NM Q1-Q3 Compilation
Terms in this set (156)
A monitoring system components that generates summaries and statistical analysis of management
A monitoring system components that gathers and records management information for one or more
network elements and delivers the information to the monitor
The average number of packets transmitted per unit time is an example of
Forest-to-forest ________________ can be created between Windows Server 2003 forests only (ie not
between Windows 2000 forests).
It will also be used to set up a Domain Controller on Windows Server 2008. Exclude extension filename.
To change the computer name of the workstations or Clients running Windows 7, you need to access
the _______________ where Computer Name tab is available
It is a secure communication paths that allow security principals in one domain to be authenticated and accepted in other domains.
The percentage of time that no errors in the transmission and delivery of information took place.
Throughput and utilization is an example of
It is concerned with observing and analyzing the status and behavior of the end systems, intermediate
systems, and subnetworks that make up the network to be managed
A NM functional requirements where manager should be able to determine the capacity utilization,
throughput, the average and worst-case response times
The Directory Services _______ Administrator password/account is different from the domain Administrator account. This password is used when the administrator intentionally want to uninstall the AD DS Server role on the Windows Server.
Which layer handles the formatting of application data so that it will be readable by the destination system?
A request-response interaction between a manager and agent
A NM functional requirement dealing with keeping track of usage for charging
It is used to organize resources to reflect administrative divisions and may not map to organizational structure. It is also used to delegate administrative authority.
Encryption takes place at which layer?
User Presentation Software
A NM software architecture that provides interface between user and NM.
A monitoring system components that gathers and records management information for one or more network elements and delivers the information to the monitor
A NM user requirement where there were continued growth of devices, users, applications & protocols
The actual gathering of statistics about network traffic & timing
Error detection and recovery takes place at which layer?
Which of the following is not part of configuration management
It pertains to one or more domains that share a common schema, common configuration, automatic transitive trust relationships, and common global catalog.
All of the following are examples of fault monitoring functions except
The number and identification of ports on a router is considered as
Monitoring method where information flow is initiated from the agent to manager
• Active Directory Domains and Trusts
• Active Directory Sites and Services
• Active Directory Users and Computers
• ADSI Edit
• Group Policy Management
After configuring Windows Server to become domain controller, the system needs to be restarted for
the changes to take effect. Once the system is booted and you logged on to it, you click Start >
Administrative Tools, which of the following tools have been added?
Officially, an _____________ is a proposed standard. In reality, it is a de facto standard. Use acronym. Availability, response time, and accuracy are performance measurement of
802 Reference Model
ISO: OSI Reference Model - IEEE: _________ Model
A monitoring system components that performs the basic monitoring function of retrieving information
Routers operate at which layer of the OSI model?
TCP and UDP
Which of the following are transport layer protocols?
Network Management Entity
It is typically known as an "management agent"
A NM user requirement where more users and applications depend on availability
It is a logical partition in Active Directory database, a collections of users, computers, groups, and units of replication.
A security requirements that makes information accessible to only authorized users
A NM functional requirement that is concern with ensuring that the systems as a whole, and each essential component individually, are in proper working order
Synthetic Traffic Generation
Performance monitoring function that permits the network to be observed under a controlled load
Active Directory Domain Services
Configuring Windows Server 2008 to become a domain server, AD DS is being configured. What is the
acronym for AD DS? Use uppercase for the first letter of the word.
Network Management __________________ is a tradeoff between cost and benefit.
An organization that defines the network management categories Fault, Configurations, Accounting, Performance, and Security. Use acronym.
Flow control takes place at which layer?
Change of state, transmission/reception of packets is considered as
Network Management System
A collection of tools for network monitoring and control
Management Information Base
The data structure of the management agent is
All of the above
Which of the following are benefits of using a layered network model?
Domain Partition Information
Domain controllers do not replicate domain ________________ for other domains.
Which layer establishes, maintains, and terminates communications between applications located on
Data Center Architecture
A cisco network model where employees, partners, and customers rely on resources in the data center to effectively create, collaborate, and interact.
A ASN.1 lexical convention that begin with two hyphens ("--") and terminated either by another set ("--") or the end of line character
Logic Network Design
The object on needs analysis, which describes what network elements will be needed to meet the organization's needs.
Request for Proposal
Which of the following is not part of the group?
A ASN.1 lexical convention that may begin with a letter, and may contain letters, digits, and hyphens, but may not end with a hyphen or contain two consecutive hyphens
Request for Proposal
It creates a competitive environment for providing network equipment and services.
The sequence of octets used to represent a data value
ASN.1 simple types which is define as the set of values associated with information objects allocated by the standard
A cisco network model module that allows businesses to extend the applications and services found at the campus to thousands of remote locations and users or to a small group of branches.
Wiring Standards that where this facility may also contain campus-wide backbone connections.
Set of Network Maps
The key deliverable for the needs assessment stage is
An RFP considerations which includes implementation time plan; training courses and materials; support services; reliability and performance guarantees.
A named set of values -- may be simple or structured Encoding
An RFP checklists that includes › Choice sets of possible network designs; Mandatory, desirable, and wish list items, Security and control requirements; Response time requirements; Guidelines for proposing new network designs
It is defined as a machine independent data description language
Request for Proposal
It creates a creative environment for providing network equipment and services
The basic building block of an ASN.1 specification
Costs to consider in network design includes the following except`
A cisco network design module that recommends that connections from home using broadband services such as cable modem or DSL connect to the Internet and from there to the corporate network.
ASN.1 data type that has a collection of one or more types
It can be used to extend the syntax of ASN.1 to define new types and values
It means estimating the size and type of the "standard" and "advanced" network circuits for each type of network.
A ASN.1 lexical convention that must start with an uppercase letter
ASN.1 data types derived from other data types
It describes how data are actually represented in terms of bit patterns while in transit
Wiring standards that runs up through the floors of the building (risers) or across a campus and provides the interconnection for equipment rooms and telecommunication closets
Network Design Tools
Which of the following is not part of the Needs Analysis?
Which of the following is not part of the Cost Assessment deliverables?
ASN.1 structured types lists of alternatives
It specifies the mapping from one syntax to another
Wiring standards that is also known as the Main Distribution Facility
Wiring standards that provides a termination point for backbone cabling that is connected to one or more telecommunication closets.
Wiring standards that is also known as the Intermediate Distribution Facility (IDF)
Cisco Enterprise Architecture
It is designed to provide network planners with a roadmap for network growth as the business moves through different stages
ASN.1 structured data types which is collection of a large number of variables of the same type and whose order is significant
A lexical convention where letters should be typed-in in uppercase
A network design parameter where the number and type of users that will generate network traffic may need to be reassessed.
ASN.1 data type that is atomic types and with no components
Traditional Network Design
A network design including only network analysis phase and implementation phase.
It is widely used in defining transfer syntaxes
A network design technique where the designers must review the applications currently used on the network and identify their location so they can be connected to the planned network
Network design parameter where › network requirements should be organized into mandatory requirements, desirable requirements, and wish list requirements.
A cisco model that pertains to modulethat offers connectivity to voice, video, and data services outside the enterprise.
It describes the generic structure of data
Widely used in defining transfer syntaxes
A ASN.1 lexical convention that must start with a lowercase letter
ASN.1 structured types where there is an ordered collection of zero or more occurrences of a given type
Which of the following is not part of the Building Block Approach to network design?
The following are being considered in Geographi scope of the netwok design except
An RFP checklists that includes Choice sets of possible network designs; Mandatory, desirable, and wish list items, Security and control requirements; Response time requirements; Guidelines for proposing new network designs
Generated from a macro definition by substituting values for variables
Network Dependent Protocols
A Protocol that is directly connected to the internetwork in the SNMP Protocol Architecture
ASN.1 Object Identifiers
These are organized in a hierarchical tree structure to make it possible to give any object a unique global identifier
It provides a set of formal rules for describing the structure of objects
Internet Engineering Task Force
An organization that is responsible for SNMP standardization
An interim solution
Enhanced version of SGMP
A document that is retired
A document that is replaced by an updated version
Describes how the managed objects (MOs) can be defined in the MIB, data types and values MOs can have and how MOs are named
Defines the general framework for defining SNMP MIBs
The actual values of management information in a system
The union of all MO definitions
a single MO definition
____ notation is used to define MOs and the entire MIB structure
In categorizing MIB objects, it refers to the current condition of a system.
Retrieves the value of the next OID in the MIB tree
This command is similar to the TRAP initiated by the Agent, additionally _________ includes confirmation from the SNMP manager on receiving the message
Useful for examining MIBs whose structure is not known to NMS
Lexicographical ordering is referred to as Pre-order traversal (root, left, right) of a tree or ________
Used to indicate that an exception occurred while processing a request; values are noError(0), tooBig(1), noSuchName(2), badValue(3), readOnly(4), genErr(5)
Used to distinguish among outstanding requests by providing each request with a unique ID
all stats are considered valid for a specific period of time (known as ______)
How many of an item are present in a system?
Communication with authentication and privacy
Communication with authentication and without privacy.
Communication without authentication and privacy
It is the command used to carry back the value(s) or signal of actions directed by the SNMP Manager.
A single object instance
The relationship between an agent and a set of managers that defines authentication, access control and proxy characteristics.
It is issued by the SNMP manager on behalf of the NMS to modify information in an agent.
It extends the SNMPv1 MIB functions
It is issued by an SNMP agent to notify the NMS of some significant event
It is used for accessing the MIB objects serially
In categorizing MIB objects, it refers to the useful information about what a system has been doing.
An SNMP Operation that updates management information.
SNMP Security concepts where agent may wish to give different access privileges to different managers.
It allows you to see MIB using the graphical user interface (GUI).
Network Management Tools
Which of the following is not part of the Simple Network Mangement Protocol framework?
SNMP Operation that retrieves management information
It provides the second line of security protection in SNMP.
It is issued by an SNMP manager on behalf of the NMS to retrieve information from an agent.
It provides the first line of security protection in SNMP.
It defines the general framework for defining SNMP MIBs.
An SNMP Operation that sends unsolicited scalar object values to notify problems.
In categoring MIB objects, it refers to a fairly static properties of a modeled object
Internet Control Message Protocol
A protocol used by the Ping utility command.
An SNMP Security concepts where agent may wish to limit access to the MIB to authorized managers only.
It checks whether the MIBs are written in SMIv1 or SMIv2 defined correctly
In categorizing MIB objects, it refers to the collections of logical and physical devices or services that are being managed.
In categorizing MIB objects, it means controlling a system.
It allows NMS to discover the structure of the MIB view dynamically
SNMP Security concepts where agent can act as intermediary to other proprietary managed devices.
An SNMP NM architecture component that resides on the network management station
A SNMP NM architecture component that resides int the managed network node
SNMP Access Policy
An SNMP community where an agent can provide different categories of MIB access using the following concepts: MIB MIB view and Access Mode
It uniquely identifies an MO in the MIB