Midterm II Solutions
Midterm II Solutions
Question 1: a) Choose the correct answer for the following [40 Marks]
1. Traffic on networks can be monitored to determine (choose all answers that applies)
a) Host b)Traffic Metrics c)Traffic Statistics d)All of the above
2. Monitoring system consists of
a) Probe b)Collector c)Analyzer d)All of the above
3. RMON is
a) A New protocol for network monitoring to replace SNMP
b) A device on network gathers and processes data; results viewed remotely
c) To configure and manage hosts remotely
d) An automation of the process of network discovery
4. Which tool is for obtaining and configuring networking interfaces parameters and status
a) dig b)ifconfig c)ping d)None of the above
5. Network remote configuration could be done
a) Using the device own console
b) Using terminal connected to the device on a local device port
c) Using communication protocol supported by the device such as ssh or snmp
d) Using smtp for transferring the configuration
6. PAP exchange request-response messages ____
a) Encrypted MD5 has b)SSL Certificate c)Clear Text d)None of the above
7. The ____ is the first device (edge device) in a network that external (remote) users connect to in order to
request a service from the network.
a) SNMP b)DNS c)NAS d)DHCP
8. Software tools are used for configuration because
a) We need to rool-back the changes if the configurations caused interruption
b) We need to secure the network c)it is the only possible way to configure the network d)None of the
above
9. What is the first protocol that describes AAA architecture
a) SSL b)DNS c)RADIUS d)TCP
10. Telnet protocol operates on port _____
a) 80 b)23 c)22 d)53
You are responsible for designing the autodiscovery module of an NMS. Outline the procedure and the
software tools that you would use
Solution
There are many alternative approaches to this problem, one of which is given here.
1. Execute broadcast ping or hosts to discover the hosts in the local subnet.
2. Execute arp to discover the router.
Page 1 of 2
3. Execute route to discover the addresses in the routing table.
4. Identify the new hosts and routers and keep increasing the scope one additional hop at a time.
Solution
Solution
Page 2 of 2