下沙论坛

 找回密码
 注册论坛(EC通行证)

用新浪微博连接

一步搞定

QQ登录

QQ登录

下沙大学生网QQ群8(千人群)
群号:6490324 ,验证:下沙大学生网。
用手机发布本地信息严禁群发,各种宣传贴请发表在下沙信息版块有问必答,欢迎提问 提升会员等级,助你宣传
新会员必读 大学生的论坛下沙新生必读下沙币获得方法及使用
查看: 2759|回复: 3
打印 上一主题 下一主题

HP0-632 题库下载

[复制链接]
头像被屏蔽

该用户从未签到

跳转到指定楼层
1
发表于 2009-2-19 15:01:19 | 只看该作者 回帖奖励 |正序浏览 |阅读模式

2 H2 U) Q5 I% `6 i: l" z: R/ qHP0-632 : NNM 1(7.x) Essentials
! h" m2 D3 Z/ R2 m6 D8 i: F3 G
3 p( Q1 L% w' c' o1 UNNM 1(7.x) Essentials 题库根据厂家考试的变化动态更新,在厂家考题每次发生变化后,我们承诺2天内更新 NNM 1(7.x) Essentials 题库。确保 NNM 1(7.x) Essentials 考题的覆盖率始终都在96%以上。
0 O7 ?6 m/ B9 e
& z! e- A3 D5 f9 E1 Z1./ w0 N9 [6 c) N
You have finished installing several connector-type network devices that only have a MAC address and would like to discover them using your management stations. What do you need to verify next?
9 C0 l' I& ?4 X4 u/ @" |A.that NNM ET discovery is enabled  z( G3 d; \* T$ B' @
B.that the Discover Level-2 Objects box under IP Discovery Polling options is checked  r7 j# Y/ B) K( e* w/ s+ d" Y
C.that the Don't Discover Level-2 Objects box under IP Discovery Polling options is NOT checked- U# k- \, {5 R* b3 ?
D.that the Perform Topology Checks on Connector devices box under General Polling is checked
: q: \( U  q+ q7 c4 ?Correct:B   Z7 h  [1 e6 g5 t3 R/ K' \
2.NNM Advanced Edition 7 on Unix now provides a function to convert syslog messages to SNMP traps. Where is this feature documented?! M/ L3 Z" g. H7 T3 ?4 m" y
A.This is an unsupported feature so no documentation exists.3 q' X0 f) p1 x) Q  D- K# G$ a
B.in the Using Extended Topology manual
' M5 j3 z, `, N1 C8 R! u# V, YC.in the Syslog Integration white paper
1 Q5 G( X2 q7 a4 W4 AD.in the Unix man pages
, }) f, o6 p$ x+ YCorrect:C ' c' l, R3 n  G* h9 q) I
3.An existing NNM Advanced Edition installation is required to support monitoring of Cisco HSRP groups. Which additional Smart Plug-in (SPI) software license needs to be purchased?9 a: V, v7 E$ l, X
A.SPI for Advanced Routing
% l+ b) q4 T7 U% z- T8 s- G8 tB.SPI for Multicast
( `: D8 Q4 q/ _# n4 W* m* s, O: \2 [C.SPI for LAN/WAN edge5 B  R/ N0 c6 s4 n' {
D.SPI for MPLS8 f9 A. ~* L; c& i( Q; j
Correct:A ) j5 F' _; s* l: L5 f
4.What is the supported mechanism for authorizing users in NNM7 Dynamic Views?
8 J9 o. u# L, W9 hA.operating system based user and password
' P$ H) a( N+ p+ }# bB.Java Naming and Directory Interface (JNDI)
9 @8 V9 g8 w+ OC.Tomcat memory realms
7 [' Q2 z# F. I4 BD.ODBC realms
/ Q' b) B. g! l) |4 s3 z4 ^Correct:C # e( C$ M7 h& J! T( ?
5.What is the minimum supported Java Plug-in required for Microsoft Internet Explorer when used to display Dynamic Views?
# q* }* I" y4 i+ ], D$ }A.JPI 1.3.1_02
& f" ]/ P# j" D. Y+ rB.Microsoft Java Virtual Machine build 3805
! q9 F/ \, |! y* b! GC.JPI 1.4.1_05" x! T2 n4 G4 O4 ?  c6 I2 I
D.JPI 1.4.2_010 a  [: e! P8 _0 D
Correct % L1 f6 K* A; A+ C0 m- r
6.Dynamic Views in NNM 7 allow nodes to be added and deleted from the discovered topology. Which statement is true?
, [3 J- [/ _$ o1 T/ f$ u8 QA.Dynamic Views now support a read-write mode.3 `' ^7 L" y* w3 @* q6 ~4 L" ?% u
B.These actions are secured by allowing them only to occur on a browser session launched locally on the NNM system.. [8 ]: h( k( f' N0 q1 i; z
C.The menu items to perform these actions are not enabled by default.4 M/ B) x8 H9 M3 q3 z
D.These actions are secured based on NNM user credentials.
0 K( g; w/ Y5 eCorrect 6 }" A0 o$ @. u( `: A) s
7.Which command backs up the Extended Topology database?# ?$ G7 D* i$ {( t4 L
A.ovbackup.ovpl4 @; ?2 H$ q* ^6 V9 P; X; H/ c1 ?
B.BackupExtTopo.ovpl7 Y/ l  j3 `& s1 \) f( E9 c: I
C.ovet_backup.ovpl9 _& o: |0 |* F) q  {% @
D.ovet_topodump.ovpl. k6 }' n$ F! `3 x) b5 b$ |
Correct:A # H, n7 [" g, L2 l
8.What are the options to gather the interface/node ratio? Select TWO.* f  D' z0 q3 b4 Y8 ~. Q
A.ovobjprint
3 v* S% t, w$ u* o$ TB.ovtopodump
9 K4 J( D8 h" N$ ZC.Home Base / Discovery Status / View Topology Summary; i7 b& L( M* O: q  T
D.ovdwquery( C& h* r! T. O2 d% x3 }+ _
E.ovstatus
+ A" o3 ~1 ?' x- y9 HCorrect:B C 2 f! K. _+ j( M% w8 Z
9.To clean out old trend data from the data warehouse without affecting the SNMPCollect database, the command parameter would be _______.
; U9 }1 {/ n4 I: _8 x$ TA.-delpriorto' d" t  X" n% @/ _: Z. E& A( a" u
B.-trimpriorto
" k, y9 [! w+ }9 BC.-exportpriorto/ `, U( ^9 C( \) I" V
D.-unloadpriorto' s% z3 C# c+ ]  r1 ~5 T$ |
Correct:B # d) w7 E% c" p. N9 f: Z, }7 l
10.NNM automatically detects poorly performing DNS Servers by timing DNS requests. The network administrator can improve NNM performance by modifying _____________ .
/ i4 a, V" g7 \9 @) Y" @  W9 FA.xnmevents.conf
, p  G4 [9 ^' H( W1 P# @B.netmon.lrf
1 U& k" d9 u- L2 P3 ?$ DC.SnmpCollect_DNS.arf$ s9 p$ ~, W5 I7 b2 t
D.trapd.conf
0 a( k7 R6 {- l; K% L  GE.ovet_disco.lrf0 e& q( n/ |. \$ ?
Correct:B
分享到:  QQ好友和群QQ好友和群 QQ空间QQ空间 腾讯微博腾讯微博 腾讯朋友腾讯朋友
收藏收藏 分享分享 顶 踩 转发到微博
关闭

下沙大学生网推荐上一条 /1 下一条

快速回复 返回顶部 返回列表