1.
What is a community string?
Correct Answer
B. A value to be entered on both the network devices and management workstation to allow read / write access
Explanation
A community string is a value that needs to be entered on both the network devices and management workstation in order to allow read/write access. It serves as a form of authentication and authorization mechanism, ensuring that only authorized users can access and modify network devices. By entering the correct community string, users can gain the necessary privileges to perform various tasks such as monitoring and configuring network devices.
2.
SYSLOG typically uses TCP or UDP?
Correct Answer
B. UDP
Explanation
SYSLOG typically uses UDP (User Datagram Protocol) for transmitting log messages between network devices. UDP is a connectionless protocol that does not provide reliability or error checking, but it is faster and more efficient for transmitting small, non-critical data packets like log messages. TCP (Transmission Control Protocol) is a connection-oriented protocol that provides reliability and error checking, but it introduces more overhead and latency compared to UDP. ICMP (Internet Control Message Protocol) is used for network troubleshooting and diagnostic purposes, while GRE (Generic Routing Encapsulation) is a tunneling protocol used for encapsulating various network protocols.
3.
Spanning Tree is another form of Network Management for configuration?
Correct Answer
B. False
Explanation
The given statement is false. Spanning Tree is not a form of Network Management for configuration. Spanning Tree is a protocol used in computer networks to prevent loops in Ethernet networks. It helps in creating a loop-free logical topology by blocking redundant paths. Network Management, on the other hand, refers to the activities, methods, procedures, and tools used to operate, administer, and maintain a network infrastructure.
4.
SSH uses what port for management?
Correct Answer
D. 22
Explanation
SSH (Secure Shell) is a network protocol that allows secure remote management of devices. It uses port 22 for management. Port 23 is used for Telnet, a less secure protocol. Ports 20 and 21 are used for FTP (File Transfer Protocol), which is not related to SSH. Therefore, the correct answer is 22.
5.
SSL uses what source port when establishing a connection from a PC?
Correct Answer
B. Any port greater than 1024
Explanation
When establishing a connection from a PC, SSL (Secure Sockets Layer) uses any port greater than 1024. This is because ports below 1024 are considered well-known ports and are typically reserved for specific services, such as HTTP (port 80) or HTTPS (port 443). By using ports greater than 1024, SSL ensures that it does not conflict with any existing services and can establish secure connections without any issues.
6.
SNMP v2 provides what advantages over v1?
Correct Answer
A. 64 bit counter
Explanation
SNMP v2 provides the advantage of a 64-bit counter over v1. This allows for a larger range of values to be monitored and tracked, compared to the 32-bit counter in v1. The increased size of the counter enables more accurate measurement and monitoring of network traffic, system performance, and other variables. This enhancement in SNMP v2 allows for better scalability and flexibility in managing network devices and resources.
7.
What is an SSH fingerprint and how is it generated?
Correct Answer
B. MD5 hash of the remote devices public key
Explanation
An SSH fingerprint is a unique identifier for an SSH server. It is generated by taking the MD5 hash of the remote device's public key. This fingerprint is used to verify the authenticity of the server when connecting via SSH. It provides a way to ensure that the server you are connecting to is the same server you have connected to before and not a malicious imposter. The fingerprint is typically displayed in hexadecimal format and is generated on the client PC.
8.
A SYSLOG server is simpler than SNMP for management because?
Correct Answer
C. Both B and C
Explanation
A SYSLOG server is simpler than SNMP for management because it does not require authentication when sending logs and there is no requirement to set up an NMS workstation and vendor-specific MIBs. Additionally, the syslog server software is always available free of charge from the hardware vendor.
9.
SYSLOG uses what port for sending messages?
Correct Answer
C. 514
Explanation
SYSLOG uses port 514 for sending messages. SYSLOG is a standard protocol used for logging and sending system messages in a network. It allows devices to send log messages to a central SYSLOG server for storage and analysis. Port 514 is the default port assigned to SYSLOG for transmitting these messages.
10.
What is the purpose of the SYSLOG facility?
Correct Answer
D. To tag different groups of logs for sorting and possibly specific storage on the Syslog server
Explanation
The purpose of the SYSLOG facility is to tag different groups of logs for sorting and possibly specific storage on the Syslog server. This allows for easier organization and analysis of logs, as well as the ability to allocate specific storage resources for different types of logs. By tagging logs, administrators can easily identify and filter logs based on their assigned tags, making troubleshooting and monitoring more efficient.
11.
SNMP stands for?
Correct Answer
A. Simple Network Management Protocol
Explanation
SNMP stands for Simple Network Management Protocol. It is a widely used protocol for managing and monitoring network devices such as routers, switches, and servers. SNMP allows network administrators to collect information, set configuration parameters, and receive notifications about the performance and health of network devices. It provides a standardized way of managing network devices, making it easier to troubleshoot and maintain the network infrastructure.
12.
An SNMP MIB provides?
Correct Answer
A. Management Information Base containing vendor specific attributes
Explanation
An SNMP MIB provides a Management Information Base containing vendor specific attributes. This means that it stores information about network devices and their attributes, such as performance statistics, configuration settings, and status information. The MIB allows network administrators to monitor and manage these devices by providing a standardized way to access and retrieve this information. The vendor specific attributes refer to the additional information specific to the devices from different manufacturers, allowing for customization and flexibility in managing the network.
13.
SSL stands for?
Correct Answer
D. Secure Sockets Layer
Explanation
SSL stands for Secure Sockets Layer. It is a protocol that provides secure communication over the internet. SSL ensures that the data transmitted between a web server and a browser remains encrypted and cannot be intercepted by unauthorized individuals. It is commonly used to secure online transactions, such as credit card payments, and to protect sensitive information, such as login credentials.
14.
SSH stands for?
Correct Answer
B. Secure Shell
Explanation
SSH stands for Secure Shell. It is a cryptographic network protocol that provides secure communication between two systems over an unsecured network. It allows users to securely access and control remote systems and execute commands remotely. SSH uses encryption techniques to ensure the confidentiality and integrity of the data transmitted between the client and the server. It is commonly used for remote administration, file transfers, and tunneling services.
15.
SSL is an unsecure protocol.
Correct Answer
B. False
Explanation
SSL (Secure Sockets Layer) is a secure protocol used to establish an encrypted connection between a web server and a web browser. It ensures that the data transmitted between them remains confidential and cannot be easily intercepted by malicious actors. Therefore, the statement that SSL is an unsecure protocol is false. SSL is widely used to secure sensitive information such as passwords, credit card details, and personal data during online transactions, making it an essential component in ensuring online security.