下沙论坛

 找回密码
 注册论坛(EC通行证)

QQ登录

QQ登录

下沙大学生网QQ群8(千人群)
群号:6490324 ,验证:下沙大学生网。
用手机发布本地信息严禁群发,各种宣传贴请发表在下沙信息版块有问必答,欢迎提问 提升会员等级,助你宣传
新会员必读 大学生的论坛下沙新生必读下沙币获得方法及使用
查看: 2835|回复: 3
打印 上一主题 下一主题

HP0-632 题库下载

[复制链接]
头像被屏蔽

该用户从未签到

跳转到指定楼层
1
发表于 2009-2-19 15:01:19 | 只看该作者 回帖奖励 |倒序浏览 |阅读模式

5 `9 ]3 T, {% lHP0-632 : NNM 1(7.x) Essentials, k5 L: m5 m& m4 X+ D

* L+ B4 V4 O4 I3 [5 [% S" zNNM 1(7.x) Essentials 题库根据厂家考试的变化动态更新,在厂家考题每次发生变化后,我们承诺2天内更新 NNM 1(7.x) Essentials 题库。确保 NNM 1(7.x) Essentials 考题的覆盖率始终都在96%以上。
7 A* k+ H" W9 C& T 7 q% O8 S5 E" U+ X! D; \/ M
1.
+ o* Z: n* K- H& @( p: Z5 B% jYou have finished installing several connector-type network devices that only have a MAC address and would like to discover them using your management stations. What do you need to verify next?
  y; t4 X4 E, z  ~A.that NNM ET discovery is enabled
7 x- n4 {" V% l) oB.that the Discover Level-2 Objects box under IP Discovery Polling options is checked; |% P3 |# n+ G& y' ^9 H
C.that the Don't Discover Level-2 Objects box under IP Discovery Polling options is NOT checked( }+ V2 H- m& K; M: l) n, t$ R: q/ l
D.that the Perform Topology Checks on Connector devices box under General Polling is checked* G9 z5 ]7 S2 o5 \( T
Correct:B
' @! E8 o; @7 m- G* F2 U& `2.NNM Advanced Edition 7 on Unix now provides a function to convert syslog messages to SNMP traps. Where is this feature documented?% ]! T9 R5 f7 Z' Y- n. _
A.This is an unsupported feature so no documentation exists.
$ ?/ c/ r) V3 w' V; {! B$ WB.in the Using Extended Topology manual4 u/ \9 O0 q+ u* w
C.in the Syslog Integration white paper
- ^, g1 v- ?- \0 n* y; h( i3 J9 ~D.in the Unix man pages" y# C$ U- p+ d& W
Correct:C
3 [: H) p0 s  C: D5 W  y- K2 l3.An existing NNM Advanced Edition installation is required to support monitoring of Cisco HSRP groups. Which additional Smart Plug-in (SPI) software license needs to be purchased?) n: E7 B4 M* b" e2 \
A.SPI for Advanced Routing
7 A2 q# E5 J, W4 F9 x+ Y8 \/ }' ^B.SPI for Multicast
) {' a; g" H" W( y% OC.SPI for LAN/WAN edge% A1 o1 i& E4 g- ?
D.SPI for MPLS0 ]- S( B% i% e7 ]7 d
Correct:A , E) |9 M, p2 {' W: Z! L4 {! a& h
4.What is the supported mechanism for authorizing users in NNM7 Dynamic Views?
  Z5 g/ f( S6 J2 K9 ^6 a  g3 B9 sA.operating system based user and password8 \) W0 n0 f% V( K' ?5 ~6 Y
B.Java Naming and Directory Interface (JNDI)
) S1 x' P9 `' D" @C.Tomcat memory realms
! n& Y/ ^2 S2 P& F) m) dD.ODBC realms, L, h) P/ g" C, W" H
Correct:C
) y' z* b  F% X+ {& _( l5.What is the minimum supported Java Plug-in required for Microsoft Internet Explorer when used to display Dynamic Views?! y% c1 E  |( G/ \1 w6 b9 q3 h1 _
A.JPI 1.3.1_02
6 D" K) w' y1 J7 X8 O- p$ [B.Microsoft Java Virtual Machine build 3805
/ _6 G% P1 `' ~' bC.JPI 1.4.1_05
6 m6 C+ p: F/ E; a2 v* Q3 H0 |( j) K3 A7 ]D.JPI 1.4.2_013 t8 p# }' o+ s: _9 k" S; F/ C
Correct 3 |* I  e) i$ d" I0 o! [
6.Dynamic Views in NNM 7 allow nodes to be added and deleted from the discovered topology. Which statement is true?
0 x5 y6 }8 X3 D& J$ n. m1 iA.Dynamic Views now support a read-write mode.
/ J; B- w' v& t: l1 NB.These actions are secured by allowing them only to occur on a browser session launched locally on the NNM system.
. j& k& c( Q4 ?4 ~9 |( ]# vC.The menu items to perform these actions are not enabled by default.% Q' {) G* u1 K8 u0 x; r
D.These actions are secured based on NNM user credentials.! \& E6 v9 ~$ ]; d
Correct
* g( \* a4 Z  }! f7.Which command backs up the Extended Topology database?
1 U  X8 R9 V& `0 }A.ovbackup.ovpl5 T0 o2 P6 [8 U3 A% }
B.BackupExtTopo.ovpl, ?- y2 c- w% l: @; f
C.ovet_backup.ovpl& P& ^9 ]& F# c9 |. f- g3 D, K
D.ovet_topodump.ovpl
0 `7 K# q' l8 y8 ?( M% n( R; mCorrect:A
8 ?. P3 {( ^5 Y6 c/ z) U8.What are the options to gather the interface/node ratio? Select TWO.
+ `6 _8 @' E- o2 E7 r' OA.ovobjprint9 `: N/ p- Z6 N
B.ovtopodump) n, J1 y4 o) {3 }& g5 h5 A: @. @* f
C.Home Base / Discovery Status / View Topology Summary
9 k, @1 o% h9 T2 s$ {D.ovdwquery
, C/ Y3 X1 G+ y. i! X0 r, kE.ovstatus
5 Q( e0 Y0 G* @$ FCorrect:B C # {6 |" n6 c% }) p* T, C
9.To clean out old trend data from the data warehouse without affecting the SNMPCollect database, the command parameter would be _______.% \( x3 [1 {# t8 H
A.-delpriorto
9 T# G+ |7 N0 F- c# ?0 C* r, p7 KB.-trimpriorto
! `8 }* p3 U( OC.-exportpriorto! A+ m/ b/ t. ?. C3 P5 f+ |# E1 Q
D.-unloadpriorto
9 O% b: b: f# L* qCorrect:B 7 g) `# u. |8 A: |1 _: q
10.NNM automatically detects poorly performing DNS Servers by timing DNS requests. The network administrator can improve NNM performance by modifying _____________ .+ n; d* Z9 |7 D! X5 e
A.xnmevents.conf& v1 q7 S9 l- ]3 J& r$ L% H$ b1 G
B.netmon.lrf
0 _' e6 U5 z+ y$ ]3 ?C.SnmpCollect_DNS.arf
( S+ J/ k& B2 U8 k# z6 s; MD.trapd.conf6 \; a  P, e! ~  T
E.ovet_disco.lrf
& k" O- o7 d! p% x' e$ RCorrect:B
分享到:  QQ好友和群QQ好友和群 QQ空间QQ空间 腾讯微博腾讯微博 腾讯朋友腾讯朋友
收藏收藏 分享分享 顶 踩

本版积分规则

关闭

下沙大学生网推荐上一条 /1 下一条

快速回复 返回顶部 返回列表