Information Technology Reference
In-Depth Information
11. Which SNMPv3 level provides authentication with no encryption?
a.
authPriv
b.
authNoPriv
c.
noAuthNoPriv
d.
noauthPriv
12. What encryption standard does SNMPv3 use?
a.
3DES
b.
CBC-DES
c.
HMAC-MD5
d. MD5
13. Which technologies can you use to assess a network and create documentation? (Se-
lect two.)
a.
RMON
b.
MIB
c.
CDP
d.
NetFlow
14. Which of the following are true about CDP? (Select three.)
a.
It uses UDP.
b.
It is a data-link protocol.
c.
It provides information on neighboring routers and switches.
d.
It is media and protocol independent.
e.
It uses syslog and RMON.
15. RMON2 provides information at what levels of the OSI model?
a.
Data link and physical
b.
Network, data link, and physical
c.
Tran s por t and net work only
d. Application to network
16. Which network management technology operates over TCP?
a.
SNMP
b.
RMON
c.
NetFlow
d.
None of the above
Search WWH ::




Custom Search