SlideShare a Scribd company logo
1 of 2
Download to read offline
Question No. 1
What updates have been brought by snmpv2 to SNMPv1 communication architecture? [2 marks]
Question No. 2
How SNMPv3 enhances security compared to SNMPv2? [2 marks]
Question No. 3
Define RMON [1 mark]
What are the benefits of RMON ? [1 mark]
Question No. 4
As a network manager, you are responsible for the operation of a network. You notice heavy
traffic in a host that is on a TCP/IP network and want to find out the details:
What basic network monitoring tool(s) would you use? [1 mark]
What would you look for in your results? [1 mark]
Question No. 5
What is the difference between nslookup & dig? [1 marks]
Question No. 5
Install wireshark and capture IP packets on your Ethernet interface.
Put a screenshot of IP packets captured on your device. [1 marks]
Analyze their headers and contents. [2 marks] (1 mark bonus for
Solution
Answer 1.
SNMPv1 (Simple Network Management Protocol) v1 was designed as a short term solution to
allow management of TCP/IP - based internets. Although it was simple there were some major
issues in SNMPv1, viz Expressiveness of MIB definitions, performance and security issues.
Some key differences brought in SNMPv2 are:
Answer 2:
The newer version of SNMP, i.e. SNMPv3 was released to cover some of the security issues that
plagued SNMPv2. SNMPv3 framework augments the original SNMP and SNMPv2
specifications with additional security and administration capabilities. Security and remote
configuration capabilities were added in the newer version. The SNMPv3 architecture introduces
the User-based Security Model (USM) for message security and View-based Access Control
Model(VACM) for access control. The architecture supports the concurrent use of different
security, access control and message processing protocols. SNMPv2 also introduces the ability to
dynamically
configure the SNMP agent using SNMP SET commands against the MIB objects that represent
the agent's configuration. The dynamic configuration support enables addition, deletion and
modification of configuration entries locally or remotely. The latest architecture incorporates an
SNMP context engine ID to encode and decode SNMP contexts.
In short, SNMPv3 provides three layers of security. The highest level is with authentication and
privacy. The second or middle level is with authentication and no privacy and the bottom level is
without authentication and privacy.
Answer 3:
Remote Monitoring (RMON) is a standard specification that facilitates the monitoring ,
analyzing and troubleshooting of network operational activities through the use of remote
devices known as monitors or probes.
RMON provides the benefits of standarazation and improves efficiency by allowing you to
remain at one workstation and collect information from widely dispersed LAN segments or
VLANs. RMON also allows proactive management and reduces the traffic load.
Answer 4:
Microsoft network monitor and CapsaFree are a few of the basic tools one can use for in this
case. Main features of MNM include support for over 300 public and Microsoft proprietary
protocols, simultaneous capture sessions, a Wireless Monitor Mode and sniffing of promiscuous
mode traffic, amongst others.
Answer 5:
Basic difference between nslookup and dig is that dig uses the OS resolver libraries and
nslookup uses is own internal ones.
Dig provides more detail, more advanced domain info. while nslookup provides basic info. for
name queries. The more information the better.

More Related Content

Similar to Question No. 1What updates have been brought by snmpv2 to SNMPv1 c.pdf

Centralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructureCentralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructureMOHD ARISH
 
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRENON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTREcscpconf
 
Project report
Project reportProject report
Project reportayush13bbm
 
9Tuts.Com New CCNA 200-120 New CCNA New Questions 2
9Tuts.Com New CCNA 200-120 New CCNA   New Questions 29Tuts.Com New CCNA 200-120 New CCNA   New Questions 2
9Tuts.Com New CCNA 200-120 New CCNA New Questions 2Lori Head
 
Simple network management protocol
Simple network management protocolSimple network management protocol
Simple network management protocolni35540
 
IRJET- SDN Simulation in Mininet to Provide Security Via Firewall
IRJET- SDN Simulation in Mininet to Provide Security Via FirewallIRJET- SDN Simulation in Mininet to Provide Security Via Firewall
IRJET- SDN Simulation in Mininet to Provide Security Via FirewallIRJET Journal
 
group presentation
group presentationgroup presentation
group presentations1120099
 
CCNA4v5 Chapter 8 - Monitoring the Netwok
CCNA4v5 Chapter 8 - Monitoring the NetwokCCNA4v5 Chapter 8 - Monitoring the Netwok
CCNA4v5 Chapter 8 - Monitoring the NetwokAhmed Gad
 
Question 1 What updates have been brought by snmpv2 to SNMPv1 commun.pdf
Question 1 What updates have been brought by snmpv2 to SNMPv1 commun.pdfQuestion 1 What updates have been brought by snmpv2 to SNMPv1 commun.pdf
Question 1 What updates have been brought by snmpv2 to SNMPv1 commun.pdfboothlynntur11512
 
Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1MOHD ARISH
 
Nagios Conference 2013 - Spenser Reinhardt - Intro to Network Monitoring Usin...
Nagios Conference 2013 - Spenser Reinhardt - Intro to Network Monitoring Usin...Nagios Conference 2013 - Spenser Reinhardt - Intro to Network Monitoring Usin...
Nagios Conference 2013 - Spenser Reinhardt - Intro to Network Monitoring Usin...Nagios
 

Similar to Question No. 1What updates have been brought by snmpv2 to SNMPv1 c.pdf (20)

Centralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructureCentralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructure
 
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRENON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
 
Project report
Project reportProject report
Project report
 
SNMP
SNMPSNMP
SNMP
 
9Tuts.Com New CCNA 200-120 New CCNA New Questions 2
9Tuts.Com New CCNA 200-120 New CCNA   New Questions 29Tuts.Com New CCNA 200-120 New CCNA   New Questions 2
9Tuts.Com New CCNA 200-120 New CCNA New Questions 2
 
Simple network management protocol
Simple network management protocolSimple network management protocol
Simple network management protocol
 
SNMP.pptx
SNMP.pptxSNMP.pptx
SNMP.pptx
 
IRJET- SDN Simulation in Mininet to Provide Security Via Firewall
IRJET- SDN Simulation in Mininet to Provide Security Via FirewallIRJET- SDN Simulation in Mininet to Provide Security Via Firewall
IRJET- SDN Simulation in Mininet to Provide Security Via Firewall
 
M05078996
M05078996M05078996
M05078996
 
Net Man
Net ManNet Man
Net Man
 
group G
group Ggroup G
group G
 
a
aa
a
 
001 implementation nms_software
001 implementation nms_software001 implementation nms_software
001 implementation nms_software
 
SNMP
SNMPSNMP
SNMP
 
group presentation
group presentationgroup presentation
group presentation
 
CCNA4v5 Chapter 8 - Monitoring the Netwok
CCNA4v5 Chapter 8 - Monitoring the NetwokCCNA4v5 Chapter 8 - Monitoring the Netwok
CCNA4v5 Chapter 8 - Monitoring the Netwok
 
Question 1 What updates have been brought by snmpv2 to SNMPv1 commun.pdf
Question 1 What updates have been brought by snmpv2 to SNMPv1 commun.pdfQuestion 1 What updates have been brought by snmpv2 to SNMPv1 commun.pdf
Question 1 What updates have been brought by snmpv2 to SNMPv1 commun.pdf
 
Hp open view
Hp open viewHp open view
Hp open view
 
Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1
 
Nagios Conference 2013 - Spenser Reinhardt - Intro to Network Monitoring Usin...
Nagios Conference 2013 - Spenser Reinhardt - Intro to Network Monitoring Usin...Nagios Conference 2013 - Spenser Reinhardt - Intro to Network Monitoring Usin...
Nagios Conference 2013 - Spenser Reinhardt - Intro to Network Monitoring Usin...
 

More from fashiionbeutycare

________ are characterized by small incisors and large premolars wit.pdf
________ are characterized by small incisors and large premolars wit.pdf________ are characterized by small incisors and large premolars wit.pdf
________ are characterized by small incisors and large premolars wit.pdffashiionbeutycare
 
Write a Java program that opens the file, reads all the Grade from t.pdf
Write a Java program that opens the file, reads all the Grade from t.pdfWrite a Java program that opens the file, reads all the Grade from t.pdf
Write a Java program that opens the file, reads all the Grade from t.pdffashiionbeutycare
 
why do Private offices have a high sensible heat ratioSolution.pdf
why do Private offices have a high sensible heat ratioSolution.pdfwhy do Private offices have a high sensible heat ratioSolution.pdf
why do Private offices have a high sensible heat ratioSolution.pdffashiionbeutycare
 
Why is payback and IRR more frequently used than NPV when it comes t.pdf
Why is payback and IRR more frequently used than NPV when it comes t.pdfWhy is payback and IRR more frequently used than NPV when it comes t.pdf
Why is payback and IRR more frequently used than NPV when it comes t.pdffashiionbeutycare
 
What general environmental condition is represented by this assemblag.pdf
What general environmental condition is represented by this assemblag.pdfWhat general environmental condition is represented by this assemblag.pdf
What general environmental condition is represented by this assemblag.pdffashiionbeutycare
 
What are some of the basic features of Excavates Discuss the differe.pdf
What are some of the basic features of Excavates Discuss the differe.pdfWhat are some of the basic features of Excavates Discuss the differe.pdf
What are some of the basic features of Excavates Discuss the differe.pdffashiionbeutycare
 
True or False Disulfides are essential for cone-snail venoms acti.pdf
True or False Disulfides are essential for cone-snail venoms acti.pdfTrue or False Disulfides are essential for cone-snail venoms acti.pdf
True or False Disulfides are essential for cone-snail venoms acti.pdffashiionbeutycare
 
To what extent do GUI editors generally allow developers to modify H.pdf
To what extent do GUI editors generally allow developers to modify H.pdfTo what extent do GUI editors generally allow developers to modify H.pdf
To what extent do GUI editors generally allow developers to modify H.pdffashiionbeutycare
 
The diagram shows a cell during the anaphase stage of mitosis. How wo.pdf
The diagram shows a cell during the anaphase stage of mitosis. How wo.pdfThe diagram shows a cell during the anaphase stage of mitosis. How wo.pdf
The diagram shows a cell during the anaphase stage of mitosis. How wo.pdffashiionbeutycare
 
Thank you for your helpful answer! Consider the following meth.pdf
Thank you for your helpful answer! Consider the following meth.pdfThank you for your helpful answer! Consider the following meth.pdf
Thank you for your helpful answer! Consider the following meth.pdffashiionbeutycare
 
State whether the following statement is true or false The graph of t.pdf
State whether the following statement is true or false The graph of t.pdfState whether the following statement is true or false The graph of t.pdf
State whether the following statement is true or false The graph of t.pdffashiionbeutycare
 
Should Maria’s ethical responsibility to Linda lead her to keep thes.pdf
Should Maria’s ethical responsibility to Linda lead her to keep thes.pdfShould Maria’s ethical responsibility to Linda lead her to keep thes.pdf
Should Maria’s ethical responsibility to Linda lead her to keep thes.pdffashiionbeutycare
 
Revolution in Egypt With 83 million people, Egypt is the most populou.pdf
Revolution in Egypt With 83 million people, Egypt is the most populou.pdfRevolution in Egypt With 83 million people, Egypt is the most populou.pdf
Revolution in Egypt With 83 million people, Egypt is the most populou.pdffashiionbeutycare
 
President Truman belleved that an increase in a na development, which.pdf
President Truman belleved that an increase in a na development, which.pdfPresident Truman belleved that an increase in a na development, which.pdf
President Truman belleved that an increase in a na development, which.pdffashiionbeutycare
 
Pretend you have been asked by the president of the united statesto .pdf
Pretend you have been asked by the president of the united statesto .pdfPretend you have been asked by the president of the united statesto .pdf
Pretend you have been asked by the president of the united statesto .pdffashiionbeutycare
 
Please explain in detail. Why cant Salmonella be infected by lambd.pdf
Please explain in detail. Why cant Salmonella be infected by lambd.pdfPlease explain in detail. Why cant Salmonella be infected by lambd.pdf
Please explain in detail. Why cant Salmonella be infected by lambd.pdffashiionbeutycare
 
Part A Tnsomy 21, or Down syndrome, occurs when there is anormal dplo.pdf
Part A Tnsomy 21, or Down syndrome, occurs when there is anormal dplo.pdfPart A Tnsomy 21, or Down syndrome, occurs when there is anormal dplo.pdf
Part A Tnsomy 21, or Down syndrome, occurs when there is anormal dplo.pdffashiionbeutycare
 
Part 1 List the basic steps in securing an operating system. Assume.pdf
Part 1 List the basic steps in securing an operating system. Assume.pdfPart 1 List the basic steps in securing an operating system. Assume.pdf
Part 1 List the basic steps in securing an operating system. Assume.pdffashiionbeutycare
 
John is 35 years old and recently married with Eva. After they got m.pdf
John is 35 years old and recently married with Eva. After they got m.pdfJohn is 35 years old and recently married with Eva. After they got m.pdf
John is 35 years old and recently married with Eva. After they got m.pdffashiionbeutycare
 
List three characteristics that an Intrusion Prevention System (IPS).pdf
List three characteristics that an Intrusion Prevention System (IPS).pdfList three characteristics that an Intrusion Prevention System (IPS).pdf
List three characteristics that an Intrusion Prevention System (IPS).pdffashiionbeutycare
 

More from fashiionbeutycare (20)

________ are characterized by small incisors and large premolars wit.pdf
________ are characterized by small incisors and large premolars wit.pdf________ are characterized by small incisors and large premolars wit.pdf
________ are characterized by small incisors and large premolars wit.pdf
 
Write a Java program that opens the file, reads all the Grade from t.pdf
Write a Java program that opens the file, reads all the Grade from t.pdfWrite a Java program that opens the file, reads all the Grade from t.pdf
Write a Java program that opens the file, reads all the Grade from t.pdf
 
why do Private offices have a high sensible heat ratioSolution.pdf
why do Private offices have a high sensible heat ratioSolution.pdfwhy do Private offices have a high sensible heat ratioSolution.pdf
why do Private offices have a high sensible heat ratioSolution.pdf
 
Why is payback and IRR more frequently used than NPV when it comes t.pdf
Why is payback and IRR more frequently used than NPV when it comes t.pdfWhy is payback and IRR more frequently used than NPV when it comes t.pdf
Why is payback and IRR more frequently used than NPV when it comes t.pdf
 
What general environmental condition is represented by this assemblag.pdf
What general environmental condition is represented by this assemblag.pdfWhat general environmental condition is represented by this assemblag.pdf
What general environmental condition is represented by this assemblag.pdf
 
What are some of the basic features of Excavates Discuss the differe.pdf
What are some of the basic features of Excavates Discuss the differe.pdfWhat are some of the basic features of Excavates Discuss the differe.pdf
What are some of the basic features of Excavates Discuss the differe.pdf
 
True or False Disulfides are essential for cone-snail venoms acti.pdf
True or False Disulfides are essential for cone-snail venoms acti.pdfTrue or False Disulfides are essential for cone-snail venoms acti.pdf
True or False Disulfides are essential for cone-snail venoms acti.pdf
 
To what extent do GUI editors generally allow developers to modify H.pdf
To what extent do GUI editors generally allow developers to modify H.pdfTo what extent do GUI editors generally allow developers to modify H.pdf
To what extent do GUI editors generally allow developers to modify H.pdf
 
The diagram shows a cell during the anaphase stage of mitosis. How wo.pdf
The diagram shows a cell during the anaphase stage of mitosis. How wo.pdfThe diagram shows a cell during the anaphase stage of mitosis. How wo.pdf
The diagram shows a cell during the anaphase stage of mitosis. How wo.pdf
 
Thank you for your helpful answer! Consider the following meth.pdf
Thank you for your helpful answer! Consider the following meth.pdfThank you for your helpful answer! Consider the following meth.pdf
Thank you for your helpful answer! Consider the following meth.pdf
 
State whether the following statement is true or false The graph of t.pdf
State whether the following statement is true or false The graph of t.pdfState whether the following statement is true or false The graph of t.pdf
State whether the following statement is true or false The graph of t.pdf
 
Should Maria’s ethical responsibility to Linda lead her to keep thes.pdf
Should Maria’s ethical responsibility to Linda lead her to keep thes.pdfShould Maria’s ethical responsibility to Linda lead her to keep thes.pdf
Should Maria’s ethical responsibility to Linda lead her to keep thes.pdf
 
Revolution in Egypt With 83 million people, Egypt is the most populou.pdf
Revolution in Egypt With 83 million people, Egypt is the most populou.pdfRevolution in Egypt With 83 million people, Egypt is the most populou.pdf
Revolution in Egypt With 83 million people, Egypt is the most populou.pdf
 
President Truman belleved that an increase in a na development, which.pdf
President Truman belleved that an increase in a na development, which.pdfPresident Truman belleved that an increase in a na development, which.pdf
President Truman belleved that an increase in a na development, which.pdf
 
Pretend you have been asked by the president of the united statesto .pdf
Pretend you have been asked by the president of the united statesto .pdfPretend you have been asked by the president of the united statesto .pdf
Pretend you have been asked by the president of the united statesto .pdf
 
Please explain in detail. Why cant Salmonella be infected by lambd.pdf
Please explain in detail. Why cant Salmonella be infected by lambd.pdfPlease explain in detail. Why cant Salmonella be infected by lambd.pdf
Please explain in detail. Why cant Salmonella be infected by lambd.pdf
 
Part A Tnsomy 21, or Down syndrome, occurs when there is anormal dplo.pdf
Part A Tnsomy 21, or Down syndrome, occurs when there is anormal dplo.pdfPart A Tnsomy 21, or Down syndrome, occurs when there is anormal dplo.pdf
Part A Tnsomy 21, or Down syndrome, occurs when there is anormal dplo.pdf
 
Part 1 List the basic steps in securing an operating system. Assume.pdf
Part 1 List the basic steps in securing an operating system. Assume.pdfPart 1 List the basic steps in securing an operating system. Assume.pdf
Part 1 List the basic steps in securing an operating system. Assume.pdf
 
John is 35 years old and recently married with Eva. After they got m.pdf
John is 35 years old and recently married with Eva. After they got m.pdfJohn is 35 years old and recently married with Eva. After they got m.pdf
John is 35 years old and recently married with Eva. After they got m.pdf
 
List three characteristics that an Intrusion Prevention System (IPS).pdf
List three characteristics that an Intrusion Prevention System (IPS).pdfList three characteristics that an Intrusion Prevention System (IPS).pdf
List three characteristics that an Intrusion Prevention System (IPS).pdf
 

Recently uploaded

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 

Recently uploaded (20)

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 

Question No. 1What updates have been brought by snmpv2 to SNMPv1 c.pdf

  • 1. Question No. 1 What updates have been brought by snmpv2 to SNMPv1 communication architecture? [2 marks] Question No. 2 How SNMPv3 enhances security compared to SNMPv2? [2 marks] Question No. 3 Define RMON [1 mark] What are the benefits of RMON ? [1 mark] Question No. 4 As a network manager, you are responsible for the operation of a network. You notice heavy traffic in a host that is on a TCP/IP network and want to find out the details: What basic network monitoring tool(s) would you use? [1 mark] What would you look for in your results? [1 mark] Question No. 5 What is the difference between nslookup & dig? [1 marks] Question No. 5 Install wireshark and capture IP packets on your Ethernet interface. Put a screenshot of IP packets captured on your device. [1 marks] Analyze their headers and contents. [2 marks] (1 mark bonus for Solution Answer 1. SNMPv1 (Simple Network Management Protocol) v1 was designed as a short term solution to allow management of TCP/IP - based internets. Although it was simple there were some major issues in SNMPv1, viz Expressiveness of MIB definitions, performance and security issues. Some key differences brought in SNMPv2 are: Answer 2: The newer version of SNMP, i.e. SNMPv3 was released to cover some of the security issues that plagued SNMPv2. SNMPv3 framework augments the original SNMP and SNMPv2 specifications with additional security and administration capabilities. Security and remote configuration capabilities were added in the newer version. The SNMPv3 architecture introduces the User-based Security Model (USM) for message security and View-based Access Control Model(VACM) for access control. The architecture supports the concurrent use of different security, access control and message processing protocols. SNMPv2 also introduces the ability to
  • 2. dynamically configure the SNMP agent using SNMP SET commands against the MIB objects that represent the agent's configuration. The dynamic configuration support enables addition, deletion and modification of configuration entries locally or remotely. The latest architecture incorporates an SNMP context engine ID to encode and decode SNMP contexts. In short, SNMPv3 provides three layers of security. The highest level is with authentication and privacy. The second or middle level is with authentication and no privacy and the bottom level is without authentication and privacy. Answer 3: Remote Monitoring (RMON) is a standard specification that facilitates the monitoring , analyzing and troubleshooting of network operational activities through the use of remote devices known as monitors or probes. RMON provides the benefits of standarazation and improves efficiency by allowing you to remain at one workstation and collect information from widely dispersed LAN segments or VLANs. RMON also allows proactive management and reduces the traffic load. Answer 4: Microsoft network monitor and CapsaFree are a few of the basic tools one can use for in this case. Main features of MNM include support for over 300 public and Microsoft proprietary protocols, simultaneous capture sessions, a Wireless Monitor Mode and sniffing of promiscuous mode traffic, amongst others. Answer 5: Basic difference between nslookup and dig is that dig uses the OS resolver libraries and nslookup uses is own internal ones. Dig provides more detail, more advanced domain info. while nslookup provides basic info. for name queries. The more information the better.