Review Questions


1.

Industry standards are developed to

  1. Enable interoperability between different vendors’ equipment.

  2. Solve common problems.

  3. Allow vendors to develop products that support other vendors’ equipment.

  4. All of the above.

dindustry standards are usually defined by a series of rfcs.

2.

SNMP was designed to

  1. Allow different vendors’ routers and switches to communicate with each other using TCP/IP.

  2. Provide a means to monitor user activity.

  3. Allow a standard interface to access propriety network management protocols.

  4. Provide a standard means to manage networking devices.

dsnmp is a popular choice for a network management protocol.

3.

Which networking management entity can send an SNMP GetRequest?

  1. Agent

  2. Manager

  3. Client

  4. None of the above

bthe snmp manager is responsible for the snmp getrequest and getnextrequest messages.

4.

An SNMP Trap message is sent to inform

  1. The manager that a change of state has occurred on the device.

  2. The manager to start capturing network traffic.

  3. The agent that a change of state has occurred on the device.

  4. That an RMON event has occurred.

  5. Both A and D.

esnmp relies on snmp trap messages sent by snmp agents for changes. rmon defines events that can generate snmp trap messages.

5.

SNMP PDUs are carried in which of the following protocols?

  1. TCP

  2. UDP

  3. SMTP

  4. RDP

bsnmp pdus are carried in udp segments.

6.

RMON was developed to

  1. Allow network analyzers to interoperate.

  2. Provide a more detailed view than SNMP of a device’s internal status.

  3. Obtain detailed information about a network segment’s traffic.

  4. Provide a means to control remote NMS stations.

crmon polls probe for information about network segments.

7.

Which of the following ISO network management model areas is concerned with the detection, isolation, and correction of any and all non-normal network conditions?

  1. Fault management

  2. Configuration management

  3. Accounting management

  4. Performance management

  5. Security management

afault management is concerned with the detection, isolation, and correction of non-normal network conditions.

8.

Which of the following ISO network management model areas is concerned with baselining and trending?

  1. Fault management

  2. Configuration management

  3. Accounting management

  4. Performance management

  5. Security management

dperformance management is concerned with baselining and trending.

9.

Which of the following ISO network management model areas is concerned with the allocation of costs for network utilization?

  1. Fault management

  2. Configuration management

  3. Accounting management

  4. Performance management

  5. Security management

caccounting management is concerned with the allocation of costs for utilization.

10.

Which of the following ISO network management model areas intends to prevent network sabotage, whether intentional or otherwise.

  1. Fault management

  2. Configuration management

  3. Accounting management

  4. Performance management

  5. Security management

esecurity management intends to prevent network sabotage.

11.

Which feature did SNMP3 add that was not previously specified in earlier versions of SNMP?

  1. TCP transport

  2. RMON

  3. Secure transmission

  4. MIB

  5. All of the above

csnmp3 added the ability to secure the transmission between the agent and the nms.

12.

When configuring an SLA, which of the following must be provided?

  1. Thresholds for SLA metrics

  2. Actions or remedies should the SLA be violated

  3. Reports showing compliance with the SLA

  4. All of the above

dany sla should include agreed-upon thresholds, remedies for non-compliance, and reporting mechanisms.

13.

Which SNMP message does the NMS use to get the next record from a managed device?

  1. GetRequest

  2. GetMIBRequest

  3. SetRequest

  4. GetNextRequest

dgetnextrequest is used by snmp to query the managed device for the next available record.

14.

In SNMPv2, which message allows you to get multiple records from a MIB?

  1. Trap

  2. GetRequest

  3. GetBulkRequest

  4. SetRequest

cgetbulkrequest is used with snmpv2 to query the managed device for the next available set of records.

15.

Which of the following may be considered as SLA metrics?

  1. Network availability

  2. Network jitter

  3. Network delay

  4. Packet loss

  5. All of the above

ethese are all common metrics when implementing slas.

16.

If your network includes two routers, 20 PCs, three Unix workstations, a single server, and a dedicated NMS, which devices can support SNMP agents?

  1. All devices (except the NMS)

  2. All devices (including the NMS)

  3. Only network devices such as the router

  4. Only end nodes such as workstations and hosts

bthe nms cannot also act as an snmp agent.

17.

When are SNMP Trap messages sent from the agents to the NMS?

  1. When the NMS requests them using a GetRequest

  2. When the agents have items to report to the NMS

  3. Every five minutes

  4. Never

btrap messages are the only type of unsolicited communication from agents to the nms; they take place whenever the agent has items to report.

18.

Which of the following SNMP messages are sent from the agent to the management station? (Choose all that apply.)

  1. Trap

  2. GetRequest

  3. GetResponse

  4. GetNextRequest

  5. SetRequest

a, cthe trap message is triggered at the agent to notify the management station of a change. the getresponse message is triggered by a getrequest.

19.

Which of the following SNMP messages are sent from the management station to the agent? (Choose all that apply.)

  1. Trap

  2. GetRequest

  3. GetResponse

  4. GetNextRequest

  5. SetRequest

b, d, ethe getrequest and getnextrequest allow queries to be sent to the agent and the setrequest allows for configuration of the agent or network device.

20.

What of the following are the features of SNMPv3? (Choose all that apply.)

  1. Community authentication

  2. Message integrity

  3. Message authentication

  4. Groups

b, csnmpv3 uses message integrity and authentication to detect tampering and verification of the source.

Answers

1.

D Industry standards are usually defined by a series of RFCs.

2.

D SNMP is a popular choice for a network management protocol.

3.

B The SNMP manager is responsible for the SNMP GetRequest and GetNextRequest messages.

4.

E SNMP relies on SNMP Trap messages sent by SNMP agents for changes. RMON defines events that can generate SNMP Trap messages.

5.

B SNMP PDUs are carried in UDP segments.

6.

C RMON polls probe for information about network segments.

7.

A Fault management is concerned with the detection, isolation, and correction of non-normal network conditions.

8.

D Performance management is concerned with baselining and trending.

9.

C Accounting management is concerned with the allocation of costs for utilization.

10.

E Security management intends to prevent network sabotage.

11.

C SNMP3 added the ability to secure the transmission between the agent and the NMS.

12.

D Any SLA should include agreed-upon thresholds, remedies for non-compliance, and reporting mechanisms.

13.

D GetNextRequest is used by SNMP to query the managed device for the next available record.

14.

C GetBulkRequest is used with SNMPv2 to query the managed device for the next available set of records.

15.

E These are all common metrics when implementing SLAs.

16.

B The NMS cannot also act as an SNMP agent.

17.

B Trap messages are the only type of unsolicited communication from agents to the NMS; they take place whenever the agent has items to report.

18.

A, C The Trap message is triggered at the agent to notify the management station of a change. The GetResponse message is triggered by a GetRequest.

19.

B, D, E The GetRequest and GetNextRequest allow queries to be sent to the agent and the SetRequest allows for configuration of the agent or network device.

20.

B, C SNMPv3 uses message integrity and authentication to detect tampering and verification of the source.




CCDA. Cisco Certified Design Associate Study Guide
CCDA: Cisco Certified Design Associate Study Guide, 2nd Edition (640-861)
ISBN: 0782142001
EAN: 2147483647
Year: 2002
Pages: 201

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net