Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


When are SNMP traps sent?

A. When the SNMP manager wants to perform remote
configuration on a networking device

B. When an SNMP agent wants to inform the SNMP manager about
a change of state on the networking device

C. When the SNMP manager wants to access large chunks of data

D. When the NMS wants to share trap information

Answers were Sorted based on User's Feedback



When are SNMP traps sent? A. When the SNMP manager wants to perform remote configuration on a ne..

Answer / guest

Answer: B

SNMP traps are sent when an SNMP agent wants to inform the
SNMP manager about a change of state on the networking device.

Is This Answer Correct ?    3 Yes 0 No

When are SNMP traps sent? A. When the SNMP manager wants to perform remote configuration on a ne..

Answer / prakash

When an SNMP agent wants to inform the SNMP manager about
a change of state on the networking device

Is This Answer Correct ?    1 Yes 0 No

Post New Answer

More CCDA Interview Questions

How does the Spanning Tree Protocol (STP) prevent bridging loops? A. By not allowing any redundant paths within the network B. By calculating the metrics of each path C. By detecting and logically blocking redundant paths from the network D. By creating virtual LANS

3 Answers   HCL,


What is the technique used by a router that can automatically initiate and close a circuit-switched session? A. PLP B. LAPP C. ASN.1 D. DDR

1 Answers  


What type of address is analyzed by a Layer 2 switch? A. network address B. MAC and network address C. Protocol type, MAC, and network address D. MAC address

2 Answers  


In which category should Frame Relay be placed within the following Job Aid? Name of Protocol Type of Protocol # of Users # of Hosts or Servers Comments

1 Answers  


The following are examples of proactive network management except: A. Allocate sufficient staff time B. Troubleshooting and solving system problems C. Generate reports D. Identify Problems

1 Answers  


What are the three commonly used methods of flow control used for handling network congestion? A. Buffering B. Source-quench messages C. Error checking D. Windowing

1 Answers   Cisco,


Which of the following three sets of IP addresses and subnet masks are private IP addresses? A. 10.0.0.0 255.0.0.0 B. 172.16.0.0 255.255.0.0 C. 172.16.0.0 255.240.0.0 D. 192.168.0.0 255.255.0.0

1 Answers  


A remote user needs a static IP address to support a specific application.Which remote access VPN addressing technique supports this ?

2 Answers   Pari Networks,


It is not necessary to build an entire network to prove your network design. A. True B. False

1 Answers  


6. Which of these statements best describes VPLS ?

1 Answers   Pari Networks,


What network design is becoming common when there is a central office with one or more remote locations? A. ISDN PRI at the central location and ISDN BRI at the remote locations. B. Using core routers at all sites C. Only using access routers D. Using a full mesh network

1 Answers  


Which of the following three protocols replace SDLC? A. 802.2 B. HDLC C. QLLC D. X.25

1 Answers  


Categories