Business Data Networks and Security Essay

Words: 2561
Pages: 11

Business Data Networks and Security, 9e (Panko)
Chapter 9 TCP/IP Internetworking II

1) In IP subnet planning, having a large subnet part allows more hosts per subnet.
Answer: FALSE

2) When the subnet part is made larger, the host part must be smaller.
Answer: TRUE

3) If your subnet part is 8 bits long, you can have ________ subnets.
A) 64
B) 128
C) 256
D) None of the above
Answer: D

4) In IP subnet planning, you need to have at least 130 subnets. How large should your subnet part be?
A) 6
B) 7
C) 8
D) None of the above
Answer: B

5) Your firm has an 8-bit network part and an 8-bit subnet part. How many hosts can you have?
A) 8
B) 16
C) 254
D) 65,534
Answer: D

6) You have a 20-bit network part and a
…show more content…
A) manager
B) agent
C) Both A and B
D) Neither A nor B
Answer: A

47) In SNMP, the agent can create commands.
Answer: FALSE

48) In SNMP, the ________ creates responses.
A) manager
B) agent
C) Both A and B
D) Neither A nor B
Answer: B

49) In SNMP, the manager creates both commands and responses.
Answer: FALSE

50) In SNMP, the ________ creates traps.
A) manager
B) agent
C) Both A and B
D) Neither A nor B
Answer: B

51) In SNMP, the manager can create ________.
A) traps
B) GET commands
C) Both A and B
D) Neither A nor B
Answer: B

52) In SNMP, Set commands tell the agent to change a parameter on the managed device.
Answer: TRUE

53) A(n) ________ is a message sent by an agent to let the manager know about a condition the agent has detected. Select the name used in the SNMP standard.
A) command
B) trap
C) alarm
D) All of the above
Answer: B

54) In SNMP, companies are often reluctant to use ________ commands because of security dangers.
A) Get
B) Set
C) Neither A nor B
Answer: A

55) SNMPv1 uses ________ for authentication.
A) community names
B) digital certificates and digital signatures
C) a different password for each manager-agent pair
D) All of the above
Answer: A

56) SNMPv3 uses ________ for authentication.
A) community names
B) digital certificates and digital signatures
C) a different password for each manager-agent pair
D) All of the above
Answer: