Computer Networks Multiple Choice Questions on “SNMP”.
1. The application-level protocol in which a few manager stations control a set of agents is called ______
a) HTML
b) TCP
c) SNMP
d) SNMP/IP
Answer: c
Clarification: SNMP stands for Simple Network Management Protocol. It is an application-level protocol in which a few manager stations control a set of agents. It is used under the TCP/IP protocol suite and is used for managing devices on the internet.
2. Full duplex mode increases the capacity of each domain by ________
a) 10 to 20 mbps
b) 20 to 30 mbps
c) 30 to 40 mbps
d) 40 to 50 mbps
Answer: a
Clarification: In full duplex mode, both endpoints share a single channel bandwidth to achieve two-way transmission. This results in complete utilization of the band capacity increasing the capacity by 10 to 20 mbps than half-duplex mode.
3. Configuration management can be divided into which two subsystems?
a) Reconfiguration and documentation
b) Management and configuration
c) Documentation and dialing up
d) Configuration and dialing up
Answer: a
Clarification: The best current practices report is created by a management group to ensure the most effective configuration management. The group also makes a MIB (Management Information Base) module to help with the configuration management.
4. To use a Simple Network Management System, we need _______
a) Servers
b) IP
c) Protocols
d) Rules
Answer: d
Clarification: Rules are a collection of expression containing parameters to observe the attributes of the user’s device, and then execute some actions. It specifies the parameters for the managed objects inside the application and performs operations that would support the expression. The input of a rule may be many expressions or even a single expression that end in an output of single object invoking some action.
5. The main difference between SNMPv3 and SNMPv2 is _______
a) Management
b) Integration
c) Classification
d) Enhanced security
Answer: d
Clarification: SNMPv3 has introduced new cryptographic security, through which confidentiality is provided by encrypting packets and blocking intruders. It also ensures that the message is coming from a reliable source.
6. In Network Management System, the division that is responsible for controlling access to network based on a predefined policy is called _________
a) Fault Management
b) Secured Management
c) Active Management
d) Security Management
Answer: d
Clarification: Security management is also responsible to provide confidentiality, authentication and encryption in addition to controlling access to network. Without security management, the network and its traffic would be vulnerable to be exploited by attackers.
7. BER stands for ________
a) Basic Encoding Rules
b) Basic Encoding Resolver
c) Basic Encoding Rotator
d) Basic Encoding Router
Answer: a
Clarification: The Basic Encoding Rules are a set of rules that specify the guidelines to encode the SNMP messages in binary form. Each SNMP message is encoded into 3 parts namely data, length and type of message.
8. Control of the users’ access to network resources through charges is the main responsibility of ________
a) Reactive Fault Management
b) Reconfigured Fault Management
c) Accounting Management
d) Security Management
Answer: c
Clarification: The accounting management keeps track of the users and their access rights to the network and controls the user’s access by communicating with the security management. The accounting management takes support of the Management Information Block to perform its operations.
9. SNMP is the framework for managing devices in an internet using the ______
a) TCP/IP protocol
b) UDP
c) SMTP
d) None
Answer: a
Clarification: SNMP is a management protocol in which a few manager stations control a set of agents using the TCP/IP protocol suite. SNMP stands for Simple Network Management Protocol.
10. Structure of Management Information (SMI), is the guideline of ________
a) HTTP
b) SNMP
c) URL
d) MIB
Answer: b
Clarification: SMI was developed by the Storage Networking Industry Association (SNIA) and it defines a standard that can be manipulated by SNMP. Basically, it defines the standard format and hierarchy of management data which is used by the SNMP. It does not describe how the objects are to be managed.