0% found this document useful (0 votes)
26 views2 pages

Data Com 63

Uploaded by

Vaibhav Verma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as ODT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views2 pages

Data Com 63

Uploaded by

Vaibhav Verma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as ODT, PDF, TXT or read online on Scribd
You are on page 1/ 2

1.

The application-level protocol in which a few manager stations control a set of agents is
called ______
a) HTML
b) TCP
c) SNMP
d) SNMP/IP

Answer: c
Explanation: SNMP stands for Simple Network Management Protocol. It is an application-
level protocol in which a few manager stations control a set of agents. It is used under the
TCP/IP protocol suite and is used for managing devices on the internet.

2. Configuration management can be divided into which two subsystems?


a) Reconfiguration and documentation
b) Management and configuration
c) Documentation and dialing up
d) Configuration and dialing up

Answer: a
Explanation: The best current practices report is created by a management group to ensure
the most effective configuration management. The group also makes a MIB (Management
Information Base) module to help with the configuration management.

3. To use a Simple Network Management System, we need _______


a) Servers
b) IP
c) Protocols
d) Rules

Answer: d
Explanation: Rules are a collection of expression containing parameters to observe the
attributes of the user’s device, and then execute some actions. It specifies the parameters
for the managed objects inside the application and performs operations that would support
the expression. The input of a rule may be many expressions or even a single expression
that end in an output of single object invoking some action.
4. In Network Management System, the division that is responsible for controlling access to
network based on a predefined policy is called _________
a) Fault Management
b) Secured Management
c) Active Management
d) Security Management

Answer: d
Explanation: Security management is also responsible to provide confidentiality,
authentication and encryption in addition to controlling access to network. Without security
management, the network and its traffic would be vulnerable to be exploited by attackers.

5. Control of the users’ access to network resources through charges is the main responsibility
of ________
a) Reactive Fault Management
b) Reconfigured Fault Management
c) Accounting Management
d) Security Management

Answer: c
Explanation: The accounting management keeps track of the users and their access rights to
the network and controls the user’s access by communicating with the security
management. The accounting management takes support of the Management Information
Block to perform its operations.

You might also like