Ask Computer Network & Security Expert

Part A:

1. Which is not a discipline that best describes the functional parts of network management?

Network management

System management

Application management

Both network and application management

Protocol management

2. One of the main goals of network management is to make operations more efficient and operators more _____.

Efficient

Secure

Productive

Stable

knowledgeable

3. Which is not one of the four steps of the management life cycle?

Operate

Decommission

Plan

Optimize

None of the above

4. In the network management system, OID identifies unique objects in the _____.

MIB database

NMS query agent

NMS response

5. Which is not a part of all management agents?

The MIB

Core agent logic

Management interface

XML

Both core agent logic and XML

6. One of the key words found in the definition of network management is administration. Select the best definition of administration from the following choices.

Keeping the network up and running smoothly

Performing repairs and upgrades and taking corrective and preventive proactive measures to make the network run better

Configuring resources in the network to support a given service

Keeping track of resources in the network and how they are assigned

None of the above

7. Select the name of the language used in conjunction with the common management information protocol (CMIP).

Common information model (CIM)

Managed object format (MOF)

Structure of management information (SMI)

Abstract syntax notation version 1 (ASN.1)

Guidelines for the definition of managed objects (GDMO)

8. Which item is not one of the benefits of network discovery?

Inventory records possibly not being accurate

Performs backup and restore operations

Mitigates surprises to service providers and network operators

Provides up-to-date records on changes made by personnel in the network

Provides a more effective way to discover network devices

9. Which is not one of the reasons why polling a managed device for operational data and state information is generally done?

Troubleshooting

Device viewing

Diagnostics

Device update

None of the above

10. Which is not one of the events in network management event taxonomy?

Fault alerts

Configuration-change events

Threshold-crossing alerts

Informational events

Logging events

Part B:
1. Select the best features for an operational support system designed to assist users who must sift through large volumes of management information.

Visual highlighting of information that seems out of the ordinary

Graphical representation of large data sets-diagrams and curves to visualize trends

Functions to sort, search, and filter information according to a wide variety of criteria

None of the above

All of the above

2. Select the ways in which an effective network management system contributes to network availability.

Reducing errors made by network operators and administrators, ensuring that network devices are properly configured, spotting and resolving troubles quickly, identifying top talkers on the network

Reducing errors made by network operators and administrators, ensuring that network devices are properly configured, spotting and resolving troubles quickly

Reducing errors made by ensuring that network devices are properly configured, spotting and resolving troubles quickly, identifying top talkers on the network

Reducing errors made by network operators and administrators, ensuring that network devices are properly configured, identifying top talkers on the network

Reducing errors made by network operators and administrators, identifying top talkers on the network

3. A cost-effective way for allowing management applications to scale consists of which technique?

Serialize application requests.

Reduce the number of hosts running the application.

Amortize cost of the operations support infrastructure.

Centralize the application in the operations support center.

Distribute the application across multiple hosts.

4. Select the best answer from the list below that captures the essence of an effective network management system.

Provides a foundation for determining when maintenance must be scheduled, provides a basis for determining where investment will have the biggest impact, provides a basis for developing ROI models

Helps determine where to direct investment into network management technology, provides a foundation for determining when maintenance must be scheduled, provides a basis for developing ROI models.

Helps determine where to direct investment into network management technology, provides a basis for determining where investment will have the biggest impact, provides a basis for developing ROI models.

Helps determine where to direct investment into network management technology, provides a foundation for determining when maintenance must be scheduled, provides a basis for determining where investment will have the biggest impact

Helps determine where to direct investment into network management technology, provides a foundation for determining when maintenance must be scheduled, provides a basis for determining where investment will have the biggest impact, provides a basis for developing ROI models

5. Which gives the best definition of MTBF?

A classical measure of reliability that gives an indication of how often a service or device becomes unavailable

Percentage of time during which a service is functioning properly

Time from service order to service activation

Customer defections from slow order fulfillment and lack of consistent quality

A classical measure for indicating how long it takes for services that are impacted by failures to be restored

6. Which two methods for integrating management systems will a network service provider and an enterprise-size business usually rely upon?

Purchase a custom off-the-shelf software package; interact with a custom development project and contract with a systems integrator

Perform a custom development project internally; contract with a systems integrator

Purchase a custom off-the-shelf software package; contract with a systems integrator

Contract with a systems integrator; purchase a custom off-the-shelf software package and write middleware and scripts to link the systems together

Write middleware and scripts to link systems together; purchase a custom off-the-shelf software package

7. Select the two types of policies (choose from goals, rules, plans, or requests) that can be distinguished in network management systems.

Policy goals and policy requests

Policy rules and policy plans

Policy plans and policy requests

Policy goals and policy rules

Policy rules and policy requests

8. Select the definition for the network management term known as management mediation.

Translating between managed systems and the management information base (MIB) due to the differences in management protocols

Translating between managing and managed systems due to the differences in protocols and services within the same manager level

Translating between managing and managed systems due to the differences in system appliances only

Translating between managing and managed systems due to the differences in protocols, services, and management information between hierarchical management layers

Translating between managing and managed systems due to the differences in software applications only

9. Which is not one of the management layer primitives that are found in most management protocols and that form the basis of management communication patterns between manager-agent relationships?

Action primitives

Write primitives

Update primitives

Event-reporting primitives

Read primitives

10. Which type of event typically requires management attention in a network management system?

A configuration change alert

A threshold-crossing alert

A syslog message alert

An alarm event

An operator activity alert

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M91311531
  • Price:- $30

Guranteed 24 Hours Delivery, In Price:- $30

Have any Question?


Related Questions in Computer Network & Security

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Assignment descriptionproject scope a typical network

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

Assignment descriptionproject scope a typical network

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

After reading this weeks materials please respond to two 2

After reading this week's materials, please respond to TWO (2) of the following questions. AND PROVIDE CITATION IN APA 1. Describe the differences between bus, ring, star and mesh topologies. 2. Explain the TCP/IP Model ...

The abstract should not be more than 250 words describe

The abstract should not be more than 250 words. Describe your project, focusing on research questions and research method for next stage of the project. 1. Introduction [The introduction should describe what the project ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As