Volume 3 CDC 3C051

93 Questions | Total Attempts: 131

SettingsSettingsSettings
CDC Quizzes & Trivia

This quiz covers the URE's of volume three of 3C051


Questions and Answers
  • 1. 
    1. What is defined as a bundle of application software designed to significantly improve network efficiency and productivity?
    • A. 

      Fault management server

    • B. 

      Security management server

    • C. 

      Network management server

    • D. 

      Performance management server

  • 2. 
    2. What are the three most common network management architectures?
    • A. 

      Centralized, hierarchial, and distributed

    • B. 

      Centralized, hierarchial, and hybrid

    • C. 

      Hybrid, hierarchial and distributed

    • D. 

      Centralized, hybrid and distributed

  • 3. 
    3. What network management architecture has an NM platform on one computer system at a location that is responsible for NM duties?
    • A. 

      Centralized

    • B. 

      Distributed

    • C. 

      Hierarchial

    • D. 

      Hybrid

  • 4. 
    4. What network management architecture uses multiple systems, with one system acting as a central server and the others working as clients?
    • A. 

      Centralized

    • B. 

      Distributed

    • C. 

      Hierarchial

    • D. 

      Hybrid

  • 5. 
    5. At what level of network management activity are you working when you, as the network manager, are monitoring and troubleshooting components to eliminate the side-effect alarms and isolate problems to a root cause?
    • A. 

      Inactive

    • B. 

      Reactive

    • C. 

      Proactive

    • D. 

      Interactive

  • 6. 
    6. At what level of network management activity are you working when the automated monitoring of components provides problem analysis, giving a root cause alarm for the problem at hand?
    • A. 

      Inactive

    • B. 

      Reactive

    • C. 

      Proactive

    • D. 

      Interactive

  • 7. 
    7. Gathering information about current network device settings is a step of what functional network, management area?
    • A. 

      Configuration management

    • B. 

      Performance management

    • C. 

      Accounting management

    • D. 

      Security management

  • 8. 
    8. What are the two functional categories of performance management?
    • A. 

      Monitoring and analyzing

    • B. 

      Monitoring and replacing

    • C. 

      Monitoring and tuning

    • D. 

      Analyzing and tuning

  • 9. 
    9. Which functional category of performance management tracks historical data by tracking activities on the network?
    • A. 

      Tuning

    • B. 

      Analyzing

    • C. 

      Gathering

    • D. 

      Monitoring

  • 10. 
    10. What network management area is concerned with controlling access points to information?
    • A. 

      Configuration Management

    • B. 

      Performance management

    • C. 

      Accounting management

    • D. 

      Security management

  • 11. 
    11. What is established to distinguish between errors that fall within a normal range and excessive errors because of a fault?
    • A. 

      Fault parameters

    • B. 

      Tolerence parameters

    • C. 

      Low-level software alarms

    • D. 

      Low-level hardware alarms

  • 12. 
    12. Network management protocols are designed (in most cases) to reside above what layer of the OSI?
    • A. 

      Session

    • B. 

      Transport

    • C. 

      Presentation

    • D. 

      Application

  • 13. 
    13. What is a hierarchial, structured format that defines the network management information available from network devices?
    • A. 

      Network devive map

    • B. 

      Network protocol list

    • C. 

      Object identifier

    • D. 

      Management information base

  • 14. 
    14. Which category of SMNP node is responsible for monitoring, collecting and reporting management data to the management system?
    • A. 

      Primary domain controller

    • B. 

      Backup domain controlller

    • C. 

      Manager

    • D. 

      Agent

  • 15. 
    15. What SNMP operational message retrieves the value of one instance of management information?
    • A. 

      Get

    • B. 

      Set

    • C. 

      Trap

    • D. 

      GetNext

  • 16. 
    16. What type of SNMP protocol node is responsible to authenticate logons for clients by validating the supplied user name and password against the account in the database?
    • A. 

      Network management controllers

    • B. 

      Stand-alone servers

    • C. 

      Domain controllers

    • D. 

      Member servers

  • 17. 
    17. In the event that a domain conroller is no longer functioning, what action is taken to make another DC take over the responsibility?
    • A. 

      No action is required

    • B. 

      The spare is promoted to the DC position

    • C. 

      The logical name of the backup DC is changed to the logical name of the primary DC.

    • D. 

      The Internet protocol address of the backup DC is changed to the IP address of the primary DC

  • 18. 
    18. What type of network server is dedicated to an intensive application or database?
    • A. 

      Network management controller

    • B. 

      Domain controller

    • C. 

      Stand-alone server

    • D. 

      Member server

  • 19. 
    19. What protocol is used primarily to obtain connectivity to the large base of Novell NetWare clients?
    • A. 

      Data link control protocol

    • B. 

      Network basic input/output system extended user interface

    • C. 

      TCP/IP

    • D. 

      Internetwork packet exchange/sequenced packet exchange

  • 20. 
    20. What network protocol is used for network connection to Hewlett Packard network printers?
    • A. 

      Data link control protocol

    • B. 

      Network basic input/output system extended user interface

    • C. 

      TCP/IP

    • D. 

      Internetwork packet exchange/sequenced packet exchange

  • 21. 
    21. Why are users required to change their passwords upon logging onto the network for the first time?
    • A. 

      To ensure users don't create vulnerability by leaving the default password in place

    • B. 

      To ensure users understand how to create passwords

    • C. 

      To ensure the integrity of each user's unique password

    • D. 

      To ensure users remember their unique password

  • 22. 
    22. For user accounts with elevated privileges, such as a client support administrator, what are the correct number and type of characters needed for the account password?
    • A. 

      Minimum of nine characters consisting of at least two upper and lowercase letters and numbers

    • B. 

      Minimum of nine characters consisting of at least two upper and lower case letters, numbers, and special characters

    • C. 

      Minimum of fifteen characters consisting of at least two upper and lowercase letters and two special characters

    • D. 

      Minimum of fifteen characters consisting of at least two upper and lowercase letters, tow numbers, and two special characters

  • 23. 
    23. Which group scope allows member permissions to be assigned in any domain or forest?
    • A. 

      Local

    • B. 

      Global

    • C. 

      Universal

    • D. 

      Domain Local

  • 24. 
    24. What defines the rules by which operations can be performed on a particular resource?
    • A. 

      Rights

    • B. 

      Permissions

    • C. 

      Access control lists

    • D. 

      Hardware configuration

  • 25. 
    25. What is used to verify the level of availability an individual has to the resource
    • A. 

      Rights

    • B. 

      Permissions

    • C. 

      Access control lists

    • D. 

      Hardware configuration

Back to Top Back to top