SNMP Flashcards

1
Q

What is SNMP?

A

Simple Network Management Protocol - udp port 161

MIB (Management Information Base) collects OIDs (Object Identifiers - KPIs) from network devices to analyse data

Managed device : any device that can communcated with an snmp manager know as the MIB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SNMP v1 - v3

A

SNMP v1 & v2 - plaintext, don’t use

SNMP v3 - msg integrity, authentication and encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SNMP OIDs

A

SNMP Manager requests info based on OIDs

every variable in the MIB has a corresponding OID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SNMP Trap

A

udp 162

reactive msg sent by a host when something happens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CRC error

A

cyclic redundancy check (CRC) error :

failed frame check sequence
–> bad cable or interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

encapsulation error:

A

inconsistent configuration between switches (ex. 802.1Q VS ISL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

3 Types of SNMP messages

A

SET
GET
TRAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

2 types of snmp trap messages

A
  1. Granular - TRAP msg get an unique OID to distinguish each message
  2. verbose - consumes more bandwidth, all the info about an alert as a payload
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

8 Alert levels in syslog

(remember for the test) –> eating apples can establish worm NID

A
  1. Emergency
  2. Alert
  3. Critical
  4. Error
  5. Warning
  6. Notice
  7. Information
  8. Debugging
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

3 types of logs in event viewer on windows

A

application logs - software running
security logs - login attempts, audits
system logs - OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You have been asked to deploy a solution that monitors events on the network. The application you’ve been asked to use should only send traps on network devices. Which protocol should you use to best achieve this?

A

Syslog is a protocol that is used for message logging. Syslog, when configured, sends traps or notifications about network devices. Traps can contain information such as an interface state change or a message about a server’s CPU reaching high utilization.

SNMP (Simple Network Management Protocol) sends taps and baselines on network devices. Baselines give information about overall system health.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Michael, a network technician, needs to upgrade the operating system on one of the switches in the network without having to provide server credentials to access the file. Which of the following protocols should he use to best achieve this?

A

TFTP (Trivial File Transfer Protocol) is a stripped down version of FTP (File Transfer Protocol), but still provides many of the same features. One difference is that TFTP doesn’t require you to enter credentials before copying a file, while FTP does.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following protocols uses a MIB consisting of OIDs to track statistics about a device?

A

SNMP (Simple Network Management Protocol) is a protocol used to remotely manage network devices and also is used to send statistics about a device through the use of traps. Devices using SNMP have a MIB (Management Information Base) which are composed of OIDs (Object Identifiers), which are objects that correspond to a specific variable, which is then used to provide statistical information about something like an interface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following network performance metrics is used to represent the round-trip time it takes for a packet to be sent by a device to a server and then a response received from that destination server?

A

Latency is the measure of time that it takes for data to reach its destination across a network. Usually, we measure network latency as the round-trip time from a workstation to the distant end and back.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A wireless networking technician has completed an assessment of a wireless network and documented the detected signal strengths in various locations. Which of the following best describes this document?

A

A wireless site survey report will usually take the form of a floorplan with a color-coded series of rings on it to show the signal strengths of wireless network signals in various locations. This is often referred to as a “heat map” by technicians. The technician performing the survey will document this information and use it as a tool during troubleshooting and optimization efforts concerning the wireless coverage in a specific office or building.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SPD (selective packet discards)

A

drops low priority packets when the cup is too busy so it can save capacity for higher priority packets as QoS