SCP-500 Solar Winds Certified Professional Practice Exam Set 4

After making a configuration change to a gateway router, all of the devices past that router appear

down in the network management system (NMS). However, the NMS is still gathering CPU and

memory statistics on the devices.

What is the first thing you should do to diagnose the issue?


Options are :

  • check the gateway router configuration to make sure a default route exists
  • check the configurations of each affected device
  • check the gateway router configuration for an access list change (Correct)
  • check the devices to see if any antivirus is blocking ICMP

Answer : check the gateway router configuration for an access list change

What is the most direct way to measure an application's performance?


Options are :

  • collect application data in NetFlow
  • collect application server CPU and memory statistics
  • ping the application server
  • time application transactions (Correct)

Answer : time application transactions

Your company leverages Internet-based VPNs to provide connectivity to remote offices. At these

sites, the users are connected directly to a layer 2 switch, which is then connected to a VPN

concentrator that also provides basic routing functions. How should you analyze the traffic going to

and from a remote site?


Options are :

  • leverage NetFlow data from the outside interface of the VPN concentrator at the remote site
  • deploy a protocol analyzer to the main site between the VPN concentrator and the Internet
  • deploy a protocol analyzer to the remote site between the switch and the concentrator (Correct)
  • leverage NetFlow data from the outside interface of the VPN concentrator at your main site

Answer : deploy a protocol analyzer to the remote site between the switch and the concentrator

You have a hub and spoke network with three sites. The application servers all located within the

headquarters, which is the hub of the network. Users in spoke site A complain that they cannot get

to the company's accounting server. Users in spoke site Bare not affected.

Which two steps should you take in troubleshooting this issue? (Choose two.)

A. verify that user sat the headquarter scan reach the accounting server

B. verify that users in site A can access other resources outside of their site

C. verify that users in site B can access resources in the headquarters

D. verify that the accounting server is online

E. verify that the accounting server can access site A


Options are :

  • C,E
  • A,E
  • B,E (Correct)
  • D,E

Answer : B,E

While attempting to add a device to Orion for monitoring, you find that Orion can communicate

with the device for latency measurements, but is not able to pull data such as CPU load or

interface traffic. What should you verify first?


Options are :

  • that the device is configured to send SNMP traps to Orion
  • that Orion is running the correct version of SNMP
  • that ICMP is allowed to and from the device
  • that you have the correct SNMP community string for the device (Correct)

Answer : that you have the correct SNMP community string for the device

A network engineer would recommend decreasing polling frequency in order to address which

topology-based issue?


Options are :

  • high CPU values on WAN routers
  • WAN bandwidth availability (Correct)
  • redundancy for single-homed sites
  • SQL database scalability issues

Answer : WAN bandwidth availability

IT management wants to know how they can lower their total power consumption by consolidating

equipment and shutting off unnecessary equipment. Which type of report can you create to help

them plan for this?


Options are :

  • total NetFlow endpoints
  • router CPU utilization
  • bandwidth utilization
  • available switch ports (Correct)

Answer : available switch ports

Your network management system (NMS) leverages WMI to pull management data from Windows

2003 Servers. You have not deployed Active Directory, but your servers belong to a common

workgroup. What should you do to ensure that your NMS has permission to query these servers?


Options are :

  • ensure that the account and password you are using is the same on all of the servers (Correct)
  • ensure that all of the servers have the .NET framework 3.5 installed
  • ensure that all of the servers are on the same service pack level
  • ensure that the account you are using exists on all of the servers

Answer : ensure that the account and password you are using is the same on all of the servers

The IT planning department has asked for a report to help them understand when they need to

implement IPv6. Which report would offer them the greatest amount of relevant information?


Options are :

  • IP address utilization trends (Correct)
  • DHCP server CPU utilization
  • unique NetFlow exporters
  • number of subnets

Answer : IP address utilization trends

Which two sources provide detailed visibility into router interface traffic? (Choose two.)

A. SNMP statistics

B. SNMP traps

C. NetFlow

D. Syslog

E. CDP


Options are :

  • A,D
  • A,E
  • A,B
  • A,C (Correct)

Answer : A,C

A firewall separates Orion NPM and the network devices it is monitoring. Only encrypted

communication will be allowed from the server for polling and configuration management. Which

two ports will need to be allowed through the firewall? (Choose two.)

A. 22

B. 23

C. 69

D. 80

E. 161

F. 2055


Options are :

  • A,E (Correct)
  • B,E
  • C,E
  • F,E

Answer : A,E

Which traffic type should be allowed through the network in order to leverage HTTPS for network

monitoring?


Options are :

  • UDP traffic on port 1433
  • TCP traffic on port 443 (Correct)
  • UDP traffic on port 443
  • TCP traffic on port 1433

Answer : TCP traffic on port 443

Company A and company B have merged and are currently planning to combine their network

backbones. All 18 of company A's routers run OSPF, but company B's hardware only supports

RIPv2. You need to monitor both networks from a single NMS. Which solution in volves the fewest

configuration steps to meet these monitoring requirements?


Options are :

  • use router redistribution (Correct)
  • move to static routing for all routers
  • configure company A's routers to run RIP along with OSPF
  • change the routing protocol on company A's routers to RIP

Answer : use router redistribution

Your firewall currently allows port 6343 traffic to your network management system (NMS). What

is the port most likely being used for?


Options are :

  • sFlow (Correct)
  • IP service level agreement (SLA)
  • ICMP
  • SMTP

Answer : sFlow

What can you determine from a packet capture that you CANNOT learn from NetFlow data?


Options are :

  • network traffic statistics
  • device up/down status
  • router Telnet password (Correct)
  • client to server communication ports

Answer : router Telnet password

You are monitoring a Windows 2003 Server via SNMP.

Which service must be enabled on the target server to allow the network management service

(NMS) to collect CPU load data?


Options are :

  • SNMP Service (Correct)
  • WMI
  • SNMP Trap Service
  • Events to Traps Translator Service

Answer : SNMP Service

Which two metrics should be monitored to determine if a network device is overloaded? (Choose

two.)

A. CPU utilization

B. bandwidth utilization

C. memory utilization

D. packet loss

E. response time


Options are :

  • A,E
  • A,B
  • A,C (Correct)
  • A,D

Answer : A,C

You are planning a network management implementation where the network has several low

bandwidth WAN links. Which two network management protocols are most likely to cause heavy

traffic on WANs and should therefore be considered carefully before deployment? (Choose two.)

A. Syslog

B. SSH

C. SMTP

D. NetFlow

E. ICMP


Options are :

  • A,B
  • A,C
  • A,E
  • A,D (Correct)

Answer : A,D

A network engineer is planning to deploy a network management system (NMS) to monitor a large

campus network. What is the most secure way to isolate the NMS network traffic to all monitored

routers and switches?


Options are :

  • open onlythe appropriate ports on the routers and firewalls
  • add the NMS IP address to the permissions for each device
  • create a management VLAN for the NMS (Correct)
  • enable SNMPv3 on the switches

Answer : create a management VLAN for the NMS

What is a concern when monitoring a layer 3 (hierarchical) network that is not a concern when

monitoring a layer 2 (flat) network?


Options are :

  • restricted SNMP permissions
  • access control lists blocking management traffic (Correct)
  • bottlenecking caused by STP path selection
  • troubleshooting complexity caused by BPDUs

Answer : access control lists blocking management traffic

When monitoring a remote router with a network management system (NMS), which interface

provides the most reliable connectivity?


Options are :

  • the WAN interface on the router
  • the loopback interface on the router (Correct)
  • the loopback interface on the NMS
  • the LAN interface on the NMS

Answer : the loopback interface on the router

Companies A and B have merged and are both using the 10.10.x..x /16 networks. Company A

uses Orion NPM and would like to monitor two key servers within company B'snetwork. Which

solution for this situation involves the fewest configuration steps?


Options are :

  • re-address company B's network
  • use static NAT (Correct)
  • use DNS for accessing the servers
  • use dynamic NAT

Answer : use static NAT

Which traffic type should be allowed through the network in order to leverage SNMP for network

monitoring?


Options are :

  • UDP traffic on port 161 (Correct)
  • UDP traffic on port 53
  • TCP traffic on port 162
  • TCP traffic on port 161

Answer : UDP traffic on port 161

You have just changed the community string within the snmpd. conf on a Linux server.

What needs to occur to monitor this device in Orion?


Options are :

  • re-add the Linux server to Orion
  • restart the SNMP process on the Linux server (Correct)
  • restart the SNMP process on the Orion server
  • re-add the Orion server to the Linux server

Answer : restart the SNMP process on the Linux server

During the process of switch port capacity planning and trending, the Orion NPM reports do not

provide sufficient information. What is the easiest way to obtain the appropriate report?


Options are :

  • create a custom view
  • export to a spreadsheet
  • use Report Writer Advanced SQL (Correct)
  • use Crystal Reports

Answer : use Report Writer Advanced SQL

The IP address of a network management system (NMS) is 10.1.5.2, and the IP address of a new

server that it is monitoring on the same VLAN is 10.1.5.129. The NMS cannot reach the server

with SNMP or ICMP. What is the most likely cause?


Options are :

  • The subnet mask of the server is misconfigured. (Correct)
  • The MAC address of the NMS has changed.
  • The firewall is blocking SNMP and ICMP.
  • The ARP table of the router has not refreshed.

Answer : The subnet mask of the server is misconfigured.

A network engineer is planning to deploy a network management system (NMS) to monitor a

network. Which two UDP ports should be enabled in router access control lists and firewalls so the

NMS can effectively monitor devices? (Choose two.)

A. 160

B. 161

C. 162

D. 163

E. 164


Options are :

  • None
  • B,C (Correct)
  • C,D
  • D,E
  • A,B

Answer : B,C

Refer to the following configuration snippet of a Cisco IOS router:

snmp-server community private RO 60

snmp-server host 192.168.15.4 private

access-list 60deny 192.168.12.0 255.255.240.0

access-list 60 permit snmp 192.168.15.4

The network management system (NMS) IP address is 192.168.15.4, and it is receiving

SNMP traps from the router, but it is not able to poll the router.

Why is the NMS unable to poll the router?


Options are :

  • The access-list is denying SNMP access from the NMS. (Correct)
  • SNMP is not enabled on the router.
  • No public community string is configured.
  • The NMS requires a read-write community string.

Answer : The access-list is denying SNMP access from the NMS.

What does the command "ip ssh version 2"do on a Cisco IOS router?


Options are :

  • enables secure shell version 2 (Correct)
  • enables simple network management protocol version 2
  • enables secure system host version 2
  • enables secure socket layer version 2

Answer : enables secure shell version 2

Which advantage do SNMP traps and Syslog have over SNMP polling?


Options are :

  • ease of configuration
  • ability to poll events in real-time
  • speed of event detection (Correct)
  • reliability of event detection

Answer : speed of event detection

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions