SlideShare a Scribd company logo
1 of 79
NETWORK MANAGEMENT SYSTEMS
1
CHAPTER 1: DATA COMMUNICATION &
NETWORK MANAGEMENT OVERVIEW
1>The architecture of the telephone network is hierarchical (true/false)__________
2>In telephone network model, there are ____levels of network switches and ____types of trunks that connect
these switches (3/5/5)
3>__________is a logical link between two switches that may traverse one or more physical links (loop/trunk)
4>In telephone network model, the end office is the __________in the hierarchy (lowest/highest)
5>figure 1.1__________
6>Match the following
Regional center : class 4 switch
Sectional center : class 5 switch
Primary center : class 1 switch
Toll center : class 3 switch
End office : class 2 switch
7>In telephone network model, the customer's telephone or PBX which is a switch on the customer premises , is
connected to the end office via a dedicated link called___________ (trunk/loop)
8>Toll switches carry long distance calls (true/false)___________
9>DDD stands for___________
10>In telephone network model, _______ (DET/DDD)network enables up to dial the far end telephone w/o an
operator’s assistance, comprises___ transmission trunks (2/3/4)
11>Match the following
direct trunk :connects any two toll offices
toll connecting trunk :connects an end office to any toll office
toll (internal) trunks :connects two end offices
12>In telephone network model , a circuit connection is set up
a: directing using a local trunk
b: via the higher level switches and routes
Ans :__________ (a/b/either)
13>In telephone network model, primary and secondary routes are already programmed into the___________
(bridge/switch)
14>Operations support systems ensure the quality of service in the telephone network (true/false)___________
15>The quality of the call, measured in terms of SNR is measured regularly by a trunk maintenance
system________ (true/false)
16>NOC stands for__________
17>For a given region, there is ___________where the global status of the network is monitored (PBX/NOC)
18>___________is the nerve center of telephone network operations (PBX/NOC)
19>The telephone network is managed from the perspective o_________ (service provider/user)20>In telephone
network, with the emphasis on the users' point of view, the first objective in operations is_____ and then ______
(quality & economy of service/restoration of service)
21>POTS stands for___________
22>___________communications technology deals with the theories of electrical engineering, computer
engineering, and computer science and their application to all types of communications over networks
(telecommunication/data/network)
23>A basic network can be viewed is interconnected ________ (nodes/links/both)
24>___________carrier information from one node to another that is directly connected to it (network/link)
25>A node behaves as
a: end node
b: intermediate node
Ans:___________ (a/b/both)
26>If the node behaves as_____ node, information either originates or terminates there. ______node redirects the
information from one link to another (intermediate/end)
27>In telephone network model, End office nodes behaves as___________ (intermediate/end)
28>Each ___________node has connection to a user interface , if the information originates or terminates there
(intermediate/end)
29>DTE stands for___________
30>___________is any equipment that generates or accepts digital data (DDD/DTE)
VTU
N
O
TESBYSR
I
NETWORK MANAGEMENT SYSTEMS
2
31>Data can be transmitted in
a: analog format
b: digital format
Ans:___________ (a/b/either)
32>The __________data is sent either as base band or on top of a carrier (digital/analog)
33>___________data is generated either directly by the user equipment or as analog data and converted to digital
data (digital/analog)
34>ISDN stands for___________
35>Long distance data transmission today is mostly ___________due to its superior price and performance
(digital/analog)
36>The data can be transmitted in following modes
a: circuit switches
b: message switched
c: packet switches
Ans:___________ (a/b/c/all)
37>In__________ switched mode , a physical circuit is established between the originating and terminating ends
before the data is transmitted (circuit /
message/ packet switches)
38>In_____ &______switched modes, the data is broken into packets and each packet is enveloped with the
destination and originating addresses (circuit /
message/ packet switches)
39>___________switched mode is used to send long messages such as email (circuit /
message/ packet switches)
40>___________switched mode is used to transmit small packets used in applications such as interactive
communication (circuit /
message/ packet switches)
41>In telephone network, _____&_____open each packet to find the destination address and forward the data to
the appropriate output links (switch/bridge/router)
42>In _________switched mode, each packet may take a different route (circuit/packet)
43>The main difference between packet and message switching is that in the ___________the data is stored by the
system and then retrieved by the user at the later time (former/latter)
44>In___________ switched mode, the packets are fragmented and reassembled in almost real time
(message/packet)
45>email is an example of_________ switched mode (message/packet)
46>PSDN stands for___________
47>Network communications are classified as either _____or______ communication (tele/wireless/data)
48>Telecommunication network is a __________switched network that is structured as a public network accessible
by any user (message/circuit)
49>Data communication network is also called computer communication network (true/false)___________
50>___________transfer the information from digital to analog at source and back to digital at destination
51>In corporate data and telecommunication networks, the computer terminals are connected to___________
which manages the local terminals and provides a single interface to the telephone network (onsite switch
PBX/onsite communication controller)
52>In corporate data and telecommunication networks, the telephones are connected locally by ___________
which interfaces to the telephone network (onsite switch PBX/onsite communication controller)
53>Processor to processor communications over the telecommunications lines take _____time and therefore
are______ expensive (less/more)
54>SNA stands for___________
55>In SNA, the host is connected to the terminals via the _____controllers and ______controllers
(communications/cluster/both)
56>In SNA, _____ controllers manage the DTEs at the peripheral nodes and the ______controllers manage the
traffic at the subnetwork levels (communications/cluster/both)
57>DCE stands for___________
58>The system of links that connect remote LANs is called___________ (MAN/WAN)
59>A LAN is physically connected to a WAN link by ______or _____at each end (switch/bridge/router)
60>Important aspects of DCEs are
a: the different platforms and applications running on DCEs have the ability to communication with each other
b: the ability of the processors attached to LANs do multiple functions
Ans: ___________ (a/b/both)
61>The processor that requests a service is called the _____, and the processor that provides the service is called
the______ (server/client)
VTU
N
O
TESBYSR
I
NETWORK MANAGEMENT SYSTEMS
3
62>The process that initiates a transaction to run an application in either a local or remote processor is called the
_____.The application process that is invoked by a _____ is called the______ (server/client)
63>In client/server architecture, the ____initiates the request and the _______responds (server/client)
64>Client cannot initiate a process in the server (true/false)___________
65>A real world analogy of the client/server operation is a post office (true/false)___________
66>The communication between operative computing processes is called ___________communication (end to
end/peer to peer)
67>___________is a suite of protocols that enable networks to be interconnected (UDP/IP or TCP/IP)
68>IP is a _____ protocol. TCP is a ______protocol. UDP is a ______protocol (connection
oriented/connectionless)
69>Most of Internet traffic really uses___________ because of the reliability of data transmission (UDP/IP or
TCP/IP)
70>The Internet is a network of networks (true/false)___________
71>___________serve as the interface between dissimilar and independent , autonomous , networks and perform
many functions including protocol conversions (routers/gateways)
72>Autonomous networks have little knowledge each other's attributes , configurations and addresses and yet
communication is automatically facilitated by a hierarchy of Internet servers along the path
(true/false)___________
73>Email messages are transmitted by a___________ scheme all along the path (stop & wait/ store & forward)
74>Internet users are currently doubling n population each year (true/false)___________
75>In layered architecture, the workstations belong to the___________ plane (LAN/user)
76>in layered architecture, the interfaces are defined as the fabrics (true/false)___________
77>In Internet fabric model, the LAN and WAN planes interface through _____fabric. The WANs in the WAN
plane interface via the______ fabric (gateway/switching)
78>In Internet fabric model, the user's workstation interfaces to a LAN via a ___________interface
(gateway/switching/MAC)
79>In Internet fabric model, LANs interface to a WAN by a switching fabric of ___________
(bridges/routers/switches/all)
80>____________fabric interconnects different WANs (gateway/switching)
81>_____is a private network and access to it is controlled by the enterprise that owns it, whereas______is public
(internet/intranet)
82>In communication lingo, commonality can be interpreted as _____and procedures as______
(protocols/standards)
83>___________can be defined as the basic structure of a system that shows its functional components and the
relationships among the
84>___________architecture describes the functional components of a communication network as well as the
operational interfaces among them (network/communication)
85>The operational procedures are specified in terms of ___________ (standards/protocols)
86>Standardization of___________ involves agreement in the physical characteristics and operational procedures
of communication equipment that performs similar functions (policy/protocol)
87>Email exchange across the world is possible because most vendors have adopted the standard ___________in
their software (MIME/SMTP)
88>Each system can be divided into ______broad sets of communication layers (2/3/4)
89>in communication architecture , top set of layers consists of the _____layers and the bottom set of the______
layers (transport/application)
90>The data can be transmitted in one of____ modes (2/3/4)
91>The ISO has developed a highly modular or layered , architecture for communication protocols that is called
the OSI reference model , published as OSI RM--ISO______ (7948/749)
92>OSI reference model was developed based on the premise that
a: the different layers of protocol provide different services
b: each layer can communicate with only its own neighboring level
Ans:___________ (a/b/both)
93>In OSI reference model, two systems can communicate on a ___________level (end to end/peer to peer)
94>In OSI reference model, layers __ __are the transport system protocol layers; and layers ______are application
support protocol layers (1/2/3/4/5/6/7)
95>In OSI reference model, the intermediate system is involved only up to the first ________layers in the process
(3/4)
VTU
N
O
TESBYSR
I
NETWORK MANAGEMENT SYSTEMS
4
96>Match the following
Physical :provides application specific protocols for each application and each transport protocol
system
Data link :establishes and clears sessions for applications, and thus minimizes loss of data during large
data exchange
Network :forms the switching/routing layer of the network
Transport :multiplexes and de-multiplexes messages from applications
Session :transfers to and gathers from the physical medium raw bi data
Presentation :Consists of two sublayers LLC and MAC
Application :provides a set of standard protocols so that the display would be transparent to syntax of the
application
97>_____formats the data to go on the medium; performs error control and flow control.______ controls data
transfer to and from LAN; resolves conflicts with other data on LAN (MAC/LLC)
98>Identify feature of transport layer in OSI reference model
a: multiplexes and demultiplexes messages from applications
b: acts as a transparent layer to applications and thus isolates them from the transport system layers
c: makes and breaks connections for connection-oriented communication
d: controls flow of data in both directions
Ans:___________ (a/b/c/d/all)
99>Identify features of physical layer in OSI reference model
a: provides a set of standard protocols so that the display would be transparent to syntax of the application
b: transfers to and gathers from the physical medium bit data
c: data encryption and decryption
d: handles physical and electrical interfaces to the transmission medium
Ans:___________ (a/b/c/d/all)
100>Identify features of presentation layer in OSI reference model
a: provides a set of standard protocols so that the display would be transparent to syntax of the application
b: transfers to and gathers from the physical medium bit data
c: data encryption and decryption
d: handles physical and electrical interfaces to the transmission medium
Ans:___________ (a/b/c/d/all)
101>In OSI reference model , the message in each layer is contained in message units called__________
102>PDU consist of _____parts (2/3)
103>PDU consists of ____&______ (PCI/VCI/UD)
104>In PDU , ____contains header information about the layer while ______contains the data that he layer , acting
as a service provider , receives from or transmits to the upper layer/service user layer (PCI/UD)
105>In OSI reference model, the size of the PDU increases as it goes toward _______layers (higher/lower)
106>__________layer is responsible for physically placing the electrical signal on the physical medium and picking
up the signal from it (presentation/physical)
107>__________layer controls and manages the physical and electrical interfaces to the physical medium including
the connector or transceiver (presentation/physical)
108>There are various protocol standards for physical layer interface, _____classes of standards have been
established by the ITU-T and EIA (2/3)
109>ITU-T stands for__________
110>EIA stands for__________
111>The data communication between two DTEs is controlled and managed by __________layer (network/data
link)
112>In data link layer, the data communication is serial __________oriented stream (bit/byte)
113>functions of data link layer are
a: establish and clear the link
b: transmit the data
c: error control and data compression
d: flow control
Ans:__________ (a/b/c/d/all)
114>Flow control on the data link layer is done on a hop to hop basis (true/false)__________
115>In data link layer, the lower __________layer controls the access and transmittal of data to the physical layer
in an algorithm manner (LLC/MAC)
116>There are _____basic forms of LANs (2/3)
117>Ethernet LAN:____ type: :FDDI:____ type (ring/bus)
VTU
N
O
TESBYSR
I
NETWORK MANAGEMENT SYSTEMS
5
118>features of network layer are
a: controls and manages the switching fabric of the network
b: provides both connectionless network service and connection oriented network service
Ans:________ (a/b/both)
119>CLNS stands for___________
120>CONS stands for__________
121>__________is used when the lower layers are highly reliable such as LANS and bridges as well as when the
messages are short (CONS/CLNS)
122>__________is the method for transmitting long messages such as file transfer (CONS/CLNS)
123>__________is used when the transmission medium is not reliable (CONS/CLNS)
124>___________at the nodes of a network performs the function of routing and switching the data (switch/router)
125>The OSI architecture model divides the network layer into ________sublayers (2/3/4)
126>Sublayers of network layer are
a: SNICP
b: SNDCP
c SNDAP
Ans:_________ (a/b/c/all)
127>SNICP stands for___________
128>SNDCP stands for__________
129>SNDAP stands for___________
130>In network layer , the top sublayer is _________that interfaces to the transport layer (SNICP/SNDCP/SNDAP)
131>The Internet communicates between nodes using an Internet address and _____.The nodes in turn
communicate with subnetworks using_____ which depends on the subnetwork protocol (SNICP/SNDCP/SNDAP)
132>The SNDCP communicates with is data link layer via the third network sublayer___________
(SNICP/SNDAP)
133>In OSI terminology, TCP/IP is called __________ (ISO-IP/ISO-CLNP/either)
134>A connection ____OSI protocol is X.25 PLP, a packet layer protocol (less/oriented)
135>Identify feature of transport layer
a: multiplexes the user data provided by the application layers and passes the packets to the network layer
b: service is independent of the network on which the packets are transmitted
c: can be connectionless or connection oriented and is implemented in both Internet and OSI protocols
d: flow control is implemented and functions as a data rate manager between the application programs and the
network layer
Ans:__________ (a/b/c/d/all)
136>Layers ___through ___application layer protocols (4/5/6/7)
137>__________layer establish the communication at the beginning of the session, monitor , synchronize and error
correct the information exchanged during the session and then release the logical link at the end of the session
(presentation/session)
138>__________layer is the medium of presentation of message's context to the user or application program
(physical/presentation)
139>__________layer is a context sensitive layer (physical/presentation)
140>wrt presentation layer , a common syntax that is used for semantics is__________ (BER/ASN.1)
141>ASN.1 stands for__________
142>Data encryption and data compression are also generally done in __________layer (physical/presentation)
143>The _____&_____layers form the suite of TCP/IP protocols (transport/data link/network)
144>wrt SNA , arrange the following in correct sequence (top to bottom)
a: physical
b: path control
c: transmission control
d: data link
e: data flow control
f: presentation services
g: end user application
Ans:__________ (gfecabd/gfecbda/gfeabdc)
145>In SNA, the combination of _____&_____services are called the SNA transmission subsystem (transmission
control/presentation/data flow )
146>In SNA , _________services are also known as SNA high level services (data flow/transmission
control/presentation )
147>All application specific protocol services in OSI are sandwiched between the_____ and_____ layers
(user/transport/presentation)
148>In the Internet model, all application specific protocol services are sandwiched between the____&_____
layers (session/user/transport)
VTU
N
O
TESBYSR
I
NETWORK MANAGEMENT SYSTEMS
6
149>A user interfaces with a host at a remote terminal using ____in the OSI model and ______in the Internet model
(Telnet/VT)
150>File transfers are accomplished using _____in the OSI model and _____in the Internet (FTP/FTAM)
151>FTAM stands for___________
152>The most common mail service function in the Internet is______. A similar protocol in the OSI model is_____
(MOTIS/SMTP)
153>MOTIS stands for_________
154>Network management is accomplished using ____in the OSI model and _______in the Internet (CMIP/SNMP)
155>CMIP stands for___________
156>OAM&P stands for___________
157>NMS stands for__________
158>The most common and serious problems of networks are connectivity failures, which are in the category
of__________ management (security/fault)
159>__________is generally interpreted to mean failures in accessing networks and systems by the users
(risk/fault)
160>Power hits could reset network component configuration, causing network failures (true/false)________
161>CIO stands for_________
162>The corporate network needs to be secured for privacy and content using __________
(firewalls/encryption/both)
163>____network was monopolistic and had expensive redundancy. ______network is adhoc, decentralized, has
loosely specified interfaces, and has dynamic routing (data/telephone)
164>The latest user satisfaction for an ISP is _____% (8/16/32)
165>Which elements of managing your network require most of your time?
a: configuring the management system itself
b: expanding the network
c: gathering and analyzing statistics for presentation to upper management
Ans:__________ (a/b/c/all)
166>Sniffer is an example of troubleshooting tools (true/false) __________
167>What does a network failure cost the user
a: there are tangible and intangible losses
b: the cost is a function of the dependence of the business upon shared data
c: A&R labs need high technology and tolerate low reliability. Business accept lower and proven technology but
require high reliability
Ans:__________ (a/b/c/all)
168>__________management can be defined as OAM&P of network and services (configuration/network)
169>Match the following
Operations group :involves network planning and circuit provisioning
network administration :handles functions that include both installation con repairs of facilities
and equipment
installation & maintenance group: concerned with daily operations in providing network services
Provisioning :concerned with establishing and administering the overall goals ,
policies
and procedures of network managements
170>The goal of network management is to ensure that the users of a network receive the information technology
services with the quality of service that they expect (true/false)__________
171>Network management comprises of _______major groups (2/3/4)
172>Network management comprises of following groups
a: network provisioning
b: network operations
c: network installation and maintenance
Ans:__________ (a/b/c/all)
173>_______is the primary responsibility of the engineering groups and ____is the primary responsibility of the
plant facilities group (network provisioning/network operations/network I&M)
174>The normal daily operations are the function of the __________groups, which controls and administers a
network operation center (network provisioning/network operations/network I&M)
175>NOC stands for__________
176>__________is the nerve center of network management operations (NMS/NOC)
177>The functions of the NOC are concerned primarily with _____;its secondary responsibilities are_____&_____
(network provisioning/network operations/network I&M)
178>__________consists of network planning and design and is the responsibility of the engineering group
(network provisioning/network operations/network I&M)
VTU
N
O
TESBYSR
I
NETWORK MANAGEMENT SYSTEMS
7
179>ISO has defined __OSI network management applications (4/5/6)
180>__________are concerned with daily operations of the network and providing network services (network
provisioning/network operations/network I&M)
181>ISO has defined following OSI network management applications
a: fault management
b: configuration management
c: performance management
d: security management
e: account management
Ans:__________ (a/b/c/d/e/all)
182>Whenever there is a service failure, it is responsibility of _______to restore service as soon as possible
(NMS/NOC)
183>In several failure situations , the network will detect and restore service automatically .This network feature is
called __________ (grooming/self healing)
184>Restoration of service does not include fixing the cause of the problem. That responsibility to fix the problem
usually rests with the__________ group (network provisioning/network operations/network I&M)
185>__________administration is the administrative part of fault management and is used to track problems in the
network (session ticket/trouble ticket)
186>wrt network management , there are ______configurations of the network (3/4/5)
187>Following are the configurations of the network
a: static configuration
b: current running configuration
c: planned configuration
Ans:__________ (a/b/c/all)
188>_____configuration is one that would come up if the network is started from idle status. In_____ configuration
of the future , the configuration data will change as the network is changed (planned/current/static)
189>__________management includes physically securing the network as well as controlling access to the network
by the users (fault/security)
190>Access privilege to application software is not the responsibility of the NOC unless the application is either
owned or maintained by the NOC (true/false)__________
191>Traffic statistics are helpful in detecting trends and planning future needs (true/false)__________
192>NOC gathers data and keeps them up to date in order to tune the network for optimum performance
(true/false)__________
193>__________administers costs and allocate the use of the network (NMS/NOC)
194>Since the network consists of components manufactured by multiple vendors, commonality in the definition
and relationship of component attribute is needed. This is defined by the __________ (SMI/MIB)
195>__________is the Internet management protocol which is the most popular protocol to acquire the data
automatically using protocol and performance analyzing tools (SMTP/SNMP)
196>There______ classes of reports (3/4/5)
197>Following are different classes of reports
a: system report
b: management report
c: user report
Ans:__________ (a/b/c/all)
198>Match the following
System report :are distributed to the users on a periodic basis to let them know the status of network
performance
management report :are needed for network operations to track the activities
user report :goto the management of the network management group to keep them informed about
the activities and performance of the NOC and the networks
199>__________group takes care of all installation and maintenance of equipment and cables (network
operation/network I&M)
200>___________group is the service arm of the engineering group for installation and fixing troubles for network
operations (network operation/network I&M)
201>__________management is the management of systems and system resources in the network while_________
management is concerned with network resources such as hubs , switches , bridges , routers and gateways, and the
connectivity among them via a network (system/data/network)
202>___________management addresses end to end connectivity between any two processors in the network
(system/network)
203>A network consists of network components and their inter connections (true/false)_________
204>A network management system manages all the components that are connected to a network
(true/false)__________
VTU
N
O
TESBYSR
I
NETWORK MANAGEMENT SYSTEMS
8
205>The two major standards are the Internet and the OSI standards (true/false)___________
206>TMN stands for___________
207>The popular _____ end systems are housed either on SUN or HP UNIX based workstations. The ______end
network management systems run either on Windows 95/98 or Windows NT (low/high)
208>Network connectivity could be tested using the ping command in UNIX (traceroute) and Windows NT
(tracert) based system (true/false)___________
209>The current network management systems are based on the ________protocol (SMTP/SNMP)
210>following are limitations of current network management systems
a: they need a dedicated NMS monitoring station, which must be on a specific type of platform
b: the values of the managed objects should be defined as scalar values
c: SNMP based management is a poling based system
Ans:___________ (a/b/c/all)
211>__________ based management protocol CMIP is object oriented (OSI/Internet)
212>Limitations in SNMP based management have been overcome by the emerging web based management
(true/false)___________
213>A web based system is platform independent for the management software using Java languase in the managed
components , for the Web based NMS server as well as for Web browser monitors (true/false)___________
214>Following are web based management schemes
a: Java based JMX developed by Sun
b: WBEM based on the Common Information Model developed by Microsoft
Ans:___________ (a/b/both)
215>JMX stands for___________
216>WBEM stands for__________
217>The broadband multimedia service is based on ATM SONET wide area network and several emerging access
technologies such as HFC and ADSL (true/false)___________
218>HFC stands for___________
219>ADSL stands for___________
220>___________network, which is the direction of the next generation network, would include embedded
network management applications (intelligent/active)
221>following methods can be used to find the root of a problem in network
a: artificial intelligence
b: algorithmic schemes
c: finite state machine
Ans:___________ (a/b/c/all)
222>_____establish secure networks , and______ ensures secure communication (cryptography/firewalls)
ANSWERS:
1>T
2>5,3
3>trunk
4>lowest
5>
6>1-c 2-e 3-d 4-a 5-b
7>loop
8>T
9>Direct Distance Dialing
10>DDD,3
11>1-c 2-b 3-a
12>either
13>switch
14>T
15>T
16>Network Operation Center
17>NOC
18>NOC
19>user
20>restoration of services, quality and economy
21>Plain Old Telephone Service
22>network
23>both
24>link
25>both
VTU
N
O
TESBYSR
I
NETWORK MANAGEMENT SYSTEMS
9
26>end, intermediate
27>end
28>end
29>Data Terminating Equipment
30>DTO
31>either
32>analog
33>digital
34>Integrated Services Digital Network
35>digital
36>all
37>circuit
38>message & packet
39>message
40>packet
41>bridges & routers
42>packet
43>latter
44>packet
45>message
46>Public Switched Data Network
47>tele, data
48>circuit
49>T
50>modem
51> onsite communication controller
52> onsite switch PBX
53>less, less
54>Systems Network Architecture
55>both
56>cluster, communication
57>Distributed Computing Environment
58>WAN
59>bridge, router
60>both
61>client, server
62>client, client, server
63>client, server
64>T
65>T
66>peer to peer
67>TCP/IP
68>connectionless, connection oriented, connectionless
69>UDP/IP
70>T
71>gateway
72>T
73>store & forward
74>T
75>user
76>T
77>switching, gateway
78>MAC
79>all
80>gateway
81>intranet, internet
82>standards, protocols
83>architecture
84>communication
85>protocols
86>protocols
87>SMTP
VTU
N
O
TESBYSR
I
NETWORK MANAGEMENT SYSTEMS
10
88>2
89>application, transport
90>3
91>7498
92>both
93>peer to peer
94>1to4 5to7
95>3
96>1-e 2-f 3-c 4-d 5-b 6-g 7-a
97>LLC, MAC
98>all
99>b,d
100>a,c
101>protocol data unit
102>2
103>PCI, UD
104>PCI, UD
105>lower
106>physical
107>physical
108>2
109>International Telecommunications Union-Telecommunication Sector
110>Electronics Industries Association
111>data link
112>bit
113>all
114>T
115>MAC
116>2
117>bus, ring
118>both
119>Connectionless Network Service
120>Connection Oriented Network Service
121>CLNS
122>CONS
123>CONS
124>router
125>3
126>all
127>SubNetwork Independent Convergence Protocol
128>SubNetwork Dependent Convergence Protocol
129>SubNetwork Dependent Access Protocol
130>SNICP
131>SNICP, SNDCP
132>SNDAP
133>either
134>oriented
135>all
136>5to7
137>session
138>presentation
139>presentation
140>ASN.1
141>Abstract Syntax Notation Number One
142>presentation
143>transport, network
144>gfecbda
145>transmission control, data flow
146>presentation
147>user, presentation
148>user, transport
149>VT, telnet
VTU
N
O
TESBYSR
I
NETWORK MANAGEMENT SYSTEMS
11
150>FTAM, FTP
151>File Transfer Access & Management
152>SMTP, MOTIS
153>Message Oriented Text Interchange Standard
154>CMIP, SNMP
155>Common Management Information Protocol
156>Operations Administration Maintenance & Provisioning
157>Network Management System
158>fault
159>fault
160>T
161>Chief Information Officer
162>both
163>telephone, data
164>16
165>all
166>T
167>all
168>network
169>1-c 2-d 3-b 4-a
170>T
171>3
172>all
173>network provisioning, network I&M
174>network operation
175>Network Operations Center
176>NOC
177>network operations, network provisioning and network I&M
178>network provisioning
179>5
180>network operation
181>all
182>NOC
183>self healing
184>network I&M
185>trouble ticket
186>3
187>all
188>static, planned
189>security
190>T
191>T
192>T
193>NOC
194>MIB
195>SNMP
196>3
197>all
198>1-b 2-c 3-a
199>networkI&M
200>network I&M
201>system, network
202>network
203>T
204>T
205>T
206>Telecommunication Management System
207>high, low
208>T
209>SNMP
210>all
211>OSI
VTU
N
O
TESBYSR
I
NETWORK MANAGEMENT SYSTEMS
12
212>T
213>T
214>both
215>Java Management Extensions
216>Web Based Enterprise Management
217>T
218>Hybrid Fiber Coax
219>Asymmetric Digital Subscriber Loop
220>active
221>all 222>firewalls, cryptography
VTU
N
O
TESBYSR
I
NETWORK MANAGEMENT SYSTEMS
13
CHAPTER 3: BASIC FOUNDATION -- STANDARDS, MODELS
AND LANGUAGE
1>__________ model addresses the applications that fall into the categories of fault, configuration, performance,
security and accounting (information/functional)
2>Match the following
Network management :management of a system's resources such as central processor usage, disk usage
and application processes
System management :deals with services provided by organizations to customers
Service management :management of the network comprising nodes and links
3>_____management is an extension to _____&_____management (network/system/service)
4>The two leading models of network management are the Internet model and the OSI model
(true/false)__________
5>__________model is the most widely used for network management (OSI/Internet)
6>_____model is a simpler scalar model and hence easy to implement. ______model is object oriented , is more
complex and harder to implement (OSI/Internet)
7>A higher level management network called TMN is based on the ___________model (OSI/Internet)
8>TMN stands for___________
9Identify features of OSI/CMIP standard
a: International standard (ISO/OSI)
b: management of data communications networks- LAN and WAN
c: deals with all seven layers
d: object oriented and most complete
e: consumes large resource in implementation
f: well structured and layered
Ans:___________ (a/b/c/d/e/f/all)
10>Identify features of SNMP/Internet Standard
a: Industry standard (IETF)
b: easy to implement
c: most widely implemented
d: originally intended for management of Internet components, currently adopted for WAN and telecommunication
systems
Ans:___________ (a/b/c/d/all)
11>Identify features of TMN standard
a: International standard (ITU-T)
b: Management of telecommunications network
c: based on OSI network management framework
d: addresses both network and administrative aspects of management
Ans:___________ (a/b/c/d/all)
12>Identify features of IEEE standard
a: IEEE standards adopted internationally
b: addresses management of LANs and MANs
c: adopts OSI standards significantly
d: deals with first two layers of the OSI reference model
Ans:__________ (a/b/c/d/all)
13>Following are web based management standards
a: WBEM
b: JMX
Ans:___________ (a/b/both)
14>CMIP stands for___________
15>CMIS stands for___________
16>The OSI management protocol standard is ____, and has built in services, ______, that specify the basic
services needed to perform the various functions (CMIS/CMIP)
17>Both LANs and WANs can be managed using___________ (CMIS/CMIP/both)
18>Major drawbacks of the OSI management standard are
a: it is complex b: CMIP stack is large
Ans:___________ (a/b/both)
VTU
N
O
TESBYSR
I
NETWORK MANAGEMENT SYSTEMS
14
19>In contrast to _____, ______is truly simple (SNMP/CMIP)
20>___________is responsible for all Internet specifications including network management (IEEE/IETF)
21>___________is designed to manage the telecommunications network and is oriented toward the needs of
telecommunications service providers (ITU/TMN)
22>_____is the standard of______ and is based on OSI CMIP/CMIS specifications (ITU/TMN)
23>The IEEE standards for LAN and MAN specifications are concerned only with OSI layers__&___1/2/3)
24>Both OSI/CMIP and Internet/SNMP protocols use _______standards for the lower layers (IETF/IEEE)
25>The IEEE ____.x series of specifications defines the standards for the various physical media and data link
protocols (802/803)_______
26>IEEE 802.__ specifications present overview, architecture and management. IEEE 802.__standard specifies the
LLC layer. IEEE 802.__ specifications are defined for Ethernet LANs (1/2/3/4)
27>___________layer provides transparency of the various physical media and protocols to the network layer
(MAC/LLC)
28>Web based management is based on using web technology , a web _____for the management system and web
______for network management stations (browsers/server)
29>DMTF stands for_________
30>___________is developing specifications for WBEM (IETF/DMTF)
31>___________has chosen the Microsoft object oriented management model, Common Information Model
(IETF/DMTF)
32>___________is based on a special subset of Java applets developed by Sun Microsystems that runs in the
network components (BEM/JMX)
33>TMM uses_______ (SNMP/CMIP )
34>Both SNMP and CMIP use polling methodology (true/false)___________
35>OSI network management architecture model comprise of ____models (3/4/5)
36>Following are the models of OSI network management
a: organization model
b: information model
c: communication model
d: functional model
Ans: ___________ (a/b/c/d/all)
37>In OSI model, _________model describes the components of a network management system, their functions
and their infrastructure (functional/organization/information/communication)
38>The organization model is defined in ISO______OSI systems management Overview (10400/10040/10004)
39>___________model defines the terms object, agent and manager
(functional/organization/information/communication)
40>___________model deals with the structure and organization of management information
(functional/organization/information/communication)
41>ISO=________ specifies the SMI and the information database, MIB (10156/10165)
42>SMI stands for___________
43>MIB stands for___________
44>_____describes how the management information is structured and ______deals with the relationship and
storage of management information (MIB/SMI)
45>Communication model has ___________components (2/3/4)
46>Components of communication model are
a: management application processes that function in the application layer
b: layer management between layers
c :layer operation within the layers
Ans:___________ (a/b/c/all)
47>___________model deals with the user oriented requirements of network management
(functional/organization/information/communication)
48>OSI defines ____functional application areas (4/5/6)
49>Only ____model presents the complete model for network management (Internet/OSI)_______
50>OSI deals wit all 7 networking layers (true/false)___________
51>The IETF does not define architecture for the SNMP management model explicitly (true/false)___________
52>TMN is based on the___________ model (OSI/internet)
53>______standard is dedicated to the management of layers 1 and 2 of the OSI reference model
(IEEE/IETF)_____
54>The IEEE standard is primarily concerned with the ___________model
(functional/information/organization/communication)
55>In Web based management , ___________model uses Web server - Web browser architecture
(functional/information/organization/communication)
VTU
N
O
TESBYSR
I
NETWORK MANAGEMENT SYSTEMS
15
56>Following object oriented technologies are influencing Web based managementa:hypermedia server
b: CORBA oriented transportation
c: client/server push technology
Ans: ___________ (a/b/c/all)
57>___________model describes the components of network management and their relationships
(functional/information/organization/communication)
58>In organization model, network objects can be classified into managed and unmanaged objects
(true/false)___________
59>MDB stands for___________
60>The managed elements have a management process running in them called___________ (broker/agent)
61>_________ elements do not have a management process running in them (managed/unmanaged)
62>Managed hub is more expensive than the unmanaged hub (true/false)___________
63>_________manages the managed element (agent/manager)
64>In organization model, there is database in_____ _but not in_____ (agent/manager)
65>In _____tier configuration of organization model, the intermediate layer acts both agent and manager
(two/three)______
66>In three tier configuration of organization model, as______, intermediate layer collects data from the network
elements, processes it, and stores the results in its database. As _____, it transmits information to the top level
manager (agent/manager)
67>MoM stands for___________
68>_____refers to a system that runs a management process (NOC/NMS)
69>___________model is concerned with the structure and the storage of information
(organization/information/functional/communication)
70>The representation of objects and information relevant to their management form the management___________
model (organization/information/functional/communication)
71>___________model specifies the information base to describe managed objects and their relationships
(organization/information/functional/communication)
72>____defines the syntax and semantics of management information stored in_______ (MIB/SMI)
73>___________is used by both agent and management processes to store and exchange management information
(MIB/SMI)
74>In information model , _____MIB consists of information on all the network components that it manages ,
whereas ______MIB needs to know only its local information, its MIB view (agent/manager)
75>______is a real database whereas _____is a virtual database (MIB/MDB)
76>_____contains the measured or administratively configured value of the elements of the network. On the other
hand, ______ contains the information necessary for processes to exchange information (MIB/MDB)
77>Following types of information can be stored in the MIB
a: network elements-hubs, bridges , routers, transmission facilities
b: software processes-programs, algorithms , protocol functions , databases
c: administrative information-contact person, account number
Ans:___________ (a/b/c/all)
78>___________objects are uniquely defined by a tree structure specified by the OSI model and are used in the
Internet model (managed/unmanaged)
79>MIT stands for___________
80>In____________ model, the managed objects are defined by a containment tree that represent the MIT
(OSI/Internet)
81>In OSI MIT, there are ____nodes in the layer beneath the root (2/3/4)
82>Wrt OSI MIT, the following are the nodes in the layer beneath the root
a: iso
b: ccitt (itu)
c: iso-ccitt (iso-itu)
Ans:___________ (a/b/c/all)
83>iso stands for___________
84>itu stands for___________
85>There are_____ basic attributes of a managed object type from the Internet perspective (4/5/6)
86>Following are the basic attributes of a managed object type from the Internet perspective
a: object type (object identifier & descriptor)
b: definition
c: syntax
d: access
e: status
Ans:___________ (a/b/c/d/e/all)
VTU
N
O
TESBYSR
I
NETWORK MANAGEMENT SYSTEMS
16
87>Specification for the Internet are defined in RFC documents (true/false)___________
88>A managed object in the Internet model is defined by _____parameters (4/5/6)
89>A managed object in the Internet model is defined by five parameters and for this RFC=____ (1551/1515/1155)
90>A managed object in the Internet model is defined by following parameters
a: object identifier and descriptor
b: syntax
c: access
d: status
e: definition
Ans:___________ (a/b/c/d/e/all)
91>Match the following
object identifier and descriptor : textual description of the semantics of object type
Syntax : implementation requirements
Access : access privilege to a managed object
Status : used to model the object
Definition : unique ID and name for the object type
92>_____ object model is a scalar model and is easy to understand. In contrast , ______perspective of a managed
object is complex and has a different set of characteristics (OSI/Internet)
93>___________specifications are object oriented and hence a managed object belongs to an object class
(OSI/Internet)
94>___________of an object defines the external perspective of the object (entity/attribute)
95>___________of the object is to change its attribute (behavior/operation)
96>An OSI managed object has the following characteristics
a: object class
b: attributes
c: operations
d: behaviour
e: notifications
Ans:___________ (a/b/c/d/e/all)
97>Operation in the Internet model is done by _____&______ commands. Notification s done by
____&_____messages (get/set/response/alarm)
98>In____ , we can create and delete objects, these concepts do not exist in _______ (OSI/Internet)
99>_____characteristics of the Internet model is part of the security function in the OSI functional model
(status/access)______
100>___________characteristics of the Internet model is handled by conformance as part of application services in
OSI (status/access)
101>Match the following
Object type :counts number of packets
Syntax :Mandatory
Access :counter
Status :read only
Description :PktCounter
102>Match the following
Object class :generates notifications on new value
Attributes :get or set
Operations :retrieves or resets values
Behavior :packet counter
Notifications :Single valued
103>Following are characteristics from Internet perspective
a: object type
b: syntax
c: access
d: status
e: description
Ans:__________ (a/b/c/d/e/all)
104>Characteristics from OSI perspective are
a: object class b: attributes
c: operations d: behaviour
e: notifications
Ans:__________ (a/b/c/d/e/all)
VTU
N
O
TESBYSR
I
NETWORK MANAGEMENT SYSTEMS
17
105>Management data is communicated between agent and manager processes, as well as between manager
processes (true/false)__________
106>__________aspects need to be addressed in the communication of information between two entities (2/3/4)
107>Following aspects need to be addressed in the communication of information between two entities
a: transport medium of message exchange
b: message format of communication
c: actual message
Ans:__________ (a/b/c)
108>Match the following
transport protocol :actual message
application protocol :transport medium exchange
commands & responses :message format of communication
109>__________is the unsolicited messages such as alarms, generated by the agent (notification/trap/both)
110>__________model uses CMIP along with CMIS (Internet/OSI)
111>__________model uses SNMP for communication (Internet/OSI)
112>OSI uses _________protocol for transportation (connection oriented/connectionless/both)
113>Internet uses __________UDP/IP protocol to transport messages (connection oriented/connectionless/both)
114>The TP4 transport layer protocol riding on top of the x.25 protocol could be used for__________ transporting
and application messages (connection oriented/connectionless/both)
115>______&_____specifies the management communication protocols for OSI and Internet management
respectively (SNMP/CMIP)
116>__________is a formal language developed jointly by CCITT and ISO for use with application layers for data
transfer between systems (BER/ASN.1)
117>ASN.1 is at the__________ layer (presentation/session)
118>__________is defined as the set of rules used to specify data types and structures for storage of information
(transfer syntax/abstract syntax)
119>___________represents the set of rules for communicating information between systems (transfer
syntax/abstract syntax)
120>____is applicable to the information model while ______is applicable to the communication model (transfer
syntax/abstract syntax)
121>__________can be used with any presentation syntax, depending on the medium of presentation (transfer
syntax/abstract syntax)
122>__________in ASN.1 makes it independent of the lower layer protocols (transfer syntax/abstract syntax)
123>ISO____/_____ standards specify ASN.1 (8825/X.209 or 8824/X.208)
124>The algorithm to convert the textual ASN.1 syntax to machine readable code is called__________ (DER/BER)
125>BER stands for___________
126>BER is defined by ISO_________ (882/X.209 or 8824/X.208)
127>___________is based on the Backus system and uses the formal syntax language and grammar of the BNF
(BER/ASN.1)
128>BNF stands for__________
129> <name>::=<definition> in this expression, <name> denotes _____and the symbol ::= represents______
(defined as/entity/)
130> <digit>::=0|1|2 in this expression, the symbol | represents_____ (and/not/or)
131><op>::=+|-|*|/ in this expression, the definitions on the right side are called ___________
(production/primitives)
132> <SAE>::<number> | <SAE> | <SAE><op><SAE>, in this expression, the format of each line is defined
as___________ (production/assignment/either)
133><BooleanValue>:: TRUE| FALSE, in this expression, entities that are all in capital letters such as TRUE and
FALSE are called__________ (identifiers/keywords)
134>The data types are built up from primitive data types such as
a: INTEGER
b: REAL
c: NULL
d: GraphicString
Ans:__________ (a/b/c/d/all)
135>__________is one of several CharacterString type primitives (StringGraphic /GraphicStshng)
136>Match the following
Alternatives : SET & SEQUENCE
List : SET OF & SEQUENCE OF
Repetition : CHOICE
137>Above constructs are used to build __________data types (primitive/structured)
VTU
N
O
TESBYSR
I
NETWORK MANAGEMENT SYSTEMS
18
138>__________data types are also called atomic entities (primitive/structured)
139>ASN.1 definition allows both backward and forward references as well as in-line definition
(true/false)__________
140>The constructs _____&_____are list builders (SET/SET OF/SEQUENCE/SEQUENCE OF)
141>The order in the list will be maintained if the list is built with the__________ construction (SET/SEQUENCE)
142>If the construct has been _____instead of_____, order in the list would be irrelevant (SEQUENCE OF/SET
OF)
143>{ product-based [0] NULL, basic [1] NULL } these assignments have integers in square brackets and these
are called________ (module/tags)
144>The definition of_________ is introduced in ASN.1 to uniquely identify a data type (module/tag)
145>We can group assignments that are related, this group is called__________ (subroutine/module)
146>identify correct formal definition of a module
a:<module name> DEFINITIONS ::= BEGIN
<name> :: <definition>
END
b: BEGIN ::=DEFINITIONS <module name>
<name> :: <definition>
END
c:<module name> BEGIN ::=DEFINITIONS
<name> :: <definition>
END
Ans:__________ (a/b/c)
147>Match the following
::= range
| start & end of a subtype
- start & end of a list
-- start & end of a tag
{} signed number
[] following the symbol are comments
() defined as or assignment
'' or, alternatives , options of a list signed number
148><module name> DEFINITIONS ::= BEGIN
<name> :: <definition>
END
The terms DEFINITIONS, BEGIN and END are primitives and are called __________in ASN.1
(identifier/keyword)
149>Grouping assignments into modules has following advantages
a: modules can be imported into and exported from other modules
b: modules are reusable
Ans:__________ (a/b/both)
150>Match the following
BEGIN : any negative or non-negative number
CHOICE :a sequence of non-negative numbers
DEFINITIONS :end of an ASN.1 module
END :list of alternatives
EXPORTS :start of an ASN.1 module
IDENTIFIER :definition of a data type or managed object
IMPORTS :data types that can be exported to other modules
INTEGER :data types defined in external modules
151>Match the following
NULL :used with OCTET for denoting string of octets
OBJECT :unordered list makes
OCTET :ordered list maker
OF :unbounded 8 bit bytes (octts) of binary data
SEQUENCE :a placeholder
SEQUENCE OF :used with IDENTIFIER to uniquely identify an object
SET :used with SET and SEQUENCE
SET OF :ordered array of repetitive data
STRING :unordered list of repetitive data
VTU
N
O
TESBYSR
I
NETWORK MANAGEMENT SYSTEMS
19
152>Match the following
Object name :INTEGER, BEGIN
Application data type :RMON-MIB
Module :Counter, IpAddress
Macro, MIB module :PersonalRecord
Keywords :sysDescr, etherStatsPkts
153>Simple data type is also called_________ (primitive/atomic/basic/all)
154>___________uniquely identifies the data type irrespective of the syntax version (atomic/tag)
155>Data types are defined based on___________ (structure/tag/both)
156>wrt Object and Data types, the structure is divided into _______categories (3/4/5)
157>wrt Object and Data types , the tag is divided into___ categories (2/3/4)
158>The tag is divided into following
a: class
b: tag number
Ans:__________ (a/b/both)
159>Following are different categories of data type structure
a: simple type
b: structured type
c: tagged type
d: other type
Ans:_________ (a/b/c/d/all)
160>________type is one for which the values are specified directly (structured/tagged/simple)
161>INTEGER is a________ type (structured/tagged/simple)
162>A data type is a __________type when it contains other types (structured/tagged/simple)
163>Types that are within a structured type are called _________types (component/tagged)
164>SET is distinguished from SEQUENCE in following respects
a: data types should all be distinct
b: order of values in SET is of no consequence
Ans:__________ (a/b/both)
165>Order of values is critical in _______ (SET/SEQUENCE)
166>The component data types in the __________construct need not be distinct because the order is preserved
(SET/SEQUENCE)
167>__________type is a type derived from another type (structured/tagged)
168>__________type is a data type that is not predefined (structured/tagged/other)
169>___________type is chosen from CHOICE and ANY types, which are contained in other types
(structured/tagged/other)
170>Type__________ defines the selection of one value from specified list of distinct types (ANY/CHOICE)
171>Every data type except __________has a tag associated with it (CHOICE/ANY/both)
172>A tag has following components
a: class
b: tag number
Ans:__________ (a/b/both)
173>There are _____classes of tag (3/4/5)
174>Following are different classes of tag
a: universal
b: application
c: context specific
d: private
Ans:__________ (a/b/c/d/all)
175>__________class is the most common (application/context specific/universal/private)
176>Data types in the __________class are application independent (application/context specific/universal/private)
177>__________class is similar to the use of a global variable in a software program and is applicable anywhere in
a program (application/context specific/universal/private)
178>BOOLEAN & INTEGER are examples of __________class , whose tag numbers are [1] and [2] respectively
(application/context specific/universal/private)
VTU
N
O
TESBYSR
I
NETWORK MANAGEMENT SYSTEMS
20
179>Match the following
Universal 1 :REAL
Universal 2 :Object description
Universal 3 :NULL
Universal 4 :BIT STRING
Universal 5 :BOOLEAN
Universal 6 :EXTERNAL
Universal 7 :OBJECT IDENTIFIER
Universal 8 :OCTET STRING
Universal 9 :INTEGER
180>Match the following
Universal 10 :TeletexString
Universal 11 :NumericString
Universal 12-15 :SEQUENCE & SEQUENCE OF
Universal 16 :ENCRYPTED
Universal 17 :ENUMERATED
Universal 18 :Reserved for future use
Universal 19 :SET & SET OF
Universal 20 :PrintableString
181>Match the following
Universal 21 :reserved for future use
Universal 22 :GeneralString
Universal 23 :GraphicString
Universal 24 :UTCTime
Universal 25 :VideotexString
Universal 26 :IASString
Universal 27 :GeneralizedTime
Universal 28 :VisibleString
Universal 29 :CharacterString
182>Tags in the __________class are specific to applications (universal/context specific/application/private)
183>_____class tag number can be overridden with _____tag number (universal/context specific/application)
184>Types in two different applications can have the same __________specific tag but each tag could carry a
different meaning in each application (context specific/application)
185>____type is a subset of_____ , is limited to that application (universal/context specific/application/private)
186>__________type is used extensively by vendors of network products (universal/context
specific/application/private)
187>In _____, there is an identifier for each occurrence of an object. In_____, it is the OBJECT IDENTIFIER
(ASN.1/MIB)
188>The ASN.1 syntax that contains the management information is encoded using the __________defined for the
transfer syntax (DER/BER)
189>TLV stands for__________
190>In TLV , the type has_____ subcomponents (3/4)
191>In TLV, the type has following subcomponents
a: class
b: P/C
c: tag number
Ans:__________ (a/b/c/all)
192>__________specifies whether the structure is a primitive or simple, type or a construct , which is anything
other than a simple type (class or P/C or
tag number)
193>__________is encoded as a one byte or an octet field (class or P/C or
tag number)
194>Match the following
Universal :1 1
Application :0 1
Context specific :0 0
Private :1 0
195>In TLV, the value of P/C is___ for primitive and ___for construct and is designated as the 6th bit (0/1)
196>In TLV, the lowest ___bits designates tag value in binary (4/5/6)
197>In TLV, class :____bits:: ___P/C: ___bits ::Tag number :___bits (1/2/3/4/5/6/7/8)
VTU
N
O
TESBYSR
I
NETWORK MANAGEMENT SYSTEMS
21
198__________is defined as a series of octets (type/length/value)
199>In TLV, the length specifies the length of the value field in number of__________ (bits/octets)
200>In TLV, the integer value is encoded using ______complement form (ones/twos)
201>Wrt TLV , for positive value , the actual value is the binary representation, with the MSB always being___ to
indicate the positive sign (0/1)
202>wrt TLV, -5 becomes ___________in twos complement form (11110111/111111101/11111011)
203>Wrt Macros , ____defines the syntax of the new types and _____defines the syntax of the new values (TYPE
NOTATION/VALUE NOTATION)
204>________model component of the OSI model addresses the user oriented applications
(communication/functional)
205>Functional model consists of ______submodels (4/5/6)
206>Functional model has following submodels
a: configuration management
b: fault management
c: performance management
d: security management
e: accounting management
Ans:___________ (a/b/c/d/e/all)
207>___________management addresses the setting and changing of configurations of networks and their
components (performance/accounting/configuration)
208>Relevant management information is embedded in managed objects such as switches, hubs, bridges and
routers .___________management involves setting up these parameters (performance/accounting/configuration)
209>___________displays in real time the configuration of the network and its status (NOC/NMS)
210>___________management involves detection and isolation of the problem causing the failure in the network
(performance/accounting/configuration/fault)
211>In several failure situations, the network could restore service automatically. This network feature is called
___________ (grooming/self healing)
212>___________ticket administration of fault management tracks all problems in the network including
nonproblems, until they are resolved (service/trouble)
213>___________management is concerned with the performance behavior of the network
(performance/accounting/configuration)
214>___________management involves physically securing the network, access to the network resources and
secured communication over the network (performance/accounting/configuration/security)
215>___________protect corporate networks and network resources from being accessed by unauthorized
personnel and programs, including virus programs (cryptography/firewalls)
216>__________management administers costs of the network (performance/accounting/configuration)
217>___________management is directed toward service providers, in order for them to provide customer
satisfaction and to ensure the profitability of business (performance/accounting/configuration/service &business)
218>Traffic data gathered by_____ management serves as input to _____management
(performance/accounting/configuration)
219>The traffic statistics, trouble ticket administration data and accounting management results are inputs to
___________management (performance/configuration/service & business)
220>Following are network management models
a: OSI
b: Internet
c: TMN
d: IEEE 801
e: Web technology
Ans:___________ (a/b/c/d/e/all)
221>The OSI management model categorizes the____ functions of network management into____ models (3/4/5)
222>The OSI has following network management models
a: organization
b: information
c: communication
d: application
Ans:__________ (a/b/c/d/all)
223>The organization model describes the management process in the network element called the
___________process, and the management process in the ___________ (manger/agent)
224>___________model addresses the structure of management information that enables processes running in
different components in the network to exchange management data (organization/information/communication)
225>The two primary communication protocols are_____ in OSI and ______in the Internet (SNMP/CMIP)
226>The application functions are divided into___ categories of management (3/4/5)
VTU
N
O
TESBYSR
I
NETWORK MANAGEMENT SYSTEMS
22
227>The application functions are divided into following categories of management
a: configuration
b: fault
c: performance
d: security
e: accounting
Ans:___________ (a/b/c/d/e/all)
ANSWERS
1>functional
2>1-c 2-a 3-b
3>service, system, network
4>T
5>Internet
6>Internet, OSI
7>OSI
8>Telecommunication Management Network
9>all
10>all
11>all
12>all
13>both
14>Common Management Information Protocol
15>Common Management Information Service
16>CMIP, CMIS
17>both
18>both
19>CMIP, SNMP
20>IETF (Internet Engineering Task Force)
21>TMN
22>TMN, ITU
23>1,2
24>IEEE
25>802
26>1,2,3
27>LLC
28>browser
29>Desktop Management Task Force
30>DMTF
31>DMTF
32>JMX
33>CMIP
34>T
35>4
36>all
37>organization
38>10040
39>organization
40>information
41>10165
42>Structure of Management Information
43>Management Information Base
44>SMI,MIB
45>3
46>all
47>functional
48>5
49>OSI
50>T
51>T
52>OSI
53>IEEE
VTU
N
O
TESBYSR
I
NETWORK MANAGEMENT SYSTEMS
23
54>communication
55>organization
56>all
57>organization
58>T
59>Management Database
60>agent
61>unmanaged
62>T
63>manager
64>manager, agent
65>3
66>manager, agent
67>Manager of Managers
68>NMS
69>information
70>information
71>information
72>SMI, MIB
73>MIB
74>manager, agent
75>MDB,MIB
76>MDB,MIB
77>all
78>managed
79>Management Information Tree
80>OSI
81>3
82>all
83>International Standards Organization
84>International Telecommunications Union
85>5
86>all
87>T
88>5
89>1155
90>all
91>1-e 2-d 3-c 4-b 5-a
92>Internet, OSI
93>OSI
94>attribute
95>behavior
96>all
97>get&set, response&alarm
98>OSI, Internet
99>access
100>status
101>1-e 2-c 3-d 4-b 5-a
102>1-d 2-e 3-b 4-c 5-a
103>all
104>all
105>T
106>3
107>all
108>1-b 2-c 3-a
109>both
110>OSI
111>Internet
112>both
113>connectionless
114>connection oriented
115>CMIP,SNMP
VTU
N
O
TESBYSR
I
NETWORK MANAGEMENT SYSTEMS
24
116>ASN.1
117>presentation
118>abstract syntax
119>transfer syntax
120>abstract syntax, transfer syntax
121>abstract syntax
122>abstract syntax
123>8824/X.208
124>BER
125>Basic Encoding Rules
126>8825/X.209
127>ASN.1
128>Backus Nauer Form
129>entity, defined as
130>or
131>primitives
132>either
133>keywords
134>all
135>GraphicString
136>1-c 2-a 3-b
137>structured
138>primitive
139>T
140>SET & SEQUENCE
141>SEQUENCE
142>SET OF,SEQUENCE OF
143>tags
144>tag
145>module
146>a
147>1-g 2-h 3-e 4-f 5-c 6-d 7-b 8-a
148>keywords
149>both
150>1-e 2-d 3-f 4-c 5-g 6-b 7-h 8-a
151>1-e 2-f 3-d 4-g 5-c 6-h 7-b 8-i 9-a
152>1-e 2-c 3-d 4-b 5-a
153>all
154>tag
155>both
156>4
157>2
158>both
159>all
160>simple
161>simple
162>structured
163>component
164>both
165>SEQUENCE
166>SEQUENCE
167>tagged
168>other
169>other
170>CHOICE
171>both
172>both
173>4
174>all
175>universal
176>universal
177>universal
VTU
N
O
TESBYSR
I
NETWORK MANAGEMENT SYSTEMS
25
178>universal
179>1-e 2-i 3-d 4-h 5-c 6-g 7-b 8-f 9-a
180>1-e 2-d 3-f 4-c 5-g 6-b 7-h 8-a
181>1-e 2-f 3-d 4-g 5-c 6-h 7-b 8-i 9-a
182>application
183>universal, application
184>application
185>context specific, application
186>private
187>MIB,ASN.1
188>BER
189>Type Length Value
190>3
191>all
192>P/C
193>P/C
194>1-c 2-b 3-d 4-a
195>0,1
196>5
197>7-8, 6, 1-5
198>length
199>octets
200>twos
201>0
202>11111011('.' 00000101 11111010+1=11111011)
203>TYPE NOTATION,VALUE NOTATION
204>functional
205>5
206>all
207>configuration
208>configuration
209>NMS
210>fault
211>self healing
212>trouble
213>performance
214>security
215>firewalls
216>accounting
217>service& business
218>performance, accounting
219>service& business
220>all
221>4
222>all
223>agent, manager
224>information
225>CMIP.SNMP
226>5
227>all
VTU
N
O
TESBYSR
I
NETWORK MANAGEMENT SYSTEMS
26
CHAPTER 4:SNMPv1 NETWORK MANAGEMENT—
ORGANIZATION & INFORMATION MODELS
1>__________management is also referred to as Internet management (SMTP/SNMP)
2>SNMP network management systems can manage even non-TCP/IP network elements through proxy agents
(true/false)__________
3>SNMP management is the most widely used __________ (NMS/NOC)
4>__________comprises management process, agent process and network elements (NMS/NOC)
5>The SNMP information model consist of
__________ (MIB/SMI/both)
6>___________uses ASN.1 syntax to define managed objects (MIB/SMI)
7>___________defines the relationship between managed objects and groups of related objects into MIB modules
(MIB/SMI)
8>MIB2 is a superset of MIB1 and is used in SNMPv__ (1/2)
9>The SNMP architecture, administration and access policies fall under___________ model
(organization/communication)
10>ICMP was developed to manage___________ (ARPANET/INTERNET)
11>___________is a mechanism to transfer control messages between nodes (PING/ICMP)
12>PING stands for__________
13>A popular example of ICMP is___________ (RING/PING)
14>___________i a simple tool used to investigate the heath of a node and the robustness of communication with it
from the source node (PING/ICMP)
15>IAB stands for___________
16>__________was formed to administer Internet activities (ICB/IAB)
17>SGMP stands for___________
18>___________is used to monitor and configure gateways remotely (SNMP/SGMP)
19>_____is an enhancement of______ (SNMP/SGMP)
20>SNMPv__ was developed to make it independent of the OSI standard (1/2/3)
21>IAB was charged with the responsibility to manage following task forces
a: IEEE
b: IETF
c: IRTF
Ans:___________ (a/b/c/all)
22>___________is an organization that maintains several archives of documents related to the Internet and the
IETF's activities (IntraNIC/InterNIC)
23>InterNIC stands for___________
24>STD stands for___________
25>FYI stands for___________
26>IANA stands for___________
27>___________is the central coordinator for the assignment of unique parameter values for Internet protocols
(IETF/IANA)
28>___________RFC subseries was created by to document overviews and topics that are introductory (STD/FYI)
29>___________RFC subseries was created to identify those RFCs that do in fact specify Internet standards
(STD/FYI)
30>There are ___ series of RFC and STD documents (3/4/5)
31>Following are the series of RFC and STD documents
___________ (SMI/MIB/SNMP/all)
32>RFC=____defines the SNMP protocol. RFC=____is on protocol operations. RFC=___ is on transport mappings
(1905/1905/1157)
33>SMI form the contents of RFC=___________ (1155/1156/1157)
34>RFC=____/STD=_____ is currently in use for MIB (1213/1217/13/17)
35>RFC=______is a draft version of MIB2 for SNMPv2 (1155/1907)_____
36>The infrastructure of the manager agent and the SNMP architecture that it is based form ___________model
(information/organization/functional)
37>wrt SNMP, definition of syntax and semantics form the basis of the ___________model
(information/organization/functional)
38>The two tier organization model consists of_____ process which resides in the managed object and______
process which resides in the NMS and manages the managed object (network manager/network agent)
VTU
N
O
TESBYSR
I
NETWORK MANAGEMENT SYSTEMS
27
39>In two tier organization model, multiple managers can interact with one agent (true/false)___________
40>RMON stands for___________
41>In three tier organization model, _________is inserted between the managed object and the network manager
(RMAN/RMON)
42>The pure SNMP management system consists of ___________ (SNMP agent/SNMP manager/both)
43>HFC stands for___________
44>An SNMP management system can behave as an agent as well as a manager (true/false)___________
45>___________model is concerned only with the TCP/IP suite of protocols and does not address the layers above
or below it (OSI/Internet)
46>SNMP interfaces to the TCP/IP with ________are the transport layer protocol (TCP/UDP)
47>RFC=____ describes SNMP system architecture (1156/1157/1158)_
48>RFC=_____ defines SNMP by which management information for a network element may be inspected or
altered by logically remote users (1156/1157/1158)
49>RFC=____describes the structure and identification of management information, and RFC=_______addresses
the information base that is required for management (1154/1155/1156/1157)
50>The communication of management information among management entities is realized through exchange
of___ protocol messages (4/5/6)
51>The communication of management information among management entities is realized through exchange of
following protocol messages
a: get-request
b: get-next-request
c: set-request
d: get-response
e: trap
Ans:___________ (a/b/c/d/e/all)
52>Following protocol messages are initiated by the manager application process
a: get-request
b: get-next-request
c: set-request
d: get-response
e: trap
Ans:___________ (a/b/c/d/e)
53>Following messages are generated by the agent process
a: get-request
b: get-next-request
c: set-request
d: get-response
e: trap
Ans:___________ (a/b/c/d/e)
54>The message generation is called___________
55>__________is unsolicited alarm message (get-response/trap)
56>___________message is generated by the management process requesting the value of an object (get-
request/get-next-request/set-request/get-response/trap)
57>An object may have multiple values because of multiple instances of the object, in this case, _________
message can be used (get-request/get-next-request)
58>___________message is generated by the management process to initiate or reset the value of an object variable
(get-request/get-next-request/set-request/get-response/trap)
59>___________message is generated by an agent process (get-request/get-next-request/set-request/get-
response/trap)
60>___________is an unsolicited message generated by an agent process w/o a message or event arriving from the
manager process (get-request/get-next-request/set-request/get-response/trap)
61>SNMP manager contains following sets of data
a: one on the information about the objects
b: one on the values of the objects
Ans:___________ (a/b/both)
62>In q61, b is ______ (static/dynamic) and contains the measured values associated with the object_____
(true/virtual) database
.63>A MIB is _____ (true/virtual) database and is_________ (static/dynamic)
64>SNMP _____has a database which is the physical database and the SNMP ______does not have a physical
database (agent/manager)
65>_________have MIB which is compiled into the software module (agent/manager)
66>___________model deals with SMI and MIB (organization/functional/information)
VTU
N
O
TESBYSR
I
NETWORK MANAGEMENT SYSTEMS
28
67>The syntax used to describe management information is ASN._ (0/1/2)
68>The specification and organizational aspects of managed objects are addressed in______ (MIB/SMI)
69>The specifications of managed objects and the grouping of. And relationship between, managed objects are
addressed in ________ (MIB/SMI)
70>RFC=___ for SMI. RFC=____ for MIB (1213/1312/1157/1157)
71>Match the following
FDDI :RFC 1695
OSPF :RFC 1285
ATM :RFC 1253
72>A managed object is composed of___________ (object type/object instance/both)
73>SMI is concerned only with_____ and not______ (object type/object instance)
74>___________is a data type , has a name, syntax , and an encoding scheme (object type/object instance)
75>The syntax of an object type is defined using ____and _____have been adopted as the encoding scheme for
transfer of data types between agent and manager processes , as well as between manager processes (BER/ASN.1)
76>Every object type (every name) is uniquely identified by___________ (DESCRIPTOR/OBJECT IDENTIFIER)
77>DESCRIPTOR and OBJECT IDENTIFIER are in uppercase letters because they are___________ keywords
(BER/ASN.1)
78>There are____ objects under the internet object (3/4/5)_______
79>Following are the subnodes under Internet node in SNMPv1
a: directory
b: mgmt
c: experimental
d: private
Ans:___________ (a/b/c/d/all)
80>____________node is reserved for future use of OSI directory in the Internet
(directory/mgmt/experimental/private)
81>___________node is used to identify all IETF recommended and IAB approved subnodes and objects
(directory/mgmt/experimental/private)
82>___________node was created to define objects under IETF experiments (directory/mgmt/experimental/private)
83>___________is a heavily used node (directory/mgmt/experimental/private)
84>___________syntax is used to define the structure of object types (BER/ASN.1)
85>in ASN.1 data type, there are___ categories under structure (3/4/5)________
86>in ASN.1 data type, there are following categories under structure
a: simple
b: defined
c: constructor
Ans:___________ (a/b/c/all)
87>Simple, defined and constructor types are also called___ ____&____respectively
(application/structured/primitive)
88>SEQUENCE & SEQUENCE OF are not called base types (true/false)___________
89>The primitive or simple types are atomic and are INTEGER, OCTET STRING, OBJECT IDENTIFIER &
NULL. These are also referred to as ___________types (aggregate/non-ggregate)
90>When the integer value is restricted by a range it is called___________ (signed/ subtype)
91>The data type ENUMERATED is a special case of the ______data type (REAL/INTEGER)
92>Following are data types under Primitive types
a: INTEGER
b: OCTET STRING
c: OBJECT IDENTIFIER
d: NULL
Ans:___________ (a/b/c/d/all)
93>Following are data types under defined types
a: NetworkAddress b: IpAddress
c: Counter d: Gauge
e: TimeTicks f: Opaque
Ans:___________ (a/b/c/d/e/f/all)
94>Following are data types under constructor types
a: SEQUENCE
b: SEQUENCE OF
Ans:___________ (a/b/both)
95>Match the following
INTEGER :placeholder
VTU
N
O
TESBYSR
I
NETWORK MANAGEMENT SYSTEMS
29
OCTET STRING :object position in MIB
OBJECT IDENTIFIER :8bit bytes binary and textual data
NULL :subtypes INTEGER (n1. . . .nN)
96>Match the following
NetworkAddress :application wide arbitrary ASN.1 syntax, double wrapped OCTET STRING
IpAddress :non-negative integer in hundredth of second units
Counter :capped, on-negative integer, increase or decrease
Gauge :wraparound, non-negative integer, monotonically increasing, may 2^32-1
TimeTicks :dotted decimal IP address
Opaque :Not used
97>____:List maker::______: Table maker (SEQUENCE/SEQUENCE OF)
98>___________data type is used to specify either binary or textual information that is 8 bits long (OCTET
IDENTIFIER/OCTET STRING)
99>The combination keyword __________is the object position in the MIB (OBJECT STRING/OBJECT
IDENTIFIER)
100>___________are application specific data types and are SNMP based types (primitive/defined)
101>The base type ________is used to specify octets of binary information (Gauge/Opaque)
102>__________is intended for adding new base types to extend SNMP SMI (Gauge/Opaque)
103>__________is a choice of the address of the protocol family (IpAddress/NetworkAddress)
104>__________is the conventional four groups of dotted decimal notation of IPv4 (IpAddress/NetworkAddress)
105>__________is an application wide data type and is a non-negative integer (TimeTicks/Gauge/Counter)
106>Counter can only increase in value up to a maximum of 2^__-1 and then wraps around starting from 0
(16/32/64)
107>The data type __________is a non-negative integer , but its value can move either up or down
(Counter/Gauge/TimeTicks)
108>Gauge pegs at its maximum value of 2^__-1 (16/32/64)________
109>__________is a non-negative integer and measures time in units of hundredth of a second
(Counter/Gauge/TimeTicks)
110>The maximum value of TimeTicks is 2^__-1 (16/32/64)
111>__________is an application wide data types that supports the capability to pass arbitrary ASN.1 syntax
(Gauge/Opaque)
112>__________is used to create data types based on previously defined data types (Gauge/Opaque)
113>Size of ________is undefined in SNMPv1, which causes some problem in its implementation (Gauge/Counter/
Opaque)
114>The Opaque data type can be defined both IMPLICITly and EXPLICITly (true/false)__________
115>The constructs ______&____which are in ASN.1, are not included in SNMP based management syntax
(SEQUENCE/SEQUENCE OF/SET/SET OF)
116>____is used to build a list and______ is used to build a table (SEQUENCE/SET/SEQUENCE OF/SET OF)
117>Identify syntax for list
a: SEQUENCE OF <entry>
b: SEQUENCE {<type1>, <type2>. . . . <typeN>}
Ans:__________ (a/b/either)
118>Identify syntax for table
a: SEQUENCE OF <entry>
b: SEQUENCE {<type1>, <type2>. . . . <typeN>}
Ans:__________ (a/b/either)
119>Identify SNMPv1 keywords
a: ACCESS b: BEGIN
c: CHOICE d: Counter
e: DEFINITIONS f: DEFVAL
Ans:___________ (a/b/c/d/e/f/all)
120>Identify SNMPv1 keywords
a: DESCRIPTION b: END
c: ENTERPRISE d: FROM
e: Gauge f: IDENTIFIER
Ans:___________ (a/b/c/d/e/f/all)
121>Identify SNMPv1 keywords
a: IMPORTS b: INDEX c: INTEGER
d: IpAddress `e: NetworkAddress f: OBJECT
Ans:___________ (a/b/c/d/e/f/all)
VTU
N
O
TESBYSR
I
NETWORK MANAGEMENT SYSTEMS
30
122>Identify SNMPv1 keywords
a: OBJECT-TYPE
b: OCTET
c: OF
d: Opaque
e: REFERENCE
f: SEQUENCE
Ans:___________ (a/b/c/d/e/f/all)__________
123>Identify SNMPv1 keywords
a: SIZE
b: STATUS
c: STRING
d: SYNTAX
e: TRAP-TYPE
f: VARIABLES
g: TimeTicks
Ans:___________ (a/b/c/d/e/f/g/all)__________124>SNMPv1 has adopted ____with its____for encoding the
information to be transmitted between agent and manager processes (TLV/ASN.1/BER)___
125>Match the following
ipAdEntAddr :SEQUENCE
ipAdEntIfIndex :INTEGER
ipAdEntNetMask :IpAddress
ipAdEntReasmMaxSize:
ipAdEntBcastAddr:
ipAdEntry
126>Wrt OBJECT IDENTIFIER, if the most significant bit (8th bit) is set to___ , then the subidentifier is only one
octet long. The 8th bit is set to ___for the value that requires more than one octet and indicates more octets to
follow (0/1)___
127>_____ is encoded as straight octet strings._____ _____ & _____ coded as integers._____Is coded as OCTET
STRING type (IP address/opaque/counter/gauge/TimeTicks)
128>Match the following
OBJECT IDENTIFIER :APPLICATION 1
SEQUENCE :APPLICATION 3
IpAddress :APPLICATION 2
Counter :APPLICATION 4
Gauge :APPLICATION 0
TimeTicks :UNIVERSAL 6
Opaque :UNIVERSAL 16
129>A managed object has ____parameters (3/4/5)
130>A managed object has following parameters
a: textual name b: syntax
c: definition d: access
e: status
Ans:_________ (a/b/c/d/e/all)
131>OBJECT DESCRIPTOR does not specify instances of a managed object (true/false)___________
132>Associated with each _____is ______, which is the unique position it occupies in the MIB (OBJECT
IDENTIFIER/OBJECT DESCRIPTOR)
133>__________is the ASN.1 definition of the object type (definition/access/status/syntax)
134>__________is an accepted textual description of the object type (definition/access/status/syntax)
135>__________is the specification for the type of privilege associated with accessing the information
(definition/access/status/syntax)
136>Access is the specification for the type of privilege associated with accessing the information, it can be
__________ (read only/read write/not accessible/either of them)
137>__________specifies whether the managed object is current or obsolete (definition/access/status/syntax)
138>Related objects can be grouped to form ______ object type and the objects that make up the aggregate object
type are called ____object type component/subordinate /aggregate)
139>In order to encode the information on a managed object to be processed by machines , it has to be defined in a
formalized manner. This is done using__________ (micro/macro)
140>The body of the macro module consists of __________parts (3/4/5)
141>The body of the macro module consists of following parts
a: type notation
VTU
N
O
TESBYSR
I
NETWORK MANAGEMENT SYSTEMS
31
b: value notation
c: supporting productions
Ans:__________ (a/b/c/all)
142>____NOTATION defines the object types in the module and ______NOTATION defines the name of the
object (TYPE/VALUE)
143>Access can be only one of following options
a: read only
b: read write
c: write only
d: not accessible
Ans:__________ (a/b/c/d/all)
144>Allowed values for Status are
a: mandatory
b: optional
c: obsolete
Ans:__________ (a/b/c/all)
145>__________object is a group of related objects (compound/aggregate)
146>Object ___ is the managed object ipAddrEntry consist of the subordinate object types of___ through ___
(1/2/5)
147>ipAddrEntry describes the complete set of information consisting of the__ fields needed for an entry in the IP
interface address table (4/5/6)
148>The text following ___are comments and are not encoded (** / --)
149>The __________clause uniquely identifies the instantiation of the entry object type in the table
(REFERENCE/INDEX)
150>The__________ clause is the textual reference to the document from which the object is being mapped
(REFERENCE/INDEX)
151>_____clause is the columnar object identifier while______ clause is the default value to be object
(REFERENCE/INDEX/DEVAL)
152>SNMP operations apply exclusively to scalar operations (true/false)___________
153>_________object type comprises one or more subtypes (compound/aggregate)
154>RFC=____ for SMI (1551/1515/1155)_______
155>RFC=____ for MIB2 (1312/1213)_______
156>MIB is a_______ information store (true/virtual)
157>Objects in the MIB are defined using ASN.1 (true/false)__________
158>__________defines the mechanism for describing the objects (MIB/SMI)
159>The definition of MIB consists of___ components (3/4/5)
160>The definition of MIB consists of following components
a: name
b: syntax
c: encoding
Ans:________ (a/b/c/all)
161>The term __________mandates the implementation of the object in the current version of MIB2
(decrypted/deprecated)
162>Objects that are related are grouped into _____while object types are grouped to form_____ (aggregate object
type/object group)
163>The MIB module structure consists of
a: module name
b: imports from other modules
c: definitions of the current module
Ans:__________ (a/b/c/all)
164>Identify correct MIB module structure
a: <module name> DEFINITIONS::=BEGIN
<imports>
<definitions>
END
b: <module name> BEGIN::=DEFINITIONS
<imports>
<definitions>
END
Ans:__________ (a/b/either)
165>__________group contains the objects that describe system administration (System/Interface/Address
Translation)
VTU
N
O
TESBYSR
I
NETWORK MANAGEMENT SYSTEMS
32
166>__________group defines the interfaces of the network component and the network parameters associated
with each interface (System/Interface/Address Translation)
167>__________group is a cross reference table between the IP address and the physical address
(System/Interface/Address Translation)
168>__________group is a placeholder for future use of the OSI protocol (Transmission/CMOT)
169>___________group was created as a placeholder for network transmission related parameters
(Transmission/CMOT)
170>__________group is the communication protocol group associated with SNMP management (SMT/SNMP)
171>__________group is a placeholder and is not yet defined (Transmission/CMOT)
172>__________group is based on the transmission media that underlie each interface of the system
(transfer/transmission)
173>Match the following
System :mib2 11
Interfaces :mib2 9
at :mib2 7
ip :mib2 5
icmp :mib2 3
Tcp : mib2 1
Udp :mib2 2
egp :mib2 4
cmot :mib2 6
Transmission :mib2 8
Snmp :mib2 10
174>__________group is the basic group in the Internet standard MIB (at/snmp/System)
175>Implementation of the System group is mandatory for all systems in both agent and manager
(true/false)__________
176>The System group consists of___ entities (5/6/7)
177>The System group consists of following entities
a: sysDescr
b: sysObjectId
c: sysUpTime
d: sysContact
e: sysName
f: sysLocation
g: sysServices
Ans:__________ (a/b/c/d/e/f/g/all)
178>_________group contains managed objects associated with the interfaces of a system (System/Interface/snmp)
179>Implementation of the Interfaces group is mandatory for all systems (true/false)__________
180>The Interface group consists of following nodes__________ (ifNumber/ifTable/both)
181>wrt Interface group, the number of interfaces of the entity is defined by ____and the information related to
each interface is defined in the Interface table______ (ifIndex/ifTable/ifNumber)
182>Match the following
sysDescr : system 7
sysObjectId :system 5
sysUpTime :system 3
sysContact :system 1
sysName :system 2
sysLocation :system 4
sysServices :system 6
183>Match the following
ifNumber :largest size of the datagram for the interface
ifTable :type of interface layer below the network layer defined as an enumerated integer
ifEntry :total number of network interfaces in the system
ifDescr :list of entries that describes information on each interface of the system
ifType :an interface entry that contains objects at the subnetwork layer for a particular interface
ifMtu :a unique integer value for each interface
184>Match the following
ifSpeed :value of sysUpTime at the current operational status
ifPhysAddress :current operational status of the interface
ifAdminStatus :current or nominal data rate for the interface in bps
VTU
N
O
TESBYSR
I
NETWORK MANAGEMENT SYSTEMS
33
ifOperStatus :interface's address at the protocol layer immediately below the network layer
ifLastCange :reference to MIB definitions specific to the particular media used to realize the interface
ifSpecific :desired status of the interface ie up, down or testing
185>Match the following
ifInOctets :number of unsupported protocol packets discarded
ifInUcastPkts :number of inbound packets discarded
ifInNUcastPkts :number of subnetwork unicast packets delivered to a higher layer protocol
ifInDiscards :total number of input octets received
ifInErrors :number of non-unicast packets delivered to a higher layer protocol
ifInUnknownProtos :number of inbound packets with errors
186>Match the following
ifOutOctets :length of the output queue in packets
ifOutUcastPkts :number of outbound packets discarded
ifOutNUcastPkts :total number of unicast packets that higher level layer requested to be transmitted
ifOutDiscrds :number of octets transmitted out of the interface
ifOutErrors :total number of non-unicast packets that higher level layer requested to be transmitted
ifOutQLen :number of outbound packets tat could not be transmitted because of errors
187>__________is defined are an Enumerated INTEGER (ifNumber/ifType)
188>In interface group, object identifiers 11 through 15 refer to the measurements on_____ traffic and object
identifiers 16 through 21 to measurement on_____ traffic (outbound/inbound)
189>The Address Translation group consists of table that converts _____to _____for all the interfaces of the system
(physical address/NetworkAddress)
190>The Internet uses __as the networking protocol (TCP/IP)________
191>__________group has the information on the various parameters of the protocol (system/ip/at)
192>The implementation of IP group is mandatory (true/false) __________
193>The IP group contains following tables
a:IP address table
b:IP routing table
c:IP address translation table
Ans:__________ (a/b/c/all)
194>__________indicate whether the node is acting as just as route or gateway between two autonomous networks
(ipForwDatagrams/ipForwarding)
195>Match the following
ipForwarding :number of input datagrams discarded due to unsupported
protocolipDefaultTTL :number of input datagrams discarded due to header error
ipInRecieves :number of datagrams discarded due to address errors
ipInHdrErrors :number of input datagrams attempted to forward to the destination
ipInAddrError :number of locally addressed datagrams received successfully but discarded due to
unsupported protocol
ipForwDatagrams :total number of input datagrams received from interfaces including those in error
ipInUnknownProtos :node acting as a gateway or not
ipInDiscards :time-to-live field of IP header
196>Match the following
ipInDelivers :number of failures detected by the IP reassembly algorithm
ipOutRequests :number of successfully reassembled datagrams
ipOutDiscards :number of IP datagrams received that need reassembly
ipOutNoRoutes :maximum number of seconds that received fragments are held while they are awaiting
reassembly
ipReasmReqds :number of IP datagrams discarded because no route could be found to transmit than to
their destinations
ipReasmOKs :number of no error IP datagram discarded due to lack of buffer space
ipReasmFails :total number of IP datagrams which local IP user protocols supplied to IP
ipReasmTimeOut :total number of input datagrams successfully delivered to IP user protocols
197>Match the following
ipFragOKs :number of routing entries discarded even though they were valid
ipFragFails :IP address translation table that maps IP addresses to physical address
ipFragCreates :IP routing table containing an entry for each route
ipAddrTable :Number of datagram fragments generated as a result of fragmentation
ipNetToMediaTable :number of IP datagrams not fragmented due to Don’t fragment flag set
ipRoutingDiscards :number of successfully fragmented datagrams
VTU
N
O
TESBYSR
I
NETWORK MANAGEMENT SYSTEMS
34
ipRouteTable :table of IP addresses
198>An entry_____ in ipRouteDest Is considered a default route (1.1.1.1/0.0.0.0)
199>Match the following
ipAddrTable :broadcast address indicator bit
ipAddrEntry :index value of the entry
ipAdEntAddr :one of the entries in the IP address table
ipAdEntIfIndex :table of IP addresses
ipAdEntNetMask :the IP address to which this entry's addressing information pertains
ipAdEntBcastAddr :subnet mask for the IP address of the entry
ipAdEntReasmMaxSize :largest IP datagram that can be reassembled on this interface
200>Match the following
ipRouteTable :reference to MIB definition specific to the routing protocol
ipRouteEntry :mask to be logically ANDed with the destination address before comparing with the
ipRouteDest field
ipRouteDest :Routing mechanism by which this route was learned
ipRouteIfIndex :IP address of the next hop
ipRouteMetric1 :primary routing metric for this route
ipRouteNextHop :number of seconds since routing was last updated
ipRouteType :type of route
ipRouteProto :IP routing table
ipRouteAge :route to a particular destination
ipRouteMask :destination IP address of this route
ipRouteInfo :index of interface
ipRouteMetric2 :an alternative metric for this route
201>Match the following
ipNetToMediaTable :type of mapping
ipNetToMediaEntry :IP address
ipNetToMediaIfIndex :media dependent physical address
ipNetToMediaPhysAddress :table mapping IP addresses to physical addresses
ipNetToMediaNetAddress :IP address to physical address for the particular interface
ipNetToMediaType :Interface on which this entry's equivalence is effective
202>Match the following
ipForward :address of next system
ipForwardNumber :mask to be logically ANDed with the destination address before comparing with the
ipRouteDest field
ipForwardTable :a particular route to a particular destination under a particular policy
ipForwardEntry :number of entries in the IP forward table
ipForwardDest :contains information on IP forwarding table, deprecator IP routing table
ipForwardMask :routing table of this entity
ipForwardPolicy :destination IP route of this address
ipForwardNextHop :set of conditions that selects one multipath route
203>Match the following
ipForwardIfIndex :an alterntive routing metric for this route
ipForwardType :primary routing metric for this route
ipForwardProto :autonomus system number of next hop
ipForwardInfo :reference to MIB definition specific to the routing protocol
ipForwardNextHopAS :number of seconds since routing was last updated
ipForwardMetric1 :routing mechanism by which this route was learned
ipForwardMetric2 :type of route--remote, local, invalid or otherwise
ipForwardAge :ifIndex value of the interface
204>The entity__________defines the general set of conditions that would cause the selection of one multipath
route over others (ipForwardProto/ipForwardPolicy)
205>___________is a precursor of SNMP and is part of the TCP/IP suite (IGMP/ICMP)
206>Match the following
icmpInMsgs :number of ICMP echo reply message received
icmpInErrors :number of ICMP echo message received
icmpInDestUnreachs :number of ICMPredirect messages received
icmpInTimeExcds :number of ICMP source quench messages received
icmpInParmProbs :number of ICMP parameter problem messages received
VTU
N
O
TESBYSR
I
NETWORK MANAGEMENT SYSTEMS
35
icmpInSrcQuenches :number of ICMP time exceeded messages received
icmpInRedirects :number of ICMP destination unreachable messages received
icmpInEchoe :total number of ICMP messages received by the entity including icmpInErrors
icmpInEchoReps :number of message received by the entity with ICMP specific errors
207>Match the following
icmpInTimestamps :number of ICMP parameter problem messages sent
icmpInTimestampReps :number of ICMP Time exceeded messages sent
icmpInAddrMasks :number of ICMP destination unreachable messages sent
icmpInAddrMasksReps :number of ICMP timestamp message received
icmpOutMsgs :number of ICMP reply messages received
icmpOutErrors :number of ICMP address mask request messages received
icmpOutDestUnreachs :number of ICMP address mask reply messages received
icmpOutTimeExcds :total number of ICMP messages attempted to be sent by this entity
icmpOutParmProbs :number of good ICMP messages not sent, does not include the ones with errors
208>Match the following
icmpOutSrcQuechs :number of ICMP address mask reply messages sent
icmpOutRedirects :number of ICMP address mask request messages sent
icmpOutEchos :number of ICMP timestamp reply messages sent
icmpOutEchoReps :number of ICMP timestamp message sent
icmpOutTimestamp :number of ICMP echo reply messages sent
icmpOutTimestampReps :number of ICMP echo messages sent
icmpOutAddrMasks :number of ICMP redirect messages sent
icmpOutAddrMasksReps :number of ICMP source quench messages sent
209>In TCP group, the table entry has following indices to uniquely define it in the table
a:tcpConnLocalAddress
b:tcpConnLocalPort
c:tcpConnRemAddress
d:tcpConnRemPort
Ans:___________ (a/b/c/d/all)
210>Match the following
tcpRtoAlgorithm :number of resets done to either CLOSED or LISTEN
tcpRtoMin :number of failed attempts to make connection
tcpRtoMax :number of passive connections made LISTEN to SYN-RCVD state
tcpMaxConn :number of active connections made CLOSED TO SYN-SENT state
tcpActiveConn :Maximum number of TCP connections
tcpPassiveOpens :maximum value for timeout in milliseconds retransmission
tcpAttemptsFails :minimum value for timeout in milliseconds for retransmission
tcpEstabResets :timeout algorithm for retransmission of octets
211>Match the following
tcpCurrEstab :number of segment send containing RST flag
tcpInSegs :Total number of segments received in error
tcpOutSegs :Total number of segments retransmitted
tcpRetransSegs :TCO connection table
tcpConnTable :Total number of segments sent excluding retransmission
tcpInErrs :total number of segments received including with errors
tcpOutRsts :no of connections for which the current state is either ESTABLISHED or CLOSED WAIT
212>Match the following
tcpConnTable :remote port number
tcpConnEntry :remote IP address
tcpConnState :local port number
tcpConnLocalAddress :local IP address
tcpConnLocalPort :state of the TCP connection
tcpConnRemAddress :information about a particular TCP connection
tcpConnRemPort :TCO connection table
213>Match the following
udpInDatagrams :information about a particular connection or UDP listener
udpNoPorts :local IP address
udpInErrors :local UDP port
udpOutDatagrams :total number of datagrams delivered to the users
VTU
N
O
TESBYSR
I
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

More Related Content

What's hot

Computer network & communication answer
Computer network & communication answerComputer network & communication answer
Computer network & communication answersmkengkilili2011
 
Interconnection Network
Interconnection NetworkInterconnection Network
Interconnection NetworkHeman Pathak
 
Types of Load distributing algorithm in Distributed System
Types of Load distributing algorithm in Distributed SystemTypes of Load distributing algorithm in Distributed System
Types of Load distributing algorithm in Distributed SystemDHIVYADEVAKI
 
Mobile ip overview
Mobile ip overviewMobile ip overview
Mobile ip overviewpriya Nithya
 
Mobility Management
Mobility ManagementMobility Management
Mobility ManagementHira Shaukat
 
WIRELESS TRANSMISSION
WIRELESS TRANSMISSIONWIRELESS TRANSMISSION
WIRELESS TRANSMISSIONjunnubabu
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesSayed Chhattan Shah
 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network LayerRahul Hada
 
Network Layer design Issues.pptx
Network Layer design Issues.pptxNetwork Layer design Issues.pptx
Network Layer design Issues.pptxAcad
 
Tcpip services and applications
Tcpip services and applicationsTcpip services and applications
Tcpip services and applicationsOnline
 
Concept of networking
Concept of networkingConcept of networking
Concept of networkingsumit dimri
 
Peer To Peer Protocols
Peer To Peer ProtocolsPeer To Peer Protocols
Peer To Peer Protocolsanishgoel
 
Peer To Peer Networking
Peer To Peer NetworkingPeer To Peer Networking
Peer To Peer Networkingicanhasfay
 
VIRTUALIZATION STRUCTURES TOOLS.docx
VIRTUALIZATION STRUCTURES TOOLS.docxVIRTUALIZATION STRUCTURES TOOLS.docx
VIRTUALIZATION STRUCTURES TOOLS.docxkumari36
 

What's hot (20)

Computer network & communication answer
Computer network & communication answerComputer network & communication answer
Computer network & communication answer
 
Interconnection Network
Interconnection NetworkInterconnection Network
Interconnection Network
 
Utran architecture(rashmi)
Utran architecture(rashmi)Utran architecture(rashmi)
Utran architecture(rashmi)
 
Types of Load distributing algorithm in Distributed System
Types of Load distributing algorithm in Distributed SystemTypes of Load distributing algorithm in Distributed System
Types of Load distributing algorithm in Distributed System
 
Mobile ip overview
Mobile ip overviewMobile ip overview
Mobile ip overview
 
Mobility Management
Mobility ManagementMobility Management
Mobility Management
 
Data dissemination
Data disseminationData dissemination
Data dissemination
 
WIRELESS TRANSMISSION
WIRELESS TRANSMISSIONWIRELESS TRANSMISSION
WIRELESS TRANSMISSION
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network Layer
 
Network Layer design Issues.pptx
Network Layer design Issues.pptxNetwork Layer design Issues.pptx
Network Layer design Issues.pptx
 
Tcpip services and applications
Tcpip services and applicationsTcpip services and applications
Tcpip services and applications
 
Concept of networking
Concept of networkingConcept of networking
Concept of networking
 
Peer To Peer Protocols
Peer To Peer ProtocolsPeer To Peer Protocols
Peer To Peer Protocols
 
Computer networks
Computer networksComputer networks
Computer networks
 
Transport layer
Transport layer Transport layer
Transport layer
 
Peer To Peer Networking
Peer To Peer NetworkingPeer To Peer Networking
Peer To Peer Networking
 
Ad Hoc Wireless Network
Ad Hoc Wireless NetworkAd Hoc Wireless Network
Ad Hoc Wireless Network
 
VIRTUALIZATION STRUCTURES TOOLS.docx
VIRTUALIZATION STRUCTURES TOOLS.docxVIRTUALIZATION STRUCTURES TOOLS.docx
VIRTUALIZATION STRUCTURES TOOLS.docx
 
Network
NetworkNetwork
Network
 

Viewers also liked

VTU 4TH SEM CSE COMPUTER ORGANIZATION SOLVED PAPERS OF JUNE-2013 JUNE-2014 & ...
VTU 4TH SEM CSE COMPUTER ORGANIZATION SOLVED PAPERS OF JUNE-2013 JUNE-2014 & ...VTU 4TH SEM CSE COMPUTER ORGANIZATION SOLVED PAPERS OF JUNE-2013 JUNE-2014 & ...
VTU 4TH SEM CSE COMPUTER ORGANIZATION SOLVED PAPERS OF JUNE-2013 JUNE-2014 & ...vtunotesbysree
 
VTU 5TH SEM CSE OPERATING SYSTEMS SOLVED PAPERS
VTU 5TH SEM CSE OPERATING SYSTEMS SOLVED PAPERSVTU 5TH SEM CSE OPERATING SYSTEMS SOLVED PAPERS
VTU 5TH SEM CSE OPERATING SYSTEMS SOLVED PAPERSvtunotesbysree
 
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015vtunotesbysree
 
VTU 1ST SEM PROGRAMMING IN C & DATA STRUCTURES SOLVED PAPERS OF JUNE-2015 & ...
VTU 1ST SEM  PROGRAMMING IN C & DATA STRUCTURES SOLVED PAPERS OF JUNE-2015 & ...VTU 1ST SEM  PROGRAMMING IN C & DATA STRUCTURES SOLVED PAPERS OF JUNE-2015 & ...
VTU 1ST SEM PROGRAMMING IN C & DATA STRUCTURES SOLVED PAPERS OF JUNE-2015 & ...vtunotesbysree
 
VTU 4TH SEM CSE MICROPROCESSORS SOLVED PAPERS OF JUNE-2014 & JUNE-2015
VTU 4TH SEM CSE MICROPROCESSORS SOLVED PAPERS OF JUNE-2014 & JUNE-2015VTU 4TH SEM CSE MICROPROCESSORS SOLVED PAPERS OF JUNE-2014 & JUNE-2015
VTU 4TH SEM CSE MICROPROCESSORS SOLVED PAPERS OF JUNE-2014 & JUNE-2015vtunotesbysree
 
VTU 5TH SEM CSE SOFTWARE ENGINEERING SOLVED PAPERS - JUN13 DEC13 JUN14 DEC14 ...
VTU 5TH SEM CSE SOFTWARE ENGINEERING SOLVED PAPERS - JUN13 DEC13 JUN14 DEC14 ...VTU 5TH SEM CSE SOFTWARE ENGINEERING SOLVED PAPERS - JUN13 DEC13 JUN14 DEC14 ...
VTU 5TH SEM CSE SOFTWARE ENGINEERING SOLVED PAPERS - JUN13 DEC13 JUN14 DEC14 ...vtunotesbysree
 
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKSMULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKSvtunotesbysree
 
VTU 5TH SEM CSE COMPUTER NETWORKS-1 (DATA COMMUNICATION) SOLVED PAPERS
VTU 5TH SEM CSE COMPUTER NETWORKS-1 (DATA COMMUNICATION)  SOLVED PAPERSVTU 5TH SEM CSE COMPUTER NETWORKS-1 (DATA COMMUNICATION)  SOLVED PAPERS
VTU 5TH SEM CSE COMPUTER NETWORKS-1 (DATA COMMUNICATION) SOLVED PAPERSvtunotesbysree
 
VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...
VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...
VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...vtunotesbysree
 
SOLUTION MANUAL OF WIRELESS COMMUNICATIONS BY THEODORE S RAPPAPORT
SOLUTION MANUAL OF WIRELESS COMMUNICATIONS BY THEODORE S RAPPAPORTSOLUTION MANUAL OF WIRELESS COMMUNICATIONS BY THEODORE S RAPPAPORT
SOLUTION MANUAL OF WIRELESS COMMUNICATIONS BY THEODORE S RAPPAPORTvtunotesbysree
 
MULTIPLE CHOICE QUESTIONS ON COMMUNICATION PROTOCOL ENGINEERING
MULTIPLE CHOICE QUESTIONS ON COMMUNICATION PROTOCOL ENGINEERINGMULTIPLE CHOICE QUESTIONS ON COMMUNICATION PROTOCOL ENGINEERING
MULTIPLE CHOICE QUESTIONS ON COMMUNICATION PROTOCOL ENGINEERINGvtunotesbysree
 
VTU 7TH SEM CSE DATA WAREHOUSING AND DATA MINING SOLVED PAPERS OF DEC2013 JUN...
VTU 7TH SEM CSE DATA WAREHOUSING AND DATA MINING SOLVED PAPERS OF DEC2013 JUN...VTU 7TH SEM CSE DATA WAREHOUSING AND DATA MINING SOLVED PAPERS OF DEC2013 JUN...
VTU 7TH SEM CSE DATA WAREHOUSING AND DATA MINING SOLVED PAPERS OF DEC2013 JUN...vtunotesbysree
 
SOLUTION MANUAL OF OPERATING SYSTEM CONCEPTS BY ABRAHAM SILBERSCHATZ, PETER B...
SOLUTION MANUAL OF OPERATING SYSTEM CONCEPTS BY ABRAHAM SILBERSCHATZ, PETER B...SOLUTION MANUAL OF OPERATING SYSTEM CONCEPTS BY ABRAHAM SILBERSCHATZ, PETER B...
SOLUTION MANUAL OF OPERATING SYSTEM CONCEPTS BY ABRAHAM SILBERSCHATZ, PETER B...vtunotesbysree
 

Viewers also liked (13)

VTU 4TH SEM CSE COMPUTER ORGANIZATION SOLVED PAPERS OF JUNE-2013 JUNE-2014 & ...
VTU 4TH SEM CSE COMPUTER ORGANIZATION SOLVED PAPERS OF JUNE-2013 JUNE-2014 & ...VTU 4TH SEM CSE COMPUTER ORGANIZATION SOLVED PAPERS OF JUNE-2013 JUNE-2014 & ...
VTU 4TH SEM CSE COMPUTER ORGANIZATION SOLVED PAPERS OF JUNE-2013 JUNE-2014 & ...
 
VTU 5TH SEM CSE OPERATING SYSTEMS SOLVED PAPERS
VTU 5TH SEM CSE OPERATING SYSTEMS SOLVED PAPERSVTU 5TH SEM CSE OPERATING SYSTEMS SOLVED PAPERS
VTU 5TH SEM CSE OPERATING SYSTEMS SOLVED PAPERS
 
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
 
VTU 1ST SEM PROGRAMMING IN C & DATA STRUCTURES SOLVED PAPERS OF JUNE-2015 & ...
VTU 1ST SEM  PROGRAMMING IN C & DATA STRUCTURES SOLVED PAPERS OF JUNE-2015 & ...VTU 1ST SEM  PROGRAMMING IN C & DATA STRUCTURES SOLVED PAPERS OF JUNE-2015 & ...
VTU 1ST SEM PROGRAMMING IN C & DATA STRUCTURES SOLVED PAPERS OF JUNE-2015 & ...
 
VTU 4TH SEM CSE MICROPROCESSORS SOLVED PAPERS OF JUNE-2014 & JUNE-2015
VTU 4TH SEM CSE MICROPROCESSORS SOLVED PAPERS OF JUNE-2014 & JUNE-2015VTU 4TH SEM CSE MICROPROCESSORS SOLVED PAPERS OF JUNE-2014 & JUNE-2015
VTU 4TH SEM CSE MICROPROCESSORS SOLVED PAPERS OF JUNE-2014 & JUNE-2015
 
VTU 5TH SEM CSE SOFTWARE ENGINEERING SOLVED PAPERS - JUN13 DEC13 JUN14 DEC14 ...
VTU 5TH SEM CSE SOFTWARE ENGINEERING SOLVED PAPERS - JUN13 DEC13 JUN14 DEC14 ...VTU 5TH SEM CSE SOFTWARE ENGINEERING SOLVED PAPERS - JUN13 DEC13 JUN14 DEC14 ...
VTU 5TH SEM CSE SOFTWARE ENGINEERING SOLVED PAPERS - JUN13 DEC13 JUN14 DEC14 ...
 
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKSMULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
 
VTU 5TH SEM CSE COMPUTER NETWORKS-1 (DATA COMMUNICATION) SOLVED PAPERS
VTU 5TH SEM CSE COMPUTER NETWORKS-1 (DATA COMMUNICATION)  SOLVED PAPERSVTU 5TH SEM CSE COMPUTER NETWORKS-1 (DATA COMMUNICATION)  SOLVED PAPERS
VTU 5TH SEM CSE COMPUTER NETWORKS-1 (DATA COMMUNICATION) SOLVED PAPERS
 
VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...
VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...
VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...
 
SOLUTION MANUAL OF WIRELESS COMMUNICATIONS BY THEODORE S RAPPAPORT
SOLUTION MANUAL OF WIRELESS COMMUNICATIONS BY THEODORE S RAPPAPORTSOLUTION MANUAL OF WIRELESS COMMUNICATIONS BY THEODORE S RAPPAPORT
SOLUTION MANUAL OF WIRELESS COMMUNICATIONS BY THEODORE S RAPPAPORT
 
MULTIPLE CHOICE QUESTIONS ON COMMUNICATION PROTOCOL ENGINEERING
MULTIPLE CHOICE QUESTIONS ON COMMUNICATION PROTOCOL ENGINEERINGMULTIPLE CHOICE QUESTIONS ON COMMUNICATION PROTOCOL ENGINEERING
MULTIPLE CHOICE QUESTIONS ON COMMUNICATION PROTOCOL ENGINEERING
 
VTU 7TH SEM CSE DATA WAREHOUSING AND DATA MINING SOLVED PAPERS OF DEC2013 JUN...
VTU 7TH SEM CSE DATA WAREHOUSING AND DATA MINING SOLVED PAPERS OF DEC2013 JUN...VTU 7TH SEM CSE DATA WAREHOUSING AND DATA MINING SOLVED PAPERS OF DEC2013 JUN...
VTU 7TH SEM CSE DATA WAREHOUSING AND DATA MINING SOLVED PAPERS OF DEC2013 JUN...
 
SOLUTION MANUAL OF OPERATING SYSTEM CONCEPTS BY ABRAHAM SILBERSCHATZ, PETER B...
SOLUTION MANUAL OF OPERATING SYSTEM CONCEPTS BY ABRAHAM SILBERSCHATZ, PETER B...SOLUTION MANUAL OF OPERATING SYSTEM CONCEPTS BY ABRAHAM SILBERSCHATZ, PETER B...
SOLUTION MANUAL OF OPERATING SYSTEM CONCEPTS BY ABRAHAM SILBERSCHATZ, PETER B...
 

Similar to MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

Increasing network efficiency by preventing attacks at access layer
Increasing network efficiency by preventing attacks at access layerIncreasing network efficiency by preventing attacks at access layer
Increasing network efficiency by preventing attacks at access layereSAT Publishing House
 
Distributed computing
Distributed computingDistributed computing
Distributed computingrohitsalunke
 
telecommunication system
telecommunication systemtelecommunication system
telecommunication systemTamilarasan N
 
CSS L12 STRUCTURE OF COMPUTER NETWORK
CSS L12 STRUCTURE OF COMPUTER NETWORKCSS L12 STRUCTURE OF COMPUTER NETWORK
CSS L12 STRUCTURE OF COMPUTER NETWORKMarvin Bronoso
 
Unit 5 lect-3-multiprocessor
Unit 5 lect-3-multiprocessorUnit 5 lect-3-multiprocessor
Unit 5 lect-3-multiprocessorvishal choudhary
 
Automation and Robotics 20ME51I Week 3 Theory Notes.pdf
Automation and Robotics 20ME51I Week 3 Theory Notes.pdfAutomation and Robotics 20ME51I Week 3 Theory Notes.pdf
Automation and Robotics 20ME51I Week 3 Theory Notes.pdfGandhibabu8
 
Lecture 3 -_internet_infrastructure_updated_2011
Lecture 3 -_internet_infrastructure_updated_2011Lecture 3 -_internet_infrastructure_updated_2011
Lecture 3 -_internet_infrastructure_updated_2011Serious_SamSoul
 
CS111-PART 6 (DATA COMMUNICATION & NETWORKING).pptx
CS111-PART 6 (DATA COMMUNICATION & NETWORKING).pptxCS111-PART 6 (DATA COMMUNICATION & NETWORKING).pptx
CS111-PART 6 (DATA COMMUNICATION & NETWORKING).pptxKakai Catalan
 
Mac protocols for cooperative diversity in wlan
Mac protocols for cooperative diversity in wlanMac protocols for cooperative diversity in wlan
Mac protocols for cooperative diversity in wlaneSAT Publishing House
 
NETWORK INFRASTRUCTURE MANAGEMENT-mod1_1.pptx
NETWORK INFRASTRUCTURE MANAGEMENT-mod1_1.pptxNETWORK INFRASTRUCTURE MANAGEMENT-mod1_1.pptx
NETWORK INFRASTRUCTURE MANAGEMENT-mod1_1.pptxSibenConor
 

Similar to MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS (20)

Switching systems lecture2
Switching  systems lecture2Switching  systems lecture2
Switching systems lecture2
 
computer Unit 3
computer Unit 3computer Unit 3
computer Unit 3
 
COMPUTER NETWORKS
COMPUTER NETWORKSCOMPUTER NETWORKS
COMPUTER NETWORKS
 
Increasing network efficiency by preventing attacks at access layer
Increasing network efficiency by preventing attacks at access layerIncreasing network efficiency by preventing attacks at access layer
Increasing network efficiency by preventing attacks at access layer
 
Distributed computing
Distributed computingDistributed computing
Distributed computing
 
telecommunication system
telecommunication systemtelecommunication system
telecommunication system
 
CSS L12 STRUCTURE OF COMPUTER NETWORK
CSS L12 STRUCTURE OF COMPUTER NETWORKCSS L12 STRUCTURE OF COMPUTER NETWORK
CSS L12 STRUCTURE OF COMPUTER NETWORK
 
Dos unit1
Dos unit1Dos unit1
Dos unit1
 
Unit 5 lect-3-multiprocessor
Unit 5 lect-3-multiprocessorUnit 5 lect-3-multiprocessor
Unit 5 lect-3-multiprocessor
 
Computer network
Computer networkComputer network
Computer network
 
Computer network
Computer networkComputer network
Computer network
 
Automation and Robotics 20ME51I Week 3 Theory Notes.pdf
Automation and Robotics 20ME51I Week 3 Theory Notes.pdfAutomation and Robotics 20ME51I Week 3 Theory Notes.pdf
Automation and Robotics 20ME51I Week 3 Theory Notes.pdf
 
Lecture 3 -_internet_infrastructure_updated_2011
Lecture 3 -_internet_infrastructure_updated_2011Lecture 3 -_internet_infrastructure_updated_2011
Lecture 3 -_internet_infrastructure_updated_2011
 
Switching systems lecture1
Switching  systems lecture1Switching  systems lecture1
Switching systems lecture1
 
CS111-PART 6 (DATA COMMUNICATION & NETWORKING).pptx
CS111-PART 6 (DATA COMMUNICATION & NETWORKING).pptxCS111-PART 6 (DATA COMMUNICATION & NETWORKING).pptx
CS111-PART 6 (DATA COMMUNICATION & NETWORKING).pptx
 
chapter_1.pdf
chapter_1.pdfchapter_1.pdf
chapter_1.pdf
 
Networks
Networks   Networks
Networks
 
Mac protocols for cooperative diversity in wlan
Mac protocols for cooperative diversity in wlanMac protocols for cooperative diversity in wlan
Mac protocols for cooperative diversity in wlan
 
Ch 1 network
Ch 1  networkCh 1  network
Ch 1 network
 
NETWORK INFRASTRUCTURE MANAGEMENT-mod1_1.pptx
NETWORK INFRASTRUCTURE MANAGEMENT-mod1_1.pptxNETWORK INFRASTRUCTURE MANAGEMENT-mod1_1.pptx
NETWORK INFRASTRUCTURE MANAGEMENT-mod1_1.pptx
 

Recently uploaded

size separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceuticssize separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceuticspragatimahajan3
 
An Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptxAn Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptxCeline George
 
Keeping Your Information Safe with Centralized Security Services
Keeping Your Information Safe with Centralized Security ServicesKeeping Your Information Safe with Centralized Security Services
Keeping Your Information Safe with Centralized Security ServicesTechSoup
 
MichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdfMichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdfmstarkes24
 
Liberal & Redical Feminism presentation.pptx
Liberal & Redical Feminism presentation.pptxLiberal & Redical Feminism presentation.pptx
Liberal & Redical Feminism presentation.pptxRizwan Abbas
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文中 央社
 
....................Muslim-Law notes.pdf
....................Muslim-Law notes.pdf....................Muslim-Law notes.pdf
....................Muslim-Law notes.pdfVikramadityaRaj
 
Salient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxSalient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxakshayaramakrishnan21
 
Capitol Tech Univ Doctoral Presentation -May 2024
Capitol Tech Univ Doctoral Presentation -May 2024Capitol Tech Univ Doctoral Presentation -May 2024
Capitol Tech Univ Doctoral Presentation -May 2024CapitolTechU
 
ppt your views.ppt your views of your college in your eyes
ppt your views.ppt your views of your college in your eyesppt your views.ppt your views of your college in your eyes
ppt your views.ppt your views of your college in your eyesashishpaul799
 
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptxslides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptxCapitolTechU
 
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptBasic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptSourabh Kumar
 
The Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational ResourcesThe Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational Resourcesaileywriter
 
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfINU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfbu07226
 
Mbaye_Astou.Education Civica_Human Rights.pptx
Mbaye_Astou.Education Civica_Human Rights.pptxMbaye_Astou.Education Civica_Human Rights.pptx
Mbaye_Astou.Education Civica_Human Rights.pptxnuriaiuzzolino1
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽中 央社
 
Gyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptxGyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptxShibin Azad
 
Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).Mohamed Rizk Khodair
 

Recently uploaded (20)

size separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceuticssize separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceutics
 
“O BEIJO” EM ARTE .
“O BEIJO” EM ARTE                       .“O BEIJO” EM ARTE                       .
“O BEIJO” EM ARTE .
 
An Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptxAn Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptx
 
Keeping Your Information Safe with Centralized Security Services
Keeping Your Information Safe with Centralized Security ServicesKeeping Your Information Safe with Centralized Security Services
Keeping Your Information Safe with Centralized Security Services
 
MichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdfMichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdf
 
Liberal & Redical Feminism presentation.pptx
Liberal & Redical Feminism presentation.pptxLiberal & Redical Feminism presentation.pptx
Liberal & Redical Feminism presentation.pptx
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 
....................Muslim-Law notes.pdf
....................Muslim-Law notes.pdf....................Muslim-Law notes.pdf
....................Muslim-Law notes.pdf
 
Salient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxSalient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptx
 
Capitol Tech Univ Doctoral Presentation -May 2024
Capitol Tech Univ Doctoral Presentation -May 2024Capitol Tech Univ Doctoral Presentation -May 2024
Capitol Tech Univ Doctoral Presentation -May 2024
 
ppt your views.ppt your views of your college in your eyes
ppt your views.ppt your views of your college in your eyesppt your views.ppt your views of your college in your eyes
ppt your views.ppt your views of your college in your eyes
 
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptxslides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
 
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptBasic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
 
Post Exam Fun(da) Intra UEM General Quiz - Finals.pdf
Post Exam Fun(da) Intra UEM General Quiz - Finals.pdfPost Exam Fun(da) Intra UEM General Quiz - Finals.pdf
Post Exam Fun(da) Intra UEM General Quiz - Finals.pdf
 
The Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational ResourcesThe Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational Resources
 
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfINU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
 
Mbaye_Astou.Education Civica_Human Rights.pptx
Mbaye_Astou.Education Civica_Human Rights.pptxMbaye_Astou.Education Civica_Human Rights.pptx
Mbaye_Astou.Education Civica_Human Rights.pptx
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 
Gyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptxGyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptx
 
Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).
 

MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

  • 1.
  • 2. NETWORK MANAGEMENT SYSTEMS 1 CHAPTER 1: DATA COMMUNICATION & NETWORK MANAGEMENT OVERVIEW 1>The architecture of the telephone network is hierarchical (true/false)__________ 2>In telephone network model, there are ____levels of network switches and ____types of trunks that connect these switches (3/5/5) 3>__________is a logical link between two switches that may traverse one or more physical links (loop/trunk) 4>In telephone network model, the end office is the __________in the hierarchy (lowest/highest) 5>figure 1.1__________ 6>Match the following Regional center : class 4 switch Sectional center : class 5 switch Primary center : class 1 switch Toll center : class 3 switch End office : class 2 switch 7>In telephone network model, the customer's telephone or PBX which is a switch on the customer premises , is connected to the end office via a dedicated link called___________ (trunk/loop) 8>Toll switches carry long distance calls (true/false)___________ 9>DDD stands for___________ 10>In telephone network model, _______ (DET/DDD)network enables up to dial the far end telephone w/o an operator’s assistance, comprises___ transmission trunks (2/3/4) 11>Match the following direct trunk :connects any two toll offices toll connecting trunk :connects an end office to any toll office toll (internal) trunks :connects two end offices 12>In telephone network model , a circuit connection is set up a: directing using a local trunk b: via the higher level switches and routes Ans :__________ (a/b/either) 13>In telephone network model, primary and secondary routes are already programmed into the___________ (bridge/switch) 14>Operations support systems ensure the quality of service in the telephone network (true/false)___________ 15>The quality of the call, measured in terms of SNR is measured regularly by a trunk maintenance system________ (true/false) 16>NOC stands for__________ 17>For a given region, there is ___________where the global status of the network is monitored (PBX/NOC) 18>___________is the nerve center of telephone network operations (PBX/NOC) 19>The telephone network is managed from the perspective o_________ (service provider/user)20>In telephone network, with the emphasis on the users' point of view, the first objective in operations is_____ and then ______ (quality & economy of service/restoration of service) 21>POTS stands for___________ 22>___________communications technology deals with the theories of electrical engineering, computer engineering, and computer science and their application to all types of communications over networks (telecommunication/data/network) 23>A basic network can be viewed is interconnected ________ (nodes/links/both) 24>___________carrier information from one node to another that is directly connected to it (network/link) 25>A node behaves as a: end node b: intermediate node Ans:___________ (a/b/both) 26>If the node behaves as_____ node, information either originates or terminates there. ______node redirects the information from one link to another (intermediate/end) 27>In telephone network model, End office nodes behaves as___________ (intermediate/end) 28>Each ___________node has connection to a user interface , if the information originates or terminates there (intermediate/end) 29>DTE stands for___________ 30>___________is any equipment that generates or accepts digital data (DDD/DTE) VTU N O TESBYSR I
  • 3. NETWORK MANAGEMENT SYSTEMS 2 31>Data can be transmitted in a: analog format b: digital format Ans:___________ (a/b/either) 32>The __________data is sent either as base band or on top of a carrier (digital/analog) 33>___________data is generated either directly by the user equipment or as analog data and converted to digital data (digital/analog) 34>ISDN stands for___________ 35>Long distance data transmission today is mostly ___________due to its superior price and performance (digital/analog) 36>The data can be transmitted in following modes a: circuit switches b: message switched c: packet switches Ans:___________ (a/b/c/all) 37>In__________ switched mode , a physical circuit is established between the originating and terminating ends before the data is transmitted (circuit / message/ packet switches) 38>In_____ &______switched modes, the data is broken into packets and each packet is enveloped with the destination and originating addresses (circuit / message/ packet switches) 39>___________switched mode is used to send long messages such as email (circuit / message/ packet switches) 40>___________switched mode is used to transmit small packets used in applications such as interactive communication (circuit / message/ packet switches) 41>In telephone network, _____&_____open each packet to find the destination address and forward the data to the appropriate output links (switch/bridge/router) 42>In _________switched mode, each packet may take a different route (circuit/packet) 43>The main difference between packet and message switching is that in the ___________the data is stored by the system and then retrieved by the user at the later time (former/latter) 44>In___________ switched mode, the packets are fragmented and reassembled in almost real time (message/packet) 45>email is an example of_________ switched mode (message/packet) 46>PSDN stands for___________ 47>Network communications are classified as either _____or______ communication (tele/wireless/data) 48>Telecommunication network is a __________switched network that is structured as a public network accessible by any user (message/circuit) 49>Data communication network is also called computer communication network (true/false)___________ 50>___________transfer the information from digital to analog at source and back to digital at destination 51>In corporate data and telecommunication networks, the computer terminals are connected to___________ which manages the local terminals and provides a single interface to the telephone network (onsite switch PBX/onsite communication controller) 52>In corporate data and telecommunication networks, the telephones are connected locally by ___________ which interfaces to the telephone network (onsite switch PBX/onsite communication controller) 53>Processor to processor communications over the telecommunications lines take _____time and therefore are______ expensive (less/more) 54>SNA stands for___________ 55>In SNA, the host is connected to the terminals via the _____controllers and ______controllers (communications/cluster/both) 56>In SNA, _____ controllers manage the DTEs at the peripheral nodes and the ______controllers manage the traffic at the subnetwork levels (communications/cluster/both) 57>DCE stands for___________ 58>The system of links that connect remote LANs is called___________ (MAN/WAN) 59>A LAN is physically connected to a WAN link by ______or _____at each end (switch/bridge/router) 60>Important aspects of DCEs are a: the different platforms and applications running on DCEs have the ability to communication with each other b: the ability of the processors attached to LANs do multiple functions Ans: ___________ (a/b/both) 61>The processor that requests a service is called the _____, and the processor that provides the service is called the______ (server/client) VTU N O TESBYSR I
  • 4. NETWORK MANAGEMENT SYSTEMS 3 62>The process that initiates a transaction to run an application in either a local or remote processor is called the _____.The application process that is invoked by a _____ is called the______ (server/client) 63>In client/server architecture, the ____initiates the request and the _______responds (server/client) 64>Client cannot initiate a process in the server (true/false)___________ 65>A real world analogy of the client/server operation is a post office (true/false)___________ 66>The communication between operative computing processes is called ___________communication (end to end/peer to peer) 67>___________is a suite of protocols that enable networks to be interconnected (UDP/IP or TCP/IP) 68>IP is a _____ protocol. TCP is a ______protocol. UDP is a ______protocol (connection oriented/connectionless) 69>Most of Internet traffic really uses___________ because of the reliability of data transmission (UDP/IP or TCP/IP) 70>The Internet is a network of networks (true/false)___________ 71>___________serve as the interface between dissimilar and independent , autonomous , networks and perform many functions including protocol conversions (routers/gateways) 72>Autonomous networks have little knowledge each other's attributes , configurations and addresses and yet communication is automatically facilitated by a hierarchy of Internet servers along the path (true/false)___________ 73>Email messages are transmitted by a___________ scheme all along the path (stop & wait/ store & forward) 74>Internet users are currently doubling n population each year (true/false)___________ 75>In layered architecture, the workstations belong to the___________ plane (LAN/user) 76>in layered architecture, the interfaces are defined as the fabrics (true/false)___________ 77>In Internet fabric model, the LAN and WAN planes interface through _____fabric. The WANs in the WAN plane interface via the______ fabric (gateway/switching) 78>In Internet fabric model, the user's workstation interfaces to a LAN via a ___________interface (gateway/switching/MAC) 79>In Internet fabric model, LANs interface to a WAN by a switching fabric of ___________ (bridges/routers/switches/all) 80>____________fabric interconnects different WANs (gateway/switching) 81>_____is a private network and access to it is controlled by the enterprise that owns it, whereas______is public (internet/intranet) 82>In communication lingo, commonality can be interpreted as _____and procedures as______ (protocols/standards) 83>___________can be defined as the basic structure of a system that shows its functional components and the relationships among the 84>___________architecture describes the functional components of a communication network as well as the operational interfaces among them (network/communication) 85>The operational procedures are specified in terms of ___________ (standards/protocols) 86>Standardization of___________ involves agreement in the physical characteristics and operational procedures of communication equipment that performs similar functions (policy/protocol) 87>Email exchange across the world is possible because most vendors have adopted the standard ___________in their software (MIME/SMTP) 88>Each system can be divided into ______broad sets of communication layers (2/3/4) 89>in communication architecture , top set of layers consists of the _____layers and the bottom set of the______ layers (transport/application) 90>The data can be transmitted in one of____ modes (2/3/4) 91>The ISO has developed a highly modular or layered , architecture for communication protocols that is called the OSI reference model , published as OSI RM--ISO______ (7948/749) 92>OSI reference model was developed based on the premise that a: the different layers of protocol provide different services b: each layer can communicate with only its own neighboring level Ans:___________ (a/b/both) 93>In OSI reference model, two systems can communicate on a ___________level (end to end/peer to peer) 94>In OSI reference model, layers __ __are the transport system protocol layers; and layers ______are application support protocol layers (1/2/3/4/5/6/7) 95>In OSI reference model, the intermediate system is involved only up to the first ________layers in the process (3/4) VTU N O TESBYSR I
  • 5. NETWORK MANAGEMENT SYSTEMS 4 96>Match the following Physical :provides application specific protocols for each application and each transport protocol system Data link :establishes and clears sessions for applications, and thus minimizes loss of data during large data exchange Network :forms the switching/routing layer of the network Transport :multiplexes and de-multiplexes messages from applications Session :transfers to and gathers from the physical medium raw bi data Presentation :Consists of two sublayers LLC and MAC Application :provides a set of standard protocols so that the display would be transparent to syntax of the application 97>_____formats the data to go on the medium; performs error control and flow control.______ controls data transfer to and from LAN; resolves conflicts with other data on LAN (MAC/LLC) 98>Identify feature of transport layer in OSI reference model a: multiplexes and demultiplexes messages from applications b: acts as a transparent layer to applications and thus isolates them from the transport system layers c: makes and breaks connections for connection-oriented communication d: controls flow of data in both directions Ans:___________ (a/b/c/d/all) 99>Identify features of physical layer in OSI reference model a: provides a set of standard protocols so that the display would be transparent to syntax of the application b: transfers to and gathers from the physical medium bit data c: data encryption and decryption d: handles physical and electrical interfaces to the transmission medium Ans:___________ (a/b/c/d/all) 100>Identify features of presentation layer in OSI reference model a: provides a set of standard protocols so that the display would be transparent to syntax of the application b: transfers to and gathers from the physical medium bit data c: data encryption and decryption d: handles physical and electrical interfaces to the transmission medium Ans:___________ (a/b/c/d/all) 101>In OSI reference model , the message in each layer is contained in message units called__________ 102>PDU consist of _____parts (2/3) 103>PDU consists of ____&______ (PCI/VCI/UD) 104>In PDU , ____contains header information about the layer while ______contains the data that he layer , acting as a service provider , receives from or transmits to the upper layer/service user layer (PCI/UD) 105>In OSI reference model, the size of the PDU increases as it goes toward _______layers (higher/lower) 106>__________layer is responsible for physically placing the electrical signal on the physical medium and picking up the signal from it (presentation/physical) 107>__________layer controls and manages the physical and electrical interfaces to the physical medium including the connector or transceiver (presentation/physical) 108>There are various protocol standards for physical layer interface, _____classes of standards have been established by the ITU-T and EIA (2/3) 109>ITU-T stands for__________ 110>EIA stands for__________ 111>The data communication between two DTEs is controlled and managed by __________layer (network/data link) 112>In data link layer, the data communication is serial __________oriented stream (bit/byte) 113>functions of data link layer are a: establish and clear the link b: transmit the data c: error control and data compression d: flow control Ans:__________ (a/b/c/d/all) 114>Flow control on the data link layer is done on a hop to hop basis (true/false)__________ 115>In data link layer, the lower __________layer controls the access and transmittal of data to the physical layer in an algorithm manner (LLC/MAC) 116>There are _____basic forms of LANs (2/3) 117>Ethernet LAN:____ type: :FDDI:____ type (ring/bus) VTU N O TESBYSR I
  • 6. NETWORK MANAGEMENT SYSTEMS 5 118>features of network layer are a: controls and manages the switching fabric of the network b: provides both connectionless network service and connection oriented network service Ans:________ (a/b/both) 119>CLNS stands for___________ 120>CONS stands for__________ 121>__________is used when the lower layers are highly reliable such as LANS and bridges as well as when the messages are short (CONS/CLNS) 122>__________is the method for transmitting long messages such as file transfer (CONS/CLNS) 123>__________is used when the transmission medium is not reliable (CONS/CLNS) 124>___________at the nodes of a network performs the function of routing and switching the data (switch/router) 125>The OSI architecture model divides the network layer into ________sublayers (2/3/4) 126>Sublayers of network layer are a: SNICP b: SNDCP c SNDAP Ans:_________ (a/b/c/all) 127>SNICP stands for___________ 128>SNDCP stands for__________ 129>SNDAP stands for___________ 130>In network layer , the top sublayer is _________that interfaces to the transport layer (SNICP/SNDCP/SNDAP) 131>The Internet communicates between nodes using an Internet address and _____.The nodes in turn communicate with subnetworks using_____ which depends on the subnetwork protocol (SNICP/SNDCP/SNDAP) 132>The SNDCP communicates with is data link layer via the third network sublayer___________ (SNICP/SNDAP) 133>In OSI terminology, TCP/IP is called __________ (ISO-IP/ISO-CLNP/either) 134>A connection ____OSI protocol is X.25 PLP, a packet layer protocol (less/oriented) 135>Identify feature of transport layer a: multiplexes the user data provided by the application layers and passes the packets to the network layer b: service is independent of the network on which the packets are transmitted c: can be connectionless or connection oriented and is implemented in both Internet and OSI protocols d: flow control is implemented and functions as a data rate manager between the application programs and the network layer Ans:__________ (a/b/c/d/all) 136>Layers ___through ___application layer protocols (4/5/6/7) 137>__________layer establish the communication at the beginning of the session, monitor , synchronize and error correct the information exchanged during the session and then release the logical link at the end of the session (presentation/session) 138>__________layer is the medium of presentation of message's context to the user or application program (physical/presentation) 139>__________layer is a context sensitive layer (physical/presentation) 140>wrt presentation layer , a common syntax that is used for semantics is__________ (BER/ASN.1) 141>ASN.1 stands for__________ 142>Data encryption and data compression are also generally done in __________layer (physical/presentation) 143>The _____&_____layers form the suite of TCP/IP protocols (transport/data link/network) 144>wrt SNA , arrange the following in correct sequence (top to bottom) a: physical b: path control c: transmission control d: data link e: data flow control f: presentation services g: end user application Ans:__________ (gfecabd/gfecbda/gfeabdc) 145>In SNA, the combination of _____&_____services are called the SNA transmission subsystem (transmission control/presentation/data flow ) 146>In SNA , _________services are also known as SNA high level services (data flow/transmission control/presentation ) 147>All application specific protocol services in OSI are sandwiched between the_____ and_____ layers (user/transport/presentation) 148>In the Internet model, all application specific protocol services are sandwiched between the____&_____ layers (session/user/transport) VTU N O TESBYSR I
  • 7. NETWORK MANAGEMENT SYSTEMS 6 149>A user interfaces with a host at a remote terminal using ____in the OSI model and ______in the Internet model (Telnet/VT) 150>File transfers are accomplished using _____in the OSI model and _____in the Internet (FTP/FTAM) 151>FTAM stands for___________ 152>The most common mail service function in the Internet is______. A similar protocol in the OSI model is_____ (MOTIS/SMTP) 153>MOTIS stands for_________ 154>Network management is accomplished using ____in the OSI model and _______in the Internet (CMIP/SNMP) 155>CMIP stands for___________ 156>OAM&P stands for___________ 157>NMS stands for__________ 158>The most common and serious problems of networks are connectivity failures, which are in the category of__________ management (security/fault) 159>__________is generally interpreted to mean failures in accessing networks and systems by the users (risk/fault) 160>Power hits could reset network component configuration, causing network failures (true/false)________ 161>CIO stands for_________ 162>The corporate network needs to be secured for privacy and content using __________ (firewalls/encryption/both) 163>____network was monopolistic and had expensive redundancy. ______network is adhoc, decentralized, has loosely specified interfaces, and has dynamic routing (data/telephone) 164>The latest user satisfaction for an ISP is _____% (8/16/32) 165>Which elements of managing your network require most of your time? a: configuring the management system itself b: expanding the network c: gathering and analyzing statistics for presentation to upper management Ans:__________ (a/b/c/all) 166>Sniffer is an example of troubleshooting tools (true/false) __________ 167>What does a network failure cost the user a: there are tangible and intangible losses b: the cost is a function of the dependence of the business upon shared data c: A&R labs need high technology and tolerate low reliability. Business accept lower and proven technology but require high reliability Ans:__________ (a/b/c/all) 168>__________management can be defined as OAM&P of network and services (configuration/network) 169>Match the following Operations group :involves network planning and circuit provisioning network administration :handles functions that include both installation con repairs of facilities and equipment installation & maintenance group: concerned with daily operations in providing network services Provisioning :concerned with establishing and administering the overall goals , policies and procedures of network managements 170>The goal of network management is to ensure that the users of a network receive the information technology services with the quality of service that they expect (true/false)__________ 171>Network management comprises of _______major groups (2/3/4) 172>Network management comprises of following groups a: network provisioning b: network operations c: network installation and maintenance Ans:__________ (a/b/c/all) 173>_______is the primary responsibility of the engineering groups and ____is the primary responsibility of the plant facilities group (network provisioning/network operations/network I&M) 174>The normal daily operations are the function of the __________groups, which controls and administers a network operation center (network provisioning/network operations/network I&M) 175>NOC stands for__________ 176>__________is the nerve center of network management operations (NMS/NOC) 177>The functions of the NOC are concerned primarily with _____;its secondary responsibilities are_____&_____ (network provisioning/network operations/network I&M) 178>__________consists of network planning and design and is the responsibility of the engineering group (network provisioning/network operations/network I&M) VTU N O TESBYSR I
  • 8. NETWORK MANAGEMENT SYSTEMS 7 179>ISO has defined __OSI network management applications (4/5/6) 180>__________are concerned with daily operations of the network and providing network services (network provisioning/network operations/network I&M) 181>ISO has defined following OSI network management applications a: fault management b: configuration management c: performance management d: security management e: account management Ans:__________ (a/b/c/d/e/all) 182>Whenever there is a service failure, it is responsibility of _______to restore service as soon as possible (NMS/NOC) 183>In several failure situations , the network will detect and restore service automatically .This network feature is called __________ (grooming/self healing) 184>Restoration of service does not include fixing the cause of the problem. That responsibility to fix the problem usually rests with the__________ group (network provisioning/network operations/network I&M) 185>__________administration is the administrative part of fault management and is used to track problems in the network (session ticket/trouble ticket) 186>wrt network management , there are ______configurations of the network (3/4/5) 187>Following are the configurations of the network a: static configuration b: current running configuration c: planned configuration Ans:__________ (a/b/c/all) 188>_____configuration is one that would come up if the network is started from idle status. In_____ configuration of the future , the configuration data will change as the network is changed (planned/current/static) 189>__________management includes physically securing the network as well as controlling access to the network by the users (fault/security) 190>Access privilege to application software is not the responsibility of the NOC unless the application is either owned or maintained by the NOC (true/false)__________ 191>Traffic statistics are helpful in detecting trends and planning future needs (true/false)__________ 192>NOC gathers data and keeps them up to date in order to tune the network for optimum performance (true/false)__________ 193>__________administers costs and allocate the use of the network (NMS/NOC) 194>Since the network consists of components manufactured by multiple vendors, commonality in the definition and relationship of component attribute is needed. This is defined by the __________ (SMI/MIB) 195>__________is the Internet management protocol which is the most popular protocol to acquire the data automatically using protocol and performance analyzing tools (SMTP/SNMP) 196>There______ classes of reports (3/4/5) 197>Following are different classes of reports a: system report b: management report c: user report Ans:__________ (a/b/c/all) 198>Match the following System report :are distributed to the users on a periodic basis to let them know the status of network performance management report :are needed for network operations to track the activities user report :goto the management of the network management group to keep them informed about the activities and performance of the NOC and the networks 199>__________group takes care of all installation and maintenance of equipment and cables (network operation/network I&M) 200>___________group is the service arm of the engineering group for installation and fixing troubles for network operations (network operation/network I&M) 201>__________management is the management of systems and system resources in the network while_________ management is concerned with network resources such as hubs , switches , bridges , routers and gateways, and the connectivity among them via a network (system/data/network) 202>___________management addresses end to end connectivity between any two processors in the network (system/network) 203>A network consists of network components and their inter connections (true/false)_________ 204>A network management system manages all the components that are connected to a network (true/false)__________ VTU N O TESBYSR I
  • 9. NETWORK MANAGEMENT SYSTEMS 8 205>The two major standards are the Internet and the OSI standards (true/false)___________ 206>TMN stands for___________ 207>The popular _____ end systems are housed either on SUN or HP UNIX based workstations. The ______end network management systems run either on Windows 95/98 or Windows NT (low/high) 208>Network connectivity could be tested using the ping command in UNIX (traceroute) and Windows NT (tracert) based system (true/false)___________ 209>The current network management systems are based on the ________protocol (SMTP/SNMP) 210>following are limitations of current network management systems a: they need a dedicated NMS monitoring station, which must be on a specific type of platform b: the values of the managed objects should be defined as scalar values c: SNMP based management is a poling based system Ans:___________ (a/b/c/all) 211>__________ based management protocol CMIP is object oriented (OSI/Internet) 212>Limitations in SNMP based management have been overcome by the emerging web based management (true/false)___________ 213>A web based system is platform independent for the management software using Java languase in the managed components , for the Web based NMS server as well as for Web browser monitors (true/false)___________ 214>Following are web based management schemes a: Java based JMX developed by Sun b: WBEM based on the Common Information Model developed by Microsoft Ans:___________ (a/b/both) 215>JMX stands for___________ 216>WBEM stands for__________ 217>The broadband multimedia service is based on ATM SONET wide area network and several emerging access technologies such as HFC and ADSL (true/false)___________ 218>HFC stands for___________ 219>ADSL stands for___________ 220>___________network, which is the direction of the next generation network, would include embedded network management applications (intelligent/active) 221>following methods can be used to find the root of a problem in network a: artificial intelligence b: algorithmic schemes c: finite state machine Ans:___________ (a/b/c/all) 222>_____establish secure networks , and______ ensures secure communication (cryptography/firewalls) ANSWERS: 1>T 2>5,3 3>trunk 4>lowest 5> 6>1-c 2-e 3-d 4-a 5-b 7>loop 8>T 9>Direct Distance Dialing 10>DDD,3 11>1-c 2-b 3-a 12>either 13>switch 14>T 15>T 16>Network Operation Center 17>NOC 18>NOC 19>user 20>restoration of services, quality and economy 21>Plain Old Telephone Service 22>network 23>both 24>link 25>both VTU N O TESBYSR I
  • 10. NETWORK MANAGEMENT SYSTEMS 9 26>end, intermediate 27>end 28>end 29>Data Terminating Equipment 30>DTO 31>either 32>analog 33>digital 34>Integrated Services Digital Network 35>digital 36>all 37>circuit 38>message & packet 39>message 40>packet 41>bridges & routers 42>packet 43>latter 44>packet 45>message 46>Public Switched Data Network 47>tele, data 48>circuit 49>T 50>modem 51> onsite communication controller 52> onsite switch PBX 53>less, less 54>Systems Network Architecture 55>both 56>cluster, communication 57>Distributed Computing Environment 58>WAN 59>bridge, router 60>both 61>client, server 62>client, client, server 63>client, server 64>T 65>T 66>peer to peer 67>TCP/IP 68>connectionless, connection oriented, connectionless 69>UDP/IP 70>T 71>gateway 72>T 73>store & forward 74>T 75>user 76>T 77>switching, gateway 78>MAC 79>all 80>gateway 81>intranet, internet 82>standards, protocols 83>architecture 84>communication 85>protocols 86>protocols 87>SMTP VTU N O TESBYSR I
  • 11. NETWORK MANAGEMENT SYSTEMS 10 88>2 89>application, transport 90>3 91>7498 92>both 93>peer to peer 94>1to4 5to7 95>3 96>1-e 2-f 3-c 4-d 5-b 6-g 7-a 97>LLC, MAC 98>all 99>b,d 100>a,c 101>protocol data unit 102>2 103>PCI, UD 104>PCI, UD 105>lower 106>physical 107>physical 108>2 109>International Telecommunications Union-Telecommunication Sector 110>Electronics Industries Association 111>data link 112>bit 113>all 114>T 115>MAC 116>2 117>bus, ring 118>both 119>Connectionless Network Service 120>Connection Oriented Network Service 121>CLNS 122>CONS 123>CONS 124>router 125>3 126>all 127>SubNetwork Independent Convergence Protocol 128>SubNetwork Dependent Convergence Protocol 129>SubNetwork Dependent Access Protocol 130>SNICP 131>SNICP, SNDCP 132>SNDAP 133>either 134>oriented 135>all 136>5to7 137>session 138>presentation 139>presentation 140>ASN.1 141>Abstract Syntax Notation Number One 142>presentation 143>transport, network 144>gfecbda 145>transmission control, data flow 146>presentation 147>user, presentation 148>user, transport 149>VT, telnet VTU N O TESBYSR I
  • 12. NETWORK MANAGEMENT SYSTEMS 11 150>FTAM, FTP 151>File Transfer Access & Management 152>SMTP, MOTIS 153>Message Oriented Text Interchange Standard 154>CMIP, SNMP 155>Common Management Information Protocol 156>Operations Administration Maintenance & Provisioning 157>Network Management System 158>fault 159>fault 160>T 161>Chief Information Officer 162>both 163>telephone, data 164>16 165>all 166>T 167>all 168>network 169>1-c 2-d 3-b 4-a 170>T 171>3 172>all 173>network provisioning, network I&M 174>network operation 175>Network Operations Center 176>NOC 177>network operations, network provisioning and network I&M 178>network provisioning 179>5 180>network operation 181>all 182>NOC 183>self healing 184>network I&M 185>trouble ticket 186>3 187>all 188>static, planned 189>security 190>T 191>T 192>T 193>NOC 194>MIB 195>SNMP 196>3 197>all 198>1-b 2-c 3-a 199>networkI&M 200>network I&M 201>system, network 202>network 203>T 204>T 205>T 206>Telecommunication Management System 207>high, low 208>T 209>SNMP 210>all 211>OSI VTU N O TESBYSR I
  • 13. NETWORK MANAGEMENT SYSTEMS 12 212>T 213>T 214>both 215>Java Management Extensions 216>Web Based Enterprise Management 217>T 218>Hybrid Fiber Coax 219>Asymmetric Digital Subscriber Loop 220>active 221>all 222>firewalls, cryptography VTU N O TESBYSR I
  • 14. NETWORK MANAGEMENT SYSTEMS 13 CHAPTER 3: BASIC FOUNDATION -- STANDARDS, MODELS AND LANGUAGE 1>__________ model addresses the applications that fall into the categories of fault, configuration, performance, security and accounting (information/functional) 2>Match the following Network management :management of a system's resources such as central processor usage, disk usage and application processes System management :deals with services provided by organizations to customers Service management :management of the network comprising nodes and links 3>_____management is an extension to _____&_____management (network/system/service) 4>The two leading models of network management are the Internet model and the OSI model (true/false)__________ 5>__________model is the most widely used for network management (OSI/Internet) 6>_____model is a simpler scalar model and hence easy to implement. ______model is object oriented , is more complex and harder to implement (OSI/Internet) 7>A higher level management network called TMN is based on the ___________model (OSI/Internet) 8>TMN stands for___________ 9Identify features of OSI/CMIP standard a: International standard (ISO/OSI) b: management of data communications networks- LAN and WAN c: deals with all seven layers d: object oriented and most complete e: consumes large resource in implementation f: well structured and layered Ans:___________ (a/b/c/d/e/f/all) 10>Identify features of SNMP/Internet Standard a: Industry standard (IETF) b: easy to implement c: most widely implemented d: originally intended for management of Internet components, currently adopted for WAN and telecommunication systems Ans:___________ (a/b/c/d/all) 11>Identify features of TMN standard a: International standard (ITU-T) b: Management of telecommunications network c: based on OSI network management framework d: addresses both network and administrative aspects of management Ans:___________ (a/b/c/d/all) 12>Identify features of IEEE standard a: IEEE standards adopted internationally b: addresses management of LANs and MANs c: adopts OSI standards significantly d: deals with first two layers of the OSI reference model Ans:__________ (a/b/c/d/all) 13>Following are web based management standards a: WBEM b: JMX Ans:___________ (a/b/both) 14>CMIP stands for___________ 15>CMIS stands for___________ 16>The OSI management protocol standard is ____, and has built in services, ______, that specify the basic services needed to perform the various functions (CMIS/CMIP) 17>Both LANs and WANs can be managed using___________ (CMIS/CMIP/both) 18>Major drawbacks of the OSI management standard are a: it is complex b: CMIP stack is large Ans:___________ (a/b/both) VTU N O TESBYSR I
  • 15. NETWORK MANAGEMENT SYSTEMS 14 19>In contrast to _____, ______is truly simple (SNMP/CMIP) 20>___________is responsible for all Internet specifications including network management (IEEE/IETF) 21>___________is designed to manage the telecommunications network and is oriented toward the needs of telecommunications service providers (ITU/TMN) 22>_____is the standard of______ and is based on OSI CMIP/CMIS specifications (ITU/TMN) 23>The IEEE standards for LAN and MAN specifications are concerned only with OSI layers__&___1/2/3) 24>Both OSI/CMIP and Internet/SNMP protocols use _______standards for the lower layers (IETF/IEEE) 25>The IEEE ____.x series of specifications defines the standards for the various physical media and data link protocols (802/803)_______ 26>IEEE 802.__ specifications present overview, architecture and management. IEEE 802.__standard specifies the LLC layer. IEEE 802.__ specifications are defined for Ethernet LANs (1/2/3/4) 27>___________layer provides transparency of the various physical media and protocols to the network layer (MAC/LLC) 28>Web based management is based on using web technology , a web _____for the management system and web ______for network management stations (browsers/server) 29>DMTF stands for_________ 30>___________is developing specifications for WBEM (IETF/DMTF) 31>___________has chosen the Microsoft object oriented management model, Common Information Model (IETF/DMTF) 32>___________is based on a special subset of Java applets developed by Sun Microsystems that runs in the network components (BEM/JMX) 33>TMM uses_______ (SNMP/CMIP ) 34>Both SNMP and CMIP use polling methodology (true/false)___________ 35>OSI network management architecture model comprise of ____models (3/4/5) 36>Following are the models of OSI network management a: organization model b: information model c: communication model d: functional model Ans: ___________ (a/b/c/d/all) 37>In OSI model, _________model describes the components of a network management system, their functions and their infrastructure (functional/organization/information/communication) 38>The organization model is defined in ISO______OSI systems management Overview (10400/10040/10004) 39>___________model defines the terms object, agent and manager (functional/organization/information/communication) 40>___________model deals with the structure and organization of management information (functional/organization/information/communication) 41>ISO=________ specifies the SMI and the information database, MIB (10156/10165) 42>SMI stands for___________ 43>MIB stands for___________ 44>_____describes how the management information is structured and ______deals with the relationship and storage of management information (MIB/SMI) 45>Communication model has ___________components (2/3/4) 46>Components of communication model are a: management application processes that function in the application layer b: layer management between layers c :layer operation within the layers Ans:___________ (a/b/c/all) 47>___________model deals with the user oriented requirements of network management (functional/organization/information/communication) 48>OSI defines ____functional application areas (4/5/6) 49>Only ____model presents the complete model for network management (Internet/OSI)_______ 50>OSI deals wit all 7 networking layers (true/false)___________ 51>The IETF does not define architecture for the SNMP management model explicitly (true/false)___________ 52>TMN is based on the___________ model (OSI/internet) 53>______standard is dedicated to the management of layers 1 and 2 of the OSI reference model (IEEE/IETF)_____ 54>The IEEE standard is primarily concerned with the ___________model (functional/information/organization/communication) 55>In Web based management , ___________model uses Web server - Web browser architecture (functional/information/organization/communication) VTU N O TESBYSR I
  • 16. NETWORK MANAGEMENT SYSTEMS 15 56>Following object oriented technologies are influencing Web based managementa:hypermedia server b: CORBA oriented transportation c: client/server push technology Ans: ___________ (a/b/c/all) 57>___________model describes the components of network management and their relationships (functional/information/organization/communication) 58>In organization model, network objects can be classified into managed and unmanaged objects (true/false)___________ 59>MDB stands for___________ 60>The managed elements have a management process running in them called___________ (broker/agent) 61>_________ elements do not have a management process running in them (managed/unmanaged) 62>Managed hub is more expensive than the unmanaged hub (true/false)___________ 63>_________manages the managed element (agent/manager) 64>In organization model, there is database in_____ _but not in_____ (agent/manager) 65>In _____tier configuration of organization model, the intermediate layer acts both agent and manager (two/three)______ 66>In three tier configuration of organization model, as______, intermediate layer collects data from the network elements, processes it, and stores the results in its database. As _____, it transmits information to the top level manager (agent/manager) 67>MoM stands for___________ 68>_____refers to a system that runs a management process (NOC/NMS) 69>___________model is concerned with the structure and the storage of information (organization/information/functional/communication) 70>The representation of objects and information relevant to their management form the management___________ model (organization/information/functional/communication) 71>___________model specifies the information base to describe managed objects and their relationships (organization/information/functional/communication) 72>____defines the syntax and semantics of management information stored in_______ (MIB/SMI) 73>___________is used by both agent and management processes to store and exchange management information (MIB/SMI) 74>In information model , _____MIB consists of information on all the network components that it manages , whereas ______MIB needs to know only its local information, its MIB view (agent/manager) 75>______is a real database whereas _____is a virtual database (MIB/MDB) 76>_____contains the measured or administratively configured value of the elements of the network. On the other hand, ______ contains the information necessary for processes to exchange information (MIB/MDB) 77>Following types of information can be stored in the MIB a: network elements-hubs, bridges , routers, transmission facilities b: software processes-programs, algorithms , protocol functions , databases c: administrative information-contact person, account number Ans:___________ (a/b/c/all) 78>___________objects are uniquely defined by a tree structure specified by the OSI model and are used in the Internet model (managed/unmanaged) 79>MIT stands for___________ 80>In____________ model, the managed objects are defined by a containment tree that represent the MIT (OSI/Internet) 81>In OSI MIT, there are ____nodes in the layer beneath the root (2/3/4) 82>Wrt OSI MIT, the following are the nodes in the layer beneath the root a: iso b: ccitt (itu) c: iso-ccitt (iso-itu) Ans:___________ (a/b/c/all) 83>iso stands for___________ 84>itu stands for___________ 85>There are_____ basic attributes of a managed object type from the Internet perspective (4/5/6) 86>Following are the basic attributes of a managed object type from the Internet perspective a: object type (object identifier & descriptor) b: definition c: syntax d: access e: status Ans:___________ (a/b/c/d/e/all) VTU N O TESBYSR I
  • 17. NETWORK MANAGEMENT SYSTEMS 16 87>Specification for the Internet are defined in RFC documents (true/false)___________ 88>A managed object in the Internet model is defined by _____parameters (4/5/6) 89>A managed object in the Internet model is defined by five parameters and for this RFC=____ (1551/1515/1155) 90>A managed object in the Internet model is defined by following parameters a: object identifier and descriptor b: syntax c: access d: status e: definition Ans:___________ (a/b/c/d/e/all) 91>Match the following object identifier and descriptor : textual description of the semantics of object type Syntax : implementation requirements Access : access privilege to a managed object Status : used to model the object Definition : unique ID and name for the object type 92>_____ object model is a scalar model and is easy to understand. In contrast , ______perspective of a managed object is complex and has a different set of characteristics (OSI/Internet) 93>___________specifications are object oriented and hence a managed object belongs to an object class (OSI/Internet) 94>___________of an object defines the external perspective of the object (entity/attribute) 95>___________of the object is to change its attribute (behavior/operation) 96>An OSI managed object has the following characteristics a: object class b: attributes c: operations d: behaviour e: notifications Ans:___________ (a/b/c/d/e/all) 97>Operation in the Internet model is done by _____&______ commands. Notification s done by ____&_____messages (get/set/response/alarm) 98>In____ , we can create and delete objects, these concepts do not exist in _______ (OSI/Internet) 99>_____characteristics of the Internet model is part of the security function in the OSI functional model (status/access)______ 100>___________characteristics of the Internet model is handled by conformance as part of application services in OSI (status/access) 101>Match the following Object type :counts number of packets Syntax :Mandatory Access :counter Status :read only Description :PktCounter 102>Match the following Object class :generates notifications on new value Attributes :get or set Operations :retrieves or resets values Behavior :packet counter Notifications :Single valued 103>Following are characteristics from Internet perspective a: object type b: syntax c: access d: status e: description Ans:__________ (a/b/c/d/e/all) 104>Characteristics from OSI perspective are a: object class b: attributes c: operations d: behaviour e: notifications Ans:__________ (a/b/c/d/e/all) VTU N O TESBYSR I
  • 18. NETWORK MANAGEMENT SYSTEMS 17 105>Management data is communicated between agent and manager processes, as well as between manager processes (true/false)__________ 106>__________aspects need to be addressed in the communication of information between two entities (2/3/4) 107>Following aspects need to be addressed in the communication of information between two entities a: transport medium of message exchange b: message format of communication c: actual message Ans:__________ (a/b/c) 108>Match the following transport protocol :actual message application protocol :transport medium exchange commands & responses :message format of communication 109>__________is the unsolicited messages such as alarms, generated by the agent (notification/trap/both) 110>__________model uses CMIP along with CMIS (Internet/OSI) 111>__________model uses SNMP for communication (Internet/OSI) 112>OSI uses _________protocol for transportation (connection oriented/connectionless/both) 113>Internet uses __________UDP/IP protocol to transport messages (connection oriented/connectionless/both) 114>The TP4 transport layer protocol riding on top of the x.25 protocol could be used for__________ transporting and application messages (connection oriented/connectionless/both) 115>______&_____specifies the management communication protocols for OSI and Internet management respectively (SNMP/CMIP) 116>__________is a formal language developed jointly by CCITT and ISO for use with application layers for data transfer between systems (BER/ASN.1) 117>ASN.1 is at the__________ layer (presentation/session) 118>__________is defined as the set of rules used to specify data types and structures for storage of information (transfer syntax/abstract syntax) 119>___________represents the set of rules for communicating information between systems (transfer syntax/abstract syntax) 120>____is applicable to the information model while ______is applicable to the communication model (transfer syntax/abstract syntax) 121>__________can be used with any presentation syntax, depending on the medium of presentation (transfer syntax/abstract syntax) 122>__________in ASN.1 makes it independent of the lower layer protocols (transfer syntax/abstract syntax) 123>ISO____/_____ standards specify ASN.1 (8825/X.209 or 8824/X.208) 124>The algorithm to convert the textual ASN.1 syntax to machine readable code is called__________ (DER/BER) 125>BER stands for___________ 126>BER is defined by ISO_________ (882/X.209 or 8824/X.208) 127>___________is based on the Backus system and uses the formal syntax language and grammar of the BNF (BER/ASN.1) 128>BNF stands for__________ 129> <name>::=<definition> in this expression, <name> denotes _____and the symbol ::= represents______ (defined as/entity/) 130> <digit>::=0|1|2 in this expression, the symbol | represents_____ (and/not/or) 131><op>::=+|-|*|/ in this expression, the definitions on the right side are called ___________ (production/primitives) 132> <SAE>::<number> | <SAE> | <SAE><op><SAE>, in this expression, the format of each line is defined as___________ (production/assignment/either) 133><BooleanValue>:: TRUE| FALSE, in this expression, entities that are all in capital letters such as TRUE and FALSE are called__________ (identifiers/keywords) 134>The data types are built up from primitive data types such as a: INTEGER b: REAL c: NULL d: GraphicString Ans:__________ (a/b/c/d/all) 135>__________is one of several CharacterString type primitives (StringGraphic /GraphicStshng) 136>Match the following Alternatives : SET & SEQUENCE List : SET OF & SEQUENCE OF Repetition : CHOICE 137>Above constructs are used to build __________data types (primitive/structured) VTU N O TESBYSR I
  • 19. NETWORK MANAGEMENT SYSTEMS 18 138>__________data types are also called atomic entities (primitive/structured) 139>ASN.1 definition allows both backward and forward references as well as in-line definition (true/false)__________ 140>The constructs _____&_____are list builders (SET/SET OF/SEQUENCE/SEQUENCE OF) 141>The order in the list will be maintained if the list is built with the__________ construction (SET/SEQUENCE) 142>If the construct has been _____instead of_____, order in the list would be irrelevant (SEQUENCE OF/SET OF) 143>{ product-based [0] NULL, basic [1] NULL } these assignments have integers in square brackets and these are called________ (module/tags) 144>The definition of_________ is introduced in ASN.1 to uniquely identify a data type (module/tag) 145>We can group assignments that are related, this group is called__________ (subroutine/module) 146>identify correct formal definition of a module a:<module name> DEFINITIONS ::= BEGIN <name> :: <definition> END b: BEGIN ::=DEFINITIONS <module name> <name> :: <definition> END c:<module name> BEGIN ::=DEFINITIONS <name> :: <definition> END Ans:__________ (a/b/c) 147>Match the following ::= range | start & end of a subtype - start & end of a list -- start & end of a tag {} signed number [] following the symbol are comments () defined as or assignment '' or, alternatives , options of a list signed number 148><module name> DEFINITIONS ::= BEGIN <name> :: <definition> END The terms DEFINITIONS, BEGIN and END are primitives and are called __________in ASN.1 (identifier/keyword) 149>Grouping assignments into modules has following advantages a: modules can be imported into and exported from other modules b: modules are reusable Ans:__________ (a/b/both) 150>Match the following BEGIN : any negative or non-negative number CHOICE :a sequence of non-negative numbers DEFINITIONS :end of an ASN.1 module END :list of alternatives EXPORTS :start of an ASN.1 module IDENTIFIER :definition of a data type or managed object IMPORTS :data types that can be exported to other modules INTEGER :data types defined in external modules 151>Match the following NULL :used with OCTET for denoting string of octets OBJECT :unordered list makes OCTET :ordered list maker OF :unbounded 8 bit bytes (octts) of binary data SEQUENCE :a placeholder SEQUENCE OF :used with IDENTIFIER to uniquely identify an object SET :used with SET and SEQUENCE SET OF :ordered array of repetitive data STRING :unordered list of repetitive data VTU N O TESBYSR I
  • 20. NETWORK MANAGEMENT SYSTEMS 19 152>Match the following Object name :INTEGER, BEGIN Application data type :RMON-MIB Module :Counter, IpAddress Macro, MIB module :PersonalRecord Keywords :sysDescr, etherStatsPkts 153>Simple data type is also called_________ (primitive/atomic/basic/all) 154>___________uniquely identifies the data type irrespective of the syntax version (atomic/tag) 155>Data types are defined based on___________ (structure/tag/both) 156>wrt Object and Data types, the structure is divided into _______categories (3/4/5) 157>wrt Object and Data types , the tag is divided into___ categories (2/3/4) 158>The tag is divided into following a: class b: tag number Ans:__________ (a/b/both) 159>Following are different categories of data type structure a: simple type b: structured type c: tagged type d: other type Ans:_________ (a/b/c/d/all) 160>________type is one for which the values are specified directly (structured/tagged/simple) 161>INTEGER is a________ type (structured/tagged/simple) 162>A data type is a __________type when it contains other types (structured/tagged/simple) 163>Types that are within a structured type are called _________types (component/tagged) 164>SET is distinguished from SEQUENCE in following respects a: data types should all be distinct b: order of values in SET is of no consequence Ans:__________ (a/b/both) 165>Order of values is critical in _______ (SET/SEQUENCE) 166>The component data types in the __________construct need not be distinct because the order is preserved (SET/SEQUENCE) 167>__________type is a type derived from another type (structured/tagged) 168>__________type is a data type that is not predefined (structured/tagged/other) 169>___________type is chosen from CHOICE and ANY types, which are contained in other types (structured/tagged/other) 170>Type__________ defines the selection of one value from specified list of distinct types (ANY/CHOICE) 171>Every data type except __________has a tag associated with it (CHOICE/ANY/both) 172>A tag has following components a: class b: tag number Ans:__________ (a/b/both) 173>There are _____classes of tag (3/4/5) 174>Following are different classes of tag a: universal b: application c: context specific d: private Ans:__________ (a/b/c/d/all) 175>__________class is the most common (application/context specific/universal/private) 176>Data types in the __________class are application independent (application/context specific/universal/private) 177>__________class is similar to the use of a global variable in a software program and is applicable anywhere in a program (application/context specific/universal/private) 178>BOOLEAN & INTEGER are examples of __________class , whose tag numbers are [1] and [2] respectively (application/context specific/universal/private) VTU N O TESBYSR I
  • 21. NETWORK MANAGEMENT SYSTEMS 20 179>Match the following Universal 1 :REAL Universal 2 :Object description Universal 3 :NULL Universal 4 :BIT STRING Universal 5 :BOOLEAN Universal 6 :EXTERNAL Universal 7 :OBJECT IDENTIFIER Universal 8 :OCTET STRING Universal 9 :INTEGER 180>Match the following Universal 10 :TeletexString Universal 11 :NumericString Universal 12-15 :SEQUENCE & SEQUENCE OF Universal 16 :ENCRYPTED Universal 17 :ENUMERATED Universal 18 :Reserved for future use Universal 19 :SET & SET OF Universal 20 :PrintableString 181>Match the following Universal 21 :reserved for future use Universal 22 :GeneralString Universal 23 :GraphicString Universal 24 :UTCTime Universal 25 :VideotexString Universal 26 :IASString Universal 27 :GeneralizedTime Universal 28 :VisibleString Universal 29 :CharacterString 182>Tags in the __________class are specific to applications (universal/context specific/application/private) 183>_____class tag number can be overridden with _____tag number (universal/context specific/application) 184>Types in two different applications can have the same __________specific tag but each tag could carry a different meaning in each application (context specific/application) 185>____type is a subset of_____ , is limited to that application (universal/context specific/application/private) 186>__________type is used extensively by vendors of network products (universal/context specific/application/private) 187>In _____, there is an identifier for each occurrence of an object. In_____, it is the OBJECT IDENTIFIER (ASN.1/MIB) 188>The ASN.1 syntax that contains the management information is encoded using the __________defined for the transfer syntax (DER/BER) 189>TLV stands for__________ 190>In TLV , the type has_____ subcomponents (3/4) 191>In TLV, the type has following subcomponents a: class b: P/C c: tag number Ans:__________ (a/b/c/all) 192>__________specifies whether the structure is a primitive or simple, type or a construct , which is anything other than a simple type (class or P/C or tag number) 193>__________is encoded as a one byte or an octet field (class or P/C or tag number) 194>Match the following Universal :1 1 Application :0 1 Context specific :0 0 Private :1 0 195>In TLV, the value of P/C is___ for primitive and ___for construct and is designated as the 6th bit (0/1) 196>In TLV, the lowest ___bits designates tag value in binary (4/5/6) 197>In TLV, class :____bits:: ___P/C: ___bits ::Tag number :___bits (1/2/3/4/5/6/7/8) VTU N O TESBYSR I
  • 22. NETWORK MANAGEMENT SYSTEMS 21 198__________is defined as a series of octets (type/length/value) 199>In TLV, the length specifies the length of the value field in number of__________ (bits/octets) 200>In TLV, the integer value is encoded using ______complement form (ones/twos) 201>Wrt TLV , for positive value , the actual value is the binary representation, with the MSB always being___ to indicate the positive sign (0/1) 202>wrt TLV, -5 becomes ___________in twos complement form (11110111/111111101/11111011) 203>Wrt Macros , ____defines the syntax of the new types and _____defines the syntax of the new values (TYPE NOTATION/VALUE NOTATION) 204>________model component of the OSI model addresses the user oriented applications (communication/functional) 205>Functional model consists of ______submodels (4/5/6) 206>Functional model has following submodels a: configuration management b: fault management c: performance management d: security management e: accounting management Ans:___________ (a/b/c/d/e/all) 207>___________management addresses the setting and changing of configurations of networks and their components (performance/accounting/configuration) 208>Relevant management information is embedded in managed objects such as switches, hubs, bridges and routers .___________management involves setting up these parameters (performance/accounting/configuration) 209>___________displays in real time the configuration of the network and its status (NOC/NMS) 210>___________management involves detection and isolation of the problem causing the failure in the network (performance/accounting/configuration/fault) 211>In several failure situations, the network could restore service automatically. This network feature is called ___________ (grooming/self healing) 212>___________ticket administration of fault management tracks all problems in the network including nonproblems, until they are resolved (service/trouble) 213>___________management is concerned with the performance behavior of the network (performance/accounting/configuration) 214>___________management involves physically securing the network, access to the network resources and secured communication over the network (performance/accounting/configuration/security) 215>___________protect corporate networks and network resources from being accessed by unauthorized personnel and programs, including virus programs (cryptography/firewalls) 216>__________management administers costs of the network (performance/accounting/configuration) 217>___________management is directed toward service providers, in order for them to provide customer satisfaction and to ensure the profitability of business (performance/accounting/configuration/service &business) 218>Traffic data gathered by_____ management serves as input to _____management (performance/accounting/configuration) 219>The traffic statistics, trouble ticket administration data and accounting management results are inputs to ___________management (performance/configuration/service & business) 220>Following are network management models a: OSI b: Internet c: TMN d: IEEE 801 e: Web technology Ans:___________ (a/b/c/d/e/all) 221>The OSI management model categorizes the____ functions of network management into____ models (3/4/5) 222>The OSI has following network management models a: organization b: information c: communication d: application Ans:__________ (a/b/c/d/all) 223>The organization model describes the management process in the network element called the ___________process, and the management process in the ___________ (manger/agent) 224>___________model addresses the structure of management information that enables processes running in different components in the network to exchange management data (organization/information/communication) 225>The two primary communication protocols are_____ in OSI and ______in the Internet (SNMP/CMIP) 226>The application functions are divided into___ categories of management (3/4/5) VTU N O TESBYSR I
  • 23. NETWORK MANAGEMENT SYSTEMS 22 227>The application functions are divided into following categories of management a: configuration b: fault c: performance d: security e: accounting Ans:___________ (a/b/c/d/e/all) ANSWERS 1>functional 2>1-c 2-a 3-b 3>service, system, network 4>T 5>Internet 6>Internet, OSI 7>OSI 8>Telecommunication Management Network 9>all 10>all 11>all 12>all 13>both 14>Common Management Information Protocol 15>Common Management Information Service 16>CMIP, CMIS 17>both 18>both 19>CMIP, SNMP 20>IETF (Internet Engineering Task Force) 21>TMN 22>TMN, ITU 23>1,2 24>IEEE 25>802 26>1,2,3 27>LLC 28>browser 29>Desktop Management Task Force 30>DMTF 31>DMTF 32>JMX 33>CMIP 34>T 35>4 36>all 37>organization 38>10040 39>organization 40>information 41>10165 42>Structure of Management Information 43>Management Information Base 44>SMI,MIB 45>3 46>all 47>functional 48>5 49>OSI 50>T 51>T 52>OSI 53>IEEE VTU N O TESBYSR I
  • 24. NETWORK MANAGEMENT SYSTEMS 23 54>communication 55>organization 56>all 57>organization 58>T 59>Management Database 60>agent 61>unmanaged 62>T 63>manager 64>manager, agent 65>3 66>manager, agent 67>Manager of Managers 68>NMS 69>information 70>information 71>information 72>SMI, MIB 73>MIB 74>manager, agent 75>MDB,MIB 76>MDB,MIB 77>all 78>managed 79>Management Information Tree 80>OSI 81>3 82>all 83>International Standards Organization 84>International Telecommunications Union 85>5 86>all 87>T 88>5 89>1155 90>all 91>1-e 2-d 3-c 4-b 5-a 92>Internet, OSI 93>OSI 94>attribute 95>behavior 96>all 97>get&set, response&alarm 98>OSI, Internet 99>access 100>status 101>1-e 2-c 3-d 4-b 5-a 102>1-d 2-e 3-b 4-c 5-a 103>all 104>all 105>T 106>3 107>all 108>1-b 2-c 3-a 109>both 110>OSI 111>Internet 112>both 113>connectionless 114>connection oriented 115>CMIP,SNMP VTU N O TESBYSR I
  • 25. NETWORK MANAGEMENT SYSTEMS 24 116>ASN.1 117>presentation 118>abstract syntax 119>transfer syntax 120>abstract syntax, transfer syntax 121>abstract syntax 122>abstract syntax 123>8824/X.208 124>BER 125>Basic Encoding Rules 126>8825/X.209 127>ASN.1 128>Backus Nauer Form 129>entity, defined as 130>or 131>primitives 132>either 133>keywords 134>all 135>GraphicString 136>1-c 2-a 3-b 137>structured 138>primitive 139>T 140>SET & SEQUENCE 141>SEQUENCE 142>SET OF,SEQUENCE OF 143>tags 144>tag 145>module 146>a 147>1-g 2-h 3-e 4-f 5-c 6-d 7-b 8-a 148>keywords 149>both 150>1-e 2-d 3-f 4-c 5-g 6-b 7-h 8-a 151>1-e 2-f 3-d 4-g 5-c 6-h 7-b 8-i 9-a 152>1-e 2-c 3-d 4-b 5-a 153>all 154>tag 155>both 156>4 157>2 158>both 159>all 160>simple 161>simple 162>structured 163>component 164>both 165>SEQUENCE 166>SEQUENCE 167>tagged 168>other 169>other 170>CHOICE 171>both 172>both 173>4 174>all 175>universal 176>universal 177>universal VTU N O TESBYSR I
  • 26. NETWORK MANAGEMENT SYSTEMS 25 178>universal 179>1-e 2-i 3-d 4-h 5-c 6-g 7-b 8-f 9-a 180>1-e 2-d 3-f 4-c 5-g 6-b 7-h 8-a 181>1-e 2-f 3-d 4-g 5-c 6-h 7-b 8-i 9-a 182>application 183>universal, application 184>application 185>context specific, application 186>private 187>MIB,ASN.1 188>BER 189>Type Length Value 190>3 191>all 192>P/C 193>P/C 194>1-c 2-b 3-d 4-a 195>0,1 196>5 197>7-8, 6, 1-5 198>length 199>octets 200>twos 201>0 202>11111011('.' 00000101 11111010+1=11111011) 203>TYPE NOTATION,VALUE NOTATION 204>functional 205>5 206>all 207>configuration 208>configuration 209>NMS 210>fault 211>self healing 212>trouble 213>performance 214>security 215>firewalls 216>accounting 217>service& business 218>performance, accounting 219>service& business 220>all 221>4 222>all 223>agent, manager 224>information 225>CMIP.SNMP 226>5 227>all VTU N O TESBYSR I
  • 27. NETWORK MANAGEMENT SYSTEMS 26 CHAPTER 4:SNMPv1 NETWORK MANAGEMENT— ORGANIZATION & INFORMATION MODELS 1>__________management is also referred to as Internet management (SMTP/SNMP) 2>SNMP network management systems can manage even non-TCP/IP network elements through proxy agents (true/false)__________ 3>SNMP management is the most widely used __________ (NMS/NOC) 4>__________comprises management process, agent process and network elements (NMS/NOC) 5>The SNMP information model consist of __________ (MIB/SMI/both) 6>___________uses ASN.1 syntax to define managed objects (MIB/SMI) 7>___________defines the relationship between managed objects and groups of related objects into MIB modules (MIB/SMI) 8>MIB2 is a superset of MIB1 and is used in SNMPv__ (1/2) 9>The SNMP architecture, administration and access policies fall under___________ model (organization/communication) 10>ICMP was developed to manage___________ (ARPANET/INTERNET) 11>___________is a mechanism to transfer control messages between nodes (PING/ICMP) 12>PING stands for__________ 13>A popular example of ICMP is___________ (RING/PING) 14>___________i a simple tool used to investigate the heath of a node and the robustness of communication with it from the source node (PING/ICMP) 15>IAB stands for___________ 16>__________was formed to administer Internet activities (ICB/IAB) 17>SGMP stands for___________ 18>___________is used to monitor and configure gateways remotely (SNMP/SGMP) 19>_____is an enhancement of______ (SNMP/SGMP) 20>SNMPv__ was developed to make it independent of the OSI standard (1/2/3) 21>IAB was charged with the responsibility to manage following task forces a: IEEE b: IETF c: IRTF Ans:___________ (a/b/c/all) 22>___________is an organization that maintains several archives of documents related to the Internet and the IETF's activities (IntraNIC/InterNIC) 23>InterNIC stands for___________ 24>STD stands for___________ 25>FYI stands for___________ 26>IANA stands for___________ 27>___________is the central coordinator for the assignment of unique parameter values for Internet protocols (IETF/IANA) 28>___________RFC subseries was created by to document overviews and topics that are introductory (STD/FYI) 29>___________RFC subseries was created to identify those RFCs that do in fact specify Internet standards (STD/FYI) 30>There are ___ series of RFC and STD documents (3/4/5) 31>Following are the series of RFC and STD documents ___________ (SMI/MIB/SNMP/all) 32>RFC=____defines the SNMP protocol. RFC=____is on protocol operations. RFC=___ is on transport mappings (1905/1905/1157) 33>SMI form the contents of RFC=___________ (1155/1156/1157) 34>RFC=____/STD=_____ is currently in use for MIB (1213/1217/13/17) 35>RFC=______is a draft version of MIB2 for SNMPv2 (1155/1907)_____ 36>The infrastructure of the manager agent and the SNMP architecture that it is based form ___________model (information/organization/functional) 37>wrt SNMP, definition of syntax and semantics form the basis of the ___________model (information/organization/functional) 38>The two tier organization model consists of_____ process which resides in the managed object and______ process which resides in the NMS and manages the managed object (network manager/network agent) VTU N O TESBYSR I
  • 28. NETWORK MANAGEMENT SYSTEMS 27 39>In two tier organization model, multiple managers can interact with one agent (true/false)___________ 40>RMON stands for___________ 41>In three tier organization model, _________is inserted between the managed object and the network manager (RMAN/RMON) 42>The pure SNMP management system consists of ___________ (SNMP agent/SNMP manager/both) 43>HFC stands for___________ 44>An SNMP management system can behave as an agent as well as a manager (true/false)___________ 45>___________model is concerned only with the TCP/IP suite of protocols and does not address the layers above or below it (OSI/Internet) 46>SNMP interfaces to the TCP/IP with ________are the transport layer protocol (TCP/UDP) 47>RFC=____ describes SNMP system architecture (1156/1157/1158)_ 48>RFC=_____ defines SNMP by which management information for a network element may be inspected or altered by logically remote users (1156/1157/1158) 49>RFC=____describes the structure and identification of management information, and RFC=_______addresses the information base that is required for management (1154/1155/1156/1157) 50>The communication of management information among management entities is realized through exchange of___ protocol messages (4/5/6) 51>The communication of management information among management entities is realized through exchange of following protocol messages a: get-request b: get-next-request c: set-request d: get-response e: trap Ans:___________ (a/b/c/d/e/all) 52>Following protocol messages are initiated by the manager application process a: get-request b: get-next-request c: set-request d: get-response e: trap Ans:___________ (a/b/c/d/e) 53>Following messages are generated by the agent process a: get-request b: get-next-request c: set-request d: get-response e: trap Ans:___________ (a/b/c/d/e) 54>The message generation is called___________ 55>__________is unsolicited alarm message (get-response/trap) 56>___________message is generated by the management process requesting the value of an object (get- request/get-next-request/set-request/get-response/trap) 57>An object may have multiple values because of multiple instances of the object, in this case, _________ message can be used (get-request/get-next-request) 58>___________message is generated by the management process to initiate or reset the value of an object variable (get-request/get-next-request/set-request/get-response/trap) 59>___________message is generated by an agent process (get-request/get-next-request/set-request/get- response/trap) 60>___________is an unsolicited message generated by an agent process w/o a message or event arriving from the manager process (get-request/get-next-request/set-request/get-response/trap) 61>SNMP manager contains following sets of data a: one on the information about the objects b: one on the values of the objects Ans:___________ (a/b/both) 62>In q61, b is ______ (static/dynamic) and contains the measured values associated with the object_____ (true/virtual) database .63>A MIB is _____ (true/virtual) database and is_________ (static/dynamic) 64>SNMP _____has a database which is the physical database and the SNMP ______does not have a physical database (agent/manager) 65>_________have MIB which is compiled into the software module (agent/manager) 66>___________model deals with SMI and MIB (organization/functional/information) VTU N O TESBYSR I
  • 29. NETWORK MANAGEMENT SYSTEMS 28 67>The syntax used to describe management information is ASN._ (0/1/2) 68>The specification and organizational aspects of managed objects are addressed in______ (MIB/SMI) 69>The specifications of managed objects and the grouping of. And relationship between, managed objects are addressed in ________ (MIB/SMI) 70>RFC=___ for SMI. RFC=____ for MIB (1213/1312/1157/1157) 71>Match the following FDDI :RFC 1695 OSPF :RFC 1285 ATM :RFC 1253 72>A managed object is composed of___________ (object type/object instance/both) 73>SMI is concerned only with_____ and not______ (object type/object instance) 74>___________is a data type , has a name, syntax , and an encoding scheme (object type/object instance) 75>The syntax of an object type is defined using ____and _____have been adopted as the encoding scheme for transfer of data types between agent and manager processes , as well as between manager processes (BER/ASN.1) 76>Every object type (every name) is uniquely identified by___________ (DESCRIPTOR/OBJECT IDENTIFIER) 77>DESCRIPTOR and OBJECT IDENTIFIER are in uppercase letters because they are___________ keywords (BER/ASN.1) 78>There are____ objects under the internet object (3/4/5)_______ 79>Following are the subnodes under Internet node in SNMPv1 a: directory b: mgmt c: experimental d: private Ans:___________ (a/b/c/d/all) 80>____________node is reserved for future use of OSI directory in the Internet (directory/mgmt/experimental/private) 81>___________node is used to identify all IETF recommended and IAB approved subnodes and objects (directory/mgmt/experimental/private) 82>___________node was created to define objects under IETF experiments (directory/mgmt/experimental/private) 83>___________is a heavily used node (directory/mgmt/experimental/private) 84>___________syntax is used to define the structure of object types (BER/ASN.1) 85>in ASN.1 data type, there are___ categories under structure (3/4/5)________ 86>in ASN.1 data type, there are following categories under structure a: simple b: defined c: constructor Ans:___________ (a/b/c/all) 87>Simple, defined and constructor types are also called___ ____&____respectively (application/structured/primitive) 88>SEQUENCE & SEQUENCE OF are not called base types (true/false)___________ 89>The primitive or simple types are atomic and are INTEGER, OCTET STRING, OBJECT IDENTIFIER & NULL. These are also referred to as ___________types (aggregate/non-ggregate) 90>When the integer value is restricted by a range it is called___________ (signed/ subtype) 91>The data type ENUMERATED is a special case of the ______data type (REAL/INTEGER) 92>Following are data types under Primitive types a: INTEGER b: OCTET STRING c: OBJECT IDENTIFIER d: NULL Ans:___________ (a/b/c/d/all) 93>Following are data types under defined types a: NetworkAddress b: IpAddress c: Counter d: Gauge e: TimeTicks f: Opaque Ans:___________ (a/b/c/d/e/f/all) 94>Following are data types under constructor types a: SEQUENCE b: SEQUENCE OF Ans:___________ (a/b/both) 95>Match the following INTEGER :placeholder VTU N O TESBYSR I
  • 30. NETWORK MANAGEMENT SYSTEMS 29 OCTET STRING :object position in MIB OBJECT IDENTIFIER :8bit bytes binary and textual data NULL :subtypes INTEGER (n1. . . .nN) 96>Match the following NetworkAddress :application wide arbitrary ASN.1 syntax, double wrapped OCTET STRING IpAddress :non-negative integer in hundredth of second units Counter :capped, on-negative integer, increase or decrease Gauge :wraparound, non-negative integer, monotonically increasing, may 2^32-1 TimeTicks :dotted decimal IP address Opaque :Not used 97>____:List maker::______: Table maker (SEQUENCE/SEQUENCE OF) 98>___________data type is used to specify either binary or textual information that is 8 bits long (OCTET IDENTIFIER/OCTET STRING) 99>The combination keyword __________is the object position in the MIB (OBJECT STRING/OBJECT IDENTIFIER) 100>___________are application specific data types and are SNMP based types (primitive/defined) 101>The base type ________is used to specify octets of binary information (Gauge/Opaque) 102>__________is intended for adding new base types to extend SNMP SMI (Gauge/Opaque) 103>__________is a choice of the address of the protocol family (IpAddress/NetworkAddress) 104>__________is the conventional four groups of dotted decimal notation of IPv4 (IpAddress/NetworkAddress) 105>__________is an application wide data type and is a non-negative integer (TimeTicks/Gauge/Counter) 106>Counter can only increase in value up to a maximum of 2^__-1 and then wraps around starting from 0 (16/32/64) 107>The data type __________is a non-negative integer , but its value can move either up or down (Counter/Gauge/TimeTicks) 108>Gauge pegs at its maximum value of 2^__-1 (16/32/64)________ 109>__________is a non-negative integer and measures time in units of hundredth of a second (Counter/Gauge/TimeTicks) 110>The maximum value of TimeTicks is 2^__-1 (16/32/64) 111>__________is an application wide data types that supports the capability to pass arbitrary ASN.1 syntax (Gauge/Opaque) 112>__________is used to create data types based on previously defined data types (Gauge/Opaque) 113>Size of ________is undefined in SNMPv1, which causes some problem in its implementation (Gauge/Counter/ Opaque) 114>The Opaque data type can be defined both IMPLICITly and EXPLICITly (true/false)__________ 115>The constructs ______&____which are in ASN.1, are not included in SNMP based management syntax (SEQUENCE/SEQUENCE OF/SET/SET OF) 116>____is used to build a list and______ is used to build a table (SEQUENCE/SET/SEQUENCE OF/SET OF) 117>Identify syntax for list a: SEQUENCE OF <entry> b: SEQUENCE {<type1>, <type2>. . . . <typeN>} Ans:__________ (a/b/either) 118>Identify syntax for table a: SEQUENCE OF <entry> b: SEQUENCE {<type1>, <type2>. . . . <typeN>} Ans:__________ (a/b/either) 119>Identify SNMPv1 keywords a: ACCESS b: BEGIN c: CHOICE d: Counter e: DEFINITIONS f: DEFVAL Ans:___________ (a/b/c/d/e/f/all) 120>Identify SNMPv1 keywords a: DESCRIPTION b: END c: ENTERPRISE d: FROM e: Gauge f: IDENTIFIER Ans:___________ (a/b/c/d/e/f/all) 121>Identify SNMPv1 keywords a: IMPORTS b: INDEX c: INTEGER d: IpAddress `e: NetworkAddress f: OBJECT Ans:___________ (a/b/c/d/e/f/all) VTU N O TESBYSR I
  • 31. NETWORK MANAGEMENT SYSTEMS 30 122>Identify SNMPv1 keywords a: OBJECT-TYPE b: OCTET c: OF d: Opaque e: REFERENCE f: SEQUENCE Ans:___________ (a/b/c/d/e/f/all)__________ 123>Identify SNMPv1 keywords a: SIZE b: STATUS c: STRING d: SYNTAX e: TRAP-TYPE f: VARIABLES g: TimeTicks Ans:___________ (a/b/c/d/e/f/g/all)__________124>SNMPv1 has adopted ____with its____for encoding the information to be transmitted between agent and manager processes (TLV/ASN.1/BER)___ 125>Match the following ipAdEntAddr :SEQUENCE ipAdEntIfIndex :INTEGER ipAdEntNetMask :IpAddress ipAdEntReasmMaxSize: ipAdEntBcastAddr: ipAdEntry 126>Wrt OBJECT IDENTIFIER, if the most significant bit (8th bit) is set to___ , then the subidentifier is only one octet long. The 8th bit is set to ___for the value that requires more than one octet and indicates more octets to follow (0/1)___ 127>_____ is encoded as straight octet strings._____ _____ & _____ coded as integers._____Is coded as OCTET STRING type (IP address/opaque/counter/gauge/TimeTicks) 128>Match the following OBJECT IDENTIFIER :APPLICATION 1 SEQUENCE :APPLICATION 3 IpAddress :APPLICATION 2 Counter :APPLICATION 4 Gauge :APPLICATION 0 TimeTicks :UNIVERSAL 6 Opaque :UNIVERSAL 16 129>A managed object has ____parameters (3/4/5) 130>A managed object has following parameters a: textual name b: syntax c: definition d: access e: status Ans:_________ (a/b/c/d/e/all) 131>OBJECT DESCRIPTOR does not specify instances of a managed object (true/false)___________ 132>Associated with each _____is ______, which is the unique position it occupies in the MIB (OBJECT IDENTIFIER/OBJECT DESCRIPTOR) 133>__________is the ASN.1 definition of the object type (definition/access/status/syntax) 134>__________is an accepted textual description of the object type (definition/access/status/syntax) 135>__________is the specification for the type of privilege associated with accessing the information (definition/access/status/syntax) 136>Access is the specification for the type of privilege associated with accessing the information, it can be __________ (read only/read write/not accessible/either of them) 137>__________specifies whether the managed object is current or obsolete (definition/access/status/syntax) 138>Related objects can be grouped to form ______ object type and the objects that make up the aggregate object type are called ____object type component/subordinate /aggregate) 139>In order to encode the information on a managed object to be processed by machines , it has to be defined in a formalized manner. This is done using__________ (micro/macro) 140>The body of the macro module consists of __________parts (3/4/5) 141>The body of the macro module consists of following parts a: type notation VTU N O TESBYSR I
  • 32. NETWORK MANAGEMENT SYSTEMS 31 b: value notation c: supporting productions Ans:__________ (a/b/c/all) 142>____NOTATION defines the object types in the module and ______NOTATION defines the name of the object (TYPE/VALUE) 143>Access can be only one of following options a: read only b: read write c: write only d: not accessible Ans:__________ (a/b/c/d/all) 144>Allowed values for Status are a: mandatory b: optional c: obsolete Ans:__________ (a/b/c/all) 145>__________object is a group of related objects (compound/aggregate) 146>Object ___ is the managed object ipAddrEntry consist of the subordinate object types of___ through ___ (1/2/5) 147>ipAddrEntry describes the complete set of information consisting of the__ fields needed for an entry in the IP interface address table (4/5/6) 148>The text following ___are comments and are not encoded (** / --) 149>The __________clause uniquely identifies the instantiation of the entry object type in the table (REFERENCE/INDEX) 150>The__________ clause is the textual reference to the document from which the object is being mapped (REFERENCE/INDEX) 151>_____clause is the columnar object identifier while______ clause is the default value to be object (REFERENCE/INDEX/DEVAL) 152>SNMP operations apply exclusively to scalar operations (true/false)___________ 153>_________object type comprises one or more subtypes (compound/aggregate) 154>RFC=____ for SMI (1551/1515/1155)_______ 155>RFC=____ for MIB2 (1312/1213)_______ 156>MIB is a_______ information store (true/virtual) 157>Objects in the MIB are defined using ASN.1 (true/false)__________ 158>__________defines the mechanism for describing the objects (MIB/SMI) 159>The definition of MIB consists of___ components (3/4/5) 160>The definition of MIB consists of following components a: name b: syntax c: encoding Ans:________ (a/b/c/all) 161>The term __________mandates the implementation of the object in the current version of MIB2 (decrypted/deprecated) 162>Objects that are related are grouped into _____while object types are grouped to form_____ (aggregate object type/object group) 163>The MIB module structure consists of a: module name b: imports from other modules c: definitions of the current module Ans:__________ (a/b/c/all) 164>Identify correct MIB module structure a: <module name> DEFINITIONS::=BEGIN <imports> <definitions> END b: <module name> BEGIN::=DEFINITIONS <imports> <definitions> END Ans:__________ (a/b/either) 165>__________group contains the objects that describe system administration (System/Interface/Address Translation) VTU N O TESBYSR I
  • 33. NETWORK MANAGEMENT SYSTEMS 32 166>__________group defines the interfaces of the network component and the network parameters associated with each interface (System/Interface/Address Translation) 167>__________group is a cross reference table between the IP address and the physical address (System/Interface/Address Translation) 168>__________group is a placeholder for future use of the OSI protocol (Transmission/CMOT) 169>___________group was created as a placeholder for network transmission related parameters (Transmission/CMOT) 170>__________group is the communication protocol group associated with SNMP management (SMT/SNMP) 171>__________group is a placeholder and is not yet defined (Transmission/CMOT) 172>__________group is based on the transmission media that underlie each interface of the system (transfer/transmission) 173>Match the following System :mib2 11 Interfaces :mib2 9 at :mib2 7 ip :mib2 5 icmp :mib2 3 Tcp : mib2 1 Udp :mib2 2 egp :mib2 4 cmot :mib2 6 Transmission :mib2 8 Snmp :mib2 10 174>__________group is the basic group in the Internet standard MIB (at/snmp/System) 175>Implementation of the System group is mandatory for all systems in both agent and manager (true/false)__________ 176>The System group consists of___ entities (5/6/7) 177>The System group consists of following entities a: sysDescr b: sysObjectId c: sysUpTime d: sysContact e: sysName f: sysLocation g: sysServices Ans:__________ (a/b/c/d/e/f/g/all) 178>_________group contains managed objects associated with the interfaces of a system (System/Interface/snmp) 179>Implementation of the Interfaces group is mandatory for all systems (true/false)__________ 180>The Interface group consists of following nodes__________ (ifNumber/ifTable/both) 181>wrt Interface group, the number of interfaces of the entity is defined by ____and the information related to each interface is defined in the Interface table______ (ifIndex/ifTable/ifNumber) 182>Match the following sysDescr : system 7 sysObjectId :system 5 sysUpTime :system 3 sysContact :system 1 sysName :system 2 sysLocation :system 4 sysServices :system 6 183>Match the following ifNumber :largest size of the datagram for the interface ifTable :type of interface layer below the network layer defined as an enumerated integer ifEntry :total number of network interfaces in the system ifDescr :list of entries that describes information on each interface of the system ifType :an interface entry that contains objects at the subnetwork layer for a particular interface ifMtu :a unique integer value for each interface 184>Match the following ifSpeed :value of sysUpTime at the current operational status ifPhysAddress :current operational status of the interface ifAdminStatus :current or nominal data rate for the interface in bps VTU N O TESBYSR I
  • 34. NETWORK MANAGEMENT SYSTEMS 33 ifOperStatus :interface's address at the protocol layer immediately below the network layer ifLastCange :reference to MIB definitions specific to the particular media used to realize the interface ifSpecific :desired status of the interface ie up, down or testing 185>Match the following ifInOctets :number of unsupported protocol packets discarded ifInUcastPkts :number of inbound packets discarded ifInNUcastPkts :number of subnetwork unicast packets delivered to a higher layer protocol ifInDiscards :total number of input octets received ifInErrors :number of non-unicast packets delivered to a higher layer protocol ifInUnknownProtos :number of inbound packets with errors 186>Match the following ifOutOctets :length of the output queue in packets ifOutUcastPkts :number of outbound packets discarded ifOutNUcastPkts :total number of unicast packets that higher level layer requested to be transmitted ifOutDiscrds :number of octets transmitted out of the interface ifOutErrors :total number of non-unicast packets that higher level layer requested to be transmitted ifOutQLen :number of outbound packets tat could not be transmitted because of errors 187>__________is defined are an Enumerated INTEGER (ifNumber/ifType) 188>In interface group, object identifiers 11 through 15 refer to the measurements on_____ traffic and object identifiers 16 through 21 to measurement on_____ traffic (outbound/inbound) 189>The Address Translation group consists of table that converts _____to _____for all the interfaces of the system (physical address/NetworkAddress) 190>The Internet uses __as the networking protocol (TCP/IP)________ 191>__________group has the information on the various parameters of the protocol (system/ip/at) 192>The implementation of IP group is mandatory (true/false) __________ 193>The IP group contains following tables a:IP address table b:IP routing table c:IP address translation table Ans:__________ (a/b/c/all) 194>__________indicate whether the node is acting as just as route or gateway between two autonomous networks (ipForwDatagrams/ipForwarding) 195>Match the following ipForwarding :number of input datagrams discarded due to unsupported protocolipDefaultTTL :number of input datagrams discarded due to header error ipInRecieves :number of datagrams discarded due to address errors ipInHdrErrors :number of input datagrams attempted to forward to the destination ipInAddrError :number of locally addressed datagrams received successfully but discarded due to unsupported protocol ipForwDatagrams :total number of input datagrams received from interfaces including those in error ipInUnknownProtos :node acting as a gateway or not ipInDiscards :time-to-live field of IP header 196>Match the following ipInDelivers :number of failures detected by the IP reassembly algorithm ipOutRequests :number of successfully reassembled datagrams ipOutDiscards :number of IP datagrams received that need reassembly ipOutNoRoutes :maximum number of seconds that received fragments are held while they are awaiting reassembly ipReasmReqds :number of IP datagrams discarded because no route could be found to transmit than to their destinations ipReasmOKs :number of no error IP datagram discarded due to lack of buffer space ipReasmFails :total number of IP datagrams which local IP user protocols supplied to IP ipReasmTimeOut :total number of input datagrams successfully delivered to IP user protocols 197>Match the following ipFragOKs :number of routing entries discarded even though they were valid ipFragFails :IP address translation table that maps IP addresses to physical address ipFragCreates :IP routing table containing an entry for each route ipAddrTable :Number of datagram fragments generated as a result of fragmentation ipNetToMediaTable :number of IP datagrams not fragmented due to Don’t fragment flag set ipRoutingDiscards :number of successfully fragmented datagrams VTU N O TESBYSR I
  • 35. NETWORK MANAGEMENT SYSTEMS 34 ipRouteTable :table of IP addresses 198>An entry_____ in ipRouteDest Is considered a default route (1.1.1.1/0.0.0.0) 199>Match the following ipAddrTable :broadcast address indicator bit ipAddrEntry :index value of the entry ipAdEntAddr :one of the entries in the IP address table ipAdEntIfIndex :table of IP addresses ipAdEntNetMask :the IP address to which this entry's addressing information pertains ipAdEntBcastAddr :subnet mask for the IP address of the entry ipAdEntReasmMaxSize :largest IP datagram that can be reassembled on this interface 200>Match the following ipRouteTable :reference to MIB definition specific to the routing protocol ipRouteEntry :mask to be logically ANDed with the destination address before comparing with the ipRouteDest field ipRouteDest :Routing mechanism by which this route was learned ipRouteIfIndex :IP address of the next hop ipRouteMetric1 :primary routing metric for this route ipRouteNextHop :number of seconds since routing was last updated ipRouteType :type of route ipRouteProto :IP routing table ipRouteAge :route to a particular destination ipRouteMask :destination IP address of this route ipRouteInfo :index of interface ipRouteMetric2 :an alternative metric for this route 201>Match the following ipNetToMediaTable :type of mapping ipNetToMediaEntry :IP address ipNetToMediaIfIndex :media dependent physical address ipNetToMediaPhysAddress :table mapping IP addresses to physical addresses ipNetToMediaNetAddress :IP address to physical address for the particular interface ipNetToMediaType :Interface on which this entry's equivalence is effective 202>Match the following ipForward :address of next system ipForwardNumber :mask to be logically ANDed with the destination address before comparing with the ipRouteDest field ipForwardTable :a particular route to a particular destination under a particular policy ipForwardEntry :number of entries in the IP forward table ipForwardDest :contains information on IP forwarding table, deprecator IP routing table ipForwardMask :routing table of this entity ipForwardPolicy :destination IP route of this address ipForwardNextHop :set of conditions that selects one multipath route 203>Match the following ipForwardIfIndex :an alterntive routing metric for this route ipForwardType :primary routing metric for this route ipForwardProto :autonomus system number of next hop ipForwardInfo :reference to MIB definition specific to the routing protocol ipForwardNextHopAS :number of seconds since routing was last updated ipForwardMetric1 :routing mechanism by which this route was learned ipForwardMetric2 :type of route--remote, local, invalid or otherwise ipForwardAge :ifIndex value of the interface 204>The entity__________defines the general set of conditions that would cause the selection of one multipath route over others (ipForwardProto/ipForwardPolicy) 205>___________is a precursor of SNMP and is part of the TCP/IP suite (IGMP/ICMP) 206>Match the following icmpInMsgs :number of ICMP echo reply message received icmpInErrors :number of ICMP echo message received icmpInDestUnreachs :number of ICMPredirect messages received icmpInTimeExcds :number of ICMP source quench messages received icmpInParmProbs :number of ICMP parameter problem messages received VTU N O TESBYSR I
  • 36. NETWORK MANAGEMENT SYSTEMS 35 icmpInSrcQuenches :number of ICMP time exceeded messages received icmpInRedirects :number of ICMP destination unreachable messages received icmpInEchoe :total number of ICMP messages received by the entity including icmpInErrors icmpInEchoReps :number of message received by the entity with ICMP specific errors 207>Match the following icmpInTimestamps :number of ICMP parameter problem messages sent icmpInTimestampReps :number of ICMP Time exceeded messages sent icmpInAddrMasks :number of ICMP destination unreachable messages sent icmpInAddrMasksReps :number of ICMP timestamp message received icmpOutMsgs :number of ICMP reply messages received icmpOutErrors :number of ICMP address mask request messages received icmpOutDestUnreachs :number of ICMP address mask reply messages received icmpOutTimeExcds :total number of ICMP messages attempted to be sent by this entity icmpOutParmProbs :number of good ICMP messages not sent, does not include the ones with errors 208>Match the following icmpOutSrcQuechs :number of ICMP address mask reply messages sent icmpOutRedirects :number of ICMP address mask request messages sent icmpOutEchos :number of ICMP timestamp reply messages sent icmpOutEchoReps :number of ICMP timestamp message sent icmpOutTimestamp :number of ICMP echo reply messages sent icmpOutTimestampReps :number of ICMP echo messages sent icmpOutAddrMasks :number of ICMP redirect messages sent icmpOutAddrMasksReps :number of ICMP source quench messages sent 209>In TCP group, the table entry has following indices to uniquely define it in the table a:tcpConnLocalAddress b:tcpConnLocalPort c:tcpConnRemAddress d:tcpConnRemPort Ans:___________ (a/b/c/d/all) 210>Match the following tcpRtoAlgorithm :number of resets done to either CLOSED or LISTEN tcpRtoMin :number of failed attempts to make connection tcpRtoMax :number of passive connections made LISTEN to SYN-RCVD state tcpMaxConn :number of active connections made CLOSED TO SYN-SENT state tcpActiveConn :Maximum number of TCP connections tcpPassiveOpens :maximum value for timeout in milliseconds retransmission tcpAttemptsFails :minimum value for timeout in milliseconds for retransmission tcpEstabResets :timeout algorithm for retransmission of octets 211>Match the following tcpCurrEstab :number of segment send containing RST flag tcpInSegs :Total number of segments received in error tcpOutSegs :Total number of segments retransmitted tcpRetransSegs :TCO connection table tcpConnTable :Total number of segments sent excluding retransmission tcpInErrs :total number of segments received including with errors tcpOutRsts :no of connections for which the current state is either ESTABLISHED or CLOSED WAIT 212>Match the following tcpConnTable :remote port number tcpConnEntry :remote IP address tcpConnState :local port number tcpConnLocalAddress :local IP address tcpConnLocalPort :state of the TCP connection tcpConnRemAddress :information about a particular TCP connection tcpConnRemPort :TCO connection table 213>Match the following udpInDatagrams :information about a particular connection or UDP listener udpNoPorts :local IP address udpInErrors :local UDP port udpOutDatagrams :total number of datagrams delivered to the users VTU N O TESBYSR I