Top 100+ Snmp Interview Questions And Answers
Question 1. What Is Oid Or Object Identifier?
Answer :
An item identifier (or OID) uniquely identifies a managed object within the MIB hierarchy. The MIB hierarchy may be represented as a tree with a anonymous root, with various tiers , which might be assigned by using exceptional businesses.
The managed item getVersion may be uniquely identified either through the item call iso.Org.Dod.Net.Non-public.Company.Tdd.Snmp.GetVersion or by using the equivalent item ID, .1.Three.6.1.2.1.1.6
Question 2. What Is Smi?
Answer :
SMI Stands for Structure of Management Information, which defines the regulations for describing control facts, the usage of Abstract Syntax Notation One (ASN.1).
Veritas Volume Manager (VVM or VxVM) Interview Questions
Question three. What Are The Type Of Managed Objects?
Answer :
There are two sorts of controlled items particularly scalar and tabular.
Scalar items outline a unmarried object instance.
Tabular objects define a couple of associated object times which are grouped in MIB tables.
Question 4. What Are The Types Of Smi Information Modules?
Answer :
Information Modules are included in SNMPV2 and above. There are 3 sorts of SMI information modules, which are MIB modules, compliance statements, and functionality statements.
MIB modules comprise definitions of interrelated managed objects. Compliance statements offer a scientific manner to describe a group of controlled objects that have to be applied for conformance to a popular. Capability statements are used to suggest the suitable stage of aid that an agent claims with recognize to a MIB institution.
HTTP Tutorial
Question 5. What Is Snmpv2?
Answer :
SNMPv2 is the evolution of SNMPv1 protocol.
SNMPv2 support GET-BULK and INFORM operation further to the operations supported by SNMPv1.
The message format of SNMPv2 GET, GETNEXT, SET are equal as SNMPv1 however the message layout of SNMPv2 TRAP isn't the same as the SNMPv1 messag format.
SNMPv2 also uses the Community primarily based authentication that's equal as SNMPv1.
Simple Mail Transfer Protocol (SMTP) Interview Questions
Question 6. What Is Inform?
Answer :
SNMP INFORM is much like Traps but is extra dependable.
When an Agent sends a Trap to the Network Management System (Manager), the Manager receives the Trap and no acknowledgement is sent to Agent. By this way, the Agent doesn’t know whether or not the Trap has been acquired through Manager or no longer. Whereas in Inform Request, the Manager upon receiving the Inform Request can well known the Agent with a SNMP Response PDU. By this manner, Agent can be able to recognise whether or not Inform has reached or now not.
If the Agent didn’t acquire the Acknowledgement from the Manager, it can resend the Inform Request again.
Question 7. What Is Snmp Trap?
Answer :
SNMP TRAP is a sort of Asynchronous Notification propagated from the Managed Device to the Network Management System.
SNMP Traps are generated from the Network Elements while it reviews some errors circumstance.
HTTP Interview Questions
Question eight. What Is Snmp Set Request?
Answer :
SET Request is a Write operation at the Managed Device.
SET Request is used to set/write values inside the Managed Device. Basically it's far utilized by the SNMP Manager packages to configure Network Elements with set of values.
Question 9. What Is Get Bulk Request?
Answer :
GET BULK Request is used to retrieve big quantity of data from the MIB items.
It internally makes use of collection of Get Next operation to retrieve all data from the MIB tables.
Border Gateway Protocol (BGP) Interview Questions
Question 10. What Is Snmp Get-subsequent Request?
Answer :
The SNMP GET NEXT Request is equal as Get Request operation. It is used to retrieve the price of the subsequent OID value in the MIB hierarchy.
GET NEXT Request is beneficial to retrieve a couple of piece of data from the Managed Device.
Question 11. What Is Snmp Get Request?
Answer :
SNMP GET Request is a Read operation on the Managed Device.
The SNMP application (like Network Management Software) makes use of the SNMP GET request to retrieve the values from the Network factors for a selected Object Identifier (OID). The SNMP Agent running inside the Network element in flip returns the fee corresponding to the Object Identifier.
Post Office Protocol (POP) Interview Questions
Question 12. What Are The Basic Commands In Snmp?
Answer :
The fundamental commands in SNMP are,
1. GET
2. GET NEXT
3. GET BULK
four. SET
five. TRAP
6. INFORM
Veritas Volume Manager (VVM or VxVM) Interview Questions
Question thirteen. What Is A Mib?
Answer :
MIB is the acronym for Management Information Base.
MIB accommodates of set of controlled gadgets that's prepared hierarchically. Each managed item is diagnosed the usage of an Object Identifier, termed as OID.
The managed object represents the traits of the controlled device.
Question 14. What Is A Managed Device?
Answer :
Managed Device is a Network detail/tool which has the SNMP Agent jogging in it.
The Managed tool collects/fetches the management facts and makes this information available to the Network Management Software.
Question 15. What Is An Agent Or Snmp Agent?
Answer :
SNMP Agent is a control software program which runs inside the managed tool ie., Network detail.
The SNMP agent fetches the information from the controlled tool and responds back to the queries issued via the Network Management Softwares. It also involves in putting/updating the values inside the controlled tool for any write operation instructions issued through the Network Management Software.
SNMP Agent involves in sending the asynchronous Traps to the Network Management Software.
Real-Time Transport Protocol Interview Questions
Question sixteen. What Is Snmp?
Answer :
SNMP is the acronym for Simple Network Management Protocol. It is an software layer protocol that includes replacing of statistics between Network factors.
The Simple Network Management Protocol is used to communicate Management Information among the Network Management System and the Network Elements.
Using SNMP, the Network operators may be able to manipulate their community factors, identify the fault and can configure the far flung machine.
Question 17. What Is The Use Of Proxy In Snmp. Does It Require Only When The Network Has Snmpv1 And Snmpv2?
Answer :
Proxy may be described as an intermediately tool, which performs the function of an agent inside the Context of SNMP.It works as a Virtual LAN to the Devices Which aren't having an Ethernet Inerface,Like MODEMS and Multiplexers.
By using the SNMPPROXY we will Know the STATUS of those(MODEMS and so on) devices.When an Agent performs PROXY position,it acs on the behalf of 1 or more other nodes.A NETWORK MANAGER that needs ti reap the facts from or manipulate the node communicates with the proxy agent.The proxy agent then interprets the MANAGER's request to a shape appropriate for the arget sysem and makes use of the proper nework control protocol to speak with the goal system.
Question 18. How Can I Make My Server A Domain?
Answer :
creating daemon is quite simple in Linux. You just want to create a baby manner from its figure system and kill the discern process. Also you have to near all of the I/O streams.[as daemon is a background process which is not interactive in nature].Latter on you can write a init script in /and many others/init.D/ to make it a service.
Simple Mail Transfer Protocol (SMTP) Interview Questions
Question 19. What Is Data Com? How It Works, What Is Difference Between Datacom And Telecom?
Answer :
This the communication among laptop systems or devices. A computer community is any set of computers or devices linked to every other with the ability to trade facts.
Data Communication is the procedure of transferring facts from a sender to a receiver with the use of a medium in which the communicated facts is thought via each sender and receiver. It is a process that allows organisms to change records by means of numerous methods.
Telecommunications is a widespread term for a full-size array of technology that ship records over distances. Mobile telephones, land strains, satellite tv for pc phones and voice over Internet protocol (VoIP) are all telephony technology -- simply one area of telecommunications. Radio, television and networks are a few greater examples of telecommunication.
Question 20. Memory That Is Paged Out To The Hardware Is Known As
Answer :
its cache memory.
A CPU cache is a cache utilized by the principal processing unit of a laptop to reduce the average time to get admission to reminiscence.The cache is a smaller, quicker reminiscence which stores copies of the information from the most frequently used essential reminiscence places. As long as maximum reminiscence accesses are to cached memory places, the common latency of memory accesses can be towards the cache latency than to the latency of essential memory.
When the processor needs to read from or write to a vicinity in fundamental memory, it first exams whether or not a copy of that data is inside the cache. If so, the processor without delay reads from or writes to the cache, that's lots quicker than studying from or writing to principal reminiscence.
Question 21. Explain Networking?
Answer :
Networking is defined as connectivity among friends inner community and out of doors community.Inside community connectivity in Networking topology is referred to as Lan and outdoor Network connectivity is referred to as as WAN.Lan Is defined as Local Area Network between peer structures and Wan is defined as Wide Area Network between Lan to a Lan in special Location and this connectivity of lan in specific places is defined as WAN.Networking is depends on OSI layer which is defined as OPen System Internetworking.In OSI Layer information is reached to destination from source passing all the 7 layers of OSI layer and these 7 layers were on either side of community and they may be described as
Presentation Layer
Data-hyperlink Layer
Network Layer
Transport Layer
Session Layer
Physical Layer
Application Layer
Question 22. Net Working Is What?
Answer :
It is connection between two or extra pc or gadgets through the transmission media for the motive of verbal exchange and getting access to sources is called network and the entire process is known as networking.
Question 23. How To Configure Raid?
Answer :
first we must have RAID card ....Which is easly to be had in marketplace conect it on ur mom board . Then join it with u r difficult disk then earlier than beginning the os in a syatem configure ur RAID first simply select some thing training are available in your manner...It's miles quite simple to follow and eventually pick out ur sort of RAID...
Question 24. What Does The Mib Do?
Answer :
Management statistics is viewed as a group of managed objects statistics store in a Base is known as MIB
HTTP Interview Questions
Question 25. How Does Any Network Vendor Decide To Go For Nms Or Ems?
Answer :
An element control system (EMS) manages one or extra of a particular kind of community elements (NEs). Using an EMS a consumer can manage all the features of each NE in my view, however no longer the verbal exchange between NEs.Communication between NEs is controlled via the network management gadget (NMS).A network management device is a aggregate of hardware and software program used to monitor and administer a network.Network control refers back to the upkeep and administration of massive scale laptop networks at the pinnacle level.
In brief,If network supplier wants to manage multiple EMS,seller can visit NMS.If community dealer wants to manipulate multiple EMS,seller can decide to go for NMS.If community vendor want to manage one or extra of a selected kind of network elements (NEs),seller can decide to go for EMS.
Question 26. How To Set A Local Net?
Answer :
IIS used for Browsing Intranet
Net (all websites):thru CCPROXY software program
Or
Install windows 2003 server run Domain controller promotions
--> Install DNS server default putting(not Manually)
In LAN device --> Local Area Connetion Status-->In homes--> Gateway is server IP deal with and DNS are ISP
dNS(That system brought to the home windows 2003 server area)
ccproxy software program is easy
Question 27. Why It Is Important To De Fragment Disks In Computer?
Answer :
Defragmentation is smiple says convey the information right now area within the force....When we copied or shop a document it store on exclusive sectors on the pressure whilst u browse for the document it's going to search every zone identification (for each sector we have an identification).Whilst defragmentation executed all the statistics carry upto one part and it will take much less time to reterive the data...
Border Gateway Protocol (BGP) Interview Questions
Question 28. Which Switching Technology Reduces The Size Of A Broadcast Domain?
Answer :
By the use of VLAN generation we can reduces the scale of broadcast area.
VLAN (digital nearby region community) is a logical grouping or segmenting the gadgets beneath a single broadcast domain. As a end result presents Security and Flexibility.
Question 29. What Network You Used?
Answer :
LAN
Wi-Fi
WLAN
WAN
VAN
PAN
CAN
Question 30. The Protocols Found In Network Layer Are
Answer :
Protocols TCP/IP is used to configure windows Operating System that is abrreviated as Transmission Control Protocol for transmitting records from one device to another.
Protocols IPX/SPX are utilized in Unix operating system for transmitting information.
Protocols ICMP are used as Internet Protocols.
Question 31. What Are The Components Of Snmp?
Answer :
A whole SNMP gadget includes the subsequent components:-
SNMP Manager - A community management system that makes use of SNMP to poll and acquire statistics from any variety of network devices. The SNMP manager usually is an utility that runs in a crucial location.
SNMP Agent - A technique that runs on the community device being monitored. All varieties of information are collected via the tool itself and saved in a neighborhood database. The agent can then reply to SNMP polls and queries with facts from the database, and it can ship unsolicited signals or “traps” to an SNMP manager.
Question 32. Which Ports Are Used In Snmp?
Answer :
SNMP makes use of the UDP port 161 for sending and receiving requests, and port 162 for receiving traps from controlled devices.
Question 33. Explain Mib?
Answer :
MIB is a hierarchical Database Structure for records at the device. Example - Serial numbers are in a particular area, NIC Statistics and many others.
Post Office Protocol (POP) Interview Questions
Question 34. What Are Different Snmp Versions?
Answer :
Here are specific versions of SNMP - SNMP V1, SNMP V2c, and SNMP V3.
SNMP version 1 - It is the oldest flavor. It is Easy to set up – most effective requires a plaintext community.
SNMP version 2c - It is identical to Version 1, except that it adds support for sixty four bit counters.
SNMP model three - It adds protection to the 64 bit counters. SNMP model three adds each Encryption and Authentication, which can be used together or one after the other.
Question 35. How Do I Implement Snmp On My Network?
Answer :
The first step is to put into effect the TCP/IP conversation stack. This may additionally seem to your network software (I know its on Windows NT) or you can need to buy a TCP/IP stack implementation. Usually implementing TCP/IP involves giving every node in your community a awesome IP address. "Telnet" is a key component of TCP/IP. If you could use "telnet" on your network then you definitely are jogging TCP/IP and you have nothing to worry about.
The subsequent step is to get an SNMP manager and agent. Both of these are available freely all through the net. The marketers ought to be hooked up on every node of the community while the supervisor have to be installed on the machines you want to screen the network from. Once all of those factors are in region you could observe the commands supplied with both your manager and agent and configure the network and SNMP thus. People who need to make SNMP less difficult to use might also want to both purchase or down load a graphical community manager (inclusive of IBM's Netview or HP's Open View Network Manager; there is additionally lots of accurate shareware network managers out. I noticeably suggest this route to SNMP beginner's .
Question 36. What Is The Tcp/ip Communication Stack?
Answer :
As said inside the community control document, SNMP runs below the TCP/IP communication stack (it is a layer 7 software). The TCP/IP stack is a way wherein dealer-inspecific pc networks can speak. For example, say my LAN of emblem X's computers uses conversation protocol XX to talk. If I desired to create a WAN with by means of connecting my LAN to a friend's LAN of logo Y computers (that use verbal exchange protocol YY to speak; then I might have a trouble... For the way could protocol XX communicate to protocol YY. This is in which TCP/IP steps in, providing a not unusual verbal exchange protocol among LAN's.
Real-Time Transport Protocol Interview Questions
Question 37. How Common Is Tcp/ip?
Answer :
TCP/IP could be very commonplace. As explained above, if you use "telnet" or "ftp" then you are the usage of the TCP/IP communication stack. It is so commonplace, that many companies provide TCP/IP PC software for terribly low prices.
Question 38. What Are Mibs, And How Are They Accessed?
Answer :
A Management Information Base (MIB) is a set of statistics that is prepared hierarchically. MIBs are accessed the usage of a network-control protocol along with SNMP. They are created from controlled gadgets and are identified with the aid of item identifiers.
Question 39. What Is The Agent?
Answer :
The agent runs off of each node on the network. Many UNIX software providers encompass this with their terminal software program. It collects network and terminal data as specified within the MIB. Many public area agaents are to be had (maximum splendid the CMU agent). A commonplace programming activity is extending an agent to accomplish the particular desires of your network and this assignment is fairly trustworthy given the proper assets.

