Sie sind auf Seite 1von 9

QUESTION 227

Which three statements about the features of SNMPv2 and SNMPv3 are true? (Choose three.)
A.
B.
C.
D.
E.
F.

SNMPv3 enhanced SNMPv2 security features.


SNMPv3 added the Inform protocol message to SNMP.
SNMPv2 added the Inform protocol message to SNMP.
SNMPv3 added the GetBulk protocol messages to SNMP.
SNMPv2 added the GetBulk protocol message to SNMP.
SNMPv2 added the GetNext protocol message to SNMP.

Correct Answer: ACE


Section: (none)
Explanation
Explanation/Reference:
Explanation: SNMPv1/v2 can neither authenticate the source of a management message nor provide encryption. Without authentication, it is possible
for nonauthorized users to exercise SNMP network management functions. It is also possible for nonauthorized users to eavesdrop on management
information as it passes from managed systems to the management system. Because of these deficiencies, many SNMPv1/v2 implementations are
limited to simply a readonly capability, reducing their utility to that of a network monitor; no network control applications can be supported. To correct the
security deficiencies of SNMPv1/v2, SNMPv3 was issued as a set of Proposed Standards in January 1998. -> A is correct. The two additional messages
are added in SNMP2 (compared to SNMPv1) GetBulkRequest The GetBulkRequest message enables an SNMP manager to access large
"Best Material, Great Results". www.certkingdom.com 192 200-120
chunks of data. GetBulkRequest allows an agent to respond with as much information as will fit in the response PDU. Agents that cannot provide
values for all variables in a list will send partial information. -> E is correct.
InformRequest The InformRequest message allows NMS stations to share trap information. (Traps are issued by SNMP agents when a device
change occurs.) InformRequest messages are generally used between NMS stations, not between NMS stations and agents. -> C is correct.
Note: These two messages are carried over SNMPv3.

QUESTION 228
What are three reasons to collect Netflow data on a company network? (Choose three.)
A.
B.
C.
D.
E.
F.

To identify applications causing congestion.


To authorize user network access.
To report and alert link up / down instances.
To diagnose slow network performance, bandwidth hogs, and bandwidth utilization.
To detect suboptimal routing in the network.
To confirm the appropriate amount of bandwidth that has been allocated to each Class of Service.

Correct Answer: ADF


Section: (none)
Explanation
Explanation/Reference:
Explanation:
NetFlow facilitates solutions to many common problems encountered by IT
professionals. + Analyze new applications and their network impact
Identify new application network loads such as VoIP or remote site
additions. + Reduction in peak WAN traffic
Use NetFlow statistics to measure WAN traffic improvement from application-policy changes; understand who is utilizing the network and the network
top talkers. + Troubleshooting and understanding network pain points Diagnose slow network performance, bandwidth hogs and bandwidth utilization
quickly with command line interface or reporting tools. -> D is correct.
+ Detection of unauthorized WAN traffic
Avoid costly upgrades by identifying the applications causing congestion. -> A is
correct. + Security and anomaly detection
NetFlow can be used for anomaly detection and worm diagnosis along with applications such as Cisco CSMars. + Validation of QoS parameters
Confirm that appropriate bandwidth has been allocated to each Class of Service (CoS) and that no CoS is over- or under-subscribed.-> F is correct.
QUESTION 229
What Netflow component can be applied to an interface to track IPv4 traffic?
A. flow monitor
B. flow record
C. flow sampler
"Best Material, Great Results". www.certkingdom.com 193 200-120
D. flow exporter
Correct Answer: A
Section: (none)

Explanation
Explanation/Reference:
Explanation: Flow monitors are the Flexible NetFlow component that is applied to interfaces to perform network traffic monitoring. Flow monitors
consist of a record and a cache. You add the record to the flow monitor after you create the flow monitor. The flow monitor cache is automatically
created at the time the flow monitor is applied to the first interface. Flow data is collected from the network traffic during the monitoring process based
on the key and nonkey fields in the record, which is configured for the flow monitor and stored in the flow monitor cache. For example, the following
example creates a flow monitor named FLOW-MONITOR-1 and enters Flexible NetFlow flow monitor configuration mode:
Router(config)# flow monitor FLOW-MONITOR1 Router(config-flow-monitor)#
QUESTION 230
What Cisco IOS feature can be enabled to pinpoint an application that is causing slow network performance?
A.
B.
C.
D.

SNMP
Netflow
WCCP
IP SLA

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 231
What command visualizes the general NetFlow data on the command line?
A.
B.
C.
D.
E.

show ip flow export


show ip flow top-talkers
show ip cache flow
show mls sampling
show mls netflow ip

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation: The "show ip cache flow" command displays a summary of the NetFlow accounting statistics.

"Best Material, Great Results". www.certkingdom.com 194 200-120

QUESTION 232
What are three values that must be the same within a sequence of packets for Netflow to consider them a network flow? (Choose three.)
A.
B.
C.
D.

source IP address
source MAC address
egress interface
ingress interface

E. destination IP address
F. IP next-hop
Correct Answer: ADE
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 233
What are three factors a network administrator must consider before implementing Netflow in the network? (Choose three.)
A. CPU utilization
B. where Netflow data will be sent
C. number of devices exporting Netflow data
"Best Material, Great Results". www.certkingdom.com 195 200-120
D. port availability
E. SNMP version
F. WAN encapsulation
Correct Answer: ABC
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 234
Refer to the exhibit.

A network administrator is configuring an EtherChannel between SW1 and SW2. The SW1 configuration is shown. What is the correct configuration
for SW2?
A. interface FastEthernet 0/1 channelgroup 1 mode active switchport
trunk encapsulation dot1q
switchport mode trunk
interface FastEthernet 0/2 channelgroup 1 mode active switchport
trunk encapsulation dot1q
switchport mode trunk
B. interface FastEthernet 0/1 channelgroup 2 mode auto switchport trunk
encapsulation dot1q switchport
mode trunk
interface FastEthernet 0/2 channelgroup 2 mode auto switchport trunk
encapsulation dot1q switchport
mode trunk
C. interface FastEthernet 0/1
"Best Material, Great Results". www.certkingdom.com 196 200-120
channel-group 1 mode desirable
switchport trunk encapsulation dot1q
switchport mode trunk

interface FastEthernet 0/2 channelgroup 1 mode desirable switchport


trunk encapsulation dot1q
switchport mode trunk
D. interface FastEthernet 0/1 channelgroup 1 mode passive switchport
trunk encapsulation dot1q
switchport mode trunk
interface FastEthernet 0/2 channelgroup 1 mode passive switchport
trunk encapsulation dot1q
switchport mode trunk
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 235
Which two statements about the OSPF Router ID are true? (Choose two.)
A.
B.
C.
D.
E.

It identifies the source of a Type 1 LSA.


It should be the same on all routers in an OSPF routing instance.
By default, the lowest IP address on the router becomes the OSPF Router ID.
The router automatically chooses the IP address of a loopback as the OSPF Router ID.
It is created using the MAC Address of the loopback interface.

Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 236
What parameter can be different on ports within an EtherChannel?
A. speed
B. DTP negotiation settings

C. trunk encapsulation
D. duplex
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
"Best Material, Great Results". www.certkingdom.com 197 200-120
QUESTION 237
What are two benefits of using a single OSPF area network design? (Choose two.)
A.
B.
C.
D.
E.

It is less CPU intensive for routers in the single area.


It reduces the types of LSAs that are generated.
It removes the need for virtual links.
It increases LSA response times.
It reduces the number of required OSPF neighbor adjacencies.

Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
Explanation:

Das könnte Ihnen auch gefallen