Netman Finals

Is this your test? Login to manage it. If not, you can develop a quiz just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
Describes how data are actually represented in terms of bit patterns while in transit
2.
1 point
An SNMP security concept where agent may wish to limit access to the MIB to authorized managers
3.
1 point
Concerned with modifying parameters in and causing actions to be taken by the end systems, intermediate systems, and subnetworks that make up the network to be managed.
4.
1 point
A NM software architecture which includes a set of NM applications, application elements, and NM data transport service
5.
1 point
A network monitoring methods where information flow is initiated from the agent to manager
6.
1 point
A security threat where an unauthorized party inserts false information
7.
1 point
Which among the following is a security threat to availability?
8.
1 point
Sequence of octets used to represent a data value
9.
1 point
All of the following are performance monitoring except
10.
1 point
A security threat where an entity pretends to be a different entity.
11.
1 point
Describes a method for encoding values of each ASN.1 type as a string of octets and is based on the use of a type-length-value (TLV) structure
12.
1 point
An organization responsible for SNMP standardization
13.
1 point
A monitoring system component that manage information that represents resources and their activities
14.
1 point
It is widely used and standard encoding scheme
15.
1 point
Concerned with concerned with observing and analyzing the status and behavior of the end systems, intermediate systems, and subnetworks that make up the network to be managed
16.
1 point
Throughput and utilization are components of this network performance indicator.
17.
1 point
Collection of a moderate number of variables that may be of different type and whose order is significant
18.
1 point
Concerned with monitoring the status of components during network operation
19.
1 point
An SNMP operations that retrieves management information (values of scalar objects)
20.
1 point
A security requirement for making information modifiable to only authorized users
21.
1 point
Network performance indicators which deals with availability, response time, and accuracy
22.
1 point
Known to be an interim solution and an enhance version of SGMP
23.
1 point
A notation is used to define MOs and the entire MIB structure
24.
1 point
By means of ______ the agent occasionally notifies the manager about some events related to network operation
25.
1 point
A collection of software devoted to the network management tasks
26.
1 point
Which is not part of the monitored types of information?
27.
1 point
A collection of software for performing network monitoring and control.
28.
1 point
An SNMP operations that updates management information (values on scalar objects)
29.
1 point
A machine independent data description language
30.
1 point
All are monitoring system components except
31.
1 point
A network monitoring method where a manager sends request to an agent which processes the request and responds with information from its MIB
32.
1 point
Referred to a document that is replaced by an updated version
33.
1 point
Describes the generic structure of data and allows data types and values to be defined
34.
1 point
A monitoring system components that performs the basic monitoring function of retrieving information
35.
1 point
Ping utility is an example of this internet protocol
36.
1 point
Concerned with charging the use of network resources
37.
1 point
It is used for accessing MIB objects serially
38.
1 point
Which is not a component of fault monitoring function
39.
1 point
Network assets that is prone only to interruptions like theft and denial of service
40.
1 point
All of the following are network assets except
41.
1 point
Concerned with ensuring that the systems as a whole, and each essential component individually, are in proper working order
42.
1 point
An SNMP security concept where agent may wish to give different access priveleges to different managers
43.
1 point
All should be secured in a network except
44.
1 point
One of its benefits is the use of multiple NMSs to eliminate single point of failure.
45.
1 point
A monitoring system component that gathers and records management information for one or more network elements and delivers the information to the monitor
46.
1 point
Also referred to as SNMP-based Network Management
47.
1 point
A monitoring system component that generates summaries and statistical analysis of management information
48.
1 point
A security requirement for making information accessible to only authorized users and includes the hiding of the existence of information.
49.
1 point
A NM software architecture which provide interfaces between user and NM software
50.
1 point
All are type of ASN.1 universal types except