Network Management Functions, Network Management Protocols Flashcards

Learn The Qs (19 cards)

1
Q

Why are timestamps an issue in network management?

A

Timestamps may not be synchronized across devices, leading to confusion in event sequencing and alarm correlation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Alarm correlation typically incurs a time delay. Why is this true, and why is it an issue?

A

Correlation systems wait for related alarms to arrive. This delay helps accuracy but may slow fault detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In the context of network management, outline what is meant by Accounting Management?

A

Tracking the use of network resources for billing, auditing, and usage analysis. Helps detect fraud and manage costs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In the context of network management, outline what is meant by Configuration Management?

A

Managing device setup, including hardware and software configuration, inventory tracking, and change management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How is auditing relevant to network management?

A

Ensures configurations are compliant and consistent. Auditing validates that changes were correctly implemented.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why is autodiscovery not enough to meet a network manager’s requirement for tracking the IT equipment in an organisation?

A

It may miss passive components or out-of-band devices. Also lacks business-level data like asset ownership.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why does it matter that the information in the network management system matches the state of the network?

A

Mismatches lead to wrong decisions, failed provisioning, or missed faults. Syncing ensures accurate operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In the context of SNMP, what are Object Identifiers?

A

OIDs uniquely identify managed objects in the MIB. They follow a hierarchical structure like file paths.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In the context of SNMP, what is a MIB?

A

The Management Information Base defines and organizes all manageable network objects via SNMP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

List the operations / message-types defined by SNMP.

A

GetRequest, GetNextRequest, SetRequest, GetResponse, and Trap.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which is a better option for device configuration – SNMP or Netconf? Why?

A

Netconf is better. SNMP lacks robust configuration and transaction support, whereas Netconf provides structure, validation, and rollback.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Outline the key areas of network management as defined by the ISO’s FCAPS model.

A

Fault, Configuration, Accounting, Performance, and Security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A network manager is being overwhelmed by the sheer volume of alarms from her newly installed Network Management System. How could she reduce the volume to find what’s important?

A

Use alarm filtering, correlation, and deduplication to suppress redundant or low-priority alerts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A network administrator doesn’t see the point of doing performance measurement on his company’s network. “Nobody’s complaining about performance, what’s the point?” he says. Outline your advice to him.

A

Measuring performance detects issues before users notice. It helps maintain SLAs and avoid service degradation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Outline some important metrics to record as part of Performance Management.

A

Throughput, latency, packet loss, error rates, CPU/memory usage, and uptime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why is it important to secure the management of a network? How can this be done?

A

Prevents unauthorized access. Use role-based access control, secure protocols (e.g. SSH), and audit logs.

17
Q

What are the components of an SNMP-managed network?

A

SNMP Manager, SNMP Agent, and the MIB. Manager polls agents, which expose device data via the MIB.

18
Q

Give an account of security in SNMP.

A

SNMPv1/v2 use community strings (insecure). SNMPv3 adds encryption and authentication. Use secure strings and trap alerts.

19
Q

Explain the relationship between Netconf and YANG.

A

Netconf is the protocol; YANG is the modeling language. YANG defines the structure of data managed by Netconf.