InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
What Is The Agent? |
|
Answer» The agent runs off of each node on the network. Many UNIX SOFTWARE vendors include this with their TERMINAL software. It COLLECTS network and terminal information as specified in the MIB. Many public domain agaents are available (most notable the CMU agent). A common PROGRAMMING JOB is extending an agent to accomplish the specific needs of your network and this task is fairly straightforward given the right resources. The agent runs off of each node on the network. Many UNIX software vendors include this with their terminal software. It collects network and terminal information as specified in the MIB. Many public domain agaents are available (most notable the CMU agent). A common programming job is extending an agent to accomplish the specific needs of your network and this task is fairly straightforward given the right resources. |
|
| 2. |
What Are Mibs, And How Are They Accessed? |
|
Answer» A Management INFORMATION Base (MIB) is a COLLECTION of information that is organized hierarchically. MIBs are accessed using a network-management PROTOCOL such as SNMP. They are comprised of MANAGED objects and are identified by object identifiers. A Management Information Base (MIB) is a collection of information that is organized hierarchically. MIBs are accessed using a network-management protocol such as SNMP. They are comprised of managed objects and are identified by object identifiers. |
|
| 3. |
How Common Is Tcp/ip? |
|
Answer» TCP/IP is very common. As EXPLAINED above, if you use "telnet" or "ftp" then you are using the TCP/IP COMMUNICATION STACK. It is so common, that MANY companies offer TCP/IP PC software for very low prices. TCP/IP is very common. As explained above, if you use "telnet" or "ftp" then you are using the TCP/IP communication stack. It is so common, that many companies offer TCP/IP PC software for very low prices. |
|
| 4. |
What Is The Tcp/ip Communication Stack? |
|
Answer» As STATED in the network management document, SNMP RUNS under the TCP/IP COMMUNICATION stack (it's a layer 7 application). The TCP/IP stack is a way in which vendor-inspecific computer networks can communicate. For instance, say my LAN of BRAND X's computers uses communication protocol XX to communicate. If I wanted to create a WAN with by connecting my LAN to a friend's LAN of brand Y computers (that use communication protocol YY to communicate; then I would have a problem... for how could protocol XX talk to protocol YY. This is where TCP/IP steps in, providing a common communication protocol between LAN's.
As stated in the network management document, SNMP runs under the TCP/IP communication stack (it's a layer 7 application). The TCP/IP stack is a way in which vendor-inspecific computer networks can communicate. For instance, say my LAN of brand X's computers uses communication protocol XX to communicate. If I wanted to create a WAN with by connecting my LAN to a friend's LAN of brand Y computers (that use communication protocol YY to communicate; then I would have a problem... for how could protocol XX talk to protocol YY. This is where TCP/IP steps in, providing a common communication protocol between LAN's.
|
|
| 5. |
How Do I Implement Snmp On My Network? |
|
Answer» The first step is to implement the TCP/IP communication stack. This may appear on your network software (I know its on Windows NT) or you may have to purchase a TCP/IP stack implementation. Usually implementing TCP/IP involves giving each node on your network a DISTINCT IP address. "Telnet" is a key component of TCP/IP. If you can USE "telnet" on your network then you are running TCP/IP and you have nothing to worry about. The first step is to implement the TCP/IP communication stack. This may appear on your network software (I know its on Windows NT) or you may have to purchase a TCP/IP stack implementation. Usually implementing TCP/IP involves giving each node on your network a distinct IP address. "Telnet" is a key component of TCP/IP. If you can use "telnet" on your network then you are running TCP/IP and you have nothing to worry about. |
|
| 6. |
What Are Different Snmp Versions? |
|
Answer» Here are different VERSIONS of SNMP - SNMP V1, SNMP V2C, and SNMP V3. Here are different versions of SNMP - SNMP V1, SNMP V2c, and SNMP V3. |
|
| 7. |
Explain Mib? |
|
Answer» MIB is a hierarchical Database Structure for INFORMATION on the DEVICE. Example - Serial numbers are in a specific LOCATION, NIC Statistics etc. MIB is a hierarchical Database Structure for information on the device. Example - Serial numbers are in a specific location, NIC Statistics etc. |
|
| 8. |
Which Ports Are Used In Snmp? |
|
Answer» SNMP uses the UDP port 161 for SENDING and receiving REQUESTS, and port 162 for receiving traps from managed devices. SNMP uses the UDP port 161 for sending and receiving requests, and port 162 for receiving traps from managed devices. |
|
| 9. |
What Are The Components Of Snmp? |
|
Answer» A COMPLETE SNMP system consists of the FOLLOWING parts:- A complete SNMP system consists of the following parts:- |
|
| 10. |
The Protocols Found In Network Layer Are |
|
Answer» PROTOCOLS TCP/IP is used to CONFIGURE windows OPERATING System which is abrreviated as Transmission Control Protocol for transmitting DATA from one system to another. Protocols TCP/IP is used to configure windows Operating System which is abrreviated as Transmission Control Protocol for transmitting data from one system to another. |
|
| 12. |
Which Switching Technology Reduces The Size Of A Broadcast Domain? |
|
Answer» By using VLAN technology we can reduces the SIZE of BROADCAST DOMAIN. By using VLAN technology we can reduces the size of broadcast domain. |
|
| 13. |
Why It Is Important To De Fragment Disks In Computer? |
|
Answer» Defragmentation is smiple says bring the data at once PLACE in the DRIVE....when we copied or save a file it save on different sectors on the drive when U browse for the file it will search every sector id (for every sector we have an id).when defragmentation done all the data bring UPTO ONE part and it will take less time to reterive the data... Defragmentation is smiple says bring the data at once place in the drive....when we copied or save a file it save on different sectors on the drive when u browse for the file it will search every sector id (for every sector we have an id).when defragmentation done all the data bring upto one part and it will take less time to reterive the data... |
|
| 14. |
How To Set A Local Net? |
|
Answer» IIS used for Browsing Intranet IIS used for Browsing Intranet |
|
| 15. |
How Does Any Network Vendor Decide To Go For Nms Or Ems? |
|
Answer» An element management system (EMS) manages one or more of a specific type of NETWORK elements (NES). Using an EMS a user can manage all the features of each NE individually, but not the communication between NEs.Communication between NEs is managed by the network management system (NMS).A network management system is a combination of hardware and software used to monitor and administer a network.Network management refers to the maintenance and administration of large scale computer networks at the top level. An element management system (EMS) manages one or more of a specific type of network elements (NEs). Using an EMS a user can manage all the features of each NE individually, but not the communication between NEs.Communication between NEs is managed by the network management system (NMS).A network management system is a combination of hardware and software used to monitor and administer a network.Network management refers to the maintenance and administration of large scale computer networks at the top level. |
|
| 16. |
What Does The Mib Do? |
|
Answer» MANAGEMENT information is VIEWED as a COLLECTION of MANAGED OBJECTS information store in a Base is called MIB Management information is viewed as a collection of managed objects information store in a Base is called MIB |
|
| 17. |
Net Working Is What? |
|
Answer» It is connection between two or more COMPUTER or DEVICES through the transmission media for the purpose of COMMUNICATION and ACCESSING resources is called network and the whole process is called NETWORKING. It is connection between two or more computer or devices through the transmission media for the purpose of communication and accessing resources is called network and the whole process is called networking. |
|
| 18. |
Explain Networking? |
|
Answer» Networking is defined as connectivity between peers inside network and outside network.Inside network connectivity in Networking topology is known as Lan and outside Network connectivity is called as WAN.Lan Is defined as Local Area Network between peer systems and Wan is defined as Wide Area Network between Lan to a Lan in different Location and this connectivity of lan in different locations is defined as WAN.Networking is depends on OSI layer which is defined as OPen System Internetworking.In OSI Layer data is reached to destination from source passing all the 7 LAYERS of OSI layer and these 7 layers were on EITHER side of network and they are defined as
Networking is defined as connectivity between peers inside network and outside network.Inside network connectivity in Networking topology is known as Lan and outside Network connectivity is called as WAN.Lan Is defined as Local Area Network between peer systems and Wan is defined as Wide Area Network between Lan to a Lan in different Location and this connectivity of lan in different locations is defined as WAN.Networking is depends on OSI layer which is defined as OPen System Internetworking.In OSI Layer data is reached to destination from source passing all the 7 layers of OSI layer and these 7 layers were on either side of network and they are defined as |
|
| 19. |
Memory That Is Paged Out To The Hardware Is Known As |
|
Answer» its CACHE memory. A CPU cache is a cache used by the central PROCESSING unit of a computer to reduce the average time to access memory.The cache is a smaller, faster memory which STORES copies of the data from the most frequently used main memory locations. As long as most memory accesses are to CACHED memory locations, the average latency of memory accesses will be closer to the cache latency than to the latency of main memory. its cache memory. A CPU cache is a cache used by the central processing unit of a computer to reduce the average time to access memory.The cache is a smaller, faster memory which stores copies of the data from the most frequently used main memory locations. As long as most memory accesses are to cached memory locations, the average latency of memory accesses will be closer to the cache latency than to the latency of main memory. |
|
| 20. |
What Is Data Com? How It Works, What Is Difference Between Datacom And Telecom? |
|
Answer» This the communication between computer systems or devices. A computer network is any set of computers or devices connected to each other with the ability to exchange data. This the communication between computer systems or devices. A computer network is any set of computers or devices connected to each other with the ability to exchange data. |
|
| 21. |
How Can I Make My Server A Domain? |
|
Answer» creating DAEMON is very simple in Linux. you just need to create a child process from its parent process and KILL the parent process. ALSO you should close all the I/O streams.[as daemon is a BACKGROUND process which is not interactive in nature].latter on you can write a init SCRIPT in /etc/init.d/ to make it a service. creating daemon is very simple in Linux. you just need to create a child process from its parent process and kill the parent process. also you should close all the I/O streams.[as daemon is a background process which is not interactive in nature].latter on you can write a init script in /etc/init.d/ to make it a service. |
|
| 22. |
What Is The Use Of Proxy In Snmp. Does It Require Only When The Network Has Snmpv1 And Snmpv2? |
|
Answer» Proxy can be defined as an intermediately device, which plays the role of an agent in the Context of SNMP.It works as a VIRTUAL LAN to the Devices Which are not having an Ethernet Inerface,Like MODEMS and Multiplexers. Proxy can be defined as an intermediately device, which plays the role of an agent in the Context of SNMP.It works as a Virtual LAN to the Devices Which are not having an Ethernet Inerface,Like MODEMS and Multiplexers. |
|
| 23. |
What Is An Agent Or Snmp Agent? |
|
Answer» SNMP AGENT is a management software which runs inside the managed device ie., NETWORK element. SNMP Agent is a management software which runs inside the managed device ie., Network element. |
|
| 24. |
What Is A Managed Device? |
|
Answer» Managed Device is a NETWORK element/device which has the SNMP Agent running in it. Managed Device is a Network element/device which has the SNMP Agent running in it. |
|
| 25. |
What Is A Mib? |
|
Answer» MIB is the ACRONYM for Management INFORMATION Base. MIB is the acronym for Management Information Base. |
|
| 26. |
What Are The Basic Commands In Snmp? |
|
Answer» The BASIC commands in SNMP are, The basic commands in SNMP are, |
|
| 27. |
What Is Snmp Get Request? |
|
Answer» SNMP GET Request is a Read operation on the Managed Device. SNMP GET Request is a Read operation on the Managed Device. |
|
| 28. |
What Is Snmp Get-next Request? |
|
Answer» The SNMP GET NEXT Request is same as Get Request operation. It is USED to RETRIEVE the value of the next OID value in the MIB hierarchy. The SNMP GET NEXT Request is same as Get Request operation. It is used to retrieve the value of the next OID value in the MIB hierarchy. |
|
| 29. |
What Is Get Bulk Request? |
|
Answer» GET BULK REQUEST is used to retrieve large amount of DATA from the MIB objects. GET BULK Request is used to retrieve large amount of data from the MIB objects. |
|
| 30. |
What Is Snmp Set Request? |
|
Answer» SET Request is a WRITE operation on the Managed DEVICE. SET Request is a Write operation on the Managed Device. |
|
| 31. |
What Is Snmp Trap? |
|
Answer» SNMP TRAP is a type of Asynchronous NOTIFICATION propagated from the Managed Device to the NETWORK Management System. SNMP TRAP is a type of Asynchronous Notification propagated from the Managed Device to the Network Management System. |
|
| 32. |
What Is Inform? |
|
Answer» SNMP INFORM is similar to Traps but is more reliable.
SNMP INFORM is similar to Traps but is more reliable.
|
|
| 33. |
What Is Snmpv2? |
Answer»
|
|
| 34. |
What Are The Types Of Smi Information Modules? |
|
Answer» Information MODULES are included in SNMPV2 and above. There are 3 types of SMI information modules, which are MIB modules, compliance statements, and CAPABILITY statements.
Information Modules are included in SNMPV2 and above. There are 3 types of SMI information modules, which are MIB modules, compliance statements, and capability statements.
|
|
| 35. |
What Are The Type Of Managed Objects? |
|
Answer» There are TWO types of managed OBJECTS namely SCALAR and tabular. There are two types of managed objects namely scalar and tabular. |
|
| 36. |
What Is Smi? |
|
Answer» SMI Stands for Structure of MANAGEMENT Information, which defines the RULES for describing management information, using Abstract SYNTAX NOTATION ONE (ASN.1). SMI Stands for Structure of Management Information, which defines the rules for describing management information, using Abstract Syntax Notation One (ASN.1). |
|
| 37. |
What Is Oid Or Object Identifier? |
|
Answer» An object IDENTIFIER (or OID) uniquely IDENTIFIES a managed object in the MIB hierarchy. The MIB hierarchy can be represented as a tree with a nameless root, with various levels , which are ASSIGNED by different organizations. An object identifier (or OID) uniquely identifies a managed object in the MIB hierarchy. The MIB hierarchy can be represented as a tree with a nameless root, with various levels , which are assigned by different organizations. |
|