Computer Network Management » System Utilities Management
The command ________ on a UNIX system is used to assign an address to a network interface or to configure network interface-parameters.

A. Ping
B. Ifconfig
C. Nslookup
D. Host

Explanation: The command ifconfig on a UNIX system is used to assign an address to a network interface or to configure network interface- parameters. Usually, one needs to be a super-user (su) in UNIX to set interface parameters.

How can we obtain IP address using nslookup?

A. By repeatedly executing ping with a large repeat count
B. By calculating the difference in round-trip times for different packet sizes from each end of the link
C. By sending the query to the local domain name server
D. By finding all the hosts on a local area network (LAN) using a broadcast ping on the LAN

Explanation: Dig or nslookup can help when one wants to find all the hosts on a local area network (LAN). This can be done using a broadcast ping on the LAN. We need to know the IP address to execute this command, which we may not know. However, if we know a host name on the LAN, we could obtain the IP address using nslookup.

A _________ provides the service of locating IP addresses.

A. Address resolution protocol
B. Dynamic host configuration protocol
C. Domain name server
D. Virtual private network

Explanation: The UNIX commands, nslookup, host and dig, are useful for obtaining names and addresses on hosts and domain name servers. A domain name server provides the service of locating IP addresses.

A frequent use of ‘dig’ is when an execution of a command on a remote station fails.

A. True
B. False
C.
D.

Explanation: One of the most basic tools is ping (Packet lnternet Groper). A frequent use of it is when an execution of a command on a remote station fails. As one of the first diagnostics, we want to ensure that the connection exists, for which the ping utility is executed to the remote host. If it fails, then there is a problem with the link. If it passes, then the trouble is with either the application or something else.

The bing utility determines the _______ of a link.

A. Host name
B. Ethernet address
C. Protocol type
D. Raw throughput

Explanation: Bing (point to point bandwidth ping) is a using useful tool, heavily based on ping. The bing utility determines the raw throughput of a link by calculating the difference in round-trip times for different packet sizes from each end of the link.

An SNMP MIB browser is a highly complex tool.

A. True
B. False
C.
D.

Explanation: SNMP MIB tools are of three types: (I) SNMP MIB browser; (2) a set of SNMP command-line tools; and (3) Linux/FreeBSD-based tool. An SNMP MIB browser is a user-friendly tool that can be accessed from public software libraries or commercially purchased.

________ communicates with a network object using the SNMP get-request message.

A. Snmp set command
B. Snmp walk command
C. Snmp get command
D. Snmp get-next command

Explanation: SNMP Get Command communicates with a network object using the SNMP get-request message. The host may be either a host name or an IP address. If the SNMP agent resides on the host with the matching community name, it responds with a get-response message returning the value of the objectID.

What is the function of an SNMP Sniff tool?

A. It captures snmp packets going across the segment and stores them for later analysis
B. It displays the entire mib tree supported by the agent
C. It is useful to get the values of variables in table
D. It sends the snmp set-request message and receives the get-response command

Explanation: The SNMP Sniff Tool snmpsniff; is similar to the tcpdump tool and is implemented in Linux/FreeBSD environment. It captures SNMP packets going across the segment and stores them for later analysis.

Although protocol analyzer could be used for the analysis of any line, it is primarily used in the _______ environment.

A. Personalized area network
B. Local area network
C. Wide area network
D. Metropolitan area network

Explanation: The protocol analyzer is a powerful and versatile network management tool. Although it could be used for the analysis of any line, its primary use is in the LAN environment. It consists of a data capture device that is attached to a LAN.