Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

Quiz:

1. Which of the following management category is to recognize, isolate, correct and log
faults that occur in the network?

a.Fault Management
b.Accounting Management
c.Performance Management
d.Security Management
e.Configuration Management

2. Which of the following management category is using trend analysis to predict errors so
that the network is always available?

a.Fault Management
b.Accounting Management
c.Performance Management
d.Security Management
e.Configuration Management

3. Which of the following management category will often send a notification to the
network operator using a network component when a fault or event occurs?

a.Fault Management
b.Accounting Management
c.Performance Management
d.Security Management
e.Configuration Management
4. Which of the following management category is to gather and store configurations from
network devices (this can be done locally or remotely)?

a.Fault Management
b.Accounting Management
c.Performance Management
d.Security Management
e.Configuration Management

5. Which of the following management category is to track changes that are made to the
configuration?

a.Fault Management
b.Accounting Management
c.Performance Management
d.Security Management
e.Configuration Management

6. Which of the following management category is used to control the access in the
network?

a.Fault Management
b.Accounting Management
c.Performance Management
d.Security Management
e.Configuration Management

7. Which of the following management category can be achieved mainly with


authentication and encryption?

a.Fault Management
b.Accounting Management
c.Performance Management
d.Security Management
e.Configuration Management
8. Which of the following management category is to gather security-related information is
analyzed regularly?

a.Fault Management
b.Accounting Management
c.Performance Management
d.Security Management
e.Configuration Management

9. Which of the following management category include managing network authentication,


authorization, and auditing, such that both internal and external users only have access to
appropriate network resources?

a.Fault Management
b.Accounting Management
c.Performance Management
d.Security Management
e.Configuration Management

10. Which of the following management category includes intrusion detection systems, and
security policies (such as access lists)?

a.Fault Management
b.Accounting Management
c.Performance Management
d.Security Management
e.Configuration Management
11. Which of the following management category is to determine the efficiency of the current
network?

a.Fault Management
b.Accounting Management
c.Performance Management
d.Security Management
e.Configuration Management

12. Which of the following management category addresses the throughput, network
response times, packet loss rates, link utilization, percentage utilization, error rates and so
forth?

a.Fault Management
b.Accounting Management
c.Performance Management
d.Security Management
e.Configuration Management

13. Which of the following management category is often referred to as billing management?
Using the statistics, the users can be billed and usage quotas can be enforced.

a.Fault Management
b.Accounting Management
c.Performance Management
d.Security Management
e.Configuration Management
14. The SSL works as follows:

 The client sends a "client hello" message. This includes the client's SSL version number
 The server responds with a "server hello" message. This includes the server's SSL version
number, an ------------ certificate with a ------------- key and other information that the client
needs to communicate with the server over SSL.
 The client verifies the server's SSL certificate from CA (Certificate Authority) and
authenticates the server.
 The client creates a ----------- key, encrypts it with the server's public key and sends it to
the server.
 The server decrypts the -----------------key with its ---------------- key and sends the
acknowledgement to the client encrypted with the ---------------key.

You might also like