Network management architecture is

Assignment Help Computer Networking
Reference no: EM13755301

Question 1. A MANAGED device is a.

  • type of macrovirus.
  • Piece of equipment that resides on a MANAGED network.
  • used in a call-back modem.
  • a program that records all LAN messages received for later (unauthorized) analysis.
  • secure hub program.

Question 2. The goal of _____ is to control access to network resources according to some well-defined policy.

  • Security MANAGEMENT
  • control spreadsheet
  • IDS
  • anti-virus software
  • prevention controls

Question 3. ____ are all reasons that network administrators might benefit from having network MANAGEMENT tools..

  • network cloaking device
  • backup punch card reader
  • Detecting failure in a interface card, host monitoring, and intrusion detection
  • service level agreement
  • help desk

Question 4. The third piece of network MANAGEMENT architecture is?

  • An analyst develops cost estimates of the circuits needed to support the network.
  • the network MANAGEMENT protocol.
  • An analyst meets with users to identify user needs.
  • An analyst develops a precise estimate of the amount of data that users will send and receive to estimate the total amount of traffic on each part of the network.
  • An analyst designs the circuits to support the estimated traffic, allowing for modest growth.

Question 5. Is one of two important network MANAGEMENT standards created by the ISO?

  • CMISE/CMIP
  • Needs analysis
  • Narrow and deep analysis
  • Cost assessment
  • Distribution layering

Question 6. Which of the following is a protocol that might be considered in network MANAGEMENT design?

  • SNMP
  • 10 Mbps
  • 100 Mbps
  • WAN
  • SNA

Question 7. Which of the following is a term for the process of ensuring that the network is operating as efficiently as possible?

  • Firefighting
  • Fault tolerance
  • Fault management
  • Performance management
  • Troubleshooting

Question 8. The ____ has been busy standardizing the MIB modules associated networking equipment?

  • IETF
  • Planning
  • Organizing activities
  • Directing activities
  • Controlling activities

Question 9. _____ is a network management protocol that has matured through three revisions.

  • MTTDiagnose
  • MTTRespond
  • MTTRepair
  • MTTFix
  • SNMP

Question 10. Which of the following refers to MANAGING and documenting the network's hardware and software configuration?

  • Visioning
  • Troubleshooting
  • Firefighting
  • Configuration management
  • Implementation Delete message

Reference no: EM13755301

Questions Cloud

Explain why shared accounts is considered bad practice : In your own words, explain why each of the following is considered bad practice:
What friedan mean by phrase the problem that has no name : What does Friedan mean by the phrase "the problem that has no name"? What kinds of women seem to be excluded from her account of the problem?
Large portfolio of debt and equity securities as investment : Addison Manufacturing holds a large portfolio of debt and equity securities as an investment. The fair value of the portfolio is greater than its original cost, even though some securities have decreased in value. Will classifying the portfolio as ea..
Distinction between input and output lines : How many cross points would be required if there were no distinction between input and output lines (i.e., if any line could be interconnected to any other line serviced by the crossbar)?
Network management architecture is : The third piece of network MANAGEMENT architecture is?
Role of healthcare marketing in an hcos : What is the role of healthcare marketing in an HCO's strategic planning process? Provide an example. Be sure to identify and discuss basic marketing elements. Be sure to discuss why effective communication is paramount in getting the right message..
Occur during inflation of the airbag are complete : 2) What is the maximum size of airbag (in litres) that can be inflated using 100 g of NaN3 at 25.0 °C and 101 kPa? Assume that all of the chemical reactions that occur during inflation of the airbag are complete.
The employer payroll taxes are recorded separately : Total payroll was $472,500, of which $157,700 is exempt from Social Security tax because it represented amounts paid in excess of $106,800 to certain employees. The amount paid to employees in excess of $7,000 was $403,100. Income taxes in the amount..
Describing the data types : Create a 10-12 slide presentation describing the data types

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd