Question No. 1 In addition to the management applications defined by the OSI mod
ID: 3685903 • Letter: Q
Question
Question No. 1
In addition to the management applications defined by the OSI model, we can consider reports such as system reports and user reports. Explain why. [0.5 mark]
Question No. 2
The OSI model specifies five main management applications: configuration, performance, fault, security, and accounting. Give three details of configuration application. [1.5 mark]
1-
2-
3-
Question No. 3
How SNMPv3 addresses the following threats: masquerade and modification of information? [1 mark]
Explanation / Answer
Answer for Question No 1
layers 8, 9, and 10 are not officially part of the OSI model. They refer to the non-technical aspects of computer networking that often interfere with the smooth design and operation of the network. Based upon these layer output reports are generated to assure the functionalities.
Layer 8 is usually considered the “office politics” layer. In most organizations, there is at least one group who is favored, at least temporarily, by management and receives “special” treatment. When it comes to networking, this may mean that this group always has the latest and/or fastest equipment and highest speed network links.
Layer 9 is generally referred to as the “blinders” layer. This layer applies to organizational managers who have already decided, usually with little or no current information, to dictate a previously successful network plan.
Layer 10, the “user” layer, is in every organization. But users are much more than a layer. While they are one of the reasons the network exists, users can also be a big part of the need for troubleshooting. This is especially true when the users have computers at home and have decided to “help” the network administrator or manager by making changes to the network without consulting the network staff. Equally challenging is the user who “didn’t do anything” when the network segment in his/her immediate vicinity suddenly stopped working. In these cases, the layer 10 identification coincides with layer 10 troubles (and the “ID10T” label some technicians have used).
Answer for Question No 2
configuration management applications are:
• Physical equipment and logical configurations installments.
• Service planning which addresses planning for the introduction of new services, changing deployed service features, and disconnecting existing services.
• Job initiation, tracking, and execution
• Resource initialization
• Network provisioning
• Auto-discovery
• Backup and restore
• Resource shut down
Answer for Question No 3
MASUERADE - when an unauthorized user attempts to carry out management operations by assuming the identity of an authorized user. SNMPv3 can verify the identity of the originator of the SNMPv3 message.
• MODIFICATION OF INFORMATION modification of information is the threat that a user will (by malice or error) alter a message in transit between the source and the destination, thereby carrying out unauthorized management activity. SNMPv3 can verify that the SNMPv3 message was not altered in transit between the originator and the recipient.
These two threats absolutely crucial in providing high availability networks and system
environments.
SNMPv3 protects against masquerade, modification of information by using the Hash-based Message Authentication Code (HMAC) with MD5 Message Digest Algorithm (MD5) in a symmetric, i.e. private, key mode. MD5, defined in Trivial authentication requiring only a correct” user names and strong authentication based on an MD5 hash algorithm. RFC1321, takes “as input a message of arbitrary length and produces as output a fingerprint or ‘message digest’ of the input.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.