Snmpv3 User Based Security Model — Test 1
Page 1 of 1
Question 1
The ability to control what data a user can read or write is known as ________
0
Question 2
Five type of threats exist to network management information while it is being transported from one management entity to another.
0
Question 3
The use of ______ involves defining collections of data, groups of users of the data, and access statements.
0
Question 4
An _________ SNMP engine is responsible for the accuracy of the time-stamp and a unique SNMP engine ID in each message.
0
Question 5
What is the function of Masquerade in SNMPv3 security threats?
0
Question 6
Two algorithms are recommended in SNMPv3 for developing the key from the password. They are ______ and ______
0
Question 7
The first eight octets of the 24-octet privacy key are used to create the DES key.
0
Question 8
One important function of an NMS as a user is the discovery of agents in the network. This is accomplished by generating a ______ message.
0
Question 9
What is the function of the access policy?
0
Question 10
An SNMP _______ is a collection of management information accessible by an SNMP entity.
0