Javascript required
Skip to content Skip to sidebar Skip to footer

Refer to the Exhibit. What Does the Number 17:46:26.143 Represent?

Last Updated on May 20, 2021 past

CCNA4 Affiliate 8 Exam (v5.03) Reply 2016

  1. What are the most common syslog messages?

    • those that occur when a parcel matches a parameter condition in an access control list
    • link upwards and link down messages
    • output messages that are generated from debug output
    • error messages about hardware or software malfunctions
  2. When logging is used, which severity level indicates that a device is unusable?

    • Alarm – Level 1
    • Critical – Level 2
    • Emergency – Level 0
    • Fault – Level 3
  3. The command ntp server 10.1.1.1 is issued on a router. What bear upon does this command have?

    • determines which server to send system log files to
    • identifies the server on which to store backup configurations
    • ensures that all logging will have a time stamp associated with it
    • synchronizes the clock of the device to the timeserver that is located at IP address 10.one.1.1
  4. Which protocol or service allows network administrators to receive arrangement messages that are provided by network devices?

    • syslog
    • NTP
    • SNMP
    • NetFlow
  5. Which syslog bulletin type is accessible only to an ambassador and only via the Cisco CLI?

    • errors
    • debugging
    • emergency
    • alerts
  6. Refer to the exhibit. From what location have the syslog messages been retrieved?

    CCNA4 Chapter 8 Exam (v5.03) 002
    CCNA4 Affiliate viii Exam (v5.03) 002
    • syslog server
    • syslog client
    • router RAM
    • router NVRAM
  7. Refer to the showroom. What does the number 17:46:26.143 stand for?

    CCNA4 Chapter 8 Exam (v5.03) 003
    CCNA4 Chapter 8 Exam (v5.03) 003
    • the time passed since the syslog server has been started
    • the time when the syslog message was issued
    • the time passed since the interfaces have been up
    • the time on the router when the show logging control was issued
  8. Which destination do Cisco routers and switches use by default when sending syslog messages for all severity levels?

    • panel
    • nearest syslog server
    • NVRAM
    • RAM
  9. A network ambassador has issued the logging trap four global configuration mode command. What is the result of this command?

    • After four events, the syslog client volition send an result message to the syslog server.
    • The syslog client will send to the syslog server whatsoever issue message that has a severity level of 4 and college.
    • The syslog client will transport to the syslog server any effect message that has a severity level of 4 and lower.
    • The syslog client volition send to the syslog server issue messages with an identification trap level of simply 4.
  10. Which statement describes SNMP operation?

    • An NMS periodically polls the SNMP agents that are residing on managed devices past using traps to query the devices for information.
    • A get request is used past the SNMP amanuensis to query the device for data.
    • An SNMP amanuensis that resides on a managed device collects information most the device and stores that information remotely in the MIB that is located on the NMS.
    • A set asking is used past the NMS to change configuration variables in the agent device.
  11. Which SNMP feature provides a solution to the chief disadvantage of SNMP polling?

    • SNMP set messages
    • SNMP trap letters
    • SNMP go letters
    • SNMP community strings
  12. When SNMPv1 or SNMPv2 is existence used, which feature provides secure admission to MIB objects?

    • packet encryption
    • message integrity
    • customs strings
    • source validation
  13. Which SNMP version uses weak community string-based admission control and supports majority retrieval?

    • SNMPv2c
    • SNMPv1
    • SNMPv2Classic
    • SNMPv3
  14. Which protocol or service tin can be configured to send unsolicited messages to alert the network administrator nigh a network event such equally an extremely loftier CPU utilization on a router?

    • SNMP
    • syslog
    • NTP
    • NetFlow
  15. A network administrator has issued the snmp-server user admin1 admin v3 encrypted auth md5 abc789 priv des 256 key99 command. What are 2 features of this control? (Cull two.)

    • Information technology adds a new user to the SNMP group.
    • It restricts SNMP access to defined SNMP managers.
    • It forces the network manager to log into the agent to retrieve the SNMP messages.
    • It uses the MD5 authentication of the SNMP messages.
    • It allows a network administrator to configure a cloak-and-dagger encrypted password on the SNMP server.
  16. A network ambassador problems ii commands on a router:

    R1(config)# snmp-server host 10.x.50.25 version 2c campus

    R1(config)# snmp-server enable traps

    What can exist concluded after the commands are entered?

    • No traps are sent, because the notification-types argument was non specified yet.
    • Traps are sent with the source IP address as ten.10.50.25.
    • If an interface comes upwards, a trap is sent to the server.
    • The snmp-server enable traps command needs to exist used repeatedly if a particular subset of trap types is desired.
  17. Refer to the exhibit. What can exist concluded from the produced output?

    CCNA4 Chapter 8 Exam (v5.03) 004
    CCNA4 Chapter 8 Exam (v5.03) 004
    • An ACL was configured to restrict SNMP access to an SNMP manager.
    • This is the output of the show snmp command without any parameters.
    • The system contact was not configured with the snmp-server contact command.
    • The location of the device was non configured with the snmp-server location command.
  18. Which protocol is used by network administrators to rail and gather statistics on TCP/IP packets that are entering or exiting network devices?

    • NetFlow
    • SNMP
    • NTP
    • syslog
  19. How does NetFlow role on a Cisco router or multilayer switch?

    • Netflow captures and analyzes traffic.
    • One user connectedness to an awarding exists as 2 NetFlow flows.
    • On 2960 switches, Netlow allows for data export.
    • NetFlow does non consume whatsoever additional memory.
  20. Which blazon of information tin an ambassador obtain with the show ip cache flow command?

    • the NetFlow version that is enabled
    • whether NetFlow is configured on the correct interface and in the correct direction
    • the configuration of the consign parameters
    • the protocol that uses the largest book of traffic
  21. Which ii statements depict items to be considered in configuring NetFlow? (Cull 2.)

    • Netflow requires both direction and amanuensis software.
    • Netflow requires UDP port 514 for notification letters.
    • NetFlow consumes boosted memory.
    • Netflow can only be used in a unidirectional menses.
    • NetFlow can only be used if all devices on the network support it.
  22. What is the most common purpose of implementing NetFlow in a networked environment?

    • to support accounting and monitoring with consumer applications
    • to actively capture traffic from networked devices
    • to monitor alive information usage and to control traffic flow with set messages
    • to passively capture changing events that occur in the network and to perform after-the-fact-assay
  23. Refer to the exhibit. While planning an upgrade, a network administrator uses the Cisco NetFlow utility to analyze data menses in the current network. Which protocol used the greatest amount of network fourth dimension?

    CCNA4 Chapter 7 Exam (v5.03) 002
    CCNA4 Chapter seven Test (v5.03) 002
    • TCP-Telnet
    • TCP-FTP
    • TCP-other
    • UDP-DNS
    • UDP-other

clelanddessitheigh78.blogspot.com

Source: https://www.pressexam.com/ccna4-v5-03/ccna4-chapter-8-exam-v5-03/