Você está na página 1de 78

NETWORK MANAGEMENT SYSTEMS

CHAPTER 1: DATA COMMUNICATION &


NETWORK MANAGEMENT OVERVIEW
1>The architecture of the telephone network is hierarchical (true/false)__________
2>In telephone network model, there are ____levels of network switches and ____types of trunks that connect
these switches (3/5/5)
3>__________is a logical link between two switches that may traverse one or more physical links (loop/trunk)
4>In telephone network model, the end office is the __________in the hierarchy (lowest/highest)
5>figure 1.1__________
6>Match the following
Regional center : class 4 switch
Sectional center : class 5 switch
Primary center : class 1 switch
Toll center
: class 3 switch
End office
: class 2 switch
7>In telephone network model, the customer's telephone or PBX which is a switch on the customer premises , is
connected to the end office via a dedicated link called___________ (trunk/loop)
8>Toll switches carry long distance calls (true/false)___________
9>DDD stands for___________
10>In telephone network model, _______ (DET/DDD)network enables up to dial the far end telephone w/o an
operators assistance, comprises___ transmission trunks (2/3/4)
11>Match the following
direct trunk
:connects any two toll offices
toll connecting trunk :connects an end office to any toll office
toll (internal) trunks :connects two end offices
12>In telephone network model , a circuit connection is set up
a: directing using a local trunk
b: via the higher level switches and routes
Ans :__________ (a/b/either)
13>In telephone network model, primary and secondary routes are already programmed into the___________
(bridge/switch)
14>Operations support systems ensure the quality of service in the telephone network (true/false)___________
15>The quality of the call, measured in terms of SNR is measured regularly by a trunk maintenance
system________ (true/false)
16>NOC stands for__________
17>For a given region, there is ___________where the global status of the network is monitored (PBX/NOC)
18>___________is the nerve center of telephone network operations (PBX/NOC)
19>The telephone network is managed from the perspective o_________ (service provider/user)20>In telephone
network, with the emphasis on the users' point of view, the first objective in operations is_____ and then ______
(quality & economy of service/restoration of service)
21>POTS stands for___________
22>___________communications technology deals with the theories of electrical engineering, computer
engineering, and computer science and their application to all types of communications over networks
(telecommunication/data/network)
23>A basic network can be viewed is interconnected ________ (nodes/links/both)
24>___________carrier information from one node to another that is directly connected to it (network/link)
25>A node behaves as
a: end node
b: intermediate node
Ans:___________ (a/b/both)
26>If the node behaves as_____ node, information either originates or terminates there. ______node redirects the
information from one link to another (intermediate/end)
27>In telephone network model, End office nodes behaves as___________ (intermediate/end)
28>Each ___________node has connection to a user interface , if the information originates or terminates there
(intermediate/end)
29>DTE stands for___________
30>___________is any equipment that generates or accepts digital data (DDD/DTE)

NETWORK MANAGEMENT SYSTEMS


31>Data can be transmitted in
a: analog format
b: digital format
Ans:___________ (a/b/either)
32>The __________data is sent either as base band or on top of a carrier (digital/analog)
33>___________data is generated either directly by the user equipment or as analog data and converted to digital
data (digital/analog)
34>ISDN stands for___________
35>Long distance data transmission today is mostly ___________due to its superior price and performance
(digital/analog)
36>The data can be transmitted in following modes
a: circuit switches
b: message switched
c: packet switches
Ans:___________ (a/b/c/all)
37>In__________ switched mode , a physical circuit is established between the originating and terminating ends
before the data is transmitted (circuit /
message/ packet switches)
38>In_____ &______switched modes, the data is broken into packets and each packet is enveloped with the
destination and originating addresses (circuit /
message/ packet switches)
39>___________switched mode is used to send long messages such as email (circuit /
message/ packet switches)
40>___________switched mode is used to transmit small packets used in applications such as interactive
communication (circuit /
message/ packet switches)
41>In telephone network, _____&_____open each packet to find the destination address and forward the data to
the appropriate output links (switch/bridge/router)
42>In _________switched mode, each packet may take a different route (circuit/packet)
43>The main difference between packet and message switching is that in the ___________the data is stored by the
system and then retrieved by the user at the later time (former/latter)
44>In___________ switched mode, the packets are fragmented and reassembled in almost real time
(message/packet)
45>email is an example of_________ switched mode (message/packet)
46>PSDN stands for___________
47>Network communications are classified as either _____or______ communication (tele/wireless/data)
48>Telecommunication network is a __________switched network that is structured as a public network accessible
by any user (message/circuit)
49>Data communication network is also called computer communication network (true/false)___________
50>___________transfer the information from digital to analog at source and back to digital at destination
51>In corporate data and telecommunication networks, the computer terminals are connected to___________
which manages the local terminals and provides a single interface to the telephone network (onsite switch
PBX/onsite communication controller)
52>In corporate data and telecommunication networks, the telephones are connected locally by ___________
which interfaces to the telephone network (onsite switch PBX/onsite communication controller)
53>Processor to processor communications over the telecommunications lines take _____time and therefore
are______ expensive (less/more)
54>SNA stands for___________
55>In SNA, the host is connected to the terminals via the _____controllers and ______controllers
(communications/cluster/both)
56>In SNA, _____ controllers manage the DTEs at the peripheral nodes and the ______controllers manage the
traffic at the subnetwork levels (communications/cluster/both)
57>DCE stands for___________
58>The system of links that connect remote LANs is called___________ (MAN/WAN)
59>A LAN is physically connected to a WAN link by ______or _____at each end (switch/bridge/router)
60>Important aspects of DCEs are
a: the different platforms and applications running on DCEs have the ability to communication with each other
b: the ability of the processors attached to LANs do multiple functions
Ans: ___________ (a/b/both)
61>The processor that requests a service is called the _____, and the processor that provides the service is called
the______ (server/client)

NETWORK MANAGEMENT SYSTEMS


62>The process that initiates a transaction to run an application in either a local or remote processor is called the
_____.The application process that is invoked by a _____ is called the______ (server/client)
63>In client/server architecture, the ____initiates the request and the _______responds (server/client)
64>Client cannot initiate a process in the server (true/false)___________
65>A real world analogy of the client/server operation is a post office (true/false)___________
66>The communication between operative computing processes is called ___________communication (end to
end/peer to peer)
67>___________is a suite of protocols that enable networks to be interconnected (UDP/IP or TCP/IP)
68>IP is a _____ protocol. TCP is a ______protocol. UDP is a ______protocol (connection
oriented/connectionless)
69>Most of Internet traffic really uses___________ because of the reliability of data transmission (UDP/IP or
TCP/IP)
70>The Internet is a network of networks (true/false)___________
71>___________serve as the interface between dissimilar and independent , autonomous , networks and perform
many functions including protocol conversions (routers/gateways)
72>Autonomous networks have little knowledge each other's attributes , configurations and addresses and yet
communication is automatically facilitated by a hierarchy of Internet servers along the path
(true/false)___________
73>Email messages are transmitted by a___________ scheme all along the path (stop & wait/ store & forward)
74>Internet users are currently doubling n population each year (true/false)___________
75>In layered architecture, the workstations belong to the___________ plane (LAN/user)
76>in layered architecture, the interfaces are defined as the fabrics (true/false)___________
77>In Internet fabric model, the LAN and WAN planes interface through _____fabric. The WANs in the WAN
plane interface via the______ fabric (gateway/switching)
78>In Internet fabric model, the user's workstation interfaces to a LAN via a ___________interface
(gateway/switching/MAC)
79>In Internet fabric model, LANs interface to a WAN by a switching fabric of ___________
(bridges/routers/switches/all)
80>____________fabric interconnects different WANs (gateway/switching)
81>_____is a private network and access to it is controlled by the enterprise that owns it, whereas______is public
(internet/intranet)
82>In communication lingo, commonality can be interpreted as _____and procedures as______
(protocols/standards)
83>___________can be defined as the basic structure of a system that shows its functional components and the
relationships among the
84>___________architecture describes the functional components of a communication network as well as the
operational interfaces among them (network/communication)
85>The operational procedures are specified in terms of ___________ (standards/protocols)
86>Standardization of___________ involves agreement in the physical characteristics and operational procedures
of communication equipment that performs similar functions (policy/protocol)
87>Email exchange across the world is possible because most vendors have adopted the standard ___________in
their software (MIME/SMTP)
88>Each system can be divided into ______broad sets of communication layers (2/3/4)
89>in communication architecture , top set of layers consists of the _____layers and the bottom set of the______
layers (transport/application)
90>The data can be transmitted in one of____ modes (2/3/4)
91>The ISO has developed a highly modular or layered , architecture for communication protocols that is called
the OSI reference model , published as OSI RM--ISO______ (7948/749)
92>OSI reference model was developed based on the premise that
a: the different layers of protocol provide different services
b: each layer can communicate with only its own neighboring level
Ans:___________ (a/b/both)
93>In OSI reference model, two systems can communicate on a ___________level (end to end/peer to peer)
94>In OSI reference model, layers __ __are the transport system protocol layers; and layers ______are application
support protocol layers (1/2/3/4/5/6/7)
95>In OSI reference model, the intermediate system is involved only up to the first ________layers in the process
(3/4)

NETWORK MANAGEMENT SYSTEMS


96>Match the following
Physical
:provides application specific protocols for each application and each transport protocol
system
Data link
:establishes and clears sessions for applications, and thus minimizes loss of data during large
data exchange
Network
:forms the switching/routing layer of the network
Transport
:multiplexes and de-multiplexes messages from applications
Session
:transfers to and gathers from the physical medium raw bi data
Presentation :Consists of two sublayers LLC and MAC
Application :provides a set of standard protocols so that the display would be transparent to syntax of the
application
97>_____formats the data to go on the medium; performs error control and flow control.______ controls data
transfer to and from LAN; resolves conflicts with other data on LAN (MAC/LLC)
98>Identify feature of transport layer in OSI reference model
a: multiplexes and demultiplexes messages from applications
b: acts as a transparent layer to applications and thus isolates them from the transport system layers
c: makes and breaks connections for connection-oriented communication
d: controls flow of data in both directions
Ans:___________ (a/b/c/d/all)
99>Identify features of physical layer in OSI reference model
a: provides a set of standard protocols so that the display would be transparent to syntax of the application
b: transfers to and gathers from the physical medium bit data
c: data encryption and decryption
d: handles physical and electrical interfaces to the transmission medium
Ans:___________ (a/b/c/d/all)
100>Identify features of presentation layer in OSI reference model
a: provides a set of standard protocols so that the display would be transparent to syntax of the application
b: transfers to and gathers from the physical medium bit data
c: data encryption and decryption
d: handles physical and electrical interfaces to the transmission medium
Ans:___________ (a/b/c/d/all)
101>In OSI reference model , the message in each layer is contained in message units called__________
102>PDU consist of _____parts (2/3)
103>PDU consists of ____&______ (PCI/VCI/UD)
104>In PDU , ____contains header information about the layer while ______contains the data that he layer , acting
as a service provider , receives from or transmits to the upper layer/service user layer (PCI/UD)
105>In OSI reference model, the size of the PDU increases as it goes toward _______layers (higher/lower)
106>__________layer is responsible for physically placing the electrical signal on the physical medium and picking
up the signal from it (presentation/physical)
107>__________layer controls and manages the physical and electrical interfaces to the physical medium including
the connector or transceiver (presentation/physical)
108>There are various protocol standards for physical layer interface, _____classes of standards have been
established by the ITU-T and EIA (2/3)
109>ITU-T stands for__________
110>EIA stands for__________
111>The data communication between two DTEs is controlled and managed by __________layer (network/data
link)
112>In data link layer, the data communication is serial __________oriented stream (bit/byte)
113>functions of data link layer are
a: establish and clear the link
b: transmit the data
c: error control and data compression
d: flow control
Ans:__________ (a/b/c/d/all)
114>Flow control on the data link layer is done on a hop to hop basis (true/false)__________
115>In data link layer, the lower __________layer controls the access and transmittal of data to the physical layer
in an algorithm manner (LLC/MAC)
116>There are _____basic forms of LANs (2/3)
117>Ethernet LAN:____ type: :FDDI:____ type (ring/bus)

NETWORK MANAGEMENT SYSTEMS


118>features of network layer are
a: controls and manages the switching fabric of the network
b: provides both connectionless network service and connection oriented network service
Ans:________ (a/b/both)
119>CLNS stands for___________
120>CONS stands for__________
121>__________is used when the lower layers are highly reliable such as LANS and bridges as well as when the
messages are short (CONS/CLNS)
122>__________is the method for transmitting long messages such as file transfer (CONS/CLNS)
123>__________is used when the transmission medium is not reliable (CONS/CLNS)
124>___________at the nodes of a network performs the function of routing and switching the data (switch/router)
125>The OSI architecture model divides the network layer into ________sublayers (2/3/4)
126>Sublayers of network layer are
a: SNICP
b: SNDCP
c SNDAP
Ans:_________ (a/b/c/all)
127>SNICP stands for___________
128>SNDCP stands for__________
129>SNDAP stands for___________
130>In network layer , the top sublayer is _________that interfaces to the transport layer (SNICP/SNDCP/SNDAP)
131>The Internet communicates between nodes using an Internet address and _____.The nodes in turn
communicate with subnetworks using_____ which depends on the subnetwork protocol (SNICP/SNDCP/SNDAP)
132>The SNDCP communicates with is data link layer via the third network sublayer___________
(SNICP/SNDAP)
133>In OSI terminology, TCP/IP is called __________ (ISO-IP/ISO-CLNP/either)
134>A connection ____OSI protocol is X.25 PLP, a packet layer protocol (less/oriented)
135>Identify feature of transport layer
a: multiplexes the user data provided by the application layers and passes the packets to the network layer
b: service is independent of the network on which the packets are transmitted
c: can be connectionless or connection oriented and is implemented in both Internet and OSI protocols
d: flow control is implemented and functions as a data rate manager between the application programs and the
network layer
Ans:__________ (a/b/c/d/all)
136>Layers ___through ___application layer protocols (4/5/6/7)
137>__________layer establish the communication at the beginning of the session, monitor , synchronize and error
correct the information exchanged during the session and then release the logical link at the end of the session
(presentation/session)
138>__________layer is the medium of presentation of message's context to the user or application program
(physical/presentation)
139>__________layer is a context sensitive layer (physical/presentation)
140>wrt presentation layer , a common syntax that is used for semantics is__________ (BER/ASN.1)
141>ASN.1 stands for__________
142>Data encryption and data compression are also generally done in __________layer (physical/presentation)
143>The _____&_____layers form the suite of TCP/IP protocols (transport/data link/network)
144>wrt SNA , arrange the following in correct sequence (top to bottom)
a: physical
b: path control
c: transmission control
d: data link
e: data flow control
f: presentation services
g: end user application
Ans:__________ (gfecabd/gfecbda/gfeabdc)
145>In SNA, the combination of _____&_____services are called the SNA transmission subsystem (transmission
control/presentation/data flow )
146>In SNA , _________services are also known as SNA high level services (data flow/transmission
control/presentation )
147>All application specific protocol services in OSI are sandwiched between the_____ and_____ layers
(user/transport/presentation)
148>In the Internet model, all application specific protocol services are sandwiched between the____&_____
layers (session/user/transport)

NETWORK MANAGEMENT SYSTEMS


149>A user interfaces with a host at a remote terminal using ____in the OSI model and ______in the Internet model
(Telnet/VT)
150>File transfers are accomplished using _____in the OSI model and _____in the Internet (FTP/FTAM)
151>FTAM stands for___________
152>The most common mail service function in the Internet is______. A similar protocol in the OSI model is_____
(MOTIS/SMTP)
153>MOTIS stands for_________
154>Network management is accomplished using ____in the OSI model and _______in the Internet (CMIP/SNMP)
155>CMIP stands for___________
156>OAM&P stands for___________
157>NMS stands for__________
158>The most common and serious problems of networks are connectivity failures, which are in the category
of__________ management (security/fault)
159>__________is generally interpreted to mean failures in accessing networks and systems by the users
(risk/fault)
160>Power hits could reset network component configuration, causing network failures (true/false)________
161>CIO stands for_________
162>The corporate network needs to be secured for privacy and content using __________
(firewalls/encryption/both)
163>____network was monopolistic and had expensive redundancy. ______network is adhoc, decentralized, has
loosely specified interfaces, and has dynamic routing (data/telephone)
164>The latest user satisfaction for an ISP is _____% (8/16/32)
165>Which elements of managing your network require most of your time?
a: configuring the management system itself
b: expanding the network
c: gathering and analyzing statistics for presentation to upper management
Ans:__________ (a/b/c/all)
166>Sniffer is an example of troubleshooting tools (true/false) __________
167>What does a network failure cost the user
a: there are tangible and intangible losses
b: the cost is a function of the dependence of the business upon shared data
c: A&R labs need high technology and tolerate low reliability. Business accept lower and proven technology but
require high reliability
Ans:__________ (a/b/c/all)
168>__________management can be defined as OAM&P of network and services (configuration/network)
169>Match the following
Operations group
:involves network planning and circuit provisioning
network administration
:handles functions that include both installation con repairs of facilities
and equipment
installation & maintenance group: concerned with daily operations in providing network services
Provisioning
:concerned with establishing and administering the overall goals ,
policies
and procedures of network managements
170>The goal of network management is to ensure that the users of a network receive the information technology
services with the quality of service that they expect (true/false)__________
171>Network management comprises of _______major groups (2/3/4)
172>Network management comprises of following groups
a: network provisioning
b: network operations
c: network installation and maintenance
Ans:__________ (a/b/c/all)
173>_______is the primary responsibility of the engineering groups and ____is the primary responsibility of the
plant facilities group (network provisioning/network operations/network I&M)
174>The normal daily operations are the function of the __________groups, which controls and administers a
network operation center (network provisioning/network operations/network I&M)
175>NOC stands for__________
176>__________is the nerve center of network management operations (NMS/NOC)
177>The functions of the NOC are concerned primarily with _____;its secondary responsibilities are_____&_____
(network provisioning/network operations/network I&M)
178>__________consists of network planning and design and is the responsibility of the engineering group
(network provisioning/network operations/network I&M)

NETWORK MANAGEMENT SYSTEMS


179>ISO has defined __OSI network management applications (4/5/6)
180>__________are concerned with daily operations of the network and providing network services (network
provisioning/network operations/network I&M)
181>ISO has defined following OSI network management applications
a: fault management
b: configuration management
c: performance management
d: security management
e: account management
Ans:__________ (a/b/c/d/e/all)
182>Whenever there is a service failure, it is responsibility of _______to restore service as soon as possible
(NMS/NOC)
183>In several failure situations , the network will detect and restore service automatically .This network feature is
called __________ (grooming/self healing)
184>Restoration of service does not include fixing the cause of the problem. That responsibility to fix the problem
usually rests with the__________ group (network provisioning/network operations/network I&M)
185>__________administration is the administrative part of fault management and is used to track problems in the
network (session ticket/trouble ticket)
186>wrt network management , there are ______configurations of the network (3/4/5)
187>Following are the configurations of the network
a: static configuration
b: current running configuration
c: planned configuration
Ans:__________ (a/b/c/all)
188>_____configuration is one that would come up if the network is started from idle status. In_____ configuration
of the future , the configuration data will change as the network is changed (planned/current/static)
189>__________management includes physically securing the network as well as controlling access to the network
by the users (fault/security)
190>Access privilege to application software is not the responsibility of the NOC unless the application is either
owned or maintained by the NOC (true/false)__________
191>Traffic statistics are helpful in detecting trends and planning future needs (true/false)__________
192>NOC gathers data and keeps them up to date in order to tune the network for optimum performance
(true/false)__________
193>__________administers costs and allocate the use of the network (NMS/NOC)
194>Since the network consists of components manufactured by multiple vendors, commonality in the definition
and relationship of component attribute is needed. This is defined by the __________ (SMI/MIB)
195>__________is the Internet management protocol which is the most popular protocol to acquire the data
automatically using protocol and performance analyzing tools (SMTP/SNMP)
196>There______ classes of reports (3/4/5)
197>Following are different classes of reports
a: system report
b: management report
c: user report
Ans:__________ (a/b/c/all)
198>Match the following
System report
:are distributed to the users on a periodic basis to let them know the status of network
performance
management report :are needed for network operations to track the activities
user report
:goto the management of the network management group to keep them informed about
the activities and performance of the NOC and the networks
199>__________group takes care of all installation and maintenance of equipment and cables (network
operation/network I&M)
200>___________group is the service arm of the engineering group for installation and fixing troubles for network
operations (network operation/network I&M)
201>__________management is the management of systems and system resources in the network while_________
management is concerned with network resources such as hubs , switches , bridges , routers and gateways, and the
connectivity among them via a network (system/data/network)
202>___________management addresses end to end connectivity between any two processors in the network
(system/network)
203>A network consists of network components and their inter connections (true/false)_________
204>A network management system manages all the components that are connected to a network
(true/false)__________

NETWORK MANAGEMENT SYSTEMS


205>The two major standards are the Internet and the OSI standards (true/false)___________
206>TMN stands for___________
207>The popular _____ end systems are housed either on SUN or HP UNIX based workstations. The ______end
network management systems run either on Windows 95/98 or Windows NT (low/high)
208>Network connectivity could be tested using the ping command in UNIX (traceroute) and Windows NT
(tracert) based system (true/false)___________
209>The current network management systems are based on the ________protocol (SMTP/SNMP)
210>following are limitations of current network management systems
a: they need a dedicated NMS monitoring station, which must be on a specific type of platform
b: the values of the managed objects should be defined as scalar values
c: SNMP based management is a poling based system
Ans:___________ (a/b/c/all)
211>__________ based management protocol CMIP is object oriented (OSI/Internet)
212>Limitations in SNMP based management have been overcome by the emerging web based management
(true/false)___________
213>A web based system is platform independent for the management software using Java languase in the managed
components , for the Web based NMS server as well as for Web browser monitors (true/false)___________
214>Following are web based management schemes
a: Java based JMX developed by Sun
b: WBEM based on the Common Information Model developed by Microsoft
Ans:___________ (a/b/both)
215>JMX stands for___________
216>WBEM stands for__________
217>The broadband multimedia service is based on ATM SONET wide area network and several emerging access
technologies such as HFC and ADSL (true/false)___________
218>HFC stands for___________
219>ADSL stands for___________
220>___________network, which is the direction of the next generation network, would include embedded
network management applications (intelligent/active)
221>following methods can be used to find the root of a problem in network
a: artificial intelligence
b: algorithmic schemes
c: finite state machine
Ans:___________ (a/b/c/all)
222>_____establish secure networks , and______ ensures secure communication (cryptography/firewalls)
ANSWERS:
1>T
2>5,3
3>trunk
4>lowest
5>
6>1-c 2-e 3-d 4-a 5-b
7>loop
8>T
9>Direct Distance Dialing
10>DDD,3
11>1-c 2-b 3-a
12>either
13>switch
14>T
15>T
16>Network Operation Center
17>NOC
18>NOC
19>user
20>restoration of services, quality and economy
21>Plain Old Telephone Service
22>network
23>both
24>link
25>both

NETWORK MANAGEMENT SYSTEMS


26>end, intermediate
27>end
28>end
29>Data Terminating Equipment
30>DTO
31>either
32>analog
33>digital
34>Integrated Services Digital Network
35>digital
36>all
37>circuit
38>message & packet
39>message
40>packet
41>bridges & routers
42>packet
43>latter
44>packet
45>message
46>Public Switched Data Network
47>tele, data
48>circuit
49>T
50>modem
51> onsite communication controller
52> onsite switch PBX
53>less, less
54>Systems Network Architecture
55>both
56>cluster, communication
57>Distributed Computing Environment
58>WAN
59>bridge, router
60>both
61>client, server
62>client, client, server
63>client, server
64>T
65>T
66>peer to peer
67>TCP/IP
68>connectionless, connection oriented, connectionless
69>UDP/IP
70>T
71>gateway
72>T
73>store & forward
74>T
75>user
76>T
77>switching, gateway
78>MAC
79>all
80>gateway
81>intranet, internet
82>standards, protocols
83>architecture
84>communication
85>protocols
86>protocols
87>SMTP

NETWORK MANAGEMENT SYSTEMS


88>2
89>application, transport
90>3
91>7498
92>both
93>peer to peer
94>1to4 5to7
95>3
96>1-e 2-f 3-c 4-d 5-b 6-g 7-a
97>LLC, MAC
98>all
99>b,d
100>a,c
101>protocol data unit
102>2
103>PCI, UD
104>PCI, UD
105>lower
106>physical
107>physical
108>2
109>International Telecommunications Union-Telecommunication Sector
110>Electronics Industries Association
111>data link
112>bit
113>all
114>T
115>MAC
116>2
117>bus, ring
118>both
119>Connectionless Network Service
120>Connection Oriented Network Service
121>CLNS
122>CONS
123>CONS
124>router
125>3
126>all
127>SubNetwork Independent Convergence Protocol
128>SubNetwork Dependent Convergence Protocol
129>SubNetwork Dependent Access Protocol
130>SNICP
131>SNICP, SNDCP
132>SNDAP
133>either
134>oriented
135>all
136>5to7
137>session
138>presentation
139>presentation
140>ASN.1
141>Abstract Syntax Notation Number One
142>presentation
143>transport, network
144>gfecbda
145>transmission control, data flow
146>presentation
147>user, presentation
148>user, transport
149>VT, telnet

10

NETWORK MANAGEMENT SYSTEMS


150>FTAM, FTP
151>File Transfer Access & Management
152>SMTP, MOTIS
153>Message Oriented Text Interchange Standard
154>CMIP, SNMP
155>Common Management Information Protocol
156>Operations Administration Maintenance & Provisioning
157>Network Management System
158>fault
159>fault
160>T
161>Chief Information Officer
162>both
163>telephone, data
164>16
165>all
166>T
167>all
168>network
169>1-c 2-d 3-b 4-a
170>T
171>3
172>all
173>network provisioning, network I&M
174>network operation
175>Network Operations Center
176>NOC
177>network operations, network provisioning and network I&M
178>network provisioning
179>5
180>network operation
181>all
182>NOC
183>self healing
184>network I&M
185>trouble ticket
186>3
187>all
188>static, planned
189>security
190>T
191>T
192>T
193>NOC
194>MIB
195>SNMP
196>3
197>all
198>1-b 2-c 3-a
199>networkI&M
200>network I&M
201>system, network
202>network
203>T
204>T
205>T
206>Telecommunication Management System
207>high, low
208>T
209>SNMP
210>all
211>OSI

11

NETWORK MANAGEMENT SYSTEMS


212>T
213>T
214>both
215>Java Management Extensions
216>Web Based Enterprise Management
217>T
218>Hybrid Fiber Coax
219>Asymmetric Digital Subscriber Loop
220>active
221>all 222>firewalls, cryptography

12

NETWORK MANAGEMENT SYSTEMS

CHAPTER 3: BASIC FOUNDATION -- STANDARDS, MODELS


AND LANGUAGE
1>__________ model addresses the applications that fall into the categories of fault, configuration, performance,
security and accounting (information/functional)
2>Match the following
Network management :management of a system's resources such as central processor usage, disk usage
and application processes
System management :deals with services provided by organizations to customers
Service management :management of the network comprising nodes and links
3>_____management is an extension to _____&_____management (network/system/service)
4>The two leading models of network management are the Internet model and the OSI model
(true/false)__________
5>__________model is the most widely used for network management (OSI/Internet)
6>_____model is a simpler scalar model and hence easy to implement. ______model is object oriented , is more
complex and harder to implement (OSI/Internet)
7>A higher level management network called TMN is based on the ___________model (OSI/Internet)
8>TMN stands for___________
9Identify features of OSI/CMIP standard
a: International standard (ISO/OSI)
b: management of data communications networks- LAN and WAN
c: deals with all seven layers
d: object oriented and most complete
e: consumes large resource in implementation
f: well structured and layered
Ans:___________ (a/b/c/d/e/f/all)
10>Identify features of SNMP/Internet Standard
a: Industry standard (IETF)
b: easy to implement
c: most widely implemented
d: originally intended for management of Internet components, currently adopted for WAN and telecommunication
systems
Ans:___________ (a/b/c/d/all)
11>Identify features of TMN standard
a: International standard (ITU-T)
b: Management of telecommunications network
c: based on OSI network management framework
d: addresses both network and administrative aspects of management
Ans:___________ (a/b/c/d/all)
12>Identify features of IEEE standard
a: IEEE standards adopted internationally
b: addresses management of LANs and MANs
c: adopts OSI standards significantly
d: deals with first two layers of the OSI reference model
Ans:__________ (a/b/c/d/all)
13>Following are web based management standards
a: WBEM
b: JMX
Ans:___________ (a/b/both)
14>CMIP stands for___________
15>CMIS stands for___________
16>The OSI management protocol standard is ____, and has built in services, ______, that specify the basic
services needed to perform the various functions (CMIS/CMIP)
17>Both LANs and WANs can be managed using___________ (CMIS/CMIP/both)
18>Major drawbacks of the OSI management standard are
a: it is complex
b: CMIP stack is large
Ans:___________ (a/b/both)

13

NETWORK MANAGEMENT SYSTEMS


19>In contrast to _____, ______is truly simple (SNMP/CMIP)
20>___________is responsible for all Internet specifications including network management (IEEE/IETF)
21>___________is designed to manage the telecommunications network and is oriented toward the needs of
telecommunications service providers (ITU/TMN)
22>_____is the standard of______ and is based on OSI CMIP/CMIS specifications (ITU/TMN)
23>The IEEE standards for LAN and MAN specifications are concerned only with OSI layers__&___1/2/3)
24>Both OSI/CMIP and Internet/SNMP protocols use _______standards for the lower layers (IETF/IEEE)
25>The IEEE ____.x series of specifications defines the standards for the various physical media and data link
protocols (802/803)_______
26>IEEE 802.__ specifications present overview, architecture and management. IEEE 802.__standard specifies the
LLC layer. IEEE 802.__ specifications are defined for Ethernet LANs (1/2/3/4)
27>___________layer provides transparency of the various physical media and protocols to the network layer
(MAC/LLC)
28>Web based management is based on using web technology , a web _____for the management system and web
______for network management stations (browsers/server)
29>DMTF stands for_________
30>___________is developing specifications for WBEM (IETF/DMTF)
31>___________has chosen the Microsoft object oriented management model, Common Information Model
(IETF/DMTF)
32>___________is based on a special subset of Java applets developed by Sun Microsystems that runs in the
network components (BEM/JMX)
33>TMM uses_______ (SNMP/CMIP )
34>Both SNMP and CMIP use polling methodology (true/false)___________
35>OSI network management architecture model comprise of ____models (3/4/5)
36>Following are the models of OSI network management
a: organization model
b: information model
c: communication model
d: functional model
Ans: ___________ (a/b/c/d/all)
37>In OSI model, _________model describes the components of a network management system, their functions
and their infrastructure (functional/organization/information/communication)
38>The organization model is defined in ISO______OSI systems management Overview (10400/10040/10004)
39>___________model defines the terms object, agent and manager
(functional/organization/information/communication)
40>___________model deals with the structure and organization of management information
(functional/organization/information/communication)
41>ISO=________ specifies the SMI and the information database, MIB (10156/10165)
42>SMI stands for___________
43>MIB stands for___________
44>_____describes how the management information is structured and ______deals with the relationship and
storage of management information (MIB/SMI)
45>Communication model has ___________components (2/3/4)
46>Components of communication model are
a: management application processes that function in the application layer
b: layer management between layers
c :layer operation within the layers
Ans:___________ (a/b/c/all)
47>___________model deals with the user oriented requirements of network management
(functional/organization/information/communication)
48>OSI defines ____functional application areas (4/5/6)
49>Only ____model presents the complete model for network management (Internet/OSI)_______
50>OSI deals wit all 7 networking layers (true/false)___________
51>The IETF does not define architecture for the SNMP management model explicitly (true/false)___________
52>TMN is based on the___________ model (OSI/internet)
53>______standard is dedicated to the management of layers 1 and 2 of the OSI reference model
(IEEE/IETF)_____
54>The IEEE standard is primarily concerned with the ___________model
(functional/information/organization/communication)
55>In Web based management , ___________model uses Web server - Web browser architecture
(functional/information/organization/communication)

14

NETWORK MANAGEMENT SYSTEMS


56>Following object oriented technologies are influencing Web based managementa:hypermedia server
b: CORBA oriented transportation
c: client/server push technology
Ans: ___________ (a/b/c/all)
57>___________model describes the components of network management and their relationships
(functional/information/organization/communication)
58>In organization model, network objects can be classified into managed and unmanaged objects
(true/false)___________
59>MDB stands for___________
60>The managed elements have a management process running in them called___________ (broker/agent)
61>_________ elements do not have a management process running in them (managed/unmanaged)
62>Managed hub is more expensive than the unmanaged hub (true/false)___________
63>_________manages the managed element (agent/manager)
64>In organization model, there is database in_____ _but not in_____ (agent/manager)
65>In _____tier configuration of organization model, the intermediate layer acts both agent and manager
(two/three)______
66>In three tier configuration of organization model, as______, intermediate layer collects data from the network
elements, processes it, and stores the results in its database. As _____, it transmits information to the top level
manager (agent/manager)
67>MoM stands for___________
68>_____refers to a system that runs a management process (NOC/NMS)
69>___________model is concerned with the structure and the storage of information
(organization/information/functional/communication)
70>The representation of objects and information relevant to their management form the management___________
model (organization/information/functional/communication)
71>___________model specifies the information base to describe managed objects and their relationships
(organization/information/functional/communication)
72>____defines the syntax and semantics of management information stored in_______ (MIB/SMI)
73>___________is used by both agent and management processes to store and exchange management information
(MIB/SMI)
74>In information model , _____MIB consists of information on all the network components that it manages ,
whereas ______MIB needs to know only its local information, its MIB view (agent/manager)
75>______is a real database whereas _____is a virtual database (MIB/MDB)
76>_____contains the measured or administratively configured value of the elements of the network. On the other
hand, ______ contains the information necessary for processes to exchange information (MIB/MDB)
77>Following types of information can be stored in the MIB
a: network elements-hubs, bridges , routers, transmission facilities
b: software processes-programs, algorithms , protocol functions , databases
c: administrative information-contact person, account number
Ans:___________ (a/b/c/all)
78>___________objects are uniquely defined by a tree structure specified by the OSI model and are used in the
Internet model (managed/unmanaged)
79>MIT stands for___________
80>In____________ model, the managed objects are defined by a containment tree that represent the MIT
(OSI/Internet)
81>In OSI MIT, there are ____nodes in the layer beneath the root (2/3/4)
82>Wrt OSI MIT, the following are the nodes in the layer beneath the root
a: iso
b: ccitt (itu)
c: iso-ccitt (iso-itu)
Ans:___________ (a/b/c/all)
83>iso stands for___________
84>itu stands for___________
85>There are_____ basic attributes of a managed object type from the Internet perspective (4/5/6)
86>Following are the basic attributes of a managed object type from the Internet perspective
a: object type (object identifier & descriptor)
b: definition
c: syntax
d: access
e: status
Ans:___________ (a/b/c/d/e/all)

15

NETWORK MANAGEMENT SYSTEMS


87>Specification for the Internet are defined in RFC documents (true/false)___________
88>A managed object in the Internet model is defined by _____parameters (4/5/6)
89>A managed object in the Internet model is defined by five parameters and for this RFC=____ (1551/1515/1155)
90>A managed object in the Internet model is defined by following parameters
a: object identifier and descriptor
b: syntax
c: access
d: status
e: definition
Ans:___________ (a/b/c/d/e/all)
91>Match the following
object identifier and descriptor : textual description of the semantics of object type
Syntax
: implementation requirements
Access
: access privilege to a managed object
Status
: used to model the object
Definition
: unique ID and name for the object type
92>_____ object model is a scalar model and is easy to understand. In contrast , ______perspective of a managed
object is complex and has a different set of characteristics (OSI/Internet)
93>___________specifications are object oriented and hence a managed object belongs to an object class
(OSI/Internet)
94>___________of an object defines the external perspective of the object (entity/attribute)
95>___________of the object is to change its attribute (behavior/operation)
96>An OSI managed object has the following characteristics
a: object class
b: attributes
c: operations
d: behaviour
e: notifications
Ans:___________ (a/b/c/d/e/all)
97>Operation in the Internet model is done by _____&______ commands. Notification s done by
____&_____messages (get/set/response/alarm)
98>In____ , we can create and delete objects, these concepts do not exist in _______ (OSI/Internet)
99>_____characteristics of the Internet model is part of the security function in the OSI functional model
(status/access)______
100>___________characteristics of the Internet model is handled by conformance as part of application services in
OSI (status/access)
101>Match the following
Object type :counts number of packets
Syntax
:Mandatory
Access
:counter
Status
:read only
Description :PktCounter
102>Match the following
Object class :generates notifications on new value
Attributes
:get or set
Operations
:retrieves or resets values
Behavior
:packet counter
Notifications :Single valued
103>Following are characteristics from Internet perspective
a: object type
b: syntax
c: access
d: status
e: description
Ans:__________ (a/b/c/d/e/all)
104>Characteristics from OSI perspective are
a: object class
b: attributes
c: operations
d: behaviour
e: notifications
Ans:__________ (a/b/c/d/e/all)

16

NETWORK MANAGEMENT SYSTEMS


105>Management data is communicated between agent and manager processes, as well as between manager
processes (true/false)__________
106>__________aspects need to be addressed in the communication of information between two entities (2/3/4)
107>Following aspects need to be addressed in the communication of information between two entities
a: transport medium of message exchange
b: message format of communication
c: actual message
Ans:__________ (a/b/c)
108>Match the following
transport protocol
:actual message
application protocol
:transport medium exchange
commands & responses :message format of communication
109>__________is the unsolicited messages such as alarms, generated by the agent (notification/trap/both)
110>__________model uses CMIP along with CMIS (Internet/OSI)
111>__________model uses SNMP for communication (Internet/OSI)
112>OSI uses _________protocol for transportation (connection oriented/connectionless/both)
113>Internet uses __________UDP/IP protocol to transport messages (connection oriented/connectionless/both)
114>The TP4 transport layer protocol riding on top of the x.25 protocol could be used for__________ transporting
and application messages (connection oriented/connectionless/both)
115>______&_____specifies the management communication protocols for OSI and Internet management
respectively (SNMP/CMIP)
116>__________is a formal language developed jointly by CCITT and ISO for use with application layers for data
transfer between systems (BER/ASN.1)
117>ASN.1 is at the__________ layer (presentation/session)
118>__________is defined as the set of rules used to specify data types and structures for storage of information
(transfer syntax/abstract syntax)
119>___________represents the set of rules for communicating information between systems (transfer
syntax/abstract syntax)
120>____is applicable to the information model while ______is applicable to the communication model (transfer
syntax/abstract syntax)
121>__________can be used with any presentation syntax, depending on the medium of presentation (transfer
syntax/abstract syntax)
122>__________in ASN.1 makes it independent of the lower layer protocols (transfer syntax/abstract syntax)
123>ISO____/_____ standards specify ASN.1 (8825/X.209 or 8824/X.208)
124>The algorithm to convert the textual ASN.1 syntax to machine readable code is called__________ (DER/BER)
125>BER stands for___________
126>BER is defined by ISO_________ (882/X.209 or 8824/X.208)
127>___________is based on the Backus system and uses the formal syntax language and grammar of the BNF
(BER/ASN.1)
128>BNF stands for__________
129> <name>::=<definition> in this expression, <name> denotes _____and the symbol ::= represents______
(defined as/entity/)
130> <digit>::=0|1|2 in this expression, the symbol | represents_____ (and/not/or)
131><op>::=+|-|*|/ in this expression, the definitions on the right side are called ___________
(production/primitives)
132> <SAE>::<number> | <SAE> | <SAE><op><SAE>, in this expression, the format of each line is defined
as___________ (production/assignment/either)
133><BooleanValue>:: TRUE| FALSE, in this expression, entities that are all in capital letters such as TRUE and
FALSE are called__________ (identifiers/keywords)
134>The data types are built up from primitive data types such as
a: INTEGER
b: REAL
c: NULL
d: GraphicString
Ans:__________ (a/b/c/d/all)
135>__________is one of several CharacterString type primitives (StringGraphic /GraphicStshng)
136>Match the following
Alternatives : SET & SEQUENCE
List
: SET OF & SEQUENCE OF
Repetition
: CHOICE
137>Above constructs are used to build __________data types (primitive/structured)

17

NETWORK MANAGEMENT SYSTEMS


138>__________data types are also called atomic entities (primitive/structured)
139>ASN.1 definition allows both backward and forward references as well as in-line definition
(true/false)__________
140>The constructs _____&_____are list builders (SET/SET OF/SEQUENCE/SEQUENCE OF)
141>The order in the list will be maintained if the list is built with the__________ construction (SET/SEQUENCE)
142>If the construct has been _____instead of_____, order in the list would be irrelevant (SEQUENCE OF/SET
OF)
143>{ product-based [0] NULL, basic [1] NULL } these assignments have integers in square brackets and these
are called________ (module/tags)
144>The definition of_________ is introduced in ASN.1 to uniquely identify a data type (module/tag)
145>We can group assignments that are related, this group is called__________ (subroutine/module)
146>identify correct formal definition of a module
a:<module name> DEFINITIONS ::= BEGIN
<name> :: <definition>
END
b: BEGIN ::=DEFINITIONS <module name>
<name> :: <definition>
END
c:<module name> BEGIN ::=DEFINITIONS
<name> :: <definition>
END
Ans:__________ (a/b/c)
147>Match the following
::=
range
|
start & end of a subtype
start & end of a list
-start & end of a tag
{}
signed number
[]
following the symbol are comments
()
defined as or assignment
''
or, alternatives , options of a list signed number
148><module name> DEFINITIONS ::= BEGIN
<name> :: <definition>
END
The terms DEFINITIONS, BEGIN and END are primitives and are called __________in ASN.1
(identifier/keyword)
149>Grouping assignments into modules has following advantages
a: modules can be imported into and exported from other modules
b: modules are reusable
Ans:__________ (a/b/both)
150>Match the following
BEGIN
: any negative or non-negative number
CHOICE
:a sequence of non-negative numbers
DEFINITIONS :end of an ASN.1 module
END
:list of alternatives
EXPORTS
:start of an ASN.1 module
IDENTIFIER :definition of a data type or managed object
IMPORTS
:data types that can be exported to other modules
INTEGER
:data types defined in external modules
151>Match the following
NULL
:used with OCTET for denoting string of octets
OBJECT
:unordered list makes
OCTET
:ordered list maker
OF
:unbounded 8 bit bytes (octts) of binary data
SEQUENCE
:a placeholder
SEQUENCE OF :used with IDENTIFIER to uniquely identify an object
SET
:used with SET and SEQUENCE
SET OF
:ordered array of repetitive data
STRING
:unordered list of repetitive data

18

NETWORK MANAGEMENT SYSTEMS


152>Match the following
Object name
:INTEGER, BEGIN
Application data type :RMON-MIB
Module
:Counter, IpAddress
Macro, MIB module :PersonalRecord
Keywords
:sysDescr, etherStatsPkts
153>Simple data type is also called_________ (primitive/atomic/basic/all)
154>___________uniquely identifies the data type irrespective of the syntax version (atomic/tag)
155>Data types are defined based on___________ (structure/tag/both)
156>wrt Object and Data types, the structure is divided into _______categories (3/4/5)
157>wrt Object and Data types , the tag is divided into___ categories (2/3/4)
158>The tag is divided into following
a: class
b: tag number
Ans:__________ (a/b/both)
159>Following are different categories of data type structure
a: simple type
b: structured type
c: tagged type
d: other type
Ans:_________ (a/b/c/d/all)
160>________type is one for which the values are specified directly (structured/tagged/simple)
161>INTEGER is a________ type (structured/tagged/simple)
162>A data type is a __________type when it contains other types (structured/tagged/simple)
163>Types that are within a structured type are called _________types (component/tagged)
164>SET is distinguished from SEQUENCE in following respects
a: data types should all be distinct
b: order of values in SET is of no consequence
Ans:__________ (a/b/both)
165>Order of values is critical in _______ (SET/SEQUENCE)
166>The component data types in the __________construct need not be distinct because the order is preserved
(SET/SEQUENCE)
167>__________type is a type derived from another type (structured/tagged)
168>__________type is a data type that is not predefined (structured/tagged/other)
169>___________type is chosen from CHOICE and ANY types, which are contained in other types
(structured/tagged/other)
170>Type__________ defines the selection of one value from specified list of distinct types (ANY/CHOICE)
171>Every data type except __________has a tag associated with it (CHOICE/ANY/both)
172>A tag has following components
a: class
b: tag number
Ans:__________ (a/b/both)
173>There are _____classes of tag (3/4/5)
174>Following are different classes of tag
a: universal
b: application
c: context specific
d: private
Ans:__________ (a/b/c/d/all)
175>__________class is the most common (application/context specific/universal/private)
176>Data types in the __________class are application independent (application/context specific/universal/private)
177>__________class is similar to the use of a global variable in a software program and is applicable anywhere in
a program (application/context specific/universal/private)
178>BOOLEAN & INTEGER are examples of __________class , whose tag numbers are [1] and [2] respectively
(application/context specific/universal/private)

19

NETWORK MANAGEMENT SYSTEMS


179>Match the following
Universal 1 :REAL
Universal 2 :Object description
Universal 3 :NULL
Universal 4 :BIT STRING
Universal 5 :BOOLEAN
Universal 6 :EXTERNAL
Universal 7 :OBJECT IDENTIFIER
Universal 8 :OCTET STRING
Universal 9 :INTEGER
180>Match the following
Universal 10
:TeletexString
Universal 11
:NumericString
Universal 12-15 :SEQUENCE & SEQUENCE OF
Universal 16
:ENCRYPTED
Universal 17
:ENUMERATED
Universal 18
:Reserved for future use
Universal 19
:SET & SET OF
Universal 20
:PrintableString
181>Match the following
Universal 21 :reserved for future use
Universal 22 :GeneralString
Universal 23 :GraphicString
Universal 24 :UTCTime
Universal 25 :VideotexString
Universal 26 :IASString
Universal 27 :GeneralizedTime
Universal 28 :VisibleString
Universal 29 :CharacterString
182>Tags in the __________class are specific to applications (universal/context specific/application/private)
183>_____class tag number can be overridden with _____tag number (universal/context specific/application)
184>Types in two different applications can have the same __________specific tag but each tag could carry a
different meaning in each application (context specific/application)
185>____type is a subset of_____ , is limited to that application (universal/context specific/application/private)
186>__________type is used extensively by vendors of network products (universal/context
specific/application/private)
187>In _____, there is an identifier for each occurrence of an object. In_____, it is the OBJECT IDENTIFIER
(ASN.1/MIB)
188>The ASN.1 syntax that contains the management information is encoded using the __________defined for the
transfer syntax (DER/BER)
189>TLV stands for__________
190>In TLV , the type has_____ subcomponents (3/4)
191>In TLV, the type has following subcomponents
a: class
b: P/C
c: tag number
Ans:__________ (a/b/c/all)
192>__________specifies whether the structure is a primitive or simple, type or a construct , which is anything
other than a simple type (class or P/C or
tag number)
193>__________is encoded as a one byte or an octet field (class or P/C or
tag number)
194>Match the following
Universal
:1 1
Application
:0 1
Context specific :0 0
Private
:1 0
195>In TLV, the value of P/C is___ for primitive and ___for construct and is designated as the 6th bit (0/1)
196>In TLV, the lowest ___bits designates tag value in binary (4/5/6)
197>In TLV, class :____bits:: ___P/C: ___bits ::Tag number :___bits (1/2/3/4/5/6/7/8)

20

NETWORK MANAGEMENT SYSTEMS


198__________is defined as a series of octets (type/length/value)
199>In TLV, the length specifies the length of the value field in number of__________ (bits/octets)
200>In TLV, the integer value is encoded using ______complement form (ones/twos)
201>Wrt TLV , for positive value , the actual value is the binary representation, with the MSB always being___ to
indicate the positive sign (0/1)
202>wrt TLV, -5 becomes ___________in twos complement form (11110111/111111101/11111011)
203>Wrt Macros , ____defines the syntax of the new types and _____defines the syntax of the new values (TYPE
NOTATION/VALUE NOTATION)
204>________model component of the OSI model addresses the user oriented applications
(communication/functional)
205>Functional model consists of ______submodels (4/5/6)
206>Functional model has following submodels
a: configuration management
b: fault management
c: performance management
d: security management
e: accounting management
Ans:___________ (a/b/c/d/e/all)
207>___________management addresses the setting and changing of configurations of networks and their
components (performance/accounting/configuration)
208>Relevant management information is embedded in managed objects such as switches, hubs, bridges and
routers .___________management involves setting up these parameters (performance/accounting/configuration)
209>___________displays in real time the configuration of the network and its status (NOC/NMS)
210>___________management involves detection and isolation of the problem causing the failure in the network
(performance/accounting/configuration/fault)
211>In several failure situations, the network could restore service automatically. This network feature is called
___________ (grooming/self healing)
212>___________ticket administration of fault management tracks all problems in the network including
nonproblems, until they are resolved (service/trouble)
213>___________management is concerned with the performance behavior of the network
(performance/accounting/configuration)
214>___________management involves physically securing the network, access to the network resources and
secured communication over the network (performance/accounting/configuration/security)
215>___________protect corporate networks and network resources from being accessed by unauthorized
personnel and programs, including virus programs (cryptography/firewalls)
216>__________management administers costs of the network (performance/accounting/configuration)
217>___________management is directed toward service providers, in order for them to provide customer
satisfaction and to ensure the profitability of business (performance/accounting/configuration/service &business)
218>Traffic data gathered by_____ management serves as input to _____management
(performance/accounting/configuration)
219>The traffic statistics, trouble ticket administration data and accounting management results are inputs to
___________management (performance/configuration/service & business)
220>Following are network management models
a: OSI
b: Internet
c: TMN
d: IEEE 801
e: Web technology
Ans:___________ (a/b/c/d/e/all)
221>The OSI management model categorizes the____ functions of network management into____ models (3/4/5)
222>The OSI has following network management models
a: organization
b: information
c: communication
d: application
Ans:__________ (a/b/c/d/all)
223>The organization model describes the management process in the network element called the
___________process, and the management process in the ___________ (manger/agent)
224>___________model addresses the structure of management information that enables processes running in
different components in the network to exchange management data (organization/information/communication)
225>The two primary communication protocols are_____ in OSI and ______in the Internet (SNMP/CMIP)
226>The application functions are divided into___ categories of management (3/4/5)

21

NETWORK MANAGEMENT SYSTEMS


227>The application functions are divided into following categories of management
a: configuration
b: fault
c: performance
d: security
e: accounting
Ans:___________ (a/b/c/d/e/all)

ANSWERS
1>functional
2>1-c 2-a 3-b
3>service, system, network
4>T
5>Internet
6>Internet, OSI
7>OSI
8>Telecommunication Management Network
9>all
10>all
11>all
12>all
13>both
14>Common Management Information Protocol
15>Common Management Information Service
16>CMIP, CMIS
17>both
18>both
19>CMIP, SNMP
20>IETF (Internet Engineering Task Force)
21>TMN
22>TMN, ITU
23>1,2
24>IEEE
25>802
26>1,2,3
27>LLC
28>browser
29>Desktop Management Task Force
30>DMTF
31>DMTF
32>JMX
33>CMIP
34>T
35>4
36>all
37>organization
38>10040
39>organization
40>information
41>10165
42>Structure of Management Information
43>Management Information Base
44>SMI,MIB
45>3
46>all
47>functional
48>5
49>OSI
50>T
51>T
52>OSI
53>IEEE

22

NETWORK MANAGEMENT SYSTEMS


54>communication
55>organization
56>all
57>organization
58>T
59>Management Database
60>agent
61>unmanaged
62>T
63>manager
64>manager, agent
65>3
66>manager, agent
67>Manager of Managers
68>NMS
69>information
70>information
71>information
72>SMI, MIB
73>MIB
74>manager, agent
75>MDB,MIB
76>MDB,MIB
77>all
78>managed
79>Management Information Tree
80>OSI
81>3
82>all
83>International Standards Organization
84>International Telecommunications Union
85>5
86>all
87>T
88>5
89>1155
90>all
91>1-e 2-d 3-c 4-b 5-a
92>Internet, OSI
93>OSI
94>attribute
95>behavior
96>all
97>get&set, response&alarm
98>OSI, Internet
99>access
100>status
101>1-e 2-c 3-d 4-b 5-a
102>1-d 2-e 3-b 4-c 5-a
103>all
104>all
105>T
106>3
107>all
108>1-b 2-c 3-a
109>both
110>OSI
111>Internet
112>both
113>connectionless
114>connection oriented
115>CMIP,SNMP

23

NETWORK MANAGEMENT SYSTEMS


116>ASN.1
117>presentation
118>abstract syntax
119>transfer syntax
120>abstract syntax, transfer syntax
121>abstract syntax
122>abstract syntax
123>8824/X.208
124>BER
125>Basic Encoding Rules
126>8825/X.209
127>ASN.1
128>Backus Nauer Form
129>entity, defined as
130>or
131>primitives
132>either
133>keywords
134>all
135>GraphicString
136>1-c 2-a 3-b
137>structured
138>primitive
139>T
140>SET & SEQUENCE
141>SEQUENCE
142>SET OF,SEQUENCE OF
143>tags
144>tag
145>module
146>a
147>1-g 2-h 3-e 4-f 5-c 6-d 7-b 8-a
148>keywords
149>both
150>1-e 2-d 3-f 4-c 5-g 6-b 7-h 8-a
151>1-e 2-f 3-d 4-g 5-c 6-h 7-b 8-i 9-a
152>1-e 2-c 3-d 4-b 5-a
153>all
154>tag
155>both
156>4
157>2
158>both
159>all
160>simple
161>simple
162>structured
163>component
164>both
165>SEQUENCE
166>SEQUENCE
167>tagged
168>other
169>other
170>CHOICE
171>both
172>both
173>4
174>all
175>universal
176>universal
177>universal

24

NETWORK MANAGEMENT SYSTEMS


178>universal
179>1-e 2-i 3-d 4-h 5-c 6-g 7-b 8-f 9-a
180>1-e 2-d 3-f 4-c 5-g 6-b 7-h 8-a
181>1-e 2-f 3-d 4-g 5-c 6-h 7-b 8-i 9-a
182>application
183>universal, application
184>application
185>context specific, application
186>private
187>MIB,ASN.1
188>BER
189>Type Length Value
190>3
191>all
192>P/C
193>P/C
194>1-c 2-b 3-d 4-a
195>0,1
196>5
197>7-8, 6, 1-5
198>length
199>octets
200>twos
201>0
202>11111011('.' 00000101 11111010+1=11111011)
203>TYPE NOTATION,VALUE NOTATION
204>functional
205>5
206>all
207>configuration
208>configuration
209>NMS
210>fault
211>self healing
212>trouble
213>performance
214>security
215>firewalls
216>accounting
217>service& business
218>performance, accounting
219>service& business
220>all
221>4
222>all
223>agent, manager
224>information
225>CMIP.SNMP
226>5
227>all

25

NETWORK MANAGEMENT SYSTEMS

CHAPTER 4:SNMPv1 NETWORK MANAGEMENT


ORGANIZATION & INFORMATION MODELS
1>__________management is also referred to as Internet management (SMTP/SNMP)
2>SNMP network management systems can manage even non-TCP/IP network elements through proxy agents
(true/false)__________
3>SNMP management is the most widely used __________ (NMS/NOC)
4>__________comprises management process, agent process and network elements (NMS/NOC)
5>The SNMP information model consist of
__________ (MIB/SMI/both)
6>___________uses ASN.1 syntax to define managed objects (MIB/SMI)
7>___________defines the relationship between managed objects and groups of related objects into MIB modules
(MIB/SMI)
8>MIB2 is a superset of MIB1 and is used in SNMPv__ (1/2)
9>The SNMP architecture, administration and access policies fall under___________ model
(organization/communication)
10>ICMP was developed to manage___________ (ARPANET/INTERNET)
11>___________is a mechanism to transfer control messages between nodes (PING/ICMP)
12>PING stands for__________
13>A popular example of ICMP is___________ (RING/PING)
14>___________i a simple tool used to investigate the heath of a node and the robustness of communication with it
from the source node (PING/ICMP)
15>IAB stands for___________
16>__________was formed to administer Internet activities (ICB/IAB)
17>SGMP stands for___________
18>___________is used to monitor and configure gateways remotely (SNMP/SGMP)
19>_____is an enhancement of______ (SNMP/SGMP)
20>SNMPv__ was developed to make it independent of the OSI standard (1/2/3)
21>IAB was charged with the responsibility to manage following task forces
a: IEEE
b: IETF
c: IRTF
Ans:___________ (a/b/c/all)
22>___________is an organization that maintains several archives of documents related to the Internet and the
IETF's activities (IntraNIC/InterNIC)
23>InterNIC stands for___________
24>STD stands for___________
25>FYI stands for___________
26>IANA stands for___________
27>___________is the central coordinator for the assignment of unique parameter values for Internet protocols
(IETF/IANA)
28>___________RFC subseries was created by to document overviews and topics that are introductory (STD/FYI)
29>___________RFC subseries was created to identify those RFCs that do in fact specify Internet standards
(STD/FYI)
30>There are ___ series of RFC and STD documents (3/4/5)
31>Following are the series of RFC and STD documents
___________ (SMI/MIB/SNMP/all)
32>RFC=____defines the SNMP protocol. RFC=____is on protocol operations. RFC=___ is on transport mappings
(1905/1905/1157)
33>SMI form the contents of RFC=___________ (1155/1156/1157)
34>RFC=____/STD=_____ is currently in use for MIB (1213/1217/13/17)
35>RFC=______is a draft version of MIB2 for SNMPv2 (1155/1907)_____
36>The infrastructure of the manager agent and the SNMP architecture that it is based form ___________model
(information/organization/functional)
37>wrt SNMP, definition of syntax and semantics form the basis of the ___________model
(information/organization/functional)
38>The two tier organization model consists of_____ process which resides in the managed object and______
process which resides in the NMS and manages the managed object (network manager/network agent)

26

NETWORK MANAGEMENT SYSTEMS


39>In two tier organization model, multiple managers can interact with one agent (true/false)___________
40>RMON stands for___________
41>In three tier organization model, _________is inserted between the managed object and the network manager
(RMAN/RMON)
42>The pure SNMP management system consists of ___________ (SNMP agent/SNMP manager/both)
43>HFC stands for___________
44>An SNMP management system can behave as an agent as well as a manager (true/false)___________
45>___________model is concerned only with the TCP/IP suite of protocols and does not address the layers above
or below it (OSI/Internet)
46>SNMP interfaces to the TCP/IP with ________are the transport layer protocol (TCP/UDP)
47>RFC=____ describes SNMP system architecture (1156/1157/1158)_
48>RFC=_____ defines SNMP by which management information for a network element may be inspected or
altered by logically remote users (1156/1157/1158)
49>RFC=____describes the structure and identification of management information, and RFC=_______addresses
the information base that is required for management (1154/1155/1156/1157)
50>The communication of management information among management entities is realized through exchange
of___ protocol messages (4/5/6)
51>The communication of management information among management entities is realized through exchange of
following protocol messages
a: get-request
b: get-next-request
c: set-request
d: get-response
e: trap
Ans:___________ (a/b/c/d/e/all)
52>Following protocol messages are initiated by the manager application process
a: get-request
b: get-next-request
c: set-request
d: get-response
e: trap
Ans:___________ (a/b/c/d/e)
53>Following messages are generated by the agent process
a: get-request
b: get-next-request
c: set-request
d: get-response
e: trap
Ans:___________ (a/b/c/d/e)
54>The message generation is called___________
55>__________is unsolicited alarm message (get-response/trap)
56>___________message is generated by the management process requesting the value of an object (getrequest/get-next-request/set-request/get-response/trap)
57>An object may have multiple values because of multiple instances of the object, in this case, _________
message can be used (get-request/get-next-request)
58>___________message is generated by the management process to initiate or reset the value of an object variable
(get-request/get-next-request/set-request/get-response/trap)
59>___________message is generated by an agent process (get-request/get-next-request/set-request/getresponse/trap)
60>___________is an unsolicited message generated by an agent process w/o a message or event arriving from the
manager process (get-request/get-next-request/set-request/get-response/trap)
61>SNMP manager contains following sets of data
a: one on the information about the objects
b: one on the values of the objects
Ans:___________ (a/b/both)
62>In q61, b is ______ (static/dynamic) and contains the measured values associated with the object_____
(true/virtual) database
.63>A MIB is _____ (true/virtual) database and is_________ (static/dynamic)
64>SNMP _____has a database which is the physical database and the SNMP ______does not have a physical
database (agent/manager)
65>_________have MIB which is compiled into the software module (agent/manager)
66>___________model deals with SMI and MIB (organization/functional/information)

27

NETWORK MANAGEMENT SYSTEMS


67>The syntax used to describe management information is ASN._ (0/1/2)
68>The specification and organizational aspects of managed objects are addressed in______ (MIB/SMI)
69>The specifications of managed objects and the grouping of. And relationship between, managed objects are
addressed in ________ (MIB/SMI)
70>RFC=___ for SMI. RFC=____ for MIB (1213/1312/1157/1157)
71>Match the following
FDDI :RFC 1695
OSPF :RFC 1285
ATM :RFC 1253
72>A managed object is composed of___________ (object type/object instance/both)
73>SMI is concerned only with_____ and not______ (object type/object instance)
74>___________is a data type , has a name, syntax , and an encoding scheme (object type/object instance)
75>The syntax of an object type is defined using ____and _____have been adopted as the encoding scheme for
transfer of data types between agent and manager processes , as well as between manager processes (BER/ASN.1)
76>Every object type (every name) is uniquely identified by___________ (DESCRIPTOR/OBJECT IDENTIFIER)
77>DESCRIPTOR and OBJECT IDENTIFIER are in uppercase letters because they are___________ keywords
(BER/ASN.1)
78>There are____ objects under the internet object (3/4/5)_______
79>Following are the subnodes under Internet node in SNMPv1
a: directory
b: mgmt
c: experimental
d: private
Ans:___________ (a/b/c/d/all)
80>____________node is reserved for future use of OSI directory in the Internet
(directory/mgmt/experimental/private)
81>___________node is used to identify all IETF recommended and IAB approved subnodes and objects
(directory/mgmt/experimental/private)
82>___________node was created to define objects under IETF experiments (directory/mgmt/experimental/private)
83>___________is a heavily used node (directory/mgmt/experimental/private)
84>___________syntax is used to define the structure of object types (BER/ASN.1)
85>in ASN.1 data type, there are___ categories under structure (3/4/5)________
86>in ASN.1 data type, there are following categories under structure
a: simple
b: defined
c: constructor
Ans:___________ (a/b/c/all)
87>Simple, defined and constructor types are also called___ ____&____respectively
(application/structured/primitive)
88>SEQUENCE & SEQUENCE OF are not called base types (true/false)___________
89>The primitive or simple types are atomic and are INTEGER, OCTET STRING, OBJECT IDENTIFIER &
NULL. These are also referred to as ___________types (aggregate/non-ggregate)
90>When the integer value is restricted by a range it is called___________ (signed/ subtype)
91>The data type ENUMERATED is a special case of the ______data type (REAL/INTEGER)
92>Following are data types under Primitive types
a: INTEGER
b: OCTET STRING
c: OBJECT IDENTIFIER
d: NULL
Ans:___________ (a/b/c/d/all)
93>Following are data types under defined types
a: NetworkAddress
b: IpAddress
c: Counter
d: Gauge
e: TimeTicks
f: Opaque
Ans:___________ (a/b/c/d/e/f/all)
94>Following are data types under constructor types
a: SEQUENCE
b: SEQUENCE OF
Ans:___________ (a/b/both)
95>Match the following
INTEGER
:placeholder

28

NETWORK MANAGEMENT SYSTEMS


OCTET STRING
:object position in MIB
OBJECT IDENTIFIER :8bit bytes binary and textual data
NULL
:subtypes INTEGER (n1. . . .nN)
96>Match the following
NetworkAddress :application wide arbitrary ASN.1 syntax, double wrapped OCTET STRING
IpAddress
:non-negative integer in hundredth of second units
Counter
:capped, on-negative integer, increase or decrease
Gauge
:wraparound, non-negative integer, monotonically increasing, may 2^32-1
TimeTicks
:dotted decimal IP address
Opaque
:Not used
97>____:List maker::______: Table maker (SEQUENCE/SEQUENCE OF)
98>___________data type is used to specify either binary or textual information that is 8 bits long (OCTET
IDENTIFIER/OCTET STRING)
99>The combination keyword __________is the object position in the MIB (OBJECT STRING/OBJECT
IDENTIFIER)
100>___________are application specific data types and are SNMP based types (primitive/defined)
101>The base type ________is used to specify octets of binary information (Gauge/Opaque)
102>__________is intended for adding new base types to extend SNMP SMI (Gauge/Opaque)
103>__________is a choice of the address of the protocol family (IpAddress/NetworkAddress)
104>__________is the conventional four groups of dotted decimal notation of IPv4 (IpAddress/NetworkAddress)
105>__________is an application wide data type and is a non-negative integer (TimeTicks/Gauge/Counter)
106>Counter can only increase in value up to a maximum of 2^__-1 and then wraps around starting from 0
(16/32/64)
107>The data type __________is a non-negative integer , but its value can move either up or down
(Counter/Gauge/TimeTicks)
108>Gauge pegs at its maximum value of 2^__-1 (16/32/64)________
109>__________is a non-negative integer and measures time in units of hundredth of a second
(Counter/Gauge/TimeTicks)
110>The maximum value of TimeTicks is 2^__-1 (16/32/64)
111>__________is an application wide data types that supports the capability to pass arbitrary ASN.1 syntax
(Gauge/Opaque)
112>__________is used to create data types based on previously defined data types (Gauge/Opaque)
113>Size of ________is undefined in SNMPv1, which causes some problem in its implementation (Gauge/Counter/
Opaque)
114>The Opaque data type can be defined both IMPLICITly and EXPLICITly (true/false)__________
115>The constructs ______&____which are in ASN.1, are not included in SNMP based management syntax
(SEQUENCE/SEQUENCE OF/SET/SET OF)
116>____is used to build a list and______ is used to build a table (SEQUENCE/SET/SEQUENCE OF/SET OF)
117>Identify syntax for list
a: SEQUENCE OF <entry>
b: SEQUENCE {<type1>, <type2>. . . . <typeN>}
Ans:__________ (a/b/either)
118>Identify syntax for table
a: SEQUENCE OF <entry>
b: SEQUENCE {<type1>, <type2>. . . . <typeN>}
Ans:__________ (a/b/either)
119>Identify SNMPv1 keywords
a: ACCESS
b: BEGIN
c: CHOICE
d: Counter
e: DEFINITIONS
f: DEFVAL
Ans:___________ (a/b/c/d/e/f/all)
120>Identify SNMPv1 keywords
a: DESCRIPTION
b: END
c: ENTERPRISE
d: FROM
e: Gauge
f: IDENTIFIER
Ans:___________ (a/b/c/d/e/f/all)
121>Identify SNMPv1 keywords
a: IMPORTS
b: INDEX
c: INTEGER
d: IpAddress
`e: NetworkAddress
f: OBJECT
Ans:___________ (a/b/c/d/e/f/all)

29

NETWORK MANAGEMENT SYSTEMS


122>Identify SNMPv1 keywords
a: OBJECT-TYPE
b: OCTET
c: OF
d: Opaque
e: REFERENCE
f: SEQUENCE
Ans:___________ (a/b/c/d/e/f/all)__________
123>Identify SNMPv1 keywords
a: SIZE
b: STATUS
c: STRING
d: SYNTAX
e: TRAP-TYPE
f: VARIABLES
g: TimeTicks
Ans:___________ (a/b/c/d/e/f/g/all)__________124>SNMPv1 has adopted ____with its____for encoding the
information to be transmitted between agent and manager processes (TLV/ASN.1/BER)___
125>Match the following
ipAdEntAddr
:SEQUENCE
ipAdEntIfIndex
:INTEGER
ipAdEntNetMask
:IpAddress
ipAdEntReasmMaxSize:
ipAdEntBcastAddr:
ipAdEntry
126>Wrt OBJECT IDENTIFIER, if the most significant bit (8th bit) is set to___ , then the subidentifier is only one
octet long. The 8th bit is set to ___for the value that requires more than one octet and indicates more octets to
follow (0/1)___
127>_____ is encoded as straight octet strings._____ _____ & _____ coded as integers._____Is coded as OCTET
STRING type (IP address/opaque/counter/gauge/TimeTicks)
128>Match the following
OBJECT IDENTIFIER :APPLICATION 1
SEQUENCE
:APPLICATION 3
IpAddress
:APPLICATION 2
Counter
:APPLICATION 4
Gauge
:APPLICATION 0
TimeTicks
:UNIVERSAL 6
Opaque
:UNIVERSAL 16
129>A managed object has ____parameters (3/4/5)
130>A managed object has following parameters
a: textual name b: syntax
c: definition
d: access
e: status
Ans:_________ (a/b/c/d/e/all)
131>OBJECT DESCRIPTOR does not specify instances of a managed object (true/false)___________
132>Associated with each _____is ______, which is the unique position it occupies in the MIB (OBJECT
IDENTIFIER/OBJECT DESCRIPTOR)
133>__________is the ASN.1 definition of the object type (definition/access/status/syntax)
134>__________is an accepted textual description of the object type (definition/access/status/syntax)
135>__________is the specification for the type of privilege associated with accessing the information
(definition/access/status/syntax)
136>Access is the specification for the type of privilege associated with accessing the information, it can be
__________ (read only/read write/not accessible/either of them)
137>__________specifies whether the managed object is current or obsolete (definition/access/status/syntax)
138>Related objects can be grouped to form ______ object type and the objects that make up the aggregate object
type are called ____object type component/subordinate /aggregate)
139>In order to encode the information on a managed object to be processed by machines , it has to be defined in a
formalized manner. This is done using__________ (micro/macro)
140>The body of the macro module consists of __________parts (3/4/5)
141>The body of the macro module consists of following parts
a: type notation

30

NETWORK MANAGEMENT SYSTEMS


b: value notation
c: supporting productions
Ans:__________ (a/b/c/all)
142>____NOTATION defines the object types in the module and ______NOTATION defines the name of the
object (TYPE/VALUE)
143>Access can be only one of following options
a: read only
b: read write
c: write only
d: not accessible
Ans:__________ (a/b/c/d/all)
144>Allowed values for Status are
a: mandatory
b: optional
c: obsolete
Ans:__________ (a/b/c/all)
145>__________object is a group of related objects (compound/aggregate)
146>Object ___ is the managed object ipAddrEntry consist of the subordinate object types of___ through ___
(1/2/5)
147>ipAddrEntry describes the complete set of information consisting of the__ fields needed for an entry in the IP
interface address table (4/5/6)
148>The text following ___are comments and are not encoded (** / --)
149>The __________clause uniquely identifies the instantiation of the entry object type in the table
(REFERENCE/INDEX)
150>The__________ clause is the textual reference to the document from which the object is being mapped
(REFERENCE/INDEX)
151>_____clause is the columnar object identifier while______ clause is the default value to be object
(REFERENCE/INDEX/DEVAL)
152>SNMP operations apply exclusively to scalar operations (true/false)___________
153>_________object type comprises one or more subtypes (compound/aggregate)
154>RFC=____ for SMI (1551/1515/1155)_______
155>RFC=____ for MIB2 (1312/1213)_______
156>MIB is a_______ information store (true/virtual)
157>Objects in the MIB are defined using ASN.1 (true/false)__________
158>__________defines the mechanism for describing the objects (MIB/SMI)
159>The definition of MIB consists of___ components (3/4/5)
160>The definition of MIB consists of following components
a: name
b: syntax
c: encoding
Ans:________ (a/b/c/all)
161>The term __________mandates the implementation of the object in the current version of MIB2
(decrypted/deprecated)
162>Objects that are related are grouped into _____while object types are grouped to form_____ (aggregate object
type/object group)
163>The MIB module structure consists of
a: module name
b: imports from other modules
c: definitions of the current module
Ans:__________ (a/b/c/all)
164>Identify correct MIB module structure
a: <module name> DEFINITIONS::=BEGIN
<imports>
<definitions>
END
b: <module name> BEGIN::=DEFINITIONS
<imports>
<definitions>
END
Ans:__________ (a/b/either)
165>__________group contains the objects that describe system administration (System/Interface/Address
Translation)

31

NETWORK MANAGEMENT SYSTEMS


166>__________group defines the interfaces of the network component and the network parameters associated
with each interface (System/Interface/Address Translation)
167>__________group is a cross reference table between the IP address and the physical address
(System/Interface/Address Translation)
168>__________group is a placeholder for future use of the OSI protocol (Transmission/CMOT)
169>___________group was created as a placeholder for network transmission related parameters
(Transmission/CMOT)
170>__________group is the communication protocol group associated with SNMP management (SMT/SNMP)
171>__________group is a placeholder and is not yet defined (Transmission/CMOT)
172>__________group is based on the transmission media that underlie each interface of the system
(transfer/transmission)
173>Match the following
System
:mib2 11
Interfaces
:mib2 9
at
:mib2 7
ip
:mib2 5
icmp
:mib2 3
Tcp
: mib2 1
Udp
:mib2 2
egp
:mib2 4
cmot
:mib2 6
Transmission :mib2 8
Snmp
:mib2 10
174>__________group is the basic group in the Internet standard MIB (at/snmp/System)
175>Implementation of the System group is mandatory for all systems in both agent and manager
(true/false)__________
176>The System group consists of___ entities (5/6/7)
177>The System group consists of following entities
a: sysDescr
b: sysObjectId
c: sysUpTime
d: sysContact
e: sysName
f: sysLocation
g: sysServices
Ans:__________ (a/b/c/d/e/f/g/all)
178>_________group contains managed objects associated with the interfaces of a system (System/Interface/snmp)
179>Implementation of the Interfaces group is mandatory for all systems (true/false)__________
180>The Interface group consists of following nodes__________ (ifNumber/ifTable/both)
181>wrt Interface group, the number of interfaces of the entity is defined by ____and the information related to
each interface is defined in the Interface table______ (ifIndex/ifTable/ifNumber)
182>Match the following
sysDescr
: system 7
sysObjectId :system 5
sysUpTime :system 3
sysContact :system 1
sysName
:system 2
sysLocation :system 4
sysServices :system 6
183>Match the following
ifNumber :largest size of the datagram for the interface
ifTable
:type of interface layer below the network layer defined as an enumerated integer
ifEntry :total number of network interfaces in the system
ifDescr :list of entries that describes information on each interface of the system
ifType
:an interface entry that contains objects at the subnetwork layer for a particular interface
ifMtu
:a unique integer value for each interface
184>Match the following
ifSpeed
:value of sysUpTime at the current operational status
ifPhysAddress :current operational status of the interface
ifAdminStatus :current or nominal data rate for the interface in bps

32

NETWORK MANAGEMENT SYSTEMS


ifOperStatus :interface's address at the protocol layer immediately below the network layer
ifLastCange :reference to MIB definitions specific to the particular media used to realize the interface
ifSpecific
:desired status of the interface ie up, down or testing
185>Match the following
ifInOctets
:number of unsupported protocol packets discarded
ifInUcastPkts
:number of inbound packets discarded
ifInNUcastPkts
:number of subnetwork unicast packets delivered to a higher layer protocol
ifInDiscards
:total number of input octets received
ifInErrors
:number of non-unicast packets delivered to a higher layer protocol
ifInUnknownProtos :number of inbound packets with errors
186>Match the following
ifOutOctets
:length of the output queue in packets
ifOutUcastPkts
:number of outbound packets discarded
ifOutNUcastPkts :total number of unicast packets that higher level layer requested to be transmitted
ifOutDiscrds
:number of octets transmitted out of the interface
ifOutErrors
:total number of non-unicast packets that higher level layer requested to be transmitted
ifOutQLen
:number of outbound packets tat could not be transmitted because of errors
187>__________is defined are an Enumerated INTEGER (ifNumber/ifType)
188>In interface group, object identifiers 11 through 15 refer to the measurements on_____ traffic and object
identifiers 16 through 21 to measurement on_____ traffic (outbound/inbound)
189>The Address Translation group consists of table that converts _____to _____for all the interfaces of the system
(physical address/NetworkAddress)
190>The Internet uses __as the networking protocol (TCP/IP)________
191>__________group has the information on the various parameters of the protocol (system/ip/at)
192>The implementation of IP group is mandatory (true/false) __________
193>The IP group contains following tables
a:IP address table
b:IP routing table
c:IP address translation table
Ans:__________ (a/b/c/all)
194>__________indicate whether the node is acting as just as route or gateway between two autonomous networks
(ipForwDatagrams/ipForwarding)
195>Match the following
ipForwarding
:number of input datagrams discarded due to unsupported
protocolipDefaultTTL :number of input datagrams discarded due to header error
ipInRecieves
:number of datagrams discarded due to address errors
ipInHdrErrors
:number of input datagrams attempted to forward to the destination
ipInAddrError
:number of locally addressed datagrams received successfully but discarded due to
unsupported protocol
ipForwDatagrams :total number of input datagrams received from interfaces including those in error
ipInUnknownProtos :node acting as a gateway or not
ipInDiscards
:time-to-live field of IP header
196>Match the following
ipInDelivers
:number of failures detected by the IP reassembly algorithm
ipOutRequests
:number of successfully reassembled datagrams
ipOutDiscards
:number of IP datagrams received that need reassembly
ipOutNoRoutes :maximum number of seconds that received fragments are held while they are awaiting
reassembly
ipReasmReqds
:number of IP datagrams discarded because no route could be found to transmit than to
their destinations
ipReasmOKs
:number of no error IP datagram discarded due to lack of buffer space
ipReasmFails
:total number of IP datagrams which local IP user protocols supplied to IP
ipReasmTimeOut :total number of input datagrams successfully delivered to IP user protocols
197>Match the following
ipFragOKs
:number of routing entries discarded even though they were valid
ipFragFails
:IP address translation table that maps IP addresses to physical address
ipFragCreates
:IP routing table containing an entry for each route
ipAddrTable
:Number of datagram fragments generated as a result of fragmentation
ipNetToMediaTable :number of IP datagrams not fragmented due to Dont fragment flag set
ipRoutingDiscards :number of successfully fragmented datagrams

33

NETWORK MANAGEMENT SYSTEMS


ipRouteTable
:table of IP addresses
198>An entry_____ in ipRouteDest Is considered a default route (1.1.1.1/0.0.0.0)
199>Match the following
ipAddrTable
:broadcast address indicator bit
ipAddrEntry
:index value of the entry
ipAdEntAddr
:one of the entries in the IP address table
ipAdEntIfIndex
:table of IP addresses
ipAdEntNetMask
:the IP address to which this entry's addressing information pertains
ipAdEntBcastAddr
:subnet mask for the IP address of the entry
ipAdEntReasmMaxSize :largest IP datagram that can be reassembled on this interface
200>Match the following
ipRouteTable
:reference to MIB definition specific to the routing protocol
ipRouteEntry
:mask to be logically ANDed with the destination address before comparing with the
ipRouteDest field
ipRouteDest
:Routing mechanism by which this route was learned
ipRouteIfIndex :IP address of the next hop
ipRouteMetric1 :primary routing metric for this route
ipRouteNextHop :number of seconds since routing was last updated
ipRouteType
:type of route
ipRouteProto
:IP routing table
ipRouteAge
:route to a particular destination
ipRouteMask
:destination IP address of this route
ipRouteInfo
:index of interface
ipRouteMetric2 :an alternative metric for this route
201>Match the following
ipNetToMediaTable
:type of mapping
ipNetToMediaEntry
:IP address
ipNetToMediaIfIndex
:media dependent physical address
ipNetToMediaPhysAddress :table mapping IP addresses to physical addresses
ipNetToMediaNetAddress :IP address to physical address for the particular interface
ipNetToMediaType
:Interface on which this entry's equivalence is effective
202>Match the following
ipForward
:address of next system
ipForwardNumber :mask to be logically ANDed with the destination address before comparing with the
ipRouteDest field
ipForwardTable
:a particular route to a particular destination under a particular policy
ipForwardEntry
:number of entries in the IP forward table
ipForwardDest
:contains information on IP forwarding table, deprecator IP routing table
ipForwardMask
:routing table of this entity
ipForwardPolicy
:destination IP route of this address
ipForwardNextHop :set of conditions that selects one multipath route
203>Match the following
ipForwardIfIndex
:an alterntive routing metric for this route
ipForwardType
:primary routing metric for this route
ipForwardProto
:autonomus system number of next hop
ipForwardInfo
:reference to MIB definition specific to the routing protocol
ipForwardNextHopAS :number of seconds since routing was last updated
ipForwardMetric1
:routing mechanism by which this route was learned
ipForwardMetric2
:type of route--remote, local, invalid or otherwise
ipForwardAge
:ifIndex value of the interface
204>The entity__________defines the general set of conditions that would cause the selection of one multipath
route over others (ipForwardProto/ipForwardPolicy)
205>___________is a precursor of SNMP and is part of the TCP/IP suite (IGMP/ICMP)
206>Match the following
icmpInMsgs
:number of ICMP echo reply message received
icmpInErrors
:number of ICMP echo message received
icmpInDestUnreachs :number of ICMPredirect messages received
icmpInTimeExcds
:number of ICMP source quench messages received
icmpInParmProbs
:number of ICMP parameter problem messages received

34

NETWORK MANAGEMENT SYSTEMS


icmpInSrcQuenches :number of ICMP time exceeded messages received
icmpInRedirects
:number of ICMP destination unreachable messages received
icmpInEchoe
:total number of ICMP messages received by the entity including icmpInErrors
icmpInEchoReps
:number of message received by the entity with ICMP specific errors
207>Match the following
icmpInTimestamps
:number of ICMP parameter problem messages sent
icmpInTimestampReps :number of ICMP Time exceeded messages sent
icmpInAddrMasks
:number of ICMP destination unreachable messages sent
icmpInAddrMasksReps :number of ICMP timestamp message received
icmpOutMsgs
:number of ICMP reply messages received
icmpOutErrors
:number of ICMP address mask request messages received
icmpOutDestUnreachs :number of ICMP address mask reply messages received
icmpOutTimeExcds
:total number of ICMP messages attempted to be sent by this entity
icmpOutParmProbs
:number of good ICMP messages not sent, does not include the ones with errors
208>Match the following
icmpOutSrcQuechs
:number of ICMP address mask reply messages sent
icmpOutRedirects
:number of ICMP address mask request messages sent
icmpOutEchos
:number of ICMP timestamp reply messages sent
icmpOutEchoReps
:number of ICMP timestamp message sent
icmpOutTimestamp
:number of ICMP echo reply messages sent
icmpOutTimestampReps :number of ICMP echo messages sent
icmpOutAddrMasks
:number of ICMP redirect messages sent
icmpOutAddrMasksReps :number of ICMP source quench messages sent
209>In TCP group, the table entry has following indices to uniquely define it in the table
a:tcpConnLocalAddress
b:tcpConnLocalPort
c:tcpConnRemAddress
d:tcpConnRemPort
Ans:___________ (a/b/c/d/all)
210>Match the following
tcpRtoAlgorithm :number of resets done to either CLOSED or LISTEN
tcpRtoMin
:number of failed attempts to make connection
tcpRtoMax
:number of passive connections made LISTEN to SYN-RCVD state
tcpMaxConn
:number of active connections made CLOSED TO SYN-SENT state
tcpActiveConn :Maximum number of TCP connections
tcpPassiveOpens :maximum value for timeout in milliseconds retransmission
tcpAttemptsFails :minimum value for timeout in milliseconds for retransmission
tcpEstabResets :timeout algorithm for retransmission of octets
211>Match the following
tcpCurrEstab
:number of segment send containing RST flag
tcpInSegs
:Total number of segments received in error
tcpOutSegs
:Total number of segments retransmitted
tcpRetransSegs :TCO connection table
tcpConnTable :Total number of segments sent excluding retransmission
tcpInErrs
:total number of segments received including with errors
tcpOutRsts
:no of connections for which the current state is either ESTABLISHED or CLOSED WAIT
212>Match the following
tcpConnTable
:remote port number
tcpConnEntry
:remote IP address
tcpConnState
:local port number
tcpConnLocalAddress :local IP address
tcpConnLocalPort
:state of the TCP connection
tcpConnRemAddress :information about a particular TCP connection
tcpConnRemPort
:TCO connection table
213>Match the following
udpInDatagrams
:information about a particular connection or UDP listener
udpNoPorts
:local IP address
udpInErrors
:local UDP port
udpOutDatagrams
:total number of datagrams delivered to the users

35

NETWORK MANAGEMENT SYSTEMS


udpTable
:total number of received datagrams for which there is no application
udpEntry
:number of received datagrams with error
udpLocalAddress
:total number of datagrams sent
udpLocalPort
:UDP Listener table
214>SNMP management is organized as a two tier management, in which a manager process and agent process
communicate with each other (true/false)___________
215>In SNMP management, the two tier structure can be extended to three tiers by sandwiching
___________between he manager and the agent (proxy agent/RMON/either)
216>All management operations are done using___messages in SNMPv1 (4/5/6)_______
217>All management operations are done using following messages in SNMPv1
a:get request
b:get next
c:set request
d:get response
e:trap
Ans:___________ (a/b/c/d/e/all)
218>In above question, the first__messages are sent from the manager to the agent and the last___are sent by the
agent to manager (2/3)
219>The messages are exchanged according to the specifict defined in___________ (MIB/SMI)
220>SMI is composed of ___________ (name/syntax/encoding rules/all)
221>Managed objects are organized in a virtual database called___________ (MIB/SMI)
222>MIB2 which is a superset of MIB1, consists of_____groups (7/10/11)______
ANSWERS
1>SNMP
2>T
3>NMS
4>NMS
5>both
6>SMI
7>MIB
8>1
9>communication
10>ARPANET
11>ICMP
12>Packet Internet Group
13>PING
14>PING
15>Internet Advisory Board
16>IAB
17>Simple Gateway Monitoring Protocol
18>SGMP
19>SNMP, SGMP
20>2
21>b,c
22>InterNIC
23>Internet Network Information Center
24>Standard RFC
25>For Your Information RFC
26>Internet Assigned Numbers Authority
27>IANA
28>FYI
29>STD
30>2
31>all
32>1157, 1905, 1906
33>1155
34>1213,17
35>1907
36>organization
37>information
38>network agent, network manager
39>T
40>Remote Monitoring

36

NETWORK MANAGEMENT SYSTEMS


41>RMON
42>both
43>Hybrid Fiber Coax
44>T
45>Internet
46>UDP
47>1157
48>1157
49>1155, 1156
50>5
51>all
52>a,b,c
53>d,e
54>event
55>trap
56>get-request
57>get-next-request
58>set-request
59>get-response
60>trap
61>both
62> true, dynamic
63> static, virtual
64>manager, agent
65>both
66>information
67>1
68>SMI
69>MIB
70>1155, 1213
71>1-b 2-c 3-a
72>both
73>object type, object instance
74>Object type
75>ASN.1, BER
76>both
77>ASN.1
78>4
79>all
80>directory
81>mgmt
82>experimental
83>private
84>ASN.1
85>3
86>all
87>primitive, application, structured
88>T
89>non-aggregate
90>subtype
91>INTEGER
92>all
93>all
94>both
95>1- 2- 3- 496>1- 2- 3- 4- 5- 697>SEQUENCE, SEQUENCE OF
98>OCTET
99>OBJECT IDENTIFIER
100>defined
101>Opaque
102>Opaque

37

NETWORK MANAGEMENT SYSTEMS


103>NetworkAddress
104>IpAddress
105>Counter
106>32
107>Gauge
108>32
109>TimeTicks
110>32
111>Opaque
112>Opaque
113>Opaque
114>T
115>SET,SET OF
116>SEQUENCE,SEQUENCE OF
117>b
118>a
119>all
120>all
121>all
122>all
123>all
124>BER,TLV
125>1-c 2-b 3-c 4-b 5-b 6-a
126>0,1
127>IP address, Counter, Gauge, TimeTicks
128>1-f 2-g 3-e 4-a 5-c 6-b 7-d
129>5
130>all
131>T
132>OBJECT DESCRIPTOR, OBJECT IDENTIFIER
133>Syntax
134>definition
135>access
136>either
137>status
138>aggregate, subordinate
139>macro
140>3
141>all
142>TYPE, VALUE
143>all
144>all
145>aggregate
146>6,1-5
147>5
148>-149>INDEX
150>REFERENCE
151>INDEX, DEVAL
152>T
153>aggregate
154>1155
155>1213
156>virtual
157>T
158>SMI
159>3
160>all
161>deprecated
162>object group, aggregate object type
163>all
164>a

38

NETWORK MANAGEMENT SYSTEMS


165>System
166>Interface
167>Address Translation
168>CMOT
169>Transmission
170>SNMP
171>CMOT
172>transmission
173>1-f 2-g 3-e 4-h 5-d 6-i 7-c 8-j 9-b 10-k 11-a
174>System
175>T
176>7
177>all
178>Interface
179>T
180>both
181>ifNumber, ifTable
182>1-d 2-e 3-c 4-f 5-b 6-g 7-a
183>1-c 2-d 3-e 4-f 5-b 6-a
184>1-c 2-d 3-f 4-b 5-a 6-e
185>1-d 2-c 3-e 4-b 5-f 6-a
186>1-d 2-c 3-e 4-b 5-f 6-a
187>ifType
188>inbound, outbound
189>NetworkAddress, physical address
190>IP
191>IP
192>T
193>all
194>ipForwarding
195>1-g 2-h 3-f 4-b 5-c 6-d 7-e 8-a
196>1-h 2-g 3-f 4-e 5-c 6-b 7-a 8-d
197>1-f 2-e 3-d 4-g 5-b 6-a 7-c
198>
199>1-d 2-c 3-e 4-b 5-f 6-a 7-g
200>1-h 2-i 3-j 4-k 5-e 6-d 7-g 8-c 9-f 10-b 11-a 12-l
201>1-d 2-e 3-f 4-c 5-b 6-a
202>1-e 2-d 3-f 4-c 5-g 6-b 7-h 8-a
203>1-h 2-g 3-f 4-d 5-c 6-b 7-a 8-e
204>ipForwardPolicy
205>ICMP
206>1-h 2-i 3-g 4-f 5-e 6-d 7-c 8-b 9-a
207>1-d 2-e 3-f 4-g 5-h 6-i 7-c 8-b 9-a
208>1-h 2-g 3-f 4-e 5-d 6-c 7-b 8-a
209>all
210>1-h 2-g 3-f 4-e 5-d 6-c 7-b 8-a
211>1-g 2-f 3-e 4-c 5-d 6-b 7-a
212>1-g2-f 3-e 4-d 5-c 6-b 7-a
213>1-d 2-e 3-f 4-g 5-h 6-a 7-b 8-c
214>T
215>proxy agent
216>5
217>all
218>3,2
219>SMI 220>all 221>MIB 222>11

39

NETWORK MANAGEMENT SYSTEMS

CHAPTER 5: SNMPv1 NETWORK MANAGEMENT


COMMUNICATION AND FUNCTIONAL MODELS
1>The SNMPv1 communication model defines the specifications of____ aspects of SNMP communication
(3/4/5)______
2>The SNMPv1 communication model defines the specifications of following aspects of SNMP communication
a: architecture
b: administrative model
c: SNMP protocol
d: SNMP MIB
Ans:__________ (a/b/c/d/all)
3>__________model defines data access policy (communication/administrative)
4>A manager can belong to multiple communities and thus can manage multiple domains.This is the__________
model (communication/administrative)
5>SNMP entities are grouped into __________module (SNMP SMI/SNMP MIB)
6>___________consists of communication between network management stations and managed network elements
or objects (SNMP protocol/SNMP architecture)
7>___________is used to communicate information between the network management stations and the
management agents in the elements (SNMP MIB/SNMP protocol)
8>Following are goals of the architecture in the original specifications of SNMP
a: it should minimize the number and complexity of the management functions realized by the management agent
b: it should be flexible enough to allow expansion
c: the SNMP architecture should be independent of the architecture and mechanisms of particular hosts and
gateways
Ans:___________ (a/b/c/all)
9>Only non-aggregate objects are communicated using SNMP (true/false)___________
10>___________is used for data transfer in SNMP (ASN.1/BER/both)
11>The SNMP manages the network with ____messages (3/4/5)_______
12>SNMP comprises following basic messages
a: set
b: get
c: trap
Ans:__________ (a/b/c/all)
13>_____&______messages are generated by the manager to retrieve data from network elements using the
associated management agents (get-request/set-request/get-next-request/trap)
14>___________is used to initialize and edit the parameters of the network element (get-request/set-request)
15>___________is the response from the agent to get and set messages from the manager (get-next-request/getresponse-request)
16>The number of unsolicited messages in the form of_________is limited to make the architecture simple and to
minimize the traffic (get-request/set-request/get-next-request/trap)
17>There are__ types of traps (2/3/4)_________
18>Following are different types of traps
a: generic trap
b: specific trap
c: time stamp
Ans:___________ (a/b/c/all)
19>___________type consists of coldStart, warmStart, linkDown,linkUp,authenticationFailure, egpNeighborLoss
and enterpriseSpecific (generic trap/specific trap/time stamp)
20>___________is a specific code and is generated even when an enterpriseSpecific trap is not present (generic
trap/specific trap/time stamp)
21>___________is the time elapsed between the last initialization or reinitialization of the element and the
generation of the trap (generic trap/specific trap/time stamp)
22>In RFC 1157,the entities that reside in the management stations and network elements are called
SNMP___________ entities (protocol/application)
23>The peer processes, which implement the SNMP, and thus support the SNMP application entities are termed
as__________ entities (protocol/MIB)

40

NETWORK MANAGEMENT SYSTEMS


24>Application entity residing in the management station is also referred to as _____and the application entity
residing in the element is also referred to as_____ (SNMP agent/SNMP manager)
25>The pairing of the SNMP manager and SNMP agent is called ___________ (SNMP view/SNMP community)
26>The authentication scheme is a filter module in the manager and in the agent (true/false)___________
27>A network element comprises many managed objects both standard and private (true/false)___________
28>A management agent may be permitted to view only a subset of the network element's managed objects. This is
called___________ (SNMP community/community MIB view)
29>A pairing of the SNMP MIB view with the SNMP access mode is called___________ (SNMP
community/community profile)
30>Each community name is assigned _______either READ-ONLY or READ-WRITE (SNMP MIB view/SNMP
access mode) ____
31>___________is combination with the access mode of a managed object determines the operations that can be
performed n the object by an agent (SNMP community/community profile)
32>The SNMP agent with ________access mode can perform all operations --get ,set and trap on objects (READONLY/READ-WRITE)
33>If the SNMP agent has ___________access privilege, it can perform only get and trap operations on objects
(READ-ONLY/READ-WRITE)
34>There are__ access privileges (3/4/5)_________
35> SNMP has following access privileges
a: read only
b: write only
c: read write
d: none
Ans:___________ (a/b/c/d/all)
36>If the access mode is defined as________, that operand is available for all three operations--get,set and trap
(read-only/read-write/write-only)___
37>___________access mode is used to set the value of MIB object by the network manager (read-only/readwrite/write-only)
38>sysContact: read-write:: sysDescr:_____ (read-only/write-only)
39>A pairing of an SNMP community with an SNMP community profile is defined as___________ (community
MIB view/SNMP access policy)
40>___________defines the administrative model of SNMP management (community MIB view/SNMP access
policy)
41>The SNMP agent associated with the proxy policy is called________ (proxy agent/proxy server/either)
42>___________monitors a non-SNMP community with non-SNMP agent and then converts the objects and data
to SNMP-compatible objects and data feed to an SNMP manager (SNMP agent/proxy agent)
43>SNMP agent:____:: Proxy agent:_______ (SNMP community/Non-SNMP community)
44>The peer processes, which implement hue SNMP, and thus support the SNMP application entities are
called___________ entities (MIB/protocol)
45>An SNMP message consists of___________ (version identifier/community name/PDU/all)
46>An SNMP protocol entity is received on port ____on the host except for trap which is received on port_______
(143/144/161/162)
47>The maximum length of the protocol in SNMPv1 is ___________bytes (848/484)
48>A managed object is a scalar variable (true/false) ___________
49>The pairing of the variable and value is called___________ (variable binding/VarBind/Either)
50>Correct format of Get and Set Type PDUs (in order)
a: PDU type| RequestID |Error Status |VarBind1 name|
VarBind1 Value
b: PDU type| VarBind1 name|
VarBind1 Value| RequestID |Error Status
Ans: ___________ (a/b/both)
51>In Get and Set type PDUs format ,______is used to indicate that an error occurred while _____is used to
provide additional information on the error status (ErrorIndex/ErrorStatus)
52>The generic trap consists of___ types (5/6/7)________
53>______trap is not covered by the enterpriseSpecific trap (generic/specific)_____
54>SNMP operations comprise get and set messages from ____to ____,and get & trap messages from____ to_____
(manager/agent)
55>Correct format of Trap PDU (in correct order)
a: PDU Type| Enterprise | Agent address | Generic Trap type Timestamp | VarBind1 name| VarBind1 value| Specific
trap type
b: PDU Type| Enterprise | Agent address | Generic Trap type | Specific trap type | Timestamp | VarBind1 name|
VarBind1 value
Ans:___________ (a/b/either)
56>Match the following

41

NETWORK MANAGEMENT SYSTEMS


coldStart
:failure of one of the communication link
warmStart
:one of the links has come up
linkDown
:authentication failure
linkUp
:loss of EGP neighbor
authenticationFailure :enterprise specific trap
egpNeighborLoss
:sending protocol entity is reinitializing itself, agent configuration or protocol entity
implementation not altered
enterpriseSpecific
:sending protocol entity is reinitializing itself, agents configuration or protocol
entity implementation may be altered
57>wrt Get-Request Operation for a System group, Arrange the following commands in correct sequence
a: GetRequest (sysObjectID.0)
b: GetResponse (sysObjectID.0=enterprise.11.2.3.10.1.2)
c: GetReques (sysDescr.0)
d: GetResponse (sysDescr.0="SunOS")
Ans:___________ (cdba/cdab)
58>wrt Get-Next-Request Operation for a System group, Arrange the following commands in correct sequence
a: GetNextRequest (sysDescr.0)
b: GetResponse (sysObjectID.0=enterprise.11.2.3.10.1.2)
c: GetRequest (sysDescr.0)
d: GetResponse (sysDescr.0="SunOS")
e: GetNextRequest (sysObjectID.0)
Ans:___________ (cdbae/cdabe)___________
59>Arrange the following numbers in lexographic order 1118 115 126 15 1
Ans:___________ (1 1118 126 115 15 /1 1118 115 126 15)
60>Get-next-request has following advantages
a: we dont need to know the object identifier of the next entity
b: we do not know how many rows exist in the table
c: we can use it to build a MIB tree by repeating the request from any node to any node.This is called MIB walk
Ans:___________ (a/b/c/all)
61>wrt Get-Next-Request operation for the MIB ,arrange the following commands in correct sequence
a: GetNextRequest (B)
b: GetResponse (T.E.1.1)
c: GetRequest (A)
d: GetResponse (A)
e: GetNextRequest (B)
f: GetRespons (B)
Ans:___________ (cdeafb/cdefab)
62>___________is a management tool that can capture the packets going across a transmission medium
(filter/sniffer)
63>Match the following
snmpInPkts
:total number of messages from transport service that have tooBig errors
snmpOutPkts
:total number of messages delivered from transport service
snmpInBadVersions
:total number of ASN.1 And BER errors
snmpInBadCommunityNames :total number of messages from transport service,not allowed operation by
the sending community
snmpInBadCommunityUses
:total number of messages from transport service that are of unknown
community name
snmpInASNParseErrs
:total number of messages from transport service that are of unsupported
version
snmpInTooBigs
:total number of messages delivered to transport service
64>Match the following
snmpInNoSuchNames :total number of messages from transport service that have 'noSuchName' errors
snmpInBadValues
:total number of messages from transport service that have redOnly errors
snmpInReadOnlys
:Total number of messages from transport service that have badValue errors
snmpInGenErrs
:total number of messages from transport service that have genErr errors
snmpInTotalSetVars
:Total number of successful Get-Request and Get-Next messages received
snmpInTotalReqVars :total number of objects successfully altered by Set-Request message recieved
snmpInGetRequests
:total number of Get-Request PDUs accepted and processed
snmpInGetNexts
:total number of Get-Next PDUs accepted and processed
65>Match the following
snmpInSetRequests
:total number of Get-Response PDUs accepted and processed

42

NETWORK MANAGEMENT SYSTEMS


snmpInGetResponses
:total number of Set-Request PDUs accepted and processed
snmpInTraps
:total number of trap PDUs accepted and processed
snmpOutTooBigs
:total number of SNMP PDUs generated for which error status is tooBig
snmpOutNoSuchNames :total number of SNMP PDUs generated for which error status is noSuchName
snmpOutBadValues
:total number of SNMP PDUs generated for which error status is badalue
snmpOutGenErrs
:total number of SNMP PDUs generated for which error status is genErr
66>Match the following
snmpOutGetRequests
:total number of SNMP Get-Request PDUs generated
snmpOutGetNexts
:override option to generate authentication failure traps
snmpOutSetRequests
:total number of SNMP trap PDUs generated
snmpOutGetResponses :total number of SNMP Get-Response PDUs generated
snmpOutTraps
:total number of SNMP Set-Request PDUs generated
snmpEnableAuthenTraps :total number of SNMP Get-Next PDUs generated
67>Application functions are limited to network management in SNMP and not to the services provided by the
network (true/false)___________
68>The OSI mode addresses ___areas of functions (4/5/6)________
69>The OSI mode addresses following areas of functions
a: configuration
b: fault
c: performance
d: security
e: accounting
Ans:___________ (a/b/c/d/e/all)
70>Performance counters are part of the SNMP agent MIB. It is the function of the SNMP __________to do the
performance analysis (agent/manager)
71>___________model is protocol entity specifications addresses security function is basic SNMP
(architecture/administrative)
72>___________function is not addressed by the SNMP model (administrative/accounting)
73>All management operations are done using_____ messages in SNMPv1 (3/4/5)______
74>All management operations are done using following messages in SNMPv1
a: get-request
b: get-next-request
c: set-request
d: get-response
e: trap
Ans:___________ (a/b/c/d/e/all)
75>In q74,the first three messages are sent from _____to ______and the last two are sent by_____to ______
(manager/agent)
76>___________model deals with the administrative model structure and the five SNMP message PDU
(administrative/communication)
77>___________model defines the community within which messages can be exchanged
(administrative/communication)

ANSWERS
1>4
2>all
3>administrative
4>administrative
5>SNMP MIB
6>SNMP architecture
7>SNMP protocol
8>all
9>T
10>both
11>5
12>all
13>get-request, get-next-request
14>set-request
15>get-response-request
16>trap
17>3
18>all
19>generic-trap

43

NETWORK MANAGEMENT SYSTEMS


20>specific-trap
21>time-stamp
22>application
23>protocol
24>SNMP manager ,SNMP agent
25>SNMP community
26>t
27>T
28>community MIB view
29>community profile
30>SNMP access mode
31>community profile
32>READ-WRITE
33>READ-ONLY
34>4
35>all
36>read-write
37>write-only
38>write-only
39>SNMP access policy
40>SNMP access policy
41>either
42>proxy agent
43>SNMP community, non-SNMP community
44>protocol
45>all
46>161,162
47>484
48>T
49>variable binding
50>a
51>ErrorStatus, ErrorIndex
52>7
53>specific-trap
54>manager to agent & vice versa
55>b
56>1-g 2-f 3-a 4-b 5-c 6-d 7-e
57>cdab
58>cdabe
59>1 1118 115 126 15
60>all
61>cdefab
62>sniffer
63>1-b 2-g 3-f 4-e 5-d 6-c 7-a
64>1-a 2-c 3-b 4-d 5-f 6-e 7-g 8-h
65>1-b 2-a 3-c 4-d 5-e 6-f 7-g
66>1-a 2-f 3-e 4-d 5-c 6-b
67>T
68>5
69>all
70>manger
71>administrative
72>accounting
73>5
74>all
75>manager to agent & vice versa
76>communication
77>administrative

44

NETWORK MANAGEMENT SYSTEMS

CHAPTER 8: SNMP MANAGEMENT RMON


1>The characterization of computer network performance is statistical in nature (true/false)__________
2>Sniffer is a passive operation and does nothing to the packets, which continue onto their destinations. This
approach is called _______ (monitoring/probing) and the device the performs that function is called (network
monitor/probe)
3>RMON stands for__________
4>The monitored information, gathered and analyzed locally can be transmitted to a remote network management
station. In such a case, remotely monitoring the network with a probe is referred to as__________ (RMAN/RMON)
5>Advantages of RMON are
a: each RMON device monitors the local network segment and does the necessary analyses
b: RMON reduces the need for agents in the network to be visible at all times to the NMS
c: RMON pings locally and hence has less chance of losing packets, thus increasing monitoring reliability
d: individual segments can be monitored almost continuously
e: higher network availability for users and greater productivity for administrators
Ans: __________ (a/b/c/d/e/all)
6>RMON relays information in both solicited and unsolicited fashion to the NMS (true/false)___________
7>The RMON structure of management information is similar to that of__________in defining the object types
(MIB/SMI)
8>RMON MIB has been developed in___ stages (3/4/5)________
9>RMON1 is covered by RFC=____for Ethernet LAN and RFC=____ for extension to token ring LAN
(1757/1271/1513/2021)
10>RMON=__ addressed parameters at the OSI layer 2 and RMON=__ addressed the parameters associated with
OSI layers 3-7 (1/2/3)_______
11>RFC=____ for RMON2 (2021/1271)_______
12>The RMON group consists of___ Ethernet RMON1 groups, ___token ring extension group to RMON1,
and___RMON2 groups for the higher layers (1/9/10)
13>following new data types are defined in the RMON1 textual conventions___________
(OwnerString/EntryStatus)
14>The owner identification is made part of the control table defined by____ data type ._______is used to resolve
conflicts that might arise between management systems in the manipulation of control tables
(OwnerString/EntryStatus)
15>___________is specified in the NVT ASCII character set as DisplayString (OwnerString/EntryStatus)
16>The EntryStatus data type can exist in one of following states
a: valid
b: createRequest
c: underCreation
d: invalid
Ans: __________ (a/b/c/d/cal)
17>Match the following
Valid: row is not fully active
createRequest: delete the row by disassociating the mapping of this entry
underCreation: create a new row by creating this object
Invalid: row exists and is active, it is fully configured and operational
18>RMON__ performs numerous functions at the data link layer (1/2)_________
19>wrt RMON1 Group and functions, the data gathered can serve as inputs to ___sets of functions (3/4/5)________
20>In RMON1 Group and functions, ___________statistics deals with traffic data associated with the hosts,
ranking the traffic for the top N hosts , and conversation between hosts (Ethernet /token/host & conversation)
21>In RMON1 Group and functions, filter group is cascade of __filters (2/3/4)_________
22>The functions associated with the various groups are performed by___ groups associated with the RMON1 MIB
(9/10/11)________
23>In RMON1 Group and functions, the groups fall into___ categories (3/4/5)________
24> RMON1 Group and functions, the groups fall into following categories
a: statistics gathering groups
b: network event reporting function
c: filtering input packets according to selected criteria
Ans: ___________ (a/b/c/all)

45

NETWORK MANAGEMENT SYSTEMS


25>In RMON1 groups and functions, the group fall into three categories, the largest of which is the category
of___________ (network event reporting function/filtering input packets/statistics gathering groups)
26>Match the following
Statistics: computes the top N hosts on the respective categories of statistics gathered
History: gathers statistical data on hosts
Alarm: provides link level statistics
Host: collects periodic statistical data and stores them for later retrieval
Host top N: generates events when the data sample gathered crosses pre-established thresholds
27>Match the following
Matrix: controls the generation of events and notifications
Filter: provides packet capture capability for gathering packets after they flow through a channel
Packet capture: performs filter function that enables capture of desired parameters
Event: gathers statistics on traffic between pairs of hosts
28>_____enhancement helps keep track of data with the changes in control .______enables an application to
download only those rows that changed after a particular time (LastCreateTime/TimeFilter)
29>____table contains row of data._______ table defines the instances of the data rows in the ____table and can be
set to gather and store different instances of data (control/data)
30>Match the following
controldataSource: is the entity or person that created the entry
controlTableSize: identifies the source of the data being collected
controlOwner: identifies the entries associated with the data source
31>___________group contains the statistics measured by the probe for each monitored Ethernet interface on a
device (matrix/statistics)
32>The history group consists of following subgroups___________ (history control group/history data group/both)
33>_____group controls the periodic statistical sampling of data from various types of networks (history control
history data )______
34>___________group is extremely helpful in tracking the overall trend in the volume of traffic (history control
history data )
35>___________group periodically takes statistical samples on specified variables in the probe and compares them
with the preconfigured threshold stored in the probe (statistic/alarm)
36>wrt alarm group, the sampling type is ______value (absolute/delta/either)_____
37>wrt alarm group, in_____ value, the absolute value of the variable at the end of the previous period is stored as
an alarm value.____ value, the absolute value at the end of a period is subtracted from the beginning of the period,
and the computed value is stored (delta/absolute)__
38>An example of _____value is a new interface on a test for infant mortality (delta/absolute)______
39>An example of _______value is a threshold set to 10000 packets in a 10 second interval for excessive packet
loss (delta/absolute)____
40>______group contains information about the hosts on the network (host top n/host)_____
41>The host group comprises of following tables
a: hostControlTable
b: hostTable
c: hostTimeTable
Ans: ___________ (a/b/c/all)
42>Match the following
hostControlTable : contains the same data as the host table but it is stored in the time order in which the
host entry was discovered
hostTable
: controls the interfaces on which the data gathering is done
hostTimeTable
: contains statistics about the host
43>___________group generates reports ranking the top N hosts in selected statistics categories (host/host top N)
44>________group stores statistics on conversations between pairs of hosts (statistics/matrix)
45>Match the following
matrixControlTable : keeps track of the source to destination conversations
matrixSDTable
: keeps the data by destination to source traffic
matrixDSTable
: controls the information to be gathered
46>___________group is used to base the capture of filter packets on logical expressions (event/packet
capture/filter)
47>wrt filter group, the stream of data based on a logical expression is called___________ (link/channel)
48>The filter group contains ___________ (filter table/channel table/both)
49>___________is a post filter group and it captures packets from each channel based on the filter criteria of packet
and channel filters in the filter group (packet capture/channel capture)
50>___________group controls the generation and notification of events (trap/event)

46

NETWORK MANAGEMENT SYSTEMS


51>In RMON Token ring extension group, _____statistics group collects data on token ring parameters
.______statistics group collects statistics on the number of packets of various sizes and the type of packets
(promiscuous/MAC layer)
52>The data are stored in______. The rings and parameters to be monitored are controlled by_____
(ringStationControlTable/ringStationTable)
53>Match the following
Statistics
: station order
promiscuous statistics
: active configuration of ring stations
MAC layer history
: utilization statistics of source routing information
promiscuous history
: current utilization and error statistics of the MAC layer
ring station
: current utilization and error statistics of promiscuous data
ring station order
: historical utilization and error statistics of promiscuous data
ring station configuration : historical utilization and error statistics of
source routing
: station statistics
54>RMON=___ dealt primarily with data associated with the OSI data link layer (1/2)________
55>RFC=___for MON2 (2012/2021)________
56>The RMON2 MIB is arranged in___ groups (9/10/11)________
57>Match the following
Protocol directory
: traffic data from each pair of hosts
Protocol distribution : traffic data from and to each host
Address map
: MAC address to network address on the interfaces
Network layer host : inventory of protocols
Network layer matrix : relative statistics on octets and packets
58>Match the following
Application layer host
: RMON2 MIB compliances and compliance groups
Application layer matrix : configuration of probe parameters
User history collection : user specified historical data on alarms and statistics
Probe configuration
: traffic data by protocol from and to each host
RMON conformance
: traffic data by protocol between pairs of hosts
59>_____group identifies the protocols that the probe can monitor ._____group provides information on the relative
traffic of different protocols (protocol distribution/protocol directory)
60>_____group measures the traffic sent from and to each network address representing each host discovered by
the probe.______ group provides information on the conversation between pairs of hosts in both directions
(network layer matrix/network layer)
61>The RMON2 conformance group consists of following subgroups___________
(rmon2MIBCompliances/rmon2MIBGroups)
62>There ___groups in rmon2MIBGroups (10/11/12/13)________
63>Following groups has optional requirement
a: rmon1EnhancementGroup
b: rmon1EthernetEnhancementGroup
c: rmon1TokenRingEnhancementGroup
Ans: ___________ (a/b/c/all)
64>RMON=__dealt with data link layer and RMON=___with higher level layers (1/1)______
65>RFC=___for ATM protocol IDs for RMON2 (2047/2074)________
66>Extending RMON to____ devices requires design changes and new functionality (token ring/ATM)_______
67>The ATM RMON MIB is under _____node of the IETF Internet MIB (organizational/experimental)______
68>Match the following
portSelect : ATM per-circuit
atmStats : ATM per host statistics
atmHost : basic statistics
atmMatrix : port selection
69>Following are tables n atmHost group: ___________ (atmStatsControlTable/atmStatsTable/both)
70>atmMatrix contains __data tables and___ control tables (2/3/4)______
71>The three top groups of users contributing to __ of the Internet traffic were
students, newsgroup services, domain (64/74/84)
72>The growth rate of Internet use is about___% (25/50/75)________
73>___________of the network involves the use of remotely positioned probes in various segments of the network
(remote maintaining/remote monitoring)
ANSWERS
1>T

47

NETWORK MANAGEMENT SYSTEMS


2>either, either
3>Remote Network Monitoring
4>RMON
5>all
6>T
7>SMI
8>3
9>1757,1513
10>1,2
11>2021
12>9,1,10
13>both
14>OwnerString, EntryStatus
15>OwnerString
16>all
17>1-d 2-c 3-a 4-b
18>1
19>4
20>host & conversation
21>2
22>10
23>3
24>all
25>statistics gathering groups
26>1-c 2-d 3-e 4-b 5-a
27>1-d 2-c 3-b 4-a
28>LastCreateTime,TimeFilter
29>data table
30>1-b 2-c 3-a
31>statistics
32>both
33>history group
34>history group
35>alarm
36>either
37>absolute, delta
38>absolute
39>delta
40>host
41>all
42>1-b 2-c 3-a
43>host top N
44>matrix
45>1-c 2-a 3-b
46>filter
47>channel
48>both
49>packet capture
50>event
51>MAC layer, promiscuous
52>ringStationTable, ringStationControlTable
53>1-d 2-e 3-g 4-f 5-h 6-a 7-b 8-c
54>1
55>2021
56>10
57>1-d 2-e 3-c 4-b 5-a
58>1-d 2-e 3-c 4-b 5-a
59>protocol directory, protocol distribution
60>network layer host, network layer matrix
61>both
62>13
63>b,c

48

NETWORK MANAGEMENT SYSTEMS


64>1,2
65>2074
66>ATM
67>experimental
68>1-d 2-c 3-b 4-a
69>both
70>3,2
71>84
72>50
73>remote monitoring

49

NETWORK MANAGEMENT SYSTEMS

CHAPTER 9: BROADBAND NETWORK MANAGEMENT


-- ATM NETWORKS
1>Broadband networks can be classified into following distinct categories: __________ (WAN/access
network/both)
2>____is predominantly based on ATM technology .______is based on cable modem, digital subscriber loop and
wireless technologies (WAN/access network)
3>__________ISDN is also known as Basic ISDN (wideband/narrowband)
4>__________is a low bandwidth network that can carry two 56 kilobaud rate channels (wideband/narrowband)
5>__________network can transport very high data rate signals (broadband/narrowband)
6>Following are different types of information technology services:
a: voice
b: video
c: data
Ans: ___________ (a/b/c/all)
7>______transports signals over long distances between switching offices, and _____covers the last mile from a
switching office to the customer's premise (Local loop/WAN)
8>__________ network is also called multimedia networking (narrowband/broadband)
9>___________networks are also called BISDN (narrowband/broadband)
10>Those who provide multimedia services to customers are broadband service providers and are referred to
as________ (MOM/MOTIS/MSO)
11>Basic ISDN consisted of two basic channels: ___channels , each with a 56 kilobaud rate, combined with an 8
kilobaud signaling ___ channel (A/B/C/D)___
12>Broadband networks and services have contributed significantly to advances in following areas
a: ATM
b: SONET/SDH
c: broadband access technology
Ans: __________ (a/b/c/all)
13>The ATM technology can be viewed as a hybrid of _____and ______switched transmission modes
(packet/message/circuit)
14>The data rate of SONET/SDH WAN is an integral multiple of the basic OC-1/STS, which is ____Mbps
(51.84/155.52)_______
15>Broadband access technology is implemented in one of following ways
a: HFC technology
b: DSL technology
c: wireless technology
Ans: ___________ (a/b/c/all)
16>__________is a two way interactive multimedia communication system that uses fiber and coaxial cable
facilities and cable modems (DSL/HFC)
17>The customer network consists of following classes
a: residential customers
b: corporate customers
Ans: __________ (a/b/both)
18>wrt broadband service networks, the service providers interface with WAN via___________ (router/gateway)
19>___________network is based on ATM technology and broadband access technology (broadband/corporate)
20>___________network is based on switches with point to point connections in contrast to one to many
connections as in_______ (broadcast protocol/ATM)
21>ATM is a connection-oriented protocol (true/false)___________
22>___________has helped bring about the merger of computer and telecommunication networks
(broadband/ATM)
23>Following important concepts comprise ATM technology
a: virtual path- virtual circuit
b: fixed packet sizes or cells
c: small packet sizes
d: statistical multiplexing
e: integrated services
Ans : ___________ (a/b/c/d/e/all)

50

NETWORK MANAGEMENT SYSTEMS


24>___________is an organization that specifies standards for ATM implementation (ATM consortium/ATM
forum)
25>Table 9.1___________
26>In ATM, because the path is fixed for the entire session, the transmission rate is considerably ______than a nonvirtual circuit packet switched network (slower/faster)_____
27>A virtual path-virtual circuit can be established for each session as needed and removed after the session. This
method is called___________ (PVC/SVC)
28>A connection can be established for long periods of time and not switched between sessions, creating
_______between a pair of end stations that carry large traffic volumes (SVC/PVC)____
29>________are established between locations of large corporations (SVC/PVC)
30>ATM packets are of fixed size, each being ___bytes long (53/55)________
31>The ATM packet size of 53 bytes comprises of a header of___ bytes and a payload of ___bytes
(4/5/48/49)_____
32>The ATM packet size of 53 bytes is chosen by optimizing following factors
a: packet size should be as small as possible to reduce the delay in switching and packetization
b: packet size should be large enough to reduce the overhead of the header relative to the payload
Ans : ___________ (a/b/both)
33>Pure video w/o sound can have___________ priority in terms of delay than a combination of audio and video
can (less/high)
34>____ traffic require low tolerance on variations in delay and low end-to-end delays for good interactive
communication (data/video/voice/all)
35>___________traffic can have a much higher tolerance on latency because it is primarily a store and forward
technology and the traffic itself inherently occurs in bursts (data/video/voice/all)
36>_____main classes of traffic have been defined to implement quality of service (3/4/5)______
37>Following main classes of traffic have been defined to implement quality of service
a: CBR
b: VBR-rt
c: VBR-nrt
d: ABR
Ans : ___________ (a/b/c/d/all)
38>in ATM, Transmission of voice is assigned___________ (CBR/VBR-rt/VBR-nrt/ABR)
39>Streaming video such as real time video on the Internet is assigned___________ (CBR/VBR-rt/VBR-nrt/ABR)
40>___________is assigned to transmission of still images (CBR/VBR-rt/VBR-nrt/BR)
41>IP data traffic gets the lowest bandwidth priority___________ (CBR/VBR-rt/VBR-nrt/ABR)
42>There are two markets for ATM switches using ATM technology: ___________ (public/protected/private)
43>_____network is established by service providers. ______network is primarily a campuslike network
(public/protected/private)
44>The basic voice band, 0-4 kHz is converted to ___Kbps digital signal universally (16/32/64)________
45>T1 transmission carrier has a data rate of____ Mbps and carrier ___voice channels (1.544/2.048/24/30)_
46>E1 transmission carrier has a data rate of____ Mbps and carrier ___voice channels (1.544/2.048/24/30)
47>The digital hierarchy has been synchronized throughout the world using _____Mbps are the basic data rate in
carrier technology and using fiber optics (51.84/155.52) ______
48>The optical carrier starts with the unit of OC-1, which is______ Mbps (51.84/155.52)_____
49>Advantages of ATM LAN are
a: it interfaces nicely with an ATM SONET network
b: it is adaptable for a high speed backbone for a camps network that can function at a higher speed than FDDI
Ans : ___________ (a/b/both)
50>The services provided by ATM differ from conventional LAN in following ways
a: ATM is connection oriented
b: ATM makes a one-to-one connection between pairs of workstations in contrast to the broadcast con multicast
mode in the conventional LAN
c: LAN MAC address is dedicated to the physical network interface card and this is independent of network
topology
Ans : ___________ (a/b/c/all)
51>LANE stands for___________
52>___________emulates the services of a current LAN network across an ATM network by using layered
architecture (LUNI/LANE)
53>in layered architecture of a LAN emulation, following layers are inserted between the ATM layer and the LLC
layer: ___________ (ATM adaptation layer/LAN emulation layer/both)
54>In layered architecture of a LAN emulation, ______interfaces with the ATM layer underneath it, and _____is
sandwiched between the ATM adaptation layer and the LLC layer (ATM adaptation layer/LAN emulation layer)

51

NETWORK MANAGEMENT SYSTEMS


55>The ATM forum specified ___________which provides the interface between the user and the LAN emulation
layer (LUNI/LANE)
56>LUNI stands for___________
57>In layered architecture of a LAN emulation, arrange the following in correct sequence (from top to bottom)
a: physical layer
b: ATM adaptation layer
c: logical link control layer
d: network layer
e: LAN Emulation layer
f: ATM
Ans : ___________ (fdbcae/fbdaec/fdbace)
58>In layered architecture of a LAN emulation, an ATM end station is called___________ (LE server/LE client)
59>In the LUNI interface, two LECs communicate with each other over an ATM network using___________ (LE
client/LE services)
60>Following are LE Services in LUNI interface
a: LECS
b: LES
c: BUS
Ans : ___________ (a/b/c/all)
61>LECS stands for___________
62>LES stands for___________
63>BUS stands for___________
64>In the LUNI interface, ___implements assignment of individual LECs to different emulated LANs.____
performs a control coordination function for ELAN , registering and resolving MAC addresses or route descriptors
to ATM addresses .____handles data sent by the LEC to a broadcast MAC address, a multicast address, and the
initial unicast frames before the address resolution is performed by the LEC (LES/BUS/LECS)
65>Following functions are performed across LUNI in the LUNI interface
a: initialization
b: registration
c: address resolution
d: data transfer
Ans : __________ (a/b/c/d/all)
66>In LUNI interface, Initialization involves following
a: obtaining ATM address of LES that are available on a particular ATM network
b: joining or leaving a particular emulated LAN specified by the ATM address of the LES
c: declaration whether the LEC across the LUNI is to receive address resolution requests for all unregistered
destinations
Ans : ___________ (a/b/c/all)
67>Match the following wrt the LUNI interface
Initialization
: informs the LES of the individual MAC address that the LEC represents and route
descriptors for source route bridging
Registration
: involves obtaining the ATM address representing the LEC with a particular MAC
address
address resolution : involves transporting the data from source to destination
data transfer
: involves obtaining ATM address of LES that are available on a particular ATM
network
68>ATM is a switch that establishes ___________circuit between input and output ports (connectionoriented/connectionless)
69>In LAN emulation client connections across LUNI, an ATM LAN establishes a virtual circuit connection
between pairs of ____going through the switch ( LECS/LEC)______
70>In LAN emulation client connections across LUNI, ________provides the translation between 20 byte ATM
address and the 6 byte MAC address (LEC/LES/LECS)
71>In LAN emulation client connections across LUNI, the LEC sends the broadcast or multicast PDU to the
broadcast and unknown server via___________ (collapsed connection/controlled connection)
72>Every LAN emulation client belongs to___________ (LECS/LES/BUS)
73>___________implements the assignment of the individual LEC to various segments (LECS/LES/BUS)
74>The most popular implementation of LAN emulation currently is to use ATM switches in the backbone network
of a campus environment called___________ (controlled backbone design/collapsed backbone design)
75>___________is a topology and location independent group of stations that are communicating as though they
were on the same physical LAN (VPN/VLAN)
76>The LAN emulation configuration server can be configured to form________group (VPN/VLAN)

52

NETWORK MANAGEMENT SYSTEMS


77>___________network management consists of managing the wide area and local area networks with ATM
technology and the access networks from a central office to a remote workstation (narrowband service/broadband
service)
78>Wide area network facilities are provided by public service providers, who perform the following management
functions
a: operation
b: administration
c: maintenance
d: provisioning
Ans : ___________ (a/b/c/d/all)
79>ATM networks are classified as both private and public networks (true/false)___________
80>____________ATM network is an enterprise network (public/private)
81>In the ATM forum management interface reference architecture, ___&____are the interfaces between a private
NMS and either an end user or a private network respectively (M1/M2/M3/M4/M5)____
82>In the ATM Forum management interface reference architecture, a private network management system can
access its own network related information in a public network via___ interface to the public network management
system (M1/M2/M3/M/M5)_________
83>In ATM forum management interface reference architecture, ___interface is between the public NMS and the
public network. The interface ______is between the NMSs of two service providers (M1/M2/M3/M4/M5)___
84>The ATM forum defines an ATM link specific view of configuration and fault parameters across a UNI. The
specifications for them are contained in the___________ (IETF/ILMI)
85>ILMI stands for___________
86>The 'I' In ILMI designates___________ (Interim/Integrated)
87>ATM management information is communicated across the UNI or the NNI (true/false)___________
88>The devices communicate across UNI and NNI via an ATM _______module in the entity (IME/ILMI)____
89>IME stands for___________
90>Following are versions of IME
a: user
b: network
c: system
Ans : ___________ (a/b/c/all)
91>ILMI communication takes place over both physical and virtual links by means of _________protocol
(SNMP/AAL5/either)
92>BICI stands for___________
93>BICI is also known are___________ (UNI/NNI)
94>The management information baseand the structure of management information required for an ATM network
are specified in following document
a: one by IETF
b: one by ATM forum
Ans : ___________ (a/b/both)
95>Major branches of the Internet ATM MIB Are: ___________ (mib2/atmForum/both)
96>The structure of management information is defined in ____syntax. _____associated with ATM is primarily
concerned with ATM sublayer parameters (MIB/SMI/ASN.1)__
97>___________group contains subgroups for each medium of transmission (interface/system/transmission)
98>ATM objects, as defined in the atmMIBObjects group under atmMIB, are specified in RFC=____
(1573/1695)_______
99>The atmForum Group is subnode ____under the enterprise node (353/335)_______
100>The atmForum Group contains ___subgroups (3/4/5)________
101>The atmForum group contains the following subgroups
a: atmForumAdmin
b: atmForumUni
c: atmUniDxi
d: atmLanEmulation
e: atmForumNetworkManagement
Ans : __________ (a/b/c/d/e/all)
102>__________group is defined in the ILMI specification (ATM Administrative /ATM UNI/both)
103>__________group is the ATM interface between DTE and DCE (ATM UNI/ATM DXI)
104>DXI stands for__________
105>ATM network management uses__________ (SNMP MIB/ATM Forum MIB/both)
106>Match the following
System
: RFC1695
Interfaces
: RFC1407

53

NETWORK MANAGEMENT SYSTEMS


ifMIB
: RFC1213
Transmission : RFC1573
ds1
: RFC1595
ds3
: RFC1406
sonetMIB:
atmMIB:
107>Match the following
ifMIB
: ATM forum MIB/M3 specification
atmMIB
: remote monitoring MIB extensions for ATM networks
atmForum
: ATM administrative
atmRmon
: ATN user network interface
atmForumAdmin
: data exchange interface specification
atmForumUni
: ATN emulated LAN MIB
atmUniDxi
: SNMP M4 network element view MIB
atmLanEmulation
: interface types
atmForumNetworkManagement : ATM objects
108>ATM objects are specific in RFC=_______ (1965/1695)
109>AME stands for__________
110>__________protocol is used for communication between the AME in two devices (SNMP/ILMI)
111>Match the following
ifXTable
: information on the relationship between sublayers
ifStackTable
: information on the type of packets/frames accepted on an interface
ifTestTable
: tests that NMS instructs the agent to perform
ifRecvAddressTable : additional objects for the interface table
112>Following are transmission modes used for ATM__________ (ds1/ds2/sonet/all)
113>DS1: ___Mbps: : DS3: ____Mbps: : SONET: ___Mbps (n155.52/1.544/44.736)
114>ATM __________group contains information needed to manage the ATN sublayer entities: traffic descriptors,
DS3 PLCP, TC sublayer parameters, virtual path link/virtual channel link and their associated cross-connect tables,
and performance parameters for AAL5 (system/interface/object)
115>___________specification define the administrative and UNI groups of the ATM forum MIB (IETF/ILMI)
116>__________group defines a general purpose registr for locating ATM network services such as the LECS and
the ANS (transmission/administrative)
117>ANS stands for__________
118>PLCP stands for__________
119>Match the following
atmNoTrafficDescriptor
: virtual path link table
atmInterfaceConfTable
: virtual channel link table
atmInterfaceDs3PlcpEntry : ATM traffic descriptor type
atmInterfaceTCTable
: ATM local interface configuration parameter table
atmVpITable
: ATM interface DS3 PLCP parameters and state variable table
atmVclTable
: ATM TC sublayer configuration and state parameters table
120>Match the following
atmTrafficDescrParamTable
: AAL VCC performance parameters table
atmVpCrossConnectIndexNext : virtual cross-connect table
atmVpCrossConnectTable
: index for virtual channel cross connect table
atmVpCrossConnectIndexNext : virtual path cross connect table
atmVpCrossConnectTable
: index for virtual path cross connect table
aal5VccTable
: ATM traffic descriptor type and associated parameters
121>Match the following
atmfPhysicalGroup : deprecated
atmfAtLayerGroup : defines a table of status and parameter information on the virtual path connections
atmfAtmStatsGroup : defines a table of status and parameter information on the virtual channel connections
atmfVpcGroup
: defines the network side IME table containing the user side ATM layer addresses
atmfVccGroup
: defines a table of physical layer status and parameter information
atmfAddressGroup : defines a table of ATM layer status and parameter information
122>Match the following
atmfNetPrefixGroup
:defines a table of operational parameters related to ABR virtual channel
connections
atmfSrvcRegistryGroup : defines a table of operational parameters related to ABR virtual path connections
atmfVpcAbrGroup
: defines the network side IME table containing all services available to the user

54

NETWORK MANAGEMENT SYSTEMS


side IME
atmfVccAbrGroup
: defines a user side IME table of network prefixes
123>__________management interface is between the private NMS and the public NMS (M1/M1/M3/M4/M5)
124>M3 requirements has following classes
a: status & configuration monitoring
b: virtual configuration control
Ans : ___________ (a/b/both)
125>In ATM, M3 class=___requirements are those that a public NMS offers to the customers, monitoring and
management of configuration, fault and performance of a specific customer's portion of a public ATM network
(1/2/3) ________
126>In ATM, M3 class=___service provides greater capability to the user , who can request the public NMS to add,
delete or change virtual connections between pairs of the customer's UNIs (1/2/3)______
127>In ATM, M3 class 1 service is offered only for _____configuration (SVC/PVC)______
128>In ATM, examples of M3 class1 service are
a: retrieving performance and configuration information for a UNI link
b: public NMS reporting of a UNI link failure via a alarm or trap message to the user NMS
Ans : __________ (a/b/both)
129>In ATM, example of M3 class2 service are
a: customer wanting to establish a new virtual path
b: increase the number of virtual circuits in a given virtual path
Ans : ___________ (a/b/both)
130>CNM stands for_________
131>___________manages both private and public ATN networksCNM/CNP)
132>In ATM , M3 class=___requirements are mandatory, and M3 class=___requirements are optional (1/2/3)_____
133>M3 class2 functionality is divided into following subgroups
a: ATM level subgroup
b: VPC/VCC level subgroup
c: traffic subgroup
Ans : __________ (a/b/c/all)
134>The VPC/VCC level subgroup provides the CNM the ability to modify
a: virtual path link configuration and status configuration information
b: virtual channel link configuration and status information
c: virtual path connection configuration and status information
d: virtual channel connection configuration and status information
Ans : __________ (a/b/c/d/all)
135>The traffic subgroup provides the CNM the ability to modify
a: traffic descriptors and information objects for virtual channel connections
b: traffic descriptors and information objects for virtual path connections
Ans : __________ (a/b/both)
136>Match the following
General UNI protocol stack information
: All tables except dsx3ConfigTable, all
ATM performance information on customer's UNI : atmInerfaceConfTable of ATM MIB
Physical layer performance and status information : dsx3ConfigTable
ATM level information configuration information : system group, interface group, SNMP group
Physical layer configuration information
: ifTable
137>Match the following
ATM layer virtual path link configuration and status information
: warmStart, coldStart, linkUp,
linkDown of SNMP group
ATM layer virtual channel link configuration and status information
:atmTrafficDescrParamTable of
ATM MIB
ATM layer virtual path connection configuration and status information : atmVcCrossConnectTable &
atmVcCrossConnectIndexNext
of ATM MIB
ATM layer virtual channel connection configuration and status information: atmVpCrossConnectTable &
atmVpCrossConnectIndexNext
of ATM MIB
ATM layer traffic characterization information
: atmVclTable of ATM MIB
Event notifications on ATM link going up or down
: atmVpITable of ATM MIB
138>Match the following
ATM level information configuration information
: atmTrafficDescrParamTable in ATM
MIB

55

NETWORK MANAGEMENT SYSTEMS


Virtual path link configuration and status configuration information : atmVpCrossConnectTable &
atmVpCrossConnectIndexNext of ATM MIB
Virtual channel link configuration and status information
: atmVplTable in ATM MIB
Virtual path connection configuration and status information
: atmInterfaceConfTable in ATM MIB
Virtual channel connection configuration and status information
: atmVclTable in ATM MIB
Traffic descriptors & info objects for virtual path & channel connections: atmVcCrossConnectTable &
atmVcCrossConnectIndexNext
of ATM MIB
139>The management of __________ATM networks is primarily the responsibility of network service providers-carriers, PTTs and RBOCs (private/public)
140>To manage public networks, ITU-T has defined _____layer model operations --the TMN (3/4/5)_____
141>TMN stands for__________
142>In ATM relationship to TMN layered architecture, __________layer contains network elements
(element/element management/network management)
143>Match the following
EL : manages network elements
EML: manages the network either directly or via EML
NML: contains network elements (NE)
144>EML stands for__________
145>NML stands for__________
146>A network view of management's physical configuration consists of following ATM networks
a: one a single supplier subnetwork
b: one a multiple supplier subnetwork
Ans: __________ (a/b/both)
147>In a network view of management physical configuration, __________manages the network elements for each
subnetwork (subNMS/NMS)
148>The NMS environment can manage both network elements and networks (true/false)__________
149>The ATM Forum M4 Network element view specifications currently support only__________ (SVC/PVC)
150>Configuration management provides the following functions to manage NEs
a: ATM NE configuration identification and change reporting
b: configuration of UNIs, BICI, and BISSIs
c: configuration of VPL/VCL termination points and cross connections
d: configuration of VPC and VCC OAM segment end points
e: event flow control, the event forwarding discriminator function
Ans : __________ (a/b/c/d/e/all)
151>ATM NE configuration identification and change reporting involves
a: operations performed over the craft interface
b: human intervention
c: customer control channels
d: network failures
e: protection switching events
f: subATM NE component initialization
g: secondary effects of atomic operations performed by the management systems
Ans : ___________ (a/b/c/d/e/f/g/all)
152>The following set of functions is specified for detecting, isolating and correcting abnormal operations (ie fault
management)
a: notifying the NMS of a detected failure
b: logging failure reports
c: isolating faults via demand testing
Ans : ___________ (a/b/c/all)
153>In fault management, specific functions are
a: failure reporting of the various alarms
b: OAM cell loopback testing
Ans : _________ (a/b/both)
154>The functions of performance monitoring (management) for an ATM network are
a: performance monitoring
b: traffic management
c: network data collection
d: UPC/NPC disagreement monitoring
e: performance management control
Ans : ___________ (a/b/c/d/all)

56

NETWORK MANAGEMENT SYSTEMS


155>UPC stands for___________
156>NPC stands for___________
157>Processing error alarm category has following generic trouble
a: storage capacity problem
b: memory mismatch
c: corrupt data
d: software environment problem
e: software download failure
f: version mismatch
Ans : __________ (a/b/c/d/e/f/all)
158>Environmental alarm category has following generic trouble
a: cooking fan failure
b: enclosure door open
c: fuse failure
d: high temperature
Ans : __________ (a/b/c/d/all)
159>General alarm category has following generic trouble: __________ (vendor specific/version mismatch)
160>_________ alarm category has generic trouble such as AIS, LCD , LOF , LOP , LOS, payload type mismatch,
transmission error, path trace mismatch, RDI and Signal label mismatch (Communication/equipment)
161>In performance management, the following specific functions carry out the general functions
a: physical layer performance monitoring
b: ATM cell level protocol monitoring
c: UPC/NPC disagreement monitoring
Ans: __________ (a/b/c/all)
162>______network view for the management of an ATM public network is concerned with network management
layer information (M1/M2/M3/M4/M5)
163>wrt M4 network view interface, the functional areas addressed in the specifications are
a: transport network configuration provisioning
b: transport network connection management
c: network fault management
d: network security management
Ans : __________ (a/b/c/all)
164>Transport network provisioning includes (subnetwork provisioning of network nodes and links)
a: subnetwork provisioning for the addition and monitoring information on addition, deletions and changes in NEs
and their configurations
b: link provisioning for the set up, modification and release of subnetwork links
Ans : __________ (a/b/both)
165>The M4 network view managed entities support the subnetwork management of reservation and modification
of subnetwork connections, link connections, trails and segments which involves
a: point-to-point VP/VC subnetwork connections between pairs of end points
b: multipoint subnetwork VP/VC connections between pair-wise end points
c: link VP/VC connections between subnetworks
d: segment set up and support of VP/VC segment termination end points
e: trail set up and support of trails containing information on subnetwork connections and links
Ans : __________ (a/b/c/d/e/all)
166>The connections release across the M4 interface involves the management of resources to be made available
after use, and should support
a: release of subnetwork connections and release of resources of both point-to-point and multipoint connections
b: release of link connections between subnetworks
Ans : __________ (a/b/both)
167>M4 interface management is required to report network view alarms and provide testing to isolate the
problems including
a: provision of log network alarms within a subnetwork to be retrieved by the NMS
b: autonomous notification of failures such as termination point failures
c: provision of loopback capability that supports OAM cell loopback along a subnetwork connection or a segment
of it
Ans : _________ (a/b/c/all)
168>The main security objectives of network security management are
a: confidentiality of stored and transferred information
b: data integrity of stored and transferred information
c: accountability for all ATM network service invocations and for ATM network management activities
d: availability of correct access to ATM facilities

57

NETWORK MANAGEMENT SYSTEMS


Ans : __________ (a/b/c/d/all)
169>___________generic threats are considered in the threat analysis of an ATM network (5/6/7)
170>Following generic threats are considered in the threat analysis of an ATM network
a: masquerade or spoofing
b: eavesdropping
c: unauthorized access
d: loss or corruption of information
e: repudiation
f: forgery
g: denial of service
Ans : __________ (a/b/c/d/e/f/g/all)
171>Match the following
verification of identities
: access control
controlled access and authorization
: confidentiality
Protection of confidentiality, transferred data : integrity
Protection of confidentiality, stored data
: non-repudiation
protection of data integrity, transferred data : user authentication
protection of data integrity, stored data
: security alarm, audit trail and recovery
strong accountability:
activity logging:
alarm reporting:
audit:
172>In LAN emulation, we are concerned with following servers
a: LES
b: BUS
c: LECS
Ans : __________ (a/b/c/all)
173>Following MIB modules are under the ATM LANE module
a: elanMIB
b: lesMIB
c: busMIB
Ans : ___________ (a/b/c/all)174>In ATM LANE emulation MIB, ___enables a network manager to change the
configuration of ELANs .___&____allow reading back the current status of the ELANs (elanMIB/lesMIB/busMIB)
175>ELAN stands for__________
176>__________MIB deals with information required for a LEC to join an ELAN (VLAN/ELAN)
177>Following manual steps are necessary in creating an ELAN
a: create a new ELAN in the elanMIB
b: create a LES entry for that ELAN using the lesMIB
c: create a BUS entry for that ELAN using the busMIB
Ans : __________ (a/b/c/all)
178>The elanMIB consists of following groups
a: ELAN administration b: ELAN configuration c: ELAN LECS
Ans : __________ (/b/c/all)
179>Match the following wrt elanMIB
ELAN administration group : allows the configuration and monitoring of LECS
ELAN configuration group : is a registry for the LEC assignment policy types
LECS configuration group : provides the configuration for emulated LANs
180>LAN emulation server MIB contains following groups
a: LES configuration group
b: LES statistics group
c: LES-LEC statistics group
d: LES fault management group
Ans : __________ (a/b/c/d/all)
181>Match the following
LES configuration group
: is responsible for maintaining a log of errors in LES
LES statistics group
: provides information on LES configuration and topology
LES-LECS statistics group : measures performance and fault data
LES fault management group : has the entire LAN emulation ARP request-related counter and error counts
on a per LEC-LES pair basis
182>busMIB consists of following groups
a: BUS configuration group

58

NETWORK MANAGEMENT SYSTEMS


b: BUS statistics group
c: BUS fault management group
Ans : __________ (a/b/c/all)
183>Match the following
BUS configuration
: provides information on BUS statistics and BUS LEC statistics
BUS statistics
: addresses BUS errors and maintains a log of the errors
BUS fault management group : provides information on BUS topology
184>__________is between DTE and DCE and connects o a public data network (DSU/DXI)
185>____is a hub or router, and ______is a DSU , which interfaces with an ATM switch (DTE/DCE/DXI)
186>LMI stands for__________
187>The ATM _______defines the protocol for exchanging information across the DXI and supports DXI-, AALand UNI-specific management information (LES/LMI)
188>__________protocol supports the SNMP management system and the IME running on an ATM switch
(LES/LMI)
189>ATM is based on _____transmission (cell/packet)_____
190>ATM is a hybrid of ____&______mode transmissions (message/packet/circuit)
191>__________, which is an outgrowth of switched hub development, is well suited for the ATM environment
(ELAN/VLAN)
192>The OSI standards have identified ___M Interfaces for managing ATM networks (3/4/5)_______
193>Match the following
M1: manages private ATM networks
M2: manages ATM network elements
M3: manages the network at the network element level using the network element view or at the network
management level using the network view
M4: is between the NMSs of two service providers
M5: manages ATM network elements
194>____defines the management interface of the ATM network for public service providers
(M1/M2/M3/M4/M5)______
195>Number of levels in TMN as defined by OSI standard (4/5/6)__________
196>Fault, performance and security management specifications are addressed in the __interface specifications
(M1/M2/M3/M4/M5)
ANSWERS
1>both
2>WAN, access network
3>narrowband
4>narrowband
5>broadband
6>all
7>WAN, local loop
8>broadband
9>broadband
10>MSO
11>B,D
12>all
13>circuit, packet
14>51.84
15>all
16>HFC
17>both
18>gateways
19>broadband
20>ATM, broadcast protocol
21>T
22>ATM
23>all
24>ATM forum
25>
26>faster
27>SVC
28>PVC

59

NETWORK MANAGEMENT SYSTEMS


29>PVC
30>53
31>5,48
32>both
33>less
34>voice & video
35>data
36>4
37>all
38>CBR(Constant Bit Rate)
39>VBR-rt(Variable Bit Rate-real time)
40>VBR-nrt(Variable Bit Rate-non real time)
41>ABR(Adjustable bit rate)
42>private, public
43>public, private
44>64
45>1.544,24
46>2.048,30
47>155.52
48>51.84
49>both
50>all
51>LAN Emulation
52>LANE
53>both
54>ATM adaptation layer, LAN emulation layer
55>LUNI
56>LAN Emulation User Network Interface
57>dcebfa
58>LE client
59>LE service
60>all
61>LE configuration server
62>LE server
63>Broadcast & Unknown Server
64>LECS,LES,BUS
65>all
66>all
67>1-d 2-a 3-b 4-c
68>connection-oriented
69>LEC
70>LES
71>controlled connection
72>BUS
73>LECS
74>collapsed backbone design
75>VLAN
76>LAN
77>broadband service
78>all
79>T
80>private
81>M1,M2
82>M3
83>M4,M5
84>ILMI
85>Integrated Local Management Interface
86>Integrated
87>T
88>IME
89>Interface Management Entity
90>all

60

NETWORK MANAGEMENT SYSTEMS


91>either
92>Broadband Inter Carrier Interface
93>NNI
94>both
95>both
96>ASN.1,MIB
97>transmission
98>1695
99>353
100>5
101>all
102>both
103>ATM DXI
104>Data Exchange Interchange
105>both
106>1-c 2-c 3-d 4-c 5-f 6-b 7-e 8-a
107>1-h 2-i 3-a 4-b 5-c 6-d 7-e 8-f 9-h
108>1695
109>Agent Management Entity
110>ILMI
111>1-d 2-a 3-c 4-b
112>all
113>1.544,44.736, n*155.52
114>object
115>ILMI
116>administrative
117>ATM name answer server
118>Physical Layer Convergence Parameter
119>1-c 2-d 3-e 4-f 5-a 6-b
120>1-f 2-e 3-d 4-c 5-b 6-a
121>1-e 2-f 3-a 4-b 5-c 6-d
122>1-d 2-c 3-b 4-a
123>M3
124>both
125>1
126>2
127>PVC
128>both
129>both
130>Customer Network Management
131>CNM
132>1,2
133>all
134>all
135>both
136>1-d 2-e 3-a 4-b 5-c
137>1-f 2-e 3-d 4-c 5-b 6-a
138>1-d 2-c 3-e 4-b 5-f 6-a
139>public
140>5
141>Telecommunication Management Network
142>element layer
143>1-c 2-a 3-b
144>Element Management Layer
145>Network Management Layer
146>both
147>subNMS
148>T
149>PVC
150>all
151>all
152>all

61

NETWORK MANAGEMENT SYSTEMS


153>all
154>all
155>User Parameter Control
156>Network Parameter Control
157>all
158>all
159>vendor specific
160>communication
161>all
162>M4
163>all
164>both
165>all
166>both
167>all
168>all
169>7
170>all
171>1-e 2-a 3-b 4-a 5-c 6-a 7-d 8-f 9-f 10-f
172>all
173>all
174>elanMIB, lesMIB, busMIB
175>Emulated LAN
176>ELAN
177>all
178>all
179>1-b 2-a 3-c
180>all
181>1-b 2-c 3-d 4-a
182>all
183>1-c 2-a 3-b
184>DXI
185>DTE,DCE
186>Local Management Interface
187>LMI
188>LMI
189>cell
190>packet&circuit
191>VLAN
192>5
193>1-e 2-a 3-b 4-c 5-d
194>M4
195>5
196>M4

62

NETWORK MANAGEMENT SYSTEMS

CHAPTER 10: BROADBAND NETWORK MANAGEMENT


1>Following different types of customers have access to broadband networks
a: corporate or enterprise users who have campuswide networks
b: service providers
c: residential and small business customers who have multimedia requirements
Ans: __________ (a/b/c/all)
2>MSO stands for__________
3>HFC stands for__________
4>Following types of access technology are currently available to residential and small business customers
a: HFC/cable modem
b: DSL
Ans: __________ (a/b/both)
5>In the case of __________network, information is transmitted to the cable modem at the customer site from an
MSO facility (DSL/HFC)
6>The access network based on_______ uses the existing twisted pair loop facility from a central office to the
customer premises (DSL/HFC)
7>Different modes of access rely on following technologies
a: HFC cable
b: DSL
c: wireless communication
d: satellite communication
Ans: ___________ (a/b/c/d/all)
8>Broadband access technologies currently consist of following mutually independent methods
a: HFC cable
b: DSL
c: wireless communication
d: satellite communication
Ans: ___________ (a/b/c/d/all)
9>___________uses television transmission facilities and cable modems, and is the most widely deployed means
of access of the four (HFC/DSL/wireless/satellite)
10>In _____way telephony return configuration, the downstream signal to the customer traverses cable
(one/two)______
11>In____ way HFC mode, both upstream and downstream are handled by the HFC medium using a cable modem
(one/two)_______
12>DSL technology has 3 different implementations and is generally referred to as xDSL , where the x represents
asymmetric (A), high speed (H) Or very high speed (V) transmission (true/false)_______
13>Following broad categories of service are being offered in wireless access technology
a: MMDS/WCS
b: LMDS
c: ISM
Ans: ___________ (a/b/c/all)
14>MMDS/WCS stands for___________
15>LMDS stands for___________
16>ISM stands for__________
17>___________operates over the 2500-2686 MHz band and includes both one-way wireless with telephony return
and two-way wireless implementations, it has a range of up to 35 miles (MMDS/WCS or LMDS or ISM)
18>___________operates over two frequency bands, it has a range of about 3miles (MMDS/WCS or LMDS or
ISM)
19>___________operates over two frequency bands , the lower band has a range of only 0.5 mile but the higher
band has a range of up to 15 miles (MMDS/WCS or LMDS or ISM)
20>___________technology is based on existing cable television technology (DSL/HFC)
21>The signal going from the head end to the customer premises is called ___________signal
(downstream/forward path/either)
22>The signal going from the customer premises to the head end is called___________ signal (upstream/reverse
path/either)
23>NIU stands for___________
24>NID stands for___________

63

NETWORK MANAGEMENT SYSTEMS


25>At the customer premises, ___________is the demarcation point between the customer network and service
provider network (NIU/NID/either)
26>The _________modem converts analog signal to Ethernet output (cable/telephone)
27>Match the following
Telephone modem ,28.8 kbps : approximately 1 second
ISDN ,4 kbps
: 6-8 minutes
cable mode, 10 Mbps
: 1-1.5 minutes
28>The HFC broadband system with ___can process data much faster than can a conventional____or____
(ISDN/telephone modem/cable modem)
29>HFC technology is based on
a: broadband LAN
b: asymmetric bandwidth allocation to achieve two way communication
c: radio frequency spread spectrum technique for carrying multiple signals over the HFC
d: radio frequency spectrum allocation to carry multimedia telephony , television and computer communication
services
Ans: ___________ (a/b/c/d/all)
30>In Broadband LAN architecture, the downstream signals are in the _____MHz band and the upstream signals
are in the______ MHz band (5-42/50/860)
31>In Broadband LAN architecture, the downstream bandwidth of a channel is ____MHz and the upstream
bandwidth varies from___ kHz to ____MHz (3.2/6/200)
32>___________modem modulates and demodulates the digital signal from the customer equipment to the radio
frequency signal carried on the cable (telephone/cable/either)
33>Following different modulation techniques support different capabilities in cable modem
a: ASK
b: FSK
c: PSL
Ans: ___________ (a/b/c/all)
34>In cable modem, the most commonly used modulation technique are___________ (QPSK/QAM/both)
35>_____is the number of bits per second traversing the medium .______is the number of signal units per second
(baud rate/bit rate)
36>_____equals ______times the number of bits per symbol (bit rate/baud rate)
37>In____ modulation, the four levels are represented by the four states 0, 90, 270 and 180 (QAM/QPSK)_______
38>Phase shift keying is limited by the difficulty of detecting small phase shifts (true/false)___________
39>___________is the preferred method of modulation for the downstream signal in the cable modem
(QPSK/QAM)
40>Match the following
Toshiba
: 40Mbps
RCA DCM105 : 38Mbps
Cisco
: 10Mbps
LANcity
: 5.36 Msym/sec
Motorola:
41>Cable modems with a downstream speed of___ Mbps and an upstream speed of ____Mbps are commonly
available now (10/30/40)____
42>______uses pseudotree topology (DSL/HFC)
43>MCNS stands for___________
44>DAVIS stands for___________
45>DOCSIS stands for___________
46>___________standard being developed by the MCNS is the industry standard for cable modem system
specification (DOCSIS/DAVIS)
47>Some cable modems are designed as one way, and the return path is via telephone link called___________
(telco return/telecom return)
48>CMTS stands for___________
49>All cable modems terminate at a server called ___________at the head end (LMDS/CMTS)
50>___________consists of multiple pairs of optical fibers connecting fiber nodes (DSL plant/HFC plant)
51>In an HFC network, the coaxial cable that connects to the NIU in the home is referred to as___________ in
CATV terminology (tap to cable/tap to TV)
52>The spectrum use in HFC extends only to____ MHz (750/860)_______
53>In Cable modem, the upstream signal is allocated the low end of the spectrum from___ to ___ MHz. The
downstream signal is allocated from___ to ___MHz (5/42/54/750)

64

NETWORK MANAGEMENT SYSTEMS


54>Using noisy conditions, the cable modem could dynamically switch to different downstream and upstream
channels to improve the quality of service. Such a feature is called_____ (phase agile capability/frequency agile
capability)
55>CMCI stands for___________
56>DOCS-OSSI stands for___________
57>CMTRI stands for___________
58>DOCSS stands for___________
59>RFI stands for___________
60>In data over cable system reference architecture, the head end is connected to WAN, and multiple head ends can
be connected via the WAN to a regional center head end. In such a case, the local head end is referred to
as___________ hub (centralized/distribution)
61>DOCSIS places interfaces into following categories
a: data interface
b: operations support system interfaces and telephony return interface
c: RF and security interfaces
Ans: ___________ (a/b/c/all)
62>Match the following
data interface
: RFI ,DOCSS
operations support system interfaces & telephony return interface : CMTRI ,DOCS-OSPG
RF & security interface
: CMCI, CMT-NSI CMTS
63>Management of an HFC system with cable modems is more complex than the management of
___________network (computer/telecommunication/either)
64>Management of ____network is involved with data layers. Management of _______network is involved with
physical layer (computer/telecommunication)
65>HFC management encompasses ___________management (data layer/physical layer/both)
66>Following functional area are identified in the management of BIDS
a: network maintenance
b: subscriber support
c: planning
Ans: ___________ (a/b/c/all)
67>BIDS stands for___________
68>At the physical layer, HFC access network management functions include
a: detection of errors and corrections of ingress noise interference
b: amplifier gains
c: signal levels at the cable modems
d: power supply voltages
Ans: ______ (a/b/c/d/all)
69>At the data link layer, HFC access network management functions include
a: traditional configuration management
b: fault management
c: performance management
Ans: ___________ (a/b/c/all)
70>Cable modem and CMTS can be managed with ___________management (SMTP/SNMP)
71>CMTS is also called___________ (trail end reference/head end reference)
72>DOCS stands for ___________
73>The HFC element management can be divided into following components
a: cable modem management
b: CMTS management
c: HFC link management
d: RF spectrum management
Ans: ___________ (a/b/c/d/all)
74>The DOCS interface objects group, docsIfMIBObjects, has following subgroups
a: base interface objects group
b: CM interface objects group
c: CMTS interface objects group
Ans: ___________ (a/b/c/all)
75>The baseline privacy objects group, docsBpiMIBObjects, has ____subgroups (7/8/9)_______
76>Match the following
docsBpiCmObjects
: baseline privacy CMTS multicast control group
docsBpiCmBaseTable
: baseline privacy CMTS authorization table
docsBpiCmTEKTable
: baseline privacy CMTS objects

65

NETWORK MANAGEMENT SYSTEMS


docsBpiCmtsObjects
: baseline privacy CM base and authorization table
docsBpiCmtsBaseTable : baseline privacy objects for CM
docsBpiCmtsAuthTable : baseline privacy traffic encryption key table
docsBpiCmtsTEKTable : baseline privacy CMTS base table
docsBpiMulticastcontrol : baseline privacy CMTS traffic encryption key table
77>Match the following
docsQosMIBObjects
: mapping of flows to service classes
docsQosIpPktClass-Table
: set of DOCSIS Qos flows active in the device
docsQosEthPktClass-Table : contains QOS table
docsQosServiceClassGroup : IP packet classification table containing class information on direction,
type, flow, source and destination
docsQosServiceClassTable : DOCSIS QOS extensions of MIB objects
docsQosFlowTable
: ethernet packet classification containing information similar to the IP packet
docsQosSidToClass-Table
: set of DOCSIS QOS service classes defined in the managed object
docsQosFlowToClassTable : mapping of service classes to SIDs
78>Match the following
docsDevMIBObjects
: CPE IP management and anti-spoofing group on cable modems
docsDevBase
: provides control and logging for event reporting
docsDevNmAccessTable : provides information for network downloadable software upgrades
docsDevSoftware
: extends MIB2 system group with objects needed for cable device system
management
docsDevServer
: Objects of the cable modem and CMTS device
docsDevEvnt
: defines the minimum level of SNMP access security
docsDevFilter
: provides information about the progress of the interaction with various
provisioning servers
docsDevCpe
: configures filter at link layer and IP layer for bridged data traffic
79>SMS stands for___________
80>____________deals with the management of RF spectrum allocations to different digital services both in the
downstream and upstream bands (MMS/SMS)
81>the main motivating factor for employing _____for access technology in multimedia service is the preexistence
of local loop facilities to most residences (HFC/DSL)______
82>HDSL stands for___________
83>ADSL stands for___________
84>VDSL stands for___________
85>___________operates at a T1 or E1 data rate in a duplex mode with two pairs of wires (ADSL/HDSL/VDSL)
86>SDSL stands for___________
87>The duplex mode is defined as___ way communication with the same speed in both direction
(one/two)________
88>___________is the same as the HDSL, except the two way duplex communication occurs ove a single twisted
pair (ADSL/SDSL/VDSL)
89>_____&______both operate asymmetrically (ADSL/SDSL/VDSL/HDSL)
90>_____signal has a larger bandwidth than ______signal (downstream/upstream)
91>The difference between ADSL and VDSL is that _______operates at higher data rates over shorter lines
than____ (VDSL/ADSL)
92>ATU stands for___________
93>ATU is also baked the________ modem (HDSL/ADSL)
94>POTS stands for___________
95>Development is in progress to eliminate the splitter at the customer site. This configuration is referred to
as___________ (ADSL lite/HDSL lite)
96>Following are the schemes for separating the upstream and downstream frequency bands: ___________
(FDM/echo cancellation/both)
97>In___________, after the upstream and downstream bands have been separated, each band is divided into one
or more high speed channels and one or more low speed channels (FDM/echo cancellation)
98>DSLAM stands for___________
99>ONU stands for___________
100>CEBus Stands for___________
101>PDN stands for__________
102>SOHO stands for__________
103>PSTN stands for__________
104>Real time signals such as audio and real time video, use a fast buffering scheme and hence are referred to
as__________ (fast channel/interleaved channel)

66

NETWORK MANAGEMENT SYSTEMS


105>Digital data that can tolerate delay make use of slow buffers and are interleaved between fast signals. The
digital data channel is referred to as__________ (fast channel/interleaved channel)
106>ADSL management is __________the line encoding scheme used (dependent on/independent of)
107>CAP stands for __________
108>DMT stands for__________
109>The echoing phenomenon occurs in telephone systems because of crosstalk between neighboring pairs of wires
in a bundle (true/false)__________
110>Two signals transmitted from a central office can couple with each other, which is referred to as__________
crosstalk (near end/far end)
111>Two signals traversing in opposite directions can interfere with each other, which is referred to as__________
crosstalk (near end/far end)
112>Near end and far end crosstalk can be mitigated by using __________technique (FDM/echo cancellation)
113>In__________, the entire loop bandwidth is used in the encoding (DMT/CAP)
114>in__________, the entire bandwidth of approximately 1.1 MHz Is split into 256 subchannels, each of an
approximately 4 kHz band (DMT/CAP)
115>In DMT, the number of downstream subchannels is either____ if echo cancellation is used or ______if echo
cancellation is not used (218/250)_
116>Management of the ADSL network involves following network elements
a: management communications protocol across the network management subinterface of the V interface
b: management communications protocol across the U interfaces between ATU-C and ATU-R
c: parameters and operations with the ATU-C
d: parameters and operations within the ATU-R
e: ATU-R side of the T interface
Ans: __________ (a/b/c/d/e/all)
117>In ADSL network management elements, the management function at the physical layer involves following
entities
a: physical channel
b: fast channel
c: interleaved channel
Ans: __________ (a/b/c/all)
118>Match the following
ADSL line type
: time interval to downshift
ADSL line coding
: time interval to upshift
Target noise margin
: mode1- manual, mode2- select at start up, mode3- dynamic
Maximum noise margin
: modem reduces power above this threshold
Minimum noise margin
: ADSL coding type
Rate adaptation mode
: five types-no channel, fast, interleaved, either or both
Upshift noise margin
: noise margin under steady state
Minimum time interval for upshift rate adaptation : modem increase power below this margin
Downshift noise margin
: threshold for modem increases data rate
Minimum time interval for downshift rate adaptation : threshold for modem decrease data rate
119>Match the following
Desired maximum rate
: vendor specific serial number
Desired minimum rate
: vendor specific version
Rate adaptation ratio
: vendor ID assigned by T1E1.4
Maximum interleave delay : Rate down change alarm
Alarm thresholds
: rate up change alarm
Rate up threshold
: 15min count threshold on loss of signal, frame, poser, and error seconds
Rate down threshold
: distribution ratio between fast & interleaved channels for available excess bit rate
Vendor ID
: maximum transmission delay allowed by interleaving process
Version number
: minimum rates for ATU-C/R
Serial number
: maximum rates for ATU-C/R
120>Match the following
ADSL line status
: initialization failure of ATU-R from ATU-C
Alarms thresholds
: event generation upon rate changes when shift margis are crossed in both
upstream and downstream
unable to initialize ATU-R : indicates operational status and various types of failures of the link
rate change
: generates alarms on failures or crossing of thresholds
121>Match the following
line attenuation
: 15 min/1 day failure statistics

67

NETWORK MANAGEMENT SYSTEMS


noise margin
: transmit delay introduced by the interleaving process
total output power
: rate of modem before the last change
maximum attainable rate : data block on which the CRC check is done
current rate
: current transmit rate to which the modem is adopted
previous rate
: maximum currently attainable data rate by modem
channel data block length : total output power from the modem
interleave delay
: measured power loss in dB from transmitter to receives ATU
Statistics
: noise margin in dB of the ATU with respect to received signal
122>The ADSL forum has proposed integrating ADSL MIB with the standard IETF interaces group MIB2
interfaces, ifMIB, and transmission in the following manner
a: adslPhysIf: : {transmission 94}
b: adslIterIf: : ={transmission 124}
c: adslFastIf: : ={transmission 125}
Ans: __________ (a/b/c/all)
123>LCS stands for__________
124>___________access technology is primarily focused on bringing multimedia services to residence
(narrowband/broadband)
125>___________carrier information from the head end to the customer premises via fiber optic and coaxial cables
(DSL/HFC)
ANSWERS
1>all
2>Multiple Systems Operators
3>Hybrid Fiber Coaxial
4>both
5>HFC
6>DSL
7>all
8>all
9>HFC
10>one
11>two
12>T
13>all
14>Multi-channel multipoint distribution service/Wireless communication services
15>Local Multipoint Distribution Service
16>Instructional scientific & medical
17>MMDS/WCS
18>LMDS
19>ISM
20>HFC
21>either
22>either
23>Network Interface Unit
24>Network Interface Device
25>NID
26>cable modem
27>1-b 2-c 3-a
28>cable modem, telephone modem, ISDN
29>all
30>50-860,5-42
31>6,200,3.2
32>cable
33>all
34>both
35>bit rate, baud rate
36>bit rate, baud rate
37>QPSK
38>T
39>QAM
40>1-d 2-b 3-b 4-c 5-a

68

NETWORK MANAGEMENT SYSTEMS


41>40,10
42>HFC
43>Multimedia Cable Network System
44>Digital Audio/Video Interoperability Council
45>Digital Over Cable Service Interface Specifications
46>DOCSIS
47>telco return
48>Cable Modem Termination System
49>CMTS
50>HFC
51>tap to TV
52>860
53>5-42,54-750
54>frequency agile capability
55>Cable Modem to CPE Interface
56>Data Over Cable Service Operations Support System Interface
57>Cable Modem to Telco Return Interface
58>Data Over Cable Security System
59>Cable Modem to RF Interface
60>distribution
61>all
62>1-c 2-b 3-a
63>either
64>computer communication, telecommunication
65>both
66>all
67>Broadband Interactive Data Services
68>all
69>all
70>SNMP
71>head end reference
72>Data Over Cable System
73>all
74>all
75>3
76>1-e 2-d 3-f 4-c 5-g 6-d 7-h 8-a
77>1-e 2-d 3-f 4-c 5-g 6-b 7-h 8-a
78>1-e 2-d 3-f 4-c 5-g 6-b 7-h 8-a
79>Spectrum Management System
80>SMS
81>DSL
82>High Data Rate Digital Subscriber Line
83>Asymmetric Digital Subscriber Line
84>Very high data rate Digital Subscriber Line
85>HDSL
86>Single line Digital Subscriber Line
87>two
88>SDSL
89>ADSL, VDSL
90>downstream, upstream
91>VDSL, ADSL
92>ADSL Transmission Unit
93>ADSL
94>Plain Old Telephone Service
95>ADSL Lite
96>both
97>FDM
98>Digital Subscriber Line Access Multiplexer
99>Optical Network Unit
100>Consumer Electronics Bus
101>Premises Distribution Network
102>Small Office Home Office

69

NETWORK MANAGEMENT SYSTEMS


103>Public Switched Telephone Network
104>fast channel
105>interleaved channel
106>dependent on
107>Carrierless Amplitude Modulation
108>Discrete Multi-tone
109>T
110>near end
111>far end
112>echo cancellation
113>CAP
114>DMT
115>250,218
116>all
117>all
118>1-f 2-e 3-g 4-d 5-h 6-c 7-i 8-b 9-j 10-a
119>1-j 2-i 3-g 4-h 5-f 6-e 7-d 8-c 9-b 10-a
120>1-c 2-d 3-a 4-b
121>1-h 2-i 3-g 4-f 5-e 6-c 7-d 8-b 9-a
122>all
123>Line Code Specific
124>broadband
125>HFC

70

NETWORK MANAGEMENT SYSTEMS

CHAPTER 13: NETWORK MANAGEMENT APPLICATIONS


1>The management of networked information services involves __________ resources (system/network/both)
2>OSI defines network management as___ layer architecture (5/6/7)
3>In OSI network management, at the highest level is __________management that deals with the functions
associated with managing an enterprise (service/business)
4>In OSI, __________level deals with network management or system management (third/fourth)
5>In OSI, network management aggregates and correlates data from network element management activities at
__________level (third/fourth)
6>Network management applications include
a: configuration management
b: fault management
c: performance management
d: security management
e: accounting management
Ans: ___________ (a/b/c/d/d/all)
7>___________management involves detecting a fault as it occurs in the network and subsequently locating its
source (security/fault)
8>___________security is concerned with preventing illegal access to information by unauthorized personnel
(system/network)
9>The business health of an enterprise depends on well maintained ___________management
(accounting/performance)
10>In OSI, _____management at the third level and ______management at the fourth level of the hierarchy are
based on both technical considerations and policy decisions (network/business/service)
11>___________management in network management is normally used in the context of discovering network
topology, mapping the network and setting up configuration parameters in management agents and management
systems (configuration/performance)
12>Network provisioning is considered to be part of __________management (configuration/performance)
13>Network provisioning is also called ___________provisioning in the telephone industry (circuit/connection)
14>______is a circuit from the originating switching center to the destination switching center (trunk/trace)
15>In network provisioning, planning and inventory systems are integrated with design systems to build an overall
system referred to as___________ (service of systems/system of systems)
16>TIRKS stands for__________
17>TMN stands for___________
18>___________is used in the automated circuit provisioning of trunks, which are logical circuits between
switching offices and traverse many facilities (TIRKS/TMN)
19>In___________ packet switched circuit, each packet takes an independent path and the switching of each packet
by the routers at various nodes is based on the load in the links (connection-oriented/connectionless)
20>In___________ communication, excess packets can be stored in buffers in routers or retransmitted in the event
that packets are lost or discarded (stop&wait/store&forward)
21>In___________ circuit communication, permanent and switched virtual circuit demands need to be
accommodated for end-to-end demands on the various links (connection-oriented/connectionless)
22>Provisioning of the links is based on
a: average demands
b: peak demands
c: performance statistics
d: quality of service requirements
Ans: ___________ (a/b/c/d/all)
23>Network provisioning for packet switched network is based on
a: average demands
b: peak demands
c: performance statistics
d: quality of service requirements
Ans: ___________ (a/b/c/d/all)
24>Fault management involves following processes
a: fault detection
b: fault location
c: service restoration

71

NETWORK MANAGEMENT SYSTEMS


d: identification of problem's root cause
e: problem resolution
Ans: ___________ (a/b/c/d/e/all)
25>Fault detection is accomplished by using
a: polling scheme
b: generation of traps
Ans: ___________ (a/b/either)
26>One of the advantages of_____ over ______is that failure detection is accomplished faster with less traffic
overhead (traps/polling)
27>The ideal solution to locating and isolating the fault is to have___________ solution (artificial intelligence/agile
intelligence)
28>___________is a system tool used to measure traffic monitoring on Ethernet LANs (Protocol sniffer/protocol
analyzer)
29>___________management involves data monitoring, problem isolation, performance tuning, analysis of
statistical data for recognizing trends, and resource planning (fault/performance
30>The parameters that can be attributed to defining network performance on a global level are
a: throughput
b: response time
c: network availability
d: network reliability
Ans: ___________ (a/b/c/d/al)
31>The response time of a network depends on___________ performance (network/system/both)
32>The application responsiveness on the network, more than any other measure, reflects whether the network is
meeting the end users' expectations and requirements (true/false)___________
33>Following are different types of metrics to measure application responsiveness
a: application availability
b: response time between user and server
c: burst frame rate is the rate at which the requested data arrives at the user station
Ans: ___________ (a/b/c/all)
34>RFC=____defines the architecture for the measurement and reporting of network traffic flows (2063/2036)
35>The network is characterized as traffic passing through following representative levels
a: backbone networks
b: regional network
c: stub/enterprise
d: end systems or hosts
Ans: ___________ (a/b/c/d/all)
36>The architecture defines following entities for traffic flow measurements
a: meters
b: meter readers
c: managers
Ans: ___________ (a/b/c/all)
37>Data monitoring i the network for abnormal performance behavior are detected by___________ messages
generated by RMON probes (poll/trap)
38>___________are used in tuning a network, validating a service level agreement (problem isolation/performance
statistics)
39>SLA stands for___________
40>The variation in network delay is known as___________ (wander/jitter)
41>When a centralized network management system receives a trap or a notification , it is called___________
(sending an event/receiving an event)
42>The method used by management system to correlate all the events and to isolate the root cause of the problem
is called ___________techniques (receiving an event/event correlation)
43>Several correlation techniques are used to isolate and localize fault in networks. All are based on
a: detecting and filtering of events
b: correlating observed events to isolate and localize the fault either topologically or functionality
c: identifying the cause of the problem
Ans: ___________ (a/b/c/all)
44>Following are different approaches to correction techniques
a: rule based reasoning
b: model based reasoning
c: case based reasoning
d: codebook
e: state transition graph model
f: finite state machine model
Ans: ___________ (a/b/c/d/e/f/all)

72

NETWORK MANAGEMENT SYSTEMS


45>Rule based reasoning is also known as___________ (rule based expert system/expert system, production system
and blackboard system/all)
46>RBR stands for___________
47>In RBR, following levels represent the different components
a: data level
b: control level
c: knowledge level
Ans: ___________ (a/b/c/all)
48>In RBR, the knowledge base contains expert knowledg as to
a: definition of a problem in the network
b: action that needs to be taken if a particular condition occurs
Ans: ___________ (a/b/both)
49>In RBR, the knowledge base information is rule-based in the form of___________ (if then/condition
action/either)
50>If the antecedent and action in the rule do not match, the paradigm breaks and it is called___________
(breakdown/brittle)
51>If the antecedent and action in the rule do not match, the paradigm. However, it can be fixed by adding more
rules, but doing so increases the database size and degrades performance called___________ (knowledge acquire
bottleneck/knowledge acquisition bottleneck)
52>In___________ based reasoning, an event correlator is built on an object oriented model associated with each
managed object (rule/model/case)
53>CBR stands for___________
54>In_____, the unit of knowledge is a rule whereas in______, the unit of knowledge is a case (case/rule/model)
55>The intuition of___________ based reasoning is that situations repeat themselves in the real world and that
what was done in one situation is applicable to others in a similar, but not necessarily identical, situation
(rule/case/model)
56>___________approach uses knowledge gained previously and extends it to the current situation (rule/case)
57>In CBR, the current trouble is resolved by adapting the previous case in one of following ways
a: parameterized adaptation
b: abstraction/respecialization adaptation
c: critic based adaptation
Ans: ___________ (a/b/c/all)
58>___________adaptation is used when a similar case exists in the case library, but the parameters may have to be
scaled to resolve the current situation (critic/abstraction/parameterized)
59>In___________ based adaptation, a critic or craft person decides to add, remove, reorder or replace an existing
solution (critic/abstraction/parameterized)
60>The core modules of CRITTER as
a: input
b: retrieve
c: adapt
d: process
Ans: ___________ (a/b/c/d/all)
61>The CRITTER application has evolved into a CBR application for network management named___________
(Spectrum/SpectroRx)
62>In_____, the retrieval is based on an exact match whereas in______, the retrieval is based on a partial match
(RBR/CBR)
63>_____is applied to an iterative cycle of micro-events, but ______is applied as a total solution to the trouble and
then adapted to the current situation (RBR/CBR)
64>In___________ model, problem events are viewed as messages generated by a system and encoded in sets of
alarms that they cause (state transition graph/codebook correlation/finite state machine)
65>SMARTS stands for___________
66>___________model is used in Seagate's NerveCenter correlation system (state transition graph/codebook
correlation)
67>The main feature of___________ model is that it is a passive testing system based on the assumption that an
observer agent is present in each node and reports abnormalities to a central point (state transition graph/codebook
correlation/finite state machine)
68>The main difference between finite state machine and state transition graph model is that former is____ system
and that the latter is _______system (active/passive)
69>Security management is ___________consideration in information management (technical/administrative/both)
70>Following are different types of security threats to network management
a: modification of information
b: masquerade
c: message stream modification
d: disclosure

73

NETWORK MANAGEMENT SYSTEMS


Ans: ___________ (a/b/c/d/all)
71>The SNMPv___ security subsystem is the USM (1/2/3)
72>USM stands for___________
73>USM has following modules: ___________ (authentication/privacy/both)
74>_____addresses data integrity and data origin .______is concerned with data confidentiality, message timeliness
and limited message protection (authentication/privacy)
75>An enterprise's policy should address both access and security breaches (true/false)___________
76>The IETF workgroup that generated RFC=____defines a security policy as "a formal statement of the rules by
which people who are given access to an organizations technology and information assents must abide"
(2169/2196)
77>NCSC stands for___________
78>NCSC has published what is known as ___________book, which contains a rating scheme for computers and is
a framework for setting security policies and procedures (red/orange/blue)
79>A basic guide for setting up policies and procedures includes the following
a: identify what you are trying to protect
b: determine what you are trying to protect it from
c: determine how likely the threats are
d: implement measures that will protect your assets in a cost-effective manner
e: review the process continuously and make improvements if weaknesses are found
Ans: ___________ (a/b/c/d/e/all)
80>____________is used to screen traffic going in and out of the secure network (firewall/filter)
81>The main purpose of ___________is to protect a network from external attacks (firewall/filter)
82>Firewall can be implemented in a router, gateway or special host (true/false)___________
83>Following are benefits of implementing a firewall to a network
a: it reduces the risk of access to hosts from an external network by filtering insecure services
b: it can provide controlled access to the network so that only specified hosts or network segments can access some
hosts
c: it reduces the annoyance to internal users while controlling the external users
Ans: ___________ (a/b/c/all)
84>___________is based on protocol specific criteria (packet filtering/application gateway)
85>___________is done at the OSI data link, network and transport layers (packet filtering/application gateway)
86>Packet filters are implemented in some commercial routers called___________ (screening routers/packet
filtering routers/either)
87>Packet filtering is done on the following parameters
a: source &destination IP address
b: source &destination TCP/UDP port
Ans: ___________ (a/b/both)
88>Testing and debugging are difficult in___________ (packet filtering/application gateway)
89>___________makes sure that information has not been tampered with as it mves between source and
destination.__________ verifies originator identification (integrity protection/authentication validation)
90>___________means secret writing (cryptanalysis/cryptography)
91>___________deals with techniques of transmitting information from a sender to a receiver w/o any intermediary
being able to decipher it (cryptanalysis/cryptography)
92>In__________ cipher, each letter is replaced with another letter, which is three letters latter in the alphabet
(monoalphabetic/caesar)
93>In___________ cipher, each letter is replaced uniquely with another letter that is randomly chosen
(polyalphabetic/monoalphabetic)
94>DES uses___ bit key and IDEA uses ____bit key (56/64/128)
95>______is designed for efficient hardware implementation and consequently performs poorly if implemented in
software. In contrast, _____functions efficiently in software implementations (IDEA/DES)
96>In____ key cryptography, each pair of users must have a secret key (public/private)
97>In___________ cryptography, the same key is use for encryption and decryption (secret/public)
98>The secret key cryptography is ___________ (symmetric/asymmetric)
99>The Diffie Hellman algorithm is the oldest___________ key algorithm (secret/public)
100>RSA is___________ efficient than either of the secret key algorithms, DES or IDEA (less/more)
101>__________involves calculating a checksum based on the data in the frame or packet at the sending end and
transmitting it along with the data (MD5/CRC)
102>__________takes as input a message of arbitrary length producing output consisting of a 128 bit message
digest of the input (SHS/MD5 utility)
103>__________can handle a maximum message length of 2^64 bits (SHS/MD5)
104>_____produces a 160 bit output whereas _____output is 128 bits long (SHS/MD5)
105>Following are features of message digest

74

NETWORK MANAGEMENT SYSTEMS


a: there is a one-to-one relationship between the input and output messages
b: output digest is of constant length for a given algorithm with chosen parameters, irrespective of the input
message length
c: generation of a message digest is a one way function
Ans: __________ (a/b/c/all)
106>The digital signature is the reverse of __________key cryptography (secret/public)
107>_____is verification of the user's identification, and _____is the granting of access of the information
(authorization/authentication)
108>Following are different types client/server environments and the implementation of authentication in each
a: host/user environment
b: ticket-granting system
c: authentication server system
d: authentication using a cryptographic function
Ans: __________ (a/b/c/d/all)
109>Kerberos consists of an authentication server and a ticket granting server (true/false)__________
110>Following are different secure mail systems
a: PEM
b: PGP
c: X.400 based mail system
Ans: __________ (a/b/c/all)
111>PEM stands for__________
112>PEM services include
a: confidentiality
b: authentication
c: message integrity assurance
d: non-repudiation of origin
Ans: __________ (a/b/c/d/all)
113>Following are PEM processes based on message integrity and encryption
a: MIC-CLEAR
b: MIC-ONLY
c: ENCRYPTED
Ans: __________ (a/b/c/all)
114>In PEM, the specification provides following types of keys__________ (DEK/IK/both)
115>DEK stands for___________
116>__________is a secure mail package developed by Phil Zimmerman that is available in the public domain
(PGP/PEM)
117>IDEA i ________efficient than RSA (less/more)
118>PGP is similar to__________ PEM (ENCRYPTED/DECRYPTED)
119>The main difference between PGP & PEM is how the _______key is administered (secret/public)
120>__________are programs that, when executed, cause harm by making copies and inserting them into other
programs (worms/viruses)
121>Accounting management is probably the__________ developed network management application (most/least)
122>Reports can be classified into
a: planning and management reports
b: system reports
c: user reports
Ans: __________ (a/b/c/all)
123>__________reports keep upper-level management apprised of the status of network and system operations
(planning-management/system/user)
124>Match the following
Qos/service level agreement : function , use, personnel
traffic trends
: current status, technology needs projection
technology trends
: network &system availability, problem reports, service response
cost of operations
: traffic patterns , analysis of internal &external traffic volume
125>Match the following
Traffic
: network/servers, applications
Failures
: traffic load internal & external
Performance : network & system failures
126>The engineering and operations functions require _________oriented reports (application/operation)
127>Service level management is defined as the process of
a: identifying services and characteristics associated with them

75

NETWORK MANAGEMENT SYSTEMS


b: negotiating a service level agreement
c: deploying agents to monitor and control network , system and application component performance
d: producing service level reports___________
128>OMG stands for__________
129>SLA stands for___________
130>_________is a contract between the service provider and the customer, specifying the services to be provided
and the quality of those services that the service provider promises to meet (SLA/SHS)
131>The objective of___________ management is to ensure customer satisfaction by meeting or exceeding the
commitments made in the SLA and to guide policy management (service/configuration/performance)
132>Following are different categories of OSI application functions
a: configuration
b: fault
c: performance
d: security
e: accounting
Ans: ___________ (a/b/c/d/e/all)
133>__________management involves setting & resetting the parameters of network components, and network
provisioning & inventory management (configuration/performance)
134>Fault detection consists of__________ (fault detection/fault isolation/both)
135>Following are different classes of management of info service reports__________ (planning&
management/system/user/all)
ANSWERS
1>both
2>5
3>business
4>third
5>fourth
6>all
7>fault
8>network
9>accounting
10>network, service
11>configuration
12>configuration
13>circuit
14>trunk
15>system of system
16>Trunk Integrated Record Keeping System
17>Telecommunications Management Network
18>TIRKS
19>connectionless
20>store&forward
21>connection oriented
22>all
23>all
24>all
25>either
26>traps, polling
27>artificial intelligence
28>protocol analyzer
29>performance
30>all
31>both
32>T
33>all
34>2063
35>all
36>all
37>trap
38>performance statistics
39>Service Level Agreement

76

NETWORK MANAGEMENT SYSTEMS


40>jitter
41>receiving an event
42>event correlation
43>all
44>all
45>all
46>Rule Based Reasoning
47>all
48>all
49>either
50>brittle
51>knowledge acquisition bottleneck
52>model
53>Case Based Reasoning
54>RBR,CBR
55>case
56>CBR
57>all
58>parameterized adaptation
59>critic
60>all
61>SpectroRx
62>RBR,CBR
63>RBR,CBR
64>codebook correlation
65>System Management ARTS
66>state transition graph
67>finite state machine
68>passive, active
69>both
70>all
71>3
72>User Based Security Model
73>both
74>authentication module, privacy module
75>T
76>2196
77>National Computer Security Center
78>Orange
79>all
80>firewall
81>firewall
82>T
83>all
84>packet filtering
85>packet filtering
86>either
87>both
88>packet filtering
89>integrity protection, authentication validation
90>cryptography
91>cryptography
92>caesar
93>mono-alphabetic
94>56,128
95>DES, IDEA
96>private
97>secret
98>symmetric
99>public
100>less
101>CRC

77

NETWORK MANAGEMENT SYSTEMS


102>MD2 utility
103>SHS
104>SHS,MD5
105>all
106>public
107>authentication, authorization
108>all
109>T
110>all
111>Privacy Enhanced Mail
112>all
113>all
114>both
115>Data Encrypting Key
116>PGP
117>more
118>ENCRYPTED
119>public
120>virus
121>least
122>all
123>planning & management
124>1-c 2-d 3-b 4-a
125>1-b 2-c 3-a
126>operation
127>all
128>Object Modeling Group
129>Service Level Agreement
130>SLA
131>service
132>all
133>configuration
134>both
135>all

78

Você também pode gostar