Card Set Information

2012-01-18 21:15:49

Show Answers:

  1. What are some drawbacks to ICMP piinging as a NM tool?
    Unreliable delivery of packets, need for polling, limited info derived from responses.
  2. What is MIB?
    A hierarchical, strctured format that defines the NM information available for the network devices.
  3. What are the 2 parts of the labeled node?
    An object identifier (OID), short text description
  4. What are the two types of nodes that make up the MIB tree?
    Labeled nodes may have subordinate labeled nodes and/or leaf nodes, leaf nodes will never have subordinate. Labeled-word notation(understand what label is pointed to), Leaf-deciman notation(how the NMS tracks info)
  5. What are some examples of what a nose in SNMP can rep?
    any device (client, user, pc, server, printer) attached to a data network
  6. Briefly describe the two categories of SNMP
    Manager- A computer used to run one or more NMS applications, Agent-responsible for monitoring, collecting, and reporting mgmt data to the mgmt system.
  7. What does the GET operation do?
    retrieves the value of one specific instance of management information
  8. what does the set operation do?
    modifies the value of one or more instances of management information. Can create new instances and delete existing instances of management information
  9. What is a trap?
    Trap is the 4th operation message. unsolicited message from an agent to the manager, does not have a corresponding request message
  10. What are community names?
    each snmp community is a group containing one agent and one mgmt system. The logical name assigned to such a group we call the community name
  11. Describe each of the two types of community names
    Read-community that is read only, Write-community that allows the manager to remotely change configuration information from the mgmt station or server.
  12. What do the two hierarchies provided by the CIM describe?
    Physical hierarchies describe real world components, logical hierarchies are visible through network protocols
  13. What are the three methods for creating a representation of a network topology within the domain managers repository?
    Auto-discovery, manual discovery, topology import
  14. What are the 3 main components of SMARTS?
    Domain manager, broker, clients
  15. List the 5 different map types that can be accessed through the map console
    physical connectivity, ip network connectivity, ip network membership, vlan connectivity, vlan membership
  16. What is the primary console in smarts and what does it display?
    Monitoring console; it is used to display the reqults of the domain managers correlation alarms
  17. Briefly describe the differences between the two types of polling used by smarts to gather information
    fault and performance data is collected using SNMP while device connectivity is monitored using CMP
  18. What two factors determine if a SMARTS map is opened with r/w or r/o access?
    only one user can have a specific map opened with r/w access at any one time. You can use file system (FAT or NTFS) to purposely allow specific users to r/w or r/o access to a map by setting permission to the files
  19. What are the 3 types of notifications used in smarts
    problem, compound event, symptomatic event
  20. List eight of the objects that can be tracked through the windows perf monitor
    browser, cache, icmp, ip, memory, NIC, paging file, physical disk, processor, tcp, thread, telephony
  21. What are the primary capabilities provided by a protocol analyzer?
    Digital network diagnostics and developing communications software
  22. what is the difference between a protocol analyzer nic and other nics?
    one caps all frames, the other caps only broadcasts and frames with its ip addy
  23. what is the minimum amount of time recommended to capture network info to establish a baseline?
    24 hours
  24. What function of the protocol analyzer excludes specific types of frames?
    The capture filters option allows you to display and store only the data you are interested in analyzing. You may also use a capture filte to exclude specific types of frames.
  25. List 4 types of specific occurrences that can be displayed by counters in the protocol analyzer
    packets transmitted, crc errors, under/oversized packets, arp requests, data frame collisions, bit errors
  26. On the protocol analyzer, what menu is best used to report errors that occur at the physical layer such as bad fcs, short frames, and jabbers?
    MAC node statistics
  27. On the protocol analyzer, what kind of information does the connection statistics menu provide?
    information concerning the bandwidth utilization and the number of connections that are related to specific nodes
  28. what are the 3 types of active tests conducted with a prot analyzer?
    ping, traceroute, traffic generator