform does.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What transport protocol is used by SNMP trap and inform messages?

A

Both use UDP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What version(s) of SNMP have support for clear-text communities?

A

All versions, v1, v2, and v3 support clear text.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What security features are added with SNMPv3?

A
  • Message Integrity: validating messages have not been modified
  • Authentication: Username and password
  • Encryption (Privacy): Encryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe the purpose of the “more” command on a Cisco router

A

To display the contents of a file:

more flash0:myfile.txt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A network engineer wants to verify the files and directories that exist within the bootflash:

What command(s) does the network technician need to use?

A
  1. First the network technician should validate that they are in the bootflash using: pwd
  2. if needed, move to the bootflash using: cd bootflash:
  3. Then, list all files (including sub-files) using: dir

Alternatively, you can list the bootflash without moving directories using: dir bootflash:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe the difference between the dir and show commands.

A

dir
* lists the files and directories in the current PWD
* lists the total used and unused bytes

show
* lists all files including the files in the sub-directories along with a unique file number for each
* lists only the total used bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What command can be used to verify the MD5 hash of an IOS image called:
c1100-universal9.14.3.2.SPA.bin

A

verify /md5 c1100-universal9.14.3.2.SPA.bin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What command can be used to verify the SHA512 hash of an IOS image called:
c1100-universal9.14.3.2.SPA.bin

A

verify /sha512 c1100-universal9.14.3.2.SPA.bin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

True or False:

Both FTP and SCP provide encryption during the file transfer process, whereas TFTP does not

A

False, out of the 3 options only SCP provides encryption. FTP and TFTP do not provide encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What would be the correct command to copy a file to a router’s flash via FTP using the following?:
* File Path: /myftp/folder1
* File Name: IOS-Image.bin
* Username: myuser
* Password: 1234
* Server IP: 10.3.2.4

A

copy ftp://myuser:1234@10.3.2.4/myftp/folder1/IOS-Image.bin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What commands are used to set a username and password for FTP connections on a router so that they do not need to be specified when performing the copy?

A

ip ftp username username
ip ftp username password

copy ftp://serverIP/filename

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the 3 steps required for a client to connect to and start transfering data to an FTP server?

A
  1. TCP 3-way handshake
  2. FTP Authentication
  3. FTP Commands
17
Q

A technician issuing commands to an FTP to navigate the directory, list files, and initiate a transfer are refered to as ____

A

FTP Control Connection/Command

18
Q

An FTP client receiving a file from an FTP server is refered to as an ____

A

FTP Data Connection

19
Q

When using FTP passive mode, what well-know port is used by the FTP server?

A

The FTP server will listen and respond to control requests on port 21

The FTP server will choose an ephemeral port and provide it to the client for data connections

20
Q

When using FTP passive mode, what port is used by the FTP client?

A

The FTP client will choose a port in the ephemeral range.

21
Q

Describe the difference between an FTP passive connection and active connection.

A

With an active connection, the client will provide its listening port to the FTP server and the server will initiate the data connection

With a passive connection, the server will choose a port to listen for data requests on and provide it to the client when requested. The client initiates the data connection

22
Q

Describe why a network engineer might use passive FTP over active FTP.

A

If a client is attempting to connect to an FTP server on the internet, the firewall will block the data connection that is initiated by the FTP server.

Whereas with passive FTP, the client initates the data connection and is less likely to be blocked.

23
Q

True or False:

TFTP uses TCP and has a checksum feature to detect transmission errors?

A

True.