成长值: 64675
|
本帖最后由 小乔 于 2020-5-31 09:22 编辑 A& K9 _! ?% N$ t
# Z" N" U; B1 B- [1 Which function does an SNMP agent perform?
1 s. I/ X5 U" p0 H0 q; B9 N6 CA It manages routing between Layer 3 devices in a network,
$ f3 D o; S7 c6 H1 MB It coordinates user authentication between a network device and a TACACS+ or RADIUS server.( L& R) \- v* { c' i% t
C It sends information about M1B variables in response to requests from the NMS.; {! ~+ c' T) W9 _* A
D It requests information from remote network nodes about catastrophic system events." \% j; D8 U- z
2 What are two reasons for an engineer to configure a floating static route? (Choose two.)
0 H0 h) e+ r6 s. tA to route traffic differently based on the source IP of the packet/ A; J, U* e+ V, u# N
B to enable fallback static routing when the dynamic routing protocol fails
. `) n2 v* X! @" ZC to automatically route traffic on a secondary path when the primary path goes down
5 c$ c2 _% S# Y/ Q5 M* |! e, |' yD to control the return path of traffic that is sent from the router( f* Q( a1 I7 v: |5 S" p7 C, z
E to support load balancing via static routing) S/ i+ q( u# q
3 The service password-encryption command is entered on a router. What is the effect of this
; i/ i8 J% I6 {* rconfiguration?, Y& f+ t+ {7 y) I/ R$ j
A restricts unauthorized users from viewing clear-text passwords in the running configuration( F5 G& `) n2 {. U; p$ O$ Z9 Y
B encrypts the password exchange when a VPN tunnel is established
( A% c) ^7 w# K, w% ~; WC prevents network administrators from configuring clear-text passwords
; a6 \, J* k5 ]# N8 n5 N8 m- dD protects the VLAN database from unauthorized PC connections on the switch
' G2 j4 [% [" T: A' z+ P4
/ L) h& Y9 _* G& MRefer to the exhibit.The network administrator wants VLAN 67 traffic to be untagged between$ I+ P A* l+ P, f7 G3 k
Switch 1 and Switch 2,while all other VLANs are to remain tagged,which command accomplishes4 V; z8 r' Y& e( t
this task ?
" q/ _5 c/ `. H. y6 }A switchport access vlan 67( b( R. w& f. ]. [
B switchport trunk allowed vlan 67
: _: v: @& I9 R3 y& BC switchport private-vlan association host 671 I) d# m! z4 J; v. Y
D switchport trunk native vlan 67$ ]% u+ B9 P' B. D% x/ [
5 What is a difference between RADIUS and TACACS+?
/ `0 ] L4 j6 Q! cA. TACACS+ encrypts only password information and RADIUS encrypts the entire payload
3 j# E$ E; f+ z# R$ P Q4 J! F8 yB. RADIUS logs all commands that are entered by the administrator, but TACACS+ logs only start,, g6 R1 p1 p5 i; U% ]# x
stop, and interim commands; k% _. t' [: {6 q! S% b. g1 v' G
C. RADIUS is most appropriate for dial authentication, but TACACS+ can be used for multiple) i7 ?5 k3 Y* S ~
types of
+ x5 ^2 p9 x* e1 Z3 y" \authentication
' `- u0 ?% l) g; j2 yD. TACACS+ separates authentication and authorization, and RADIUS merges them
# a( M) D9 `* ?0 R$ C; t1 N! uAnswer: D
. F8 P+ c+ z3 c4 v' z6How does Cisco DNA Center gather data from the network?1 C5 O( [$ F7 }6 B
A Devices establish an IPsec tunnel to exchange data with the controller.
2 Z+ v% \$ h. `, q# O$ HB Devices use the call-home protocol to periodically send data to the controller.
. M' s3 ]9 R. f/ r0 ]- qC Network devices use different services like SNMP, syslog, and streaming telemetry to send; u$ `" t$ P* A8 l, m
data to the controller.
1 v) T% \- K; G, ?, ~" LD The Cisco CLI Analyzer tool gathers data from each licensed network device .and streams it to& ?7 Q- y9 e$ X/ C( \
the controller.
0 y" _' m% c8 {, a# {( ]* A |
|