When are SNMP traps sent?
A. When the SNMP manager wants to perform remote
configuration on a networking device
B. When an SNMP agent wants to inform the SNMP manager about
a change of state on the networking device
C. When the SNMP manager wants to access large chunks of data
D. When the NMS wants to share trap information
Answers were Sorted based on User's Feedback
Answer / guest
Answer: B
SNMP traps are sent when an SNMP agent wants to inform the
SNMP manager about a change of state on the networking device.
| Is This Answer Correct ? | 3 Yes | 0 No |
Answer / prakash
When an SNMP agent wants to inform the SNMP manager about
a change of state on the networking device
| Is This Answer Correct ? | 1 Yes | 0 No |
How does the Spanning Tree Protocol (STP) prevent bridging loops? A. By not allowing any redundant paths within the network B. By calculating the metrics of each path C. By detecting and logically blocking redundant paths from the network D. By creating virtual LANS
What is the technique used by a router that can automatically initiate and close a circuit-switched session? A. PLP B. LAPP C. ASN.1 D. DDR
What type of address is analyzed by a Layer 2 switch? A. network address B. MAC and network address C. Protocol type, MAC, and network address D. MAC address
In which category should Frame Relay be placed within the following Job Aid? Name of Protocol Type of Protocol # of Users # of Hosts or Servers Comments
The following are examples of proactive network management except: A. Allocate sufficient staff time B. Troubleshooting and solving system problems C. Generate reports D. Identify Problems
What are the three commonly used methods of flow control used for handling network congestion? A. Buffering B. Source-quench messages C. Error checking D. Windowing
Which of the following three sets of IP addresses and subnet masks are private IP addresses? A. 10.0.0.0 255.0.0.0 B. 172.16.0.0 255.255.0.0 C. 172.16.0.0 255.240.0.0 D. 192.168.0.0 255.255.0.0
A remote user needs a static IP address to support a specific application.Which remote access VPN addressing technique supports this ?
It is not necessary to build an entire network to prove your network design. A. True B. False
6. Which of these statements best describes VPLS ?
What network design is becoming common when there is a central office with one or more remote locations? A. ISDN PRI at the central location and ISDN BRI at the remote locations. B. Using core routers at all sites C. Only using access routers D. Using a full mesh network
Which of the following three protocols replace SDLC? A. 802.2 B. HDLC C. QLLC D. X.25