CCNAv7 Module 10 Quiz – Network Management Answers

1. What are two reasons for an administrator to issue the copy running-config tftp command on a switch or router? (Choose two.)

  • to force an automatic reload of the device
  • to have a backup of the running configuration file in the router
  • to overwrite the current configuration
  • to transfer the current configuration file to a server
  • to save the running configuration file to a remote location
Explanation: The copy running-config tftp command is used to copy the current configuration file to a TFTP server.

2. What information can be gathered about a neighbor device from the show cdp neighbors detail command that cannot be found with the show cdp neighbors command?

  • the platform that is used by the neighbor
  • the IP address of the neighbor
  • the capabilities of the neighbor
  • the hostname of the neighbor
Explanation: The show cdp neighbors detail command will display the IP address of the neighbor. The show cdp neighbors command displays the platform, capabilities, and name of neighbors, but does not specify IP addresses.

3. When SNMPv1 or SNMPv2 is being used, which feature provides secure access to MIB objects?

  • message integrity
  • community strings
  • packet encryption
  • source validation
Explanation: SNMPv1 and SNMPv2 use community strings to control access to the MIB. SNMPv3 uses encryption, message integrity, and source validation.

4. What command must be issued on a Cisco router that will serve as an authoritative NTP server?

  • ntp master 1
  • ntp broadcast client
  • clock set 11:00:00 DEC 20 2010
  • ntp server 172.16.0.1
Explanation: Routers that will serve as NTP masters must be configured with the ntp mastercommand. A client is configured with the ntp servercommand so that the client can locate the NTP master. The ntp broadcast client command allows NTP to use to broadcast messages. The clock setcommand is used to set the time on a router.

5. Which protocol or service can be configured to send unsolicited messages to alert the network administrator about a network event such as an extremely high CPU utilization on a router?

  • NetFlow
  • NTP
  • SNMP
  • syslog
Explanation: SNMP can be used to collect and store information such as device CPU utilization. Syslog is used to access and store system messages. Cisco developed NetFlow for the purpose of gathering statistics on packets that are flowing through Cisco routers and multilayer switches. NTP is used to allow network devices to synchronize time settings.

6. Which statement describes a syslog message severity level?

  • A syslog alarm with a severity level of 7 indicates an emergency situation that can render the system unusable.
  • A syslog alarm at the severity level 4 and higher is sent to an external syslog server by default.
  • A severity level 7 message is only accessible through the terminal line.
  • Severity level 0 is the most critical severity level.
Explanation: The syslog severity levels increase in severity as the level number gets smaller. Level 0 is the highest severity level and indicates an emergency situation that can render a system unusable. Syslog severity level 7 is used for debugging messages.

7. What is an SNMP management agent?

  • a database that a device keeps about network performance
  • software that is installed on devices managed by SNMP
  • a communication protocol that is used by SNMP
  • a computer loaded with management software and used by an administrator to monitor a network
Explanation: A management station is used by an administrator for monitoring. An MIB is a database of monitoring information. The Simple Network Management Protocol is the communications protocol that is used between the management station and the management agents. Management agents run the software that enables administrators to gather network performance data.

8. What are two characteristics of SNMP community strings? (Choose two.)

  • SNMP read-only community strings can be used to get information from an SNMP-enabled device.
  • If the manager sends one of the correct read-only community strings, it can get information and set information in an agent.
  • Commonly known community strings should be used when configuring secure SNMP.
  • A vulnerability of SNMPv1, SNMPv2, and SNMPv3 is that they send the community strings in plaintext.
  • SNMP read-write community strings can be used to set information on an SNMP-enabled device.
Explanation: There are two types of SNMP community strings, read-only and read-write. The read-only community string allows the manager to get information from the agent and the read-write allows the manager to get or set information in the agent.

9. A network administrator issues the copy tftp running-config command on a router. What is the administrator trying to achieve?

  • copy the configuration file from the RAM of the router to the TFTP server
  • copy the configuration file from the NVRAM of the router to the TFTP server
  • copy the configuration file from the TFTP server to the NVRAM of the router
  • copy the configuration file from the TFTP server to the RAM of the router
Explanation: The running configuration file is located in RAM. The position of the keyword tftp within the command indicates that the source of the file will be the tftp server, and the keyword running-configindicates that the file will be placed in the RAM of the router.

10. What is a characteristic of the MIB?

  • Information is organized in a flat manner so that SNMP can access it quickly.
  • Information in the MIB cannot be changed.
  • The OIDS are organized in a hierarchical structure.
  • A separate MIB tree exists for any given device in the network.
Explanation: SNMP set, get, and trap messages are used to access and manipulate the information contained in the MIB. This information is organized hierarchically so that SNMP can access it quickly. Each piece of information within the MIB is given an object ID (OID), that is organized based on RFC standards into a hierarchy of OIDs. The MIB tree for any given device includes branches with variables common to many networking devices and branches with variables specific to that device or vendor.​

11. What data would be saved and where would the data be placed if a network administrator issued the following command? (Choose two.)

R1# copy startup-config tftp
  • The data will be saved to a TFTP server.
  • The data to be saved is the configuration that is stored in NVRAM.
  • The data to be saved is the configuration that is stored on a TFTP server.
  • The data to be saved is the configuration that is being modified in RAM.
  • The data will be saved in RAM. The data will be saved in NVRAM.
Explanation: The syntax for the command is copy source destination. The source of startup-config is the configuration saved in NVRAM. The destination of tftp is a TFTP server.

12. Which command would a network engineer use to restore the IOS image c1900-universalk9-mz.SPA.152-4.M3.bin to a router?

  • copy tftp: flash0:
  • copy c1900-universalk9-mz.SPA.152-4.M3.bin tftp:
  • copy flash0: c1900-universalk9-mz.SPA.152-4.M3.bin
  • copy flash0: tftp:
Explanation: The command syntax to restore an IOS image is copy source destination, where, in this case,source is a TFTP server and destination is the router flash memory. The image name (source filename) is entered at a new prompt after the initial copy command is issued, not as a parameter of the copy command.

13. Why would a network administrator issue the show cdp neigbors command on a router?

  • to display device ID and other information about directly connected Cisco devices
  • to display line status and other information about directly connected Cisco devices
  • to display routing table and other information about directly connected Cisco devices
  • to display router ID and other information about OSPF neighbors
Explanation: The show cdp neighbors command provides information on directly connected Cisco devices including Device ID, local interface, capability, platform, and port ID of the remote device.

14. What are SNMP trap messages?

  • unsolicited messages that are sent by the SNMP agent and alert the NMS to a condition on the network
  • messages that are sent periodically by the NMS to the SNMP agents that reside on managed devices to query the device for data
  • messages that are used by the NMS to query the device for data
  • messages that are used by the NMS to change configuration variables in the agent device
Explanation: A GET request is a message that is used by the NMS to query the device for data. A SET request is a message that is used by the NMS to change configuration variables in the agent device. An NMS periodically polls the SNMP agents residing on managed devices, by querying the device for data by using the GET request.

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments