成长值: 65015
|
本帖最后由 小乔 于 2020-5-31 09:22 编辑 6 P- c& C k0 L6 }
& z) b2 T9 u, Q
1 Which function does an SNMP agent perform?+ x1 B/ A. I! I$ h
A It manages routing between Layer 3 devices in a network,
7 |! [" X; E) P/ T+ m1 V6 yB It coordinates user authentication between a network device and a TACACS+ or RADIUS server./ W' C3 F& H Z; u5 u4 Q& G( Y0 u( e
C It sends information about M1B variables in response to requests from the NMS.6 R& `7 y }: c% `
D It requests information from remote network nodes about catastrophic system events., a* ^0 }" D7 F; u
2 What are two reasons for an engineer to configure a floating static route? (Choose two.)
0 _/ ~2 L# ~& K# q4 lA to route traffic differently based on the source IP of the packet$ {6 O: a8 Z: o* h" n9 F7 n
B to enable fallback static routing when the dynamic routing protocol fails G1 _3 g+ r# l1 ]! ]
C to automatically route traffic on a secondary path when the primary path goes down. Z! o8 T! u- n6 Y$ N1 S
D to control the return path of traffic that is sent from the router% V# v2 ^ G" x4 c* U
E to support load balancing via static routing* J" y1 g* N/ g$ @% N
3 The service password-encryption command is entered on a router. What is the effect of this
4 N% K% `( R" H, _& @configuration?3 q# U! |2 O7 t, y5 a) a7 E
A restricts unauthorized users from viewing clear-text passwords in the running configuration0 a% d2 P4 e; f
B encrypts the password exchange when a VPN tunnel is established
1 j# Y! x4 P! H2 sC prevents network administrators from configuring clear-text passwords) |: D. R; K- z* H: N
D protects the VLAN database from unauthorized PC connections on the switch1 K$ O+ ^; G/ `9 P" O0 O, {* R
4
) W j; Z- J# u6 ^- S) rRefer to the exhibit.The network administrator wants VLAN 67 traffic to be untagged between# K& R/ Z- [ E7 O$ P
Switch 1 and Switch 2,while all other VLANs are to remain tagged,which command accomplishes
! z0 X+ C$ E X1 n; v$ nthis task ?
. s5 @1 X. ]& C0 f3 SA switchport access vlan 67) _6 Q8 w. x, p" q8 y8 |; D2 _) M
B switchport trunk allowed vlan 67/ B+ x* j/ [% s; I7 E0 W& \# ^. s
C switchport private-vlan association host 672 R0 T% t3 P/ a8 |3 i6 |8 D
D switchport trunk native vlan 679 J7 t7 {7 [/ J
5 What is a difference between RADIUS and TACACS+?
) m6 B2 q7 t ]& LA. TACACS+ encrypts only password information and RADIUS encrypts the entire payload- }$ r3 j7 F6 g6 ~% M# F% f8 {
B. RADIUS logs all commands that are entered by the administrator, but TACACS+ logs only start,
9 w8 Q$ |0 `9 m. ?/ Ystop, and interim commands
3 Q5 e, A1 e. ~: G5 bC. RADIUS is most appropriate for dial authentication, but TACACS+ can be used for multiple
) K1 r' }5 {( L# Otypes of
. h- \7 C& b; D g6 T2 sauthentication
G8 Q7 t$ e+ E* C9 \" `, n6 ]D. TACACS+ separates authentication and authorization, and RADIUS merges them% }3 Y0 }0 Q+ N' G
Answer: D
; M: I* z! a; f9 m6How does Cisco DNA Center gather data from the network?
: Q3 ]2 ~2 y: l) {! V- _/ Y( jA Devices establish an IPsec tunnel to exchange data with the controller.
2 G( C+ g' ^* x' Y; uB Devices use the call-home protocol to periodically send data to the controller.
' B( K/ d! i2 ?# O+ j; k5 fC Network devices use different services like SNMP, syslog, and streaming telemetry to send) K- D* J j5 F( F
data to the controller.
1 L6 x6 |8 n: O5 s' WD The Cisco CLI Analyzer tool gathers data from each licensed network device .and streams it to
* o) n& f( W3 a, pthe controller.
1 ^ h" |3 E" Y6 T+ f |
|