0% found this document useful (0 votes)
17 views6 pages

Pec-Etc8044 01

The document is a question paper for the course 'Network Management in Telecommunication' covering various aspects of SNMP and network management protocols. It includes multiple-choice questions on topics such as SNMP PDU structure, data types in SMI, and network management standards. The questions assess knowledge on error handling, protocol functionalities, and security threats in network management.

Uploaded by

suraj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views6 pages

Pec-Etc8044 01

The document is a question paper for the course 'Network Management in Telecommunication' covering various aspects of SNMP and network management protocols. It includes multiple-choice questions on topics such as SNMP PDU structure, data types in SMI, and network management standards. The questions assess knowledge on error handling, protocol functionalities, and security threats in network management.

Uploaded by

suraj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

CBCGS-H ESE Regular (September 2020)

Network Management in Telecommunication (NMT)


PEC-ETC8044_01
Date:

1. An error in a response message is reported by _______ field in the SNMP PDU.


(2M)
a. community
b. enterprise
c. error status
d. flags
2. There are two broad categories of data types in SMI: _______ and _______. (2M)
a. simple; complex
b. simple; structured
c. structured; unstructured
d. structured; complex
3. An offset that points to the variable in error is called _______ field in the SNMP PDU.
(2M)
a. community
b. enterprise
c. error index
d. flags
4. SNMP defines the ___________________ to be sent from a manager to an agent and
vice versa. (2M)
a. format of the packets
b. encoding of the packets
c. number of packets
d. error of the packets
5. To retrieve the value of a variable or a set of variables, the GetRequest PDU is sent from
the _______ to the __________. (2M)
a. client; server
b. server; client
c. server; network
d. network; client
6. The manager is enabled to access a set of variables one after another by defining the
first variable by using ________ ordering. (2M)
a. lexicographic
b. linear
c. non-linear
d. alphabetic
7. SMI uses fundamental _______ definitions and adds some new definitions to define the
data type. (2M)
a. AMS.1
b. ASN.1
c. ASN.2
d. AMS.2
8. General rules for naming, defining and encoding objects and values are defined by
________. (2M)
a. MIB
b. BER
c. SMI
d. none of the above
9. The maximum value for the data length, for a 1-byte length field is _________? (2M)
a. 127
b. 128
c. 255
d. 256
10. An SNMP message has which of the following format (in order): (2M)
a. Community Name, Version Number, SNMP PDUs
b. Version Number, Community Name, SNMP PDUs
c. SNMP PDUs, Version Number, Community Name
d. Version Number, SNMP PDUs, Community Name
11. Which of the following are SNMP agents? (1M)
a. Management devices
b. NMS (Network Management Stations)
c. Network devices such as routers, switches, or hubs.
d. PDUs
12. Which authentication protocol is used by the User Security Model (USM) in SNMPv3?
(1M)
a. HMAC-MD5
b. HMAC-DSA
c. MD5
d. DSA
13. A few manager stations control a set of agents in which application level protocol?
(1M)
a. HTML
b. TCP
c. SNMP
d. SNMP/IP
14. To use Simple Network Management System, we need _________. (1M)
a. Entities
b. Standard types
c. Frames
d. Rules
15. Which protocol is used for managing devices in an internet using SNMP framework?
(1M)
a. TCP/IP protocol
b. UDP
c. SNTP
d. CCnP
16. TMN fuctional architecture Qx interface is used to connect (2M)
a. MF and WSF
b. MF and NEF
c. NEF and WSF
d. WSF and OSF
17. Function of NEF in TMN architecture is (2M)
a. To connect compatible devices
b. To connect non compatible devices
c. To connect managed object
d. To manage network element
18. Bilingual Manager is used to connect SNMPv2 manger with (2M)
a. SNMPv1 Agent
b. SNMPv2 Agent
c.SNMPv3 Agent
d. SNMPv1 Manager
19. Cold start is a type of (2M)
a. Generic trap
b. Enterprise specific trap
c. Device Specific trap
d. Time stamp
20. Which event corelation method is best suitable for similar type of event (2M)
a. Rule Book Based Reasoning
b. Case Based Reasoning
c. Model Based Reasoning
d. Code book Correlation model
21. Most widely implemented network management standards is (1M)
a. OSI/CMIP
b. SNMP
c. TMN
d. XML based network management
22. Disclosure is a type of security threats in which (2M)
a. Unauthorized user sends information
b. Unauthorized user may modify the content
c. Disclose management information
d. Intruder may manipulate message stream
23.Transport layer protocol used by SNMP network management standard is (1M)
a. UDP
b. TCP
c. ICMP
d. IGMP
24. Network Provisioning consists of (1M)
a. Planning and designing
b. Configuration management
c. Inventory management
d. Traffic management
25. Communication model deals with (2M)
a. Storage and management of information
b. Communication of information
c. Application services
d. Organisation of network element
26. Public network manager is connected with another Public network manager using (1M
a. M1 interface
b. M2 interface
c. M3 interface
d. M5 interface
27.Broadband Intercarrier interface(BICI) is a type of (2M)
a. Network Network Interface
b. User Network Interface
c. Public User network interface
d. Private User network interface
28. Agent management Entity of SNMP agent is connected with ATM device using (2M)
a. ILMI
b. M1 interface
c. M2 interface
d. M3 interface
29. Object identifiers for MIB 2 is (2M)
a. 1.3.6.1.2.1.1
b. 1.6.3.1.2.1
c. 1.4.5.1.2.1
d. 1.3.6.2.1.2
30. Daily operations of networks and providing network services are comes under (1M)
a. Network Operation center
b. Network installation and maintenance
c. Network management
d. Network provisioning

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy