成长值: 64000
|
本帖最后由 小乔 于 2020-5-31 09:22 编辑 # j" [1 n5 t1 Z( o
# D4 |" r- |$ w- p s* v; L1 Which function does an SNMP agent perform?
8 l' a! z# Q9 j9 @, NA It manages routing between Layer 3 devices in a network,
# X* q+ H, `( q4 h* r( cB It coordinates user authentication between a network device and a TACACS+ or RADIUS server.1 v" r" ?6 y! J+ B7 z1 m, y. _) J
C It sends information about M1B variables in response to requests from the NMS.
' G/ T7 A* K: b$ j1 b) VD It requests information from remote network nodes about catastrophic system events.
( R( Q; _! X: ^* ?/ ^# Q2 What are two reasons for an engineer to configure a floating static route? (Choose two.)
0 I( N' r* L5 m2 K5 DA to route traffic differently based on the source IP of the packet
1 Q0 ^8 k5 J- p$ x3 ?% s! h# w, [B to enable fallback static routing when the dynamic routing protocol fails# c( C* j4 i: _5 f d+ Z
C to automatically route traffic on a secondary path when the primary path goes down
0 b' L D* ?. _& q l6 g; R' @D to control the return path of traffic that is sent from the router' x+ d* m6 ` G- n0 v0 ^$ B1 F" T
E to support load balancing via static routing
( V6 D+ F* w4 y! w3 The service password-encryption command is entered on a router. What is the effect of this
( |8 Z* g: S4 ~6 xconfiguration?" U5 H$ H$ [# f, u3 E1 @+ R g7 ^
A restricts unauthorized users from viewing clear-text passwords in the running configuration
9 r, f0 s. r. X- o" G9 g: k: PB encrypts the password exchange when a VPN tunnel is established
3 B5 }4 S% L# {% TC prevents network administrators from configuring clear-text passwords6 b% E% D* J2 T( l
D protects the VLAN database from unauthorized PC connections on the switch$ d+ f6 @4 M# g' c9 b9 w
4
3 `2 E$ X2 A5 t- w. e URefer to the exhibit.The network administrator wants VLAN 67 traffic to be untagged between
1 Y a( t. l, t2 w' c, t0 xSwitch 1 and Switch 2,while all other VLANs are to remain tagged,which command accomplishes
1 f# X% m; O; ] r& m% A& Wthis task ?) f- t* s* @( {9 t+ f2 x7 N1 d- Z) Y
A switchport access vlan 673 ]3 f: ~5 \: T2 q3 X7 c; y
B switchport trunk allowed vlan 67* L8 ^/ M$ m: L
C switchport private-vlan association host 67
0 D D( n& J7 e7 B$ k7 \D switchport trunk native vlan 674 m: _+ [, p/ t2 q+ Q
5 What is a difference between RADIUS and TACACS+?
: e1 E$ L- ]3 J: O: I7 {A. TACACS+ encrypts only password information and RADIUS encrypts the entire payload
) |5 j2 G: t( Z: M2 Y4 uB. RADIUS logs all commands that are entered by the administrator, but TACACS+ logs only start,
5 R: \/ I0 ] y$ O; \5 \0 K3 R' ?stop, and interim commands
7 \1 u( D* R, T- w0 |6 AC. RADIUS is most appropriate for dial authentication, but TACACS+ can be used for multiple p- l0 Y# K9 |- a% I0 L
types of
" K8 N3 y7 K8 C5 E7 lauthentication
/ F8 A% R1 `! @% J& TD. TACACS+ separates authentication and authorization, and RADIUS merges them
# U, N- E( ^+ G8 S/ T3 }Answer: D# s& f) I. u2 l! O9 K' O4 g3 N
6How does Cisco DNA Center gather data from the network?
; n7 J1 u3 b, s6 EA Devices establish an IPsec tunnel to exchange data with the controller.' O+ D S0 I+ w6 a# g
B Devices use the call-home protocol to periodically send data to the controller.+ C7 C4 D t4 r
C Network devices use different services like SNMP, syslog, and streaming telemetry to send. r3 U2 p/ d$ G; y( ]2 {; ]
data to the controller.
6 T: h& t7 [3 Q" v5 [$ MD The Cisco CLI Analyzer tool gathers data from each licensed network device .and streams it to
- f. v! w4 r; q* U: c% bthe controller.
4 J& `4 B6 E8 L7 w: {2 v% s" c |
|