1. Define the internetwork
    Set of networks connected with routers
  2. What does a hetro network consist of?
    Systems from dif vendors,dif os's,dif comm protocols
  3. A network of components from the same vendor or compatible equip that all run under the same os or nos is what?
    Homo network
  4. What type of network (homo/hetro) is more common
  5. What is a comm network that serves users within a confined geo area?
  6. How many users does a peer to peer network normally service?
  7. How many users does a single server network normally service?
  8. How many users does a multi server network normally service?
  9. How many users does a multi-server high speed backbone network normally service?
  10. How many users does a enterprise network normally service?
  11. What is used for addressing on a physically connected network to identify network nodes?
    MAC addresses
  12. Numbering system comps use for data
  13. With IP addressing, how many bits are used and how are they broken down?
    32bit/4 sets of 8 bits
  14. What is used to designate a part of an ip addy as the net addy, and other parts as the host addy?
    network field, host field
  15. Why subnet in ipv4?
    improve efficiency in using a limited number of available addy spaces
  16. What is the air force instructions series that covers NM?
    33 series
  17. What does AFPD 33-1, info resources mgmt establist policy on?
    Acquiring, planning, and managing its info resources
  18. What actions does AFI 33-1, Base-level planning and implementation outline?
    Standardized mgmt practices and tells how to manage planning and implementation of communications and info systems and the base level infrastructure
  19. What are the 3 areas of distributed responsibility does DICC consist of?
    Global, regional, and local levels.
  20. What is NM?
    mechanisms for monitoring, control, and coordination of resources within the open systems interconnection enviroment, and osi protocol standards for communicating info pertinent to those resources
  21. What is a NM server?
    A bundle of application software designed to significantly improve network efficiency and productivity. The network mgmt server is a network server that runs snmp based mgmt applications
  22. Where should the NM server be located?
    Area strictly controlled by the NCC
  23. Briefly describe the three most common NM architectures
    centralized(has NM platform on one system at a location thats responsible for all NM duties) Hierarchical(uses multiple systems, with one acting as a central server and others working as clients) Distributed(combines the two, multiple peer platforms)
  24. what are the 4 levels of activity that one must know before applying mgmt to specific services or devices
    Inactive, reactive, interactive, proactive
  25. This is the case when no monitoring is accomplished
  26. This is where network support personnel react to a problem after it has occurred yet no monitoring has been applied
  27. This is where you are monitoring components but must interactively trblsht to eliminate side-effect alarms and isolate problems to a root cause
  28. This is where automated monitoring components provide interactive problem analysis, giving a root cause alarm for the problem at-hand, and automatic restorative processes are in place whenever possible to minimize downtime
  29. What is configuration mgmt?
    Process of obtaining data from the network and using that data to manage the setup of all managed network devices
  30. 2 features of an NMS that alleviate manually configuring a network's devices
    auto discovery and auto mapping
  31. What does performance mgmt consist of?
    the facilities needed to evaluate the behavior of network objects and the effectiveness of communications activities
  32. List the steps you must take to provide accurate performance mgmt
    gather statistical info (tread analysis, maintain and examine logs of system state (history), Determine system performance under natural and artificial conditions, alter system modes of operation for the purpose of conducting performance mgmt
  33. What are the 2 functional categories of performance mgmt? Describe each.
    Monitoring-tracks historical data by tracking activities on the net, Tuning-Deals strictly with the adjustment of the parameters on the network devices to improve operation
  34. What is security mgmt?
    encompasses protecting sensitive info on devices attached to a data network by controlling access points to that information
  35. 2 subsections of security management
    network security and nms security
  36. what is fault management?
    process of identifying, locating, and correcting network problems (faults)
  37. Fault vs. Error
    Faults are abnormal conditions that require NCC personnel to take action to correct or repair. errors sometimes arise on a normal functioning network and do not necessarily require attention.
  38. What are some drawbacks to ICMP piinging as a NM tool?
    Unreliable delivery of packets, need for polling, limited info derived from responses.
  39. What is MIB?
    A hierarchical, strctured format that defines the NM information available for the network devices.
  40. What are the 2 parts of the labeled node?
    An object identifier (OID), short text description
  41. What are the two types of nodes that make up the MIB tree?
    Labeled nodes may have subordinate labeled nodes and/or leaf nodes, leaf nodes will never have subordinate. Labeled-word notation(understand what label is pointed to), Leaf-deciman notation(how the NMS tracks info)
  42. What are some examples of what a nose in SNMP can rep?
    any device (client, user, pc, server, printer) attached to a data network
  43. Briefly describe the two categories of SNMP
    Manager- A computer used to run one or more NMS applications, Agent-responsible for monitoring, collecting, and reporting mgmt data to the mgmt system.
  44. What does the GET operation do?
    retrieves the value of one specific instance of management information
  45. what does the set operation do?
    modifies the value of one or more instances of management information. Can create new instances and delete existing instances of management information
  46. What is a trap?
    Trap is the 4th operation message. unsolicited message from an agent to the manager, does not have a corresponding request message
  47. What are community names?
    each snmp community is a group containing one agent and one mgmt system. The logical name assigned to such a group we call the community name
  48. Describe each of the two types of community names
    Read-community that is read only, Write-community that allows the manager to remotely change configuration information from the mgmt station or server.
  49. What do the two hierarchies provided by the CIM describe?
    Physical hierarchies describe real world components, logical hierarchies are visible through network protocols
  50. What are the three methods for creating a representation of a network topology within the domain managers repository?
    Auto-discovery, manual discovery, topology import
  51. What are the 3 main components of SMARTS?
    Domain manager, broker, clients
  52. List the 5 different map types that can be accessed through the map console
    physical connectivity, ip network connectivity, ip network membership, vlan connectivity, vlan membership
  53. What is the primary console in smarts and what does it display?
    Monitoring console; it is used to display the reqults of the domain managers correlation alarms
  54. Briefly describe the differences between the two types of polling used by smarts to gather information
    fault and performance data is collected using SNMP while device connectivity is monitored using CMP
  55. What two factors determine if a SMARTS map is opened with r/w or r/o access?
    only one user can have a specific map opened with r/w access at any one time. You can use file system (FAT or NTFS) to purposely allow specific users to r/w or r/o access to a map by setting permission to the files
  56. What are the 3 types of notifications used in smarts
    problem, compound event, symptomatic event
  57. List eight of the objects that can be tracked through the windows perf monitor
    browser, cache, icmp, ip, memory, NIC, paging file, physical disk, processor, tcp, thread, telephony
  58. What are the primary capabilities provided by a protocol analyzer?
    Digital network diagnostics and developing communications software
  59. what is the difference between a protocol analyzer nic and other nics?
    one caps all frames, the other caps only broadcasts and frames with its ip addy
  60. what is the minimum amount of time recommended to capture network info to establish a baseline?
    24 hours
  61. What function of the protocol analyzer excludes specific types of frames?
    The capture filters option allows you to display and store only the data you are interested in analyzing. You may also use a capture filte to exclude specific types of frames.
  62. List 4 types of specific occurrences that can be displayed by counters in the protocol analyzer
    packets transmitted, crc errors, under/oversized packets, arp requests, data frame collisions, bit errors
  63. On the protocol analyzer, what menu is best used to report errors that occur at the physical layer such as bad fcs, short frames, and jabbers?
    MAC node statistics
  64. On the protocol analyzer, what kind of information does the connection statistics menu provide?
    information concerning the bandwidth utilization and the number of connections that are related to specific nodes
  65. what are the 3 types of active tests conducted with a prot analyzer?
    ping, traceroute, traffic generator
Card Set
3d052 volume 1 unit 1 section questions