1. Which of the following does SNMP use to hold information collected about the network?
• network management station
• network management database
• management information base
• database information agent
2. Which of the following describes the community strings used for SNMPv1 and SNMPv2c? (Choose two.)
• The community strings are sent using UDP.
• The read only string on most devices is set to private.
• The read/write string on most devices is set to public.
• Only the NMA needs to be configured with the community strings.
• The community strings are sent across the network in cleartext.
3. Which command would enable logging on all supported destinations?
• Router(config)# logging 131.152.0.0
• Router(config)# logging routerA
• Router(config)# logging on
• Router(config)# logging enable
4. Which statements describe the Windows 2000 operating system family? (Choose three.)
• .NET Server was designed to run enterprise level web and FTP services.
• Active Directory services run on both Windows 2000 Professional and Windows 2000 Server.
• The entire family of Windows 2000 operating systems can operate as a file, print, FTP or web server.
• Both Windows 2000 Professional and Server can support up to 256 simultaneous dialup sessions.
• .NET server was designed to compete with Linux and Unix.
5. Which statements are true regarding configuring SNMP? (Choose three.)
• It is best to use the default read-only community strings in enterprise networks.
• It is not advisable to use the default read-write community string in an enterprise network.
• More than one read-only community string is supported.
• Authorized management stations can modify MIB objects with read-write access specified.
• The maximum number of read-write strings supported is one.
6. How does RMON gather statistics on a segment?
• analyzes traps on the segment
• polls packets on the segment
• analyzes every frame on the segment
• analyzes source and destination addresses
7. An SNMPv1 agent would issue a GetResponse message to reply to which NMS requests? (Choose three.)
• GetRequest
• GetBulkRequest
• GetNextRequest
• SetRequest
• GetNextbulkRequest
8. Which means of communication does an SNMP network agent use to provide a network management station with important but unsolicited information?
• query
• broadcast
• ICMP ping
• trap
• poll
9. Which of the following is a collection of software which includes a GUI interface to allow the network administrator to monitor and manage the network?
• network management application
• network management agent
• management information base
• network management protocol
10. In the above illustration, which configuration commands can be used to specify the location of a managed device and the main system contacts for the device? (Choose two.)
• SanJose(config-if)# snmp-server SanJose
• Atlanta(config)# snmp-server contact JPSmith
• Atlanta(config)# snmp contact JPSmith
• SanJose(config)# snmp-server location SanJose
• Chicago#(config)# snmp chicago
11. How does SNMPv3 address the security shortcomings of SNMPv1 and SNMPv2c?
• improved SMI features
• support for centralized and distributed management
• secure access to MIBs
• control of heterogeneous networks
12. Which operating systems support multiuser capability? (Choose three.)
• Linux
• Windows 98
• Windows ME
• Windows XP
• Windows 2000
13. For which platform was UNIX first marketed commercially?
• workstations and servers
• workstations
• network servers
• large mainframe systems
14. Which of the following are examples of network management applications? (Choose two.)
• Windows 2000 Professional
• Ciscoworks2000
• HP Openview
• Red Hat Linux
• Cisco ConfigMaker
15. Why are SNMPv1 and SNMPv2c community strings considered a security risk?
• SNMPv1 and SNMPv2c encapsulations are not encrypted by default.
• SNMPv1 and SNMPv2c community strings are sent as cleartext.
• SNMPv1 and SNMPv2c are limited to 32-bit counters.
• SNMPv1 and SNMPv2c uses a connectionless protocol.
16. Which features are supported by the Mac OS X system that make it a competitive choice for operating systems? (Choose four.)
• protected memory
• sixty-two bit addressing
• preemptive multitasking
• open source operating system code
• symmetric multiprocessing
• Appletalk-to-Windows network connectivity
No comments :
Post a Comment