Network Management (SNMP, Syslog, Ssh)

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Apalani
A
Apalani
Community Contributor
Quizzes Created: 17 | Total Attempts: 76,163
Questions: 15 | Attempts: 282

SettingsSettingsSettings
Network Management (SNMP, Syslog, Ssh) - Quiz

By IMS Asia (https://www. Imsasia. Com)


Questions and Answers
  • 1. 

    What is a community string?

    • A.

      Encrypted password

    • B.

      A value to be entered on both the network devices and management workstation to allow read / write access

    • C.

      Hex characters used to encrypt traffic between two network devices

    • D.

      Displayed to the user before entering a username and password for SSH Management

    Correct Answer
    B. A value to be entered on both the network devices and management workstation to allow read / write access
    Explanation
    A community string is a value that needs to be entered on both the network devices and management workstation in order to allow read/write access. It serves as a form of authentication and authorization mechanism, ensuring that only authorized users can access and modify network devices. By entering the correct community string, users can gain the necessary privileges to perform various tasks such as monitoring and configuring network devices.

    Rate this question:

  • 2. 

    SYSLOG typically uses TCP or UDP?

    • A.

      TCP

    • B.

      UDP

    • C.

      ICMP

    • D.

      GRE

    Correct Answer
    B. UDP
    Explanation
    SYSLOG typically uses UDP (User Datagram Protocol) for transmitting log messages between network devices. UDP is a connectionless protocol that does not provide reliability or error checking, but it is faster and more efficient for transmitting small, non-critical data packets like log messages. TCP (Transmission Control Protocol) is a connection-oriented protocol that provides reliability and error checking, but it introduces more overhead and latency compared to UDP. ICMP (Internet Control Message Protocol) is used for network troubleshooting and diagnostic purposes, while GRE (Generic Routing Encapsulation) is a tunneling protocol used for encapsulating various network protocols.

    Rate this question:

  • 3. 

    Spanning Tree is another form of Network Management for configuration?

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The given statement is false. Spanning Tree is not a form of Network Management for configuration. Spanning Tree is a protocol used in computer networks to prevent loops in Ethernet networks. It helps in creating a loop-free logical topology by blocking redundant paths. Network Management, on the other hand, refers to the activities, methods, procedures, and tools used to operate, administer, and maintain a network infrastructure.

    Rate this question:

  • 4. 

    SSH uses what port for management?

    • A.

      23

    • B.

      20

    • C.

      21

    • D.

      22

    Correct Answer
    D. 22
    Explanation
    SSH (Secure Shell) is a network protocol that allows secure remote management of devices. It uses port 22 for management. Port 23 is used for Telnet, a less secure protocol. Ports 20 and 21 are used for FTP (File Transfer Protocol), which is not related to SSH. Therefore, the correct answer is 22.

    Rate this question:

  • 5. 

    SSL uses what source port when establishing a connection from a PC?

    • A.

      443

    • B.

      Any port greater than 1024

    • C.

      Any port less than 1024

    • D.

      4443

    Correct Answer
    B. Any port greater than 1024
    Explanation
    When establishing a connection from a PC, SSL (Secure Sockets Layer) uses any port greater than 1024. This is because ports below 1024 are considered well-known ports and are typically reserved for specific services, such as HTTP (port 80) or HTTPS (port 443). By using ports greater than 1024, SSL ensures that it does not conflict with any existing services and can establish secure connections without any issues.

    Rate this question:

  • 6. 

    SNMP v2 provides what advantages over v1?

    • A.

      64 bit counter

    • B.

      32 bit counter

    • C.

      MIBs

    • D.

      Traps

    Correct Answer
    A. 64 bit counter
    Explanation
    SNMP v2 provides the advantage of a 64-bit counter over v1. This allows for a larger range of values to be monitored and tracked, compared to the 32-bit counter in v1. The increased size of the counter enables more accurate measurement and monitoring of network traffic, system performance, and other variables. This enhancement in SNMP v2 allows for better scalability and flexibility in managing network devices and resources.

    Rate this question:

  • 7. 

    What is an SSH fingerprint and how is it generated?

    • A.

      43:51:43:a1:b5:fc:8b:b7:0a:3a:a9:b1:0f:66:73:a8:11

    • B.

      MD5 hash of the remote devices public key

    • C.

      Remote devices public key displayed in hexidecimal

    • D.

      Generated on the client PC

    Correct Answer
    B. MD5 hash of the remote devices public key
    Explanation
    An SSH fingerprint is a unique identifier for an SSH server. It is generated by taking the MD5 hash of the remote device's public key. This fingerprint is used to verify the authenticity of the server when connecting via SSH. It provides a way to ensure that the server you are connecting to is the same server you have connected to before and not a malicious imposter. The fingerprint is typically displayed in hexadecimal format and is generated on the client PC.

    Rate this question:

  • 8. 

    A SYSLOG server is simpler than SNMP for management because?

    • A.

      The syslog server software is always available free of change from the hardware vendor

    • B.

      No authentication is requried when sending logs

    • C.

      Both B and C

    • D.

      No requirement to setup an NMS workstation and vendor specific MIBs

    Correct Answer
    C. Both B and C
    Explanation
    A SYSLOG server is simpler than SNMP for management because it does not require authentication when sending logs and there is no requirement to set up an NMS workstation and vendor-specific MIBs. Additionally, the syslog server software is always available free of charge from the hardware vendor.

    Rate this question:

  • 9. 

    SYSLOG uses what port for sending messages?

    • A.

      162

    • B.

      161

    • C.

      514

    • D.

      53

    Correct Answer
    C. 514
    Explanation
    SYSLOG uses port 514 for sending messages. SYSLOG is a standard protocol used for logging and sending system messages in a network. It allows devices to send log messages to a central SYSLOG server for storage and analysis. Port 514 is the default port assigned to SYSLOG for transmitting these messages.

    Rate this question:

  • 10. 

    What is the purpose of the SYSLOG facility?

    • A.

      To facilitate local logging of errors

    • B.

      Differing the types of logs that a device can generate from Local0 to Local7 = 8 types

    • C.

      The process that runs on the device creating the SYSLOG entries

    • D.

      To tag different groups of logs for sorting and possibly specific storage on the Syslog server

    Correct Answer
    D. To tag different groups of logs for sorting and possibly specific storage on the Syslog server
    Explanation
    The purpose of the SYSLOG facility is to tag different groups of logs for sorting and possibly specific storage on the Syslog server. This allows for easier organization and analysis of logs, as well as the ability to allocate specific storage resources for different types of logs. By tagging logs, administrators can easily identify and filter logs based on their assigned tags, making troubleshooting and monitoring more efficient.

    Rate this question:

  • 11. 

    SNMP stands for?

    • A.

      Simple Network Management Protocol

    • B.

      Simple Management Protocol

    • C.

      Slimline Networks Management Protocol

    • D.

      Slim Network Multicast Protocol

    Correct Answer
    A. Simple Network Management Protocol
    Explanation
    SNMP stands for Simple Network Management Protocol. It is a widely used protocol for managing and monitoring network devices such as routers, switches, and servers. SNMP allows network administrators to collect information, set configuration parameters, and receive notifications about the performance and health of network devices. It provides a standardized way of managing network devices, making it easier to troubleshoot and maintain the network infrastructure.

    Rate this question:

  • 12. 

    An SNMP MIB provides?

    • A.

      Management Information Base containing vendor specific attributes

    • B.

      Reliable protocol for the management of network devices

    • C.

      IP addresses of where to send traps

    • D.

      A GUI for management of network devices

    Correct Answer
    A. Management Information Base containing vendor specific attributes
    Explanation
    An SNMP MIB provides a Management Information Base containing vendor specific attributes. This means that it stores information about network devices and their attributes, such as performance statistics, configuration settings, and status information. The MIB allows network administrators to monitor and manage these devices by providing a standardized way to access and retrieve this information. The vendor specific attributes refer to the additional information specific to the devices from different manufacturers, allowing for customization and flexibility in managing the network.

    Rate this question:

  • 13. 

    SSL stands for?

    • A.

      Simple Security Layer

    • B.

      Https://

    • C.

      Secure Security Layer

    • D.

      Secure Sockets Layer

    Correct Answer
    D. Secure Sockets Layer
    Explanation
    SSL stands for Secure Sockets Layer. It is a protocol that provides secure communication over the internet. SSL ensures that the data transmitted between a web server and a browser remains encrypted and cannot be intercepted by unauthorized individuals. It is commonly used to secure online transactions, such as credit card payments, and to protect sensitive information, such as login credentials.

    Rate this question:

  • 14. 

    SSH stands for?

    • A.

      Secure Shell Host

    • B.

      Secure Shell

    • C.

      Simple Shell

    • D.

      Simple Secure Host

    Correct Answer
    B. Secure Shell
    Explanation
    SSH stands for Secure Shell. It is a cryptographic network protocol that provides secure communication between two systems over an unsecured network. It allows users to securely access and control remote systems and execute commands remotely. SSH uses encryption techniques to ensure the confidentiality and integrity of the data transmitted between the client and the server. It is commonly used for remote administration, file transfers, and tunneling services.

    Rate this question:

  • 15. 

    SSL is an unsecure protocol.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    SSL (Secure Sockets Layer) is a secure protocol used to establish an encrypted connection between a web server and a web browser. It ensures that the data transmitted between them remains confidential and cannot be easily intercepted by malicious actors. Therefore, the statement that SSL is an unsecure protocol is false. SSL is widely used to secure sensitive information such as passwords, credit card details, and personal data during online transactions, making it an essential component in ensuring online security.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 11, 2011
    Quiz Created by
    Apalani
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.