Network management architecture is

Assignment Help Computer Networking
Reference no: EM13755301

Question 1. A MANAGED device is a.

  • type of macrovirus.
  • Piece of equipment that resides on a MANAGED network.
  • used in a call-back modem.
  • a program that records all LAN messages received for later (unauthorized) analysis.
  • secure hub program.

Question 2. The goal of _____ is to control access to network resources according to some well-defined policy.

  • Security MANAGEMENT
  • control spreadsheet
  • IDS
  • anti-virus software
  • prevention controls

Question 3. ____ are all reasons that network administrators might benefit from having network MANAGEMENT tools..

  • network cloaking device
  • backup punch card reader
  • Detecting failure in a interface card, host monitoring, and intrusion detection
  • service level agreement
  • help desk

Question 4. The third piece of network MANAGEMENT architecture is?

  • An analyst develops cost estimates of the circuits needed to support the network.
  • the network MANAGEMENT protocol.
  • An analyst meets with users to identify user needs.
  • An analyst develops a precise estimate of the amount of data that users will send and receive to estimate the total amount of traffic on each part of the network.
  • An analyst designs the circuits to support the estimated traffic, allowing for modest growth.

Question 5. Is one of two important network MANAGEMENT standards created by the ISO?

  • CMISE/CMIP
  • Needs analysis
  • Narrow and deep analysis
  • Cost assessment
  • Distribution layering

Question 6. Which of the following is a protocol that might be considered in network MANAGEMENT design?

  • SNMP
  • 10 Mbps
  • 100 Mbps
  • WAN
  • SNA

Question 7. Which of the following is a term for the process of ensuring that the network is operating as efficiently as possible?

  • Firefighting
  • Fault tolerance
  • Fault management
  • Performance management
  • Troubleshooting

Question 8. The ____ has been busy standardizing the MIB modules associated networking equipment?

  • IETF
  • Planning
  • Organizing activities
  • Directing activities
  • Controlling activities

Question 9. _____ is a network management protocol that has matured through three revisions.

  • MTTDiagnose
  • MTTRespond
  • MTTRepair
  • MTTFix
  • SNMP

Question 10. Which of the following refers to MANAGING and documenting the network's hardware and software configuration?

  • Visioning
  • Troubleshooting
  • Firefighting
  • Configuration management
  • Implementation Delete message

Reference no: EM13755301

Questions Cloud

Explain why shared accounts is considered bad practice : In your own words, explain why each of the following is considered bad practice:
What friedan mean by phrase the problem that has no name : What does Friedan mean by the phrase "the problem that has no name"? What kinds of women seem to be excluded from her account of the problem?
Large portfolio of debt and equity securities as investment : Addison Manufacturing holds a large portfolio of debt and equity securities as an investment. The fair value of the portfolio is greater than its original cost, even though some securities have decreased in value. Will classifying the portfolio as ea..
Distinction between input and output lines : How many cross points would be required if there were no distinction between input and output lines (i.e., if any line could be interconnected to any other line serviced by the crossbar)?
Network management architecture is : The third piece of network MANAGEMENT architecture is?
Role of healthcare marketing in an hcos : What is the role of healthcare marketing in an HCO's strategic planning process? Provide an example. Be sure to identify and discuss basic marketing elements. Be sure to discuss why effective communication is paramount in getting the right message..
Occur during inflation of the airbag are complete : 2) What is the maximum size of airbag (in litres) that can be inflated using 100 g of NaN3 at 25.0 °C and 101 kPa? Assume that all of the chemical reactions that occur during inflation of the airbag are complete.
The employer payroll taxes are recorded separately : Total payroll was $472,500, of which $157,700 is exempt from Social Security tax because it represented amounts paid in excess of $106,800 to certain employees. The amount paid to employees in excess of $7,000 was $403,100. Income taxes in the amount..
Describing the data types : Create a 10-12 slide presentation describing the data types

Reviews

Write a Review

Computer Networking Questions & Answers

  Explaining the approaches to acknowledge packets

In second strategy, packets are not acknowledged individually, but the whole file is acknowledged when it arrives. Explain the two approaches.

  Suggest network design to support requirements of company

Suggest network design to support requirements of Silfinate Company following this move. Give your colleagues with feedback on their designs.

  Process by which ip addresses are assigned to computers

How would you control the process by which IP addresses are assigned to individual computers? You will have to make some assumptions to answer both questions, so be sure to state your assumptions."

  Network design and simulation tests

Write and submit a project report that comments all tasks of this project. submit a Cisco packet tracer file that contains your network design and simulation tests.

  Which access method is used by ethernet

Calculate the minimum length of time it would take to download a 20MByte document from a workstation to a server across each of the following networks.  This means you will have to convert bytes to bits.

  What was the most important aspect of the csiro patent

Investigate the history of the CSIRO Wifi patent which was recently up-held in courts in the United States. This patent covers significant aspects of the OFDM implementation which is used in modern Wifi devices.

  How do you recommend upgrading this network

How do you recommend upgrading this network and what interconnecting devices will you use, and what benefit will you get from using these devices?

  How do you patch a linux server

How do you patch a Linux server? Using the Internet, research ways that Linux computers are patched. Explain how these procedures differ from patching Windows.

  Define the s-t cut on node capacitated network

How would one define the s-t cut on node capacitated network as opposed to the edge capacitated network, and how would one illustrate that analogue.

  Data communication could you give me some ideas of every

could you give me some ideas of every questions of this assignmentor can you recommend some reading materials to

  Analyze network security threats and vulnerabilities

Given the need for secure, online business communications, analyze network security threats and vulnerabilities and design network security solutions

  Bob has a host computer with an ip address of 100110024

bob has a host computer with an ip address of 10.0.1.10024 with a default gateway of 10. host network is connected to

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd