Volume 2 - Chapter 17: SNMP, FTP, and TFTP Flashcards
Describe the purpose of the SNMP Set message.
To set a variable on the SNMP agent running on the network device
Typically used for running commands remotely.
What are the 2 types of Get requests supported by SNMPv1?
- Get
- Get Next
What additional Get request type was added by SNMPv2?
Get Bulk: used to get multiple sets of data without having to do multiple individual queries.
For example, using a Get Bulk command to get all of the information for an interface on a router.
Describe the difference between the SNMP trap versus inform.
The SNMP trap does not have to be acknowledged by the NMS, whereas the inform does.
What transport protocol is used by SNMP trap and inform messages?
Both use UDP.
What version(s) of SNMP have support for clear-text communities?
All versions, v1, v2, and v3 support clear text.
What security features are added with SNMPv3?
- Message Integrity: validating messages have not been modified
- Authentication: Username and password
- Encryption (Privacy): Encryption
Describe the purpose of the “more” command on a Cisco router
To display the contents of a file:
more flash0:myfile.txt
A network engineer wants to verify the files and directories that exist within the bootflash:
What command(s) does the network technician need to use?
- First the network technician should validate that they are in the bootflash using: pwd
- if needed, move to the bootflash using: cd bootflash:
- Then, list all files (including sub-files) using: dir
Alternatively, you can list the bootflash without moving directories using: dir bootflash:
Describe the difference between the dir and show commands.
dir
* lists the files and directories in the current PWD
* lists the total used and unused bytes
show
* lists all files including the files in the sub-directories along with a unique file number for each
* lists only the total used bytes
What command can be used to verify the MD5 hash of an IOS image called:
c1100-universal9.14.3.2.SPA.bin
verify /md5 c1100-universal9.14.3.2.SPA.bin
What command can be used to verify the SHA512 hash of an IOS image called:
c1100-universal9.14.3.2.SPA.bin
verify /sha512 c1100-universal9.14.3.2.SPA.bin
True or False:
Both FTP and SCP provide encryption during the file transfer process, whereas TFTP does not
False, out of the 3 options only SCP provides encryption. FTP and TFTP do not provide encryption
What would be the correct command to copy a file to a router’s flash via FTP using the following?:
* File Path: /myftp/folder1
* File Name: IOS-Image.bin
* Username: myuser
* Password: 1234
* Server IP: 10.3.2.4
copy ftp://myuser:1234@10.3.2.4/myftp/folder1/IOS-Image.bin
What commands are used to set a username and password for FTP connections on a router so that they do not need to be specified when performing the copy?
ip ftp username username
ip ftp username password
copy ftp://serverIP/filename
What are the 3 steps required for a client to connect to and start transfering data to an FTP server?
- TCP 3-way handshake
- FTP Authentication
- FTP Commands
A technician issuing commands to an FTP to navigate the directory, list files, and initiate a transfer are refered to as ____
FTP Control Connection/Command
An FTP client receiving a file from an FTP server is refered to as an ____
FTP Data Connection
When using FTP passive mode, what well-know port is used by the FTP server?
The FTP server will listen and respond to control requests on port 21
The FTP server will choose an ephemeral port and provide it to the client for data connections
When using FTP passive mode, what port is used by the FTP client?
The FTP client will choose a port in the ephemeral range.
Describe the difference between an FTP passive connection and active connection.
With an active connection, the client will provide its listening port to the FTP server and the server will initiate the data connection
With a passive connection, the server will choose a port to listen for data requests on and provide it to the client when requested. The client initiates the data connection
Describe why a network engineer might use passive FTP over active FTP.
If a client is attempting to connect to an FTP server on the internet, the firewall will block the data connection that is initiated by the FTP server.
Whereas with passive FTP, the client initates the data connection and is less likely to be blocked.
True or False:
TFTP uses TCP and has a checksum feature to detect transmission errors?
True.