SNMP Interview Questions & Answers

  1. Question 1. What Is Oid Or Object Identifier?

    Answer :

    An object identifier (or OID) uniquely identifies a managed object in the MIB hierarchy. The MIB hierarchy can be represented as a tree with a nameless root, with various levels , which are assigned by different organizations.
    The managed object getVersion can be uniquely identified either by the object name or by the equivalent object ID, .

  2. Question 2. What Is Smi?

    Answer :

    SMI Stands for Structure of Management Information, which defines the rules for describing management information, using Abstract Syntax Notation One (ASN.1).

  3. Veritas Volume Manager (VVM or VxVM) Interview Questions

  4. Question 3. What Are The Type Of Managed Objects?

    Answer :

    There are two types of managed objects namely scalar and tabular.
    Scalar objects define a single object instance.
    Tabular objects define multiple related object instances that are grouped in MIB tables.

  5. Question 4. What Are The Types Of Smi Information Modules?

    Answer :

    Information Modules are included in SNMPV2 and above. There are 3 types of SMI information modules, which are MIB modules, compliance statements, and capability statements.
    MIB modules contain definitions of interrelated managed objects. Compliance statements provide a systematic way to describe a group of managed objects that must be implemented for conformance to a standard. Capability statements are used to indicate the precise level of support that an agent claims with respect to a MIB group.


  6. HTTP Tutorial

  7. Question 5. What Is Snmpv2?

    Answer :

    • SNMPv2 is the evolution of SNMPv1 protocol.
    • SNMPv2 support GET-BULK and INFORM operation in addition to the operations supported by SNMPv1.
    • The message format of SNMPv2 GET, GETNEXT, SET are same as SNMPv1 but the message format of SNMPv2 TRAP is different from the SNMPv1 messag format.
    • SNMPv2 also uses the Community based authentication which is same as SNMPv1.
  8. Simple Mail Transfer Protocol (SMTP) Interview Questions

  9. Question 6. What Is Inform?

    Answer :

    SNMP INFORM is similar to Traps but is more reliable.
    When an Agent sends a Trap to the Network Management System (Manager), the Manager receives the Trap and no acknowledgement is sent to Agent. By this way, the Agent doesn’t know whether the Trap has been received by Manager or not. Whereas in Inform Request, the Manager upon receiving the Inform Request can acknowledge the Agent with a SNMP Response PDU. By this way, Agent can be able to know whether Inform has reached or not.
    If the Agent didn’t receive the Acknowledgement from the Manager, it can resend the Inform Request again.


  10. Question 7. What Is Snmp Trap?

    Answer :

    SNMP TRAP is a type of Asynchronous Notification propagated from the Managed Device to the Network Management System.
    SNMP Traps are generated from the Network Elements when it experiences some error condition.

  11. HTTP Interview Questions

  12. Question 8. What Is Snmp Set Request?

    Answer :

    SET Request is a Write operation on the Managed Device.
    SET Request is used to set/write values in the Managed Device. Basically it is used by the SNMP Manager applications to configure Network Elements with set of values.

  13. Question 9. What Is Get Bulk Request?

    Answer :

    GET BULK Request is used to retrieve large amount of data from the MIB objects.
    It internally uses series of Get Next operation to retrieve all data from the MIB tables.

  14. Border Gateway Protocol (BGP) Interview Questions

  15. Question 10. What Is Snmp Get-next Request?

    Answer :

    The SNMP GET NEXT Request is same as Get Request operation. It is used to retrieve the value of the next OID value in the MIB hierarchy.
    GET NEXT Request is useful to retrieve more than one piece of information from the Managed Device.

  16. Question 11. What Is Snmp Get Request?

    Answer :

    SNMP GET Request is a Read operation on the Managed Device.
    The SNMP application (like Network Management Software) uses the SNMP GET request to retrieve the values from the Network elements for a particular Object Identifier (OID). The SNMP Agent running in the Network element in turn returns the value corresponding to the Object Identifier.

  17. Post Office Protocol (POP) Interview Questions

  18. Question 12. What Are The Basic Commands In Snmp?

    Answer :

    The basic commands in SNMP are,
    1. GET
    2. GET NEXT
    3. GET BULK
    4. SET
    5. TRAP
    6. INFORM

  19. Veritas Volume Manager (VVM or VxVM) Interview Questions

  20. Question 13. What Is A Mib?

    Answer :

    MIB is the acronym for Management Information Base.
    MIB comprises of set of managed objects which is organized hierarchically. Each managed object is identified using an Object Identifier, termed as OID.
    The managed object represents the characteristics of the managed device.

  21. Question 14. What Is A Managed Device?

    Answer :

    Managed Device is a Network element/device which has the SNMP Agent running in it.
    The Managed device collects/fetches the management information and makes this information available to the Network Management Software.

  22. Question 15. What Is An Agent Or Snmp Agent?

    Answer :

    SNMP Agent is a management software which runs inside the managed device ie., Network element.
    The SNMP agent fetches the information from the managed device and responds back to the queries issued by the Network Management Softwares. It also involves in setting/updating the values in the managed device for any write operation commands issued by the Network Management Software.
    SNMP Agent involves in sending the asynchronous Traps to the Network Management Software.

  23. Real-Time Transport Protocol Interview Questions

  24. Question 16. What Is Snmp?

    Answer :

    SNMP is the acronym for Simple Network Management Protocol. It is an application layer protocol that involves exchanging of information between Network elements.
    The Simple Network Management Protocol is used to communicate Management Information between the Network Management System and the Network Elements.
    Using SNMP, the Network operators can be able to manage their network elements, identify the fault and can configure the remote system.

  25. Question 17. What Is The Use Of Proxy In Snmp. Does It Require Only When The Network Has Snmpv1 And Snmpv2?

    Answer :

    Proxy can be defined as an intermediately device, which plays the role of an agent in the Context of SNMP.It works as a Virtual LAN to the Devices Which are not having an Ethernet Inerface,Like MODEMS and Multiplexers.
    By using the SNMPPROXY we can Know the STATUS of these(MODEMS etc) devices.When an Agent performs PROXY role,it acs on the behalf of one or more other nodes.A NETWORK MANAGER that wishes ti obtain the information from or control the node communicates with the proxy agent.The proxy agent then translates the MANAGER’s request to a form appropriate for the arget sysem and uses an appropriate nework management protocol to communicate with the target system.

  26. Question 18. How Can I Make My Server A Domain?

    Answer :

    creating daemon is very simple in Linux. you just need to create a child process from its parent process and kill the parent process. also you should close all the I/O streams.[as daemon is a background process which is not interactive in nature].latter on you can write a init script in /etc/init.d/ to make it a service.

  27. Simple Mail Transfer Protocol (SMTP) Interview Questions

  28. Question 19. What Is Data Com? How It Works, What Is Difference Between Datacom And Telecom?

    Answer :

    This the communication between computer systems or devices. A computer network is any set of computers or devices connected to each other with the ability to exchange data.
    Data Communication is the process of transferring information from a sender to a receiver with the use of a medium in which the communicated information is understood by both sender and receiver. It is a process that allows organisms to exchange information by several methods. 
    Telecommunications is a general term for a vast array of technologies that send information over distances. Mobile phones, land lines, satellite phones and voice over Internet protocol (VoIP) are all telephony technologies — just one field of telecommunications. Radio, television and networks are a few more examples of telecommunication.

  29. Question 20. Memory That Is Paged Out To The Hardware Is Known As

    Answer :

    its cache memory.

    A CPU cache is a cache used by the central processing unit of a computer to reduce the average time to access memory.The cache is a smaller, faster memory which stores copies of the data from the most frequently used main memory locations. As long as most memory accesses are to cached memory locations, the average latency of memory accesses will be closer to the cache latency than to the latency of main memory.
    When the processor needs to read from or write to a location in main memory, it first checks whether a copy of that data is in the cache. If so, the processor immediately reads from or writes to the cache, which is much faster than reading from or writing to main memory.

  30. Question 21. Explain Networking?

    Answer :

    Networking is defined as connectivity between peers inside network and outside network.Inside network connectivity in Networking topology is known as Lan and outside Network  connectivity is called as WAN.Lan Is defined as Local Area Network between peer systems and Wan is defined as Wide Area Network between Lan to a Lan in different Location and this connectivity of lan in different locations is defined as WAN.Networking is depends on OSI layer which is defined as OPen System Internetworking.In OSI Layer data is reached to destination from source passing all the 7 layers of OSI layer and these 7 layers were on either side of network and they are defined as 

    1. Presentation Layer
    2. Data-link Layer
    3. Network Layer
    4. Transport Layer
    5. Session Layer 
    6. Physical Layer 
    7. Application Layer
  31. Question 22. Net Working Is What?

    Answer :

    It is connection between two or more computer or devices through the transmission media for the purpose of communication and accessing resources is called network and the whole process is called networking.

  32. Question 23. How To Configure Raid?

    Answer :

    first we should have RAID card ….which is easly available in market conect it on ur mother board . then connect it with u r hard disk then before starting the os in a syatem configure ur RAID first just select whatever instruction come in your way…it is very simple to follow and finally select ur type of RAID…

  33. Question 24. What Does The Mib Do?

    Answer :

    Management information is viewed as a collection of managed objects information store in a Base is called MIB

  34. HTTP Interview Questions

  35. Question 25. How Does Any Network Vendor Decide To Go For Nms Or Ems?

    Answer :

    An element management system (EMS) manages one or more of a specific type of network elements (NEs). Using an EMS a user can manage all the features of each NE individually, but not the communication between NEs.Communication between NEs is managed by the network management system (NMS).A network management system is a combination of hardware and software used to monitor and administer a network.Network management refers to the maintenance and administration of large scale computer networks at the top level.
    In brief,If network vendor wants to manage multiple EMS,vendor can go to NMS.If network vendor wants to manage multiple EMS,vendor can decide to go for NMS.If network vendor want to manage one or more of a specific type of network elements (NEs),vendor can decide to go for EMS.

  36. Question 26. How To Set A Local Net?

    Answer :

    IIS used for Browsing Intranet
    Net (all websites):through CCPROXY software
    Install windows 2003 server run Domain controller promotions
    –> Install DNS server default setting(not Manually)
    In LAN system –> Local Area Connetion Status–>In properties–> Gateway is server IP address and DNS are ISP 
    dNS(That system added to the windows 2003 server domain)
    ccproxy software is easy

  37. Question 27. Why It Is Important To De Fragment Disks In Computer?

    Answer :

    Defragmentation is smiple says bring the data at once place in the drive….when we copied or save a file it save on different sectors on the drive when u browse for the file it will search every sector id (for every sector we have an id).when defragmentation done all the data bring upto one part and it will take less time to reterive the data…

  38. Border Gateway Protocol (BGP) Interview Questions

  39. Question 28. Which Switching Technology Reduces The Size Of A Broadcast Domain?

    Answer :

    By using VLAN technology we can reduces the size of broadcast domain.
    VLAN (virtual local area network) is a logical grouping or segmenting the devices under a single broadcast domain. as a result provides Security and Flexibility.

  40. Question 29. What Network You Used?

    Answer :

    • LAN
    • Wi-Fi
    • WLAN
    • WAN
    • VAN
    • PAN
    • CAN
  41. Question 30. The Protocols Found In Network Layer Are

    Answer :

    Protocols TCP/IP is used to configure windows Operating System which is abrreviated as Transmission Control Protocol for transmitting data from one system to another.
    Protocols IPX/SPX are used in Unix operating system for transmitting data.
    Protocols ICMP are used as Internet Protocols.

  42. Question 31. What Are The Components Of Snmp?

    Answer :

    A complete SNMP system consists of the following parts:-
    SNMP Manager – A network management system that uses SNMP to poll and receive data from any number of network devices. The SNMP manager usually is an application that runs in a central location.
    SNMP Agent – A process that runs on the network device being monitored. All types of data are gathered by the device itself and stored in a local database. The agent can then respond to SNMP polls and queries with information from the database, and it can send unsolicited alerts or “traps” to an SNMP manager.

  43. Question 32. Which Ports Are Used In Snmp?

    Answer :

    SNMP uses the UDP port 161 for sending and receiving requests, and port 162 for receiving traps from managed devices.

  44. Question 33. Explain Mib?

    Answer :

    MIB is a hierarchical Database Structure for information on the device. Example – Serial numbers are in a specific location, NIC Statistics etc.

  45. Post Office Protocol (POP) Interview Questions

  46. Question 34. What Are Different Snmp Versions?

    Answer :

    Here are different versions of SNMP – SNMP V1, SNMP V2c, and SNMP V3.
    SNMP version 1 – It is the oldest flavor. It is Easy to set up – only requires a plaintext community.
    SNMP version 2c – It is identical to Version 1, except that it adds support for 64 bit counters.
    SNMP version 3 – It adds security to the 64 bit counters. SNMP version 3 adds both Encryption and Authentication, which can be used together or separately.

  47. Question 35. How Do I Implement Snmp On My Network?

    Answer :

     The first step is to implement the TCP/IP communication stack. This may appear on your network software (I know its on Windows NT) or you may have to purchase a TCP/IP stack implementation. Usually implementing TCP/IP involves giving each node on your network a distinct IP address. “Telnet” is a key component of TCP/IP. If you can use “telnet” on your network then you are running TCP/IP and you have nothing to worry about.
    The next step is to get an SNMP manager and agent. Both of these are available freely throughout the net. The agents should be installed on each node of the network while the manager should be installed on the machines you wish to monitor the network from. Once all of these elements are in place you can follow the instructions provided with both your manager and agent and configure the network and SNMP accordingly. People who want to make SNMP easier to use may wish to either purchase or download a graphical network manager (such as IBM’s Netview or HP’s Open View Network Manager; there’s also lots of good shareware network managers out. I highly recommend this route to SNMP newbie’s .

  48. Question 36. What Is The Tcp/ip Communication Stack?

    Answer :

    As stated in the network management document, SNMP runs under the TCP/IP communication stack (it’s a layer 7 application). The TCP/IP stack is a way in which vendor-inspecific computer networks can communicate. For instance, say my LAN of brand X’s computers uses communication protocol XX to communicate. If I wanted to create a WAN with by connecting my LAN to a friend’s LAN of brand Y computers (that use communication protocol YY to communicate; then I would have a problem… for how could protocol XX talk to protocol YY. This is where TCP/IP steps in, providing a common communication protocol between LAN’s.


  49. Real-Time Transport Protocol Interview Questions

  50. Question 37. How Common Is Tcp/ip?

    Answer :

    TCP/IP is very common. As explained above, if you use “telnet” or “ftp” then you are using the TCP/IP communication stack. It is so common, that many companies offer TCP/IP PC software for very low prices.

  51. Question 38. What Are Mibs, And How Are They Accessed?

    Answer :

    A Management Information Base (MIB) is a collection of information that is organized hierarchically. MIBs are accessed using a network-management protocol such as SNMP. They are comprised of managed objects and are identified by object identifiers.

  52. Question 39. What Is The Agent?

    Answer :

    The agent runs off of each node on the network. Many UNIX software vendors include this with their terminal software. It collects network and terminal information as specified in the MIB. Many public domain agaents are available (most notable the CMU agent). A common programming job is extending an agent to accomplish the specific needs of your network and this task is fairly straightforward given the right resources.