下沙论坛

 找回密码
 注册论坛(EC通行证)

用新浪微博连接

一步搞定

QQ登录

QQ登录

下沙大学生网QQ群8(千人群)
群号:6490324 ,验证:下沙大学生网。
用手机发布本地信息严禁群发,各种宣传贴请发表在下沙信息版块有问必答,欢迎提问 提升会员等级,助你宣传
新会员必读 大学生的论坛下沙新生必读下沙币获得方法及使用
查看: 2816|回复: 3
打印 上一主题 下一主题

HP0-632 题库下载

[复制链接]
头像被屏蔽

该用户从未签到

跳转到指定楼层
1
发表于 2009-2-19 15:01:19 | 只看该作者 回帖奖励 |倒序浏览 |阅读模式

4 T- v0 Y: W: z0 M& R4 [HP0-632 : NNM 1(7.x) Essentials1 d% S7 F6 |& U! \2 r4 a' k

* ]; s1 [* o/ @2 ^1 e9 ^9 GNNM 1(7.x) Essentials 题库根据厂家考试的变化动态更新,在厂家考题每次发生变化后,我们承诺2天内更新 NNM 1(7.x) Essentials 题库。确保 NNM 1(7.x) Essentials 考题的覆盖率始终都在96%以上。$ L1 q6 J% O0 {
7 U9 }4 n5 Y, P" R& ?. e) Z
1.! Z- P& C- y4 V, }2 R; a: v" K
You have finished installing several connector-type network devices that only have a MAC address and would like to discover them using your management stations. What do you need to verify next?
  ~' H+ n; `- B7 B+ ^A.that NNM ET discovery is enabled, E% r8 s( }6 P9 Y4 u% q( C
B.that the Discover Level-2 Objects box under IP Discovery Polling options is checked8 I- L) f6 H, C" X. Q6 Y) q
C.that the Don't Discover Level-2 Objects box under IP Discovery Polling options is NOT checked- d9 Z* i! b  A; c
D.that the Perform Topology Checks on Connector devices box under General Polling is checked
1 p& O% V5 l. B* V7 }* \+ kCorrect:B
/ H. ]2 }8 c: ^$ |$ _; e2.NNM Advanced Edition 7 on Unix now provides a function to convert syslog messages to SNMP traps. Where is this feature documented?* @" U; n2 O3 U. [5 R  V* w; k
A.This is an unsupported feature so no documentation exists.
# A6 x; U" D4 Y# r- c" V/ gB.in the Using Extended Topology manual, o8 _6 a( G. _1 [
C.in the Syslog Integration white paper
* P  r! Y; [2 VD.in the Unix man pages3 @3 F, i2 u2 ?3 J, R* O6 O  m1 |
Correct:C
; \' ^/ d* U- K2 p& \% ^5 O4 q6 L# w3.An existing NNM Advanced Edition installation is required to support monitoring of Cisco HSRP groups. Which additional Smart Plug-in (SPI) software license needs to be purchased?: V* A7 o8 U7 T$ H. {
A.SPI for Advanced Routing  [# g1 W# D* P6 G
B.SPI for Multicast4 ~) \" d+ _: p2 D
C.SPI for LAN/WAN edge6 Y4 j3 Y$ x- E
D.SPI for MPLS
1 w, R$ U; M' B! F- t1 ]Correct:A
1 E& m: `1 `6 _; A4.What is the supported mechanism for authorizing users in NNM7 Dynamic Views?
& l0 c7 }9 q/ c; ~. K  k, v: EA.operating system based user and password
, V! L* b( X) L" F" eB.Java Naming and Directory Interface (JNDI)
+ M- D- |# P6 E- h5 W, |9 XC.Tomcat memory realms
( i. Z& C. L! N1 c2 AD.ODBC realms
# B2 [# _  `3 z. S3 H* }Correct:C 8 h* M7 U. x. J1 {
5.What is the minimum supported Java Plug-in required for Microsoft Internet Explorer when used to display Dynamic Views?& ]+ i& I4 Q- {/ G$ m
A.JPI 1.3.1_02
# T+ |9 ^3 D7 Y) N9 k) h$ I! @B.Microsoft Java Virtual Machine build 3805
9 q- ~' v+ f- A- K1 g4 c: J+ |/ WC.JPI 1.4.1_05
; ?# _) |) a2 sD.JPI 1.4.2_01' Y+ t+ G0 M" y
Correct ) d9 i. V' x) N, ~5 \+ t. F3 G: l
6.Dynamic Views in NNM 7 allow nodes to be added and deleted from the discovered topology. Which statement is true?: i( u3 V$ E4 ^' K$ L% ~3 Z9 u: R
A.Dynamic Views now support a read-write mode.
5 _# O* Q: [4 ^% kB.These actions are secured by allowing them only to occur on a browser session launched locally on the NNM system.8 [7 U3 E: k4 }5 f, V. p0 @( C# u
C.The menu items to perform these actions are not enabled by default.
& W* }1 Z& `' {' I7 t# b+ I0 fD.These actions are secured based on NNM user credentials.4 `; Q; W+ K( F# P& q! T5 h
Correct
2 r' ~/ ^, a9 ]7.Which command backs up the Extended Topology database?" p& J, c$ b: I$ f* N
A.ovbackup.ovpl: e- }+ ?4 `; I$ ^/ i7 V4 k1 K
B.BackupExtTopo.ovpl1 W% _2 g0 s" i, Y- M
C.ovet_backup.ovpl
; X/ q  N) Y$ T& {/ c4 \* R1 CD.ovet_topodump.ovpl
  b. W3 u( K+ G8 V/ k8 n( T# cCorrect:A
# x8 K. m7 f9 H9 U8.What are the options to gather the interface/node ratio? Select TWO.- q9 \: w% G; I
A.ovobjprint/ s) E3 L1 V1 O
B.ovtopodump3 A# x# H( i; `
C.Home Base / Discovery Status / View Topology Summary
5 ^7 K+ u& q0 R1 RD.ovdwquery% N$ z- K  y* v$ e. N& _
E.ovstatus" Q, m" K( r% R3 z! p$ u! V
Correct:B C
  u9 a2 O5 s4 C& F5 U" I9.To clean out old trend data from the data warehouse without affecting the SNMPCollect database, the command parameter would be _______.; I  ]- J! Z+ J# N% X
A.-delpriorto
3 d7 ?) L7 A" `' p# \B.-trimpriorto
( n5 P1 ]0 f7 N2 }* R2 t. o. mC.-exportpriorto
& Y* c; a: S( XD.-unloadpriorto- d$ i2 a$ M. T$ }1 @7 a' O  A
Correct:B 3 q) i$ h' f4 q$ l- v6 P8 ]3 ?
10.NNM automatically detects poorly performing DNS Servers by timing DNS requests. The network administrator can improve NNM performance by modifying _____________ .5 r* i: {1 |6 I+ S# W+ w/ a
A.xnmevents.conf( @& P) m2 F( N* X8 D+ D. n0 e
B.netmon.lrf% D/ a/ E. a7 }9 _# x" {, m
C.SnmpCollect_DNS.arf. z: f; M0 ~6 r" L
D.trapd.conf, K, j: d. r1 r. f& F6 G7 y$ m
E.ovet_disco.lrf
7 J6 L! p( F/ n0 a( C1 l/ K. ~# QCorrect:B
分享到:  QQ好友和群QQ好友和群 QQ空间QQ空间 腾讯微博腾讯微博 腾讯朋友腾讯朋友
收藏收藏 分享分享 顶 踩 转发到微博

本版积分规则

关闭

下沙大学生网推荐上一条 /1 下一条

快速回复 返回顶部 返回列表