IT140 FINAL EXAM Questions
IT140 FINAL EXAM Questions
1. One of its benefits is the use of multiple NMSs to eliminate single point of failure.
2. A NM software architecture which provide interfaces between user and NM software.
3. A NM software architecture which includes a set of NM applications, application elements, and
NM data transport service.
4. A collection of software for performing network monitoring and control.
5. A collection of software devoted to the network management tasks.
6. Concerned with charging the use of network resources.
7. Concerned with monitoring the status of components during network operation.
8. Concerned with ensuring that the systems as a whole, and each essential component
individually, are in proper working order.
9. Concerned with concerned with observing and analyzing the status and behavior of the end
systems, intermediate systems, and subnetworks that make up the network to be managed.
10. Which is not part of the monitored types of information?
11. All are monitoring system components except
12. A monitoring system components that performs the basic monitoring function of retrieving
information.
13. A monitoring system component that gathers and records management information for one or
more network elements and delivers the information to the monitor.
14. A monitoring system component that manage information that represents resources and their
activities.
15. A monitoring system component that generates summaries and statistical analysis of
management information.
16. A network monitoring method where a manager sends request to an agent which processes the
request and responds with information from its MIB.
17. A network monitoring methods where information flow is initiated from the agent to manager.
18. Network performance indicators which deals with availability, response time, and accuracy.
19. Throughput and utilization are components of this network performance indicator.
20. All of the following are performance monitoring function except
21. Which is not a component of fault monitoring function? TESTING
22. A machine independent data description language. ASN.1
23. Describes a method for encoding values of each ASN.1 type as a string of octets and is based on
the use of a type-length-value (TLV) structure. BER
24. Describes the generic structure of data and allows data types and values to be defined.
ABSTRACT SYNTAX
25. Describes how data are actually represented in terms of bit patterns while in transit. TRANSFER
SYNTAX
26. Sequence of octets used to represent a data value. ENCODING
27. Concerned with modifying parameters in and causing actions to be taken by the end systems,
intermediate systems, and subnetworks that make up the network to be managed. NETWORK
CONTROL
28. All should be secured in a network except USERS
29. A security requirement for making information accessible to only authorized users
and includes the hiding of the existence of information. SECRECY
30. A security requirement for making information modifiable to only authorized users. INTEGRITY
31. A security threat where an entity pretends to be a different entity. MASQUERADE
32. Which among the following is a security threat to availability? INTERRUPTION
33. A security threat where an unauthorized party inserts false information. FABRICATION
34. All of the following are network assets except BANDWIDTH
35. Network assets that is prone only to interruptions like theft and denial of service. HARDWARE
36. Collection of a moderate number of variables that may be of different type and whose order is
significant. SEQUENCE
37. Also referred to as SNMP-based Network Management. INTERNET NETWORK MANAGEMENT
38. An organization responsible for SNMP standardization. IETF
39. Ping utility is an example of this internet protocol. ICMP
40. Known to be an interim solution and an enhanced version of SGMP. SNMP
41. Referred to a document that is replaced by an updated version. OBSOLETE
42. By means of ______ the agent occasionally notifies the manager about some events related to
network operation. TRAP
43. A notation is used to define MOs and the entire MIB structure. ASN.1
44. All are type of ASN.1 universal types except COUNTER
45. It is widely used and standard encoding scheme. BER
46. An SNMP operations that retrieves management information (values of scalar objects). GET
OPERATION
47. An SNMP operations that updates management information (values on scalar objects). SET
OPERATION
48. An SNMP security concept where agent may wish to give different access privileges to different
managers. ACCESS POLICY
49. An SNMP security concept where agent may wish to limit access to the MIB to authorized
managers. AUTHENTICATION SERVICE
50. It is used for accessing MIB objects serially. LEXICOGRAPHICAL ORDERING
P.S.: The rest of the PPTs, Quiz1, Quiz2 and Quiz3 (random questions) na related sa coverage ng FINAL
EXAM ay kasali sa exam…
Good luck