adplus-dvertising
frame-decoration

Question

________ defines the general rules for naming objects, defining object types, and showing how to encode objects and values.

a.

MIB

b.

BER

c.

SMI

d.

none of the above

Posted under Networking

Answer: (c).SMI

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. ________ defines the general rules for naming objects, defining object types, and showing how to encode objects and values.

Similar Questions

Discover Related MCQs

Q. We can compare the task of network management to the task of writing a program. Both tasks need rules. In network management this is handled by ___________.

Q. We can compare the task of network management to the task of writing a program. Both tasks need variable declarations. In network management this is handled by _________.

Q. We can compare the task of network management to the task of writing a program. Both tasks have actions performed by statements. In network management this is handled by _______.

Q. SMI emphasizes three attributes to handle an object: _____, ________, and _________.

Q. To name objects globally, SMI uses an object identifier, which is a hierarchical identifier based on a _______ structure.

Q. All objects managed by SNMP are given an object identifier. The object identifier always starts with _______.

Q. To define the data type, SMI uses fundamental _______ definitions and adds some new definitions.

Q. SMI has two broad categories of data type: _______ and _______.

Q. The _______ data types are atomic data types.

Q. SMI defines two structured data types: ________ and _________.

Q. SMI uses another standard, ___________, to encode data to be transmitted over the network.

Q. The _________ ordering enables a manager to access a set of variables one after another by defining the first variable.

Q. The GetRequest PDU is sent from the _______ to the __________ to retrieve the value of a variable or a set of variables.

Q. The Response PDU is sent from the ______ to the ______ in response to GetRequest or GetNextRequest.

Q. The Trap PDU is sent from the ______ to the _______ to report an event.

Q. SNMP uses the services of UDP on two well-known ports, _______ and _______.

Q. _______ runs the SNMP client program; _______ runs the SNMP server program.

Q. INTEGER, OCTET STRING, and ObjectIdentifier are _______ definitions used by SMI.

Q. Which of the following could be a legitimate MIB object identifier?

Q. For a 1-byte length field, what is the maximum value for the data length?