MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

December 17, 2016 | Author: EKTHATIGER633590 | Category: N/A
Share Embed Donate


Short Description

MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS...

Description

NETWORK MANAGEMENT SYSTEMS

CHAPTER 1: DATA COMMUNICATION & NETWORK MANAGEMENT OVERVIEW 1>The architecture of the telephone network is hierarchical (true/false)__________ 2>In telephone network model, there are ____levels of network switches and ____types of trunks that connect these switches (3/5/5) 3>__________is a logical link between two switches that may traverse one or more physical links (loop/trunk) 4>In telephone network model, the end office is the __________in the hierarchy (lowest/highest) 5>figure 1.1__________ 6>Match the following Regional center : class 4 switch Sectional center : class 5 switch Primary center : class 1 switch Toll center : class 3 switch End office : class 2 switch 7>In telephone network model, the customer's telephone or PBX which is a switch on the customer premises , is connected to the end office via a dedicated link called___________ (trunk/loop) 8>Toll switches carry long distance calls (true/false)___________ 9>DDD stands for___________ 10>In telephone network model, _______ (DET/DDD)network enables up to dial the far end telephone w/o an operator’s assistance, comprises___ transmission trunks (2/3/4) 11>Match the following direct trunk :connects any two toll offices toll connecting trunk :connects an end office to any toll office toll (internal) trunks :connects two end offices 12>In telephone network model , a circuit connection is set up a: directing using a local trunk b: via the higher level switches and routes Ans :__________ (a/b/either) 13>In telephone network model, primary and secondary routes are already programmed into the___________ (bridge/switch) 14>Operations support systems ensure the quality of service in the telephone network (true/false)___________ 15>The quality of the call, measured in terms of SNR is measured regularly by a trunk maintenance system________ (true/false) 16>NOC stands for__________ 17>For a given region, there is ___________where the global status of the network is monitored (PBX/NOC) 18>___________is the nerve center of telephone network operations (PBX/NOC) 19>The telephone network is managed from the perspective o_________ (service provider/user)20>In telephone network, with the emphasis on the users' point of view, the first objective in operations is_____ and then ______ (quality & economy of service/restoration of service) 21>POTS stands for___________ 22>___________communications technology deals with the theories of electrical engineering, computer engineering, and computer science and their application to all types of communications over networks (telecommunication/data/network) 23>A basic network can be viewed is interconnected ________ (nodes/links/both) 24>___________carrier information from one node to another that is directly connected to it (network/link) 25>A node behaves as a: end node b: intermediate node Ans:___________ (a/b/both) 26>If the node behaves as_____ node, information either originates or terminates there. ______node redirects the information from one link to another (intermediate/end) 27>In telephone network model, End office nodes behaves as___________ (intermediate/end) 28>Each ___________node has connection to a user interface , if the information originates or terminates there (intermediate/end) 29>DTE stands for___________ 30>___________is any equipment that generates or accepts digital data (DDD/DTE)

1

NETWORK MANAGEMENT SYSTEMS 31>Data can be transmitted in a: analog format b: digital format Ans:___________ (a/b/either) 32>The __________data is sent either as base band or on top of a carrier (digital/analog) 33>___________data is generated either directly by the user equipment or as analog data and converted to digital data (digital/analog) 34>ISDN stands for___________ 35>Long distance data transmission today is mostly ___________due to its superior price and performance (digital/analog) 36>The data can be transmitted in following modes a: circuit switches b: message switched c: packet switches Ans:___________ (a/b/c/all) 37>In__________ switched mode , a physical circuit is established between the originating and terminating ends before the data is transmitted (circuit / message/ packet switches) 38>In_____ &______switched modes, the data is broken into packets and each packet is enveloped with the destination and originating addresses (circuit / message/ packet switches) 39>___________switched mode is used to send long messages such as email (circuit / message/ packet switches) 40>___________switched mode is used to transmit small packets used in applications such as interactive communication (circuit / message/ packet switches) 41>In telephone network, _____&_____open each packet to find the destination address and forward the data to the appropriate output links (switch/bridge/router) 42>In _________switched mode, each packet may take a different route (circuit/packet) 43>The main difference between packet and message switching is that in the ___________the data is stored by the system and then retrieved by the user at the later time (former/latter) 44>In___________ switched mode, the packets are fragmented and reassembled in almost real time (message/packet) 45>email is an example of_________ switched mode (message/packet) 46>PSDN stands for___________ 47>Network communications are classified as either _____or______ communication (tele/wireless/data) 48>Telecommunication network is a __________switched network that is structured as a public network accessible by any user (message/circuit) 49>Data communication network is also called computer communication network (true/false)___________ 50>___________transfer the information from digital to analog at source and back to digital at destination 51>In corporate data and telecommunication networks, the computer terminals are connected to___________ which manages the local terminals and provides a single interface to the telephone network (onsite switch PBX/onsite communication controller) 52>In corporate data and telecommunication networks, the telephones are connected locally by ___________ which interfaces to the telephone network (onsite switch PBX/onsite communication controller) 53>Processor to processor communications over the telecommunications lines take _____time and therefore are______ expensive (less/more) 54>SNA stands for___________ 55>In SNA, the host is connected to the terminals via the _____controllers and ______controllers (communications/cluster/both) 56>In SNA, _____ controllers manage the DTEs at the peripheral nodes and the ______controllers manage the traffic at the subnetwork levels (communications/cluster/both) 57>DCE stands for___________ 58>The system of links that connect remote LANs is called___________ (MAN/WAN) 59>A LAN is physically connected to a WAN link by ______or _____at each end (switch/bridge/router) 60>Important aspects of DCEs are a: the different platforms and applications running on DCEs have the ability to communication with each other b: the ability of the processors attached to LANs do multiple functions Ans: ___________ (a/b/both) 61>The processor that requests a service is called the _____, and the processor that provides the service is called the______ (server/client)

2

NETWORK MANAGEMENT SYSTEMS 62>The process that initiates a transaction to run an application in either a local or remote processor is called the _____.The application process that is invoked by a _____ is called the______ (server/client) 63>In client/server architecture, the ____initiates the request and the _______responds (server/client) 64>Client cannot initiate a process in the server (true/false)___________ 65>A real world analogy of the client/server operation is a post office (true/false)___________ 66>The communication between operative computing processes is called ___________communication (end to end/peer to peer) 67>___________is a suite of protocols that enable networks to be interconnected (UDP/IP or TCP/IP) 68>IP is a _____ protocol. TCP is a ______protocol. UDP is a ______protocol (connection oriented/connectionless) 69>Most of Internet traffic really uses___________ because of the reliability of data transmission (UDP/IP or TCP/IP) 70>The Internet is a network of networks (true/false)___________ 71>___________serve as the interface between dissimilar and independent , autonomous , networks and perform many functions including protocol conversions (routers/gateways) 72>Autonomous networks have little knowledge each other's attributes , configurations and addresses and yet communication is automatically facilitated by a hierarchy of Internet servers along the path (true/false)___________ 73>Email messages are transmitted by a___________ scheme all along the path (stop & wait/ store & forward) 74>Internet users are currently doubling n population each year (true/false)___________ 75>In layered architecture, the workstations belong to the___________ plane (LAN/user) 76>in layered architecture, the interfaces are defined as the fabrics (true/false)___________ 77>In Internet fabric model, the LAN and WAN planes interface through _____fabric. The WANs in the WAN plane interface via the______ fabric (gateway/switching) 78>In Internet fabric model, the user's workstation interfaces to a LAN via a ___________interface (gateway/switching/MAC) 79>In Internet fabric model, LANs interface to a WAN by a switching fabric of ___________ (bridges/routers/switches/all) 80>____________fabric interconnects different WANs (gateway/switching) 81>_____is a private network and access to it is controlled by the enterprise that owns it, whereas______is public (internet/intranet) 82>In communication lingo, commonality can be interpreted as _____and procedures as______ (protocols/standards) 83>___________can be defined as the basic structure of a system that shows its functional components and the relationships among the 84>___________architecture describes the functional components of a communication network as well as the operational interfaces among them (network/communication) 85>The operational procedures are specified in terms of ___________ (standards/protocols) 86>Standardization of___________ involves agreement in the physical characteristics and operational procedures of communication equipment that performs similar functions (policy/protocol) 87>Email exchange across the world is possible because most vendors have adopted the standard ___________in their software (MIME/SMTP) 88>Each system can be divided into ______broad sets of communication layers (2/3/4) 89>in communication architecture , top set of layers consists of the _____layers and the bottom set of the______ layers (transport/application) 90>The data can be transmitted in one of____ modes (2/3/4) 91>The ISO has developed a highly modular or layered , architecture for communication protocols that is called the OSI reference model , published as OSI RM--ISO______ (7948/749) 92>OSI reference model was developed based on the premise that a: the different layers of protocol provide different services b: each layer can communicate with only its own neighboring level Ans:___________ (a/b/both) 93>In OSI reference model, two systems can communicate on a ___________level (end to end/peer to peer) 94>In OSI reference model, layers __ __are the transport system protocol layers; and layers ______are application support protocol layers (1/2/3/4/5/6/7) 95>In OSI reference model, the intermediate system is involved only up to the first ________layers in the process (3/4)

3

NETWORK MANAGEMENT SYSTEMS 96>Match the following Physical :provides application specific protocols for each application and each transport protocol system Data link :establishes and clears sessions for applications, and thus minimizes loss of data during large data exchange Network :forms the switching/routing layer of the network Transport :multiplexes and de-multiplexes messages from applications Session :transfers to and gathers from the physical medium raw bi data Presentation :Consists of two sublayers LLC and MAC Application :provides a set of standard protocols so that the display would be transparent to syntax of the application 97>_____formats the data to go on the medium; performs error control and flow control.______ controls data transfer to and from LAN; resolves conflicts with other data on LAN (MAC/LLC) 98>Identify feature of transport layer in OSI reference model a: multiplexes and demultiplexes messages from applications b: acts as a transparent layer to applications and thus isolates them from the transport system layers c: makes and breaks connections for connection-oriented communication d: controls flow of data in both directions Ans:___________ (a/b/c/d/all) 99>Identify features of physical layer in OSI reference model a: provides a set of standard protocols so that the display would be transparent to syntax of the application b: transfers to and gathers from the physical medium bit data c: data encryption and decryption d: handles physical and electrical interfaces to the transmission medium Ans:___________ (a/b/c/d/all) 100>Identify features of presentation layer in OSI reference model a: provides a set of standard protocols so that the display would be transparent to syntax of the application b: transfers to and gathers from the physical medium bit data c: data encryption and decryption d: handles physical and electrical interfaces to the transmission medium Ans:___________ (a/b/c/d/all) 101>In OSI reference model , the message in each layer is contained in message units called__________ 102>PDU consist of _____parts (2/3) 103>PDU consists of ____&______ (PCI/VCI/UD) 104>In PDU , ____contains header information about the layer while ______contains the data that he layer , acting as a service provider , receives from or transmits to the upper layer/service user layer (PCI/UD) 105>In OSI reference model, the size of the PDU increases as it goes toward _______layers (higher/lower) 106>__________layer is responsible for physically placing the electrical signal on the physical medium and picking up the signal from it (presentation/physical) 107>__________layer controls and manages the physical and electrical interfaces to the physical medium including the connector or transceiver (presentation/physical) 108>There are various protocol standards for physical layer interface, _____classes of standards have been established by the ITU-T and EIA (2/3) 109>ITU-T stands for__________ 110>EIA stands for__________ 111>The data communication between two DTEs is controlled and managed by __________layer (network/data link) 112>In data link layer, the data communication is serial __________oriented stream (bit/byte) 113>functions of data link layer are a: establish and clear the link b: transmit the data c: error control and data compression d: flow control Ans:__________ (a/b/c/d/all) 114>Flow control on the data link layer is done on a hop to hop basis (true/false)__________ 115>In data link layer, the lower __________layer controls the access and transmittal of data to the physical layer in an algorithm manner (LLC/MAC) 116>There are _____basic forms of LANs (2/3) 117>Ethernet LAN:____ type: :FDDI:____ type (ring/bus)

4

NETWORK MANAGEMENT SYSTEMS 118>features of network layer are a: controls and manages the switching fabric of the network b: provides both connectionless network service and connection oriented network service Ans:________ (a/b/both) 119>CLNS stands for___________ 120>CONS stands for__________ 121>__________is used when the lower layers are highly reliable such as LANS and bridges as well as when the messages are short (CONS/CLNS) 122>__________is the method for transmitting long messages such as file transfer (CONS/CLNS) 123>__________is used when the transmission medium is not reliable (CONS/CLNS) 124>___________at the nodes of a network performs the function of routing and switching the data (switch/router) 125>The OSI architecture model divides the network layer into ________sublayers (2/3/4) 126>Sublayers of network layer are a: SNICP b: SNDCP c SNDAP Ans:_________ (a/b/c/all) 127>SNICP stands for___________ 128>SNDCP stands for__________ 129>SNDAP stands for___________ 130>In network layer , the top sublayer is _________that interfaces to the transport layer (SNICP/SNDCP/SNDAP) 131>The Internet communicates between nodes using an Internet address and _____.The nodes in turn communicate with subnetworks using_____ which depends on the subnetwork protocol (SNICP/SNDCP/SNDAP) 132>The SNDCP communicates with is data link layer via the third network sublayer___________ (SNICP/SNDAP) 133>In OSI terminology, TCP/IP is called __________ (ISO-IP/ISO-CLNP/either) 134>A connection ____OSI protocol is X.25 PLP, a packet layer protocol (less/oriented) 135>Identify feature of transport layer a: multiplexes the user data provided by the application layers and passes the packets to the network layer b: service is independent of the network on which the packets are transmitted c: can be connectionless or connection oriented and is implemented in both Internet and OSI protocols d: flow control is implemented and functions as a data rate manager between the application programs and the network layer Ans:__________ (a/b/c/d/all) 136>Layers ___through ___application layer protocols (4/5/6/7) 137>__________layer establish the communication at the beginning of the session, monitor , synchronize and error correct the information exchanged during the session and then release the logical link at the end of the session (presentation/session) 138>__________layer is the medium of presentation of message's context to the user or application program (physical/presentation) 139>__________layer is a context sensitive layer (physical/presentation) 140>wrt presentation layer , a common syntax that is used for semantics is__________ (BER/ASN.1) 141>ASN.1 stands for__________ 142>Data encryption and data compression are also generally done in __________layer (physical/presentation) 143>The _____&_____layers form the suite of TCP/IP protocols (transport/data link/network) 144>wrt SNA , arrange the following in correct sequence (top to bottom) a: physical b: path control c: transmission control d: data link e: data flow control f: presentation services g: end user application Ans:__________ (gfecabd/gfecbda/gfeabdc) 145>In SNA, the combination of _____&_____services are called the SNA transmission subsystem (transmission control/presentation/data flow ) 146>In SNA , _________services are also known as SNA high level services (data flow/transmission control/presentation ) 147>All application specific protocol services in OSI are sandwiched between the_____ and_____ layers (user/transport/presentation) 148>In the Internet model, all application specific protocol services are sandwiched between the____&_____ layers (session/user/transport)

5

NETWORK MANAGEMENT SYSTEMS 149>A user interfaces with a host at a remote terminal using ____in the OSI model and ______in the Internet model (Telnet/VT) 150>File transfers are accomplished using _____in the OSI model and _____in the Internet (FTP/FTAM) 151>FTAM stands for___________ 152>The most common mail service function in the Internet is______. A similar protocol in the OSI model is_____ (MOTIS/SMTP) 153>MOTIS stands for_________ 154>Network management is accomplished using ____in the OSI model and _______in the Internet (CMIP/SNMP) 155>CMIP stands for___________ 156>OAM&P stands for___________ 157>NMS stands for__________ 158>The most common and serious problems of networks are connectivity failures, which are in the category of__________ management (security/fault) 159>__________is generally interpreted to mean failures in accessing networks and systems by the users (risk/fault) 160>Power hits could reset network component configuration, causing network failures (true/false)________ 161>CIO stands for_________ 162>The corporate network needs to be secured for privacy and content using __________ (firewalls/encryption/both) 163>____network was monopolistic and had expensive redundancy. ______network is adhoc, decentralized, has loosely specified interfaces, and has dynamic routing (data/telephone) 164>The latest user satisfaction for an ISP is _____% (8/16/32) 165>Which elements of managing your network require most of your time? a: configuring the management system itself b: expanding the network c: gathering and analyzing statistics for presentation to upper management Ans:__________ (a/b/c/all) 166>Sniffer is an example of troubleshooting tools (true/false) __________ 167>What does a network failure cost the user a: there are tangible and intangible losses b: the cost is a function of the dependence of the business upon shared data c: A&R labs need high technology and tolerate low reliability. Business accept lower and proven technology but require high reliability Ans:__________ (a/b/c/all) 168>__________management can be defined as OAM&P of network and services (configuration/network) 169>Match the following Operations group :involves network planning and circuit provisioning network administration :handles functions that include both installation con repairs of facilities and equipment installation & maintenance group: concerned with daily operations in providing network services Provisioning :concerned with establishing and administering the overall goals , policies and procedures of network managements 170>The goal of network management is to ensure that the users of a network receive the information technology services with the quality of service that they expect (true/false)__________ 171>Network management comprises of _______major groups (2/3/4) 172>Network management comprises of following groups a: network provisioning b: network operations c: network installation and maintenance Ans:__________ (a/b/c/all) 173>_______is the primary responsibility of the engineering groups and ____is the primary responsibility of the plant facilities group (network provisioning/network operations/network I&M) 174>The normal daily operations are the function of the __________groups, which controls and administers a network operation center (network provisioning/network operations/network I&M) 175>NOC stands for__________ 176>__________is the nerve center of network management operations (NMS/NOC) 177>The functions of the NOC are concerned primarily with _____;its secondary responsibilities are_____&_____ (network provisioning/network operations/network I&M) 178>__________consists of network planning and design and is the responsibility of the engineering group (network provisioning/network operations/network I&M)

6

NETWORK MANAGEMENT SYSTEMS 179>ISO has defined __OSI network management applications (4/5/6) 180>__________are concerned with daily operations of the network and providing network services (network provisioning/network operations/network I&M) 181>ISO has defined following OSI network management applications a: fault management b: configuration management c: performance management d: security management e: account management Ans:__________ (a/b/c/d/e/all) 182>Whenever there is a service failure, it is responsibility of _______to restore service as soon as possible (NMS/NOC) 183>In several failure situations , the network will detect and restore service automatically .This network feature is called __________ (grooming/self healing) 184>Restoration of service does not include fixing the cause of the problem. That responsibility to fix the problem usually rests with the__________ group (network provisioning/network operations/network I&M) 185>__________administration is the administrative part of fault management and is used to track problems in the network (session ticket/trouble ticket) 186>wrt network management , there are ______configurations of the network (3/4/5) 187>Following are the configurations of the network a: static configuration b: current running configuration c: planned configuration Ans:__________ (a/b/c/all) 188>_____configuration is one that would come up if the network is started from idle status. In_____ configuration of the future , the configuration data will change as the network is changed (planned/current/static) 189>__________management includes physically securing the network as well as controlling access to the network by the users (fault/security) 190>Access privilege to application software is not the responsibility of the NOC unless the application is either owned or maintained by the NOC (true/false)__________ 191>Traffic statistics are helpful in detecting trends and planning future needs (true/false)__________ 192>NOC gathers data and keeps them up to date in order to tune the network for optimum performance (true/false)__________ 193>__________administers costs and allocate the use of the network (NMS/NOC) 194>Since the network consists of components manufactured by multiple vendors, commonality in the definition and relationship of component attribute is needed. This is defined by the __________ (SMI/MIB) 195>__________is the Internet management protocol which is the most popular protocol to acquire the data automatically using protocol and performance analyzing tools (SMTP/SNMP) 196>There______ classes of reports (3/4/5) 197>Following are different classes of reports a: system report b: management report c: user report Ans:__________ (a/b/c/all) 198>Match the following System report :are distributed to the users on a periodic basis to let them know the status of network performance management report :are needed for network operations to track the activities user report :goto the management of the network management group to keep them informed about the activities and performance of the NOC and the networks 199>__________group takes care of all installation and maintenance of equipment and cables (network operation/network I&M) 200>___________group is the service arm of the engineering group for installation and fixing troubles for network operations (network operation/network I&M) 201>__________management is the management of systems and system resources in the network while_________ management is concerned with network resources such as hubs , switches , bridges , routers and gateways, and the connectivity among them via a network (system/data/network) 202>___________management addresses end to end connectivity between any two processors in the network (system/network) 203>A network consists of network components and their inter connections (true/false)_________ 204>A network management system manages all the components that are connected to a network (true/false)__________

7

NETWORK MANAGEMENT SYSTEMS 205>The two major standards are the Internet and the OSI standards (true/false)___________ 206>TMN stands for___________ 207>The popular _____ end systems are housed either on SUN or HP UNIX based workstations. The ______end network management systems run either on Windows 95/98 or Windows NT (low/high) 208>Network connectivity could be tested using the ping command in UNIX (traceroute) and Windows NT (tracert) based system (true/false)___________ 209>The current network management systems are based on the ________protocol (SMTP/SNMP) 210>following are limitations of current network management systems a: they need a dedicated NMS monitoring station, which must be on a specific type of platform b: the values of the managed objects should be defined as scalar values c: SNMP based management is a poling based system Ans:___________ (a/b/c/all) 211>__________ based management protocol CMIP is object oriented (OSI/Internet) 212>Limitations in SNMP based management have been overcome by the emerging web based management (true/false)___________ 213>A web based system is platform independent for the management software using Java languase in the managed components , for the Web based NMS server as well as for Web browser monitors (true/false)___________ 214>Following are web based management schemes a: Java based JMX developed by Sun b: WBEM based on the Common Information Model developed by Microsoft Ans:___________ (a/b/both) 215>JMX stands for___________ 216>WBEM stands for__________ 217>The broadband multimedia service is based on ATM SONET wide area network and several emerging access technologies such as HFC and ADSL (true/false)___________ 218>HFC stands for___________ 219>ADSL stands for___________ 220>___________network, which is the direction of the next generation network, would include embedded network management applications (intelligent/active) 221>following methods can be used to find the root of a problem in network a: artificial intelligence b: algorithmic schemes c: finite state machine Ans:___________ (a/b/c/all) 222>_____establish secure networks , and______ ensures secure communication (cryptography/firewalls) ANSWERS: 1>T 2>5,3 3>trunk 4>lowest 5> 6>1-c 2-e 3-d 4-a 5-b 7>loop 8>T 9>Direct Distance Dialing 10>DDD,3 11>1-c 2-b 3-a 12>either 13>switch 14>T 15>T 16>Network Operation Center 17>NOC 18>NOC 19>user 20>restoration of services, quality and economy 21>Plain Old Telephone Service 22>network 23>both 24>link 25>both

8

NETWORK MANAGEMENT SYSTEMS 26>end, intermediate 27>end 28>end 29>Data Terminating Equipment 30>DTO 31>either 32>analog 33>digital 34>Integrated Services Digital Network 35>digital 36>all 37>circuit 38>message & packet 39>message 40>packet 41>bridges & routers 42>packet 43>latter 44>packet 45>message 46>Public Switched Data Network 47>tele, data 48>circuit 49>T 50>modem 51> onsite communication controller 52> onsite switch PBX 53>less, less 54>Systems Network Architecture 55>both 56>cluster, communication 57>Distributed Computing Environment 58>WAN 59>bridge, router 60>both 61>client, server 62>client, client, server 63>client, server 64>T 65>T 66>peer to peer 67>TCP/IP 68>connectionless, connection oriented, connectionless 69>UDP/IP 70>T 71>gateway 72>T 73>store & forward 74>T 75>user 76>T 77>switching, gateway 78>MAC 79>all 80>gateway 81>intranet, internet 82>standards, protocols 83>architecture 84>communication 85>protocols 86>protocols 87>SMTP

9

NETWORK MANAGEMENT SYSTEMS 88>2 89>application, transport 90>3 91>7498 92>both 93>peer to peer 94>1to4 5to7 95>3 96>1-e 2-f 3-c 4-d 5-b 6-g 7-a 97>LLC, MAC 98>all 99>b,d 100>a,c 101>protocol data unit 102>2 103>PCI, UD 104>PCI, UD 105>lower 106>physical 107>physical 108>2 109>International Telecommunications Union-Telecommunication Sector 110>Electronics Industries Association 111>data link 112>bit 113>all 114>T 115>MAC 116>2 117>bus, ring 118>both 119>Connectionless Network Service 120>Connection Oriented Network Service 121>CLNS 122>CONS 123>CONS 124>router 125>3 126>all 127>SubNetwork Independent Convergence Protocol 128>SubNetwork Dependent Convergence Protocol 129>SubNetwork Dependent Access Protocol 130>SNICP 131>SNICP, SNDCP 132>SNDAP 133>either 134>oriented 135>all 136>5to7 137>session 138>presentation 139>presentation 140>ASN.1 141>Abstract Syntax Notation Number One 142>presentation 143>transport, network 144>gfecbda 145>transmission control, data flow 146>presentation 147>user, presentation 148>user, transport 149>VT, telnet

10

NETWORK MANAGEMENT SYSTEMS 150>FTAM, FTP 151>File Transfer Access & Management 152>SMTP, MOTIS 153>Message Oriented Text Interchange Standard 154>CMIP, SNMP 155>Common Management Information Protocol 156>Operations Administration Maintenance & Provisioning 157>Network Management System 158>fault 159>fault 160>T 161>Chief Information Officer 162>both 163>telephone, data 164>16 165>all 166>T 167>all 168>network 169>1-c 2-d 3-b 4-a 170>T 171>3 172>all 173>network provisioning, network I&M 174>network operation 175>Network Operations Center 176>NOC 177>network operations, network provisioning and network I&M 178>network provisioning 179>5 180>network operation 181>all 182>NOC 183>self healing 184>network I&M 185>trouble ticket 186>3 187>all 188>static, planned 189>security 190>T 191>T 192>T 193>NOC 194>MIB 195>SNMP 196>3 197>all 198>1-b 2-c 3-a 199>networkI&M 200>network I&M 201>system, network 202>network 203>T 204>T 205>T 206>Telecommunication Management System 207>high, low 208>T 209>SNMP 210>all 211>OSI

11

NETWORK MANAGEMENT SYSTEMS 212>T 213>T 214>both 215>Java Management Extensions 216>Web Based Enterprise Management 217>T 218>Hybrid Fiber Coax 219>Asymmetric Digital Subscriber Loop 220>active 221>all 222>firewalls, cryptography

12

NETWORK MANAGEMENT SYSTEMS

CHAPTER 3: BASIC FOUNDATION -- STANDARDS, MODELS AND LANGUAGE 1>__________ model addresses the applications that fall into the categories of fault, configuration, performance, security and accounting (information/functional) 2>Match the following Network management :management of a system's resources such as central processor usage, disk usage and application processes System management :deals with services provided by organizations to customers Service management :management of the network comprising nodes and links 3>_____management is an extension to _____&_____management (network/system/service) 4>The two leading models of network management are the Internet model and the OSI model (true/false)__________ 5>__________model is the most widely used for network management (OSI/Internet) 6>_____model is a simpler scalar model and hence easy to implement. ______model is object oriented , is more complex and harder to implement (OSI/Internet) 7>A higher level management network called TMN is based on the ___________model (OSI/Internet) 8>TMN stands for___________ 9Identify features of OSI/CMIP standard a: International standard (ISO/OSI) b: management of data communications networks- LAN and WAN c: deals with all seven layers d: object oriented and most complete e: consumes large resource in implementation f: well structured and layered Ans:___________ (a/b/c/d/e/f/all) 10>Identify features of SNMP/Internet Standard a: Industry standard (IETF) b: easy to implement c: most widely implemented d: originally intended for management of Internet components, currently adopted for WAN and telecommunication systems Ans:___________ (a/b/c/d/all) 11>Identify features of TMN standard a: International standard (ITU-T) b: Management of telecommunications network c: based on OSI network management framework d: addresses both network and administrative aspects of management Ans:___________ (a/b/c/d/all) 12>Identify features of IEEE standard a: IEEE standards adopted internationally b: addresses management of LANs and MANs c: adopts OSI standards significantly d: deals with first two layers of the OSI reference model Ans:__________ (a/b/c/d/all) 13>Following are web based management standards a: WBEM b: JMX Ans:___________ (a/b/both) 14>CMIP stands for___________ 15>CMIS stands for___________ 16>The OSI management protocol standard is ____, and has built in services, ______, that specify the basic services needed to perform the various functions (CMIS/CMIP) 17>Both LANs and WANs can be managed using___________ (CMIS/CMIP/both) 18>Major drawbacks of the OSI management standard are a: it is complex b: CMIP stack is large Ans:___________ (a/b/both)

13

NETWORK MANAGEMENT SYSTEMS 19>In contrast to _____, ______is truly simple (SNMP/CMIP) 20>___________is responsible for all Internet specifications including network management (IEEE/IETF) 21>___________is designed to manage the telecommunications network and is oriented toward the needs of telecommunications service providers (ITU/TMN) 22>_____is the standard of______ and is based on OSI CMIP/CMIS specifications (ITU/TMN) 23>The IEEE standards for LAN and MAN specifications are concerned only with OSI layers__&___1/2/3) 24>Both OSI/CMIP and Internet/SNMP protocols use _______standards for the lower layers (IETF/IEEE) 25>The IEEE ____.x series of specifications defines the standards for the various physical media and data link protocols (802/803)_______ 26>IEEE 802.__ specifications present overview, architecture and management. IEEE 802.__standard specifies the LLC layer. IEEE 802.__ specifications are defined for Ethernet LANs (1/2/3/4) 27>___________layer provides transparency of the various physical media and protocols to the network layer (MAC/LLC) 28>Web based management is based on using web technology , a web _____for the management system and web ______for network management stations (browsers/server) 29>DMTF stands for_________ 30>___________is developing specifications for WBEM (IETF/DMTF) 31>___________has chosen the Microsoft object oriented management model, Common Information Model (IETF/DMTF) 32>___________is based on a special subset of Java applets developed by Sun Microsystems that runs in the network components (BEM/JMX) 33>TMM uses_______ (SNMP/CMIP ) 34>Both SNMP and CMIP use polling methodology (true/false)___________ 35>OSI network management architecture model comprise of ____models (3/4/5) 36>Following are the models of OSI network management a: organization model b: information model c: communication model d: functional model Ans: ___________ (a/b/c/d/all) 37>In OSI model, _________model describes the components of a network management system, their functions and their infrastructure (functional/organization/information/communication) 38>The organization model is defined in ISO______OSI systems management Overview (10400/10040/10004) 39>___________model defines the terms object, agent and manager (functional/organization/information/communication) 40>___________model deals with the structure and organization of management information (functional/organization/information/communication) 41>ISO=________ specifies the SMI and the information database, MIB (10156/10165) 42>SMI stands for___________ 43>MIB stands for___________ 44>_____describes how the management information is structured and ______deals with the relationship and storage of management information (MIB/SMI) 45>Communication model has ___________components (2/3/4) 46>Components of communication model are a: management application processes that function in the application layer b: layer management between layers c :layer operation within the layers Ans:___________ (a/b/c/all) 47>___________model deals with the user oriented requirements of network management (functional/organization/information/communication) 48>OSI defines ____functional application areas (4/5/6) 49>Only ____model presents the complete model for network management (Internet/OSI)_______ 50>OSI deals wit all 7 networking layers (true/false)___________ 51>The IETF does not define architecture for the SNMP management model explicitly (true/false)___________ 52>TMN is based on the___________ model (OSI/internet) 53>______standard is dedicated to the management of layers 1 and 2 of the OSI reference model (IEEE/IETF)_____ 54>The IEEE standard is primarily concerned with the ___________model (functional/information/organization/communication) 55>In Web based management , ___________model uses Web server - Web browser architecture (functional/information/organization/communication)

14

NETWORK MANAGEMENT SYSTEMS 56>Following object oriented technologies are influencing Web based managementa:hypermedia server b: CORBA oriented transportation c: client/server push technology Ans: ___________ (a/b/c/all) 57>___________model describes the components of network management and their relationships (functional/information/organization/communication) 58>In organization model, network objects can be classified into managed and unmanaged objects (true/false)___________ 59>MDB stands for___________ 60>The managed elements have a management process running in them called___________ (broker/agent) 61>_________ elements do not have a management process running in them (managed/unmanaged) 62>Managed hub is more expensive than the unmanaged hub (true/false)___________ 63>_________manages the managed element (agent/manager) 64>In organization model, there is database in_____ _but not in_____ (agent/manager) 65>In _____tier configuration of organization model, the intermediate layer acts both agent and manager (two/three)______ 66>In three tier configuration of organization model, as______, intermediate layer collects data from the network elements, processes it, and stores the results in its database. As _____, it transmits information to the top level manager (agent/manager) 67>MoM stands for___________ 68>_____refers to a system that runs a management process (NOC/NMS) 69>___________model is concerned with the structure and the storage of information (organization/information/functional/communication) 70>The representation of objects and information relevant to their management form the management___________ model (organization/information/functional/communication) 71>___________model specifies the information base to describe managed objects and their relationships (organization/information/functional/communication) 72>____defines the syntax and semantics of management information stored in_______ (MIB/SMI) 73>___________is used by both agent and management processes to store and exchange management information (MIB/SMI) 74>In information model , _____MIB consists of information on all the network components that it manages , whereas ______MIB needs to know only its local information, its MIB view (agent/manager) 75>______is a real database whereas _____is a virtual database (MIB/MDB) 76>_____contains the measured or administratively configured value of the elements of the network. On the other hand, ______ contains the information necessary for processes to exchange information (MIB/MDB) 77>Following types of information can be stored in the MIB a: network elements-hubs, bridges , routers, transmission facilities b: software processes-programs, algorithms , protocol functions , databases c: administrative information-contact person, account number Ans:___________ (a/b/c/all) 78>___________objects are uniquely defined by a tree structure specified by the OSI model and are used in the Internet model (managed/unmanaged) 79>MIT stands for___________ 80>In____________ model, the managed objects are defined by a containment tree that represent the MIT (OSI/Internet) 81>In OSI MIT, there are ____nodes in the layer beneath the root (2/3/4) 82>Wrt OSI MIT, the following are the nodes in the layer beneath the root a: iso b: ccitt (itu) c: iso-ccitt (iso-itu) Ans:___________ (a/b/c/all) 83>iso stands for___________ 84>itu stands for___________ 85>There are_____ basic attributes of a managed object type from the Internet perspective (4/5/6) 86>Following are the basic attributes of a managed object type from the Internet perspective a: object type (object identifier & descriptor) b: definition c: syntax d: access e: status Ans:___________ (a/b/c/d/e/all)

15

NETWORK MANAGEMENT SYSTEMS 87>Specification for the Internet are defined in RFC documents (true/false)___________ 88>A managed object in the Internet model is defined by _____parameters (4/5/6) 89>A managed object in the Internet model is defined by five parameters and for this RFC=____ (1551/1515/1155) 90>A managed object in the Internet model is defined by following parameters a: object identifier and descriptor b: syntax c: access d: status e: definition Ans:___________ (a/b/c/d/e/all) 91>Match the following object identifier and descriptor : textual description of the semantics of object type Syntax : implementation requirements Access : access privilege to a managed object Status : used to model the object Definition : unique ID and name for the object type 92>_____ object model is a scalar model and is easy to understand. In contrast , ______perspective of a managed object is complex and has a different set of characteristics (OSI/Internet) 93>___________specifications are object oriented and hence a managed object belongs to an object class (OSI/Internet) 94>___________of an object defines the external perspective of the object (entity/attribute) 95>___________of the object is to change its attribute (behavior/operation) 96>An OSI managed object has the following characteristics a: object class b: attributes c: operations d: behaviour e: notifications Ans:___________ (a/b/c/d/e/all) 97>Operation in the Internet model is done by _____&______ commands. Notification s done by ____&_____messages (get/set/response/alarm) 98>In____ , we can create and delete objects, these concepts do not exist in _______ (OSI/Internet) 99>_____characteristics of the Internet model is part of the security function in the OSI functional model (status/access)______ 100>___________characteristics of the Internet model is handled by conformance as part of application services in OSI (status/access) 101>Match the following Object type :counts number of packets Syntax :Mandatory Access :counter Status :read only Description :PktCounter 102>Match the following Object class :generates notifications on new value Attributes :get or set Operations :retrieves or resets values Behavior :packet counter Notifications :Single valued 103>Following are characteristics from Internet perspective a: object type b: syntax c: access d: status e: description Ans:__________ (a/b/c/d/e/all) 104>Characteristics from OSI perspective are a: object class b: attributes c: operations d: behaviour e: notifications Ans:__________ (a/b/c/d/e/all)

16

NETWORK MANAGEMENT SYSTEMS 105>Management data is communicated between agent and manager processes, as well as between manager processes (true/false)__________ 106>__________aspects need to be addressed in the communication of information between two entities (2/3/4) 107>Following aspects need to be addressed in the communication of information between two entities a: transport medium of message exchange b: message format of communication c: actual message Ans:__________ (a/b/c) 108>Match the following transport protocol :actual message application protocol :transport medium exchange commands & responses :message format of communication 109>__________is the unsolicited messages such as alarms, generated by the agent (notification/trap/both) 110>__________model uses CMIP along with CMIS (Internet/OSI) 111>__________model uses SNMP for communication (Internet/OSI) 112>OSI uses _________protocol for transportation (connection oriented/connectionless/both) 113>Internet uses __________UDP/IP protocol to transport messages (connection oriented/connectionless/both) 114>The TP4 transport layer protocol riding on top of the x.25 protocol could be used for__________ transporting and application messages (connection oriented/connectionless/both) 115>______&_____specifies the management communication protocols for OSI and Internet management respectively (SNMP/CMIP) 116>__________is a formal language developed jointly by CCITT and ISO for use with application layers for data transfer between systems (BER/ASN.1) 117>ASN.1 is at the__________ layer (presentation/session) 118>__________is defined as the set of rules used to specify data types and structures for storage of information (transfer syntax/abstract syntax) 119>___________represents the set of rules for communicating information between systems (transfer syntax/abstract syntax) 120>____is applicable to the information model while ______is applicable to the communication model (transfer syntax/abstract syntax) 121>__________can be used with any presentation syntax, depending on the medium of presentation (transfer syntax/abstract syntax) 122>__________in ASN.1 makes it independent of the lower layer protocols (transfer syntax/abstract syntax) 123>ISO____/_____ standards specify ASN.1 (8825/X.209 or 8824/X.208) 124>The algorithm to convert the textual ASN.1 syntax to machine readable code is called__________ (DER/BER) 125>BER stands for___________ 126>BER is defined by ISO_________ (882/X.209 or 8824/X.208) 127>___________is based on the Backus system and uses the formal syntax language and grammar of the BNF (BER/ASN.1) 128>BNF stands for__________ 129> ::= in this expression, denotes _____and the symbol ::= represents______ (defined as/entity/) 130> ::=0|1|2 in this expression, the symbol | represents_____ (and/not/or) 131>::=+|-|*|/ in this expression, the definitions on the right side are called ___________ (production/primitives) 132> :: | | , in this expression, the format of each line is defined as___________ (production/assignment/either) 133>:: TRUE| FALSE, in this expression, entities that are all in capital letters such as TRUE and FALSE are called__________ (identifiers/keywords) 134>The data types are built up from primitive data types such as a: INTEGER b: REAL c: NULL d: GraphicString Ans:__________ (a/b/c/d/all) 135>__________is one of several CharacterString type primitives (StringGraphic /GraphicStshng) 136>Match the following Alternatives : SET & SEQUENCE List : SET OF & SEQUENCE OF Repetition : CHOICE 137>Above constructs are used to build __________data types (primitive/structured)

17

NETWORK MANAGEMENT SYSTEMS 138>__________data types are also called atomic entities (primitive/structured) 139>ASN.1 definition allows both backward and forward references as well as in-line definition (true/false)__________ 140>The constructs _____&_____are list builders (SET/SET OF/SEQUENCE/SEQUENCE OF) 141>The order in the list will be maintained if the list is built with the__________ construction (SET/SEQUENCE) 142>If the construct has been _____instead of_____, order in the list would be irrelevant (SEQUENCE OF/SET OF) 143>{ product-based [0] NULL, basic [1] NULL } these assignments have integers in square brackets and these are called________ (module/tags) 144>The definition of_________ is introduced in ASN.1 to uniquely identify a data type (module/tag) 145>We can group assignments that are related, this group is called__________ (subroutine/module) 146>identify correct formal definition of a module a: DEFINITIONS ::= BEGIN :: END b: BEGIN ::=DEFINITIONS :: END c: BEGIN ::=DEFINITIONS :: END Ans:__________ (a/b/c) 147>Match the following ::= range | start & end of a subtype start & end of a list -start & end of a tag {} signed number [] following the symbol are comments () defined as or assignment '' or, alternatives , options of a list signed number 148> DEFINITIONS ::= BEGIN :: END The terms DEFINITIONS, BEGIN and END are primitives and are called __________in ASN.1 (identifier/keyword) 149>Grouping assignments into modules has following advantages a: modules can be imported into and exported from other modules b: modules are reusable Ans:__________ (a/b/both) 150>Match the following BEGIN : any negative or non-negative number CHOICE :a sequence of non-negative numbers DEFINITIONS :end of an ASN.1 module END :list of alternatives EXPORTS :start of an ASN.1 module IDENTIFIER :definition of a data type or managed object IMPORTS :data types that can be exported to other modules INTEGER :data types defined in external modules 151>Match the following NULL :used with OCTET for denoting string of octets OBJECT :unordered list makes OCTET :ordered list maker OF :unbounded 8 bit bytes (octts) of binary data SEQUENCE :a placeholder SEQUENCE OF :used with IDENTIFIER to uniquely identify an object SET :used with SET and SEQUENCE SET OF :ordered array of repetitive data STRING :unordered list of repetitive data

18

NETWORK MANAGEMENT SYSTEMS 152>Match the following Object name :INTEGER, BEGIN Application data type :RMON-MIB Module :Counter, IpAddress Macro, MIB module :PersonalRecord Keywords :sysDescr, etherStatsPkts 153>Simple data type is also called_________ (primitive/atomic/basic/all) 154>___________uniquely identifies the data type irrespective of the syntax version (atomic/tag) 155>Data types are defined based on___________ (structure/tag/both) 156>wrt Object and Data types, the structure is divided into _______categories (3/4/5) 157>wrt Object and Data types , the tag is divided into___ categories (2/3/4) 158>The tag is divided into following a: class b: tag number Ans:__________ (a/b/both) 159>Following are different categories of data type structure a: simple type b: structured type c: tagged type d: other type Ans:_________ (a/b/c/d/all) 160>________type is one for which the values are specified directly (structured/tagged/simple) 161>INTEGER is a________ type (structured/tagged/simple) 162>A data type is a __________type when it contains other types (structured/tagged/simple) 163>Types that are within a structured type are called _________types (component/tagged) 164>SET is distinguished from SEQUENCE in following respects a: data types should all be distinct b: order of values in SET is of no consequence Ans:__________ (a/b/both) 165>Order of values is critical in _______ (SET/SEQUENCE) 166>The component data types in the __________construct need not be distinct because the order is preserved (SET/SEQUENCE) 167>__________type is a type derived from another type (structured/tagged) 168>__________type is a data type that is not predefined (structured/tagged/other) 169>___________type is chosen from CHOICE and ANY types, which are contained in other types (structured/tagged/other) 170>Type__________ defines the selection of one value from specified list of distinct types (ANY/CHOICE) 171>Every data type except __________has a tag associated with it (CHOICE/ANY/both) 172>A tag has following components a: class b: tag number Ans:__________ (a/b/both) 173>There are _____classes of tag (3/4/5) 174>Following are different classes of tag a: universal b: application c: context specific d: private Ans:__________ (a/b/c/d/all) 175>__________class is the most common (application/context specific/universal/private) 176>Data types in the __________class are application independent (application/context specific/universal/private) 177>__________class is similar to the use of a global variable in a software program and is applicable anywhere in a program (application/context specific/universal/private) 178>BOOLEAN & INTEGER are examples of __________class , whose tag numbers are [1] and [2] respectively (application/context specific/universal/private)

19

NETWORK MANAGEMENT SYSTEMS 179>Match the following Universal 1 :REAL Universal 2 :Object description Universal 3 :NULL Universal 4 :BIT STRING Universal 5 :BOOLEAN Universal 6 :EXTERNAL Universal 7 :OBJECT IDENTIFIER Universal 8 :OCTET STRING Universal 9 :INTEGER 180>Match the following Universal 10 :TeletexString Universal 11 :NumericString Universal 12-15 :SEQUENCE & SEQUENCE OF Universal 16 :ENCRYPTED Universal 17 :ENUMERATED Universal 18 :Reserved for future use Universal 19 :SET & SET OF Universal 20 :PrintableString 181>Match the following Universal 21 :reserved for future use Universal 22 :GeneralString Universal 23 :GraphicString Universal 24 :UTCTime Universal 25 :VideotexString Universal 26 :IASString Universal 27 :GeneralizedTime Universal 28 :VisibleString Universal 29 :CharacterString 182>Tags in the __________class are specific to applications (universal/context specific/application/private) 183>_____class tag number can be overridden with _____tag number (universal/context specific/application) 184>Types in two different applications can have the same __________specific tag but each tag could carry a different meaning in each application (context specific/application) 185>____type is a subset of_____ , is limited to that application (universal/context specific/application/private) 186>__________type is used extensively by vendors of network products (universal/context specific/application/private) 187>In _____, there is an identifier for each occurrence of an object. In_____, it is the OBJECT IDENTIFIER (ASN.1/MIB) 188>The ASN.1 syntax that contains the management information is encoded using the __________defined for the transfer syntax (DER/BER) 189>TLV stands for__________ 190>In TLV , the type has_____ subcomponents (3/4) 191>In TLV, the type has following subcomponents a: class b: P/C c: tag number Ans:__________ (a/b/c/all) 192>__________specifies whether the structure is a primitive or simple, type or a construct , which is anything other than a simple type (class or P/C or tag number) 193>__________is encoded as a one byte or an octet field (class or P/C or tag number) 194>Match the following Universal :1 1 Application :0 1 Context specific :0 0 Private :1 0 195>In TLV, the value of P/C is___ for primitive and ___for construct and is designated as the 6th bit (0/1) 196>In TLV, the lowest ___bits designates tag value in binary (4/5/6) 197>In TLV, class :____bits:: ___P/C: ___bits ::Tag number :___bits (1/2/3/4/5/6/7/8)

20

NETWORK MANAGEMENT SYSTEMS 198__________is defined as a series of octets (type/length/value) 199>In TLV, the length specifies the length of the value field in number of__________ (bits/octets) 200>In TLV, the integer value is encoded using ______complement form (ones/twos) 201>Wrt TLV , for positive value , the actual value is the binary representation, with the MSB always being___ to indicate the positive sign (0/1) 202>wrt TLV, -5 becomes ___________in twos complement form (11110111/111111101/11111011) 203>Wrt Macros , ____defines the syntax of the new types and _____defines the syntax of the new values (TYPE NOTATION/VALUE NOTATION) 204>________model component of the OSI model addresses the user oriented applications (communication/functional) 205>Functional model consists of ______submodels (4/5/6) 206>Functional model has following submodels a: configuration management b: fault management c: performance management d: security management e: accounting management Ans:___________ (a/b/c/d/e/all) 207>___________management addresses the setting and changing of configurations of networks and their components (performance/accounting/configuration) 208>Relevant management information is embedded in managed objects such as switches, hubs, bridges and routers .___________management involves setting up these parameters (performance/accounting/configuration) 209>___________displays in real time the configuration of the network and its status (NOC/NMS) 210>___________management involves detection and isolation of the problem causing the failure in the network (performance/accounting/configuration/fault) 211>In several failure situations, the network could restore service automatically. This network feature is called ___________ (grooming/self healing) 212>___________ticket administration of fault management tracks all problems in the network including nonproblems, until they are resolved (service/trouble) 213>___________management is concerned with the performance behavior of the network (performance/accounting/configuration) 214>___________management involves physically securing the network, access to the network resources and secured communication over the network (performance/accounting/configuration/security) 215>___________protect corporate networks and network resources from being accessed by unauthorized personnel and programs, including virus programs (cryptography/firewalls) 216>__________management administers costs of the network (performance/accounting/configuration) 217>___________management is directed toward service providers, in order for them to provide customer satisfaction and to ensure the profitability of business (performance/accounting/configuration/service &business) 218>Traffic data gathered by_____ management serves as input to _____management (performance/accounting/configuration) 219>The traffic statistics, trouble ticket administration data and accounting management results are inputs to ___________management (performance/configuration/service & business) 220>Following are network management models a: OSI b: Internet c: TMN d: IEEE 801 e: Web technology Ans:___________ (a/b/c/d/e/all) 221>The OSI management model categorizes the____ functions of network management into____ models (3/4/5) 222>The OSI has following network management models a: organization b: information c: communication d: application Ans:__________ (a/b/c/d/all) 223>The organization model describes the management process in the network element called the ___________process, and the management process in the ___________ (manger/agent) 224>___________model addresses the structure of management information that enables processes running in different components in the network to exchange management data (organization/information/communication) 225>The two primary communication protocols are_____ in OSI and ______in the Internet (SNMP/CMIP) 226>The application functions are divided into___ categories of management (3/4/5)

21

NETWORK MANAGEMENT SYSTEMS 227>The application functions are divided into following categories of management a: configuration b: fault c: performance d: security e: accounting Ans:___________ (a/b/c/d/e/all)

ANSWERS 1>functional 2>1-c 2-a 3-b 3>service, system, network 4>T 5>Internet 6>Internet, OSI 7>OSI 8>Telecommunication Management Network 9>all 10>all 11>all 12>all 13>both 14>Common Management Information Protocol 15>Common Management Information Service 16>CMIP, CMIS 17>both 18>both 19>CMIP, SNMP 20>IETF (Internet Engineering Task Force) 21>TMN 22>TMN, ITU 23>1,2 24>IEEE 25>802 26>1,2,3 27>LLC 28>browser 29>Desktop Management Task Force 30>DMTF 31>DMTF 32>JMX 33>CMIP 34>T 35>4 36>all 37>organization 38>10040 39>organization 40>information 41>10165 42>Structure of Management Information 43>Management Information Base 44>SMI,MIB 45>3 46>all 47>functional 48>5 49>OSI 50>T 51>T 52>OSI 53>IEEE

22

NETWORK MANAGEMENT SYSTEMS 54>communication 55>organization 56>all 57>organization 58>T 59>Management Database 60>agent 61>unmanaged 62>T 63>manager 64>manager, agent 65>3 66>manager, agent 67>Manager of Managers 68>NMS 69>information 70>information 71>information 72>SMI, MIB 73>MIB 74>manager, agent 75>MDB,MIB 76>MDB,MIB 77>all 78>managed 79>Management Information Tree 80>OSI 81>3 82>all 83>International Standards Organization 84>International Telecommunications Union 85>5 86>all 87>T 88>5 89>1155 90>all 91>1-e 2-d 3-c 4-b 5-a 92>Internet, OSI 93>OSI 94>attribute 95>behavior 96>all 97>get&set, response&alarm 98>OSI, Internet 99>access 100>status 101>1-e 2-c 3-d 4-b 5-a 102>1-d 2-e 3-b 4-c 5-a 103>all 104>all 105>T 106>3 107>all 108>1-b 2-c 3-a 109>both 110>OSI 111>Internet 112>both 113>connectionless 114>connection oriented 115>CMIP,SNMP

23

NETWORK MANAGEMENT SYSTEMS 116>ASN.1 117>presentation 118>abstract syntax 119>transfer syntax 120>abstract syntax, transfer syntax 121>abstract syntax 122>abstract syntax 123>8824/X.208 124>BER 125>Basic Encoding Rules 126>8825/X.209 127>ASN.1 128>Backus Nauer Form 129>entity, defined as 130>or 131>primitives 132>either 133>keywords 134>all 135>GraphicString 136>1-c 2-a 3-b 137>structured 138>primitive 139>T 140>SET & SEQUENCE 141>SEQUENCE 142>SET OF,SEQUENCE OF 143>tags 144>tag 145>module 146>a 147>1-g 2-h 3-e 4-f 5-c 6-d 7-b 8-a 148>keywords 149>both 150>1-e 2-d 3-f 4-c 5-g 6-b 7-h 8-a 151>1-e 2-f 3-d 4-g 5-c 6-h 7-b 8-i 9-a 152>1-e 2-c 3-d 4-b 5-a 153>all 154>tag 155>both 156>4 157>2 158>both 159>all 160>simple 161>simple 162>structured 163>component 164>both 165>SEQUENCE 166>SEQUENCE 167>tagged 168>other 169>other 170>CHOICE 171>both 172>both 173>4 174>all 175>universal 176>universal 177>universal

24

NETWORK MANAGEMENT SYSTEMS 178>universal 179>1-e 2-i 3-d 4-h 5-c 6-g 7-b 8-f 9-a 180>1-e 2-d 3-f 4-c 5-g 6-b 7-h 8-a 181>1-e 2-f 3-d 4-g 5-c 6-h 7-b 8-i 9-a 182>application 183>universal, application 184>application 185>context specific, application 186>private 187>MIB,ASN.1 188>BER 189>Type Length Value 190>3 191>all 192>P/C 193>P/C 194>1-c 2-b 3-d 4-a 195>0,1 196>5 197>7-8, 6, 1-5 198>length 199>octets 200>twos 201>0 202>11111011('.' 00000101 11111010+1=11111011) 203>TYPE NOTATION,VALUE NOTATION 204>functional 205>5 206>all 207>configuration 208>configuration 209>NMS 210>fault 211>self healing 212>trouble 213>performance 214>security 215>firewalls 216>accounting 217>service& business 218>performance, accounting 219>service& business 220>all 221>4 222>all 223>agent, manager 224>information 225>CMIP.SNMP 226>5 227>all

25

NETWORK MANAGEMENT SYSTEMS

CHAPTER 4:SNMPv1 NETWORK MANAGEMENT— ORGANIZATION & INFORMATION MODELS 1>__________management is also referred to as Internet management (SMTP/SNMP) 2>SNMP network management systems can manage even non-TCP/IP network elements through proxy agents (true/false)__________ 3>SNMP management is the most widely used __________ (NMS/NOC) 4>__________comprises management process, agent process and network elements (NMS/NOC) 5>The SNMP information model consist of __________ (MIB/SMI/both) 6>___________uses ASN.1 syntax to define managed objects (MIB/SMI) 7>___________defines the relationship between managed objects and groups of related objects into MIB modules (MIB/SMI) 8>MIB2 is a superset of MIB1 and is used in SNMPv__ (1/2) 9>The SNMP architecture, administration and access policies fall under___________ model (organization/communication) 10>ICMP was developed to manage___________ (ARPANET/INTERNET) 11>___________is a mechanism to transfer control messages between nodes (PING/ICMP) 12>PING stands for__________ 13>A popular example of ICMP is___________ (RING/PING) 14>___________i a simple tool used to investigate the heath of a node and the robustness of communication with it from the source node (PING/ICMP) 15>IAB stands for___________ 16>__________was formed to administer Internet activities (ICB/IAB) 17>SGMP stands for___________ 18>___________is used to monitor and configure gateways remotely (SNMP/SGMP) 19>_____is an enhancement of______ (SNMP/SGMP) 20>SNMPv__ was developed to make it independent of the OSI standard (1/2/3) 21>IAB was charged with the responsibility to manage following task forces a: IEEE b: IETF c: IRTF Ans:___________ (a/b/c/all) 22>___________is an organization that maintains several archives of documents related to the Internet and the IETF's activities (IntraNIC/InterNIC) 23>InterNIC stands for___________ 24>STD stands for___________ 25>FYI stands for___________ 26>IANA stands for___________ 27>___________is the central coordinator for the assignment of unique parameter values for Internet protocols (IETF/IANA) 28>___________RFC subseries was created by to document overviews and topics that are introductory (STD/FYI) 29>___________RFC subseries was created to identify those RFCs that do in fact specify Internet standards (STD/FYI) 30>There are ___ series of RFC and STD documents (3/4/5) 31>Following are the series of RFC and STD documents ___________ (SMI/MIB/SNMP/all) 32>RFC=____defines the SNMP protocol. RFC=____is on protocol operations. RFC=___ is on transport mappings (1905/1905/1157) 33>SMI form the contents of RFC=___________ (1155/1156/1157) 34>RFC=____/STD=_____ is currently in use for MIB (1213/1217/13/17) 35>RFC=______is a draft version of MIB2 for SNMPv2 (1155/1907)_____ 36>The infrastructure of the manager agent and the SNMP architecture that it is based form ___________model (information/organization/functional) 37>wrt SNMP, definition of syntax and semantics form the basis of the ___________model (information/organization/functional) 38>The two tier organization model consists of_____ process which resides in the managed object and______ process which resides in the NMS and manages the managed object (network manager/network agent)

26

NETWORK MANAGEMENT SYSTEMS 39>In two tier organization model, multiple managers can interact with one agent (true/false)___________ 40>RMON stands for___________ 41>In three tier organization model, _________is inserted between the managed object and the network manager (RMAN/RMON) 42>The pure SNMP management system consists of ___________ (SNMP agent/SNMP manager/both) 43>HFC stands for___________ 44>An SNMP management system can behave as an agent as well as a manager (true/false)___________ 45>___________model is concerned only with the TCP/IP suite of protocols and does not address the layers above or below it (OSI/Internet) 46>SNMP interfaces to the TCP/IP with ________are the transport layer protocol (TCP/UDP) 47>RFC=____ describes SNMP system architecture (1156/1157/1158)_ 48>RFC=_____ defines SNMP by which management information for a network element may be inspected or altered by logically remote users (1156/1157/1158) 49>RFC=____describes the structure and identification of management information, and RFC=_______addresses the information base that is required for management (1154/1155/1156/1157) 50>The communication of management information among management entities is realized through exchange of___ protocol messages (4/5/6) 51>The communication of management information among management entities is realized through exchange of following protocol messages a: get-request b: get-next-request c: set-request d: get-response e: trap Ans:___________ (a/b/c/d/e/all) 52>Following protocol messages are initiated by the manager application process a: get-request b: get-next-request c: set-request d: get-response e: trap Ans:___________ (a/b/c/d/e) 53>Following messages are generated by the agent process a: get-request b: get-next-request c: set-request d: get-response e: trap Ans:___________ (a/b/c/d/e) 54>The message generation is called___________ 55>__________is unsolicited alarm message (get-response/trap) 56>___________message is generated by the management process requesting the value of an object (getrequest/get-next-request/set-request/get-response/trap) 57>An object may have multiple values because of multiple instances of the object, in this case, _________ message can be used (get-request/get-next-request) 58>___________message is generated by the management process to initiate or reset the value of an object variable (get-request/get-next-request/set-request/get-response/trap) 59>___________message is generated by an agent process (get-request/get-next-request/set-request/getresponse/trap) 60>___________is an unsolicited message generated by an agent process w/o a message or event arriving from the manager process (get-request/get-next-request/set-request/get-response/trap) 61>SNMP manager contains following sets of data a: one on the information about the objects b: one on the values of the objects Ans:___________ (a/b/both) 62>In q61, b is ______ (static/dynamic) and contains the measured values associated with the object_____ (true/virtual) database .63>A MIB is _____ (true/virtual) database and is_________ (static/dynamic) 64>SNMP _____has a database which is the physical database and the SNMP ______does not have a physical database (agent/manager) 65>_________have MIB which is compiled into the software module (agent/manager) 66>___________model deals with SMI and MIB (organization/functional/information)

27

NETWORK MANAGEMENT SYSTEMS 67>The syntax used to describe management information is ASN._ (0/1/2) 68>The specification and organizational aspects of managed objects are addressed in______ (MIB/SMI) 69>The specifications of managed objects and the grouping of. And relationship between, managed objects are addressed in ________ (MIB/SMI) 70>RFC=___ for SMI. RFC=____ for MIB (1213/1312/1157/1157) 71>Match the following FDDI :RFC 1695 OSPF :RFC 1285 ATM :RFC 1253 72>A managed object is composed of___________ (object type/object instance/both) 73>SMI is concerned only with_____ and not______ (object type/object instance) 74>___________is a data type , has a name, syntax , and an encoding scheme (object type/object instance) 75>The syntax of an object type is defined using ____and _____have been adopted as the encoding scheme for transfer of data types between agent and manager processes , as well as between manager processes (BER/ASN.1) 76>Every object type (every name) is uniquely identified by___________ (DESCRIPTOR/OBJECT IDENTIFIER) 77>DESCRIPTOR and OBJECT IDENTIFIER are in uppercase letters because they are___________ keywords (BER/ASN.1) 78>There are____ objects under the internet object (3/4/5)_______ 79>Following are the subnodes under Internet node in SNMPv1 a: directory b: mgmt c: experimental d: private Ans:___________ (a/b/c/d/all) 80>____________node is reserved for future use of OSI directory in the Internet (directory/mgmt/experimental/private) 81>___________node is used to identify all IETF recommended and IAB approved subnodes and objects (directory/mgmt/experimental/private) 82>___________node was created to define objects under IETF experiments (directory/mgmt/experimental/private) 83>___________is a heavily used node (directory/mgmt/experimental/private) 84>___________syntax is used to define the structure of object types (BER/ASN.1) 85>in ASN.1 data type, there are___ categories under structure (3/4/5)________ 86>in ASN.1 data type, there are following categories under structure a: simple b: defined c: constructor Ans:___________ (a/b/c/all) 87>Simple, defined and constructor types are also called___ ____&____respectively (application/structured/primitive) 88>SEQUENCE & SEQUENCE OF are not called base types (true/false)___________ 89>The primitive or simple types are atomic and are INTEGER, OCTET STRING, OBJECT IDENTIFIER & NULL. These are also referred to as ___________types (aggregate/non-ggregate) 90>When the integer value is restricted by a range it is called___________ (signed/ subtype) 91>The data type ENUMERATED is a special case of the ______data type (REAL/INTEGER) 92>Following are data types under Primitive types a: INTEGER b: OCTET STRING c: OBJECT IDENTIFIER d: NULL Ans:___________ (a/b/c/d/all) 93>Following are data types under defined types a: NetworkAddress b: IpAddress c: Counter d: Gauge e: TimeTicks f: Opaque Ans:___________ (a/b/c/d/e/f/all) 94>Following are data types under constructor types a: SEQUENCE b: SEQUENCE OF Ans:___________ (a/b/both) 95>Match the following INTEGER :placeholder

28

NETWORK MANAGEMENT SYSTEMS OCTET STRING :object position in MIB OBJECT IDENTIFIER :8bit bytes binary and textual data NULL :subtypes INTEGER (n1. . . .nN) 96>Match the following NetworkAddress :application wide arbitrary ASN.1 syntax, double wrapped OCTET STRING IpAddress :non-negative integer in hundredth of second units Counter :capped, on-negative integer, increase or decrease Gauge :wraparound, non-negative integer, monotonically increasing, may 2^32-1 TimeTicks :dotted decimal IP address Opaque :Not used 97>____:List maker::______: Table maker (SEQUENCE/SEQUENCE OF) 98>___________data type is used to specify either binary or textual information that is 8 bits long (OCTET IDENTIFIER/OCTET STRING) 99>The combination keyword __________is the object position in the MIB (OBJECT STRING/OBJECT IDENTIFIER) 100>___________are application specific data types and are SNMP based types (primitive/defined) 101>The base type ________is used to specify octets of binary information (Gauge/Opaque) 102>__________is intended for adding new base types to extend SNMP SMI (Gauge/Opaque) 103>__________is a choice of the address of the protocol family (IpAddress/NetworkAddress) 104>__________is the conventional four groups of dotted decimal notation of IPv4 (IpAddress/NetworkAddress) 105>__________is an application wide data type and is a non-negative integer (TimeTicks/Gauge/Counter) 106>Counter can only increase in value up to a maximum of 2^__-1 and then wraps around starting from 0 (16/32/64) 107>The data type __________is a non-negative integer , but its value can move either up or down (Counter/Gauge/TimeTicks) 108>Gauge pegs at its maximum value of 2^__-1 (16/32/64)________ 109>__________is a non-negative integer and measures time in units of hundredth of a second (Counter/Gauge/TimeTicks) 110>The maximum value of TimeTicks is 2^__-1 (16/32/64) 111>__________is an application wide data types that supports the capability to pass arbitrary ASN.1 syntax (Gauge/Opaque) 112>__________is used to create data types based on previously defined data types (Gauge/Opaque) 113>Size of ________is undefined in SNMPv1, which causes some problem in its implementation (Gauge/Counter/ Opaque) 114>The Opaque data type can be defined both IMPLICITly and EXPLICITly (true/false)__________ 115>The constructs ______&____which are in ASN.1, are not included in SNMP based management syntax (SEQUENCE/SEQUENCE OF/SET/SET OF) 116>____is used to build a list and______ is used to build a table (SEQUENCE/SET/SEQUENCE OF/SET OF) 117>Identify syntax for list a: SEQUENCE OF b: SEQUENCE {, . . . . } Ans:__________ (a/b/either) 118>Identify syntax for table a: SEQUENCE OF b: SEQUENCE {, . . . . } Ans:__________ (a/b/either) 119>Identify SNMPv1 keywords a: ACCESS b: BEGIN c: CHOICE d: Counter e: DEFINITIONS f: DEFVAL Ans:___________ (a/b/c/d/e/f/all) 120>Identify SNMPv1 keywords a: DESCRIPTION b: END c: ENTERPRISE d: FROM e: Gauge f: IDENTIFIER Ans:___________ (a/b/c/d/e/f/all) 121>Identify SNMPv1 keywords a: IMPORTS b: INDEX c: INTEGER d: IpAddress `e: NetworkAddress f: OBJECT Ans:___________ (a/b/c/d/e/f/all)

29

NETWORK MANAGEMENT SYSTEMS 122>Identify SNMPv1 keywords a: OBJECT-TYPE b: OCTET c: OF d: Opaque e: REFERENCE f: SEQUENCE Ans:___________ (a/b/c/d/e/f/all)__________ 123>Identify SNMPv1 keywords a: SIZE b: STATUS c: STRING d: SYNTAX e: TRAP-TYPE f: VARIABLES g: TimeTicks Ans:___________ (a/b/c/d/e/f/g/all)__________124>SNMPv1 has adopted ____with its____for encoding the information to be transmitted between agent and manager processes (TLV/ASN.1/BER)___ 125>Match the following ipAdEntAddr :SEQUENCE ipAdEntIfIndex :INTEGER ipAdEntNetMask :IpAddress ipAdEntReasmMaxSize: ipAdEntBcastAddr: ipAdEntry 126>Wrt OBJECT IDENTIFIER, if the most significant bit (8th bit) is set to___ , then the subidentifier is only one octet long. The 8th bit is set to ___for the value that requires more than one octet and indicates more octets to follow (0/1)___ 127>_____ is encoded as straight octet strings._____ _____ & _____ coded as integers._____Is coded as OCTET STRING type (IP address/opaque/counter/gauge/TimeTicks) 128>Match the following OBJECT IDENTIFIER :APPLICATION 1 SEQUENCE :APPLICATION 3 IpAddress :APPLICATION 2 Counter :APPLICATION 4 Gauge :APPLICATION 0 TimeTicks :UNIVERSAL 6 Opaque :UNIVERSAL 16 129>A managed object has ____parameters (3/4/5) 130>A managed object has following parameters a: textual name b: syntax c: definition d: access e: status Ans:_________ (a/b/c/d/e/all) 131>OBJECT DESCRIPTOR does not specify instances of a managed object (true/false)___________ 132>Associated with each _____is ______, which is the unique position it occupies in the MIB (OBJECT IDENTIFIER/OBJECT DESCRIPTOR) 133>__________is the ASN.1 definition of the object type (definition/access/status/syntax) 134>__________is an accepted textual description of the object type (definition/access/status/syntax) 135>__________is the specification for the type of privilege associated with accessing the information (definition/access/status/syntax) 136>Access is the specification for the type of privilege associated with accessing the information, it can be __________ (read only/read write/not accessible/either of them) 137>__________specifies whether the managed object is current or obsolete (definition/access/status/syntax) 138>Related objects can be grouped to form ______ object type and the objects that make up the aggregate object type are called ____object type component/subordinate /aggregate) 139>In order to encode the information on a managed object to be processed by machines , it has to be defined in a formalized manner. This is done using__________ (micro/macro) 140>The body of the macro module consists of __________parts (3/4/5) 141>The body of the macro module consists of following parts a: type notation

30

NETWORK MANAGEMENT SYSTEMS b: value notation c: supporting productions Ans:__________ (a/b/c/all) 142>____NOTATION defines the object types in the module and ______NOTATION defines the name of the object (TYPE/VALUE) 143>Access can be only one of following options a: read only b: read write c: write only d: not accessible Ans:__________ (a/b/c/d/all) 144>Allowed values for Status are a: mandatory b: optional c: obsolete Ans:__________ (a/b/c/all) 145>__________object is a group of related objects (compound/aggregate) 146>Object ___ is the managed object ipAddrEntry consist of the subordinate object types of___ through ___ (1/2/5) 147>ipAddrEntry describes the complete set of information consisting of the__ fields needed for an entry in the IP interface address table (4/5/6) 148>The text following ___are comments and are not encoded (** / --) 149>The __________clause uniquely identifies the instantiation of the entry object type in the table (REFERENCE/INDEX) 150>The__________ clause is the textual reference to the document from which the object is being mapped (REFERENCE/INDEX) 151>_____clause is the columnar object identifier while______ clause is the default value to be object (REFERENCE/INDEX/DEVAL) 152>SNMP operations apply exclusively to scalar operations (true/false)___________ 153>_________object type comprises one or more subtypes (compound/aggregate) 154>RFC=____ for SMI (1551/1515/1155)_______ 155>RFC=____ for MIB2 (1312/1213)_______ 156>MIB is a_______ information store (true/virtual) 157>Objects in the MIB are defined using ASN.1 (true/false)__________ 158>__________defines the mechanism for describing the objects (MIB/SMI) 159>The definition of MIB consists of___ components (3/4/5) 160>The definition of MIB consists of following components a: name b: syntax c: encoding Ans:________ (a/b/c/all) 161>The term __________mandates the implementation of the object in the current version of MIB2 (decrypted/deprecated) 162>Objects that are related are grouped into _____while object types are grouped to form_____ (aggregate object type/object group) 163>The MIB module structure consists of a: module name b: imports from other modules c: definitions of the current module Ans:__________ (a/b/c/all) 164>Identify correct MIB module structure a: DEFINITIONS::=BEGIN END b: BEGIN::=DEFINITIONS END Ans:__________ (a/b/either) 165>__________group contains the objects that describe system administration (System/Interface/Address Translation)

31

NETWORK MANAGEMENT SYSTEMS 166>__________group defines the interfaces of the network component and the network parameters associated with each interface (System/Interface/Address Translation) 167>__________group is a cross reference table between the IP address and the physical address (System/Interface/Address Translation) 168>__________group is a placeholder for future use of the OSI protocol (Transmission/CMOT) 169>___________group was created as a placeholder for network transmission related parameters (Transmission/CMOT) 170>__________group is the communication protocol group associated with SNMP management (SMT/SNMP) 171>__________group is a placeholder and is not yet defined (Transmission/CMOT) 172>__________group is based on the transmission media that underlie each interface of the system (transfer/transmission) 173>Match the following System :mib2 11 Interfaces :mib2 9 at :mib2 7 ip :mib2 5 icmp :mib2 3 Tcp : mib2 1 Udp :mib2 2 egp :mib2 4 cmot :mib2 6 Transmission :mib2 8 Snmp :mib2 10 174>__________group is the basic group in the Internet standard MIB (at/snmp/System) 175>Implementation of the System group is mandatory for all systems in both agent and manager (true/false)__________ 176>The System group consists of___ entities (5/6/7) 177>The System group consists of following entities a: sysDescr b: sysObjectId c: sysUpTime d: sysContact e: sysName f: sysLocation g: sysServices Ans:__________ (a/b/c/d/e/f/g/all) 178>_________group contains managed objects associated with the interfaces of a system (System/Interface/snmp) 179>Implementation of the Interfaces group is mandatory for all systems (true/false)__________ 180>The Interface group consists of following nodes__________ (ifNumber/ifTable/both) 181>wrt Interface group, the number of interfaces of the entity is defined by ____and the information related to each interface is defined in the Interface table______ (ifIndex/ifTable/ifNumber) 182>Match the following sysDescr : system 7 sysObjectId :system 5 sysUpTime :system 3 sysContact :system 1 sysName :system 2 sysLocation :system 4 sysServices :system 6 183>Match the following ifNumber :largest size of the datagram for the interface ifTable :type of interface layer below the network layer defined as an enumerated integer ifEntry :total number of network interfaces in the system ifDescr :list of entries that describes information on each interface of the system ifType :an interface entry that contains objects at the subnetwork layer for a particular interface ifMtu :a unique integer value for each interface 184>Match the following ifSpeed :value of sysUpTime at the current operational status ifPhysAddress :current operational status of the interface ifAdminStatus :current or nominal data rate for the interface in bps

32

NETWORK MANAGEMENT SYSTEMS ifOperStatus :interface's address at the protocol layer immediately below the network layer ifLastCange :reference to MIB definitions specific to the particular media used to realize the interface ifSpecific :desired status of the interface ie up, down or testing 185>Match the following ifInOctets :number of unsupported protocol packets discarded ifInUcastPkts :number of inbound packets discarded ifInNUcastPkts :number of subnetwork unicast packets delivered to a higher layer protocol ifInDiscards :total number of input octets received ifInErrors :number of non-unicast packets delivered to a higher layer protocol ifInUnknownProtos :number of inbound packets with errors 186>Match the following ifOutOctets :length of the output queue in packets ifOutUcastPkts :number of outbound packets discarded ifOutNUcastPkts :total number of unicast packets that higher level layer requested to be transmitted ifOutDiscrds :number of octets transmitted out of the interface ifOutErrors :total number of non-unicast packets that higher level layer requested to be transmitted ifOutQLen :number of outbound packets tat could not be transmitted because of errors 187>__________is defined are an Enumerated INTEGER (ifNumber/ifType) 188>In interface group, object identifiers 11 through 15 refer to the measurements on_____ traffic and object identifiers 16 through 21 to measurement on_____ traffic (outbound/inbound) 189>The Address Translation group consists of table that converts _____to _____for all the interfaces of the system (physical address/NetworkAddress) 190>The Internet uses __as the networking protocol (TCP/IP)________ 191>__________group has the information on the various parameters of the protocol (system/ip/at) 192>The implementation of IP group is mandatory (true/false) __________ 193>The IP group contains following tables a:IP address table b:IP routing table c:IP address translation table Ans:__________ (a/b/c/all) 194>__________indicate whether the node is acting as just as route or gateway between two autonomous networks (ipForwDatagrams/ipForwarding) 195>Match the following ipForwarding :number of input datagrams discarded due to unsupported protocolipDefaultTTL :number of input datagrams discarded due to header error ipInRecieves :number of datagrams discarded due to address errors ipInHdrErrors :number of input datagrams attempted to forward to the destination ipInAddrError :number of locally addressed datagrams received successfully but discarded due to unsupported protocol ipForwDatagrams :total number of input datagrams received from interfaces including those in error ipInUnknownProtos :node acting as a gateway or not ipInDiscards :time-to-live field of IP header 196>Match the following ipInDelivers :number of failures detected by the IP reassembly algorithm ipOutRequests :number of successfully reassembled datagrams ipOutDiscards :number of IP datagrams received that need reassembly ipOutNoRoutes :maximum number of seconds that received fragments are held while they are awaiting reassembly ipReasmReqds :number of IP datagrams discarded because no route could be found to transmit than to their destinations ipReasmOKs :number of no error IP datagram discarded due to lack of buffer space ipReasmFails :total number of IP datagrams which local IP user protocols supplied to IP ipReasmTimeOut :total number of input datagrams successfully delivered to IP user protocols 197>Match the following ipFragOKs :number of routing entries discarded even though they were valid ipFragFails :IP address translation table that maps IP addresses to physical address ipFragCreates :IP routing table containing an entry for each route ipAddrTable :Number of datagram fragments generated as a result of fragmentation ipNetToMediaTable :number of IP datagrams not fragmented due to Don’t fragment flag set ipRoutingDiscards :number of successfully fragmented datagrams

33

NETWORK MANAGEMENT SYSTEMS ipRouteTable :table of IP addresses 198>An entry_____ in ipRouteDest Is considered a default route (1.1.1.1/0.0.0.0) 199>Match the following ipAddrTable :broadcast address indicator bit ipAddrEntry :index value of the entry ipAdEntAddr :one of the entries in the IP address table ipAdEntIfIndex :table of IP addresses ipAdEntNetMask :the IP address to which this entry's addressing information pertains ipAdEntBcastAddr :subnet mask for the IP address of the entry ipAdEntReasmMaxSize :largest IP datagram that can be reassembled on this interface 200>Match the following ipRouteTable :reference to MIB definition specific to the routing protocol ipRouteEntry :mask to be logically ANDed with the destination address before comparing with the ipRouteDest field ipRouteDest :Routing mechanism by which this route was learned ipRouteIfIndex :IP address of the next hop ipRouteMetric1 :primary routing metric for this route ipRouteNextHop :number of seconds since routing was last updated ipRouteType :type of route ipRouteProto :IP routing table ipRouteAge :route to a particular destination ipRouteMask :destination IP address of this route ipRouteInfo :index of interface ipRouteMetric2 :an alternative metric for this route 201>Match the following ipNetToMediaTable :type of mapping ipNetToMediaEntry :IP address ipNetToMediaIfIndex :media dependent physical address ipNetToMediaPhysAddress :table mapping IP addresses to physical addresses ipNetToMediaNetAddress :IP address to physical address for the particular interface ipNetToMediaType :Interface on which this entry's equivalence is effective 202>Match the following ipForward :address of next system ipForwardNumber :mask to be logically ANDed with the destination address before comparing with the ipRouteDest field ipForwardTable :a particular route to a particular destination under a particular policy ipForwardEntry :number of entries in the IP forward table ipForwardDest :contains information on IP forwarding table, deprecator IP routing table ipForwardMask :routing table of this entity ipForwardPolicy :destination IP route of this address ipForwardNextHop :set of conditions that selects one multipath route 203>Match the following ipForwardIfIndex :an alterntive routing metric for this route ipForwardType :primary routing metric for this route ipForwardProto :autonomus system number of next hop ipForwardInfo :reference to MIB definition specific to the routing protocol ipForwardNextHopAS :number of seconds since routing was last updated ipForwardMetric1 :routing mechanism by which this route was learned ipForwardMetric2 :type of route--remote, local, invalid or otherwise ipForwardAge :ifIndex value of the interface 204>The entity__________defines the general set of conditions that would cause the selection of one multipath route over others (ipForwardProto/ipForwardPolicy) 205>___________is a precursor of SNMP and is part of the TCP/IP suite (IGMP/ICMP) 206>Match the following icmpInMsgs :number of ICMP echo reply message received icmpInErrors :number of ICMP echo message received icmpInDestUnreachs :number of ICMPredirect messages received icmpInTimeExcds :number of ICMP source quench messages received icmpInParmProbs :number of ICMP parameter problem messages received

34

NETWORK MANAGEMENT SYSTEMS icmpInSrcQuenches :number of ICMP time exceeded messages received icmpInRedirects :number of ICMP destination unreachable messages received icmpInEchoe :total number of ICMP messages received by the entity including icmpInErrors icmpInEchoReps :number of message received by the entity with ICMP specific errors 207>Match the following icmpInTimestamps :number of ICMP parameter problem messages sent icmpInTimestampReps :number of ICMP Time exceeded messages sent icmpInAddrMasks :number of ICMP destination unreachable messages sent icmpInAddrMasksReps :number of ICMP timestamp message received icmpOutMsgs :number of ICMP reply messages received icmpOutErrors :number of ICMP address mask request messages received icmpOutDestUnreachs :number of ICMP address mask reply messages received icmpOutTimeExcds :total number of ICMP messages attempted to be sent by this entity icmpOutParmProbs :number of good ICMP messages not sent, does not include the ones with errors 208>Match the following icmpOutSrcQuechs :number of ICMP address mask reply messages sent icmpOutRedirects :number of ICMP address mask request messages sent icmpOutEchos :number of ICMP timestamp reply messages sent icmpOutEchoReps :number of ICMP timestamp message sent icmpOutTimestamp :number of ICMP echo reply messages sent icmpOutTimestampReps :number of ICMP echo messages sent icmpOutAddrMasks :number of ICMP redirect messages sent icmpOutAddrMasksReps :number of ICMP source quench messages sent 209>In TCP group, the table entry has following indices to uniquely define it in the table a:tcpConnLocalAddress b:tcpConnLocalPort c:tcpConnRemAddress d:tcpConnRemPort Ans:___________ (a/b/c/d/all) 210>Match the following tcpRtoAlgorithm :number of resets done to either CLOSED or LISTEN tcpRtoMin :number of failed attempts to make connection tcpRtoMax :number of passive connections made LISTEN to SYN-RCVD state tcpMaxConn :number of active connections made CLOSED TO SYN-SENT state tcpActiveConn :Maximum number of TCP connections tcpPassiveOpens :maximum value for timeout in milliseconds retransmission tcpAttemptsFails :minimum value for timeout in milliseconds for retransmission tcpEstabResets :timeout algorithm for retransmission of octets 211>Match the following tcpCurrEstab :number of segment send containing RST flag tcpInSegs :Total number of segments received in error tcpOutSegs :Total number of segments retransmitted tcpRetransSegs :TCO connection table tcpConnTable :Total number of segments sent excluding retransmission tcpInErrs :total number of segments received including with errors tcpOutRsts :no of connections for which the current state is either ESTABLISHED or CLOSED WAIT 212>Match the following tcpConnTable :remote port number tcpConnEntry :remote IP address tcpConnState :local port number tcpConnLocalAddress :local IP address tcpConnLocalPort :state of the TCP connection tcpConnRemAddress :information about a particular TCP connection tcpConnRemPort :TCO connection table 213>Match the following udpInDatagrams :information about a particular connection or UDP listener udpNoPorts :local IP address udpInErrors :local UDP port udpOutDatagrams :total number of datagrams delivered to the users

35

NETWORK MANAGEMENT SYSTEMS udpTable :total number of received datagrams for which there is no application udpEntry :number of received datagrams with error udpLocalAddress :total number of datagrams sent udpLocalPort :UDP Listener table 214>SNMP management is organized as a two tier management, in which a manager process and agent process communicate with each other (true/false)___________ 215>In SNMP management, the two tier structure can be extended to three tiers by sandwiching ___________between he manager and the agent (proxy agent/RMON/either) 216>All management operations are done using___messages in SNMPv1 (4/5/6)_______ 217>All management operations are done using following messages in SNMPv1 a:get request b:get next c:set request d:get response e:trap Ans:___________ (a/b/c/d/e/all) 218>In above question, the first__messages are sent from the manager to the agent and the last___are sent by the agent to manager (2/3) 219>The messages are exchanged according to the specifict defined in___________ (MIB/SMI) 220>SMI is composed of ___________ (name/syntax/encoding rules/all) 221>Managed objects are organized in a virtual database called___________ (MIB/SMI) 222>MIB2 which is a superset of MIB1, consists of_____groups (7/10/11)______ ANSWERS 1>SNMP 2>T 3>NMS 4>NMS 5>both 6>SMI 7>MIB 8>1 9>communication 10>ARPANET 11>ICMP 12>Packet Internet Group 13>PING 14>PING 15>Internet Advisory Board 16>IAB 17>Simple Gateway Monitoring Protocol 18>SGMP 19>SNMP, SGMP 20>2 21>b,c 22>InterNIC 23>Internet Network Information Center 24>Standard RFC 25>For Your Information RFC 26>Internet Assigned Numbers Authority 27>IANA 28>FYI 29>STD 30>2 31>all 32>1157, 1905, 1906 33>1155 34>1213,17 35>1907 36>organization 37>information 38>network agent, network manager 39>T 40>Remote Monitoring

36

NETWORK MANAGEMENT SYSTEMS 41>RMON 42>both 43>Hybrid Fiber Coax 44>T 45>Internet 46>UDP 47>1157 48>1157 49>1155, 1156 50>5 51>all 52>a,b,c 53>d,e 54>event 55>trap 56>get-request 57>get-next-request 58>set-request 59>get-response 60>trap 61>both 62> true, dynamic 63> static, virtual 64>manager, agent 65>both 66>information 67>1 68>SMI 69>MIB 70>1155, 1213 71>1-b 2-c 3-a 72>both 73>object type, object instance 74>Object type 75>ASN.1, BER 76>both 77>ASN.1 78>4 79>all 80>directory 81>mgmt 82>experimental 83>private 84>ASN.1 85>3 86>all 87>primitive, application, structured 88>T 89>non-aggregate 90>subtype 91>INTEGER 92>all 93>all 94>both 95>1- 2- 3- 496>1- 2- 3- 4- 5- 697>SEQUENCE, SEQUENCE OF 98>OCTET 99>OBJECT IDENTIFIER 100>defined 101>Opaque 102>Opaque

37

NETWORK MANAGEMENT SYSTEMS 103>NetworkAddress 104>IpAddress 105>Counter 106>32 107>Gauge 108>32 109>TimeTicks 110>32 111>Opaque 112>Opaque 113>Opaque 114>T 115>SET,SET OF 116>SEQUENCE,SEQUENCE OF 117>b 118>a 119>all 120>all 121>all 122>all 123>all 124>BER,TLV 125>1-c 2-b 3-c 4-b 5-b 6-a 126>0,1 127>IP address, Counter, Gauge, TimeTicks 128>1-f 2-g 3-e 4-a 5-c 6-b 7-d 129>5 130>all 131>T 132>OBJECT DESCRIPTOR, OBJECT IDENTIFIER 133>Syntax 134>definition 135>access 136>either 137>status 138>aggregate, subordinate 139>macro 140>3 141>all 142>TYPE, VALUE 143>all 144>all 145>aggregate 146>6,1-5 147>5 148>-149>INDEX 150>REFERENCE 151>INDEX, DEVAL 152>T 153>aggregate 154>1155 155>1213 156>virtual 157>T 158>SMI 159>3 160>all 161>deprecated 162>object group, aggregate object type 163>all 164>a

38

NETWORK MANAGEMENT SYSTEMS 165>System 166>Interface 167>Address Translation 168>CMOT 169>Transmission 170>SNMP 171>CMOT 172>transmission 173>1-f 2-g 3-e 4-h 5-d 6-i 7-c 8-j 9-b 10-k 11-a 174>System 175>T 176>7 177>all 178>Interface 179>T 180>both 181>ifNumber, ifTable 182>1-d 2-e 3-c 4-f 5-b 6-g 7-a 183>1-c 2-d 3-e 4-f 5-b 6-a 184>1-c 2-d 3-f 4-b 5-a 6-e 185>1-d 2-c 3-e 4-b 5-f 6-a 186>1-d 2-c 3-e 4-b 5-f 6-a 187>ifType 188>inbound, outbound 189>NetworkAddress, physical address 190>IP 191>IP 192>T 193>all 194>ipForwarding 195>1-g 2-h 3-f 4-b 5-c 6-d 7-e 8-a 196>1-h 2-g 3-f 4-e 5-c 6-b 7-a 8-d 197>1-f 2-e 3-d 4-g 5-b 6-a 7-c 198> 199>1-d 2-c 3-e 4-b 5-f 6-a 7-g 200>1-h 2-i 3-j 4-k 5-e 6-d 7-g 8-c 9-f 10-b 11-a 12-l 201>1-d 2-e 3-f 4-c 5-b 6-a 202>1-e 2-d 3-f 4-c 5-g 6-b 7-h 8-a 203>1-h 2-g 3-f 4-d 5-c 6-b 7-a 8-e 204>ipForwardPolicy 205>ICMP 206>1-h 2-i 3-g 4-f 5-e 6-d 7-c 8-b 9-a 207>1-d 2-e 3-f 4-g 5-h 6-i 7-c 8-b 9-a 208>1-h 2-g 3-f 4-e 5-d 6-c 7-b 8-a 209>all 210>1-h 2-g 3-f 4-e 5-d 6-c 7-b 8-a 211>1-g 2-f 3-e 4-c 5-d 6-b 7-a 212>1-g2-f 3-e 4-d 5-c 6-b 7-a 213>1-d 2-e 3-f 4-g 5-h 6-a 7-b 8-c 214>T 215>proxy agent 216>5 217>all 218>3,2 219>SMI 220>all 221>MIB 222>11

39

NETWORK MANAGEMENT SYSTEMS

CHAPTER 5: SNMPv1 NETWORK MANAGEMENT — COMMUNICATION AND FUNCTIONAL MODELS 1>The SNMPv1 communication model defines the specifications of____ aspects of SNMP communication (3/4/5)______ 2>The SNMPv1 communication model defines the specifications of following aspects of SNMP communication a: architecture b: administrative model c: SNMP protocol d: SNMP MIB Ans:__________ (a/b/c/d/all) 3>__________model defines data access policy (communication/administrative) 4>A manager can belong to multiple communities and thus can manage multiple domains.This is the__________ model (communication/administrative) 5>SNMP entities are grouped into __________module (SNMP SMI/SNMP MIB) 6>___________consists of communication between network management stations and managed network elements or objects (SNMP protocol/SNMP architecture) 7>___________is used to communicate information between the network management stations and the management agents in the elements (SNMP MIB/SNMP protocol) 8>Following are goals of the architecture in the original specifications of SNMP a: it should minimize the number and complexity of the management functions realized by the management agent b: it should be flexible enough to allow expansion c: the SNMP architecture should be independent of the architecture and mechanisms of particular hosts and gateways Ans:___________ (a/b/c/all) 9>Only non-aggregate objects are communicated using SNMP (true/false)___________ 10>___________is used for data transfer in SNMP (ASN.1/BER/both) 11>The SNMP manages the network with ____messages (3/4/5)_______ 12>SNMP comprises following basic messages a: set b: get c: trap Ans:__________ (a/b/c/all) 13>_____&______messages are generated by the manager to retrieve data from network elements using the associated management agents (get-request/set-request/get-next-request/trap) 14>___________is used to initialize and edit the parameters of the network element (get-request/set-request) 15>___________is the response from the agent to get and set messages from the manager (get-next-request/getresponse-request) 16>The number of unsolicited messages in the form of_________is limited to make the architecture simple and to minimize the traffic (get-request/set-request/get-next-request/trap) 17>There are__ types of traps (2/3/4)_________ 18>Following are different types of traps a: generic trap b: specific trap c: time stamp Ans:___________ (a/b/c/all) 19>___________type consists of coldStart, warmStart, linkDown,linkUp,authenticationFailure, egpNeighborLoss and enterpriseSpecific (generic trap/specific trap/time stamp) 20>___________is a specific code and is generated even when an enterpriseSpecific trap is not present (generic trap/specific trap/time stamp) 21>___________is the time elapsed between the last initialization or reinitialization of the element and the generation of the trap (generic trap/specific trap/time stamp) 22>In RFC 1157,the entities that reside in the management stations and network elements are called SNMP___________ entities (protocol/application) 23>The peer processes, which implement the SNMP, and thus support the SNMP application entities are termed as__________ entities (protocol/MIB)

40

NETWORK MANAGEMENT SYSTEMS 24>Application entity residing in the management station is also referred to as _____and the application entity residing in the element is also referred to as_____ (SNMP agent/SNMP manager) 25>The pairing of the SNMP manager and SNMP agent is called ___________ (SNMP view/SNMP community) 26>The authentication scheme is a filter module in the manager and in the agent (true/false)___________ 27>A network element comprises many managed objects both standard and private (true/false)___________ 28>A management agent may be permitted to view only a subset of the network element's managed objects. This is called___________ (SNMP community/community MIB view) 29>A pairing of the SNMP MIB view with the SNMP access mode is called___________ (SNMP community/community profile) 30>Each community name is assigned _______either READ-ONLY or READ-WRITE (SNMP MIB view/SNMP access mode) ____ 31>___________is combination with the access mode of a managed object determines the operations that can be performed n the object by an agent (SNMP community/community profile) 32>The SNMP agent with ________access mode can perform all operations --get ,set and trap on objects (READONLY/READ-WRITE) 33>If the SNMP agent has ___________access privilege, it can perform only get and trap operations on objects (READ-ONLY/READ-WRITE) 34>There are__ access privileges (3/4/5)_________ 35> SNMP has following access privileges a: read only b: write only c: read write d: none Ans:___________ (a/b/c/d/all) 36>If the access mode is defined as________, that operand is available for all three operations--get,set and trap (read-only/read-write/write-only)___ 37>___________access mode is used to set the value of MIB object by the network manager (read-only/readwrite/write-only) 38>sysContact: read-write:: sysDescr:_____ (read-only/write-only) 39>A pairing of an SNMP community with an SNMP community profile is defined as___________ (community MIB view/SNMP access policy) 40>___________defines the administrative model of SNMP management (community MIB view/SNMP access policy) 41>The SNMP agent associated with the proxy policy is called________ (proxy agent/proxy server/either) 42>___________monitors a non-SNMP community with non-SNMP agent and then converts the objects and data to SNMP-compatible objects and data feed to an SNMP manager (SNMP agent/proxy agent) 43>SNMP agent:____:: Proxy agent:_______ (SNMP community/Non-SNMP community) 44>The peer processes, which implement hue SNMP, and thus support the SNMP application entities are called___________ entities (MIB/protocol) 45>An SNMP message consists of___________ (version identifier/community name/PDU/all) 46>An SNMP protocol entity is received on port ____on the host except for trap which is received on port_______ (143/144/161/162) 47>The maximum length of the protocol in SNMPv1 is ___________bytes (848/484) 48>A managed object is a scalar variable (true/false) ___________ 49>The pairing of the variable and value is called___________ (variable binding/VarBind/Either) 50>Correct format of Get and Set Type PDUs (in order) a: PDU type| RequestID |Error Status |VarBind1 name| VarBind1 Value b: PDU type| VarBind1 name| VarBind1 Value| RequestID |Error Status Ans: ___________ (a/b/both) 51>In Get and Set type PDUs format ,______is used to indicate that an error occurred while _____is used to provide additional information on the error status (ErrorIndex/ErrorStatus) 52>The generic trap consists of___ types (5/6/7)________ 53>______trap is not covered by the enterpriseSpecific trap (generic/specific)_____ 54>SNMP operations comprise get and set messages from ____to ____,and get & trap messages from____ to_____ (manager/agent) 55>Correct format of Trap PDU (in correct order) a: PDU Type| Enterprise | Agent address | Generic Trap type Timestamp | VarBind1 name| VarBind1 value| Specific trap type b: PDU Type| Enterprise | Agent address | Generic Trap type | Specific trap type | Timestamp | VarBind1 name| VarBind1 value Ans:___________ (a/b/either) 56>Match the following

41

NETWORK MANAGEMENT SYSTEMS coldStart :failure of one of the communication link warmStart :one of the links has come up linkDown :authentication failure linkUp :loss of EGP neighbor authenticationFailure :enterprise specific trap egpNeighborLoss :sending protocol entity is reinitializing itself, agent configuration or protocol entity implementation not altered enterpriseSpecific :sending protocol entity is reinitializing itself, agent’s configuration or protocol entity implementation may be altered 57>wrt Get-Request Operation for a System group, Arrange the following commands in correct sequence a: GetRequest (sysObjectID.0) b: GetResponse (sysObjectID.0=enterprise.11.2.3.10.1.2) c: GetReques (sysDescr.0) d: GetResponse (sysDescr.0="SunOS") Ans:___________ (cdba/cdab) 58>wrt Get-Next-Request Operation for a System group, Arrange the following commands in correct sequence a: GetNextRequest (sysDescr.0) b: GetResponse (sysObjectID.0=enterprise.11.2.3.10.1.2) c: GetRequest (sysDescr.0) d: GetResponse (sysDescr.0="SunOS") e: GetNextRequest (sysObjectID.0) Ans:___________ (cdbae/cdabe)___________ 59>Arrange the following numbers in lexographic order 1118 115 126 15 1 Ans:___________ (1 1118 126 115 15 /1 1118 115 126 15) 60>Get-next-request has following advantages a: we dont need to know the object identifier of the next entity b: we do not know how many rows exist in the table c: we can use it to build a MIB tree by repeating the request from any node to any node.This is called MIB walk Ans:___________ (a/b/c/all) 61>wrt Get-Next-Request operation for the MIB ,arrange the following commands in correct sequence a: GetNextRequest (B) b: GetResponse (T.E.1.1) c: GetRequest (A) d: GetResponse (A) e: GetNextRequest (B) f: GetRespons (B) Ans:___________ (cdeafb/cdefab) 62>___________is a management tool that can capture the packets going across a transmission medium (filter/sniffer) 63>Match the following snmpInPkts :total number of messages from transport service that have tooBig errors snmpOutPkts :total number of messages delivered from transport service snmpInBadVersions :total number of ASN.1 And BER errors snmpInBadCommunityNames :total number of messages from transport service,not allowed operation by the sending community snmpInBadCommunityUses :total number of messages from transport service that are of unknown community name snmpInASNParseErrs :total number of messages from transport service that are of unsupported version snmpInTooBigs :total number of messages delivered to transport service 64>Match the following snmpInNoSuchNames :total number of messages from transport service that have 'noSuchName' errors snmpInBadValues :total number of messages from transport service that have redOnly errors snmpInReadOnlys :Total number of messages from transport service that have badValue errors snmpInGenErrs :total number of messages from transport service that have genErr errors snmpInTotalSetVars :Total number of successful Get-Request and Get-Next messages received snmpInTotalReqVars :total number of objects successfully altered by Set-Request message recieved snmpInGetRequests :total number of Get-Request PDUs accepted and processed snmpInGetNexts :total number of Get-Next PDUs accepted and processed 65>Match the following snmpInSetRequests :total number of Get-Response PDUs accepted and processed

42

NETWORK MANAGEMENT SYSTEMS snmpInGetResponses :total number of Set-Request PDUs accepted and processed snmpInTraps :total number of trap PDUs accepted and processed snmpOutTooBigs :total number of SNMP PDUs generated for which error status is tooBig snmpOutNoSuchNames :total number of SNMP PDUs generated for which error status is noSuchName snmpOutBadValues :total number of SNMP PDUs generated for which error status is badalue snmpOutGenErrs :total number of SNMP PDUs generated for which error status is genErr 66>Match the following snmpOutGetRequests :total number of SNMP Get-Request PDUs generated snmpOutGetNexts :override option to generate authentication failure traps snmpOutSetRequests :total number of SNMP trap PDUs generated snmpOutGetResponses :total number of SNMP Get-Response PDUs generated snmpOutTraps :total number of SNMP Set-Request PDUs generated snmpEnableAuthenTraps :total number of SNMP Get-Next PDUs generated 67>Application functions are limited to network management in SNMP and not to the services provided by the network (true/false)___________ 68>The OSI mode addresses ___areas of functions (4/5/6)________ 69>The OSI mode addresses following areas of functions a: configuration b: fault c: performance d: security e: accounting Ans:___________ (a/b/c/d/e/all) 70>Performance counters are part of the SNMP agent MIB. It is the function of the SNMP __________to do the performance analysis (agent/manager) 71>___________model is protocol entity specifications addresses security function is basic SNMP (architecture/administrative) 72>___________function is not addressed by the SNMP model (administrative/accounting) 73>All management operations are done using_____ messages in SNMPv1 (3/4/5)______ 74>All management operations are done using following messages in SNMPv1 a: get-request b: get-next-request c: set-request d: get-response e: trap Ans:___________ (a/b/c/d/e/all) 75>In q74,the first three messages are sent from _____to ______and the last two are sent by_____to ______ (manager/agent) 76>___________model deals with the administrative model structure and the five SNMP message PDU (administrative/communication) 77>___________model defines the community within which messages can be exchanged (administrative/communication)

ANSWERS 1>4 2>all 3>administrative 4>administrative 5>SNMP MIB 6>SNMP architecture 7>SNMP protocol 8>all 9>T 10>both 11>5 12>all 13>get-request, get-next-request 14>set-request 15>get-response-request 16>trap 17>3 18>all 19>generic-trap

43

NETWORK MANAGEMENT SYSTEMS 20>specific-trap 21>time-stamp 22>application 23>protocol 24>SNMP manager ,SNMP agent 25>SNMP community 26>t 27>T 28>community MIB view 29>community profile 30>SNMP access mode 31>community profile 32>READ-WRITE 33>READ-ONLY 34>4 35>all 36>read-write 37>write-only 38>write-only 39>SNMP access policy 40>SNMP access policy 41>either 42>proxy agent 43>SNMP community, non-SNMP community 44>protocol 45>all 46>161,162 47>484 48>T 49>variable binding 50>a 51>ErrorStatus, ErrorIndex 52>7 53>specific-trap 54>manager to agent & vice versa 55>b 56>1-g 2-f 3-a 4-b 5-c 6-d 7-e 57>cdab 58>cdabe 59>1 1118 115 126 15 60>all 61>cdefab 62>sniffer 63>1-b 2-g 3-f 4-e 5-d 6-c 7-a 64>1-a 2-c 3-b 4-d 5-f 6-e 7-g 8-h 65>1-b 2-a 3-c 4-d 5-e 6-f 7-g 66>1-a 2-f 3-e 4-d 5-c 6-b 67>T 68>5 69>all 70>manger 71>administrative 72>accounting 73>5 74>all 75>manager to agent & vice versa 76>communication 77>administrative

44

NETWORK MANAGEMENT SYSTEMS

CHAPTER 8: SNMP MANAGEMENT – RMON 1>The characterization of computer network performance is statistical in nature (true/false)__________ 2>Sniffer is a passive operation and does nothing to the packets, which continue onto their destinations. This approach is called _______ (monitoring/probing) and the device the performs that function is called (network monitor/probe) 3>RMON stands for__________ 4>The monitored information, gathered and analyzed locally can be transmitted to a remote network management station. In such a case, remotely monitoring the network with a probe is referred to as__________ (RMAN/RMON) 5>Advantages of RMON are a: each RMON device monitors the local network segment and does the necessary analyses b: RMON reduces the need for agents in the network to be visible at all times to the NMS c: RMON pings locally and hence has less chance of losing packets, thus increasing monitoring reliability d: individual segments can be monitored almost continuously e: higher network availability for users and greater productivity for administrators Ans: __________ (a/b/c/d/e/all) 6>RMON relays information in both solicited and unsolicited fashion to the NMS (true/false)___________ 7>The RMON structure of management information is similar to that of__________in defining the object types (MIB/SMI) 8>RMON MIB has been developed in___ stages (3/4/5)________ 9>RMON1 is covered by RFC=____for Ethernet LAN and RFC=____ for extension to token ring LAN (1757/1271/1513/2021) 10>RMON=__ addressed parameters at the OSI layer 2 and RMON=__ addressed the parameters associated with OSI layers 3-7 (1/2/3)_______ 11>RFC=____ for RMON2 (2021/1271)_______ 12>The RMON group consists of___ Ethernet RMON1 groups, ___token ring extension group to RMON1, and___RMON2 groups for the higher layers (1/9/10) 13>following new data types are defined in the RMON1 textual conventions___________ (OwnerString/EntryStatus) 14>The owner identification is made part of the control table defined by____ data type ._______is used to resolve conflicts that might arise between management systems in the manipulation of control tables (OwnerString/EntryStatus) 15>___________is specified in the NVT ASCII character set as DisplayString (OwnerString/EntryStatus) 16>The EntryStatus data type can exist in one of following states a: valid b: createRequest c: underCreation d: invalid Ans: __________ (a/b/c/d/cal) 17>Match the following Valid: row is not fully active createRequest: delete the row by disassociating the mapping of this entry underCreation: create a new row by creating this object Invalid: row exists and is active, it is fully configured and operational 18>RMON__ performs numerous functions at the data link layer (1/2)_________ 19>wrt RMON1 Group and functions, the data gathered can serve as inputs to ___sets of functions (3/4/5)________ 20>In RMON1 Group and functions, ___________statistics deals with traffic data associated with the hosts, ranking the traffic for the top N hosts , and conversation between hosts (Ethernet /token/host & conversation) 21>In RMON1 Group and functions, filter group is cascade of __filters (2/3/4)_________ 22>The functions associated with the various groups are performed by___ groups associated with the RMON1 MIB (9/10/11)________ 23>In RMON1 Group and functions, the groups fall into___ categories (3/4/5)________ 24> RMON1 Group and functions, the groups fall into following categories a: statistics gathering groups b: network event reporting function c: filtering input packets according to selected criteria Ans: ___________ (a/b/c/all)

45

NETWORK MANAGEMENT SYSTEMS 25>In RMON1 groups and functions, the group fall into three categories, the largest of which is the category of___________ (network event reporting function/filtering input packets/statistics gathering groups) 26>Match the following Statistics: computes the top N hosts on the respective categories of statistics gathered History: gathers statistical data on hosts Alarm: provides link level statistics Host: collects periodic statistical data and stores them for later retrieval Host top N: generates events when the data sample gathered crosses pre-established thresholds 27>Match the following Matrix: controls the generation of events and notifications Filter: provides packet capture capability for gathering packets after they flow through a channel Packet capture: performs filter function that enables capture of desired parameters Event: gathers statistics on traffic between pairs of hosts 28>_____enhancement helps keep track of data with the changes in control .______enables an application to download only those rows that changed after a particular time (LastCreateTime/TimeFilter) 29>____table contains row of data._______ table defines the instances of the data rows in the ____table and can be set to gather and store different instances of data (control/data) 30>Match the following controldataSource: is the entity or person that created the entry controlTableSize: identifies the source of the data being collected controlOwner: identifies the entries associated with the data source 31>___________group contains the statistics measured by the probe for each monitored Ethernet interface on a device (matrix/statistics) 32>The history group consists of following subgroups___________ (history control group/history data group/both) 33>_____group controls the periodic statistical sampling of data from various types of networks (history control history data )______ 34>___________group is extremely helpful in tracking the overall trend in the volume of traffic (history control history data ) 35>___________group periodically takes statistical samples on specified variables in the probe and compares them with the preconfigured threshold stored in the probe (statistic/alarm) 36>wrt alarm group, the sampling type is ______value (absolute/delta/either)_____ 37>wrt alarm group, in_____ value, the absolute value of the variable at the end of the previous period is stored as an alarm value.____ value, the absolute value at the end of a period is subtracted from the beginning of the period, and the computed value is stored (delta/absolute)__ 38>An example of _____value is a new interface on a test for infant mortality (delta/absolute)______ 39>An example of _______value is a threshold set to 10000 packets in a 10 second interval for excessive packet loss (delta/absolute)____ 40>______group contains information about the hosts on the network (host top n/host)_____ 41>The host group comprises of following tables a: hostControlTable b: hostTable c: hostTimeTable Ans: ___________ (a/b/c/all) 42>Match the following hostControlTable : contains the same data as the host table but it is stored in the time order in which the host entry was discovered hostTable : controls the interfaces on which the data gathering is done hostTimeTable : contains statistics about the host 43>___________group generates reports ranking the top N hosts in selected statistics categories (host/host top N) 44>________group stores statistics on conversations between pairs of hosts (statistics/matrix) 45>Match the following matrixControlTable : keeps track of the source to destination conversations matrixSDTable : keeps the data by destination to source traffic matrixDSTable : controls the information to be gathered 46>___________group is used to base the capture of filter packets on logical expressions (event/packet capture/filter) 47>wrt filter group, the stream of data based on a logical expression is called___________ (link/channel) 48>The filter group contains ___________ (filter table/channel table/both) 49>___________is a post filter group and it captures packets from each channel based on the filter criteria of packet and channel filters in the filter group (packet capture/channel capture) 50>___________group controls the generation and notification of events (trap/event)

46

NETWORK MANAGEMENT SYSTEMS 51>In RMON Token ring extension group, _____statistics group collects data on token ring parameters .______statistics group collects statistics on the number of packets of various sizes and the type of packets (promiscuous/MAC layer) 52>The data are stored in______. The rings and parameters to be monitored are controlled by_____ (ringStationControlTable/ringStationTable) 53>Match the following Statistics : station order promiscuous statistics : active configuration of ring stations MAC layer history : utilization statistics of source routing information promiscuous history : current utilization and error statistics of the MAC layer ring station : current utilization and error statistics of promiscuous data ring station order : historical utilization and error statistics of promiscuous data ring station configuration : historical utilization and error statistics of source routing : station statistics 54>RMON=___ dealt primarily with data associated with the OSI data link layer (1/2)________ 55>RFC=___for MON2 (2012/2021)________ 56>The RMON2 MIB is arranged in___ groups (9/10/11)________ 57>Match the following Protocol directory : traffic data from each pair of hosts Protocol distribution : traffic data from and to each host Address map : MAC address to network address on the interfaces Network layer host : inventory of protocols Network layer matrix : relative statistics on octets and packets 58>Match the following Application layer host : RMON2 MIB compliances and compliance groups Application layer matrix : configuration of probe parameters User history collection : user specified historical data on alarms and statistics Probe configuration : traffic data by protocol from and to each host RMON conformance : traffic data by protocol between pairs of hosts 59>_____group identifies the protocols that the probe can monitor ._____group provides information on the relative traffic of different protocols (protocol distribution/protocol directory) 60>_____group measures the traffic sent from and to each network address representing each host discovered by the probe.______ group provides information on the conversation between pairs of hosts in both directions (network layer matrix/network layer) 61>The RMON2 conformance group consists of following subgroups___________ (rmon2MIBCompliances/rmon2MIBGroups) 62>There ___groups in rmon2MIBGroups (10/11/12/13)________ 63>Following groups has optional requirement a: rmon1EnhancementGroup b: rmon1EthernetEnhancementGroup c: rmon1TokenRingEnhancementGroup Ans: ___________ (a/b/c/all) 64>RMON=__dealt with data link layer and RMON=___with higher level layers (1/1)______ 65>RFC=___for ATM protocol IDs for RMON2 (2047/2074)________ 66>Extending RMON to____ devices requires design changes and new functionality (token ring/ATM)_______ 67>The ATM RMON MIB is under _____node of the IETF Internet MIB (organizational/experimental)______ 68>Match the following portSelect : ATM per-circuit atmStats : ATM per host statistics atmHost : basic statistics atmMatrix : port selection 69>Following are tables n atmHost group: ___________ (atmStatsControlTable/atmStatsTable/both) 70>atmMatrix contains __data tables and___ control tables (2/3/4)______ 71>The three top groups of users contributing to __ of the Internet traffic were students, newsgroup services, domain (64/74/84) 72>The growth rate of Internet use is about___% (25/50/75)________ 73>___________of the network involves the use of remotely positioned probes in various segments of the network (remote maintaining/remote monitoring) ANSWERS 1>T

47

NETWORK MANAGEMENT SYSTEMS 2>either, either 3>Remote Network Monitoring 4>RMON 5>all 6>T 7>SMI 8>3 9>1757,1513 10>1,2 11>2021 12>9,1,10 13>both 14>OwnerString, EntryStatus 15>OwnerString 16>all 17>1-d 2-c 3-a 4-b 18>1 19>4 20>host & conversation 21>2 22>10 23>3 24>all 25>statistics gathering groups 26>1-c 2-d 3-e 4-b 5-a 27>1-d 2-c 3-b 4-a 28>LastCreateTime,TimeFilter 29>data table 30>1-b 2-c 3-a 31>statistics 32>both 33>history group 34>history group 35>alarm 36>either 37>absolute, delta 38>absolute 39>delta 40>host 41>all 42>1-b 2-c 3-a 43>host top N 44>matrix 45>1-c 2-a 3-b 46>filter 47>channel 48>both 49>packet capture 50>event 51>MAC layer, promiscuous 52>ringStationTable, ringStationControlTable 53>1-d 2-e 3-g 4-f 5-h 6-a 7-b 8-c 54>1 55>2021 56>10 57>1-d 2-e 3-c 4-b 5-a 58>1-d 2-e 3-c 4-b 5-a 59>protocol directory, protocol distribution 60>network layer host, network layer matrix 61>both 62>13 63>b,c

48

NETWORK MANAGEMENT SYSTEMS 64>1,2 65>2074 66>ATM 67>experimental 68>1-d 2-c 3-b 4-a 69>both 70>3,2 71>84 72>50 73>remote monitoring

49

NETWORK MANAGEMENT SYSTEMS

CHAPTER 9: BROADBAND NETWORK MANAGEMENT -- ATM NETWORKS 1>Broadband networks can be classified into following distinct categories: __________ (WAN/access network/both) 2>____is predominantly based on ATM technology .______is based on cable modem, digital subscriber loop and wireless technologies (WAN/access network) 3>__________ISDN is also known as Basic ISDN (wideband/narrowband) 4>__________is a low bandwidth network that can carry two 56 kilobaud rate channels (wideband/narrowband) 5>__________network can transport very high data rate signals (broadband/narrowband) 6>Following are different types of information technology services: a: voice b: video c: data Ans: ___________ (a/b/c/all) 7>______transports signals over long distances between switching offices, and _____covers the last mile from a switching office to the customer's premise (Local loop/WAN) 8>__________ network is also called multimedia networking (narrowband/broadband) 9>___________networks are also called BISDN (narrowband/broadband) 10>Those who provide multimedia services to customers are broadband service providers and are referred to as________ (MOM/MOTIS/MSO) 11>Basic ISDN consisted of two basic channels: ___channels , each with a 56 kilobaud rate, combined with an 8 kilobaud signaling ___ channel (A/B/C/D)___ 12>Broadband networks and services have contributed significantly to advances in following areas a: ATM b: SONET/SDH c: broadband access technology Ans: __________ (a/b/c/all) 13>The ATM technology can be viewed as a hybrid of _____and ______switched transmission modes (packet/message/circuit) 14>The data rate of SONET/SDH WAN is an integral multiple of the basic OC-1/STS, which is ____Mbps (51.84/155.52)_______ 15>Broadband access technology is implemented in one of following ways a: HFC technology b: DSL technology c: wireless technology Ans: ___________ (a/b/c/all) 16>__________is a two way interactive multimedia communication system that uses fiber and coaxial cable facilities and cable modems (DSL/HFC) 17>The customer network consists of following classes a: residential customers b: corporate customers Ans: __________ (a/b/both) 18>wrt broadband service networks, the service providers interface with WAN via___________ (router/gateway) 19>___________network is based on ATM technology and broadband access technology (broadband/corporate) 20>___________network is based on switches with point to point connections in contrast to one to many connections as in_______ (broadcast protocol/ATM) 21>ATM is a connection-oriented protocol (true/false)___________ 22>___________has helped bring about the merger of computer and telecommunication networks (broadband/ATM) 23>Following important concepts comprise ATM technology a: virtual path- virtual circuit b: fixed packet sizes or cells c: small packet sizes d: statistical multiplexing e: integrated services Ans : ___________ (a/b/c/d/e/all)

50

NETWORK MANAGEMENT SYSTEMS 24>___________is an organization that specifies standards for ATM implementation (ATM consortium/ATM forum) 25>Table 9.1___________ 26>In ATM, because the path is fixed for the entire session, the transmission rate is considerably ______than a nonvirtual circuit packet switched network (slower/faster)_____ 27>A virtual path-virtual circuit can be established for each session as needed and removed after the session. This method is called___________ (PVC/SVC) 28>A connection can be established for long periods of time and not switched between sessions, creating _______between a pair of end stations that carry large traffic volumes (SVC/PVC)____ 29>________are established between locations of large corporations (SVC/PVC) 30>ATM packets are of fixed size, each being ___bytes long (53/55)________ 31>The ATM packet size of 53 bytes comprises of a header of___ bytes and a payload of ___bytes (4/5/48/49)_____ 32>The ATM packet size of 53 bytes is chosen by optimizing following factors a: packet size should be as small as possible to reduce the delay in switching and packetization b: packet size should be large enough to reduce the overhead of the header relative to the payload Ans : ___________ (a/b/both) 33>Pure video w/o sound can have___________ priority in terms of delay than a combination of audio and video can (less/high) 34>____ traffic require low tolerance on variations in delay and low end-to-end delays for good interactive communication (data/video/voice/all) 35>___________traffic can have a much higher tolerance on latency because it is primarily a store and forward technology and the traffic itself inherently occurs in bursts (data/video/voice/all) 36>_____main classes of traffic have been defined to implement quality of service (3/4/5)______ 37>Following main classes of traffic have been defined to implement quality of service a: CBR b: VBR-rt c: VBR-nrt d: ABR Ans : ___________ (a/b/c/d/all) 38>in ATM, Transmission of voice is assigned___________ (CBR/VBR-rt/VBR-nrt/ABR) 39>Streaming video such as real time video on the Internet is assigned___________ (CBR/VBR-rt/VBR-nrt/ABR) 40>___________is assigned to transmission of still images (CBR/VBR-rt/VBR-nrt/BR) 41>IP data traffic gets the lowest bandwidth priority___________ (CBR/VBR-rt/VBR-nrt/ABR) 42>There are two markets for ATM switches using ATM technology: ___________ (public/protected/private) 43>_____network is established by service providers. ______network is primarily a campuslike network (public/protected/private) 44>The basic voice band, 0-4 kHz is converted to ___Kbps digital signal universally (16/32/64)________ 45>T1 transmission carrier has a data rate of____ Mbps and carrier ___voice channels (1.544/2.048/24/30)_ 46>E1 transmission carrier has a data rate of____ Mbps and carrier ___voice channels (1.544/2.048/24/30) 47>The digital hierarchy has been synchronized throughout the world using _____Mbps are the basic data rate in carrier technology and using fiber optics (51.84/155.52) ______ 48>The optical carrier starts with the unit of OC-1, which is______ Mbps (51.84/155.52)_____ 49>Advantages of ATM LAN are a: it interfaces nicely with an ATM SONET network b: it is adaptable for a high speed backbone for a camps network that can function at a higher speed than FDDI Ans : ___________ (a/b/both) 50>The services provided by ATM differ from conventional LAN in following ways a: ATM is connection oriented b: ATM makes a one-to-one connection between pairs of workstations in contrast to the broadcast con multicast mode in the conventional LAN c: LAN MAC address is dedicated to the physical network interface card and this is independent of network topology Ans : ___________ (a/b/c/all) 51>LANE stands for___________ 52>___________emulates the services of a current LAN network across an ATM network by using layered architecture (LUNI/LANE) 53>in layered architecture of a LAN emulation, following layers are inserted between the ATM layer and the LLC layer: ___________ (ATM adaptation layer/LAN emulation layer/both) 54>In layered architecture of a LAN emulation, ______interfaces with the ATM layer underneath it, and _____is sandwiched between the ATM adaptation layer and the LLC layer (ATM adaptation layer/LAN emulation layer)

51

NETWORK MANAGEMENT SYSTEMS 55>The ATM forum specified ___________which provides the interface between the user and the LAN emulation layer (LUNI/LANE) 56>LUNI stands for___________ 57>In layered architecture of a LAN emulation, arrange the following in correct sequence (from top to bottom) a: physical layer b: ATM adaptation layer c: logical link control layer d: network layer e: LAN Emulation layer f: ATM Ans : ___________ (fdbcae/fbdaec/fdbace) 58>In layered architecture of a LAN emulation, an ATM end station is called___________ (LE server/LE client) 59>In the LUNI interface, two LECs communicate with each other over an ATM network using___________ (LE client/LE services) 60>Following are LE Services in LUNI interface a: LECS b: LES c: BUS Ans : ___________ (a/b/c/all) 61>LECS stands for___________ 62>LES stands for___________ 63>BUS stands for___________ 64>In the LUNI interface, ___implements assignment of individual LECs to different emulated LANs.____ performs a control coordination function for ELAN , registering and resolving MAC addresses or route descriptors to ATM addresses .____handles data sent by the LEC to a broadcast MAC address, a multicast address, and the initial unicast frames before the address resolution is performed by the LEC (LES/BUS/LECS) 65>Following functions are performed across LUNI in the LUNI interface a: initialization b: registration c: address resolution d: data transfer Ans : __________ (a/b/c/d/all) 66>In LUNI interface, Initialization involves following a: obtaining ATM address of LES that are available on a particular ATM network b: joining or leaving a particular emulated LAN specified by the ATM address of the LES c: declaration whether the LEC across the LUNI is to receive address resolution requests for all unregistered destinations Ans : ___________ (a/b/c/all) 67>Match the following wrt the LUNI interface Initialization : informs the LES of the individual MAC address that the LEC represents and route descriptors for source route bridging Registration : involves obtaining the ATM address representing the LEC with a particular MAC address address resolution : involves transporting the data from source to destination data transfer : involves obtaining ATM address of LES that are available on a particular ATM network 68>ATM is a switch that establishes ___________circuit between input and output ports (connectionoriented/connectionless) 69>In LAN emulation client connections across LUNI, an ATM LAN establishes a virtual circuit connection between pairs of ____going through the switch ( LECS/LEC)______ 70>In LAN emulation client connections across LUNI, ________provides the translation between 20 byte ATM address and the 6 byte MAC address (LEC/LES/LECS) 71>In LAN emulation client connections across LUNI, the LEC sends the broadcast or multicast PDU to the broadcast and unknown server via___________ (collapsed connection/controlled connection) 72>Every LAN emulation client belongs to___________ (LECS/LES/BUS) 73>___________implements the assignment of the individual LEC to various segments (LECS/LES/BUS) 74>The most popular implementation of LAN emulation currently is to use ATM switches in the backbone network of a campus environment called___________ (controlled backbone design/collapsed backbone design) 75>___________is a topology and location independent group of stations that are communicating as though they were on the same physical LAN (VPN/VLAN) 76>The LAN emulation configuration server can be configured to form________group (VPN/VLAN)

52

NETWORK MANAGEMENT SYSTEMS 77>___________network management consists of managing the wide area and local area networks with ATM technology and the access networks from a central office to a remote workstation (narrowband service/broadband service) 78>Wide area network facilities are provided by public service providers, who perform the following management functions a: operation b: administration c: maintenance d: provisioning Ans : ___________ (a/b/c/d/all) 79>ATM networks are classified as both private and public networks (true/false)___________ 80>____________ATM network is an enterprise network (public/private) 81>In the ATM forum management interface reference architecture, ___&____are the interfaces between a private NMS and either an end user or a private network respectively (M1/M2/M3/M4/M5)____ 82>In the ATM Forum management interface reference architecture, a private network management system can access its own network related information in a public network via___ interface to the public network management system (M1/M2/M3/M/M5)_________ 83>In ATM forum management interface reference architecture, ___interface is between the public NMS and the public network. The interface ______is between the NMSs of two service providers (M1/M2/M3/M4/M5)___ 84>The ATM forum defines an ATM link specific view of configuration and fault parameters across a UNI. The specifications for them are contained in the___________ (IETF/ILMI) 85>ILMI stands for___________ 86>The 'I' In ILMI designates___________ (Interim/Integrated) 87>ATM management information is communicated across the UNI or the NNI (true/false)___________ 88>The devices communicate across UNI and NNI via an ATM _______module in the entity (IME/ILMI)____ 89>IME stands for___________ 90>Following are versions of IME a: user b: network c: system Ans : ___________ (a/b/c/all) 91>ILMI communication takes place over both physical and virtual links by means of _________protocol (SNMP/AAL5/either) 92>BICI stands for___________ 93>BICI is also known are___________ (UNI/NNI) 94>The management information baseand the structure of management information required for an ATM network are specified in following document a: one by IETF b: one by ATM forum Ans : ___________ (a/b/both) 95>Major branches of the Internet ATM MIB Are: ___________ (mib2/atmForum/both) 96>The structure of management information is defined in ____syntax. _____associated with ATM is primarily concerned with ATM sublayer parameters (MIB/SMI/ASN.1)__ 97>___________group contains subgroups for each medium of transmission (interface/system/transmission) 98>ATM objects, as defined in the atmMIBObjects group under atmMIB, are specified in RFC=____ (1573/1695)_______ 99>The atmForum Group is subnode ____under the enterprise node (353/335)_______ 100>The atmForum Group contains ___subgroups (3/4/5)________ 101>The atmForum group contains the following subgroups a: atmForumAdmin b: atmForumUni c: atmUniDxi d: atmLanEmulation e: atmForumNetworkManagement Ans : __________ (a/b/c/d/e/all) 102>__________group is defined in the ILMI specification (ATM Administrative /ATM UNI/both) 103>__________group is the ATM interface between DTE and DCE (ATM UNI/ATM DXI) 104>DXI stands for__________ 105>ATM network management uses__________ (SNMP MIB/ATM Forum MIB/both) 106>Match the following System : RFC1695 Interfaces : RFC1407

53

NETWORK MANAGEMENT SYSTEMS ifMIB : RFC1213 Transmission : RFC1573 ds1 : RFC1595 ds3 : RFC1406 sonetMIB: atmMIB: 107>Match the following ifMIB : ATM forum MIB/M3 specification atmMIB : remote monitoring MIB extensions for ATM networks atmForum : ATM administrative atmRmon : ATN user network interface atmForumAdmin : data exchange interface specification atmForumUni : ATN emulated LAN MIB atmUniDxi : SNMP M4 network element view MIB atmLanEmulation : interface types atmForumNetworkManagement : ATM objects 108>ATM objects are specific in RFC=_______ (1965/1695) 109>AME stands for__________ 110>__________protocol is used for communication between the AME in two devices (SNMP/ILMI) 111>Match the following ifXTable : information on the relationship between sublayers ifStackTable : information on the type of packets/frames accepted on an interface ifTestTable : tests that NMS instructs the agent to perform ifRecvAddressTable : additional objects for the interface table 112>Following are transmission modes used for ATM__________ (ds1/ds2/sonet/all) 113>DS1: ___Mbps: : DS3: ____Mbps: : SONET: ___Mbps (n155.52/1.544/44.736) 114>ATM __________group contains information needed to manage the ATN sublayer entities: traffic descriptors, DS3 PLCP, TC sublayer parameters, virtual path link/virtual channel link and their associated cross-connect tables, and performance parameters for AAL5 (system/interface/object) 115>___________specification define the administrative and UNI groups of the ATM forum MIB (IETF/ILMI) 116>__________group defines a general purpose registr for locating ATM network services such as the LECS and the ANS (transmission/administrative) 117>ANS stands for__________ 118>PLCP stands for__________ 119>Match the following atmNoTrafficDescriptor : virtual path link table atmInterfaceConfTable : virtual channel link table atmInterfaceDs3PlcpEntry : ATM traffic descriptor type atmInterfaceTCTable : ATM local interface configuration parameter table atmVpITable : ATM interface DS3 PLCP parameters and state variable table atmVclTable : ATM TC sublayer configuration and state parameters table 120>Match the following atmTrafficDescrParamTable : AAL VCC performance parameters table atmVpCrossConnectIndexNext : virtual cross-connect table atmVpCrossConnectTable : index for virtual channel cross connect table atmVpCrossConnectIndexNext : virtual path cross connect table atmVpCrossConnectTable : index for virtual path cross connect table aal5VccTable : ATM traffic descriptor type and associated parameters 121>Match the following atmfPhysicalGroup : deprecated atmfAtLayerGroup : defines a table of status and parameter information on the virtual path connections atmfAtmStatsGroup : defines a table of status and parameter information on the virtual channel connections atmfVpcGroup : defines the network side IME table containing the user side ATM layer addresses atmfVccGroup : defines a table of physical layer status and parameter information atmfAddressGroup : defines a table of ATM layer status and parameter information 122>Match the following atmfNetPrefixGroup :defines a table of operational parameters related to ABR virtual channel connections atmfSrvcRegistryGroup : defines a table of operational parameters related to ABR virtual path connections atmfVpcAbrGroup : defines the network side IME table containing all services available to the user

54

NETWORK MANAGEMENT SYSTEMS side IME atmfVccAbrGroup : defines a user side IME table of network prefixes 123>__________management interface is between the private NMS and the public NMS (M1/M1/M3/M4/M5) 124>M3 requirements has following classes a: status & configuration monitoring b: virtual configuration control Ans : ___________ (a/b/both) 125>In ATM, M3 class=___requirements are those that a public NMS offers to the customers, monitoring and management of configuration, fault and performance of a specific customer's portion of a public ATM network (1/2/3) ________ 126>In ATM, M3 class=___service provides greater capability to the user , who can request the public NMS to add, delete or change virtual connections between pairs of the customer's UNIs (1/2/3)______ 127>In ATM, M3 class 1 service is offered only for _____configuration (SVC/PVC)______ 128>In ATM, examples of M3 class1 service are a: retrieving performance and configuration information for a UNI link b: public NMS reporting of a UNI link failure via a alarm or trap message to the user NMS Ans : __________ (a/b/both) 129>In ATM, example of M3 class2 service are a: customer wanting to establish a new virtual path b: increase the number of virtual circuits in a given virtual path Ans : ___________ (a/b/both) 130>CNM stands for_________ 131>___________manages both private and public ATN networksCNM/CNP) 132>In ATM , M3 class=___requirements are mandatory, and M3 class=___requirements are optional (1/2/3)_____ 133>M3 class2 functionality is divided into following subgroups a: ATM level subgroup b: VPC/VCC level subgroup c: traffic subgroup Ans : __________ (a/b/c/all) 134>The VPC/VCC level subgroup provides the CNM the ability to modify a: virtual path link configuration and status configuration information b: virtual channel link configuration and status information c: virtual path connection configuration and status information d: virtual channel connection configuration and status information Ans : __________ (a/b/c/d/all) 135>The traffic subgroup provides the CNM the ability to modify a: traffic descriptors and information objects for virtual channel connections b: traffic descriptors and information objects for virtual path connections Ans : __________ (a/b/both) 136>Match the following General UNI protocol stack information : All tables except dsx3ConfigTable, all ATM performance information on customer's UNI : atmInerfaceConfTable of ATM MIB Physical layer performance and status information : dsx3ConfigTable ATM level information configuration information : system group, interface group, SNMP group Physical layer configuration information : ifTable 137>Match the following ATM layer virtual path link configuration and status information : warmStart, coldStart, linkUp, linkDown of SNMP group ATM layer virtual channel link configuration and status information :atmTrafficDescrParamTable of ATM MIB ATM layer virtual path connection configuration and status information : atmVcCrossConnectTable & atmVcCrossConnectIndexNext of ATM MIB ATM layer virtual channel connection configuration and status information: atmVpCrossConnectTable & atmVpCrossConnectIndexNext of ATM MIB ATM layer traffic characterization information : atmVclTable of ATM MIB Event notifications on ATM link going up or down : atmVpITable of ATM MIB 138>Match the following ATM level information configuration information : atmTrafficDescrParamTable in ATM MIB

55

NETWORK MANAGEMENT SYSTEMS Virtual path link configuration and status configuration information : atmVpCrossConnectTable & atmVpCrossConnectIndexNext of ATM MIB Virtual channel link configuration and status information : atmVplTable in ATM MIB Virtual path connection configuration and status information : atmInterfaceConfTable in ATM MIB Virtual channel connection configuration and status information : atmVclTable in ATM MIB Traffic descriptors & info objects for virtual path & channel connections: atmVcCrossConnectTable & atmVcCrossConnectIndexNext of ATM MIB 139>The management of __________ATM networks is primarily the responsibility of network service providers-carriers, PTTs and RBOCs (private/public) 140>To manage public networks, ITU-T has defined _____layer model operations --the TMN (3/4/5)_____ 141>TMN stands for__________ 142>In ATM relationship to TMN layered architecture, __________layer contains network elements (element/element management/network management) 143>Match the following EL : manages network elements EML: manages the network either directly or via EML NML: contains network elements (NE) 144>EML stands for__________ 145>NML stands for__________ 146>A network view of management's physical configuration consists of following ATM networks a: one a single supplier subnetwork b: one a multiple supplier subnetwork Ans: __________ (a/b/both) 147>In a network view of management physical configuration, __________manages the network elements for each subnetwork (subNMS/NMS) 148>The NMS environment can manage both network elements and networks (true/false)__________ 149>The ATM Forum M4 Network element view specifications currently support only__________ (SVC/PVC) 150>Configuration management provides the following functions to manage NEs a: ATM NE configuration identification and change reporting b: configuration of UNIs, BICI, and BISSIs c: configuration of VPL/VCL termination points and cross connections d: configuration of VPC and VCC OAM segment end points e: event flow control, the event forwarding discriminator function Ans : __________ (a/b/c/d/e/all) 151>ATM NE configuration identification and change reporting involves a: operations performed over the craft interface b: human intervention c: customer control channels d: network failures e: protection switching events f: subATM NE component initialization g: secondary effects of atomic operations performed by the management systems Ans : ___________ (a/b/c/d/e/f/g/all) 152>The following set of functions is specified for detecting, isolating and correcting abnormal operations (ie fault management) a: notifying the NMS of a detected failure b: logging failure reports c: isolating faults via demand testing Ans : ___________ (a/b/c/all) 153>In fault management, specific functions are a: failure reporting of the various alarms b: OAM cell loopback testing Ans : _________ (a/b/both) 154>The functions of performance monitoring (management) for an ATM network are a: performance monitoring b: traffic management c: network data collection d: UPC/NPC disagreement monitoring e: performance management control Ans : ___________ (a/b/c/d/all)

56

NETWORK MANAGEMENT SYSTEMS 155>UPC stands for___________ 156>NPC stands for___________ 157>Processing error alarm category has following generic trouble a: storage capacity problem b: memory mismatch c: corrupt data d: software environment problem e: software download failure f: version mismatch Ans : __________ (a/b/c/d/e/f/all) 158>Environmental alarm category has following generic trouble a: cooking fan failure b: enclosure door open c: fuse failure d: high temperature Ans : __________ (a/b/c/d/all) 159>General alarm category has following generic trouble: __________ (vendor specific/version mismatch) 160>_________ alarm category has generic trouble such as AIS, LCD , LOF , LOP , LOS, payload type mismatch, transmission error, path trace mismatch, RDI and Signal label mismatch (Communication/equipment) 161>In performance management, the following specific functions carry out the general functions a: physical layer performance monitoring b: ATM cell level protocol monitoring c: UPC/NPC disagreement monitoring Ans: __________ (a/b/c/all) 162>______network view for the management of an ATM public network is concerned with network management layer information (M1/M2/M3/M4/M5) 163>wrt M4 network view interface, the functional areas addressed in the specifications are a: transport network configuration provisioning b: transport network connection management c: network fault management d: network security management Ans : __________ (a/b/c/all) 164>Transport network provisioning includes (subnetwork provisioning of network nodes and links) a: subnetwork provisioning for the addition and monitoring information on addition, deletions and changes in NEs and their configurations b: link provisioning for the set up, modification and release of subnetwork links Ans : __________ (a/b/both) 165>The M4 network view managed entities support the subnetwork management of reservation and modification of subnetwork connections, link connections, trails and segments which involves a: point-to-point VP/VC subnetwork connections between pairs of end points b: multipoint subnetwork VP/VC connections between pair-wise end points c: link VP/VC connections between subnetworks d: segment set up and support of VP/VC segment termination end points e: trail set up and support of trails containing information on subnetwork connections and links Ans : __________ (a/b/c/d/e/all) 166>The connections release across the M4 interface involves the management of resources to be made available after use, and should support a: release of subnetwork connections and release of resources of both point-to-point and multipoint connections b: release of link connections between subnetworks Ans : __________ (a/b/both) 167>M4 interface management is required to report network view alarms and provide testing to isolate the problems including a: provision of log network alarms within a subnetwork to be retrieved by the NMS b: autonomous notification of failures such as termination point failures c: provision of loopback capability that supports OAM cell loopback along a subnetwork connection or a segment of it Ans : _________ (a/b/c/all) 168>The main security objectives of network security management are a: confidentiality of stored and transferred information b: data integrity of stored and transferred information c: accountability for all ATM network service invocations and for ATM network management activities d: availability of correct access to ATM facilities

57

NETWORK MANAGEMENT SYSTEMS Ans : __________ (a/b/c/d/all) 169>___________generic threats are considered in the threat analysis of an ATM network (5/6/7) 170>Following generic threats are considered in the threat analysis of an ATM network a: masquerade or spoofing b: eavesdropping c: unauthorized access d: loss or corruption of information e: repudiation f: forgery g: denial of service Ans : __________ (a/b/c/d/e/f/g/all) 171>Match the following verification of identities : access control controlled access and authorization : confidentiality Protection of confidentiality, transferred data : integrity Protection of confidentiality, stored data : non-repudiation protection of data integrity, transferred data : user authentication protection of data integrity, stored data : security alarm, audit trail and recovery strong accountability: activity logging: alarm reporting: audit: 172>In LAN emulation, we are concerned with following servers a: LES b: BUS c: LECS Ans : __________ (a/b/c/all) 173>Following MIB modules are under the ATM LANE module a: elanMIB b: lesMIB c: busMIB Ans : ___________ (a/b/c/all)174>In ATM LANE emulation MIB, ___enables a network manager to change the configuration of ELANs .___&____allow reading back the current status of the ELANs (elanMIB/lesMIB/busMIB) 175>ELAN stands for__________ 176>__________MIB deals with information required for a LEC to join an ELAN (VLAN/ELAN) 177>Following manual steps are necessary in creating an ELAN a: create a new ELAN in the elanMIB b: create a LES entry for that ELAN using the lesMIB c: create a BUS entry for that ELAN using the busMIB Ans : __________ (a/b/c/all) 178>The elanMIB consists of following groups a: ELAN administration b: ELAN configuration c: ELAN LECS Ans : __________ (/b/c/all) 179>Match the following wrt elanMIB ELAN administration group : allows the configuration and monitoring of LECS ELAN configuration group : is a registry for the LEC assignment policy types LECS configuration group : provides the configuration for emulated LANs 180>LAN emulation server MIB contains following groups a: LES configuration group b: LES statistics group c: LES-LEC statistics group d: LES fault management group Ans : __________ (a/b/c/d/all) 181>Match the following LES configuration group : is responsible for maintaining a log of errors in LES LES statistics group : provides information on LES configuration and topology LES-LECS statistics group : measures performance and fault data LES fault management group : has the entire LAN emulation ARP request-related counter and error counts on a per LEC-LES pair basis 182>busMIB consists of following groups a: BUS configuration group

58

NETWORK MANAGEMENT SYSTEMS b: BUS statistics group c: BUS fault management group Ans : __________ (a/b/c/all) 183>Match the following BUS configuration : provides information on BUS statistics and BUS LEC statistics BUS statistics : addresses BUS errors and maintains a log of the errors BUS fault management group : provides information on BUS topology 184>__________is between DTE and DCE and connects o a public data network (DSU/DXI) 185>____is a hub or router, and ______is a DSU , which interfaces with an ATM switch (DTE/DCE/DXI) 186>LMI stands for__________ 187>The ATM _______defines the protocol for exchanging information across the DXI and supports DXI-, AALand UNI-specific management information (LES/LMI) 188>__________protocol supports the SNMP management system and the IME running on an ATM switch (LES/LMI) 189>ATM is based on _____transmission (cell/packet)_____ 190>ATM is a hybrid of ____&______mode transmissions (message/packet/circuit) 191>__________, which is an outgrowth of switched hub development, is well suited for the ATM environment (ELAN/VLAN) 192>The OSI standards have identified ___M Interfaces for managing ATM networks (3/4/5)_______ 193>Match the following M1: manages private ATM networks M2: manages ATM network elements M3: manages the network at the network element level using the network element view or at the network management level using the network view M4: is between the NMSs of two service providers M5: manages ATM network elements 194>____defines the management interface of the ATM network for public service providers (M1/M2/M3/M4/M5)______ 195>Number of levels in TMN as defined by OSI standard (4/5/6)__________ 196>Fault, performance and security management specifications are addressed in the __interface specifications (M1/M2/M3/M4/M5) ANSWERS 1>both 2>WAN, access network 3>narrowband 4>narrowband 5>broadband 6>all 7>WAN, local loop 8>broadband 9>broadband 10>MSO 11>B,D 12>all 13>circuit, packet 14>51.84 15>all 16>HFC 17>both 18>gateways 19>broadband 20>ATM, broadcast protocol 21>T 22>ATM 23>all 24>ATM forum 25> 26>faster 27>SVC 28>PVC

59

NETWORK MANAGEMENT SYSTEMS 29>PVC 30>53 31>5,48 32>both 33>less 34>voice & video 35>data 36>4 37>all 38>CBR(Constant Bit Rate) 39>VBR-rt(Variable Bit Rate-real time) 40>VBR-nrt(Variable Bit Rate-non real time) 41>ABR(Adjustable bit rate) 42>private, public 43>public, private 44>64 45>1.544,24 46>2.048,30 47>155.52 48>51.84 49>both 50>all 51>LAN Emulation 52>LANE 53>both 54>ATM adaptation layer, LAN emulation layer 55>LUNI 56>LAN Emulation User Network Interface 57>dcebfa 58>LE client 59>LE service 60>all 61>LE configuration server 62>LE server 63>Broadcast & Unknown Server 64>LECS,LES,BUS 65>all 66>all 67>1-d 2-a 3-b 4-c 68>connection-oriented 69>LEC 70>LES 71>controlled connection 72>BUS 73>LECS 74>collapsed backbone design 75>VLAN 76>LAN 77>broadband service 78>all 79>T 80>private 81>M1,M2 82>M3 83>M4,M5 84>ILMI 85>Integrated Local Management Interface 86>Integrated 87>T 88>IME 89>Interface Management Entity 90>all

60

NETWORK MANAGEMENT SYSTEMS 91>either 92>Broadband Inter Carrier Interface 93>NNI 94>both 95>both 96>ASN.1,MIB 97>transmission 98>1695 99>353 100>5 101>all 102>both 103>ATM DXI 104>Data Exchange Interchange 105>both 106>1-c 2-c 3-d 4-c 5-f 6-b 7-e 8-a 107>1-h 2-i 3-a 4-b 5-c 6-d 7-e 8-f 9-h 108>1695 109>Agent Management Entity 110>ILMI 111>1-d 2-a 3-c 4-b 112>all 113>1.544,44.736, n*155.52 114>object 115>ILMI 116>administrative 117>ATM name answer server 118>Physical Layer Convergence Parameter 119>1-c 2-d 3-e 4-f 5-a 6-b 120>1-f 2-e 3-d 4-c 5-b 6-a 121>1-e 2-f 3-a 4-b 5-c 6-d 122>1-d 2-c 3-b 4-a 123>M3 124>both 125>1 126>2 127>PVC 128>both 129>both 130>Customer Network Management 131>CNM 132>1,2 133>all 134>all 135>both 136>1-d 2-e 3-a 4-b 5-c 137>1-f 2-e 3-d 4-c 5-b 6-a 138>1-d 2-c 3-e 4-b 5-f 6-a 139>public 140>5 141>Telecommunication Management Network 142>element layer 143>1-c 2-a 3-b 144>Element Management Layer 145>Network Management Layer 146>both 147>subNMS 148>T 149>PVC 150>all 151>all 152>all

61

NETWORK MANAGEMENT SYSTEMS 153>all 154>all 155>User Parameter Control 156>Network Parameter Control 157>all 158>all 159>vendor specific 160>communication 161>all 162>M4 163>all 164>both 165>all 166>both 167>all 168>all 169>7 170>all 171>1-e 2-a 3-b 4-a 5-c 6-a 7-d 8-f 9-f 10-f 172>all 173>all 174>elanMIB, lesMIB, busMIB 175>Emulated LAN 176>ELAN 177>all 178>all 179>1-b 2-a 3-c 180>all 181>1-b 2-c 3-d 4-a 182>all 183>1-c 2-a 3-b 184>DXI 185>DTE,DCE 186>Local Management Interface 187>LMI 188>LMI 189>cell 190>packet&circuit 191>VLAN 192>5 193>1-e 2-a 3-b 4-c 5-d 194>M4 195>5 196>M4

62

NETWORK MANAGEMENT SYSTEMS

CHAPTER 10: BROADBAND NETWORK MANAGEMENT 1>Following different types of customers have access to broadband networks a: corporate or enterprise users who have campuswide networks b: service providers c: residential and small business customers who have multimedia requirements Ans: __________ (a/b/c/all) 2>MSO stands for__________ 3>HFC stands for__________ 4>Following types of access technology are currently available to residential and small business customers a: HFC/cable modem b: DSL Ans: __________ (a/b/both) 5>In the case of __________network, information is transmitted to the cable modem at the customer site from an MSO facility (DSL/HFC) 6>The access network based on_______ uses the existing twisted pair loop facility from a central office to the customer premises (DSL/HFC) 7>Different modes of access rely on following technologies a: HFC cable b: DSL c: wireless communication d: satellite communication Ans: ___________ (a/b/c/d/all) 8>Broadband access technologies currently consist of following mutually independent methods a: HFC cable b: DSL c: wireless communication d: satellite communication Ans: ___________ (a/b/c/d/all) 9>___________uses television transmission facilities and cable modems, and is the most widely deployed means of access of the four (HFC/DSL/wireless/satellite) 10>In _____way telephony return configuration, the downstream signal to the customer traverses cable (one/two)______ 11>In____ way HFC mode, both upstream and downstream are handled by the HFC medium using a cable modem (one/two)_______ 12>DSL technology has 3 different implementations and is generally referred to as xDSL , where the x represents asymmetric (A), high speed (H) Or very high speed (V) transmission (true/false)_______ 13>Following broad categories of service are being offered in wireless access technology a: MMDS/WCS b: LMDS c: ISM Ans: ___________ (a/b/c/all) 14>MMDS/WCS stands for___________ 15>LMDS stands for___________ 16>ISM stands for__________ 17>___________operates over the 2500-2686 MHz band and includes both one-way wireless with telephony return and two-way wireless implementations, it has a range of up to 35 miles (MMDS/WCS or LMDS or ISM) 18>___________operates over two frequency bands, it has a range of about 3miles (MMDS/WCS or LMDS or ISM) 19>___________operates over two frequency bands , the lower band has a range of only 0.5 mile but the higher band has a range of up to 15 miles (MMDS/WCS or LMDS or ISM) 20>___________technology is based on existing cable television technology (DSL/HFC) 21>The signal going from the head end to the customer premises is called ___________signal (downstream/forward path/either) 22>The signal going from the customer premises to the head end is called___________ signal (upstream/reverse path/either) 23>NIU stands for___________ 24>NID stands for___________

63

NETWORK MANAGEMENT SYSTEMS 25>At the customer premises, ___________is the demarcation point between the customer network and service provider network (NIU/NID/either) 26>The _________modem converts analog signal to Ethernet output (cable/telephone) 27>Match the following Telephone modem ,28.8 kbps : approximately 1 second ISDN ,4 kbps : 6-8 minutes cable mode, 10 Mbps : 1-1.5 minutes 28>The HFC broadband system with ___can process data much faster than can a conventional____or____ (ISDN/telephone modem/cable modem) 29>HFC technology is based on a: broadband LAN b: asymmetric bandwidth allocation to achieve two way communication c: radio frequency spread spectrum technique for carrying multiple signals over the HFC d: radio frequency spectrum allocation to carry multimedia telephony , television and computer communication services Ans: ___________ (a/b/c/d/all) 30>In Broadband LAN architecture, the downstream signals are in the _____MHz band and the upstream signals are in the______ MHz band (5-42/50/860) 31>In Broadband LAN architecture, the downstream bandwidth of a channel is ____MHz and the upstream bandwidth varies from___ kHz to ____MHz (3.2/6/200) 32>___________modem modulates and demodulates the digital signal from the customer equipment to the radio frequency signal carried on the cable (telephone/cable/either) 33>Following different modulation techniques support different capabilities in cable modem a: ASK b: FSK c: PSL Ans: ___________ (a/b/c/all) 34>In cable modem, the most commonly used modulation technique are___________ (QPSK/QAM/both) 35>_____is the number of bits per second traversing the medium .______is the number of signal units per second (baud rate/bit rate) 36>_____equals ______times the number of bits per symbol (bit rate/baud rate) 37>In____ modulation, the four levels are represented by the four states 0, 90, 270 and 180 (QAM/QPSK)_______ 38>Phase shift keying is limited by the difficulty of detecting small phase shifts (true/false)___________ 39>___________is the preferred method of modulation for the downstream signal in the cable modem (QPSK/QAM) 40>Match the following Toshiba : 40Mbps RCA DCM105 : 38Mbps Cisco : 10Mbps LANcity : 5.36 Msym/sec Motorola: 41>Cable modems with a downstream speed of___ Mbps and an upstream speed of ____Mbps are commonly available now (10/30/40)____ 42>______uses pseudotree topology (DSL/HFC) 43>MCNS stands for___________ 44>DAVIS stands for___________ 45>DOCSIS stands for___________ 46>___________standard being developed by the MCNS is the industry standard for cable modem system specification (DOCSIS/DAVIS) 47>Some cable modems are designed as one way, and the return path is via telephone link called___________ (telco return/telecom return) 48>CMTS stands for___________ 49>All cable modems terminate at a server called ___________at the head end (LMDS/CMTS) 50>___________consists of multiple pairs of optical fibers connecting fiber nodes (DSL plant/HFC plant) 51>In an HFC network, the coaxial cable that connects to the NIU in the home is referred to as___________ in CATV terminology (tap to cable/tap to TV) 52>The spectrum use in HFC extends only to____ MHz (750/860)_______ 53>In Cable modem, the upstream signal is allocated the low end of the spectrum from___ to ___ MHz. The downstream signal is allocated from___ to ___MHz (5/42/54/750)

64

NETWORK MANAGEMENT SYSTEMS 54>Using noisy conditions, the cable modem could dynamically switch to different downstream and upstream channels to improve the quality of service. Such a feature is called_____ (phase agile capability/frequency agile capability) 55>CMCI stands for___________ 56>DOCS-OSSI stands for___________ 57>CMTRI stands for___________ 58>DOCSS stands for___________ 59>RFI stands for___________ 60>In data over cable system reference architecture, the head end is connected to WAN, and multiple head ends can be connected via the WAN to a regional center head end. In such a case, the local head end is referred to as___________ hub (centralized/distribution) 61>DOCSIS places interfaces into following categories a: data interface b: operations support system interfaces and telephony return interface c: RF and security interfaces Ans: ___________ (a/b/c/all) 62>Match the following data interface : RFI ,DOCSS operations support system interfaces & telephony return interface : CMTRI ,DOCS-OSPG RF & security interface : CMCI, CMT-NSI CMTS 63>Management of an HFC system with cable modems is more complex than the management of ___________network (computer/telecommunication/either) 64>Management of ____network is involved with data layers. Management of _______network is involved with physical layer (computer/telecommunication) 65>HFC management encompasses ___________management (data layer/physical layer/both) 66>Following functional area are identified in the management of BIDS a: network maintenance b: subscriber support c: planning Ans: ___________ (a/b/c/all) 67>BIDS stands for___________ 68>At the physical layer, HFC access network management functions include a: detection of errors and corrections of ingress noise interference b: amplifier gains c: signal levels at the cable modems d: power supply voltages Ans: ______ (a/b/c/d/all) 69>At the data link layer, HFC access network management functions include a: traditional configuration management b: fault management c: performance management Ans: ___________ (a/b/c/all) 70>Cable modem and CMTS can be managed with ___________management (SMTP/SNMP) 71>CMTS is also called___________ (trail end reference/head end reference) 72>DOCS stands for ___________ 73>The HFC element management can be divided into following components a: cable modem management b: CMTS management c: HFC link management d: RF spectrum management Ans: ___________ (a/b/c/d/all) 74>The DOCS interface objects group, docsIfMIBObjects, has following subgroups a: base interface objects group b: CM interface objects group c: CMTS interface objects group Ans: ___________ (a/b/c/all) 75>The baseline privacy objects group, docsBpiMIBObjects, has ____subgroups (7/8/9)_______ 76>Match the following docsBpiCmObjects : baseline privacy CMTS multicast control group docsBpiCmBaseTable : baseline privacy CMTS authorization table docsBpiCmTEKTable : baseline privacy CMTS objects

65

NETWORK MANAGEMENT SYSTEMS docsBpiCmtsObjects : baseline privacy CM base and authorization table docsBpiCmtsBaseTable : baseline privacy objects for CM docsBpiCmtsAuthTable : baseline privacy traffic encryption key table docsBpiCmtsTEKTable : baseline privacy CMTS base table docsBpiMulticastcontrol : baseline privacy CMTS traffic encryption key table 77>Match the following docsQosMIBObjects : mapping of flows to service classes docsQosIpPktClass-Table : set of DOCSIS Qos flows active in the device docsQosEthPktClass-Table : contains QOS table docsQosServiceClassGroup : IP packet classification table containing class information on direction, type, flow, source and destination docsQosServiceClassTable : DOCSIS QOS extensions of MIB objects docsQosFlowTable : ethernet packet classification containing information similar to the IP packet docsQosSidToClass-Table : set of DOCSIS QOS service classes defined in the managed object docsQosFlowToClassTable : mapping of service classes to SIDs 78>Match the following docsDevMIBObjects : CPE IP management and anti-spoofing group on cable modems docsDevBase : provides control and logging for event reporting docsDevNmAccessTable : provides information for network downloadable software upgrades docsDevSoftware : extends MIB2 system group with objects needed for cable device system management docsDevServer : Objects of the cable modem and CMTS device docsDevEvnt : defines the minimum level of SNMP access security docsDevFilter : provides information about the progress of the interaction with various provisioning servers docsDevCpe : configures filter at link layer and IP layer for bridged data traffic 79>SMS stands for___________ 80>____________deals with the management of RF spectrum allocations to different digital services both in the downstream and upstream bands (MMS/SMS) 81>the main motivating factor for employing _____for access technology in multimedia service is the preexistence of local loop facilities to most residences (HFC/DSL)______ 82>HDSL stands for___________ 83>ADSL stands for___________ 84>VDSL stands for___________ 85>___________operates at a T1 or E1 data rate in a duplex mode with two pairs of wires (ADSL/HDSL/VDSL) 86>SDSL stands for___________ 87>The duplex mode is defined as___ way communication with the same speed in both direction (one/two)________ 88>___________is the same as the HDSL, except the two way duplex communication occurs ove a single twisted pair (ADSL/SDSL/VDSL) 89>_____&______both operate asymmetrically (ADSL/SDSL/VDSL/HDSL) 90>_____signal has a larger bandwidth than ______signal (downstream/upstream) 91>The difference between ADSL and VDSL is that _______operates at higher data rates over shorter lines than____ (VDSL/ADSL) 92>ATU stands for___________ 93>ATU is also baked the________ modem (HDSL/ADSL) 94>POTS stands for___________ 95>Development is in progress to eliminate the splitter at the customer site. This configuration is referred to as___________ (ADSL lite/HDSL lite) 96>Following are the schemes for separating the upstream and downstream frequency bands: ___________ (FDM/echo cancellation/both) 97>In___________, after the upstream and downstream bands have been separated, each band is divided into one or more high speed channels and one or more low speed channels (FDM/echo cancellation) 98>DSLAM stands for___________ 99>ONU stands for___________ 100>CEBus Stands for___________ 101>PDN stands for__________ 102>SOHO stands for__________ 103>PSTN stands for__________ 104>Real time signals such as audio and real time video, use a fast buffering scheme and hence are referred to as__________ (fast channel/interleaved channel)

66

NETWORK MANAGEMENT SYSTEMS 105>Digital data that can tolerate delay make use of slow buffers and are interleaved between fast signals. The digital data channel is referred to as__________ (fast channel/interleaved channel) 106>ADSL management is __________the line encoding scheme used (dependent on/independent of) 107>CAP stands for __________ 108>DMT stands for__________ 109>The echoing phenomenon occurs in telephone systems because of crosstalk between neighboring pairs of wires in a bundle (true/false)__________ 110>Two signals transmitted from a central office can couple with each other, which is referred to as__________ crosstalk (near end/far end) 111>Two signals traversing in opposite directions can interfere with each other, which is referred to as__________ crosstalk (near end/far end) 112>Near end and far end crosstalk can be mitigated by using __________technique (FDM/echo cancellation) 113>In__________, the entire loop bandwidth is used in the encoding (DMT/CAP) 114>in__________, the entire bandwidth of approximately 1.1 MHz Is split into 256 subchannels, each of an approximately 4 kHz band (DMT/CAP) 115>In DMT, the number of downstream subchannels is either____ if echo cancellation is used or ______if echo cancellation is not used (218/250)_ 116>Management of the ADSL network involves following network elements a: management communications protocol across the network management subinterface of the V interface b: management communications protocol across the U interfaces between ATU-C and ATU-R c: parameters and operations with the ATU-C d: parameters and operations within the ATU-R e: ATU-R side of the T interface Ans: __________ (a/b/c/d/e/all) 117>In ADSL network management elements, the management function at the physical layer involves following entities a: physical channel b: fast channel c: interleaved channel Ans: __________ (a/b/c/all) 118>Match the following ADSL line type : time interval to downshift ADSL line coding : time interval to upshift Target noise margin : mode1- manual, mode2- select at start up, mode3- dynamic Maximum noise margin : modem reduces power above this threshold Minimum noise margin : ADSL coding type Rate adaptation mode : five types-no channel, fast, interleaved, either or both Upshift noise margin : noise margin under steady state Minimum time interval for upshift rate adaptation : modem increase power below this margin Downshift noise margin : threshold for modem increases data rate Minimum time interval for downshift rate adaptation : threshold for modem decrease data rate 119>Match the following Desired maximum rate : vendor specific serial number Desired minimum rate : vendor specific version Rate adaptation ratio : vendor ID assigned by T1E1.4 Maximum interleave delay : Rate down change alarm Alarm thresholds : rate up change alarm Rate up threshold : 15min count threshold on loss of signal, frame, poser, and error seconds Rate down threshold : distribution ratio between fast & interleaved channels for available excess bit rate Vendor ID : maximum transmission delay allowed by interleaving process Version number : minimum rates for ATU-C/R Serial number : maximum rates for ATU-C/R 120>Match the following ADSL line status : initialization failure of ATU-R from ATU-C Alarms thresholds : event generation upon rate changes when shift margis are crossed in both upstream and downstream unable to initialize ATU-R : indicates operational status and various types of failures of the link rate change : generates alarms on failures or crossing of thresholds 121>Match the following line attenuation : 15 min/1 day failure statistics

67

NETWORK MANAGEMENT SYSTEMS noise margin : transmit delay introduced by the interleaving process total output power : rate of modem before the last change maximum attainable rate : data block on which the CRC check is done current rate : current transmit rate to which the modem is adopted previous rate : maximum currently attainable data rate by modem channel data block length : total output power from the modem interleave delay : measured power loss in dB from transmitter to receives ATU Statistics : noise margin in dB of the ATU with respect to received signal 122>The ADSL forum has proposed integrating ADSL MIB with the standard IETF interaces group MIB2 interfaces, ifMIB, and transmission in the following manner a: adslPhysIf: : {transmission 94} b: adslIterIf: : ={transmission 124} c: adslFastIf: : ={transmission 125} Ans: __________ (a/b/c/all) 123>LCS stands for__________ 124>___________access technology is primarily focused on bringing multimedia services to residence (narrowband/broadband) 125>___________carrier information from the head end to the customer premises via fiber optic and coaxial cables (DSL/HFC) ANSWERS 1>all 2>Multiple Systems Operators 3>Hybrid Fiber Coaxial 4>both 5>HFC 6>DSL 7>all 8>all 9>HFC 10>one 11>two 12>T 13>all 14>Multi-channel multipoint distribution service/Wireless communication services 15>Local Multipoint Distribution Service 16>Instructional scientific & medical 17>MMDS/WCS 18>LMDS 19>ISM 20>HFC 21>either 22>either 23>Network Interface Unit 24>Network Interface Device 25>NID 26>cable modem 27>1-b 2-c 3-a 28>cable modem, telephone modem, ISDN 29>all 30>50-860,5-42 31>6,200,3.2 32>cable 33>all 34>both 35>bit rate, baud rate 36>bit rate, baud rate 37>QPSK 38>T 39>QAM 40>1-d 2-b 3-b 4-c 5-a

68

NETWORK MANAGEMENT SYSTEMS 41>40,10 42>HFC 43>Multimedia Cable Network System 44>Digital Audio/Video Interoperability Council 45>Digital Over Cable Service Interface Specifications 46>DOCSIS 47>telco return 48>Cable Modem Termination System 49>CMTS 50>HFC 51>tap to TV 52>860 53>5-42,54-750 54>frequency agile capability 55>Cable Modem to CPE Interface 56>Data Over Cable Service Operations Support System Interface 57>Cable Modem to Telco Return Interface 58>Data Over Cable Security System 59>Cable Modem to RF Interface 60>distribution 61>all 62>1-c 2-b 3-a 63>either 64>computer communication, telecommunication 65>both 66>all 67>Broadband Interactive Data Services 68>all 69>all 70>SNMP 71>head end reference 72>Data Over Cable System 73>all 74>all 75>3 76>1-e 2-d 3-f 4-c 5-g 6-d 7-h 8-a 77>1-e 2-d 3-f 4-c 5-g 6-b 7-h 8-a 78>1-e 2-d 3-f 4-c 5-g 6-b 7-h 8-a 79>Spectrum Management System 80>SMS 81>DSL 82>High Data Rate Digital Subscriber Line 83>Asymmetric Digital Subscriber Line 84>Very high data rate Digital Subscriber Line 85>HDSL 86>Single line Digital Subscriber Line 87>two 88>SDSL 89>ADSL, VDSL 90>downstream, upstream 91>VDSL, ADSL 92>ADSL Transmission Unit 93>ADSL 94>Plain Old Telephone Service 95>ADSL Lite 96>both 97>FDM 98>Digital Subscriber Line Access Multiplexer 99>Optical Network Unit 100>Consumer Electronics Bus 101>Premises Distribution Network 102>Small Office Home Office

69

NETWORK MANAGEMENT SYSTEMS 103>Public Switched Telephone Network 104>fast channel 105>interleaved channel 106>dependent on 107>Carrierless Amplitude Modulation 108>Discrete Multi-tone 109>T 110>near end 111>far end 112>echo cancellation 113>CAP 114>DMT 115>250,218 116>all 117>all 118>1-f 2-e 3-g 4-d 5-h 6-c 7-i 8-b 9-j 10-a 119>1-j 2-i 3-g 4-h 5-f 6-e 7-d 8-c 9-b 10-a 120>1-c 2-d 3-a 4-b 121>1-h 2-i 3-g 4-f 5-e 6-c 7-d 8-b 9-a 122>all 123>Line Code Specific 124>broadband 125>HFC

70

NETWORK MANAGEMENT SYSTEMS

CHAPTER 13: NETWORK MANAGEMENT APPLICATIONS 1>The management of networked information services involves __________ resources (system/network/both) 2>OSI defines network management as___ layer architecture (5/6/7) 3>In OSI network management, at the highest level is __________management that deals with the functions associated with managing an enterprise (service/business) 4>In OSI, __________level deals with network management or system management (third/fourth) 5>In OSI, network management aggregates and correlates data from network element management activities at __________level (third/fourth) 6>Network management applications include a: configuration management b: fault management c: performance management d: security management e: accounting management Ans: ___________ (a/b/c/d/d/all) 7>___________management involves detecting a fault as it occurs in the network and subsequently locating its source (security/fault) 8>___________security is concerned with preventing illegal access to information by unauthorized personnel (system/network) 9>The business health of an enterprise depends on well maintained ___________management (accounting/performance) 10>In OSI, _____management at the third level and ______management at the fourth level of the hierarchy are based on both technical considerations and policy decisions (network/business/service) 11>___________management in network management is normally used in the context of discovering network topology, mapping the network and setting up configuration parameters in management agents and management systems (configuration/performance) 12>Network provisioning is considered to be part of __________management (configuration/performance) 13>Network provisioning is also called ___________provisioning in the telephone industry (circuit/connection) 14>______is a circuit from the originating switching center to the destination switching center (trunk/trace) 15>In network provisioning, planning and inventory systems are integrated with design systems to build an overall system referred to as___________ (service of systems/system of systems) 16>TIRKS stands for__________ 17>TMN stands for___________ 18>___________is used in the automated circuit provisioning of trunks, which are logical circuits between switching offices and traverse many facilities (TIRKS/TMN) 19>In___________ packet switched circuit, each packet takes an independent path and the switching of each packet by the routers at various nodes is based on the load in the links (connection-oriented/connectionless) 20>In___________ communication, excess packets can be stored in buffers in routers or retransmitted in the event that packets are lost or discarded (stop&wait/store&forward) 21>In___________ circuit communication, permanent and switched virtual circuit demands need to be accommodated for end-to-end demands on the various links (connection-oriented/connectionless) 22>Provisioning of the links is based on a: average demands b: peak demands c: performance statistics d: quality of service requirements Ans: ___________ (a/b/c/d/all) 23>Network provisioning for packet switched network is based on a: average demands b: peak demands c: performance statistics d: quality of service requirements Ans: ___________ (a/b/c/d/all) 24>Fault management involves following processes a: fault detection b: fault location c: service restoration

71

NETWORK MANAGEMENT SYSTEMS d: identification of problem's root cause e: problem resolution Ans: ___________ (a/b/c/d/e/all) 25>Fault detection is accomplished by using a: polling scheme b: generation of traps Ans: ___________ (a/b/either) 26>One of the advantages of_____ over ______is that failure detection is accomplished faster with less traffic overhead (traps/polling) 27>The ideal solution to locating and isolating the fault is to have___________ solution (artificial intelligence/agile intelligence) 28>___________is a system tool used to measure traffic monitoring on Ethernet LANs (Protocol sniffer/protocol analyzer) 29>___________management involves data monitoring, problem isolation, performance tuning, analysis of statistical data for recognizing trends, and resource planning (fault/performance 30>The parameters that can be attributed to defining network performance on a global level are a: throughput b: response time c: network availability d: network reliability Ans: ___________ (a/b/c/d/al) 31>The response time of a network depends on___________ performance (network/system/both) 32>The application responsiveness on the network, more than any other measure, reflects whether the network is meeting the end users' expectations and requirements (true/false)___________ 33>Following are different types of metrics to measure application responsiveness a: application availability b: response time between user and server c: burst frame rate is the rate at which the requested data arrives at the user station Ans: ___________ (a/b/c/all) 34>RFC=____defines the architecture for the measurement and reporting of network traffic flows (2063/2036) 35>The network is characterized as traffic passing through following representative levels a: backbone networks b: regional network c: stub/enterprise d: end systems or hosts Ans: ___________ (a/b/c/d/all) 36>The architecture defines following entities for traffic flow measurements a: meters b: meter readers c: managers Ans: ___________ (a/b/c/all) 37>Data monitoring i the network for abnormal performance behavior are detected by___________ messages generated by RMON probes (poll/trap) 38>___________are used in tuning a network, validating a service level agreement (problem isolation/performance statistics) 39>SLA stands for___________ 40>The variation in network delay is known as___________ (wander/jitter) 41>When a centralized network management system receives a trap or a notification , it is called___________ (sending an event/receiving an event) 42>The method used by management system to correlate all the events and to isolate the root cause of the problem is called ___________techniques (receiving an event/event correlation) 43>Several correlation techniques are used to isolate and localize fault in networks. All are based on a: detecting and filtering of events b: correlating observed events to isolate and localize the fault either topologically or functionality c: identifying the cause of the problem Ans: ___________ (a/b/c/all) 44>Following are different approaches to correction techniques a: rule based reasoning b: model based reasoning c: case based reasoning d: codebook e: state transition graph model f: finite state machine model Ans: ___________ (a/b/c/d/e/f/all)

72

NETWORK MANAGEMENT SYSTEMS 45>Rule based reasoning is also known as___________ (rule based expert system/expert system, production system and blackboard system/all) 46>RBR stands for___________ 47>In RBR, following levels represent the different components a: data level b: control level c: knowledge level Ans: ___________ (a/b/c/all) 48>In RBR, the knowledge base contains expert knowledg as to a: definition of a problem in the network b: action that needs to be taken if a particular condition occurs Ans: ___________ (a/b/both) 49>In RBR, the knowledge base information is rule-based in the form of___________ (if then/condition action/either) 50>If the antecedent and action in the rule do not match, the paradigm breaks and it is called___________ (breakdown/brittle) 51>If the antecedent and action in the rule do not match, the paradigm. However, it can be fixed by adding more rules, but doing so increases the database size and degrades performance called___________ (knowledge acquire bottleneck/knowledge acquisition bottleneck) 52>In___________ based reasoning, an event correlator is built on an object oriented model associated with each managed object (rule/model/case) 53>CBR stands for___________ 54>In_____, the unit of knowledge is a rule whereas in______, the unit of knowledge is a case (case/rule/model) 55>The intuition of___________ based reasoning is that situations repeat themselves in the real world and that what was done in one situation is applicable to others in a similar, but not necessarily identical, situation (rule/case/model) 56>___________approach uses knowledge gained previously and extends it to the current situation (rule/case) 57>In CBR, the current trouble is resolved by adapting the previous case in one of following ways a: parameterized adaptation b: abstraction/respecialization adaptation c: critic based adaptation Ans: ___________ (a/b/c/all) 58>___________adaptation is used when a similar case exists in the case library, but the parameters may have to be scaled to resolve the current situation (critic/abstraction/parameterized) 59>In___________ based adaptation, a critic or craft person decides to add, remove, reorder or replace an existing solution (critic/abstraction/parameterized) 60>The core modules of CRITTER as a: input b: retrieve c: adapt d: process Ans: ___________ (a/b/c/d/all) 61>The CRITTER application has evolved into a CBR application for network management named___________ (Spectrum/SpectroRx) 62>In_____, the retrieval is based on an exact match whereas in______, the retrieval is based on a partial match (RBR/CBR) 63>_____is applied to an iterative cycle of micro-events, but ______is applied as a total solution to the trouble and then adapted to the current situation (RBR/CBR) 64>In___________ model, problem events are viewed as messages generated by a system and encoded in sets of alarms that they cause (state transition graph/codebook correlation/finite state machine) 65>SMARTS stands for___________ 66>___________model is used in Seagate's NerveCenter correlation system (state transition graph/codebook correlation) 67>The main feature of___________ model is that it is a passive testing system based on the assumption that an observer agent is present in each node and reports abnormalities to a central point (state transition graph/codebook correlation/finite state machine) 68>The main difference between finite state machine and state transition graph model is that former is____ system and that the latter is _______system (active/passive) 69>Security management is ___________consideration in information management (technical/administrative/both) 70>Following are different types of security threats to network management a: modification of information b: masquerade c: message stream modification d: disclosure

73

NETWORK MANAGEMENT SYSTEMS Ans: ___________ (a/b/c/d/all) 71>The SNMPv___ security subsystem is the USM (1/2/3) 72>USM stands for___________ 73>USM has following modules: ___________ (authentication/privacy/both) 74>_____addresses data integrity and data origin .______is concerned with data confidentiality, message timeliness and limited message protection (authentication/privacy) 75>An enterprise's policy should address both access and security breaches (true/false)___________ 76>The IETF workgroup that generated RFC=____defines a security policy as "a formal statement of the rules by which people who are given access to an organization’s technology and information assents must abide" (2169/2196) 77>NCSC stands for___________ 78>NCSC has published what is known as ___________book, which contains a rating scheme for computers and is a framework for setting security policies and procedures (red/orange/blue) 79>A basic guide for setting up policies and procedures includes the following a: identify what you are trying to protect b: determine what you are trying to protect it from c: determine how likely the threats are d: implement measures that will protect your assets in a cost-effective manner e: review the process continuously and make improvements if weaknesses are found Ans: ___________ (a/b/c/d/e/all) 80>____________is used to screen traffic going in and out of the secure network (firewall/filter) 81>The main purpose of ___________is to protect a network from external attacks (firewall/filter) 82>Firewall can be implemented in a router, gateway or special host (true/false)___________ 83>Following are benefits of implementing a firewall to a network a: it reduces the risk of access to hosts from an external network by filtering insecure services b: it can provide controlled access to the network so that only specified hosts or network segments can access some hosts c: it reduces the annoyance to internal users while controlling the external users Ans: ___________ (a/b/c/all) 84>___________is based on protocol specific criteria (packet filtering/application gateway) 85>___________is done at the OSI data link, network and transport layers (packet filtering/application gateway) 86>Packet filters are implemented in some commercial routers called___________ (screening routers/packet filtering routers/either) 87>Packet filtering is done on the following parameters a: source &destination IP address b: source &destination TCP/UDP port Ans: ___________ (a/b/both) 88>Testing and debugging are difficult in___________ (packet filtering/application gateway) 89>___________makes sure that information has not been tampered with as it mves between source and destination.__________ verifies originator identification (integrity protection/authentication validation) 90>___________means secret writing (cryptanalysis/cryptography) 91>___________deals with techniques of transmitting information from a sender to a receiver w/o any intermediary being able to decipher it (cryptanalysis/cryptography) 92>In__________ cipher, each letter is replaced with another letter, which is three letters latter in the alphabet (monoalphabetic/caesar) 93>In___________ cipher, each letter is replaced uniquely with another letter that is randomly chosen (polyalphabetic/monoalphabetic) 94>DES uses___ bit key and IDEA uses ____bit key (56/64/128) 95>______is designed for efficient hardware implementation and consequently performs poorly if implemented in software. In contrast, _____functions efficiently in software implementations (IDEA/DES) 96>In____ key cryptography, each pair of users must have a secret key (public/private) 97>In___________ cryptography, the same key is use for encryption and decryption (secret/public) 98>The secret key cryptography is ___________ (symmetric/asymmetric) 99>The Diffie Hellman algorithm is the oldest___________ key algorithm (secret/public) 100>RSA is___________ efficient than either of the secret key algorithms, DES or IDEA (less/more) 101>__________involves calculating a checksum based on the data in the frame or packet at the sending end and transmitting it along with the data (MD5/CRC) 102>__________takes as input a message of arbitrary length producing output consisting of a 128 bit message digest of the input (SHS/MD5 utility) 103>__________can handle a maximum message length of 2^64 bits (SHS/MD5) 104>_____produces a 160 bit output whereas _____output is 128 bits long (SHS/MD5) 105>Following are features of message digest

74

NETWORK MANAGEMENT SYSTEMS a: there is a one-to-one relationship between the input and output messages b: output digest is of constant length for a given algorithm with chosen parameters, irrespective of the input message length c: generation of a message digest is a one way function Ans: __________ (a/b/c/all) 106>The digital signature is the reverse of __________key cryptography (secret/public) 107>_____is verification of the user's identification, and _____is the granting of access of the information (authorization/authentication) 108>Following are different types client/server environments and the implementation of authentication in each a: host/user environment b: ticket-granting system c: authentication server system d: authentication using a cryptographic function Ans: __________ (a/b/c/d/all) 109>Kerberos consists of an authentication server and a ticket granting server (true/false)__________ 110>Following are different secure mail systems a: PEM b: PGP c: X.400 based mail system Ans: __________ (a/b/c/all) 111>PEM stands for__________ 112>PEM services include a: confidentiality b: authentication c: message integrity assurance d: non-repudiation of origin Ans: __________ (a/b/c/d/all) 113>Following are PEM processes based on message integrity and encryption a: MIC-CLEAR b: MIC-ONLY c: ENCRYPTED Ans: __________ (a/b/c/all) 114>In PEM, the specification provides following types of keys__________ (DEK/IK/both) 115>DEK stands for___________ 116>__________is a secure mail package developed by Phil Zimmerman that is available in the public domain (PGP/PEM) 117>IDEA i ________efficient than RSA (less/more) 118>PGP is similar to__________ PEM (ENCRYPTED/DECRYPTED) 119>The main difference between PGP & PEM is how the _______key is administered (secret/public) 120>__________are programs that, when executed, cause harm by making copies and inserting them into other programs (worms/viruses) 121>Accounting management is probably the__________ developed network management application (most/least) 122>Reports can be classified into a: planning and management reports b: system reports c: user reports Ans: __________ (a/b/c/all) 123>__________reports keep upper-level management apprised of the status of network and system operations (planning-management/system/user) 124>Match the following Qos/service level agreement : function , use, personnel traffic trends : current status, technology needs projection technology trends : network &system availability, problem reports, service response cost of operations : traffic patterns , analysis of internal &external traffic volume 125>Match the following Traffic : network/servers, applications Failures : traffic load internal & external Performance : network & system failures 126>The engineering and operations functions require _________oriented reports (application/operation) 127>Service level management is defined as the process of a: identifying services and characteristics associated with them

75

NETWORK MANAGEMENT SYSTEMS b: negotiating a service level agreement c: deploying agents to monitor and control network , system and application component performance d: producing service level reports___________ 128>OMG stands for__________ 129>SLA stands for___________ 130>_________is a contract between the service provider and the customer, specifying the services to be provided and the quality of those services that the service provider promises to meet (SLA/SHS) 131>The objective of___________ management is to ensure customer satisfaction by meeting or exceeding the commitments made in the SLA and to guide policy management (service/configuration/performance) 132>Following are different categories of OSI application functions a: configuration b: fault c: performance d: security e: accounting Ans: ___________ (a/b/c/d/e/all) 133>__________management involves setting & resetting the parameters of network components, and network provisioning & inventory management (configuration/performance) 134>Fault detection consists of__________ (fault detection/fault isolation/both) 135>Following are different classes of management of info service reports__________ (planning& management/system/user/all) ANSWERS 1>both 2>5 3>business 4>third 5>fourth 6>all 7>fault 8>network 9>accounting 10>network, service 11>configuration 12>configuration 13>circuit 14>trunk 15>system of system 16>Trunk Integrated Record Keeping System 17>Telecommunications Management Network 18>TIRKS 19>connectionless 20>store&forward 21>connection oriented 22>all 23>all 24>all 25>either 26>traps, polling 27>artificial intelligence 28>protocol analyzer 29>performance 30>all 31>both 32>T 33>all 34>2063 35>all 36>all 37>trap 38>performance statistics 39>Service Level Agreement

76

NETWORK MANAGEMENT SYSTEMS 40>jitter 41>receiving an event 42>event correlation 43>all 44>all 45>all 46>Rule Based Reasoning 47>all 48>all 49>either 50>brittle 51>knowledge acquisition bottleneck 52>model 53>Case Based Reasoning 54>RBR,CBR 55>case 56>CBR 57>all 58>parameterized adaptation 59>critic 60>all 61>SpectroRx 62>RBR,CBR 63>RBR,CBR 64>codebook correlation 65>System Management ARTS 66>state transition graph 67>finite state machine 68>passive, active 69>both 70>all 71>3 72>User Based Security Model 73>both 74>authentication module, privacy module 75>T 76>2196 77>National Computer Security Center 78>Orange 79>all 80>firewall 81>firewall 82>T 83>all 84>packet filtering 85>packet filtering 86>either 87>both 88>packet filtering 89>integrity protection, authentication validation 90>cryptography 91>cryptography 92>caesar 93>mono-alphabetic 94>56,128 95>DES, IDEA 96>private 97>secret 98>symmetric 99>public 100>less 101>CRC

77

NETWORK MANAGEMENT SYSTEMS 102>MD2 utility 103>SHS 104>SHS,MD5 105>all 106>public 107>authentication, authorization 108>all 109>T 110>all 111>Privacy Enhanced Mail 112>all 113>all 114>both 115>Data Encrypting Key 116>PGP 117>more 118>ENCRYPTED 119>public 120>virus 121>least 122>all 123>planning & management 124>1-c 2-d 3-b 4-a 125>1-b 2-c 3-a 126>operation 127>all 128>Object Modeling Group 129>Service Level Agreement 130>SLA 131>service 132>all 133>configuration 134>both 135>all

78

View more...

Comments

Copyright ©2017 KUPDF Inc.
SUPPORT KUPDF