Sei sulla pagina 1di 3

IT140 – FINAL EXAM (1Q – ’18 TO ’19)

ETO YUNG MAY OT

1. One of its benefits is the use of multiple NMSs to eliminate single point of failure.
2. A NM software architecture which provide interfaces between user and NM software.
3. A NM software architecture which includes a set of NM applications, application elements, and
NM data transport service.
4. A collection of software for performing network monitoring and control.
5. A collection of software devoted to the network management tasks.
6. Concerned with charging the use of network resources.
7. Concerned with monitoring the status of components during network operation.
8. Concerned with ensuring that the systems as a whole, and each essential component
individually, are in proper working order.
9. Concerned with concerned with observing and analyzing the status and behavior of the end
systems, intermediate systems, and subnetworks that make up the network to be managed.
10. Which is not part of the monitored types of information?
11. All are monitoring system components except
12. A monitoring system components that performs the basic monitoring function of retrieving
information.
13. A monitoring system component that gathers and records management information for one or
more network elements and delivers the information to the monitor.
14. A monitoring system component that manage information that represents resources and their
activities.
15. A monitoring system component that generates summaries and statistical analysis of
management information.
16. A network monitoring method where a manager sends request to an agent which processes the
request and responds with information from its MIB.
17. A network monitoring methods where information flow is initiated from the agent to manager.
18. Network performance indicators which deals with availability, response time, and accuracy.
19. Throughput and utilization are components of this network performance indicator.
20. All of the following are performance monitoring function except
21. Which is not a component of fault monitoring function? TESTING
22. A machine independent data description language. ASN.1
23. Describes a method for encoding values of each ASN.1 type as a string of octets and is based on
the use of a type-length-value (TLV) structure. BER
24. Describes the generic structure of data and allows data types and values to be defined.
ABSTRACT SYNTAX
25. Describes how data are actually represented in terms of bit patterns while in transit. TRANSFER
SYNTAX
26. Sequence of octets used to represent a data value. ENCODING
27. Concerned with modifying parameters in and causing actions to be taken by the end systems,
intermediate systems, and subnetworks that make up the network to be managed. NETWORK
CONTROL
28. All should be secured in a network except USERS
29. A security requirement for making information accessible to only authorized users
and includes the hiding of the existence of information. SECRECY
30. A security requirement for making information modifiable to only authorized users. INTEGRITY
31. A security threat where an entity pretends to be a different entity. MASQUERADE
32. Which among the following is a security threat to availability? INTERRUPTION
33. A security threat where an unauthorized party inserts false information. FABRICATION
34. All of the following are network assets except BANDWIDTH
35. Network assets that is prone only to interruptions like theft and denial of service. HARDWARE
36. Collection of a moderate number of variables that may be of different type and whose order is
significant. SEQUENCE
37. Also referred to as SNMP-based Network Management. INTERNET NETWORK MANAGEMENT
38. An organization responsible for SNMP standardization. IETF
39. Ping utility is an example of this internet protocol. ICMP
40. Known to be an interim solution and an enhanced version of SGMP. SNMP
41. Referred to a document that is replaced by an updated version. OBSOLETE
42. By means of ______ the agent occasionally notifies the manager about some events related to
network operation. TRAP
43. A notation is used to define MOs and the entire MIB structure. ASN.1
44. All are type of ASN.1 universal types except COUNTER
45. It is widely used and standard encoding scheme. BER
46. An SNMP operations that retrieves management information (values of scalar objects). GET
OPERATION
47. An SNMP operations that updates management information (values on scalar objects). SET
OPERATION
48. An SNMP security concept where agent may wish to give different access privileges to different
managers. ACCESS POLICY
49. An SNMP security concept where agent may wish to limit access to the MIB to authorized
managers. AUTHENTICATION SERVICE
50. It is used for accessing MIB objects serially. LEXICOGRAPHICAL ORDERING

ETO YUNG WALANG OT


51. Forest-to-forest ___________________ can be created between Windows Server 2003 forests
only (ie not between Windows 2000 forests). TRANSITIVE TRUSTS
52. Encryption takes place at which layer? PRESENTATION
53. A NM user requirement where there were continued growth of devices, users, applications &
protocols. CONTROLLING COMPLEXITY
54. Error detection and recovery takes place at which layer? TRANSPORT
55. Routers operate at which layer of the OSI model? NETWORK
56. Which of the following are transport layer protocols? TCP AND UDP
57. A NM user requirement where more users and applications depend on availability. REDUCING
DOWNTIME
58. IETF (Give the complete framework)  INTERNET NETWORK MANAGEMENT FRAMEWORK
59. ITU-T (Give the complete framework)  TELECOMMUNICATION MANAGEMENT FRAMEWOR
60. EIA  ELECTRONIC INDUSTRIES ALLIANCE
61. TIA  TELECOMMUNICATIONS INDUSTRY ASSOCIATION
62. A ASN.1 lexical convention that begin with two hyphens (“--”) and terminated either by another
set (“--”) or the end of line character. COMMENTS
63. Which of the following is not part of the group? REQUEST FOR PROPOSAL
64. Wiring standards that this facility may also contain campus-wide backbone connection.
ENTRANCE FACILITY
65. An RFP checklists that includes › Choice sets of possible network designs; Mandatory, desirable,
and wish list items,Security and control requirements. NETWORK REQUIREMENTS
66. Cost to consider in network design includes the following except UPGRADE COSTS
67. ASN.1 data type that has a collection of one or more types. SET
68. ASN.1 data types derived from other types. TAGGED
69. Wiring standards that runs up through the floors of the building or across a campus and
provides the interconnection for eqpmnt room and telco closet. BACKBONE CABLING
70. Wiring standards that is also known as Intermediate Distribution Facility(IDF).
TELECOMMUNICATION CLOSET
71. A network design including only network analysis phase and implementation phase.
TRADITIONAL NETWORK DESIGN
72. Network design parameter where › network requirements should be organized to mandatory
requirements, desirable requirements, and wish list requirement. NEEDS CATEGORIZATION
73. Wiring standards that is also known as Main Distribution Facility. EQUIPMENT ROOM
74. Generated from a macro definition by substituting values for variables. MACRO INSTANCE
75. SNMP Security concepts where agent can act as intermediary to other proprietary managed
devices. PROXY SERVICE
76. An SNMP Operation that sends unsolicited scalar object values to notify problems. TRAP
OPERATION
77. ERROR-STATUS VALUES: noError(0), tooBig(1), noSuchName(2), badValue(3), readOnly(4),
genError(5)
78. Useful for examining MIBs whose structure is not known to NMS. LEXICOGRAPHICAL ORDERING
79. It uses the Web server and browser technology for monitoring… WEB-BASED MANAGEMENT
80. It is a protocol defined for executable resources to interface with info. Server. CGI
81. OMG’s solution for providing interoperability. CORBA
82. An extensible data description for representing the managed objects. COMMON INFORMATION
MODEL
83. A set of extensible Java language classes. JAVA MANAGEMENT API

P.S.: The rest of the PPTs, Quiz1, Quiz2 and Quiz3 (random questions) na related sa coverage ng FINAL
EXAM ay kasali sa exam…

Good luck 

Potrebbero piacerti anche