Garry is a network administrator in an organization. He uses SNMP to manage networked devices from a remote location. To manage nodes in the network, he uses MIB, which contain formal descriptions of all network objects managed by SNMP. He accesses the contents of MIB by using a web browser either by entering the IP address and Lseries.mib or by entering the DNS library name and Lseries.mib. He is currently retrieving information from an MIB that contains object types for workstations and server services.
Which of the following types of MIB is accessed by Garry in the above scenario?
Option 1 : DHCP.MIB
Option 2 : LNIMIB2.MIB
Option 3 : WINS.MIB
Option 4 : MIB_II.MIB
1. DHCP.MIB
The DHCP Server MIB highlight gives Simple Network Management Protocol (SNMP) admittance to and control of Cisco IOS Dynamic Host Configuration Protocol (DHCP) worker programming on a Cisco switch by an outside organization the executives gadget.
SNMP is an application-layer convention that gives a message arrangement to correspondence between SNMP supervisors and specialists. SNMP gives a normalized system and a typical language that is utilized for observing and overseeing gadgets in an organization.
SNMP characterizes two principle kinds of substances: supervisors and specialists. The SNMP chief is a framework that controls and screens the exercises of organization has utilizing SNMP. The specialist is the product segment inside a far off systems administration gadget that keeps up the information and reports this information, varying, to the supervisor. The administrator and specialist share a Management Information Base (MIB) that characterizes the data that the specialist can make accessible to the supervisor.
A significant component of SNMP is the ability to create spontaneous warnings from a SNMP specialist. These snare notices are messages making the SNMP chief aware of conditions on the organization. Traps are viewed as a specialist to-director work and a solicitation for affirmation of receipt from the SNMP administrator isn’t needed.
2 . LNMIB2.MIB
Contains object types for workstation and worker administrations
3. WINS.MIB
Windows NT form 4 incorporates a MIB that characterizes objects that screen WINS worker action. This MIB (Wins.mib) is naturally introduced when the WINS Server administration is introduced. It contains around 70 articles for arranging and observing WINS, for example, the quantity of goal demands effectively prepared, the quantity of goal demands that fizzled, and the date and season of last information base replication.
The majority of the WINS arrangement boundaries that are set by altering the Registry may likewise be set by utilizing SNMP. WINS objects in the MIB characterized with read-compose access are designed through a NMS.
4. MIB_II.MIB
The mib_ii.mib Management Information Base (MIB) document was initially made by Microsoft for RFC1213, which is for the board of TCP/IP-based systems administration for a host framework.
The lmmib2.mib document contains the accompanying SNMP object types:
SNMP object type | Description |
---|---|
system | This object contains information on the host system, such as identification and contacts. |
interfaces | This object contains information on the network interfaces of the host system, the associated configurations, and statistics. |
at | This object contains Address Translation network information of the host system. |
ip | This object contains Internet Protocol network information of the host system. |
icmp | This object contains Internet Control Message Protocol network information of the host system. |
tcp | This object contains Transmission Control Protocol network information of the host system. |
udp | This object contains User Datagram Protocol network information of the host system. |
egp | This object contains Exterior Gateway Protocol network information of the host system. |
snmp | This object contains Simple Network Management Protocol network information of the host system. |
Traps | This object contains informational, error, and warning information regarding the network interfaces, protocols, and statistics of the host system. |
Learn CEH & Think like hacker
- What is Ethical Hacking? & Types of Hacking
- 5 Phases of Hacking
- 8 Most Common Types of Hacker Motivations
- What are different types of attacks on a system
- Scope and Limitations of Ethical Hacking
- TEN Different Types Of Hackers
- What is the Foot-printing?
- Top 12 steps for Footprinting Penetration Testing
- Different types of tools with Email Footprinting
- What is “Anonymizer” & Types of Anonymizers
- Top DNS Interrogation Tools
- What is SNMP Enumeration?
- Top vulnerability scanning tools
- Information Security of Threat
- Footprinting tools:
- What is Enumeration?
- Network Security Controls
- What is Identity and Access Management?
- OWASP high TEN web application security risks
- Password Attacks
- Defend Against Key loggers
- Defend Against Spyware
- Covering Tracks
- Covering Track on Networks
- Everything You Need To Know About Sniffing – Part 1
- Everything You Need To Know About Sniffing – Part 2
- Learn more about GPS Spyware & Apparatuses
- Introduction of USB Spyware and It’s types
- 10 Types of Identity Theft You Should Know About
- Concepts of Denial-of-Service Attack & Distributed Denial of Service Attack
- Most Effective Ways to Overcome Impersonation on the Social Networking Site’s Problem
- How Dynamic Host Configuration Protocol (DHCP) Works
- DHCP Request/Reply Messages
- DHCP Starvation Attack
- Rogue DHCP Server Attack
- IOS Switch Commands
- Web Server Concept
- Web Server Attacks
- Web Server Attack Tools
- Web Server Security Tools
- 6 Quick Methodology For Web Server Attack
- Learn Skills From Web Server Foot Printing / Banner Grabbing
- The 10 Secrets You Will Never Know About Cyber Security And Its Important?
- Ways To Learn Finding Default Content Of Web Server Effectively
- How will Social Engineering be in the Future
- Understand The Background Of Top 9 Challenges IT Leaders Will Face In 2020 Now
- Learning Good Ways To Protect Yourself From Identity Theft
- Anti-phishing Tools Guide
This Blog Article is posted by
Infosavvy, 2nd Floor, Sai Niketan, Chandavalkar Road Opp. Gora Gandhi Hotel, Above Jumbo King, beside Speakwell Institute, Borivali West, Mumbai, Maharashtra 400092
Contact us – www.info-savvy.com