Network Management
Here you will find answers to Network Management Questions
Question 1
What are three valid methods of gathering information about an existing data network? (Choose three)
A. Use organizational input.
B. Perform a traffic analysis.
C. Analyze the user-mapping of a running application.
D. Perform a packet-level audit to verify carrier service guarantees.
E. Perform a network audit to gather more detail about the network.
F. Use reports that analyze the metrics of the customer’s existing network.
Answer: A B E
Question 2
Which of the following Cisco router services performs network traffic analysis to assist in documenting a customer’s existing network?
A. MRTG
B. NetMon
C. NetFlow
D. SNMP MIB compiler
Answer: C
Question 3
You are performing an audit of a customer’s existing network and need to obtain the following router information:
interfaces
running processes
IOS image being executed
Which command should you use?
A. show version
B. show tech-support
C. show startup-config
D. show running-config
E. show processes memory
Answer: B
Question 4
Which Cisco device management feature is most suited to metering network traffic and providing data for billing network usage?
A. BGP
B. Cisco Discovery Protocol
C. QoS
D. RMONĀ
E. NetFlow
Answer: E
Question 5
Which network management protocol allows a network device to have vendor-specific objects for management?
A. SNMPv1
B. SNMP v2
C. SNMP v3
D. MIB
E. RMON1
F. RMON2
Answer: D
Question 6
Which three sources does a network designer use to collect information for characterizing an existing network? (Choose three)
A. staff input
B. visual inventory
C. network audit
D. traffic analysis
E. server statistics
Answer: A C D
@ Question 5: Wrong answer in my opinion. A MIB is not a management protocol itself, but a Information Base used by SNMP.
@ Question 5 and the above post.
In Cisco Press CCDA 640-864 Official Cert Guide, 4th Ed, There is a question exactly like that.
Chapter 5 Q&A – Question 27:
27. Which protocol allows for vendor specific information?
a. SNMPv3
b. RMON2
c. ASN.1
d. CDP
e. MIB
Answer:
E. Private MIBs can be used for vendor specific information.
Question 17 aesnwr is :16. On what is Layer 3 switching fundamentally based? the ability to circumvent CPU processingL3 mostly uses TCAM tables which is hardware switching not using cpu..not access control!
if Q5 answer is wrong..what would be the correct answer.
All SNMP versions support MIB. E and F are definitely wrong. And because you can only pick one answer, I would also opt for MIB.
I think the question is poorly formulated…
Are all these questions still current?
Question 5.
Standard MIB are defined in various RFCs. For Example RFC 1213 defines the TCP/IP MIB. In addition to standard MIBs, there a private or vendor-specific MIB definitions. Vendors can obtain their own branch for the definition of their private MIB subtree and can create custom.managed objects under the branch