2. When logging is used, which severity level indicates that a device is unusable?



Similar documents
Traffic monitoring on ProCurve switches with sflow and InMon Traffic Sentinel

McAfee Enterprise Security Manager. Data Source Configuration Guide. Infoblox NIOS. Data Source: September 2, Infoblox NIOS Page 1 of 8

Configuring and Monitoring AS400 Servers. eg Enterprise v5.6

Firewall/Proxy Server Settings to Access Hosted Environment. For Access Control Method (also known as access lists and usually used on routers)

Configuring and Monitoring Network Elements

Mobile Device Manager Admin Guide. Reports and Alerts

ScaleIO Security Configuration Guide

ViPNet VPN in Cisco Environment. Supplement to ViPNet Documentation

MaaS360 Cloud Extender

Ten Steps for an Easy Install of the eg Enterprise Suite

SBClient and Microsoft Windows Terminal Server (Including Citrix Server)

Intel Hybrid Cloud Management Portal Update FAQ. Audience: Public

Junos Pulse Instructions for Windows and Mac OS X

Using Sentry-go Enterprise/ASPX for Sentry-go Quick & Plus! monitors

Implementing ifolder Server in the DMZ with ifolder Data inside the Firewall

ISAM TO SQL MIGRATION IN SYSPRO

HOWTO: How to configure SSL VPN tunnel gateway (office) to gateway

Instructions for Configuring a SAFARI Montage Managed Home Access Expansion Server

How To Upgrade A Crptocard To A 6.4 Migratin Tl (Cpl) For A 6Th Generation Of A Crntl (Cypercoder) On A Crperd (Cptl) 6.

Wireless Light-Level Monitoring

o How AD Query Works o Installation Requirements o Inserting your License Key o Selecting and Changing your Search Domain

Cloud Services MDM. Windows 8 User Guide

Information Services Hosting Arrangements

Connector for Microsoft Dynamics Installation Guide

Serv-U Distributed Architecture Guide

Pronestor Room & Catering

Serv-U Distributed Architecture Guide

Pexip Infinity and Cisco UCM Deployment Guide

GETTING STARTED With the Control Panel Table of Contents

Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1

TECHNICAL BULLETIN. Title: Remote Access Via Internet Date: 12/21/2011 Version: 1.1 Product: Hikvision DVR Action Required: Information Only

ACTIVITY MONITOR. Live view of remote desktops. You may easily have a look at any user s desktop.

Readme File. Purpose. What is Translation Manager 9.3.1? Hyperion Translation Manager Release Readme

Configuring SSL and TLS Decryption in ngeniusone

Configuring BMC AREA LDAP Using AD domain credentials for the BMC Windows User Tool

Getting Started Guide

Citrix XenServer from HP Getting Started Guide

Introduction to Mindjet MindManager Server

BackupAssist SQL Add-on

Configuring and Monitoring NetApp Products

CSC IT practix Recommendations

Licensing Windows Server 2012 for use with virtualization technologies

How to deploy IVE Active-Active and Active-Passive clusters

Remote Monitoring Service

TaskCentre v4.5 Send Message (SMTP) Tool White Paper

CNS-205: Citrix NetScaler 11 Essentials and Networking

Caching Software Performance Test: Microsoft SQL Server Acceleration with FlashSoft Software 3.8 for Windows Server

Service Desk Self Service Overview

Webalo Pro Appliance Setup

Configuring and Integrating LDAP

Configuring an Client for your Hosting Support POP/IMAP mailbox

Corente Cloud Services Exchange (CSX) Corente Cloud Services Gateway Site Survey Form

Monitor Important Windows Security Events using EventTracker

MiaRec. Performance Monitoring. Revision 1.1 ( )

Blue Link Solutions Terminal Server Configuration How to Install Blue Link Solutions in a Terminal Server Environment

Click Studios. Passwordstate. RSA SecurID Configuration

State of Wisconsin. File Server Service Service Offering Definition

Provisioning Services Architecture Overview. User Account Context / Service Account Context

ACTIVITY MONITOR Real Time Monitor Employee Activity Monitor

Getting Started Guide

Helpdesk Support Tickets & Knowledgebase

CXA-300-1I: Advanced Administration for Citrix XenApp 5.0 for Windows Server 2008

TrustED Briefing Series:

CallRex 4.2 Installation Guide

FINRA Regulation Filing Application Batch Submissions

iphone Mobile Application Guide Version 2.2.2

ROSS RepliWeb Operations Suite for SharePoint. SSL User Guide

SMART Active Directory Migrator Requirements

Licensing Windows Server 2012 R2 for use with virtualization technologies

SPECIFICATION. Hospital Report Manager Connectivity Requirements. Electronic Medical Records DRAFT. OntarioMD Inc. Date: September 30, 2010

How To Set Up Call Hme On A Brcade Data Center Powerbook

X7500 Series, X4500 Scanner Series MFPs: LDAP Address Book and Authentication Configuration and Basic Troubleshooting Tips

How To Install An Orin Failver Engine On A Network With A Network Card (Orin) On A 2Gigbook (Orion) On An Ipad (Orina) Orin (Ornet) Ornet (Orn

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy

Datasheet. PV4E Management Software Features

webnetwork Pre-Installation Configuration Checklist

Diagnostic Manager Change Log

OR 2) Implement and customize an off the shelf product that would suit the requirements

Ensuring end-to-end protection of video integrity

Topic Outline. Page 2 of 5

Prioritization and Management of VoIP & RTP s

Introduction LIVE MAPS UNITY PORTAL / INSTALLATION GUIDE Savision B.V. savision.com All rights reserved.

System Business Continuity Classification

SolarWinds Technical Reference

Remote Desktop Tutorial. By: Virginia Ginny Morris

Instant Chime for IBM Sametime Quick Start Guide

STIOffice Integration Installation, FAQ and Troubleshooting

AccessData Corporation AD Lab System Specification Guide v1.1

The user authentication process varies from client to client depending on internal resource capabilities, and client processes and procedures.

SANsymphony-V Storage Virtualization Software Installation and Getting Started Guide. February 5,

Name. Description. Rationale

StarterPak: Dynamics CRM Opportunity To NetSuite Sales Order

Implementing CiscoWorks LMS

TaskCentre v4.5 File Transfer (FTP) Tool White Paper

User Guide. Sysgem SysMan Remote Control. By Sysgem AG

Microsoft Certified Database Administrator (MCDBA)

SaaS Listing CA Cloud Service Management

IMPLEMENTING CISCO IP SWITCHED NETWORKS (SWITCH)

risk2value System Requirements

Integrating With incontact dbprovider & Screen Pops

Transcription:

Last updated by Admin at March 3, 2015. 1. What are the mst cmmn syslg messages? thse that ccur when a packet matches a parameter cnditin in an access cntrl list link up and link dwn messages utput messages that are generated frm debug utput errr messages abut hardware r sftware malfunctins 2. When lgging is used, which severity level indicates that a device is unusable? Alert Level 1 Critical Level 2 Emergency Level 0 Errr Level 3 3. Refer t the exhibit. Which tw cnclusins can be drawn frm the syslg message that was generated by the ruter? (Chse tw.) This message resulted frm an unusual errr requiring recnfiguratin f the interface. This message indicates that the interface shuld be replaced. This message is a level 5 ntificatin message. This message indicates that service timestamps have been cnfigured. This message indicates that the interface changed state five times. 4. A netwrk technician has issued the service timestamps lg datetime cmmand in the cnfiguratin f the branch ruter. Which additinal cmmand is required t include the date and time in lgged events? Branch1(cnfig)# service timestamps lg uptime Branch1# clck set 08:00:00 05 AUG 2013 Branch1(cnfig)# service timestamps debug datetime Branch1# cpy running-cnfig startup-cnfig

5. Refer t the exhibit. Frm what lcatin have the syslg messages been retrieved? syslg server syslg client ruter RAM ruter NVRAM 6. Refer t the exhibit. What des the number 17:46:26.143 represent? the time passed since the syslg server has been started the time when the syslg message was issued the time passed since the interfaces have been up the time n the ruter when the shw lgging cmmand was issued 7. Which destinatin d Cisc ruters and switches use by default when sending syslg messages fr all severity levels? cnsle nearest syslg server

NVRAM RAM 8. A netwrk administratr has issued the lgging trap 4 glbal cnfiguratin mde cmmand. What is the result f this cmmand? After fur events, the syslg client will send an event message t the syslg server. The syslg client will send t the syslg server any event message that has a severity level f 4 and higher. The syslg client will send t the syslg server any event message that has a severity level f 4 and lwer. The syslg client will send t the syslg server event messages with an identificatin trap level f nly 4. 9. Which statement describes SNMP peratin? An NMS peridically plls the SNMP agents that are residing n managed devices by using traps t query the devices fr data. A get request is used by the SNMP agent t query the device fr data. An SNMP agent that resides n a managed device cllects infrmatin abut the device and stres that infrmatin remtely in the MIB that is lcated n the NMS. A set request is used by the NMS t change cnfiguratin variables in the agent device. 10. What are SNMP trap messages? messages that are used by the NMS t query the device fr data unslicited messages that are sent by the SNMP agent and alert the NMS t a cnditin n the netwrk messages that are used by the NMS t change cnfiguratin variables in the agent device messages that are sent peridically by the NMS t the SNMP agents that reside n managed devices t query the device fr data 11. Which SNMP feature prvides a slutin t the main disadvantage f SNMP plling? SNMP set messages SNMP trap messages SNMP get messages SNMP cmmunity strings 12. When SNMPv1 r SNMPv2 is being used, which feature prvides secure access t MIB bjects? packet encryptin

message integrity cmmunity strings surce validatin 13. A netwrk administratr has issued the snmp-server user admin1 admin v3 encrypted auth md5 abc789 priv des 256 key99 cmmand. What are tw features f this cmmand? (Chse tw.) It adds a new user t the SNMP grup. It restricts SNMP access t defined SNMP managers. It frces the netwrk manager t lg int the agent t retrieve the SNMP messages. It uses the MD5 authenticatin f the SNMP messages. It allws a netwrk administratr t cnfigure a secret encrypted passwrd n the SNMP server. 14. Hw can SNMP access be restricted t a specific SNMP manager? Use the snmp-server cmmunity cmmand t cnfigure the cmmunity string with n access level. Specify the IP address f the SNMP manager by using the snmp-server hst cmmand. Use the snmp-server traps cmmand t enable traps n an SNMP manager. Define an ACL and reference it by using the snmp-server cmmunity cmmand. 15. A netwrk administratr issues tw cmmands n a ruter: R1(cnfig)# snmp-server hst 10.10.50.25 versin 2c campus R1(cnfig)# snmp-server enable traps What can be cncluded after the cmmands are entered? N traps are sent, because the ntificatin-types argument was nt specified yet. Traps are sent with the surce IP address as 10.10.50.25. If an interface cmes up, a trap is sent t the server. The snmp-server enable traps cmmand needs t be used repeatedly if a particular subset f trap types is desired.

16. Refer t the exhibit. What can be cncluded frm the prduced utput? An ACL was cnfigured t restrict SNMP access t an SNMP manager. This is the utput f the shw snmp cmmand withut any parameters. The system cntact was nt cnfigured with the snmp-server cntact cmmand. The lcatin f the device was nt cnfigured with the snmp-server lcatin cmmand. 17. What is a difference between SNMP and NetFlw? Unlike NetFlw, SNMP uses a push -based mdel. NetFlw cllects mre detailed traffic statistics n IP netwrks than SNMP des. SNMP nly gathers traffic statistics, whereas NetFlw can als cllect many ther perfrmance indicatrs, such as interface errrs and CPU usage. Unlike NetFlw, SNMP may be used t prvide IP accunting fr billing purpses. 18. Hw des NetFlw functin n a Cisc ruter r multilayer switch? Netflw captures and analyzes traffic. One user cnnectin t an applicatin exists as tw NetFlw flws. On 2960 switches, Netlw allws fr data exprt. NetFlw des nt cnsume any additinal memry. 19. Which type f infrmatin can an administratr btain with the shw ip cache flw cmmand? the NetFlw versin that is enabled whether NetFlw is cnfigured n the crrect interface and in the crrect directin the cnfiguratin f the exprt parameters the prtcl that uses the largest vlume f traffic 20. Which tw statements describe items t be cnsidered in cnfiguring NetFlw? (Chse tw.)

Netflw requires bth management and agent sftware. Netflw requires UDP prt 514 fr ntificatin messages. NetFlw cnsumes additinal memry. Netflw can nly be used in a unidirectinal flw. NetFlw can nly be used if all devices n the netwrk supprt it. 21. What is the mst cmmn purpse f implementing NetFlw in a netwrked envirnment? t supprt accunting and mnitring with cnsumer applicatins t actively capture traffic frm netwrked devices t mnitr live data usage and t cntrl traffic flw with set messages t passively capture changing events that ccur in the netwrk and t perfrm afterthe-fact-analysis 22. Refer t the exhibit. While planning an upgrade, a netwrk administratr uses the Cisc NetFlw utility t analyze data flw in the current netwrk. Which prtcl used the greatest amunt f netwrk time? TCP-Telnet TCP-FTP TCP-ther UDP-DNS UDP-ther 23. Fill in the blank. The syslg prtcl uses UDP prt 514 and is the mst cmmn methd t access system messages prvided by netwrking devices.