Goals of network management

Assignment Help Computer Networking
Reference no: EM13753231

Part A:

1. Which is not a discipline that best describes the functional parts of network management?

Network management

System management

Application management

Both network and application management

Protocol management

2. One of the main goals of network management is to make operations more efficient and operators more _____.

Efficient

Secure

Productive

Stable

knowledgeable

3. Which is not one of the four steps of the management life cycle?

Operate

Decommission

Plan

Optimize

None of the above

4. In the network management system, OID identifies unique objects in the _____.

MIB database

NMS query agent

NMS response

5. Which is not a part of all management agents?

The MIB

Core agent logic

Management interface

XML

Both core agent logic and XML

6. One of the key words found in the definition of network management is administration. Select the best definition of administration from the following choices.

Keeping the network up and running smoothly

Performing repairs and upgrades and taking corrective and preventive proactive measures to make the network run better

Configuring resources in the network to support a given service

Keeping track of resources in the network and how they are assigned

None of the above

7. Select the name of the language used in conjunction with the common management information protocol (CMIP).

Common information model (CIM)

Managed object format (MOF)

Structure of management information (SMI)

Abstract syntax notation version 1 (ASN.1)

Guidelines for the definition of managed objects (GDMO)

8. Which item is not one of the benefits of network discovery?

Inventory records possibly not being accurate

Performs backup and restore operations

Mitigates surprises to service providers and network operators

Provides up-to-date records on changes made by personnel in the network

Provides a more effective way to discover network devices

9. Which is not one of the reasons why polling a managed device for operational data and state information is generally done?

Troubleshooting

Device viewing

Diagnostics

Device update

None of the above

10. Which is not one of the events in network management event taxonomy?

Fault alerts

Configuration-change events

Threshold-crossing alerts

Informational events

Logging events

Part B:
1. Select the best features for an operational support system designed to assist users who must sift through large volumes of management information.

Visual highlighting of information that seems out of the ordinary

Graphical representation of large data sets-diagrams and curves to visualize trends

Functions to sort, search, and filter information according to a wide variety of criteria

None of the above

All of the above

2. Select the ways in which an effective network management system contributes to network availability.

Reducing errors made by network operators and administrators, ensuring that network devices are properly configured, spotting and resolving troubles quickly, identifying top talkers on the network

Reducing errors made by network operators and administrators, ensuring that network devices are properly configured, spotting and resolving troubles quickly

Reducing errors made by ensuring that network devices are properly configured, spotting and resolving troubles quickly, identifying top talkers on the network

Reducing errors made by network operators and administrators, ensuring that network devices are properly configured, identifying top talkers on the network

Reducing errors made by network operators and administrators, identifying top talkers on the network

3. A cost-effective way for allowing management applications to scale consists of which technique?

Serialize application requests.

Reduce the number of hosts running the application.

Amortize cost of the operations support infrastructure.

Centralize the application in the operations support center.

Distribute the application across multiple hosts.

4. Select the best answer from the list below that captures the essence of an effective network management system.

Provides a foundation for determining when maintenance must be scheduled, provides a basis for determining where investment will have the biggest impact, provides a basis for developing ROI models

Helps determine where to direct investment into network management technology, provides a foundation for determining when maintenance must be scheduled, provides a basis for developing ROI models.

Helps determine where to direct investment into network management technology, provides a basis for determining where investment will have the biggest impact, provides a basis for developing ROI models.

Helps determine where to direct investment into network management technology, provides a foundation for determining when maintenance must be scheduled, provides a basis for determining where investment will have the biggest impact

Helps determine where to direct investment into network management technology, provides a foundation for determining when maintenance must be scheduled, provides a basis for determining where investment will have the biggest impact, provides a basis for developing ROI models

5. Which gives the best definition of MTBF?

A classical measure of reliability that gives an indication of how often a service or device becomes unavailable

Percentage of time during which a service is functioning properly

Time from service order to service activation

Customer defections from slow order fulfillment and lack of consistent quality

A classical measure for indicating how long it takes for services that are impacted by failures to be restored

6. Which two methods for integrating management systems will a network service provider and an enterprise-size business usually rely upon?

Purchase a custom off-the-shelf software package; interact with a custom development project and contract with a systems integrator

Perform a custom development project internally; contract with a systems integrator

Purchase a custom off-the-shelf software package; contract with a systems integrator

Contract with a systems integrator; purchase a custom off-the-shelf software package and write middleware and scripts to link the systems together

Write middleware and scripts to link systems together; purchase a custom off-the-shelf software package

7. Select the two types of policies (choose from goals, rules, plans, or requests) that can be distinguished in network management systems.

Policy goals and policy requests

Policy rules and policy plans

Policy plans and policy requests

Policy goals and policy rules

Policy rules and policy requests

8. Select the definition for the network management term known as management mediation.

Translating between managed systems and the management information base (MIB) due to the differences in management protocols

Translating between managing and managed systems due to the differences in protocols and services within the same manager level

Translating between managing and managed systems due to the differences in system appliances only

Translating between managing and managed systems due to the differences in protocols, services, and management information between hierarchical management layers

Translating between managing and managed systems due to the differences in software applications only

9. Which is not one of the management layer primitives that are found in most management protocols and that form the basis of management communication patterns between manager-agent relationships?

Action primitives

Write primitives

Update primitives

Event-reporting primitives

Read primitives

10. Which type of event typically requires management attention in a network management system?

A configuration change alert

A threshold-crossing alert

A syslog message alert

An alarm event

An operator activity alert

Reference no: EM13753231

Questions Cloud

How can ehr systems reduce cost and increase quality of care : How can EHR systems reduce cost and increase quality of care and Why has EHR adoption been so slow? Why did the early systems fail
Prepare a business plan for an it firm : Prepare a business plan for an IT Firm
Feature of object-oriented programming : Use the Internet or Strayer databases to research the advantages, features, and common examples of OOP and EDP. Describe at least one (1) feature of object-oriented programming that Visual Logic lacks
Explain each of the following mis tps dss and ai : Information systems typically support different work models. Define each of the following: MIS, TPS, DSS, and AI
Goals of network management : One of the main goals of network management is to make operations more efficient and operators more
Write a paper about new law of cubas real-estate permission : Write a 6 page paper, with information about the new Law that has been set about Cuba's Real-estate Permission and how they are Finally allowed to sell and rent out property.
Information assets to be evaluated for risk management : If an organization has three information assets to be evaluated for risk management, as shown in the data below, which vulnerability should be evaluated for additional controls first? Which one should be evaluated last
Why do we need care-of address : Calculate the Sum, Wrapped Sum and Checksum from the following header values. a. Version number = 4, Header Length = 12, Service Type = 0, Total Length = 28 b. Identification = 56781, Flags = reset, Fragmentation offset = 0
Describe their information management system : The paper is on Walmart. Describe their information management system (IMS). Does their IMS give them a competitive advantage over their competition

Reviews

Write a Review

Computer Networking Questions & Answers

  Explaining pretty good privacy and s-mime

It is essential to encrypt it, by using solutions like PGP (Pretty Good Privacy), S/MIME (Secure Multi-Purpose Internet Message Exchange), and steganography. Research these different mechanisms.

  How rsa algorithm implemented if private key is unknown

What if private key is unknown? how would rsa algorithm be implemented then? Assume we have the algorithm which knows public key it is able to decrypt small amount of messages?

  Case study - diane the consultant

Construct a diagram using Rationale to map the arguments about a moral claim that you have identified in the article/case study:

  Advantage of deterministic local area network protocol

State the primary advantage of a deterministic local area network protocol over a nondeterministic local area network protocol.Give a real-life example of this advantage.

  Create duplicate scenarios-modify interarrival for ethernet

Create several duplicate scenarios and modify the interarrival times for all the Ethernet stations to 0.0008, 0.002, 0.003, 0.005, and 0.006, respectively.

  You are working with your supplier to identify ways to

you are working with your supplier to identify ways to reduce the variation in the seal strength of packages

  Describe the imap protocol

List and illustrate 5 RFCs that describe the IMAP protocol. Print and read the first two pages of one of these RFCs.

  You are working as the network administrator in abc

you are working as the network administrator in abc technologies. your companys network has been experiencing many

  Implement client and server programs on bank atm application

Implement client and server programs on bank ATM application. Give error checking if amount is legal and userID/password (created in the 1st time).

  Discuss core technology design

You have been hired as a network consultant by an organization called Dwight Motors. Your job is to recommend an elegant solution to support their needs and to address their current problems. The IT manager of Dwight motors wants you to be aware o..

  Networking solution - wan communications between sites

The management team would like a networking solution which would offer easier troubleshooting, less down time, and WAN Communications between sites. They would like t he WAN Connections to support 256 Kbps of data and several telephone conversatio..

  Problems-mix statically and dynamically assigned addresses

Describe what types of problems could result from having a mix statically and dynamically assigned addresses on the same network.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd