IP Services

drepitts8's version from 2016-02-08 19:25

Section 1

Question Answer
Which one of these is a valid HSRP Virtual Mac Address?0000.0c07.ac0c
What Cisco IOS feature can be enabled to pinpoint an application that is causing slow network performance? Your Answer: Netflow
What are three reasons to collect Netflow data on a company network? To identify applications causing congestion. To diagnose slow network performance, bandwidth hogs, and bandwidth utilization. To confirm the appropriate amount of bandwidth that has been allocated to each Class of Service. Explanation:
NetFlowan embedded instrumentation within Cisco IOS Software to categorize and track network traffic.
Which three statements about the features of SNMPv2 and SNMPv3 are true?SNMPv3 enhanced SNMPv2 security features. SNMPv2 added the Inform protocol message to SNMP. SNMPv2 added the GetBulk protocol message to SNMP.
In GLBP, which router will respond to client ARP requests?The active virtual gateway will reply with one of four possible virtual MAC addresses.

Section 2

Question Answer
What happens when computers on a private network attempt to connect to the Internet through a Cisco router running PAT?The router uses the same IP address but a different TCP source port number for each connection.
What command instructs the device to timestamp Syslog debug messages in milliseconds?service timestamps debug datetime msec
what are three values that must be the same within a sequence of packets for Netflow to consider them a network flow?Source IP address Ingress interface Destination IP address
A network administrator enters the following command on a router: logging trap 3 What are three message types that will be sent to the Syslog server? Emergency Critical Error
Which statement is correct regarding the operation of DHCP?If an address conflict is detected, the address is removed from the pool and an administrator must resolve the conflict.

Section 3

Question Answer
On which options are standard access lists based?Source address and wildcard mask
In a GLBP network, who is responsible for the ARP request?AVG
GLBPGateway Load Balancing Protocol
Gateway Load Balancing Protocol (GLBP) provides redundancy for IP networks, ensuring that user traffic immediately and transparently recovers from first hop router failures, while allowing packet load sharing between a group of redundant routers.

Section 4

Question Answer
AVFActive Virtual Forwarder
AVGActive Virtual Gateway
Active Virtual Forwarder (AVF)One virtual forwarder within a GLBP group is elected as active virtual forwarder for a specified virtual MAC address, and is responsible for forwarding packets sent to that MAC address.
What SNMP message alerts the manager to a condition on the network? TRAP
What four levels will be trapped if the administrator executes the command Router(cfg)#logging trap 4Emergency Alert Error Warning

Section 5

Question Answer
Which two tasks does the Dynamic Host Configuration Protocol perform? Configure IP address parameters from DHCP server to a host. Assign and renew IP address from the default pool.
When a DHCP server is configured, which two IP addresses should never be assignable to hosts? Network or subnetwork IP address Broadcast address on the network
What does the "Inside Global" address represent in the configuration of NAT? A registered address that represents an inside host to an outside network.
What are three factors a network administrator must consider before implementing Netflow in the network?CPU utilization where Netflow data will be sent number of devices exporting Netflow data
NATNetwork Address Translation
Which three statements about HSRP operation are true? The virtual IP address and virtual MAC address are active on the HSRP Master router. The HSRP default timers are a 3 second hello interval and a 10 second dead interval. HSRP supports up to 255 groups per interface, enabling an administrative form of load balancing.

Section 6

Question Answer
How does a DHCP server dynamically assign IP addresses to hosts?Addresses are leased to hosts. A host will usually keep the same address by periodically contacting the DHCP server to renew the lease.
DHCPis used to enable individual computers on an IP network to extract their configurations from a server (the DHCP server) or servers.
Which of the following statements are TRUE regarding Cisco access lists? In an inbound access list, packets are filtered as they enter an interface. Extended access lists are used to filter protocol-specific packets.
What are two benefits of using NAT?NAT protects network security because private networks are not advertised. NAT eliminates the need to re-address all host that require external access.
A network administrator is configuring ACLs on a Cisco router, to allow traffic from hosts on networks,,, and only. Which two ACL statements, when combined, would you use to accomplish this task?access-list 10 permit access-list 10 permit

Section 7

Question Answer
Which item represents the standard IP ACL?access-list 50 deny
When you are troubleshooting an ACL issue on a router, which command can help you to verify which interfaces are affected by the ACL?show ip interface
What command visualizes the general NetFlow data on the commandshow ip cache flow
In the MAC address 0000.0c07.ac03, what does the "03" represent?HSRP group number
What is the best practice when assigning IP addresses in a small office of six hosts?Assign the addresses statically on each node.

Section 8

Question Answer
Which three statements about Syslog utilization are true? A Syslog server provides the storage space necessary to store log files without using router disk space. There are more Syslog messages available within Cisco IOS than there are comparable SNMP trap messages. A Syslog server helps in aggregation of logs and alerts.
A network engineer wants to allow a temporary entry for a remote user with a specific username and password so that the user can access the entire network over the Internet. Which ACL can be used?dynamic
Which command encrypts all plaintext passwords?Router(config)# service password-encryption
Which two statements about static NAT translations are true? They are always present in the NAT table. They allow connection to be initiated from the outside.
What authentication type is used by SNMPv2?community strings

Section 9

Question Answer
What does the keyword overload signify in the configuration of NAT?Multiple internal hosts will use one IP address to access external network resources.
Which three features are added in SNMPv3 over SNMPv2?Message Integrity Authentication Encryption
SNMPv1Simple Network Management Protocol
What are the three things that Netflow uses to consider the traffic to be in a same flow?IP address Port numbers L3 protocol type
What is a valid HSRP virtual MAC address?0000.0C07.AC15

Section 10

Question Answer
What are three benefits of GLBP?GLBP supports clear text and MD5 password authentication between GLBP group members. GLBP supports up to 1024 virtual routers. GLBP can load share traffic across a maximum of four routers.
Which one of the statements below correctly describes the Virtual Router Redundancy Protocol (VRRP)?A VRRP group has one master and one or more backup virtual routers.
What are three components that comprise the SNMP framework? MIB Agent Manager
MIBManagement Information Base
AgentThe SNMP agent is the software component within the managed device that maintains the data for the device and reports these data, as needed,

Section 11

Question Answer
Management Information Base (MIB)The Management Information Base (MIB) is a virtual information storage area for network management information, which consists of collections of managed objects.
Manager - NMSThe SNMP manager is the system used to control and monitor the activities of network hosts using SNMP.
Which statement describes VRRP object tracking?It ensures the best VRRP router is the virtual router master for the group.
VRRP Object TrackingVRRP object tracking provides a way to ensure the best VRRP router is virtual router master for the group by altering VRRP priorities to the status of tracked objects such as interface or IP route states.
Object TrackingObject tracking is an independent process that manages creating,

Section 12

Question Answer
What Netflow component can be applied to an interface to track IPv4 traffic?flow monitor
When configuring NAT, the Internet interface is considered to be what?outside
What are the Popular destinations for syslog messages to be saved? Logging buffer Console terminal Syslog Server
Which protocol can cause overload on a CPU of a managed device?SNMP
What is the default Syslog facility level?local7

Section 13

Question Answer
Which statement about access lists that are applied to an interface is true?You can configure one access list, per direction, per layer 3 protocol.
View the exhibit. An attempt to deny web access to a subnet blocks all traffic from the subnet. Which interface command immediately removes the effect of ACL 102?no ip access-group 102 out
What is the alert message generated by SNMP agents called?TRAP
How many addresses will be available for dynamic NAT translation when a router is configured with the following commands? Router(config)#ip nat pool TAME netmask Router(config)#ip nat inside source list 9 pool TAME 8
What is the subnet address for the IP address

Section 14