Podcast
Questions and Answers
What are two reasons for an administrator to issue the copy running-config tftp command on a switch or router? (Choose two.)
What are two reasons for an administrator to issue the copy running-config tftp command on a switch or router? (Choose two.)
What information can be gathered about a neighbor device from the show cdp neighbors detail command that cannot be found with the show cdp neighbors command?
What information can be gathered about a neighbor device from the show cdp neighbors detail command that cannot be found with the show cdp neighbors command?
When SNMPv1 or SNMPv2 is being used, which feature provides secure access to MIB objects?
When SNMPv1 or SNMPv2 is being used, which feature provides secure access to MIB objects?
What command must be issued on a Cisco router that will serve as an authoritative NTP server?
What command must be issued on a Cisco router that will serve as an authoritative NTP server?
Signup and view all the answers
Which protocol or service can be configured to send unsolicited messages to alert the network administrator about a network event such as an extremely high CPU utilization on a router?
Which protocol or service can be configured to send unsolicited messages to alert the network administrator about a network event such as an extremely high CPU utilization on a router?
Signup and view all the answers
Which statement describes a syslog message severity level?
Which statement describes a syslog message severity level?
Signup and view all the answers
What is an SNMP management agent?
What is an SNMP management agent?
Signup and view all the answers
What are two characteristics of SNMP community strings? (Choose two.)
What are two characteristics of SNMP community strings? (Choose two.)
Signup and view all the answers
A network administrator issues the copy tftp running-config command on a router. What is the administrator trying to achieve?
A network administrator issues the copy tftp running-config command on a router. What is the administrator trying to achieve?
Signup and view all the answers
What is a characteristic of the MIB?
What is a characteristic of the MIB?
Signup and view all the answers
What data would be saved and where would the data be placed if a network administrator issued the following command? (Choose two.)
R1# copy startup-config tftp
What data would be saved and where would the data be placed if a network administrator issued the following command? (Choose two.)
R1# copy startup-config tftp
Signup and view all the answers
Which command would a network engineer use to restore the IOS image c1900-universalk9-mz.SPA.152-4.M3.bin to a router?
Which command would a network engineer use to restore the IOS image c1900-universalk9-mz.SPA.152-4.M3.bin to a router?
Signup and view all the answers
Why would a network administrator issue the show cdp neigbors command on a router?
Why would a network administrator issue the show cdp neigbors command on a router?
Signup and view all the answers
What are SNMP trap messages?
What are SNMP trap messages?
Signup and view all the answers
Which of the following is one difference between CDP and LLDP?
Which of the following is one difference between CDP and LLDP?
Signup and view all the answers
A network administrator wants to configure a router so that only a specific interface will send and receive CDP information. Which two configuration steps accomplish this? (Choose two.)
A network administrator wants to configure a router so that only a specific interface will send and receive CDP information. Which two configuration steps accomplish this? (Choose two.)
Signup and view all the answers
What is the configuration command to globally enable LLDP on a Cisco Catalyst switch?
What is the configuration command to globally enable LLDP on a Cisco Catalyst switch?
Signup and view all the answers
Which option correctly enables LLDP on an interface?
Which option correctly enables LLDP on an interface?
Signup and view all the answers
What are the most common syslog messages?
What are the most common syslog messages?
Signup and view all the answers
Which syslog logging severity level indicates that a device is unusable?
Which syslog logging severity level indicates that a device is unusable?
Signup and view all the answers
Which protocol or service allows network administrators to receive system messages that are provided by network devices?
Which protocol or service allows network administrators to receive system messages that are provided by network devices?
Signup and view all the answers
Which syslog message type is accessible only to an administrator via the Cisco CLI?
Which syslog message type is accessible only to an administrator via the Cisco CLI?
Signup and view all the answers
Which default destination do Cisco routers and switches use to send Syslog messages?
Which default destination do Cisco routers and switches use to send Syslog messages?
Signup and view all the answers
What is the result of configuring the logging trap 4 global configuration command?
What is the result of configuring the logging trap 4 global configuration command?
Signup and view all the answers
The ntp server 10.1.1.1 global configuration command is issued on router R1. What impact does this command have?
The ntp server 10.1.1.1 global configuration command is issued on router R1. What impact does this command have?
Signup and view all the answers
Which two statements are true about NTP servers in an enterprise network? (Choose two.)
Which two statements are true about NTP servers in an enterprise network? (Choose two.)
Signup and view all the answers
What can a network administrator do to access a router if the password has been lost?
What can a network administrator do to access a router if the password has been lost?
Signup and view all the answers
What is the result of configuring the confreg 0x2142 command at the rommon 1> prompt?
What is the result of configuring the confreg 0x2142 command at the rommon 1> prompt?
Signup and view all the answers
A network technician is attempting a password recovery on a router. From ROMMON mode, which command must be entered to bypass the startup configuration file?
A network technician is attempting a password recovery on a router. From ROMMON mode, which command must be entered to bypass the startup configuration file?
Signup and view all the answers
What must an administrator have in order to reset a lost password on a router?
What must an administrator have in order to reset a lost password on a router?
Signup and view all the answers
A network engineer is upgrading the Cisco IOS image on a 2900 Series ISR. What command could the engineer use to verify the total amount of flash memory as well as how much flash memory is currently available?
A network engineer is upgrading the Cisco IOS image on a 2900 Series ISR. What command could the engineer use to verify the total amount of flash memory as well as how much flash memory is currently available?
Signup and view all the answers
Which two conditions should a network administrator verify before attempting to upgrade a Cisco IOS image using a TFTP server? (Choose two.)
Which two conditions should a network administrator verify before attempting to upgrade a Cisco IOS image using a TFTP server? (Choose two.)
Signup and view all the answers
Which statement describes SNMP operation?
Which statement describes SNMP operation?
Signup and view all the answers
Which SNMP feature provides a solution to the main disadvantage of SNMP polling?
Which SNMP feature provides a solution to the main disadvantage of SNMP polling?
Signup and view all the answers
Which SNMP version uses weak community stringbased access control and supports bulk retrieval?
Which SNMP version uses weak community stringbased access control and supports bulk retrieval?
Signup and view all the answers
Study Notes
Network Management Quiz Answers
-
Question 1: Two reasons for using
copy running-config tftp
command- Transferring the running configuration file to a server
- Saving the running configuration to a remote location (TFTP server)
-
Question 2: Information about a neighbor from
show cdp neighbors detail
but notshow cdp neighbors
- The neighbor's IP address
-
Question 3: Feature providing secure access to MIB objects with SNMPv1 or SNMPv2
- Community strings
-
Question 4: Command for a Cisco router to be an authoritative NTP server
-
ntp master 1
-
-
Question 5: Protocol/service for sending unsolicited messages about network events (e.g., high CPU)
- SNMP
-
Question 6: Statement regarding syslog message severity levels
- Severity level 0 is the most critical severity level
-
Question 7: Definition of an SNMP management agent
- Software installed on managed devices for SNMP management
-
Question 8: Two characteristics of SNMP community strings
- Read-only community strings can retrieve information from an SNMP-enabled device
- Read-write community strings can set data on an SNMP-enabled device
-
Question 9: Purpose of
copy tftp running-config
command on a router- Copy the running configuration file from the TFTP server to the router's RAM
-
Question 10: Characteristic of the MIB
- Organized in a hierarchical structure (OID)
-
Question 11: Data saved and location if
copy startup-config tftp
is issued- Configuration data stored in NVRAM is copied to a TFTP server
-
Question 12: Command to restore IOS image
-
copy tftp: flash0:
-
-
Question 13: Purpose of
show cdp neighbors
command- Displaying device ID and other information about directly connected Cisco devices
-
Question 14: Definition of SNMP trap messages
- Unsolicited messages sent by an agent to an NMS about network conditions
-
Question 15: Difference between CDP and LLDP
- CDP is a proprietary protocol, whereas LLDP is vendor-neutral
-
Question 16: Configuration steps to restrict CDP on an interface
-
no cdp enable
at global andcdp enable
at the interface level
-
-
Question 17: Command to globally enable LLDP on a Cisco Catalyst switch
-
Ildp run
-
-
Question 18: Command to enable LLDP on an interface
-
R1(config-if)# Ildp receive
-
R1(config-if)# Ildp transmit
-
-
Question 19: Common syslog messages
- Link up and link down messages
-
Question 20: Syslog logging severity level indicating unusability
- Level 0-Emergency
-
Question 21: Protocol for network devices to send system messages
- Syslog
-
Question 22: Syslog message type only accessible via CLI
- Debug
-
Question 23: Default destination for Cisco router/switch syslog messages
- Console
-
Question 24: Result of
logging trap 4
configuration command- Syslog client sends messages to the server with severity level 4 or lower
-
Question 25: Impact of
ntp server 10.1.1.1
command on router R1- Synchronizes the clock on R1 with the time server at IP address 10.1.1.1
-
Question 26: Two true statements about NTP servers
- NTP servers at stratum 1 are directly connected to an authoritative time source.
- NTP servers ensure accurate timestamps for logging and debugging.
-
Question 27: Action to access a router if password is lost
- Boot into ROMMON mode and ignore the startup configuration
-
Question 28: Result of
confreg 0x2142
command- Contents in NVRAM are ignored
-
Question 29: Command to bypass startup configuration in ROMMON
-
confreg 0x2102
-
-
Question 30: Requirement to reset a lost router password
- Physical access to the router
-
Question 31: Command to verify flash memory details
-
show flash0
-
-
Question 32: Two conditions to verify before upgrading IOS via TFTP
- Verify connectivity between the router and the TFTP server using ping
- Verify there is enough flash memory for the new IOS using show flash command
-
Question 33: Statement describing SNMP operation
- The NMS uses a set request to change configuration variables in the agent device.
-
Question 34: SNMP feature to solve polling disadvantage
- SNMP trap messages
-
Question 35: SNMP version using weak community strings and bulk retrieval
- SNMPv2c
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your knowledge on essential network management commands and protocols. This quiz covers topics such as TFTP, SNMP, NTP, and syslog message severity levels. Perfect for networking students and professionals looking to refresh their skills.