CCNA 4 v5.0 Connecting Networks Chapter 8 Exam
Quiz-summary
0 of 25 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
Information
CCNA 4 v5.0 Connecting Networks Chapter 8 Exam
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 25 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- Answered
- Review
-
Question 1 of 25
1. Question
Refer to the exhibit. Which two conclusions can be drawn from the syslog message that was generated by the router? (Choose two.)
Correct
Incorrect
-
Question 2 of 25
2. Question
A network technician has issued the service timestamps log datetime command in the configuration of the branch router. Which additional command is required to include the date and time in logged events?
Correct
Incorrect
-
Question 3 of 25
3. Question
Refer to the exhibit. From what location have the syslog messages been retrieved?
Correct
Incorrect
-
Question 4 of 25
4. Question
Refer to the exhibit. What does the number 17:46:26.143 represent?
Correct
Incorrect
-
Question 5 of 25
5. Question
What are SNMP trap messages?
Correct
Incorrect
-
Question 6 of 25
6. Question
How can SNMP access be restricted to a specific SNMP manager?
Correct
Incorrect
-
Question 7 of 25
7. Question
A network administrator issues two commands on a router:
R1(config)# snmp-server host 10.10.50.25 version 2c campus
R1(config)# snmp-server enable traps
What can be concluded after the commands are entered?Correct
Incorrect
-
Question 8 of 25
8. Question
What is a difference between SNMP and NetFlow?
Correct
Incorrect
-
Question 9 of 25
9. Question
How does NetFlow function on a Cisco router or multilayer switch?
Correct
Incorrect
-
Question 10 of 25
10. Question
Which type of information can an administrator obtain with the show ip cache flow command?
Correct
Incorrect
-
Question 11 of 25
11. Question
What is the most common purpose of implementing NetFlow in a networked environment?
Correct
Incorrect
-
Question 12 of 25
12. Question
Which destination do Cisco routers and switches use by default when sending syslog messages for all severity levels?
Correct
Incorrect
-
Question 13 of 25
13. Question
Which SNMP feature provides a solution to the main disadvantage of SNMP polling?
Correct
Incorrect
-
Question 14 of 25
14. Question
Which statement describes SNMP operation?
Correct
Incorrect
-
Question 15 of 25
15. Question
A network administrator has issued the logging trap 4 global configuration mode command. What is the result of this command?
Correct
Incorrect
-
Question 16 of 25
16. Question
When logging is used, which severity level indicates that a device is unusable?
Correct
Incorrect
-
Question 17 of 25
17. Question
Refer to the exhibit. While planning an upgrade, a network administrator uses the Cisco NetFlow utility to analyze data flow in the current network. Which protocol used the greatest amount of network time?
Correct
Incorrect
-
Question 18 of 25
18. Question
Which two statements describe items to be considered in configuring NetFlow? (Choose two.)
Correct
Incorrect
-
Question 19 of 25
19. Question
When SNMPvl or SNMPv2 is being used, which feature provides secure access to MIB objects?
Correct
Incorrect
-
Question 20 of 25
20. Question
Refer to the exhibit. What can be concluded from the produced output?
Correct
Incorrect
-
Question 21 of 25
21. Question
What are the most common syslog messages?
Correct
Incorrect
-
Question 22 of 25
22. Question
A network administrator has issued the snmp-server user adminl admin v3 encrypted auth md5 abc789 priv des 256 key99 command. What are two features of this command? (Choose two.)
Correct
Incorrect
-
Question 23 of 25
23. Question
Fill in the blank.
- The (syslog, SYSLOG, Syslog) protocol uses UDP port 514 and is the most common method to access system messages provided by networking devices.
Correct
Incorrect
-
Question 24 of 25
24. Question
When SNMPv1 or SNMPv2 is being used, which feature provides secure access to MIB objects?
Correct
Incorrect
-
Question 25 of 25
25. Question
A network administrator has issued the snmp-server user admin1 admin v3 encrypted auth md5 abc789 priv des 256 key99 command. What are two features of this command? (Choose two.)
Correct
Incorrect