ITC 465 Chapter 13 Assessments

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following troubleshooting methods is based on the troubleshooting experience and the ability of the technician?

Educated Guess

In addition to AH, IPsec is composed of which other service?

Encapsulating Security Payload (ESP)

Which IPsec subprotocol provides data encryption?

Encapsulating Security Payload (ESP)

Which of the following are true regarding SNMP? (Select two.)

SNMPv2c can be compromised because the community string for authentication is sent in clear text. SNMPv3 employs the encryption of packets to prevent unauthorized sources from snooping.

Consider the following log message generated by a router: *00019: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to down What is being used to identify when the message is generated?

Sequence number

Which of the following provides a VPN gateway that encapsulates and encrypts outbound traffic from a site and sends the traffic through the VPN tunnel to the VPN gateway at the target site?

Site-to-site IPsec VPN

A configured threshold has been exceeded by a network host that is being monitored by an SNMP agent. The agent sends a trap to its SNMP manager with a notification that the threshold has been exceeded. Which IP port does the agent use to send the trap?

162

Consider the output from the show ip cache flow command shown. Which statements are true regarding the flow represented in the statistics? (Select two.)

255 packets were monitored. Most of the packets monitored were 1536 bytes in size.

Provider delivers everything a developer needs to build an application. Client avoids the cost and complexity of buying and managing the underlying hardware and software layers.

PaaS

During a heavy network traffic period, the maximum traffic rate is exceeded. To handle this, QoS drops all incoming traffic. Which QoS method is being used?

Policing

Which method is used by the SNMP manager when it contacts an SNMP agent and requests information about a monitored network device?

Poll

Provides resources to a single organization. Accessible only by users within the single organization.

Private cloud

Consider the following log message generated by a router: *Aug 8 11:18:12.081: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to down What facility generated this message?

%LINEPROTO

Consider the following log message generated by a router: *Aug 8 11:18:12.081: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to down What is the severity level of this message?

-5-

How many packets per minutes are required to keep two machines synchronized to an accuracy of a millisecond of each other?

1

Put the 7-step troubleshooting process in order.

1. Define the problem 2. Gather information 3. Analyze information 4. Eliminate probable causes 5. Propose hypothesis 6. Test hypothesis 7. Solve the problem

The following image shows a standard Object Identifier Tree structure. Based on this structure, what would the OID be for a Microsoft device?

1.3.6.1.4.1.311

Which of the following best describes the various HSRP group roles? (Select two.)

A standby router will become the active router should the existing active router fail. An active router forwards traffic destined to the virtual IP address.

What is true regarding the following partial output in the running configuration file? (Select two.) Router#show run !interface fa 0/0 ip address 10.2.30.2 255.255.255.224 ! <output omitted> ! logging on logging host 10.2.30.253 logging trap 4 logging source-interface fa 0/0 !

A syslog server will receive error messages sent from 10.2.30.2. A syslog server will receive warning messages sent from 10.2.30.2.

Used by software applications on the controller to obtain information about the network. Designates the accepted method of communication between the controller, network devices, and installed applications.

API

What happens when an HSRP active router fails? (Select two.)

Additional HSRP member routers transition from the listen state after the holdtime expires on the hello message. The HSRP standby router becomes the active router after the holdtime expires on the hello message.

Your router generates a log message with a severity level of 6. What does this indicate?

An informational message only.

The capacity of a connection between two or more devices.

Bandwidth

Many queue schedulers are able to identify a low-latency queue. What do queue schedulers do when processing low-latency queues?

Before the scheduler moves on to other queues, the low-latency queue must first be cleared.

Data on the network is being processed as it comes in. Which QoS method is being used?

Best Effort

Which of the following cannot be analyzed using the data collected by NetFlow?

CPU usage

Individual frames are marked and classified at Layer 2. A priority value between 0 and 7 is assigned to a 3-bit field.

Class of Service (COS)

Assigns each queue a minimum bandwidth percentage.

Class-Based Weighted Fair Queuing

You need to set the time zone for Pacific Daylight Time. Which two of the following commands will allow you to do this?

Clock timezone -8 Clock timezone PST

Designed to be shared by several organizations.

Community cloud

Which of the following are benefits a VPN provides? (Select two.)

Compatibility Cost savings

The storage area where NetFlow data is stored on a device is known as what?

NetFlow Ccche

Determine how traffic moves from one place to another.

Control Plane

Performs the function of monitoring network traffic. Performs the function of learning about the network topology.

Controller

Determine whether VLANs are configured on each switch. Examine the forwarding logic on each device. Isolate filtering and port security problems.

Data plane

A user is playing an online game. When they press a key to perform an action, it takes at least one second for the action to be performed on screen. Which QoS metric is having issues?

Delay

The amount of time that passes from when a packet is sent to when it arrives.

Delay

Classification occurs at Layer 3. Precedence values are inserted in the DiffServ field of an IP packet. Up to 64 different classifications are possible.

Differentiated Services Code Point (DSCP)

IPSec uses which method for key exchange?

Diffie-Hellman

IPsec is implemented through two separate protocols. What are these protocols called? (Select two.)

ESP AH

You have a small network as shown. You are troubleshooting connectivity issues at Wrk1. From Wrk1, you are able to ping hosts Wrk2 and Wrk3. A ping to any host in the main office fails. From Wrk2, you can ping any host in the branch office, but you cannot ping any host in the main office. What is the most likely cause of the problem? (Select two.)

Fa0/24 on the switch is bad Bad cable between the switch and the SFO router

Which of the following gateway redundancy protocols are Cisco proprietary? (Select two.)

HSRP GLBP

You are providing a VPN solution for employees who work remotely. When these employees change locations, they lose their VPN connection, so you want them to automatically reconnect if the VPN connection is lost or disconnected. Which VPN security protocol supports VPN reconnect functionality?

IKEv2

Providers deliver processing, storage, networks, and virtualized environment services. Clients deploy and run software without purchasing servers, data center space, or network equipment.

IaaS

In which of the following scenarios would a router send a resign message?

If a preempted active router fails, the standby router becomes the active router. If the preempted active router regains service, it sends a coup message. The current active router sends the resign message after receiving the coup message.

How does standby preemption affect the router configured with the highest priority in the HSRP group? (Select two.)

If the active router fails and then regains service, it does not become the active router again when preemption is not enabled. If the active router fails and then regains service, it becomes the active router again if preemption is enabled.

Your router generates a log message with a severity level of 1. What does this indicate?

Immediate action is needed.

Which device does NetFlow operate on?

Network device

You have implemented a QoS model where each application must request network resources. The router will approve or deny the request based on available resources. Which QoS model is being used?

Integrated Services

What effect does the standby 2 track serial 0/0 25 interface configuration command have? (Select two.)

It decrements the HSRP group priority by 25 if the interface goes down. The HSRP standby router will become the active router if both routers have default configurations

In reference to cloud computing, what does the term cloud mean?

It is a metaphor for the internet based on the basic cloud drawing used to represent the telephone network.

Used by the applications on the controller to obtain information about the network.

Northbound controller interface

The variation in delay when sending multiple packets from the same device.

Jitter

The percentage of packets that do not arrive at their destination.

Loss

Use SNMP to monitor network switches.

Management plane

Which of the following statements are true regarding NTP when implemented on Cisco devices? (Select two.)

NTP runs over UDP port 123. When NTP is enabled, NTP packets are received on all interfaces.

Examples: Gmail and Google Docs. Accessible to everyone.

Public Cloud

Rotates through each queue and processes and sends the next available packet.

Round Robin

You have two routers that should be configured for gateway redundancy. The following commands are entered for each router. A(config)#int fa 0/2 A(config-if)#ip address 172.16.1.2 A(config-if)#standby 2 priority 150 A(config-if)#standby 2 ip 172.16.1.2 A(config-if)#standby 2 preempt A(config-if)#standby 5 priority 110 B(config)#int fa 0/2 B(config-if)#ip address 172.16.1.1 B(config-if)#standby 2 priority 110 B(config-if)#standby 5 ip 172.16.2.1 B(config-if)#standby 5 preempt B(config-if)#standby 5 priority 150

Router A will serve as the active router for HSRP group 2 and the backup router for HSRP group 5. Router B will serve as the active router for HSRP group 5 and the backup router for HSRP group 2.

Which SNMP component monitors individual network devices?

SNMP Agent

Which component is responsible for collecting and consolidating data from network devices that are being monitored with SNMP?

SNMP Manager

You implemented SNMPv2 as a part of your overall network management plan. You configured an SNMP manager to gather traps from SNMP agents that run on monitored network devices. To secure communications between the manager and the agents, you configured a trap community name of abc123. After running the system for some time, you notice that traps containing questionable events are being sent to the SNMP manager. Upon investigation, you discover that a malicious insider has been spoofing these events, attempting to cover her tracks as she tried to compromise several network hosts. What could have been done to prevent this from happening?

SNMPv3 should have been implemented instead of SNMPv2.

You need to implement a solution for the sales reps who complain that they are unable to establish VPN connections when they travel because the hotel or airport firewalls block the necessary VPN ports. Which VPN security protocol can you use to resolve this issue?

SSTP

Provider delivers applications to the client either over the internet or on a local area network.

SaaS

Consider the following output from the show ip cache flow command. Which type of service was accessed on the destination host?

Secure HTTP web server

You check the time on a router and find that it is off by several minutes. To fix this issue, you configure NTP on the router to get time from a Stratum 2 time provider on the internet. The time difference is large, and it is taking some time for NTP to synchronize the time on the local router. To speed synchronization, you use NTP commands to immediately synchronize the time on the router with the time on the time provider. Which NTP term best describes this process?

Slam

You check the time on a router and find that it is off by about 10 minutes. To fix this issue, you configure NTP on the router to get time from a Stratum 2 time provider on the internet. It is taking some time for NTP to synchronize the time on the local router. After about 15 minutes, the time finally synchronizes. Which NTP term best describes this process?

Slew

Enterprise networks are simplifying network management by moving away from the distributed architecture model for managing network communications. What is the name of the network management model that replaces the distributed architecture model?

Software-defined networking (SDN)

Which fields in an IP packet header are examined by NetFlow to determine whether or not a given packet is part of a flow? (Select two.)

Source address Type of service

Used to communicate with all of the physical network devices on the network.

Southbound controller interface

Which of the following are common network traffic types that QoS is used to manage? (Select two.)

Streaming video Interactive applications

A VPN (Virtual Private Network) is primarily used for which purpose?

Support secured communications over an untrusted network.

A router serving as the AVG in a GLBP group has which of the following responsibilities? (Select two.)

The AVG is responsible for answering Address Resolution Protocol (ARP) requests for the virtual IP address. The AVG assigns a virtual MAC address to each router of the GLBP group.

Packet switching, packet routing, and packet interpretation are examples of network communications. On which plane do these network communications occur?

The data plane

Software-defined networking (SDN) works by using software to configure and control the network, rather than relying on device-specific static configurations. The SDN model creates a centralized architecture that replaces the distributed architecture model. How does this shift to a centralized architecture affect the three planes of network communication?

The data plane and control plane have to be separated.

What happens to the history table and log files when the device loses power?

The history table and log files are all lost.

You have two routers that should be configured for gateway redundancy. The following commands are entered for each router: A(config)#int fa 0/2 A(config-if)#ip address 172.16.1.2 A(config-if)#standby 2 priority 150 A(config-if)#standby 2 ip 172.16.0.1 B(config)#int fa 0/2 B(config-if)#ip address 172.16.1.3 B(config-if)#standby 2 priority 150

The virtual IP address is 172.16.0.1. Router B will serve as active router, and Router A will serve as standby router.

You have noticed that every two weeks or so, a client's clock is off by two minutes, even after you have adjusted it. What is this issue known as?

Time drift

Which method is used when an SNMP agent detects that the system it monitors has exceeded a configured threshold and sends an event to the SNMP manager?

Trap

Which of the following are IPsec methods of operation? (Select two.)

Tunnel Mode Transport Mode

Metric Description Bandwidth > 384 Kbps Delay < 400 ms Jitter < 50 ms Loss < .1%-1%

Video

Which of the following allows multiple virtual machines to exist on the same physical machine and share its underlying physical resources?

Virtualization

Metric Description Bandwidth N/A Delay < 150 ms Jitter < 30 ms Loss < 1%

VoIP

Labels one queue as priority. Rotates through the queues and sends out multiple packets from the priority queue.

Weighted Round Robin

You have a small network as shown. Wrk1 is unable to communicate with Wrk2. Wrk1 can ping the router and all internet hosts. Wrk2 can ping Wrk3. What is the most likely cause of the problem?

Wrk1 and Wrk2 are on separate VLANs.

Which SNMPv3 security level requires MD5 or SHA authentication and implements DES encryption?

authPriv

What type of resources offer the following advantages? Flexibility of access Ease of use Self-service provisioning of resources API availability Metering of services Ability to try out software applications

cloud

In traditional networking models, the date plane, control plane, and management plane are all contained within the firmware of networking devices. This is known as what kind of architecture?

distributed

You are configuring NetFlow on a router. You want to monitor both incoming and outgoing traffic on an interface. You've used the interface command to allow you to configure the interface. What commands should you use next? (Select two. Both responses are part of the complete solution.)

ip flow egress ip flow ingress

You have set up a NetFlow collector using IP address 172.17.8.25 on UDP port 2055. Which of the following commands will redirect records to the new collector?

ip flow-export destination 172.17.8.25 2055

Currently, your NetFlow router is configured to redirect records to a NetFlow Collector with an IP address of 172.17.8.25 on UDP port 2055. By default, NetFlow uses the IP address of the interface that packets are sent from as the source IP address for records. However, for security reasons, you want to obscure the source address of the NetFlow router by specifying that all NetFlow records originate from the loopback interface of the router. Which command should you use?

ip flow-export source loopback 0

Your NetFlow records are currently formatted for version 5. You need to change to version 9. Which of the following commands would you use?

ip flow-export version 9

You want to redirect log messages from a router to a Syslog server. The IP address of the Syslog server is 172.17.8.5. You want only serious log messages with a severity level of emergency, alert, critical, error, or warning to be redirected. Notifications and informational messages as well as debug messages should not be redirected. You just entered the logging on command. Which other commands must be used to accomplish this task? (Select two. Both responses are part of the complete solution.)

logging host 172.17.8.5 logging trap 4

You want to redirect log messages from a router to a Syslog server. The IP address of the Syslog server is 192.168.1.2. You want only serious log messages with a severity level of Emergency, Alert, or Critical to be redirected. Notification, Error, Warning, Informational, and Debug messages should not be redirected. Which commands are used to accomplish this? (Select three. All responses are part of the complete solution.)

logging on logging host 192.168.1.2 logging trap 2

You are configuring a router to redirect and consolidate log messages to a Syslog server. The router has multiple interfaces. However, you want all log messages being sent to the Syslog server to be seen as coming from the same IP address on the router, regardless of which interface the message actually exits the router from. Which command is used to accomplish this?

logging source-interface <interface>

Which SNMPv3 security level requires authentication with a username, but does not implement encryption?

noAuthnoPriv

Currently, all of the routers in your network are configured to use NTP to synchronize time with a public Stratum 2 time provider on the internet. To reduce redundant network traffic, you decide to configure one internal router as an authoritative NTP time provider with a stratum value of 5 and then configure all other routers to synchronize time with it. This router has an IP address of 172.17.8.254 assigned. Which commands should you use? (Select two. Each response is a part of the complete solution.)

ntp master 5 on the NTP time provider router. ntp server 172.17.8.254 on all routers except the time provider.

You check the time on a router and find that it is behind by several minutes. To fix this issue, you decide to configure NTP on the router to get time from a Stratum 2 time provider on the internet with a hostname of 0.pool.ntp.org. Which command should you use?

ntp server 0.pool.ntp.org

You check the time on a router and find that it is out of sync with the time on the other routers and switches in your network. To fix this issue, you decide to configure NTP on the router to get time from an internal authoritative (master) NTP server with an IP address of 172.17.8.254. Which command should you use?

ntp server 172.17.8.254

You need to verify that time is synchronized on a router. Which commands could you use to do this? (Select two. Each response is a complete solution.)

show ntp associations show ntp status


Conjuntos de estudio relacionados

porth essentials of pathophysiology chapt 40

View Set

Statistics : Chapter 5.5 & 5.6 probability - counting techniques

View Set

Consumer behavior chp 15(exam 2)

View Set

Ch. 7 Colorado Statutes, Rules, and Regulations for Sickness & Accident Insurance Only (2022)

View Set