CIS 225 Unit 10(Network Management) Quiz
software that is installed on devices managed by SNMP
What is an SNMP management agent? a database that a device keeps about network performance a computer loaded with management software and used by an administrator to monitor a network software that is installed on devices managed by SNMP a communication protocol that is used by SNMP
community strings
When SNMPv1 or SNMPv2 is being used, which feature provides secure access to MIB objects? packet encryption source validation message integrity community strings
copy tftp: flash0:
Which command would a network engineer use to restore the IOS image c1900-universalk9-mz.SPA.152-4.M3.bin to a router? copy c1900-universalk9-mz.SPA.152-4.M3.bin tftp: copy flash0: tftp: copy tftp: flash0: copy flash0: c1900-universalk9-mz.SPA.152-4.M3.bin
SNMP
Which protocol or service can be configured to send unsolicited messages to alert the network administrator about a network event such as an extremely high CPU utilization on a router? syslog SNMP NTP NetFlow
Severity level 0 is the most critical severity level.
Which statement describes a syslog message severity level? A syslog alarm with a severity level of 7 indicates an emergency situation that can render the system unusable. Severity level 0 is the most critical severity level. A severity level 7 message is only accessible through the terminal line. A syslog alarm at the severity level 4 and higher is sent to an external syslog server by default.
to display device ID and other information about directly connected Cisco devices
Why would a network administrator issue the show cdp neigbors command on a router? to display line status and other information about directly connected Cisco devices to display device ID and other information about directly connected Cisco devices to display router ID and other information about OSPF neighbors to display routing table and other information about directly connected Cisco devices
The OIDs are organized in a hierarchical structure.
What is a characteristic of the MIB? Information in the MIB cannot be changed. The OIDs are organized in a hierarchical structure. A separate MIB tree exists for any given device in the network. Information is organized in a flat manner so that SNMP can access it quickly.
copy the configuration file from the TFTP server to the RAM of the router
A network administrator issues the copy tftp running-config command on a router. What is the administrator trying to achieve? copy the configuration file from the NVRAM of the router to the TFTP server copy the configuration file from the TFTP server to the RAM of the router copy the configuration file from the TFTP server to the NVRAM of the router copy the configuration file from the RAM of the router to the TFTP server
unsolicited messages that are sent by the SNMP agent and alert the NMS to a condition on the network
What are SNMP trap messages? messages that are used by the NMS to query the device for data messages that are used by the NMS to change configuration variables in the agent device messages that are sent periodically by the NMS to the SNMP agents that reside on managed devices to query the device for data unsolicited messages that are sent by the SNMP agent and alert the NMS to a condition on the network
SNMP read-write community strings can be used to set information on an SNMP-enabled device. SNMP read-only community strings can be used to get information from an SNMP-enabled device.
What are two characteristics of SNMP community strings? (Choose two.) SNMP read-write community strings can be used to set information on an SNMP-enabled device. A vulnerability of SNMPv1, SNMPv2, and SNMPv3 is that they send the community strings in plaintext. SNMP read-only community strings can be used to get information from an SNMP-enabled device. Commonly known community strings should be used when configuring secure SNMP. If the manager sends one of the correct read-only community strings, it can get information and set information in an agent.
to transfer the current configuration file to a server to save the running configuration file to a remote location
What are two reasons for an administrator to issue the copy running-config tftp command on a switch or router? (Choose two.) to save the running configuration file to a remote location to overwrite the current configuration to have a backup of the running configuration file in the router to force an automatic reload of the device to transfer the current configuration file to a server
ntp master 1
What command must be issued on a Cisco router that will serve as an authoritative NTP server? ntp server 172.16.0.1 clock set 11:00:00 DEC 20 2010 ntp master 1 ntp broadcast client
The data to be saved is the configuration that is stored in NVRAM. The data will be saved to a TFTP server.
What data would be saved and where would the data be placed if a network administrator issued the following command? (Choose two.) R1# copy startup-config tftp The data to be saved is the configuration that is stored on a TFTP server. The data to be saved is the configuration that is stored in NVRAM. The data will be saved in RAM. The data to be saved is the configuration that is being modified in RAM. The data will be saved to a TFTP server. The data will be saved in NVRAM.
the IP address of the neighbor
What information can be gathered about a neighbor device from the show cdp neighbors detail command that cannot be found with the show cdp neighbors command? the IP address of the neighbor the capabilities of the neighbor the hostname of the neighbor the platform that is used by the neighbor