Contivity VNP Switch
Exam Questions, Answers,
Hi all. passed it today.
It was easy. It’s my contribution.
A customer has a Contivity 4600 with public and private
interfaces. Remote users can not tunnel into the Contivity
from their remote locations. The customer suspects
that there may be a problem with a WAN LINK of the
Contivity. What parameters can be verified to isolate
the fault? (Choose three.)
A. Ensure that the ATM WAN link is up
B. Ensure that the HDLC WAN link is up
C. Verify that the physical connectivity exists
D. Ensure that the Gigabit Ethernet link is up
E. Examine the PPP status to ensure it is passing
IP packets and fourth
Answer: B, C, E
Note: Contivity 4.7 code does not support Gig or ATM
however later code do support Gig and ATM.
Where would the support engineer go to find the contents
of FLASH stored in non-volatile memory?
A. Status à Report
B. Status à System
C. Status à Statistics
D. Status à Health Check
Which log contains detailed information about the
encryption level negotiated during the establishment
of a user tunnel?
A. event log
B. system log
C. security log
D. accounting log
A support engineer has been tasked to install a Contivity
4600 at a customer site. The engineer suspects that
the redundant power supply became unseated during
shipping. They would like to see a warning message
on the Contivity system. Which status screen will
show the warning message?
A. Statistics Screen
B. Event log Screen
C. Security Log Screen
D. Health Check Screen
Nortel Networks technical support asks the support
engineer to send them the config?file from a Contivity
2600 for further examination. The unit has been running
in NormalMode and not Safe Mode. Where is this file
located on the Contivity file system?
Which routing protocol is used to ensure high availability
for private interfaces on the Contivity switch?
D. RIP V1
E. RIP V2
A support engineer has been tasked to turn ON a level
of encryption on a Contivity 4600. The support engineer
has a CLI attachment to the Contivity device. What
CLI command should be used to achieve this objective?
B. enable md5
C. ipsec encryption des56-md5
D. enable ispec encryption des56-md5