Which of the following is used to manage and monitor the
network?
A.) SNMP
B.) HTTP
C.) IP
D.) FTP
Answers were Sorted based on User's Feedback
Answer / guest
Answer: A
The Simple Network Management Protocol (SNMP) is used to
manage and
monitor traps.
| Is This Answer Correct ? | 2 Yes | 2 No |
Answer / rajni kant upadhyay
A.)SNMP is used to manage and monitor the networks.It is
basically used by the devlopvers working on Telecom VAS
domain.This protocol finds its extensive application when
any application has to be devloped for network related
issues by telecommuters.
| Is This Answer Correct ? | 2 Yes | 2 No |
SNMP Because it collects and manipulates this valuable
network infromation.
| Is This Answer Correct ? | 1 Yes | 1 No |
How does PPTP encapsulate data?
How signalling can be explained in D channel of ISDN?
Your network is having IP problems connecting to one or more Frame Relay peer routers. Which two commmands should you use to show the routers that are reachable? (Choose two) A. show ip map B. show ip router C. show frame-relay map D. debug frame-relay map
1 whatis te1,te2 and nt1 what is threre functions 2 what are the isdn protocols 3 whait is spid
What command displays a summary list of OSPF interfaces that includes a column for the cost of each interface?
What is the default IPX Ethernet encapsulation? A.) SNAP B.) Arpa C.) 802.2 D.) Novell-Ether E.) SAP
Which 3 statements describe default encapsulation and LMI type configuration? A.) There are only four encapsulations and 3 LMI type options B.) The LMI type config term options C.) In release 11.3 the LMI type is autosensed D.) The default LMI is Cisco E.) IETF encap must be configured unless the connecting routers are both cisco
What is the Network Layer of the OSI responsible for? A.) Bridging B.) Routing packets through an internetwork C.) Regenerating the digital signal D.) Gateway services
Identify the definition of demarcation? A.) Date in which the WAN service contract expires B.) Cabling which extends from the WAN service provider to the customer C.) Division of responsibility, where the CPE ends and the local loop begins D.) Equipment which is located at the customer premises
Identify 3 feature of access-lists? A.) Implicit deny will deny any packets not matched B.) Processed sequentially from bottom to top C.) Processed sequentially from top to bottom D.) If a packet is denied it would be tested against the remaining statements in the access-list E.) Once a match is made the packet is either denied or permitted F.) Enabled on all interfaces by default
Urgent reply plz donot have time to serch on google plz reply the questions is how to remove newfolder.exe virus from my windows 2003 server i have all ready tried quick heal.spy hunter mcafee server . plz reply
UDP works at which layer of the DOD model? A.) Internet B.) Host-to-Host C.) Transport D.) Data Link