0% found this document useful (0 votes)
850 views7 pages

Network Management Solution Midterm Exam

The document is a midterm exam cover sheet for a Network Management course. It contains 20 multiple choice questions testing knowledge of network management concepts like SNMP, OSI model, network protocols, and network monitoring tools. It also contains 3 true/false questions and 2 short answer questions about the Three-Tier Organization Model in RMON and factors influencing network configuration choices. The exam is 1 hour long and covers content from the second semester of the course.

Uploaded by

Lashin2014
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
850 views7 pages

Network Management Solution Midterm Exam

The document is a midterm exam cover sheet for a Network Management course. It contains 20 multiple choice questions testing knowledge of network management concepts like SNMP, OSI model, network protocols, and network monitoring tools. It also contains 3 true/false questions and 2 short answer questions about the Three-Tier Organization Model in RMON and factors influencing network configuration choices. The exam is 1 hour long and covers content from the second semester of the course.

Uploaded by

Lashin2014
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Ministry of Higher Education

Saudi Electronic University


College of Computing and Informatics

Midterm Examination Cover Sheet


Second Semester: 1435-1436 / 2014-2015

Course Instructor: Exam Date: 15/03/2015

Course Title: Network Management Course Code: IT 340


Number of Pages:
Exam Duration: 1 Hour (including cover page) 7 (Seven)

Exam Guidelines

 Mobile phones are not permitted.


 Calculators are permitted.

Marking Scheme
Questions Score
Question 1 20 Marks
Question 2 10 Marks
Question 3 8 Marks
Question 4 4 Marks
Question 5 8 Marks

Student Name: Student ID:

1
Ministry of Higher Education
Saudi Electronic University
College of Computing and Informatics

Question 1: Multiple Choice Questions (Please select one)

1. The OBJECT-TYPE macro is used to define

a) manager
b) managed object
c) service
d) None of the above

2. Bulk Data Transfer Message is the ability to request and receive bulk data
using

a) inform-request
b) get-request
c) set-request
d) get-bulk request

3. An SNMPv2 trap event is generated and transmitted by an agent process


when

a) agent is called
b) exceptional situation occurs
c) manager is called
d) request is sent

4. In the networking environment, a NIC driver is needed to:

a) Communicate with other NICs on a network.


b) Communicate between the NIC and the computer's operating
system.
c) Communicate between the file server and the other computers on
the network.
d) Communicate between different types of computers on a network.

5. Which layer of the OSI Reference Model has two sub layers?

a) Physical layer
b) Data links layer
c) Session layer
d) Application layer

2
Ministry of Higher Education
Saudi Electronic University
College of Computing and Informatics

6. Which protocol is commonly used for Microsoft-based, peer-to-peer


networks

a) AppleTalk
b) DECnet
c) NetBEUI
d) X.25
7. Any host that could query an agent in the Two-Tier Organization Model
is called:

a) Manager
b) Network Element
c) Managed Object
d) Management agent

8. The model that specifies the relationship between network element,


agent, and manager is:

a) Information Model
b) Organization Model
c) Communication Model
d) Centralized Model

9. ____________ is responsible for converting non-SNMP data from non-


SNMP objects to SNMP compatible objects and messages.

a) NMS
b) Manager
c) Management Agent
d) Proxy server

10. SNMP tools include

a. command-line tools
b. MIB Browser
c. an SNMP sniffer
d. all the above

11. Which tool is best suitable for measuring connectivity:

a) ifconfig.
b) wireshark
c) ping
d) none of the above
3
https://www.manageengine.com/network-monitoring/what-is-snmp.html
Ministry of Higher Education
Saudi Electronic University
College of Computing and Informatics

12. Traffic monitoring tools include

a) host and dig tools


b) netstat and arp.
c) traceroute
d) None of the above

13. What is the authentication protocol used by the User Security Model
(USM) in SNMPv3?

a) HMAC-MD5
b) HMAC-SHA
c) Both
d) None of these

14. Which of the following protocols permits secure polling of network


devices?

a) SNMPv2
b) SCP
c) SNMPv3
d) SSH

15. RMON probe configuration is done by:

a) SNMP traps
b) SNMP Get-Next-Request
c) SNMP Set-Request
d) SNMP agent

16. SNMP is classified as ____________ layer protocol.

a) Datalink
b) Network
c) Transport
d) Application

17. Which of the following is not a functional area of SNMPv1?

a) Test
b) Fault
c) Performance
d) Security
4
Ministry of Higher Education
Saudi Electronic University
College of Computing and Informatics

18. SNMP has the following models EXCEPT


a) Organization
b) Information
c) Functional
d) Performance

19. FDDI stands for

a) Fiber distributed data interface


b) Fiber data distributed interface
c) Fiber digital data interface
d) None

20. Select the correct statement from the following:

a) TCP/IP is a protocol of DECNET


b) TCP/IP is a single protocol
c) TCP/IP is a connectionless protocol
d) TCP/IP is a connection-oriented suite of protocols

Question 2: TRUE/FALSE
1. In SNMPv2 an inform-request message is generated by a manager
application and is transmitted to another manager application. True

2. In SNMPv2 security features were implemented. False

3. The maximum length of a 10BaseT segment is 100 meters. False

4. With CSMA/CD, if there is data on the cable, no other computer may


transmit until the data has reached its destination and the cable is clear
again. True

5. tcpdump and ethereal commands put a network interface in a promiscuous


mode and log data. In this mode, raw data are gathered without any
filtering. False

6. arp tool allows access to ARP cache where ARP stands for the Address
Resolution Protocol used for mapping an Internet Protocol address (IP
address) to a physical machine address that is recognized in the local
network . True
Address Resolution Protocol (ARP)
Address Resolution Protocol (ARP) is a protocol for mapping an Internet Protocol address to a physical machine
5
address that is recognized in the local network. A table, usually called the ARP cache, is used to maintain a
correlation between each MAC address and its corresponding IP address. ARP provides the protocol rules for making
this correlation and providing address conversion in both directions.
Ministry of Higher Education
Saudi Electronic University
College of Computing and Informatics

7. Gateway is router connecting two networks with dissimilar network


protocols. True

8. Communication is not secured in SNMPv1 - no encryption True

9. SNMPv3 provides for both encryption and authentication of SNMP


messages. True

10. RMON probe has the same function as SNMP Agent. False

Question 3: Explain the Three-Tier Organization Model


(RMON).
Answer

 Managed object comprises network element and


management agent
 RMON acts as an agent and a manager
 RMON (Remote Monitoring) gathers data from MO,
analyses the data, and stores the data
 Communicates the statistics to the manager

SNMP
Manager

RMON
Probe

Managed
Objects

6
Ministry of Higher Education
Saudi Electronic University
College of Computing and Informatics

Question 4: List three factors that can influence the choice of


whether to implement a peer-to-peer or server-based network
configuration.
Answer

Three factors that can influence the choice of whether to implement a peer-to-
peer or server-based network configuration are the size of the organization, the
level of security required, and the type of business being conducted.

Question 5: List any 3 SNMP v1 Messages. Briefly explain any


two of them.
Answer:

• Get-Request
• Get-Next-Request
• Set-Request
• Get-Response
• Trap
• Generic trap
• Specific trap
• Time stamp

You might also like