You are on page 1of 5

CCNA 4 Chapter 8 v5 exam answers 2013

January 15, 2014 | Filed under: CCNA 4 Connecting Networks v5 0 Answers 201! and tagged wit": ccna 4 c"a#ter $ v5, CCNA 4 C"a#ter $ v5 e%a& answers 201!, cisco ccna v5 answers routing and switc"ing, connecting networks answers v5, e%a& ccna v5 answers '"are CCCNA 4 Chapter 8 v5 exam answers R&S Connecting Networks C('C) CCNA AN'*+,' -5 ,)./(N0 AN1 '*(/C2(N0 /+'/ 3.+'/()N AN1 AN'*+,' 201!42014

,e5er to t"e e%"i6it *"ic" two conclusions can 6e drawn 5ro& t"e syslog &essage t"at was generated 6y t"e router7 8C"oose two 9 /"is &essage resulted 5ro& an unusual error re:uiring recon5iguration o5 t"e inter5ace /"is &essage indicates t"at t"e inter5ace s"ould 6e re#laced his message is a !eve! 5 noti"ication message# his message in$icates that service timestamps have %een con"ig&re$# /"is &essage indicates t"at t"e inter5ace c"anged state 5ive ti&es 2 A network tec"nician "as issued t"e service ti&esta&#s log dateti&e co&&and in t"e con5iguration o5 t"e 6ranc" router *"ic" additional co&&and is re:uired to include t"e date and ti&e in logged events7 ;ranc"18con5ig9< service ti&esta&#s log u#ti&e 'ranch1( c!ock set 08)00)00 05 A*+ 2013 ;ranc"18con5ig9< service ti&esta&#s de6ug dateti&e ;ranc"1< co#y running4con5ig startu#4con5ig !

,e5er to t"e e%"i6it Fro& w"at location "ave t"e syslog &essages 6een retrieved7 syslog server syslog client ro&ter RA, router N-,A=

,e5er to t"e e%"i6it *"at does t"e nu&6er 1>:4?:2? 14! re#resent7 t"e ti&e #assed since t"e syslog server "as 6een started the time when the s-s!og message was iss&e$ t"e ti&e #assed since t"e inter5aces "ave 6een u# t"e ti&e on t"e router w"en t"e s"ow logging co&&and was issued 5 *"at are 'N=@ tra# &essages7 &essages t"at are used 6y t"e N=' to :uery t"e device 5or data &nso!icite$ messages that are sent %- the SN,. agent an$ a!ert the N,S to a con$ition on the network &essages t"at are used 6y t"e N=' to c"ange con5iguration varia6les in t"e agent device &essages t"at are sent #eriodically 6y t"e N=' to t"e 'N=@ agents t"at reside on &anaged devices to :uery t"e device 5or data ? 2ow can 'N=@ access 6e restricted to a s#eci5ic 'N=@ &anager7 .se t"e sn&#4server co&&unity co&&and to con5igure t"e co&&unity string wit" no access level '#eci5y t"e (@ address o5 t"e 'N=@ &anager 6y using t"e sn&#4server "ost co&&and .se t"e sn&#4server tra#s co&&and to ena6le tra#s on an 'N=@ &anager /e"ine an AC0 an$ re"erence it %- &sing the snmp1server comm&nit- comman$# > A network ad&inistrator issues two co&&ands on a router: ,18con5ig9< sn&#4server "ost 10 10 50 25 version 2c ca&#us ,18con5ig9< sn&#4server ena6le tra#s *"at can 6e concluded a5ter t"e co&&ands are entered7 No tra#s are sent, 6ecause t"e noti5ication4ty#es argu&ent was not s#eci5ied yet /ra#s are sent wit" t"e source (@ address as 10 10 50 25 2" an inter"ace comes &p3 a trap is sent to the server# /"e sn&#4server ena6le tra#s co&&and needs to 6e used re#eatedly i5 a #articular su6set o5 tra# ty#es is 2

desired $ *"at is a di55erence 6etween 'N=@ and NetFlow7 .nlike NetFlow, 'N=@ uses a A#us"B46ased &odel Net4!ow co!!ects more $etai!e$ tra""ic statistics on 2. networks than SN,. $oes# 'N=@ only gat"ers tra55ic statistics, w"ereas NetFlow can also collect &any ot"er #er5or&ance indicators, suc" as inter5ace errors and C@. usage .nlike NetFlow, 'N=@ &ay 6e used to #rovide (@ accounting 5or 6illing #ur#oses C 2ow does NetFlow 5unction on a Cisco router or &ultilayer switc"7 Net5low ca#tures and analyDes tra55ic 5ne &ser connection to an app!ication exists as two Net4!ow "!ows# )n 2C?0 switc"es, Netlow allows 5or data e%#ort NetFlow does not consu&e any additional &e&ory 10 *"ic" ty#e o5 in5or&ation can an ad&inistrator o6tain wit" t"e s"ow i# cac"e 5low co&&and7 t"e NetFlow version t"at is ena6led w"et"er NetFlow is con5igured on t"e correct inter5ace and in t"e correct direction t"e con5iguration o5 t"e e%#ort #ara&eters the protoco! that &ses the !argest vo!&me o" tra""ic 11 *"at is t"e &ost co&&on #ur#ose o5 i&#le&enting NetFlow in a networked environ&ent7 to s&pport acco&nting an$ monitoring with cons&mer app!ications to actively ca#ture tra55ic 5ro& networked devices to &onitor live data usage and to control tra55ic 5low wit" set &essages to #assively ca#ture c"anging events t"at occur in t"e network and to #er5or& a5ter4t"e45act4analysis 12 *"ic" destination do Cisco routers and switc"es use 6y de5ault w"en sending syslog &essages 5or all severity levels7 ,A= N-,A= nearest syslog server conso!e 1! *"ic" 'N=@ 5eature #rovides a solution to t"e &ain disadvantage o5 'N=@ #olling7 'N=@ co&&unity strings 'N=@ set &essages 'N=@ get &essages SN,. trap messages 14 *"ic" state&ent descri6es 'N=@ o#eration7 A get re:uest is used 6y t"e 'N=@ agent to :uery t"e device 5or data A set re6&est is &se$ %- the N,S to change con"ig&ration varia%!es in the agent $evice# An N=' #eriodically #olls t"e 'N=@ agents t"at are residing on &anaged devices 6y using tra#s to :uery t"e devices 5or data An 'N=@ agent t"at resides on a &anaged device collects in5or&ation a6out t"e device and stores t"at !

in5or&ation re&otely in t"e =(; t"at is located on t"e N=' 15 A network ad&inistrator "as issued t"e logging tra# 4 glo6al con5iguration &ode co&&and *"at is t"e result o5 t"is co&&and7 A5ter 5our events, t"e syslog client will send an event &essage to t"e syslog server /"e syslog client will send to t"e syslog server any event &essage t"at "as a severity level o5 4 and "ig"er /"e syslog client will send to t"e syslog server event &essages wit" an identi5ication tra# level o5 only 4 he s-s!og c!ient wi!! sen$ to the s-s!og server an- event message that has a severit- !eve! o" 4 an$ !ower# 1? *"en logging is used, w"ic" severity level indicates t"at a device is unusa6le7 Critical E Fevel 2 Alert E Fevel 1 7mergenc-10eve! 0 +rror4Fevel ! 1>

,e5er to t"e e%"i6it *"ile #lanning an u#grade, a network ad&inistrator uses t"e Cisco NetFlow utility to analyDe data 5low in t"e current network *"ic" #rotocol used t"e greatest a&ount o5 network ti&e7 /C@4F/@ /C@4/elnet .1@41N' /C@4ot"er */.1other 1$ *"ic" two state&ents descri6e ite&s to 6e considered in con5iguring NetFlow7 8C"oose two 9 Net5low re:uires 6ot" &anage&ent and agent so5tware NetFlow can only 6e used i5 all devices on t"e network su##ort it Net"!ow can on!- %e &se$ in a &ni$irectiona! "!ow# Net5low re:uires .1@ #ort 514 5or noti5ication &essages Net"!ow cons&mes a$$itiona! memor-#

1C *"en 'N=@vl or 'N=@v2 is 6eing used, w"ic" 5eature #rovides secure access to =(; o6Gects7 &essage integrity source validation comm&nit- strings #acket encry#tion 20

,e5er to t"e e%"i6it *"at can 6e concluded 5ro& t"e #roduced out#ut7 An AC0 was con"ig&re$ to restrict SN,. access to an SN,. manager# /"is is t"e out#ut o5 t"e s"ow sn&# co&&and wit"out any #ara&eters /"e syste& contact was not con5igured wit" t"e sn&# server contact co&&and 21 *"at are t"e &ost co&&on syslog &essages7 out#ut &essages t"at are generated 5ro& de6ug out#ut !ink&p an$ !ink $own messages t"ose t"at occur w"en a #acket &atc"es a #ara&eter condition in an access control list error &essages a6out "ardware or so5tware &al5unctions 22 A network ad&inistrator "as issued t"e sn&#4server user ad&inl ad&in v! encry#ted aut" &d5 a6c>$C #riv des 25? keyCC co&&and *"at are two 5eatures o5 t"is co&&and7 8C"oose two 9 (t 5orces t"e network &anager to log into t"e agent to retrieve t"e 'N=@ &essages (t restricts 'N=@ access to de5ined 'N=@ &anagers 2t &ses the ,/5 a&thentication o" the SN,. messages# (t allows a network ad&inistrator to con5igure a secret encry#ted #assword on t"e 'N=@ server 2t a$$s a new &ser to the SN,. gro&p# 2! Fill in t"e 6lank /"e s-s!og #rotocol uses .1@ #ort 514 and is t"e &ost co&&on &et"od to access syste& &essages #rovided 6y networking devices

You might also like