下沙论坛

 找回密码
 注册论坛(EC通行证)

用新浪微博连接

一步搞定

QQ登录

QQ登录

下沙大学生网QQ群8(千人群)
群号:6490324 ,验证:下沙大学生网。
用手机发布本地信息严禁群发,各种宣传贴请发表在下沙信息版块有问必答,欢迎提问 提升会员等级,助你宣传
新会员必读 大学生的论坛下沙新生必读下沙币获得方法及使用
查看: 2696|回复: 3
打印 上一主题 下一主题

HP0-632 题库下载

[复制链接]
头像被屏蔽

该用户从未签到

跳转到指定楼层
1
发表于 2009-2-19 15:01:19 | 只看该作者 回帖奖励 |倒序浏览 |阅读模式
* p5 p3 a8 T. V; R$ k1 d
HP0-632 : NNM 1(7.x) Essentials2 d8 m. r' Z8 A- E

8 J. a' U  b8 b% {, \NNM 1(7.x) Essentials 题库根据厂家考试的变化动态更新,在厂家考题每次发生变化后,我们承诺2天内更新 NNM 1(7.x) Essentials 题库。确保 NNM 1(7.x) Essentials 考题的覆盖率始终都在96%以上。
) h( z1 D7 U7 D! ^
# Z7 M$ F, N  X/ m9 d1.( }2 T7 c  X& G6 C! z
You have finished installing several connector-type network devices that only have a MAC address and would like to discover them using your management stations. What do you need to verify next?+ @1 c& J6 e- L* l% s1 E& `
A.that NNM ET discovery is enabled
" P8 U0 Y' c+ S! M; gB.that the Discover Level-2 Objects box under IP Discovery Polling options is checked) C& ]% {) ^! I7 {9 Z" z' z
C.that the Don't Discover Level-2 Objects box under IP Discovery Polling options is NOT checked7 X8 _, T% U8 x, h* B  l0 j
D.that the Perform Topology Checks on Connector devices box under General Polling is checked
1 T- x% p& h% T+ T* `" v) a( |Correct:B
- c3 P3 `5 B5 g3 Y4 A2.NNM Advanced Edition 7 on Unix now provides a function to convert syslog messages to SNMP traps. Where is this feature documented?
/ }8 {. x! h$ bA.This is an unsupported feature so no documentation exists.
$ t; H+ B3 \, \+ jB.in the Using Extended Topology manual
9 _2 t6 K1 D' E7 `+ w+ R! xC.in the Syslog Integration white paper) Z. `& G- N& ?% I$ Q. t
D.in the Unix man pages# D* \% t9 B! O7 X
Correct:C
) @1 L) w" S* e/ U( A5 x" M% y3.An existing NNM Advanced Edition installation is required to support monitoring of Cisco HSRP groups. Which additional Smart Plug-in (SPI) software license needs to be purchased?+ r  f1 z! A$ ]+ G8 q* i8 K8 t1 K
A.SPI for Advanced Routing
3 y! l, `& A: aB.SPI for Multicast8 A  z$ {% ?( B6 l& D' H7 q
C.SPI for LAN/WAN edge" ?9 x9 H* z8 p6 C( s/ [
D.SPI for MPLS/ n; t2 q1 e! c
Correct:A
) c, l4 s. e, h# Q& B, q4.What is the supported mechanism for authorizing users in NNM7 Dynamic Views?
: y# T7 H* u/ s, s0 t7 w1 s6 zA.operating system based user and password
! J/ b( `2 S5 y( ?B.Java Naming and Directory Interface (JNDI)
$ D2 d( M  X+ FC.Tomcat memory realms
9 _: N6 L# @" {/ w4 A( g6 W- q& S% YD.ODBC realms
1 ^! H( E, P0 O) j1 ^: v! XCorrect:C ) f! o$ u" v5 d- R5 T, r; m
5.What is the minimum supported Java Plug-in required for Microsoft Internet Explorer when used to display Dynamic Views?% l: _  L* `7 F0 ?# J. K+ \
A.JPI 1.3.1_02
0 C9 A+ b7 d0 _) H3 Z* t2 kB.Microsoft Java Virtual Machine build 3805
: A' U5 Y$ x- H$ iC.JPI 1.4.1_05+ Y8 w; N/ F* {( d. P5 J$ k
D.JPI 1.4.2_01
  V& ~1 l1 G" ?* |/ q! J  P8 y' I7 uCorrect
( g, J6 ^3 \: Q' D. [9 M5 [6.Dynamic Views in NNM 7 allow nodes to be added and deleted from the discovered topology. Which statement is true?
4 R- I* D% ~6 i( I& T1 l8 oA.Dynamic Views now support a read-write mode.
9 m1 U$ S) @( U5 C$ z- t! s5 V2 k+ MB.These actions are secured by allowing them only to occur on a browser session launched locally on the NNM system.1 @$ w* e5 Q" M
C.The menu items to perform these actions are not enabled by default.
8 ]  U/ Z, ?! E5 L- u! K! ED.These actions are secured based on NNM user credentials.
, z' `8 g6 U- H7 y( [  E( v$ A  ACorrect + v) R& V8 W' R& `* S
7.Which command backs up the Extended Topology database?! K, k! E6 q1 j" o! D
A.ovbackup.ovpl7 G& o3 H6 c+ j9 K, d
B.BackupExtTopo.ovpl
7 t, s5 i# ^* e0 f6 GC.ovet_backup.ovpl
- @2 o; E# R; h( g6 M1 FD.ovet_topodump.ovpl1 Y8 U+ u+ R: n6 {  d
Correct:A
# G& {) k5 c" g. k8.What are the options to gather the interface/node ratio? Select TWO.& {( j8 B* v2 ^  S( |8 S, p) f9 r
A.ovobjprint2 g+ f6 D5 ?' {; ^$ E" o- s& |
B.ovtopodump' S$ P% |- w6 V
C.Home Base / Discovery Status / View Topology Summary
% b4 `" w6 ]- HD.ovdwquery* z9 d/ R& e1 V4 ]
E.ovstatus# N" E6 Z. A. o& R$ g' m5 m7 L
Correct:B C $ q+ g# @8 l( {1 \# r7 y! N
9.To clean out old trend data from the data warehouse without affecting the SNMPCollect database, the command parameter would be _______.' G+ B( {" p/ e+ f
A.-delpriorto
7 w5 {" j& t% D$ x: T" f  u* L5 BB.-trimpriorto  C" H) Q$ O0 S. m) w, b; c) x
C.-exportpriorto, }# D) P( w4 a- q% P5 G; x+ B# Q5 M
D.-unloadpriorto) K0 s4 R% Z" L/ y( L3 c, Q
Correct:B
* b* m; V$ k* [6 A) R0 Q  J6 b10.NNM automatically detects poorly performing DNS Servers by timing DNS requests. The network administrator can improve NNM performance by modifying _____________ .2 Q6 P* }: S& J1 U- C
A.xnmevents.conf
* I9 N+ M5 k5 P# Q9 m  MB.netmon.lrf0 u0 V  x5 D+ q
C.SnmpCollect_DNS.arf8 n. m  ]- Q4 Q# f
D.trapd.conf
& b7 {0 V% C0 t9 NE.ovet_disco.lrf1 C) {2 \! ?3 l/ G1 y
Correct:B
分享到:  QQ好友和群QQ好友和群 QQ空间QQ空间 腾讯微博腾讯微博 腾讯朋友腾讯朋友
收藏收藏 分享分享 顶 踩 转发到微博

本版积分规则

关闭

下沙大学生网推荐上一条 /1 下一条

快速回复 返回顶部 返回列表