Network Security Fundamentals [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Network Security Fundamentals [Electronic resources] - نسخه متنی

Gert De Laet, Gert Schauwers

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید

Chapter 15 Q&A

1:

List the various destinations to which the logging process can send logging messages.

A1:

Answer: The logging process can send logging messages to the following destinations:

  • Logging buffer

  • Terminal lines

  • SYSLOG server

  • Console port

2:

What is SYSLOG?

A2:

Answer: SYSLOG is a widely used protocol that can be used to view the reported status and events from a device. By installing a SYSLOG server daemon on a PC, you can check the status and event messages sent to that server from all devices that are configured to use that SYSLOG server.

3:

Information at different warning levels is sent to a SYSLOG server. List the different warning levels.

A3:

Answer: The following table lists the different warning levels.

0

emergencies

System is unusable.

1

alerts

Immediate action needed.

2

critical

Critical conditions.

3

errors

Error conditions.

4

warnings

Warning conditions.

5

notifications

Normal but significant conditions.

6

informational

Informational messages.

7

debugging

Debugging messages.

4:

SNMP works on which layer of the OSI model?

  1. Network layer

  2. Session layer

  3. Application layer

  4. Datalink layer

A4:

Answer: c. SNMP works on the application layer.

5:

Explain the difference between traps and informs when talking about SNMP notifications.

A5:

Answer: The difference between a trap and an inform request is that a trap is unreliable and an inform request is not. If a manager does not receive an inform request, it does not send a response to the agent. The manager sends a response only when an inform request is received. The advantage of using a trap is that it consumes less resources on a router.

6:

When creating an access control for an SNMP community, which optional parameters can be configured to make it more secure?

A6:

Answer: The following optional parameters can be configured to make an access control for an SNMP community more secure:

  • An access list of the SNMP managers that are permitted to use the community string to gain access

  • A MIB view, which defines the subset of all MIB objects accessible to the given community

  • Read and write or read-only access

7:

What is the

show snmp user command used for?

A7:

Answer: The

show snmp user command is used to display the information about each SNMP username in the SNMP user table.

8:

What is RMON, and when is it used?

A8:

Answer: RMON stands for remote monitoring, and it can be used in conjunction with SNMP to monitor traffic using alarms and events. With RMON, you can identify activity on individual nodes and also monitor all nodes and their interaction on a LAN segment. When used in conjunction with the SNMP agent on a router, RMON allows you to view both traffic that flows through the router and segment traffic not necessarily destined for the router.

9:

What can be measured using SAA?

A9:

Answer: SAA measures the following:

  • Network delay or latency

  • Packet loss

  • Network delay variation (jitter)

  • Availability

  • One-way latency

  • Website download time

  • Network statistics

10:

What command is used to start SAA operation 3 immediately and to set the duration of that operation for 30 seconds?

A10:

Answer: The following command is used to start SAA operation 3 immediately and to set the duration of that operation for 30 seconds:


RouterB(config)#

rtr schedule 3 start-time now life 30


/ 196