Site MapHelpFeedbackQuizzes
Quizzes
(See related pages)

1
We can define network management as ________________ network components to meet a set of requirements defined by an organization.
A)monitoring
B)configuring
C)testing and trouble shooting
D)All of the choices are correct.
2
The ___________ management system must know, at any time, the status of each entity and its relation to other entities.
A)configuration
B)fault
C)accounting
D)performance
3
The ___________ management system monitors and controls the network to ensure that it is running as efficiently as possible.
A)configuration
B)fault
C)accounting
D)performance
4
The ___________ management system is responsible for controlling access to the network based on the pre-defined policy.
A)configuration
B)fault
C)security
D)performance
5
Under __________ management, individual users, departments, divisions, or even projects are charged for the services they receive from the network.
A)configuration
B)accounting
C)security
D)performance
6
SNMP is a (an) ______________ protocol in which a few manager stations control a set of agents.
A)application-level
B)transport-level
C)network-level
D)None of the choices are correct.
7
A station, called ________, is a host that runs the SNMP client program.
A)a manager
B)an agent
C)a manager or an agent
D)None of the choices are correct.
8
A device, called ________, is a router (or a host) that runs the SNMP server program.
A)an agent
B)a manager
C)an agent or a manager
D)None of the choices are correct.
9
SNMP defines the ___________________ of packets to be exchanged between a manager and an agent.
A)format
B)encoding
C)number
D)None of the choices are correct.
10
A manager is a host that runs the SNMP _______ process.
A)client
B)server
C)client and server
D)None of the choices are correct
11
An agent is a host or router that runs the SNMP _______ process.
A)client
B)server
C)client and server
D)None of the choices are correct.
12
SNMP uses two other protocols: _______ and _________.
A)MIB; SMTP
B)SMI; MIB
C)FTP; SMI
D)None of the choices are correct.
13
________ defines the general rules for naming objects, defining object types, and showing how to encode objects and values.
A)MIB
B)BER
C)SMI
D)None of the choices are correct.
14
__________ creates a collection of named objects, their types, and their relationships to each other in an entity to be managed.
A)MIB
B)SMI
C)BER
D)None of the choices are correct
15
We can compare the task of network management to the task of writing a program. Both tasks need rules. In network management this is handled by ___________.
A)SMNP
B)MIB
C)SMI
D)None of the choices are correct.
16
We can compare the task of network management to the task of writing a program. Both tasks need variable definition and declarations. In network management this is handled by _________.
A)SMNP
B)MIB
C)SMI
D)None of the choices are correct.
17
We can compare the task of network management to the task of writing a program. Both tasks have actions performed by statements. In network management this is handled by _______.
A)SMNP
B)MIB
C)SMI
D)None of the choices are correct.
18
SMI emphasizes three attributes to handle an object: _______, ________, and _________.
A)name; data type; size
B)name; size; encoding method
C)name; data type; encoding method
D)None of the choices are correct.
19
To name objects globally, SMI uses an object identifier, which is a hierarchical identifier based on a _______ structure
A)linear
B)tree
C)graph
D)None of the choices are correct.
20
All objects managed by SNMP are given an object identifier. The object identifier always starts with _______.
A)1.3.6.1.2.1
B)1.3.6.1.2.2
C)1.3.6.1.2.3
D)None of the choices are correct.
21
To define the data type, SMI uses fundamental definitions in _______ and adds some new definitions.
A)AMS.1
B)ASN.1
C)ASN.2
D)None of the choices are correct.
22
SMI has two broad categories of data type: _______ and _______.
A)simple; complex
B)simple; structured
C)structured; unstructured
D)None of the choices are correct.
23
The _______ data types are atomic data types.
A)structure
B)simple
C)array
D)None of the choices are correct.
24
SMI defines two structured data types: ________ and _________.
A)sequence; atomic
B)sequence; a sequence of
C)sequence; array
D)None of the choices are correct.
25
SMI uses another standard, ___________, to encode data to be transmitted over the network.
A)MIB
B)ANS.1
C)BER
D)None of the choices are correct.
26
BER specifies that each piece of data be encoded using three fields: _____________________.
A)type, value, name
B)tag, length, and value
C)value, length, name
D)None of the choices are correct.
27
In BER, the tag is a ______ field that defines the type of the data; the length is a ______ field.
A)1-byte; 1 byte
B)2-byte; 1 byte
C)1-byte; 2 byte
D)1-byte; 1 or more byte
28
The GetRequest PDU is sent from the _______ to the __________ to retrieve the value of a variable or a set of variables.
A)client; server
B)server; client
C)server; network
D)None of the choices are correct.
29
The Response PDU is sent from the ______ to the ___________.
A)server; client
B)client; server
C)network; host
D)None of the choices are correct.
30
The Trap PDU is sent from the ______ to the _______ to report an event.
A)server; client
B)client; server
C)network; host
D)None of the choices are correct
31
SNMP uses the services of UDP on two well-known ports, _______ and _______.
A)161; 162
B)160; 161
C)160; 162
D)None of the choices are correct
32
_______ runs the SNMP client program; _______ runs the SNMP server program.
A)A manager; a manager
B)An agent; an agent
C)A manager; an agent
D)An agent; a manager
33
Which of the following could be a legitimate MIB object identifier?
A)1.3.6.1.2.1.1
B)1.3.6.1.2.2.1
C)2.3.6.1.2.1.2
D)None of the choices are correct.
34
For a 1-byte length field, what is the maximum value for the data length?
A)127
B)128
C)255
D)None of the choices are correct.
35
An SNMP agent can send _______ messages.
A)GetRequest
B)SetRequest
C)Trap
D)None of the choices are correct.
36
An SNMP agent can send _______ messages.
A)Response
B)GetRequest
C)SetRequest
D)None of the choices are correct.







Computer NetworksOnline Learning Center

Home > Chapter 9 > Quizzes