The network administrator must configure R1 to authenticate Telnet connections based on Cisco ISE using RADIUS. ISE has been configured with an IP address of 192.168.1.5 and with a network device pointing toward R1 (192.168.1.1) with a shared secret password of Cisco123. The administrator has configured this on R1:
aaa new-model
!
radius server ISE1
address ipv4 192.168.1.5
key Cisco123
!
aaa group server tacacs+ RAD-SERV
server name ISE1
!
aaa authentication login default group RAD-SERV
The network administrator cannot authenticate to access R1 based on ISE. Which set of configurations fixes the issue?
line vty 0 4
login authentication default
line vty 0 4
login authentication RAD-SERV
aaa group server radius RAD-SERV
server name ISE1
aaa group server tacacs+ ISE1
server name RAD-SERV
Correct answer: C
Question 2
Refer to the exhibit.
An engineer noticed that the router log messages do not have any information about when the event occurred. Which action should the engineer take when enabling service time stamps to improve the logging functionality at a granular level?
Configure the debug uptime option
Configure the msec option
Configure the timezone option
Configure the log uptime option
Correct answer: D
Question 3
Refer to the exhibit.
A network engineer received a call from the vendor for a failed attempt to remotely log in to their managed router loopback interface from 192.168.40.15.
Which action must the network engineer take to resolve the issue?
The IP access list VENDOR must be applied to interface loopback 100.
The source IP summarization must be updated to include the vendor source IP address.
The EIGRP configuration must be updated to include a network statement for loopback 100.
The time-range configuration must be changed to use absolute instead of periodic.