You are on page 1of 5

Which one of the following is not true?

A.) client programs interact with NVT

B.) server translates NVT operations

C.) telnet defines a network virtual terminal (NVT) standard

D.) None of these

Based on the predefined policy of Network management, controlling access to


the network is the task of

Fault Management

Performance Management

Active Management

Security Management

SNMP provides a set of fundamental operations for monitoring and maintaining a

a. TCP protocol suite

b. DataSet protocol

c. Internet

d. HTML suite

In telnet, the client echoes the character on the screen but does not send it until a whole line is complet
in

a. default mode

b. character mode

c. server mode

d. none of the
mentioned
Which one of the following is not correct regarding telent?

a. telnet is a general purpose client-server program

b. telnet lets user access an application on a remote computer

c. telnet can also be used for file transfer

d. none of the mentioned

If we want that a character be interpreted by the client instead of server

a. escape character has to be used

b. control functions has to be disabled

c. it is not possible

d. none of the mentioned

The _______ translates local characters into NVT form.

a. terminal driver

b. TELNET client

c. TELNET server

d. none of the above

A pairing of an SNMP community with an SNMP community profile

is defined as SNMP ______ policy.

a) peer-to-peer
b) match

c) access

d) none of these

The SNMP Engine comprises

a) Dispatcher

b) Security Subsystem

c) Access control subsystem.

d) All the above

In Network Management System, maps track each piece of hardware and its connection to the

a. IP Server

b. Domain

c. Network

d. Data

In Network Management System, a large network is usually made up of hundreds of

a. Domains

b. Protocols

c. Entities

d. IP

In Network Management System, the agent keeps performance information in a

a. Domains

b. IP

c. Database

d. Data Protocol
An SNMP agent can send _______ messages.

A) Response

B) GetRequest

C) SetRequest

D) none of the above

The Trap PDU is sent from the ______ to the _______ to


report an event.

A) server; client

B) client; server

C) network; host

D) none of the above

SMI emphasizes three attributes to handle an object:


_____, ________, and _________.

A) name; data type; size

B) name; size; encoding method

C) name; data type; encoding method

D) none of the above

An object id defines a _______. Add a zero suffix to


define the _______.

A) variable; table

B) table; variable

C) variable; variable contents


Which of the following could be a legitimate MIB object
identifier?

A) 1.3.6.1.2.1.1

B) 1.3.6.1.2.2.1

C) 2.3.6.1.2.1.2

D) none of the above

================================================================
===

 Network management is the process to operating, monitoring, and


controlling the network to ensure it works as intended and provides
value to its users. True
 SNMP network management architecture specifies five transport
function protocols. False
 SMI is concerned only with object type. True

You might also like