answersLogoWhite

0


Best Answer

SNMP

User Avatar

Wiki User

9y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What protocol is used to manage and monitor devices on a network?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What Manage and monitor devices on a network?

Protocol SNMP and port 161


What protocol manage and monitor devices on a network?

SNMP is the most widely used protocol for network monitoring


What is an example of a network management services?

Network Management Systems comprise a suite of software and network tools to monitor the status of devices on the network, and optionally manage those devices or fix issues that have come up.The main IP "protocol" (tool) that is used for network management is referred to as SNMP or Simple Network Management Protocol. Network devices--including servers, printers, computers, routers, hubs/switches, and a host of other devices--all have SNMP either built-in for enabling and configuring, or can be equipped with SNMP through some sort of installation process.Tivoli NetView from IBM is an example of a long-standing network management platform.Note that network management software is necessary only for medium to very large businesses with many hundreds or thousands of devices and is therefore traditionally very expensive.


What are some of the programs that can monitor network performance?

Op Manager is a robust network performance software monitor that is available on the web. It was developed by Manage Engine. Tech Republic also provides a review Microsoft's resource monitoring tool.


Susan will be configuring a snort network IDS sensor to monitor her subnetwork. She will be using a web-based console interface to manage the IDS system and will need to configure an?

Alert Monitor


Susan will be configuring a snort network IDS sensor to monitor her subnetwork She will be using a web-based console interface to manage the IDS system and will need to configure an?

Alert Monitor


What is the purpose of a network inventory system?

Network inventory systems allow one to keep track of devices connected to a particular network. It allows one to manage their computer network and potentially reduce downtime.


What are the functions of intermediate device on computer network?

Intermediate devices in a computer network serve various essential functions to facilitate communication and the smooth operation of data transmission. Some of these functions include: Routing: Intermediate devices like routers direct data between networks, determining the most efficient path for information to travel. Switching: Switches manage data within a network, enabling devices to communicate directly with one another. They forward data only to the intended recipient. Forwarding: This involves the actual transmission of data packets from one network device to another based on destination addresses. Filtering and Security: Devices like firewalls can be used to filter and monitor network traffic, providing security by blocking unauthorized access or potentially harmful content. Address Translation: Devices like Network Address Translation (NAT) allow multiple devices within a local network to share a single public IP address, enhancing security and conserving IP addresses. Traffic Segmentation and Load Balancing: These devices help manage heavy traffic by distributing it across multiple paths or connections, ensuring optimal network performance. Extending Connectivity: Repeaters, range extenders, and access points amplify and extend network signals to cover larger areas or connect devices wirelessly. These intermediate devices work in tandem to ensure that data is transmitted efficiently and securely across networks, allowing for effective communication and functionality within the broader network infrastructure.


What will you need to configure a snort network IDS sensor to monitor subnetwork using a web-based console interface to manage the IDS system?

You need the alert monitor to configure and store the alert data which is recorded by the snort sensor.


What can you do with ftp program?

An FTP (File Transfer Protocol) program is used to upload, download and manage files between computers on a network. You will need a user ID and password to use the program.


What is the use of CCNA and what a person is capable of doing after completing it?

You use CCNA to... - attract more employers - become a computer network savvy person - re-engineer existing networks, etc. Upon CCNA completion, you must be able to... -design a sophisticated network model -come up with a best neworking topology -manage intermediary network devices -calculate network bandwidth usage -configure layer 2 and 3 devices -routing -vlan management -configure NAT -master subnetting -get acquainted with VLSM -decide what networking protocol to implement on a network -implement network port security -implement access listing -get acquainted with VTP and STP -implement failover and redundancy settings -and many more!


Which control related components should the manager include in the project management plan?

-How to perform configuration management -How to monitor and manage change -How to monitor and manage issues that arise