[Skip Breadcrumb Navigation]
:
[Skip Breadcrumb Navigation]
Home
Student Resources
Self-Assessment Quizzes
Chapter 9 MC
Chapter 9 MC
This activity contains 8 questions.
Which of the following statements best describes the purpose of the SNMP protocol:
The SNMP protocol specifies the actions a network manager should take in response to a specific set of network fault conditions.
The SNMP protocol is used by the network manager to provision resources, such as bandwidth, server capacity and other computational/communication resources needed to meet the mission-specific needs of an enterprise
The SNMP protocol is a tool for gathering data about network conditions and executing remote actions at remote managed devices
What is the purpose of the SNMP SetRequest message?
To allow a managing entity to set the value of one or more MIB objects in a managed device.
To allow a managing entity to query the value of a set of MIB object values in a managed device.
To allow a managed device to request and receive a set of initial values for MIB objects in the managed device
Suppose a network manager wanted to query the value of the number of TCP segments received by a host running the Microsoft Windows 2000 operating system in a US-based company. What would be the prefix (leading digits) of the MIB variable that should be queried:
1.2.840.11356
1.3.6.1.2.1.1
1.2.840
What is the maximum number of received UDP datagrams that can be counted (without overflow) in the MIB-2 UDP module?
2**64 -1
2**32 - 1
2**16 - 1
2**31 - 1
What is the purpose of a presentation service?
To encode, transmit, and translate data from one machine-specific format to another
To allow a client to inform a server that it (the client) is present and ready to receive data
To display data in a format specified by a user
None of the above
Suppose the example in Figure 8.9 is changed so that the
lastname
"smithe" is to be transmitted, instead of "smith." Which of the following best describes the change in the transmitted by steam:
An 'e' is inserted into the transmitted byte stream, right after the 'm'. Also, the value of the first transmitted byte will change from 4 to 5.
An 'e' is inserted into the transmitted byte stream, right after the 'm'. Also, the value of the second byte will change from 5 to 6.
An 'e' is inserted into the transmitted byte stream, right after the 'm'. No other changes will occur.
Filtering in a firewall can be based on
source and destination IP addresses
TCP ACK bits
source and destination port numbers
all of the above
Some of the problems of application gateways include
they can often have software bugs, allowing attackers to penetrate them
for each application, a server has to be installed and configured
their use is not completely transparent to the internal users and/or client software
all of the above
The Submit Answers for Grading feature requires scripting to function. Your browser either does not support scripting or you have turned scripting off.
So, the Submit Answers for Grading button below will not work.
The following Submit Answers for Grading button is provided in its place and will clear your answers:
The Clear Answers and Start Over feature requires scripting to function. Your browser either does not support scripting or you have turned scripting off.
So, the Clear Answers and Start Over button below will not work.
The following Clear Answers button is provided in its place and will clear your answers:
Your browser either does not support scripting or you have turned scripting off. Because of this, the answer choices will NOT appear in a different order each time the page is loaded, though that is mentioned below. Note that you do not need this feature to use this site.
Answer choices in this exercise appear in a different order each time the page
is loaded.
Copyright © 1995 - 2012
Pearson Education
. All rights reserved. Pearson Addison Wesley is an imprint of
Pearson
.
Legal Notice
|
Privacy Policy
|
Permissions
[Return to the Top of this Page]
: [Return to the Top of this Page]