System Administrator 2026
How does SNMPv3 prevent malicious modification of messages?
  • A. By providing a special key to the user that is based on engine id
  • B. By converting mib modules from snmpv3 to snmpv1 or snmpv2
  • C. By modularization of architecture
  • D. By reordering and time delaying of message streams
The access control subsystem provides access _________ service.
  • A. Authentication
  • B. Security
  • C. Authorization
  • D. Administrative
What is the function of an XML interpreter in SNMPv3 Architecture?
  • A. It converts the xml pdu to snmp pdu
  • B. It converts snmp pdu to xml
  • C. It encrypts the pdu converted to xml
  • D. It deciphers the pdu encrypted in xml
A _________ application is used to generate get-request, get-next-request, get-bulk, and set-request messages.
  • A. Command responder
  • B. Command generator
  • C. Notification receiver
  • D. Notification originator
The characterization of the performance of a computer network is ___________ in nature.
  • A. Non-statistical
  • B. Dynamical
  • C. Statistical
  • D. Demographical