0% found this document useful (0 votes)
20 views2 pages

Midterm II Solutions

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views2 pages

Midterm II Solutions

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

2nd Semester 4th Year Subject: Networks Management

M I D E x a m ( 2 ) Attempt All Questions 2018/2019

Question 1: a) Choose the correct answer for the following [40 Marks]

Solution [see lecture notes]

1. Traffic on networks can be monitored to determine (choose all answers that applies)
a) Host b)Traffic Metrics c)Traffic Statistics d)All of the above
2. Monitoring system consists of
a) Probe b)Collector c)Analyzer d)All of the above
3. RMON is
a) A New protocol for network monitoring to replace SNMP
b) A device on network gathers and processes data; results viewed remotely
c) To configure and manage hosts remotely
d) An automation of the process of network discovery
4. Which tool is for obtaining and configuring networking interfaces parameters and status
a) dig b)ifconfig c)ping d)None of the above
5. Network remote configuration could be done
a) Using the device own console
b) Using terminal connected to the device on a local device port
c) Using communication protocol supported by the device such as ssh or snmp
d) Using smtp for transferring the configuration
6. PAP exchange request-response messages ____
a) Encrypted MD5 has b)SSL Certificate c)Clear Text d)None of the above
7. The ____ is the first device (edge device) in a network that external (remote) users connect to in order to
request a service from the network.
a) SNMP b)DNS c)NAS d)DHCP
8. Software tools are used for configuration because
a) We need to rool-back the changes if the configurations caused interruption
b) We need to secure the network c)it is the only possible way to configure the network d)None of the
above
9. What is the first protocol that describes AAA architecture
a) SSL b)DNS c)RADIUS d)TCP
10. Telnet protocol operates on port _____
a) 80 b)23 c)22 d)53

Question 2: [20 Marks]

You are responsible for designing the autodiscovery module of an NMS. Outline the procedure and the
software tools that you would use

Solution
There are many alternative approaches to this problem, one of which is given here.
1. Execute broadcast ping or hosts to discover the hosts in the local subnet.
2. Execute arp to discover the router.

Page 1 of 2
3. Execute route to discover the addresses in the routing table.
4. Identify the new hosts and routers and keep increasing the scope one additional hop at a time.

Question 3: [20 Marks]

List and contrast the tools available to discover network components.

Solution

The techniques used to do discover network components include:


- arp/rarp: By looking up the ARP table in your host or router
Gives the IP address to MAC address for hosts in the subnet
- netstat or route: Looking up routing table that contain all hosts since last update
- ping a.b.c.255:By broadcast pinging. If configured, gives all the hosts in the subnet on host from which ping is
executed
- tcpdump: by looking at the local traffic in promiscuous mode using protocol analyzers or tcpdump

Question 4: [20 Marks]

Show the PPP authentication process of host A to B using: a)PAP b)CHAP

Solution

Page 2 of 2

You might also like