Information Technology Reference
In-Depth Information
17. Which statement is correct?
a.
SNMPv1 uses GetBulk operations and 32-bit values.
b.
SNMPv2 uses 32-bit values, and SNMPv3 uses 64-bit values.
c.
SNMPv1 uses 32-bit values, and SNMPv2 uses 64-bit values.
d.
SNMPv1 uses GetBulk operations, and SNMPv2 uses Inform operations.
18. Which SNMPv3 level provides authentication and privacy?
a.
authPriv
b.
authNoPriv
c.
noAuthNoPriv
d. noauthPriv
19. Match the RMON group with its description.
i.
Statistics
ii.
Matrix
iii.
alHost
iv.
protocoldir
a.
Stores statistics for conversations between two hosts
b.
Lists the protocols that the device supports
c.
Contains real-time statistics for interfaces: packets sent, bytes, CRC errors,
fragments
d.
Contains application layer statistics for traffic sent to or from each host
20. What is the most critical syslog priority level?
a.
0
b.
1
c.
6
d. 7
21. Which management protocol will help a company concentrate on Layer 4 monitoring
and gain information to assist in long-term trending analysis?
a.
SNMPv3
b.
RMON2
c.
NetFlow
d.
CDP
e.
MIB
Search WWH ::




Custom Search