is451quiz2review

  1. A directory "blueprint" that describes structure of information in the directory is …
    a. Schema
    b. Object
    c. Attribute
    d. DN (Distinguished Name)
    a. Schema
  2. Which of the following SNMP commands is not originated by NMS?
    a. Get
    b. Get-next
    c. Set
    d. Trap
    d. Trap
  3. What is the name of a virtual database of managed objects that SNMP agent tracks?
    a. SMI
    b. MIB
    c. OID
    d. SNMP
    b. MIB
  4. An SNMP __ is responsible for responding to polls from and sending traps to an SNMP ___.
    a. Agent; manager
    b. Manager; agent
    c. NMS; protocol
    d. Agent; MIB
    e. NMS; Manager
    b. Agent; manager
  5. A directory client is …
    a. DSA
    b. DSP
    c. DUA
    d. DAP
    c. DUA
  6. Why is it preferable to use UDP transport for SNMP?
    a. It has lower overhead
    b. It is more reliable
    c. It uses encryption
    d. It is more secure
    a. It has lower overhead
  7. What components of Directory Services holds the data repository?
    A. DUA
    B. DSA
    C. DAP
    D. LDAP
    b. DSA
  8. Each piece of information that describes some aspect of a directory entry is called …
    a. An object
    b. An attribute
    c. A schema
    d. DUA
    b. An attribute
  9. What SNMP command would bee used to make changes in a router configuration?
    a. Get
    b. Get-next
    c. Set
    d. Trap
    c. Set
  10. What type of access is the most common in the Directory Services?
    a. Read
    b. Write
    c. Update
    d. Delete
    a. Read
  11. What does OID identifies about a MIB object?
    a. It's value
    b. It's position in the MIB subtree
    c. It's priority
    d. The number of its subnodes
    b. It's position in the MIB subtree
  12. Which of the following is true about Directory Services replication?
    a. It allows directory database to be distributed
    b. It supports directory access load-balancing
    c. It supports directory fault-tolerance
    d. All of the above
    d. All of the above
  13. Which of the following protocols is used for directory access?
    a. DISP
    b. DSP
    c. DAP
    d. MIB
    c. DAP
  14. What standard MIB is required to be implemented by all devices?
    a. MIB-Main
    b. MIB I
    c. MIB II
    d. MIB Root
    c. MIB II
  15. What is used to define management information in MIBs?
    a. SMI
    b. LDAP
    c. OID
    d. SNMP
    a. SMI
  16. Which of the following acts as a primary key for a directory?
    a. Schema
    b. RDN
    c. DN
    d. Object
    c. DN
  17. Which of the following is a difference between LDAP-based and X.500-based directories?
    a. Directory structure
    b. Naming convention
    c. Transport/network protocol stack used/for directory access
    d. Client-server architecture
    c. Transport/network protocol stack used/for directory access
  18. Directory Information Tree represents …
    a. Set of directory object permissions
    b. Directory schema
    c. Hierarchical directory structure and object organization
    d. Client-server directory model
    c. Hierarchical directory structure and object organization
  19. How are RDN and DN related?
    a. DN is part of RDN
    b. RDN is part of DN
    c. They represent the same thing
    d. They are not related
    b. RDN is part of DN
  20. Which of the following does SNMPv3 support?
    a. Message integrity
    b. Data encryption
    c. Authentication
    d. All of the above
    d. All of the above
  21. What are the goals of security management?
    a. Measure, analyze and control performance of network components
    b. Track and control inventory of network components
    c. Control access to network components according to a well-defined policy
    d. Specify, log and regulate user access to network resources
    c. Control access to network components according to a well-defined policy
  22. What are the goals of configuration management?
    a. Measure, analyze and control performance of network components
    b. Track and control inventory of network components
    c. Control access to network components according to a well-defined policy
    d. Log and regulate user access to network resources
    d. Track and control inventory of network components
  23. What SNMP command is asynchronous?
    a. Set
    b. Get-next
    c. Get-bulk
    d. Trap
    d. Trap
  24. What component of Directory Services maintains and communicates directory information?
    a. DUA
    b. DSA
    c. DAP
    d. LDAP
    b. DSA
  25. In network management applications, the ___ is software packaged with a network element that collects information about that element.
    a. NMS
    b. MIB
    c. Agent
    d. Manager
    c. Agent
  26. Which of the following represents the format of a MIB OID?
    a. 1-3-6-3-2
    b. 1 3 6 3 2
    c. 1#3#6#3#2
    d. 1.3.6.3.2
    d.1.3.6.3.2
  27. What is the purpose of directory replication process?
    • It allows directory database to be distributed
    • It supports directory access load-balancing
    • It supports directory fault-tolerance
Author
tttran1
ID
266090
Card Set
is451quiz2review
Description
is451quiz2review
Updated