MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS
1.
2. NETWORK MANAGEMENT SYSTEMS
1
CHAPTER 1: DATA COMMUNICATION &
NETWORK MANAGEMENT OVERVIEW
1>The architecture of the telephone network is hierarchical (true/false)__________
2>In telephone network model, there are ____levels of network switches and ____types of trunks that connect
these switches (3/5/5)
3>__________is a logical link between two switches that may traverse one or more physical links (loop/trunk)
4>In telephone network model, the end office is the __________in the hierarchy (lowest/highest)
5>figure 1.1__________
6>Match the following
Regional center : class 4 switch
Sectional center : class 5 switch
Primary center : class 1 switch
Toll center : class 3 switch
End office : class 2 switch
7>In telephone network model, the customer's telephone or PBX which is a switch on the customer premises , is
connected to the end office via a dedicated link called___________ (trunk/loop)
8>Toll switches carry long distance calls (true/false)___________
9>DDD stands for___________
10>In telephone network model, _______ (DET/DDD)network enables up to dial the far end telephone w/o an
operator’s assistance, comprises___ transmission trunks (2/3/4)
11>Match the following
direct trunk :connects any two toll offices
toll connecting trunk :connects an end office to any toll office
toll (internal) trunks :connects two end offices
12>In telephone network model , a circuit connection is set up
a: directing using a local trunk
b: via the higher level switches and routes
Ans :__________ (a/b/either)
13>In telephone network model, primary and secondary routes are already programmed into the___________
(bridge/switch)
14>Operations support systems ensure the quality of service in the telephone network (true/false)___________
15>The quality of the call, measured in terms of SNR is measured regularly by a trunk maintenance
system________ (true/false)
16>NOC stands for__________
17>For a given region, there is ___________where the global status of the network is monitored (PBX/NOC)
18>___________is the nerve center of telephone network operations (PBX/NOC)
19>The telephone network is managed from the perspective o_________ (service provider/user)20>In telephone
network, with the emphasis on the users' point of view, the first objective in operations is_____ and then ______
(quality & economy of service/restoration of service)
21>POTS stands for___________
22>___________communications technology deals with the theories of electrical engineering, computer
engineering, and computer science and their application to all types of communications over networks
(telecommunication/data/network)
23>A basic network can be viewed is interconnected ________ (nodes/links/both)
24>___________carrier information from one node to another that is directly connected to it (network/link)
25>A node behaves as
a: end node
b: intermediate node
Ans:___________ (a/b/both)
26>If the node behaves as_____ node, information either originates or terminates there. ______node redirects the
information from one link to another (intermediate/end)
27>In telephone network model, End office nodes behaves as___________ (intermediate/end)
28>Each ___________node has connection to a user interface , if the information originates or terminates there
(intermediate/end)
29>DTE stands for___________
30>___________is any equipment that generates or accepts digital data (DDD/DTE)
VTU
N
O
TESBYSR
I
3. NETWORK MANAGEMENT SYSTEMS
2
31>Data can be transmitted in
a: analog format
b: digital format
Ans:___________ (a/b/either)
32>The __________data is sent either as base band or on top of a carrier (digital/analog)
33>___________data is generated either directly by the user equipment or as analog data and converted to digital
data (digital/analog)
34>ISDN stands for___________
35>Long distance data transmission today is mostly ___________due to its superior price and performance
(digital/analog)
36>The data can be transmitted in following modes
a: circuit switches
b: message switched
c: packet switches
Ans:___________ (a/b/c/all)
37>In__________ switched mode , a physical circuit is established between the originating and terminating ends
before the data is transmitted (circuit /
message/ packet switches)
38>In_____ &______switched modes, the data is broken into packets and each packet is enveloped with the
destination and originating addresses (circuit /
message/ packet switches)
39>___________switched mode is used to send long messages such as email (circuit /
message/ packet switches)
40>___________switched mode is used to transmit small packets used in applications such as interactive
communication (circuit /
message/ packet switches)
41>In telephone network, _____&_____open each packet to find the destination address and forward the data to
the appropriate output links (switch/bridge/router)
42>In _________switched mode, each packet may take a different route (circuit/packet)
43>The main difference between packet and message switching is that in the ___________the data is stored by the
system and then retrieved by the user at the later time (former/latter)
44>In___________ switched mode, the packets are fragmented and reassembled in almost real time
(message/packet)
45>email is an example of_________ switched mode (message/packet)
46>PSDN stands for___________
47>Network communications are classified as either _____or______ communication (tele/wireless/data)
48>Telecommunication network is a __________switched network that is structured as a public network accessible
by any user (message/circuit)
49>Data communication network is also called computer communication network (true/false)___________
50>___________transfer the information from digital to analog at source and back to digital at destination
51>In corporate data and telecommunication networks, the computer terminals are connected to___________
which manages the local terminals and provides a single interface to the telephone network (onsite switch
PBX/onsite communication controller)
52>In corporate data and telecommunication networks, the telephones are connected locally by ___________
which interfaces to the telephone network (onsite switch PBX/onsite communication controller)
53>Processor to processor communications over the telecommunications lines take _____time and therefore
are______ expensive (less/more)
54>SNA stands for___________
55>In SNA, the host is connected to the terminals via the _____controllers and ______controllers
(communications/cluster/both)
56>In SNA, _____ controllers manage the DTEs at the peripheral nodes and the ______controllers manage the
traffic at the subnetwork levels (communications/cluster/both)
57>DCE stands for___________
58>The system of links that connect remote LANs is called___________ (MAN/WAN)
59>A LAN is physically connected to a WAN link by ______or _____at each end (switch/bridge/router)
60>Important aspects of DCEs are
a: the different platforms and applications running on DCEs have the ability to communication with each other
b: the ability of the processors attached to LANs do multiple functions
Ans: ___________ (a/b/both)
61>The processor that requests a service is called the _____, and the processor that provides the service is called
the______ (server/client)
VTU
N
O
TESBYSR
I
4. NETWORK MANAGEMENT SYSTEMS
3
62>The process that initiates a transaction to run an application in either a local or remote processor is called the
_____.The application process that is invoked by a _____ is called the______ (server/client)
63>In client/server architecture, the ____initiates the request and the _______responds (server/client)
64>Client cannot initiate a process in the server (true/false)___________
65>A real world analogy of the client/server operation is a post office (true/false)___________
66>The communication between operative computing processes is called ___________communication (end to
end/peer to peer)
67>___________is a suite of protocols that enable networks to be interconnected (UDP/IP or TCP/IP)
68>IP is a _____ protocol. TCP is a ______protocol. UDP is a ______protocol (connection
oriented/connectionless)
69>Most of Internet traffic really uses___________ because of the reliability of data transmission (UDP/IP or
TCP/IP)
70>The Internet is a network of networks (true/false)___________
71>___________serve as the interface between dissimilar and independent , autonomous , networks and perform
many functions including protocol conversions (routers/gateways)
72>Autonomous networks have little knowledge each other's attributes , configurations and addresses and yet
communication is automatically facilitated by a hierarchy of Internet servers along the path
(true/false)___________
73>Email messages are transmitted by a___________ scheme all along the path (stop & wait/ store & forward)
74>Internet users are currently doubling n population each year (true/false)___________
75>In layered architecture, the workstations belong to the___________ plane (LAN/user)
76>in layered architecture, the interfaces are defined as the fabrics (true/false)___________
77>In Internet fabric model, the LAN and WAN planes interface through _____fabric. The WANs in the WAN
plane interface via the______ fabric (gateway/switching)
78>In Internet fabric model, the user's workstation interfaces to a LAN via a ___________interface
(gateway/switching/MAC)
79>In Internet fabric model, LANs interface to a WAN by a switching fabric of ___________
(bridges/routers/switches/all)
80>____________fabric interconnects different WANs (gateway/switching)
81>_____is a private network and access to it is controlled by the enterprise that owns it, whereas______is public
(internet/intranet)
82>In communication lingo, commonality can be interpreted as _____and procedures as______
(protocols/standards)
83>___________can be defined as the basic structure of a system that shows its functional components and the
relationships among the
84>___________architecture describes the functional components of a communication network as well as the
operational interfaces among them (network/communication)
85>The operational procedures are specified in terms of ___________ (standards/protocols)
86>Standardization of___________ involves agreement in the physical characteristics and operational procedures
of communication equipment that performs similar functions (policy/protocol)
87>Email exchange across the world is possible because most vendors have adopted the standard ___________in
their software (MIME/SMTP)
88>Each system can be divided into ______broad sets of communication layers (2/3/4)
89>in communication architecture , top set of layers consists of the _____layers and the bottom set of the______
layers (transport/application)
90>The data can be transmitted in one of____ modes (2/3/4)
91>The ISO has developed a highly modular or layered , architecture for communication protocols that is called
the OSI reference model , published as OSI RM--ISO______ (7948/749)
92>OSI reference model was developed based on the premise that
a: the different layers of protocol provide different services
b: each layer can communicate with only its own neighboring level
Ans:___________ (a/b/both)
93>In OSI reference model, two systems can communicate on a ___________level (end to end/peer to peer)
94>In OSI reference model, layers __ __are the transport system protocol layers; and layers ______are application
support protocol layers (1/2/3/4/5/6/7)
95>In OSI reference model, the intermediate system is involved only up to the first ________layers in the process
(3/4)
VTU
N
O
TESBYSR
I
5. NETWORK MANAGEMENT SYSTEMS
4
96>Match the following
Physical :provides application specific protocols for each application and each transport protocol
system
Data link :establishes and clears sessions for applications, and thus minimizes loss of data during large
data exchange
Network :forms the switching/routing layer of the network
Transport :multiplexes and de-multiplexes messages from applications
Session :transfers to and gathers from the physical medium raw bi data
Presentation :Consists of two sublayers LLC and MAC
Application :provides a set of standard protocols so that the display would be transparent to syntax of the
application
97>_____formats the data to go on the medium; performs error control and flow control.______ controls data
transfer to and from LAN; resolves conflicts with other data on LAN (MAC/LLC)
98>Identify feature of transport layer in OSI reference model
a: multiplexes and demultiplexes messages from applications
b: acts as a transparent layer to applications and thus isolates them from the transport system layers
c: makes and breaks connections for connection-oriented communication
d: controls flow of data in both directions
Ans:___________ (a/b/c/d/all)
99>Identify features of physical layer in OSI reference model
a: provides a set of standard protocols so that the display would be transparent to syntax of the application
b: transfers to and gathers from the physical medium bit data
c: data encryption and decryption
d: handles physical and electrical interfaces to the transmission medium
Ans:___________ (a/b/c/d/all)
100>Identify features of presentation layer in OSI reference model
a: provides a set of standard protocols so that the display would be transparent to syntax of the application
b: transfers to and gathers from the physical medium bit data
c: data encryption and decryption
d: handles physical and electrical interfaces to the transmission medium
Ans:___________ (a/b/c/d/all)
101>In OSI reference model , the message in each layer is contained in message units called__________
102>PDU consist of _____parts (2/3)
103>PDU consists of ____&______ (PCI/VCI/UD)
104>In PDU , ____contains header information about the layer while ______contains the data that he layer , acting
as a service provider , receives from or transmits to the upper layer/service user layer (PCI/UD)
105>In OSI reference model, the size of the PDU increases as it goes toward _______layers (higher/lower)
106>__________layer is responsible for physically placing the electrical signal on the physical medium and picking
up the signal from it (presentation/physical)
107>__________layer controls and manages the physical and electrical interfaces to the physical medium including
the connector or transceiver (presentation/physical)
108>There are various protocol standards for physical layer interface, _____classes of standards have been
established by the ITU-T and EIA (2/3)
109>ITU-T stands for__________
110>EIA stands for__________
111>The data communication between two DTEs is controlled and managed by __________layer (network/data
link)
112>In data link layer, the data communication is serial __________oriented stream (bit/byte)
113>functions of data link layer are
a: establish and clear the link
b: transmit the data
c: error control and data compression
d: flow control
Ans:__________ (a/b/c/d/all)
114>Flow control on the data link layer is done on a hop to hop basis (true/false)__________
115>In data link layer, the lower __________layer controls the access and transmittal of data to the physical layer
in an algorithm manner (LLC/MAC)
116>There are _____basic forms of LANs (2/3)
117>Ethernet LAN:____ type: :FDDI:____ type (ring/bus)
VTU
N
O
TESBYSR
I
6. NETWORK MANAGEMENT SYSTEMS
5
118>features of network layer are
a: controls and manages the switching fabric of the network
b: provides both connectionless network service and connection oriented network service
Ans:________ (a/b/both)
119>CLNS stands for___________
120>CONS stands for__________
121>__________is used when the lower layers are highly reliable such as LANS and bridges as well as when the
messages are short (CONS/CLNS)
122>__________is the method for transmitting long messages such as file transfer (CONS/CLNS)
123>__________is used when the transmission medium is not reliable (CONS/CLNS)
124>___________at the nodes of a network performs the function of routing and switching the data (switch/router)
125>The OSI architecture model divides the network layer into ________sublayers (2/3/4)
126>Sublayers of network layer are
a: SNICP
b: SNDCP
c SNDAP
Ans:_________ (a/b/c/all)
127>SNICP stands for___________
128>SNDCP stands for__________
129>SNDAP stands for___________
130>In network layer , the top sublayer is _________that interfaces to the transport layer (SNICP/SNDCP/SNDAP)
131>The Internet communicates between nodes using an Internet address and _____.The nodes in turn
communicate with subnetworks using_____ which depends on the subnetwork protocol (SNICP/SNDCP/SNDAP)
132>The SNDCP communicates with is data link layer via the third network sublayer___________
(SNICP/SNDAP)
133>In OSI terminology, TCP/IP is called __________ (ISO-IP/ISO-CLNP/either)
134>A connection ____OSI protocol is X.25 PLP, a packet layer protocol (less/oriented)
135>Identify feature of transport layer
a: multiplexes the user data provided by the application layers and passes the packets to the network layer
b: service is independent of the network on which the packets are transmitted
c: can be connectionless or connection oriented and is implemented in both Internet and OSI protocols
d: flow control is implemented and functions as a data rate manager between the application programs and the
network layer
Ans:__________ (a/b/c/d/all)
136>Layers ___through ___application layer protocols (4/5/6/7)
137>__________layer establish the communication at the beginning of the session, monitor , synchronize and error
correct the information exchanged during the session and then release the logical link at the end of the session
(presentation/session)
138>__________layer is the medium of presentation of message's context to the user or application program
(physical/presentation)
139>__________layer is a context sensitive layer (physical/presentation)
140>wrt presentation layer , a common syntax that is used for semantics is__________ (BER/ASN.1)
141>ASN.1 stands for__________
142>Data encryption and data compression are also generally done in __________layer (physical/presentation)
143>The _____&_____layers form the suite of TCP/IP protocols (transport/data link/network)
144>wrt SNA , arrange the following in correct sequence (top to bottom)
a: physical
b: path control
c: transmission control
d: data link
e: data flow control
f: presentation services
g: end user application
Ans:__________ (gfecabd/gfecbda/gfeabdc)
145>In SNA, the combination of _____&_____services are called the SNA transmission subsystem (transmission
control/presentation/data flow )
146>In SNA , _________services are also known as SNA high level services (data flow/transmission
control/presentation )
147>All application specific protocol services in OSI are sandwiched between the_____ and_____ layers
(user/transport/presentation)
148>In the Internet model, all application specific protocol services are sandwiched between the____&_____
layers (session/user/transport)
VTU
N
O
TESBYSR
I
7. NETWORK MANAGEMENT SYSTEMS
6
149>A user interfaces with a host at a remote terminal using ____in the OSI model and ______in the Internet model
(Telnet/VT)
150>File transfers are accomplished using _____in the OSI model and _____in the Internet (FTP/FTAM)
151>FTAM stands for___________
152>The most common mail service function in the Internet is______. A similar protocol in the OSI model is_____
(MOTIS/SMTP)
153>MOTIS stands for_________
154>Network management is accomplished using ____in the OSI model and _______in the Internet (CMIP/SNMP)
155>CMIP stands for___________
156>OAM&P stands for___________
157>NMS stands for__________
158>The most common and serious problems of networks are connectivity failures, which are in the category
of__________ management (security/fault)
159>__________is generally interpreted to mean failures in accessing networks and systems by the users
(risk/fault)
160>Power hits could reset network component configuration, causing network failures (true/false)________
161>CIO stands for_________
162>The corporate network needs to be secured for privacy and content using __________
(firewalls/encryption/both)
163>____network was monopolistic and had expensive redundancy. ______network is adhoc, decentralized, has
loosely specified interfaces, and has dynamic routing (data/telephone)
164>The latest user satisfaction for an ISP is _____% (8/16/32)
165>Which elements of managing your network require most of your time?
a: configuring the management system itself
b: expanding the network
c: gathering and analyzing statistics for presentation to upper management
Ans:__________ (a/b/c/all)
166>Sniffer is an example of troubleshooting tools (true/false) __________
167>What does a network failure cost the user
a: there are tangible and intangible losses
b: the cost is a function of the dependence of the business upon shared data
c: A&R labs need high technology and tolerate low reliability. Business accept lower and proven technology but
require high reliability
Ans:__________ (a/b/c/all)
168>__________management can be defined as OAM&P of network and services (configuration/network)
169>Match the following
Operations group :involves network planning and circuit provisioning
network administration :handles functions that include both installation con repairs of facilities
and equipment
installation & maintenance group: concerned with daily operations in providing network services
Provisioning :concerned with establishing and administering the overall goals ,
policies
and procedures of network managements
170>The goal of network management is to ensure that the users of a network receive the information technology
services with the quality of service that they expect (true/false)__________
171>Network management comprises of _______major groups (2/3/4)
172>Network management comprises of following groups
a: network provisioning
b: network operations
c: network installation and maintenance
Ans:__________ (a/b/c/all)
173>_______is the primary responsibility of the engineering groups and ____is the primary responsibility of the
plant facilities group (network provisioning/network operations/network I&M)
174>The normal daily operations are the function of the __________groups, which controls and administers a
network operation center (network provisioning/network operations/network I&M)
175>NOC stands for__________
176>__________is the nerve center of network management operations (NMS/NOC)
177>The functions of the NOC are concerned primarily with _____;its secondary responsibilities are_____&_____
(network provisioning/network operations/network I&M)
178>__________consists of network planning and design and is the responsibility of the engineering group
(network provisioning/network operations/network I&M)
VTU
N
O
TESBYSR
I
8. NETWORK MANAGEMENT SYSTEMS
7
179>ISO has defined __OSI network management applications (4/5/6)
180>__________are concerned with daily operations of the network and providing network services (network
provisioning/network operations/network I&M)
181>ISO has defined following OSI network management applications
a: fault management
b: configuration management
c: performance management
d: security management
e: account management
Ans:__________ (a/b/c/d/e/all)
182>Whenever there is a service failure, it is responsibility of _______to restore service as soon as possible
(NMS/NOC)
183>In several failure situations , the network will detect and restore service automatically .This network feature is
called __________ (grooming/self healing)
184>Restoration of service does not include fixing the cause of the problem. That responsibility to fix the problem
usually rests with the__________ group (network provisioning/network operations/network I&M)
185>__________administration is the administrative part of fault management and is used to track problems in the
network (session ticket/trouble ticket)
186>wrt network management , there are ______configurations of the network (3/4/5)
187>Following are the configurations of the network
a: static configuration
b: current running configuration
c: planned configuration
Ans:__________ (a/b/c/all)
188>_____configuration is one that would come up if the network is started from idle status. In_____ configuration
of the future , the configuration data will change as the network is changed (planned/current/static)
189>__________management includes physically securing the network as well as controlling access to the network
by the users (fault/security)
190>Access privilege to application software is not the responsibility of the NOC unless the application is either
owned or maintained by the NOC (true/false)__________
191>Traffic statistics are helpful in detecting trends and planning future needs (true/false)__________
192>NOC gathers data and keeps them up to date in order to tune the network for optimum performance
(true/false)__________
193>__________administers costs and allocate the use of the network (NMS/NOC)
194>Since the network consists of components manufactured by multiple vendors, commonality in the definition
and relationship of component attribute is needed. This is defined by the __________ (SMI/MIB)
195>__________is the Internet management protocol which is the most popular protocol to acquire the data
automatically using protocol and performance analyzing tools (SMTP/SNMP)
196>There______ classes of reports (3/4/5)
197>Following are different classes of reports
a: system report
b: management report
c: user report
Ans:__________ (a/b/c/all)
198>Match the following
System report :are distributed to the users on a periodic basis to let them know the status of network
performance
management report :are needed for network operations to track the activities
user report :goto the management of the network management group to keep them informed about
the activities and performance of the NOC and the networks
199>__________group takes care of all installation and maintenance of equipment and cables (network
operation/network I&M)
200>___________group is the service arm of the engineering group for installation and fixing troubles for network
operations (network operation/network I&M)
201>__________management is the management of systems and system resources in the network while_________
management is concerned with network resources such as hubs , switches , bridges , routers and gateways, and the
connectivity among them via a network (system/data/network)
202>___________management addresses end to end connectivity between any two processors in the network
(system/network)
203>A network consists of network components and their inter connections (true/false)_________
204>A network management system manages all the components that are connected to a network
(true/false)__________
VTU
N
O
TESBYSR
I
9. NETWORK MANAGEMENT SYSTEMS
8
205>The two major standards are the Internet and the OSI standards (true/false)___________
206>TMN stands for___________
207>The popular _____ end systems are housed either on SUN or HP UNIX based workstations. The ______end
network management systems run either on Windows 95/98 or Windows NT (low/high)
208>Network connectivity could be tested using the ping command in UNIX (traceroute) and Windows NT
(tracert) based system (true/false)___________
209>The current network management systems are based on the ________protocol (SMTP/SNMP)
210>following are limitations of current network management systems
a: they need a dedicated NMS monitoring station, which must be on a specific type of platform
b: the values of the managed objects should be defined as scalar values
c: SNMP based management is a poling based system
Ans:___________ (a/b/c/all)
211>__________ based management protocol CMIP is object oriented (OSI/Internet)
212>Limitations in SNMP based management have been overcome by the emerging web based management
(true/false)___________
213>A web based system is platform independent for the management software using Java languase in the managed
components , for the Web based NMS server as well as for Web browser monitors (true/false)___________
214>Following are web based management schemes
a: Java based JMX developed by Sun
b: WBEM based on the Common Information Model developed by Microsoft
Ans:___________ (a/b/both)
215>JMX stands for___________
216>WBEM stands for__________
217>The broadband multimedia service is based on ATM SONET wide area network and several emerging access
technologies such as HFC and ADSL (true/false)___________
218>HFC stands for___________
219>ADSL stands for___________
220>___________network, which is the direction of the next generation network, would include embedded
network management applications (intelligent/active)
221>following methods can be used to find the root of a problem in network
a: artificial intelligence
b: algorithmic schemes
c: finite state machine
Ans:___________ (a/b/c/all)
222>_____establish secure networks , and______ ensures secure communication (cryptography/firewalls)
ANSWERS:
1>T
2>5,3
3>trunk
4>lowest
5>
6>1-c 2-e 3-d 4-a 5-b
7>loop
8>T
9>Direct Distance Dialing
10>DDD,3
11>1-c 2-b 3-a
12>either
13>switch
14>T
15>T
16>Network Operation Center
17>NOC
18>NOC
19>user
20>restoration of services, quality and economy
21>Plain Old Telephone Service
22>network
23>both
24>link
25>both
VTU
N
O
TESBYSR
I
10. NETWORK MANAGEMENT SYSTEMS
9
26>end, intermediate
27>end
28>end
29>Data Terminating Equipment
30>DTO
31>either
32>analog
33>digital
34>Integrated Services Digital Network
35>digital
36>all
37>circuit
38>message & packet
39>message
40>packet
41>bridges & routers
42>packet
43>latter
44>packet
45>message
46>Public Switched Data Network
47>tele, data
48>circuit
49>T
50>modem
51> onsite communication controller
52> onsite switch PBX
53>less, less
54>Systems Network Architecture
55>both
56>cluster, communication
57>Distributed Computing Environment
58>WAN
59>bridge, router
60>both
61>client, server
62>client, client, server
63>client, server
64>T
65>T
66>peer to peer
67>TCP/IP
68>connectionless, connection oriented, connectionless
69>UDP/IP
70>T
71>gateway
72>T
73>store & forward
74>T
75>user
76>T
77>switching, gateway
78>MAC
79>all
80>gateway
81>intranet, internet
82>standards, protocols
83>architecture
84>communication
85>protocols
86>protocols
87>SMTP
VTU
N
O
TESBYSR
I
11. NETWORK MANAGEMENT SYSTEMS
10
88>2
89>application, transport
90>3
91>7498
92>both
93>peer to peer
94>1to4 5to7
95>3
96>1-e 2-f 3-c 4-d 5-b 6-g 7-a
97>LLC, MAC
98>all
99>b,d
100>a,c
101>protocol data unit
102>2
103>PCI, UD
104>PCI, UD
105>lower
106>physical
107>physical
108>2
109>International Telecommunications Union-Telecommunication Sector
110>Electronics Industries Association
111>data link
112>bit
113>all
114>T
115>MAC
116>2
117>bus, ring
118>both
119>Connectionless Network Service
120>Connection Oriented Network Service
121>CLNS
122>CONS
123>CONS
124>router
125>3
126>all
127>SubNetwork Independent Convergence Protocol
128>SubNetwork Dependent Convergence Protocol
129>SubNetwork Dependent Access Protocol
130>SNICP
131>SNICP, SNDCP
132>SNDAP
133>either
134>oriented
135>all
136>5to7
137>session
138>presentation
139>presentation
140>ASN.1
141>Abstract Syntax Notation Number One
142>presentation
143>transport, network
144>gfecbda
145>transmission control, data flow
146>presentation
147>user, presentation
148>user, transport
149>VT, telnet
VTU
N
O
TESBYSR
I
12. NETWORK MANAGEMENT SYSTEMS
11
150>FTAM, FTP
151>File Transfer Access & Management
152>SMTP, MOTIS
153>Message Oriented Text Interchange Standard
154>CMIP, SNMP
155>Common Management Information Protocol
156>Operations Administration Maintenance & Provisioning
157>Network Management System
158>fault
159>fault
160>T
161>Chief Information Officer
162>both
163>telephone, data
164>16
165>all
166>T
167>all
168>network
169>1-c 2-d 3-b 4-a
170>T
171>3
172>all
173>network provisioning, network I&M
174>network operation
175>Network Operations Center
176>NOC
177>network operations, network provisioning and network I&M
178>network provisioning
179>5
180>network operation
181>all
182>NOC
183>self healing
184>network I&M
185>trouble ticket
186>3
187>all
188>static, planned
189>security
190>T
191>T
192>T
193>NOC
194>MIB
195>SNMP
196>3
197>all
198>1-b 2-c 3-a
199>networkI&M
200>network I&M
201>system, network
202>network
203>T
204>T
205>T
206>Telecommunication Management System
207>high, low
208>T
209>SNMP
210>all
211>OSI
VTU
N
O
TESBYSR
I
13. NETWORK MANAGEMENT SYSTEMS
12
212>T
213>T
214>both
215>Java Management Extensions
216>Web Based Enterprise Management
217>T
218>Hybrid Fiber Coax
219>Asymmetric Digital Subscriber Loop
220>active
221>all 222>firewalls, cryptography
VTU
N
O
TESBYSR
I
14. NETWORK MANAGEMENT SYSTEMS
13
CHAPTER 3: BASIC FOUNDATION -- STANDARDS, MODELS
AND LANGUAGE
1>__________ model addresses the applications that fall into the categories of fault, configuration, performance,
security and accounting (information/functional)
2>Match the following
Network management :management of a system's resources such as central processor usage, disk usage
and application processes
System management :deals with services provided by organizations to customers
Service management :management of the network comprising nodes and links
3>_____management is an extension to _____&_____management (network/system/service)
4>The two leading models of network management are the Internet model and the OSI model
(true/false)__________
5>__________model is the most widely used for network management (OSI/Internet)
6>_____model is a simpler scalar model and hence easy to implement. ______model is object oriented , is more
complex and harder to implement (OSI/Internet)
7>A higher level management network called TMN is based on the ___________model (OSI/Internet)
8>TMN stands for___________
9Identify features of OSI/CMIP standard
a: International standard (ISO/OSI)
b: management of data communications networks- LAN and WAN
c: deals with all seven layers
d: object oriented and most complete
e: consumes large resource in implementation
f: well structured and layered
Ans:___________ (a/b/c/d/e/f/all)
10>Identify features of SNMP/Internet Standard
a: Industry standard (IETF)
b: easy to implement
c: most widely implemented
d: originally intended for management of Internet components, currently adopted for WAN and telecommunication
systems
Ans:___________ (a/b/c/d/all)
11>Identify features of TMN standard
a: International standard (ITU-T)
b: Management of telecommunications network
c: based on OSI network management framework
d: addresses both network and administrative aspects of management
Ans:___________ (a/b/c/d/all)
12>Identify features of IEEE standard
a: IEEE standards adopted internationally
b: addresses management of LANs and MANs
c: adopts OSI standards significantly
d: deals with first two layers of the OSI reference model
Ans:__________ (a/b/c/d/all)
13>Following are web based management standards
a: WBEM
b: JMX
Ans:___________ (a/b/both)
14>CMIP stands for___________
15>CMIS stands for___________
16>The OSI management protocol standard is ____, and has built in services, ______, that specify the basic
services needed to perform the various functions (CMIS/CMIP)
17>Both LANs and WANs can be managed using___________ (CMIS/CMIP/both)
18>Major drawbacks of the OSI management standard are
a: it is complex b: CMIP stack is large
Ans:___________ (a/b/both)
VTU
N
O
TESBYSR
I
15. NETWORK MANAGEMENT SYSTEMS
14
19>In contrast to _____, ______is truly simple (SNMP/CMIP)
20>___________is responsible for all Internet specifications including network management (IEEE/IETF)
21>___________is designed to manage the telecommunications network and is oriented toward the needs of
telecommunications service providers (ITU/TMN)
22>_____is the standard of______ and is based on OSI CMIP/CMIS specifications (ITU/TMN)
23>The IEEE standards for LAN and MAN specifications are concerned only with OSI layers__&___1/2/3)
24>Both OSI/CMIP and Internet/SNMP protocols use _______standards for the lower layers (IETF/IEEE)
25>The IEEE ____.x series of specifications defines the standards for the various physical media and data link
protocols (802/803)_______
26>IEEE 802.__ specifications present overview, architecture and management. IEEE 802.__standard specifies the
LLC layer. IEEE 802.__ specifications are defined for Ethernet LANs (1/2/3/4)
27>___________layer provides transparency of the various physical media and protocols to the network layer
(MAC/LLC)
28>Web based management is based on using web technology , a web _____for the management system and web
______for network management stations (browsers/server)
29>DMTF stands for_________
30>___________is developing specifications for WBEM (IETF/DMTF)
31>___________has chosen the Microsoft object oriented management model, Common Information Model
(IETF/DMTF)
32>___________is based on a special subset of Java applets developed by Sun Microsystems that runs in the
network components (BEM/JMX)
33>TMM uses_______ (SNMP/CMIP )
34>Both SNMP and CMIP use polling methodology (true/false)___________
35>OSI network management architecture model comprise of ____models (3/4/5)
36>Following are the models of OSI network management
a: organization model
b: information model
c: communication model
d: functional model
Ans: ___________ (a/b/c/d/all)
37>In OSI model, _________model describes the components of a network management system, their functions
and their infrastructure (functional/organization/information/communication)
38>The organization model is defined in ISO______OSI systems management Overview (10400/10040/10004)
39>___________model defines the terms object, agent and manager
(functional/organization/information/communication)
40>___________model deals with the structure and organization of management information
(functional/organization/information/communication)
41>ISO=________ specifies the SMI and the information database, MIB (10156/10165)
42>SMI stands for___________
43>MIB stands for___________
44>_____describes how the management information is structured and ______deals with the relationship and
storage of management information (MIB/SMI)
45>Communication model has ___________components (2/3/4)
46>Components of communication model are
a: management application processes that function in the application layer
b: layer management between layers
c :layer operation within the layers
Ans:___________ (a/b/c/all)
47>___________model deals with the user oriented requirements of network management
(functional/organization/information/communication)
48>OSI defines ____functional application areas (4/5/6)
49>Only ____model presents the complete model for network management (Internet/OSI)_______
50>OSI deals wit all 7 networking layers (true/false)___________
51>The IETF does not define architecture for the SNMP management model explicitly (true/false)___________
52>TMN is based on the___________ model (OSI/internet)
53>______standard is dedicated to the management of layers 1 and 2 of the OSI reference model
(IEEE/IETF)_____
54>The IEEE standard is primarily concerned with the ___________model
(functional/information/organization/communication)
55>In Web based management , ___________model uses Web server - Web browser architecture
(functional/information/organization/communication)
VTU
N
O
TESBYSR
I
16. NETWORK MANAGEMENT SYSTEMS
15
56>Following object oriented technologies are influencing Web based managementa:hypermedia server
b: CORBA oriented transportation
c: client/server push technology
Ans: ___________ (a/b/c/all)
57>___________model describes the components of network management and their relationships
(functional/information/organization/communication)
58>In organization model, network objects can be classified into managed and unmanaged objects
(true/false)___________
59>MDB stands for___________
60>The managed elements have a management process running in them called___________ (broker/agent)
61>_________ elements do not have a management process running in them (managed/unmanaged)
62>Managed hub is more expensive than the unmanaged hub (true/false)___________
63>_________manages the managed element (agent/manager)
64>In organization model, there is database in_____ _but not in_____ (agent/manager)
65>In _____tier configuration of organization model, the intermediate layer acts both agent and manager
(two/three)______
66>In three tier configuration of organization model, as______, intermediate layer collects data from the network
elements, processes it, and stores the results in its database. As _____, it transmits information to the top level
manager (agent/manager)
67>MoM stands for___________
68>_____refers to a system that runs a management process (NOC/NMS)
69>___________model is concerned with the structure and the storage of information
(organization/information/functional/communication)
70>The representation of objects and information relevant to their management form the management___________
model (organization/information/functional/communication)
71>___________model specifies the information base to describe managed objects and their relationships
(organization/information/functional/communication)
72>____defines the syntax and semantics of management information stored in_______ (MIB/SMI)
73>___________is used by both agent and management processes to store and exchange management information
(MIB/SMI)
74>In information model , _____MIB consists of information on all the network components that it manages ,
whereas ______MIB needs to know only its local information, its MIB view (agent/manager)
75>______is a real database whereas _____is a virtual database (MIB/MDB)
76>_____contains the measured or administratively configured value of the elements of the network. On the other
hand, ______ contains the information necessary for processes to exchange information (MIB/MDB)
77>Following types of information can be stored in the MIB
a: network elements-hubs, bridges , routers, transmission facilities
b: software processes-programs, algorithms , protocol functions , databases
c: administrative information-contact person, account number
Ans:___________ (a/b/c/all)
78>___________objects are uniquely defined by a tree structure specified by the OSI model and are used in the
Internet model (managed/unmanaged)
79>MIT stands for___________
80>In____________ model, the managed objects are defined by a containment tree that represent the MIT
(OSI/Internet)
81>In OSI MIT, there are ____nodes in the layer beneath the root (2/3/4)
82>Wrt OSI MIT, the following are the nodes in the layer beneath the root
a: iso
b: ccitt (itu)
c: iso-ccitt (iso-itu)
Ans:___________ (a/b/c/all)
83>iso stands for___________
84>itu stands for___________
85>There are_____ basic attributes of a managed object type from the Internet perspective (4/5/6)
86>Following are the basic attributes of a managed object type from the Internet perspective
a: object type (object identifier & descriptor)
b: definition
c: syntax
d: access
e: status
Ans:___________ (a/b/c/d/e/all)
VTU
N
O
TESBYSR
I
17. NETWORK MANAGEMENT SYSTEMS
16
87>Specification for the Internet are defined in RFC documents (true/false)___________
88>A managed object in the Internet model is defined by _____parameters (4/5/6)
89>A managed object in the Internet model is defined by five parameters and for this RFC=____ (1551/1515/1155)
90>A managed object in the Internet model is defined by following parameters
a: object identifier and descriptor
b: syntax
c: access
d: status
e: definition
Ans:___________ (a/b/c/d/e/all)
91>Match the following
object identifier and descriptor : textual description of the semantics of object type
Syntax : implementation requirements
Access : access privilege to a managed object
Status : used to model the object
Definition : unique ID and name for the object type
92>_____ object model is a scalar model and is easy to understand. In contrast , ______perspective of a managed
object is complex and has a different set of characteristics (OSI/Internet)
93>___________specifications are object oriented and hence a managed object belongs to an object class
(OSI/Internet)
94>___________of an object defines the external perspective of the object (entity/attribute)
95>___________of the object is to change its attribute (behavior/operation)
96>An OSI managed object has the following characteristics
a: object class
b: attributes
c: operations
d: behaviour
e: notifications
Ans:___________ (a/b/c/d/e/all)
97>Operation in the Internet model is done by _____&______ commands. Notification s done by
____&_____messages (get/set/response/alarm)
98>In____ , we can create and delete objects, these concepts do not exist in _______ (OSI/Internet)
99>_____characteristics of the Internet model is part of the security function in the OSI functional model
(status/access)______
100>___________characteristics of the Internet model is handled by conformance as part of application services in
OSI (status/access)
101>Match the following
Object type :counts number of packets
Syntax :Mandatory
Access :counter
Status :read only
Description :PktCounter
102>Match the following
Object class :generates notifications on new value
Attributes :get or set
Operations :retrieves or resets values
Behavior :packet counter
Notifications :Single valued
103>Following are characteristics from Internet perspective
a: object type
b: syntax
c: access
d: status
e: description
Ans:__________ (a/b/c/d/e/all)
104>Characteristics from OSI perspective are
a: object class b: attributes
c: operations d: behaviour
e: notifications
Ans:__________ (a/b/c/d/e/all)
VTU
N
O
TESBYSR
I
18. NETWORK MANAGEMENT SYSTEMS
17
105>Management data is communicated between agent and manager processes, as well as between manager
processes (true/false)__________
106>__________aspects need to be addressed in the communication of information between two entities (2/3/4)
107>Following aspects need to be addressed in the communication of information between two entities
a: transport medium of message exchange
b: message format of communication
c: actual message
Ans:__________ (a/b/c)
108>Match the following
transport protocol :actual message
application protocol :transport medium exchange
commands & responses :message format of communication
109>__________is the unsolicited messages such as alarms, generated by the agent (notification/trap/both)
110>__________model uses CMIP along with CMIS (Internet/OSI)
111>__________model uses SNMP for communication (Internet/OSI)
112>OSI uses _________protocol for transportation (connection oriented/connectionless/both)
113>Internet uses __________UDP/IP protocol to transport messages (connection oriented/connectionless/both)
114>The TP4 transport layer protocol riding on top of the x.25 protocol could be used for__________ transporting
and application messages (connection oriented/connectionless/both)
115>______&_____specifies the management communication protocols for OSI and Internet management
respectively (SNMP/CMIP)
116>__________is a formal language developed jointly by CCITT and ISO for use with application layers for data
transfer between systems (BER/ASN.1)
117>ASN.1 is at the__________ layer (presentation/session)
118>__________is defined as the set of rules used to specify data types and structures for storage of information
(transfer syntax/abstract syntax)
119>___________represents the set of rules for communicating information between systems (transfer
syntax/abstract syntax)
120>____is applicable to the information model while ______is applicable to the communication model (transfer
syntax/abstract syntax)
121>__________can be used with any presentation syntax, depending on the medium of presentation (transfer
syntax/abstract syntax)
122>__________in ASN.1 makes it independent of the lower layer protocols (transfer syntax/abstract syntax)
123>ISO____/_____ standards specify ASN.1 (8825/X.209 or 8824/X.208)
124>The algorithm to convert the textual ASN.1 syntax to machine readable code is called__________ (DER/BER)
125>BER stands for___________
126>BER is defined by ISO_________ (882/X.209 or 8824/X.208)
127>___________is based on the Backus system and uses the formal syntax language and grammar of the BNF
(BER/ASN.1)
128>BNF stands for__________
129> <name>::=<definition> in this expression, <name> denotes _____and the symbol ::= represents______
(defined as/entity/)
130> <digit>::=0|1|2 in this expression, the symbol | represents_____ (and/not/or)
131><op>::=+|-|*|/ in this expression, the definitions on the right side are called ___________
(production/primitives)
132> <SAE>::<number> | <SAE> | <SAE><op><SAE>, in this expression, the format of each line is defined
as___________ (production/assignment/either)
133><BooleanValue>:: TRUE| FALSE, in this expression, entities that are all in capital letters such as TRUE and
FALSE are called__________ (identifiers/keywords)
134>The data types are built up from primitive data types such as
a: INTEGER
b: REAL
c: NULL
d: GraphicString
Ans:__________ (a/b/c/d/all)
135>__________is one of several CharacterString type primitives (StringGraphic /GraphicStshng)
136>Match the following
Alternatives : SET & SEQUENCE
List : SET OF & SEQUENCE OF
Repetition : CHOICE
137>Above constructs are used to build __________data types (primitive/structured)
VTU
N
O
TESBYSR
I
19. NETWORK MANAGEMENT SYSTEMS
18
138>__________data types are also called atomic entities (primitive/structured)
139>ASN.1 definition allows both backward and forward references as well as in-line definition
(true/false)__________
140>The constructs _____&_____are list builders (SET/SET OF/SEQUENCE/SEQUENCE OF)
141>The order in the list will be maintained if the list is built with the__________ construction (SET/SEQUENCE)
142>If the construct has been _____instead of_____, order in the list would be irrelevant (SEQUENCE OF/SET
OF)
143>{ product-based [0] NULL, basic [1] NULL } these assignments have integers in square brackets and these
are called________ (module/tags)
144>The definition of_________ is introduced in ASN.1 to uniquely identify a data type (module/tag)
145>We can group assignments that are related, this group is called__________ (subroutine/module)
146>identify correct formal definition of a module
a:<module name> DEFINITIONS ::= BEGIN
<name> :: <definition>
END
b: BEGIN ::=DEFINITIONS <module name>
<name> :: <definition>
END
c:<module name> BEGIN ::=DEFINITIONS
<name> :: <definition>
END
Ans:__________ (a/b/c)
147>Match the following
::= range
| start & end of a subtype
- start & end of a list
-- start & end of a tag
{} signed number
[] following the symbol are comments
() defined as or assignment
'' or, alternatives , options of a list signed number
148><module name> DEFINITIONS ::= BEGIN
<name> :: <definition>
END
The terms DEFINITIONS, BEGIN and END are primitives and are called __________in ASN.1
(identifier/keyword)
149>Grouping assignments into modules has following advantages
a: modules can be imported into and exported from other modules
b: modules are reusable
Ans:__________ (a/b/both)
150>Match the following
BEGIN : any negative or non-negative number
CHOICE :a sequence of non-negative numbers
DEFINITIONS :end of an ASN.1 module
END :list of alternatives
EXPORTS :start of an ASN.1 module
IDENTIFIER :definition of a data type or managed object
IMPORTS :data types that can be exported to other modules
INTEGER :data types defined in external modules
151>Match the following
NULL :used with OCTET for denoting string of octets
OBJECT :unordered list makes
OCTET :ordered list maker
OF :unbounded 8 bit bytes (octts) of binary data
SEQUENCE :a placeholder
SEQUENCE OF :used with IDENTIFIER to uniquely identify an object
SET :used with SET and SEQUENCE
SET OF :ordered array of repetitive data
STRING :unordered list of repetitive data
VTU
N
O
TESBYSR
I
20. NETWORK MANAGEMENT SYSTEMS
19
152>Match the following
Object name :INTEGER, BEGIN
Application data type :RMON-MIB
Module :Counter, IpAddress
Macro, MIB module :PersonalRecord
Keywords :sysDescr, etherStatsPkts
153>Simple data type is also called_________ (primitive/atomic/basic/all)
154>___________uniquely identifies the data type irrespective of the syntax version (atomic/tag)
155>Data types are defined based on___________ (structure/tag/both)
156>wrt Object and Data types, the structure is divided into _______categories (3/4/5)
157>wrt Object and Data types , the tag is divided into___ categories (2/3/4)
158>The tag is divided into following
a: class
b: tag number
Ans:__________ (a/b/both)
159>Following are different categories of data type structure
a: simple type
b: structured type
c: tagged type
d: other type
Ans:_________ (a/b/c/d/all)
160>________type is one for which the values are specified directly (structured/tagged/simple)
161>INTEGER is a________ type (structured/tagged/simple)
162>A data type is a __________type when it contains other types (structured/tagged/simple)
163>Types that are within a structured type are called _________types (component/tagged)
164>SET is distinguished from SEQUENCE in following respects
a: data types should all be distinct
b: order of values in SET is of no consequence
Ans:__________ (a/b/both)
165>Order of values is critical in _______ (SET/SEQUENCE)
166>The component data types in the __________construct need not be distinct because the order is preserved
(SET/SEQUENCE)
167>__________type is a type derived from another type (structured/tagged)
168>__________type is a data type that is not predefined (structured/tagged/other)
169>___________type is chosen from CHOICE and ANY types, which are contained in other types
(structured/tagged/other)
170>Type__________ defines the selection of one value from specified list of distinct types (ANY/CHOICE)
171>Every data type except __________has a tag associated with it (CHOICE/ANY/both)
172>A tag has following components
a: class
b: tag number
Ans:__________ (a/b/both)
173>There are _____classes of tag (3/4/5)
174>Following are different classes of tag
a: universal
b: application
c: context specific
d: private
Ans:__________ (a/b/c/d/all)
175>__________class is the most common (application/context specific/universal/private)
176>Data types in the __________class are application independent (application/context specific/universal/private)
177>__________class is similar to the use of a global variable in a software program and is applicable anywhere in
a program (application/context specific/universal/private)
178>BOOLEAN & INTEGER are examples of __________class , whose tag numbers are [1] and [2] respectively
(application/context specific/universal/private)
VTU
N
O
TESBYSR
I
21. NETWORK MANAGEMENT SYSTEMS
20
179>Match the following
Universal 1 :REAL
Universal 2 :Object description
Universal 3 :NULL
Universal 4 :BIT STRING
Universal 5 :BOOLEAN
Universal 6 :EXTERNAL
Universal 7 :OBJECT IDENTIFIER
Universal 8 :OCTET STRING
Universal 9 :INTEGER
180>Match the following
Universal 10 :TeletexString
Universal 11 :NumericString
Universal 12-15 :SEQUENCE & SEQUENCE OF
Universal 16 :ENCRYPTED
Universal 17 :ENUMERATED
Universal 18 :Reserved for future use
Universal 19 :SET & SET OF
Universal 20 :PrintableString
181>Match the following
Universal 21 :reserved for future use
Universal 22 :GeneralString
Universal 23 :GraphicString
Universal 24 :UTCTime
Universal 25 :VideotexString
Universal 26 :IASString
Universal 27 :GeneralizedTime
Universal 28 :VisibleString
Universal 29 :CharacterString
182>Tags in the __________class are specific to applications (universal/context specific/application/private)
183>_____class tag number can be overridden with _____tag number (universal/context specific/application)
184>Types in two different applications can have the same __________specific tag but each tag could carry a
different meaning in each application (context specific/application)
185>____type is a subset of_____ , is limited to that application (universal/context specific/application/private)
186>__________type is used extensively by vendors of network products (universal/context
specific/application/private)
187>In _____, there is an identifier for each occurrence of an object. In_____, it is the OBJECT IDENTIFIER
(ASN.1/MIB)
188>The ASN.1 syntax that contains the management information is encoded using the __________defined for the
transfer syntax (DER/BER)
189>TLV stands for__________
190>In TLV , the type has_____ subcomponents (3/4)
191>In TLV, the type has following subcomponents
a: class
b: P/C
c: tag number
Ans:__________ (a/b/c/all)
192>__________specifies whether the structure is a primitive or simple, type or a construct , which is anything
other than a simple type (class or P/C or
tag number)
193>__________is encoded as a one byte or an octet field (class or P/C or
tag number)
194>Match the following
Universal :1 1
Application :0 1
Context specific :0 0
Private :1 0
195>In TLV, the value of P/C is___ for primitive and ___for construct and is designated as the 6th bit (0/1)
196>In TLV, the lowest ___bits designates tag value in binary (4/5/6)
197>In TLV, class :____bits:: ___P/C: ___bits ::Tag number :___bits (1/2/3/4/5/6/7/8)
VTU
N
O
TESBYSR
I
22. NETWORK MANAGEMENT SYSTEMS
21
198__________is defined as a series of octets (type/length/value)
199>In TLV, the length specifies the length of the value field in number of__________ (bits/octets)
200>In TLV, the integer value is encoded using ______complement form (ones/twos)
201>Wrt TLV , for positive value , the actual value is the binary representation, with the MSB always being___ to
indicate the positive sign (0/1)
202>wrt TLV, -5 becomes ___________in twos complement form (11110111/111111101/11111011)
203>Wrt Macros , ____defines the syntax of the new types and _____defines the syntax of the new values (TYPE
NOTATION/VALUE NOTATION)
204>________model component of the OSI model addresses the user oriented applications
(communication/functional)
205>Functional model consists of ______submodels (4/5/6)
206>Functional model has following submodels
a: configuration management
b: fault management
c: performance management
d: security management
e: accounting management
Ans:___________ (a/b/c/d/e/all)
207>___________management addresses the setting and changing of configurations of networks and their
components (performance/accounting/configuration)
208>Relevant management information is embedded in managed objects such as switches, hubs, bridges and
routers .___________management involves setting up these parameters (performance/accounting/configuration)
209>___________displays in real time the configuration of the network and its status (NOC/NMS)
210>___________management involves detection and isolation of the problem causing the failure in the network
(performance/accounting/configuration/fault)
211>In several failure situations, the network could restore service automatically. This network feature is called
___________ (grooming/self healing)
212>___________ticket administration of fault management tracks all problems in the network including
nonproblems, until they are resolved (service/trouble)
213>___________management is concerned with the performance behavior of the network
(performance/accounting/configuration)
214>___________management involves physically securing the network, access to the network resources and
secured communication over the network (performance/accounting/configuration/security)
215>___________protect corporate networks and network resources from being accessed by unauthorized
personnel and programs, including virus programs (cryptography/firewalls)
216>__________management administers costs of the network (performance/accounting/configuration)
217>___________management is directed toward service providers, in order for them to provide customer
satisfaction and to ensure the profitability of business (performance/accounting/configuration/service &business)
218>Traffic data gathered by_____ management serves as input to _____management
(performance/accounting/configuration)
219>The traffic statistics, trouble ticket administration data and accounting management results are inputs to
___________management (performance/configuration/service & business)
220>Following are network management models
a: OSI
b: Internet
c: TMN
d: IEEE 801
e: Web technology
Ans:___________ (a/b/c/d/e/all)
221>The OSI management model categorizes the____ functions of network management into____ models (3/4/5)
222>The OSI has following network management models
a: organization
b: information
c: communication
d: application
Ans:__________ (a/b/c/d/all)
223>The organization model describes the management process in the network element called the
___________process, and the management process in the ___________ (manger/agent)
224>___________model addresses the structure of management information that enables processes running in
different components in the network to exchange management data (organization/information/communication)
225>The two primary communication protocols are_____ in OSI and ______in the Internet (SNMP/CMIP)
226>The application functions are divided into___ categories of management (3/4/5)
VTU
N
O
TESBYSR
I
23. NETWORK MANAGEMENT SYSTEMS
22
227>The application functions are divided into following categories of management
a: configuration
b: fault
c: performance
d: security
e: accounting
Ans:___________ (a/b/c/d/e/all)
ANSWERS
1>functional
2>1-c 2-a 3-b
3>service, system, network
4>T
5>Internet
6>Internet, OSI
7>OSI
8>Telecommunication Management Network
9>all
10>all
11>all
12>all
13>both
14>Common Management Information Protocol
15>Common Management Information Service
16>CMIP, CMIS
17>both
18>both
19>CMIP, SNMP
20>IETF (Internet Engineering Task Force)
21>TMN
22>TMN, ITU
23>1,2
24>IEEE
25>802
26>1,2,3
27>LLC
28>browser
29>Desktop Management Task Force
30>DMTF
31>DMTF
32>JMX
33>CMIP
34>T
35>4
36>all
37>organization
38>10040
39>organization
40>information
41>10165
42>Structure of Management Information
43>Management Information Base
44>SMI,MIB
45>3
46>all
47>functional
48>5
49>OSI
50>T
51>T
52>OSI
53>IEEE
VTU
N
O
TESBYSR
I
24. NETWORK MANAGEMENT SYSTEMS
23
54>communication
55>organization
56>all
57>organization
58>T
59>Management Database
60>agent
61>unmanaged
62>T
63>manager
64>manager, agent
65>3
66>manager, agent
67>Manager of Managers
68>NMS
69>information
70>information
71>information
72>SMI, MIB
73>MIB
74>manager, agent
75>MDB,MIB
76>MDB,MIB
77>all
78>managed
79>Management Information Tree
80>OSI
81>3
82>all
83>International Standards Organization
84>International Telecommunications Union
85>5
86>all
87>T
88>5
89>1155
90>all
91>1-e 2-d 3-c 4-b 5-a
92>Internet, OSI
93>OSI
94>attribute
95>behavior
96>all
97>get&set, response&alarm
98>OSI, Internet
99>access
100>status
101>1-e 2-c 3-d 4-b 5-a
102>1-d 2-e 3-b 4-c 5-a
103>all
104>all
105>T
106>3
107>all
108>1-b 2-c 3-a
109>both
110>OSI
111>Internet
112>both
113>connectionless
114>connection oriented
115>CMIP,SNMP
VTU
N
O
TESBYSR
I
27. NETWORK MANAGEMENT SYSTEMS
26
CHAPTER 4:SNMPv1 NETWORK MANAGEMENT—
ORGANIZATION & INFORMATION MODELS
1>__________management is also referred to as Internet management (SMTP/SNMP)
2>SNMP network management systems can manage even non-TCP/IP network elements through proxy agents
(true/false)__________
3>SNMP management is the most widely used __________ (NMS/NOC)
4>__________comprises management process, agent process and network elements (NMS/NOC)
5>The SNMP information model consist of
__________ (MIB/SMI/both)
6>___________uses ASN.1 syntax to define managed objects (MIB/SMI)
7>___________defines the relationship between managed objects and groups of related objects into MIB modules
(MIB/SMI)
8>MIB2 is a superset of MIB1 and is used in SNMPv__ (1/2)
9>The SNMP architecture, administration and access policies fall under___________ model
(organization/communication)
10>ICMP was developed to manage___________ (ARPANET/INTERNET)
11>___________is a mechanism to transfer control messages between nodes (PING/ICMP)
12>PING stands for__________
13>A popular example of ICMP is___________ (RING/PING)
14>___________i a simple tool used to investigate the heath of a node and the robustness of communication with it
from the source node (PING/ICMP)
15>IAB stands for___________
16>__________was formed to administer Internet activities (ICB/IAB)
17>SGMP stands for___________
18>___________is used to monitor and configure gateways remotely (SNMP/SGMP)
19>_____is an enhancement of______ (SNMP/SGMP)
20>SNMPv__ was developed to make it independent of the OSI standard (1/2/3)
21>IAB was charged with the responsibility to manage following task forces
a: IEEE
b: IETF
c: IRTF
Ans:___________ (a/b/c/all)
22>___________is an organization that maintains several archives of documents related to the Internet and the
IETF's activities (IntraNIC/InterNIC)
23>InterNIC stands for___________
24>STD stands for___________
25>FYI stands for___________
26>IANA stands for___________
27>___________is the central coordinator for the assignment of unique parameter values for Internet protocols
(IETF/IANA)
28>___________RFC subseries was created by to document overviews and topics that are introductory (STD/FYI)
29>___________RFC subseries was created to identify those RFCs that do in fact specify Internet standards
(STD/FYI)
30>There are ___ series of RFC and STD documents (3/4/5)
31>Following are the series of RFC and STD documents
___________ (SMI/MIB/SNMP/all)
32>RFC=____defines the SNMP protocol. RFC=____is on protocol operations. RFC=___ is on transport mappings
(1905/1905/1157)
33>SMI form the contents of RFC=___________ (1155/1156/1157)
34>RFC=____/STD=_____ is currently in use for MIB (1213/1217/13/17)
35>RFC=______is a draft version of MIB2 for SNMPv2 (1155/1907)_____
36>The infrastructure of the manager agent and the SNMP architecture that it is based form ___________model
(information/organization/functional)
37>wrt SNMP, definition of syntax and semantics form the basis of the ___________model
(information/organization/functional)
38>The two tier organization model consists of_____ process which resides in the managed object and______
process which resides in the NMS and manages the managed object (network manager/network agent)
VTU
N
O
TESBYSR
I
28. NETWORK MANAGEMENT SYSTEMS
27
39>In two tier organization model, multiple managers can interact with one agent (true/false)___________
40>RMON stands for___________
41>In three tier organization model, _________is inserted between the managed object and the network manager
(RMAN/RMON)
42>The pure SNMP management system consists of ___________ (SNMP agent/SNMP manager/both)
43>HFC stands for___________
44>An SNMP management system can behave as an agent as well as a manager (true/false)___________
45>___________model is concerned only with the TCP/IP suite of protocols and does not address the layers above
or below it (OSI/Internet)
46>SNMP interfaces to the TCP/IP with ________are the transport layer protocol (TCP/UDP)
47>RFC=____ describes SNMP system architecture (1156/1157/1158)_
48>RFC=_____ defines SNMP by which management information for a network element may be inspected or
altered by logically remote users (1156/1157/1158)
49>RFC=____describes the structure and identification of management information, and RFC=_______addresses
the information base that is required for management (1154/1155/1156/1157)
50>The communication of management information among management entities is realized through exchange
of___ protocol messages (4/5/6)
51>The communication of management information among management entities is realized through exchange of
following protocol messages
a: get-request
b: get-next-request
c: set-request
d: get-response
e: trap
Ans:___________ (a/b/c/d/e/all)
52>Following protocol messages are initiated by the manager application process
a: get-request
b: get-next-request
c: set-request
d: get-response
e: trap
Ans:___________ (a/b/c/d/e)
53>Following messages are generated by the agent process
a: get-request
b: get-next-request
c: set-request
d: get-response
e: trap
Ans:___________ (a/b/c/d/e)
54>The message generation is called___________
55>__________is unsolicited alarm message (get-response/trap)
56>___________message is generated by the management process requesting the value of an object (get-
request/get-next-request/set-request/get-response/trap)
57>An object may have multiple values because of multiple instances of the object, in this case, _________
message can be used (get-request/get-next-request)
58>___________message is generated by the management process to initiate or reset the value of an object variable
(get-request/get-next-request/set-request/get-response/trap)
59>___________message is generated by an agent process (get-request/get-next-request/set-request/get-
response/trap)
60>___________is an unsolicited message generated by an agent process w/o a message or event arriving from the
manager process (get-request/get-next-request/set-request/get-response/trap)
61>SNMP manager contains following sets of data
a: one on the information about the objects
b: one on the values of the objects
Ans:___________ (a/b/both)
62>In q61, b is ______ (static/dynamic) and contains the measured values associated with the object_____
(true/virtual) database
.63>A MIB is _____ (true/virtual) database and is_________ (static/dynamic)
64>SNMP _____has a database which is the physical database and the SNMP ______does not have a physical
database (agent/manager)
65>_________have MIB which is compiled into the software module (agent/manager)
66>___________model deals with SMI and MIB (organization/functional/information)
VTU
N
O
TESBYSR
I
29. NETWORK MANAGEMENT SYSTEMS
28
67>The syntax used to describe management information is ASN._ (0/1/2)
68>The specification and organizational aspects of managed objects are addressed in______ (MIB/SMI)
69>The specifications of managed objects and the grouping of. And relationship between, managed objects are
addressed in ________ (MIB/SMI)
70>RFC=___ for SMI. RFC=____ for MIB (1213/1312/1157/1157)
71>Match the following
FDDI :RFC 1695
OSPF :RFC 1285
ATM :RFC 1253
72>A managed object is composed of___________ (object type/object instance/both)
73>SMI is concerned only with_____ and not______ (object type/object instance)
74>___________is a data type , has a name, syntax , and an encoding scheme (object type/object instance)
75>The syntax of an object type is defined using ____and _____have been adopted as the encoding scheme for
transfer of data types between agent and manager processes , as well as between manager processes (BER/ASN.1)
76>Every object type (every name) is uniquely identified by___________ (DESCRIPTOR/OBJECT IDENTIFIER)
77>DESCRIPTOR and OBJECT IDENTIFIER are in uppercase letters because they are___________ keywords
(BER/ASN.1)
78>There are____ objects under the internet object (3/4/5)_______
79>Following are the subnodes under Internet node in SNMPv1
a: directory
b: mgmt
c: experimental
d: private
Ans:___________ (a/b/c/d/all)
80>____________node is reserved for future use of OSI directory in the Internet
(directory/mgmt/experimental/private)
81>___________node is used to identify all IETF recommended and IAB approved subnodes and objects
(directory/mgmt/experimental/private)
82>___________node was created to define objects under IETF experiments (directory/mgmt/experimental/private)
83>___________is a heavily used node (directory/mgmt/experimental/private)
84>___________syntax is used to define the structure of object types (BER/ASN.1)
85>in ASN.1 data type, there are___ categories under structure (3/4/5)________
86>in ASN.1 data type, there are following categories under structure
a: simple
b: defined
c: constructor
Ans:___________ (a/b/c/all)
87>Simple, defined and constructor types are also called___ ____&____respectively
(application/structured/primitive)
88>SEQUENCE & SEQUENCE OF are not called base types (true/false)___________
89>The primitive or simple types are atomic and are INTEGER, OCTET STRING, OBJECT IDENTIFIER &
NULL. These are also referred to as ___________types (aggregate/non-ggregate)
90>When the integer value is restricted by a range it is called___________ (signed/ subtype)
91>The data type ENUMERATED is a special case of the ______data type (REAL/INTEGER)
92>Following are data types under Primitive types
a: INTEGER
b: OCTET STRING
c: OBJECT IDENTIFIER
d: NULL
Ans:___________ (a/b/c/d/all)
93>Following are data types under defined types
a: NetworkAddress b: IpAddress
c: Counter d: Gauge
e: TimeTicks f: Opaque
Ans:___________ (a/b/c/d/e/f/all)
94>Following are data types under constructor types
a: SEQUENCE
b: SEQUENCE OF
Ans:___________ (a/b/both)
95>Match the following
INTEGER :placeholder
VTU
N
O
TESBYSR
I
30. NETWORK MANAGEMENT SYSTEMS
29
OCTET STRING :object position in MIB
OBJECT IDENTIFIER :8bit bytes binary and textual data
NULL :subtypes INTEGER (n1. . . .nN)
96>Match the following
NetworkAddress :application wide arbitrary ASN.1 syntax, double wrapped OCTET STRING
IpAddress :non-negative integer in hundredth of second units
Counter :capped, on-negative integer, increase or decrease
Gauge :wraparound, non-negative integer, monotonically increasing, may 2^32-1
TimeTicks :dotted decimal IP address
Opaque :Not used
97>____:List maker::______: Table maker (SEQUENCE/SEQUENCE OF)
98>___________data type is used to specify either binary or textual information that is 8 bits long (OCTET
IDENTIFIER/OCTET STRING)
99>The combination keyword __________is the object position in the MIB (OBJECT STRING/OBJECT
IDENTIFIER)
100>___________are application specific data types and are SNMP based types (primitive/defined)
101>The base type ________is used to specify octets of binary information (Gauge/Opaque)
102>__________is intended for adding new base types to extend SNMP SMI (Gauge/Opaque)
103>__________is a choice of the address of the protocol family (IpAddress/NetworkAddress)
104>__________is the conventional four groups of dotted decimal notation of IPv4 (IpAddress/NetworkAddress)
105>__________is an application wide data type and is a non-negative integer (TimeTicks/Gauge/Counter)
106>Counter can only increase in value up to a maximum of 2^__-1 and then wraps around starting from 0
(16/32/64)
107>The data type __________is a non-negative integer , but its value can move either up or down
(Counter/Gauge/TimeTicks)
108>Gauge pegs at its maximum value of 2^__-1 (16/32/64)________
109>__________is a non-negative integer and measures time in units of hundredth of a second
(Counter/Gauge/TimeTicks)
110>The maximum value of TimeTicks is 2^__-1 (16/32/64)
111>__________is an application wide data types that supports the capability to pass arbitrary ASN.1 syntax
(Gauge/Opaque)
112>__________is used to create data types based on previously defined data types (Gauge/Opaque)
113>Size of ________is undefined in SNMPv1, which causes some problem in its implementation (Gauge/Counter/
Opaque)
114>The Opaque data type can be defined both IMPLICITly and EXPLICITly (true/false)__________
115>The constructs ______&____which are in ASN.1, are not included in SNMP based management syntax
(SEQUENCE/SEQUENCE OF/SET/SET OF)
116>____is used to build a list and______ is used to build a table (SEQUENCE/SET/SEQUENCE OF/SET OF)
117>Identify syntax for list
a: SEQUENCE OF <entry>
b: SEQUENCE {<type1>, <type2>. . . . <typeN>}
Ans:__________ (a/b/either)
118>Identify syntax for table
a: SEQUENCE OF <entry>
b: SEQUENCE {<type1>, <type2>. . . . <typeN>}
Ans:__________ (a/b/either)
119>Identify SNMPv1 keywords
a: ACCESS b: BEGIN
c: CHOICE d: Counter
e: DEFINITIONS f: DEFVAL
Ans:___________ (a/b/c/d/e/f/all)
120>Identify SNMPv1 keywords
a: DESCRIPTION b: END
c: ENTERPRISE d: FROM
e: Gauge f: IDENTIFIER
Ans:___________ (a/b/c/d/e/f/all)
121>Identify SNMPv1 keywords
a: IMPORTS b: INDEX c: INTEGER
d: IpAddress `e: NetworkAddress f: OBJECT
Ans:___________ (a/b/c/d/e/f/all)
VTU
N
O
TESBYSR
I
31. NETWORK MANAGEMENT SYSTEMS
30
122>Identify SNMPv1 keywords
a: OBJECT-TYPE
b: OCTET
c: OF
d: Opaque
e: REFERENCE
f: SEQUENCE
Ans:___________ (a/b/c/d/e/f/all)__________
123>Identify SNMPv1 keywords
a: SIZE
b: STATUS
c: STRING
d: SYNTAX
e: TRAP-TYPE
f: VARIABLES
g: TimeTicks
Ans:___________ (a/b/c/d/e/f/g/all)__________124>SNMPv1 has adopted ____with its____for encoding the
information to be transmitted between agent and manager processes (TLV/ASN.1/BER)___
125>Match the following
ipAdEntAddr :SEQUENCE
ipAdEntIfIndex :INTEGER
ipAdEntNetMask :IpAddress
ipAdEntReasmMaxSize:
ipAdEntBcastAddr:
ipAdEntry
126>Wrt OBJECT IDENTIFIER, if the most significant bit (8th bit) is set to___ , then the subidentifier is only one
octet long. The 8th bit is set to ___for the value that requires more than one octet and indicates more octets to
follow (0/1)___
127>_____ is encoded as straight octet strings._____ _____ & _____ coded as integers._____Is coded as OCTET
STRING type (IP address/opaque/counter/gauge/TimeTicks)
128>Match the following
OBJECT IDENTIFIER :APPLICATION 1
SEQUENCE :APPLICATION 3
IpAddress :APPLICATION 2
Counter :APPLICATION 4
Gauge :APPLICATION 0
TimeTicks :UNIVERSAL 6
Opaque :UNIVERSAL 16
129>A managed object has ____parameters (3/4/5)
130>A managed object has following parameters
a: textual name b: syntax
c: definition d: access
e: status
Ans:_________ (a/b/c/d/e/all)
131>OBJECT DESCRIPTOR does not specify instances of a managed object (true/false)___________
132>Associated with each _____is ______, which is the unique position it occupies in the MIB (OBJECT
IDENTIFIER/OBJECT DESCRIPTOR)
133>__________is the ASN.1 definition of the object type (definition/access/status/syntax)
134>__________is an accepted textual description of the object type (definition/access/status/syntax)
135>__________is the specification for the type of privilege associated with accessing the information
(definition/access/status/syntax)
136>Access is the specification for the type of privilege associated with accessing the information, it can be
__________ (read only/read write/not accessible/either of them)
137>__________specifies whether the managed object is current or obsolete (definition/access/status/syntax)
138>Related objects can be grouped to form ______ object type and the objects that make up the aggregate object
type are called ____object type component/subordinate /aggregate)
139>In order to encode the information on a managed object to be processed by machines , it has to be defined in a
formalized manner. This is done using__________ (micro/macro)
140>The body of the macro module consists of __________parts (3/4/5)
141>The body of the macro module consists of following parts
a: type notation
VTU
N
O
TESBYSR
I
32. NETWORK MANAGEMENT SYSTEMS
31
b: value notation
c: supporting productions
Ans:__________ (a/b/c/all)
142>____NOTATION defines the object types in the module and ______NOTATION defines the name of the
object (TYPE/VALUE)
143>Access can be only one of following options
a: read only
b: read write
c: write only
d: not accessible
Ans:__________ (a/b/c/d/all)
144>Allowed values for Status are
a: mandatory
b: optional
c: obsolete
Ans:__________ (a/b/c/all)
145>__________object is a group of related objects (compound/aggregate)
146>Object ___ is the managed object ipAddrEntry consist of the subordinate object types of___ through ___
(1/2/5)
147>ipAddrEntry describes the complete set of information consisting of the__ fields needed for an entry in the IP
interface address table (4/5/6)
148>The text following ___are comments and are not encoded (** / --)
149>The __________clause uniquely identifies the instantiation of the entry object type in the table
(REFERENCE/INDEX)
150>The__________ clause is the textual reference to the document from which the object is being mapped
(REFERENCE/INDEX)
151>_____clause is the columnar object identifier while______ clause is the default value to be object
(REFERENCE/INDEX/DEVAL)
152>SNMP operations apply exclusively to scalar operations (true/false)___________
153>_________object type comprises one or more subtypes (compound/aggregate)
154>RFC=____ for SMI (1551/1515/1155)_______
155>RFC=____ for MIB2 (1312/1213)_______
156>MIB is a_______ information store (true/virtual)
157>Objects in the MIB are defined using ASN.1 (true/false)__________
158>__________defines the mechanism for describing the objects (MIB/SMI)
159>The definition of MIB consists of___ components (3/4/5)
160>The definition of MIB consists of following components
a: name
b: syntax
c: encoding
Ans:________ (a/b/c/all)
161>The term __________mandates the implementation of the object in the current version of MIB2
(decrypted/deprecated)
162>Objects that are related are grouped into _____while object types are grouped to form_____ (aggregate object
type/object group)
163>The MIB module structure consists of
a: module name
b: imports from other modules
c: definitions of the current module
Ans:__________ (a/b/c/all)
164>Identify correct MIB module structure
a: <module name> DEFINITIONS::=BEGIN
<imports>
<definitions>
END
b: <module name> BEGIN::=DEFINITIONS
<imports>
<definitions>
END
Ans:__________ (a/b/either)
165>__________group contains the objects that describe system administration (System/Interface/Address
Translation)
VTU
N
O
TESBYSR
I
33. NETWORK MANAGEMENT SYSTEMS
32
166>__________group defines the interfaces of the network component and the network parameters associated
with each interface (System/Interface/Address Translation)
167>__________group is a cross reference table between the IP address and the physical address
(System/Interface/Address Translation)
168>__________group is a placeholder for future use of the OSI protocol (Transmission/CMOT)
169>___________group was created as a placeholder for network transmission related parameters
(Transmission/CMOT)
170>__________group is the communication protocol group associated with SNMP management (SMT/SNMP)
171>__________group is a placeholder and is not yet defined (Transmission/CMOT)
172>__________group is based on the transmission media that underlie each interface of the system
(transfer/transmission)
173>Match the following
System :mib2 11
Interfaces :mib2 9
at :mib2 7
ip :mib2 5
icmp :mib2 3
Tcp : mib2 1
Udp :mib2 2
egp :mib2 4
cmot :mib2 6
Transmission :mib2 8
Snmp :mib2 10
174>__________group is the basic group in the Internet standard MIB (at/snmp/System)
175>Implementation of the System group is mandatory for all systems in both agent and manager
(true/false)__________
176>The System group consists of___ entities (5/6/7)
177>The System group consists of following entities
a: sysDescr
b: sysObjectId
c: sysUpTime
d: sysContact
e: sysName
f: sysLocation
g: sysServices
Ans:__________ (a/b/c/d/e/f/g/all)
178>_________group contains managed objects associated with the interfaces of a system (System/Interface/snmp)
179>Implementation of the Interfaces group is mandatory for all systems (true/false)__________
180>The Interface group consists of following nodes__________ (ifNumber/ifTable/both)
181>wrt Interface group, the number of interfaces of the entity is defined by ____and the information related to
each interface is defined in the Interface table______ (ifIndex/ifTable/ifNumber)
182>Match the following
sysDescr : system 7
sysObjectId :system 5
sysUpTime :system 3
sysContact :system 1
sysName :system 2
sysLocation :system 4
sysServices :system 6
183>Match the following
ifNumber :largest size of the datagram for the interface
ifTable :type of interface layer below the network layer defined as an enumerated integer
ifEntry :total number of network interfaces in the system
ifDescr :list of entries that describes information on each interface of the system
ifType :an interface entry that contains objects at the subnetwork layer for a particular interface
ifMtu :a unique integer value for each interface
184>Match the following
ifSpeed :value of sysUpTime at the current operational status
ifPhysAddress :current operational status of the interface
ifAdminStatus :current or nominal data rate for the interface in bps
VTU
N
O
TESBYSR
I
34. NETWORK MANAGEMENT SYSTEMS
33
ifOperStatus :interface's address at the protocol layer immediately below the network layer
ifLastCange :reference to MIB definitions specific to the particular media used to realize the interface
ifSpecific :desired status of the interface ie up, down or testing
185>Match the following
ifInOctets :number of unsupported protocol packets discarded
ifInUcastPkts :number of inbound packets discarded
ifInNUcastPkts :number of subnetwork unicast packets delivered to a higher layer protocol
ifInDiscards :total number of input octets received
ifInErrors :number of non-unicast packets delivered to a higher layer protocol
ifInUnknownProtos :number of inbound packets with errors
186>Match the following
ifOutOctets :length of the output queue in packets
ifOutUcastPkts :number of outbound packets discarded
ifOutNUcastPkts :total number of unicast packets that higher level layer requested to be transmitted
ifOutDiscrds :number of octets transmitted out of the interface
ifOutErrors :total number of non-unicast packets that higher level layer requested to be transmitted
ifOutQLen :number of outbound packets tat could not be transmitted because of errors
187>__________is defined are an Enumerated INTEGER (ifNumber/ifType)
188>In interface group, object identifiers 11 through 15 refer to the measurements on_____ traffic and object
identifiers 16 through 21 to measurement on_____ traffic (outbound/inbound)
189>The Address Translation group consists of table that converts _____to _____for all the interfaces of the system
(physical address/NetworkAddress)
190>The Internet uses __as the networking protocol (TCP/IP)________
191>__________group has the information on the various parameters of the protocol (system/ip/at)
192>The implementation of IP group is mandatory (true/false) __________
193>The IP group contains following tables
a:IP address table
b:IP routing table
c:IP address translation table
Ans:__________ (a/b/c/all)
194>__________indicate whether the node is acting as just as route or gateway between two autonomous networks
(ipForwDatagrams/ipForwarding)
195>Match the following
ipForwarding :number of input datagrams discarded due to unsupported
protocolipDefaultTTL :number of input datagrams discarded due to header error
ipInRecieves :number of datagrams discarded due to address errors
ipInHdrErrors :number of input datagrams attempted to forward to the destination
ipInAddrError :number of locally addressed datagrams received successfully but discarded due to
unsupported protocol
ipForwDatagrams :total number of input datagrams received from interfaces including those in error
ipInUnknownProtos :node acting as a gateway or not
ipInDiscards :time-to-live field of IP header
196>Match the following
ipInDelivers :number of failures detected by the IP reassembly algorithm
ipOutRequests :number of successfully reassembled datagrams
ipOutDiscards :number of IP datagrams received that need reassembly
ipOutNoRoutes :maximum number of seconds that received fragments are held while they are awaiting
reassembly
ipReasmReqds :number of IP datagrams discarded because no route could be found to transmit than to
their destinations
ipReasmOKs :number of no error IP datagram discarded due to lack of buffer space
ipReasmFails :total number of IP datagrams which local IP user protocols supplied to IP
ipReasmTimeOut :total number of input datagrams successfully delivered to IP user protocols
197>Match the following
ipFragOKs :number of routing entries discarded even though they were valid
ipFragFails :IP address translation table that maps IP addresses to physical address
ipFragCreates :IP routing table containing an entry for each route
ipAddrTable :Number of datagram fragments generated as a result of fragmentation
ipNetToMediaTable :number of IP datagrams not fragmented due to Don’t fragment flag set
ipRoutingDiscards :number of successfully fragmented datagrams
VTU
N
O
TESBYSR
I
35. NETWORK MANAGEMENT SYSTEMS
34
ipRouteTable :table of IP addresses
198>An entry_____ in ipRouteDest Is considered a default route (1.1.1.1/0.0.0.0)
199>Match the following
ipAddrTable :broadcast address indicator bit
ipAddrEntry :index value of the entry
ipAdEntAddr :one of the entries in the IP address table
ipAdEntIfIndex :table of IP addresses
ipAdEntNetMask :the IP address to which this entry's addressing information pertains
ipAdEntBcastAddr :subnet mask for the IP address of the entry
ipAdEntReasmMaxSize :largest IP datagram that can be reassembled on this interface
200>Match the following
ipRouteTable :reference to MIB definition specific to the routing protocol
ipRouteEntry :mask to be logically ANDed with the destination address before comparing with the
ipRouteDest field
ipRouteDest :Routing mechanism by which this route was learned
ipRouteIfIndex :IP address of the next hop
ipRouteMetric1 :primary routing metric for this route
ipRouteNextHop :number of seconds since routing was last updated
ipRouteType :type of route
ipRouteProto :IP routing table
ipRouteAge :route to a particular destination
ipRouteMask :destination IP address of this route
ipRouteInfo :index of interface
ipRouteMetric2 :an alternative metric for this route
201>Match the following
ipNetToMediaTable :type of mapping
ipNetToMediaEntry :IP address
ipNetToMediaIfIndex :media dependent physical address
ipNetToMediaPhysAddress :table mapping IP addresses to physical addresses
ipNetToMediaNetAddress :IP address to physical address for the particular interface
ipNetToMediaType :Interface on which this entry's equivalence is effective
202>Match the following
ipForward :address of next system
ipForwardNumber :mask to be logically ANDed with the destination address before comparing with the
ipRouteDest field
ipForwardTable :a particular route to a particular destination under a particular policy
ipForwardEntry :number of entries in the IP forward table
ipForwardDest :contains information on IP forwarding table, deprecator IP routing table
ipForwardMask :routing table of this entity
ipForwardPolicy :destination IP route of this address
ipForwardNextHop :set of conditions that selects one multipath route
203>Match the following
ipForwardIfIndex :an alterntive routing metric for this route
ipForwardType :primary routing metric for this route
ipForwardProto :autonomus system number of next hop
ipForwardInfo :reference to MIB definition specific to the routing protocol
ipForwardNextHopAS :number of seconds since routing was last updated
ipForwardMetric1 :routing mechanism by which this route was learned
ipForwardMetric2 :type of route--remote, local, invalid or otherwise
ipForwardAge :ifIndex value of the interface
204>The entity__________defines the general set of conditions that would cause the selection of one multipath
route over others (ipForwardProto/ipForwardPolicy)
205>___________is a precursor of SNMP and is part of the TCP/IP suite (IGMP/ICMP)
206>Match the following
icmpInMsgs :number of ICMP echo reply message received
icmpInErrors :number of ICMP echo message received
icmpInDestUnreachs :number of ICMPredirect messages received
icmpInTimeExcds :number of ICMP source quench messages received
icmpInParmProbs :number of ICMP parameter problem messages received
VTU
N
O
TESBYSR
I
36. NETWORK MANAGEMENT SYSTEMS
35
icmpInSrcQuenches :number of ICMP time exceeded messages received
icmpInRedirects :number of ICMP destination unreachable messages received
icmpInEchoe :total number of ICMP messages received by the entity including icmpInErrors
icmpInEchoReps :number of message received by the entity with ICMP specific errors
207>Match the following
icmpInTimestamps :number of ICMP parameter problem messages sent
icmpInTimestampReps :number of ICMP Time exceeded messages sent
icmpInAddrMasks :number of ICMP destination unreachable messages sent
icmpInAddrMasksReps :number of ICMP timestamp message received
icmpOutMsgs :number of ICMP reply messages received
icmpOutErrors :number of ICMP address mask request messages received
icmpOutDestUnreachs :number of ICMP address mask reply messages received
icmpOutTimeExcds :total number of ICMP messages attempted to be sent by this entity
icmpOutParmProbs :number of good ICMP messages not sent, does not include the ones with errors
208>Match the following
icmpOutSrcQuechs :number of ICMP address mask reply messages sent
icmpOutRedirects :number of ICMP address mask request messages sent
icmpOutEchos :number of ICMP timestamp reply messages sent
icmpOutEchoReps :number of ICMP timestamp message sent
icmpOutTimestamp :number of ICMP echo reply messages sent
icmpOutTimestampReps :number of ICMP echo messages sent
icmpOutAddrMasks :number of ICMP redirect messages sent
icmpOutAddrMasksReps :number of ICMP source quench messages sent
209>In TCP group, the table entry has following indices to uniquely define it in the table
a:tcpConnLocalAddress
b:tcpConnLocalPort
c:tcpConnRemAddress
d:tcpConnRemPort
Ans:___________ (a/b/c/d/all)
210>Match the following
tcpRtoAlgorithm :number of resets done to either CLOSED or LISTEN
tcpRtoMin :number of failed attempts to make connection
tcpRtoMax :number of passive connections made LISTEN to SYN-RCVD state
tcpMaxConn :number of active connections made CLOSED TO SYN-SENT state
tcpActiveConn :Maximum number of TCP connections
tcpPassiveOpens :maximum value for timeout in milliseconds retransmission
tcpAttemptsFails :minimum value for timeout in milliseconds for retransmission
tcpEstabResets :timeout algorithm for retransmission of octets
211>Match the following
tcpCurrEstab :number of segment send containing RST flag
tcpInSegs :Total number of segments received in error
tcpOutSegs :Total number of segments retransmitted
tcpRetransSegs :TCO connection table
tcpConnTable :Total number of segments sent excluding retransmission
tcpInErrs :total number of segments received including with errors
tcpOutRsts :no of connections for which the current state is either ESTABLISHED or CLOSED WAIT
212>Match the following
tcpConnTable :remote port number
tcpConnEntry :remote IP address
tcpConnState :local port number
tcpConnLocalAddress :local IP address
tcpConnLocalPort :state of the TCP connection
tcpConnRemAddress :information about a particular TCP connection
tcpConnRemPort :TCO connection table
213>Match the following
udpInDatagrams :information about a particular connection or UDP listener
udpNoPorts :local IP address
udpInErrors :local UDP port
udpOutDatagrams :total number of datagrams delivered to the users
VTU
N
O
TESBYSR
I