The document is a question paper for the course 'Network Management in Telecommunication' covering various aspects of SNMP and network management protocols. It includes multiple-choice questions on topics such as SNMP PDU structure, data types in SMI, and network management standards. The questions assess knowledge on error handling, protocol functionalities, and security threats in network management.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
17 views6 pages
Pec-Etc8044 01
The document is a question paper for the course 'Network Management in Telecommunication' covering various aspects of SNMP and network management protocols. It includes multiple-choice questions on topics such as SNMP PDU structure, data types in SMI, and network management standards. The questions assess knowledge on error handling, protocol functionalities, and security threats in network management.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6
CBCGS-H ESE Regular (September 2020)
Network Management in Telecommunication (NMT)
PEC-ETC8044_01 Date:
1. An error in a response message is reported by _______ field in the SNMP PDU.
(2M) a. community b. enterprise c. error status d. flags 2. There are two broad categories of data types in SMI: _______ and _______. (2M) a. simple; complex b. simple; structured c. structured; unstructured d. structured; complex 3. An offset that points to the variable in error is called _______ field in the SNMP PDU. (2M) a. community b. enterprise c. error index d. flags 4. SNMP defines the ___________________ to be sent from a manager to an agent and vice versa. (2M) a. format of the packets b. encoding of the packets c. number of packets d. error of the packets 5. To retrieve the value of a variable or a set of variables, the GetRequest PDU is sent from the _______ to the __________. (2M) a. client; server b. server; client c. server; network d. network; client 6. The manager is enabled to access a set of variables one after another by defining the first variable by using ________ ordering. (2M) a. lexicographic b. linear c. non-linear d. alphabetic 7. SMI uses fundamental _______ definitions and adds some new definitions to define the data type. (2M) a. AMS.1 b. ASN.1 c. ASN.2 d. AMS.2 8. General rules for naming, defining and encoding objects and values are defined by ________. (2M) a. MIB b. BER c. SMI d. none of the above 9. The maximum value for the data length, for a 1-byte length field is _________? (2M) a. 127 b. 128 c. 255 d. 256 10. An SNMP message has which of the following format (in order): (2M) a. Community Name, Version Number, SNMP PDUs b. Version Number, Community Name, SNMP PDUs c. SNMP PDUs, Version Number, Community Name d. Version Number, SNMP PDUs, Community Name 11. Which of the following are SNMP agents? (1M) a. Management devices b. NMS (Network Management Stations) c. Network devices such as routers, switches, or hubs. d. PDUs 12. Which authentication protocol is used by the User Security Model (USM) in SNMPv3? (1M) a. HMAC-MD5 b. HMAC-DSA c. MD5 d. DSA 13. A few manager stations control a set of agents in which application level protocol? (1M) a. HTML b. TCP c. SNMP d. SNMP/IP 14. To use Simple Network Management System, we need _________. (1M) a. Entities b. Standard types c. Frames d. Rules 15. Which protocol is used for managing devices in an internet using SNMP framework? (1M) a. TCP/IP protocol b. UDP c. SNTP d. CCnP 16. TMN fuctional architecture Qx interface is used to connect (2M) a. MF and WSF b. MF and NEF c. NEF and WSF d. WSF and OSF 17. Function of NEF in TMN architecture is (2M) a. To connect compatible devices b. To connect non compatible devices c. To connect managed object d. To manage network element 18. Bilingual Manager is used to connect SNMPv2 manger with (2M) a. SNMPv1 Agent b. SNMPv2 Agent c.SNMPv3 Agent d. SNMPv1 Manager 19. Cold start is a type of (2M) a. Generic trap b. Enterprise specific trap c. Device Specific trap d. Time stamp 20. Which event corelation method is best suitable for similar type of event (2M) a. Rule Book Based Reasoning b. Case Based Reasoning c. Model Based Reasoning d. Code book Correlation model 21. Most widely implemented network management standards is (1M) a. OSI/CMIP b. SNMP c. TMN d. XML based network management 22. Disclosure is a type of security threats in which (2M) a. Unauthorized user sends information b. Unauthorized user may modify the content c. Disclose management information d. Intruder may manipulate message stream 23.Transport layer protocol used by SNMP network management standard is (1M) a. UDP b. TCP c. ICMP d. IGMP 24. Network Provisioning consists of (1M) a. Planning and designing b. Configuration management c. Inventory management d. Traffic management 25. Communication model deals with (2M) a. Storage and management of information b. Communication of information c. Application services d. Organisation of network element 26. Public network manager is connected with another Public network manager using (1M a. M1 interface b. M2 interface c. M3 interface d. M5 interface 27.Broadband Intercarrier interface(BICI) is a type of (2M) a. Network Network Interface b. User Network Interface c. Public User network interface d. Private User network interface 28. Agent management Entity of SNMP agent is connected with ATM device using (2M) a. ILMI b. M1 interface c. M2 interface d. M3 interface 29. Object identifiers for MIB 2 is (2M) a. 1.3.6.1.2.1.1 b. 1.6.3.1.2.1 c. 1.4.5.1.2.1 d. 1.3.6.2.1.2 30. Daily operations of networks and providing network services are comes under (1M) a. Network Operation center b. Network installation and maintenance c. Network management d. Network provisioning