Exam 200-301 Question id=5457 IP Services

You have implemented SNMP v3 in your network. After making the configuration changes, you find that technicians in the TECHS group cannot access the MIB. You execute the show run command and receive the following output that relates to SNMP:
<Output omitted> snmp-server group NORMAL v3 priv read NORMAL write NORMAL snmp-server group TECHS v3 priv read TECHS access 99 snmp-server group TRAP v3 priv snmp-server user NORMAL NORMAL v3 auth sha CISCO priv des56 CISCO snmp-server user TECHS TECHS v3 auth sha CISCO priv des56 CISCO snmp-server user TRAP TRAP v3 auth sha CISCO priv des56 CISCO snmp-server enable traps snmp linkup linkdown snmp-server host 155.1.146.100 traps version 3 priv TRAP
What is preventing the TECHS group from viewing the MIB?

A. The presence of the keyword priv in the command creating the RESTRICTED group
B. A mismatch between the authentication mechanism and the encryption type in the command creating the TECHS user
C. The absence of an access list defining the stations that can used by the TECHS group
D. The presence of the keyword auth in the command creating the TECHS user

The command that creates the TECHS group ends with the parameter access 99:

server group TECHS v3 priv read TECHS access 99

This indicates that the access list number 99 is specifying the IP addresses of the stations allowed to connect to the MIB for the group. Since the access list is missing from the configuration, no IP addresses will be allowed, and no connections can be made by the group.

The presence of the keyword priv in the command creating the TECHS group is not causing the issue. This keyword indicates that encryption (privacy) and authentication should both be used on all transmissions by the group.

In SMNPv3, there are three combinations of security that can be used:
* noAuthNoPriv- no authentication and no encryption; includes the noauth keyword in the configuration
* AuthNoPriv - messages are authenticated but not encrypted; includes the auth keyword in the configuration
* AuthPriv - messages are authenticated and encrypted; includes the priv keyword in the configuration

There is no mismatch between the authentication mechanism and the encryption type in the command creating the TECHS user.

snmp-server user TECHS TECHS v3 auth sha CISCO priv des56 CISCO

In the preceding command, the section auth sha CISCO specified that messages are authenticated using SHA with a key of CISCO. It does not need to the match the section priv des56 CISCO, which indicates that encryption (priv) will be provided using DES56 with a key of CISCO.

The presence of the keyword auth in the command creating the TECHS user is not causing the issue. This line indicates that that messages are authenticated using SHA with a key of CISCO.



WARNING

the answers are mixed, do not specify in the comment number or the letter of the answer
please write answer#A instead A, answer#B instead B...
Subject:

only logged users can write comments