下沙论坛

 找回密码
 注册论坛(EC通行证)

用新浪微博连接

一步搞定

QQ登录

QQ登录

下沙大学生网QQ群8(千人群)
群号:6490324 ,验证:下沙大学生网。
用手机发布本地信息严禁群发,各种宣传贴请发表在下沙信息版块有问必答,欢迎提问 提升会员等级,助你宣传
新会员必读 大学生的论坛下沙新生必读下沙币获得方法及使用
查看: 2642|回复: 3

HP0-632 题库下载

[复制链接]
头像被屏蔽

该用户从未签到

发表于 2009-2-19 15:01:19 | 显示全部楼层 |阅读模式
7 S2 l# s3 K5 o* ^# f0 Z
HP0-632 : NNM 1(7.x) Essentials
2 ^+ [5 l* h8 i9 \) F; q
. t# s6 P3 f+ f4 \1 ^# kNNM 1(7.x) Essentials 题库根据厂家考试的变化动态更新,在厂家考题每次发生变化后,我们承诺2天内更新 NNM 1(7.x) Essentials 题库。确保 NNM 1(7.x) Essentials 考题的覆盖率始终都在96%以上。! g5 a/ y4 }% o) \' [+ q( b( w6 T

1 I. h( \/ G' o! B! F1.
% Y' A4 b) ^: N9 Q8 \" n$ i, }You have finished installing several connector-type network devices that only have a MAC address and would like to discover them using your management stations. What do you need to verify next?
/ q" D" h. R6 i& d0 a: ~2 X3 LA.that NNM ET discovery is enabled% a0 a% U  [' i% J
B.that the Discover Level-2 Objects box under IP Discovery Polling options is checked
/ a8 H$ D& D: TC.that the Don't Discover Level-2 Objects box under IP Discovery Polling options is NOT checked0 O/ h0 D) W; C1 V! L2 g: k7 u
D.that the Perform Topology Checks on Connector devices box under General Polling is checked
; R( p+ W8 i$ JCorrect:B + ^, F* D& u( W: Z3 T6 A
2.NNM Advanced Edition 7 on Unix now provides a function to convert syslog messages to SNMP traps. Where is this feature documented?$ J% y$ ]7 c7 z$ q9 X& F7 D6 j6 q$ n2 B
A.This is an unsupported feature so no documentation exists.
9 b* O# X0 d* \& E) B; J$ l. ]B.in the Using Extended Topology manual0 Y9 ^% ~' i; ~4 ^' B# q. a$ p0 t
C.in the Syslog Integration white paper  a3 l, r; L. O4 U/ \! ~
D.in the Unix man pages2 u. @5 I" O; r: Q
Correct:C % K" P3 f& {" |6 F' M: Q
3.An existing NNM Advanced Edition installation is required to support monitoring of Cisco HSRP groups. Which additional Smart Plug-in (SPI) software license needs to be purchased?
! {" |  F+ G+ J5 bA.SPI for Advanced Routing
/ V* i& h) i' e0 JB.SPI for Multicast3 r" ?. C; s: D1 |
C.SPI for LAN/WAN edge
' q" d* F9 |/ B7 h1 ND.SPI for MPLS: K" W% H; {" A; F: \0 f. I
Correct:A
2 ?3 `$ }: l/ Z+ h3 L" l4.What is the supported mechanism for authorizing users in NNM7 Dynamic Views?. C3 j  L! X: F& i% D
A.operating system based user and password
0 M5 F! d6 _% {B.Java Naming and Directory Interface (JNDI)3 N) `! U  Q5 B7 M7 s2 ?6 W0 S9 X
C.Tomcat memory realms- [: V" I1 x1 i2 R8 I9 K4 X6 J
D.ODBC realms. ^7 l. B; H) _  E; L- s. M
Correct:C # _* Y: ^4 K# ~1 }0 x' Q
5.What is the minimum supported Java Plug-in required for Microsoft Internet Explorer when used to display Dynamic Views?$ ~( `) `% P+ R1 P6 W
A.JPI 1.3.1_021 K! ]1 z: n* S# N1 W3 d' }( `
B.Microsoft Java Virtual Machine build 3805
' B# B( q7 ?  w9 {5 G8 S+ ~1 mC.JPI 1.4.1_05
# X$ H3 r0 n( H2 a- K' R# k) c0 VD.JPI 1.4.2_015 w0 ^9 N. Y( W1 W
Correct
* p& T) I6 \( d& j) m6.Dynamic Views in NNM 7 allow nodes to be added and deleted from the discovered topology. Which statement is true?# d# K8 v+ C' Y+ }% \1 y' Q
A.Dynamic Views now support a read-write mode.
& s+ N- U- n+ r6 c4 y; ZB.These actions are secured by allowing them only to occur on a browser session launched locally on the NNM system.8 ?8 U# S, k* Z8 c+ a
C.The menu items to perform these actions are not enabled by default.
  A2 d" c6 Y& {0 B( D! u$ U* P/ m' MD.These actions are secured based on NNM user credentials.
: V! X, b& Z* ^1 aCorrect 0 `9 P- X. y8 F9 u
7.Which command backs up the Extended Topology database?
' {- O. M$ K( z, F/ bA.ovbackup.ovpl6 H: O4 o* A. Z: v8 }' q& a5 }
B.BackupExtTopo.ovpl) {2 w) _" j3 u! u  M
C.ovet_backup.ovpl
: t  G. \3 `  lD.ovet_topodump.ovpl3 C/ p2 Y! i' u, t) Q
Correct:A 1 P- X  @& Q4 f, L; W7 B+ a# e: q& v
8.What are the options to gather the interface/node ratio? Select TWO.' }  B& Y1 x2 A# N" e
A.ovobjprint$ t# P) ?8 {) j# |
B.ovtopodump
8 _" U) ?. A2 f2 _9 p2 B6 k9 q( }C.Home Base / Discovery Status / View Topology Summary$ s% g% D  J- a( Q
D.ovdwquery9 G# N# h6 G& X1 E8 y( d
E.ovstatus; x& Q; O7 h0 A: ~3 ^& ~+ r7 Z
Correct:B C
& |% I3 R9 x  |. x" E' R+ Q9.To clean out old trend data from the data warehouse without affecting the SNMPCollect database, the command parameter would be _______.
( c" @" M1 {2 h$ e( d# K- f' yA.-delpriorto, m7 {0 F& n7 k- [; ~
B.-trimpriorto( L& y" o  U! i6 ?$ e# s8 Q- ]
C.-exportpriorto
9 T6 |* i  s+ V5 P+ j  U3 |0 `! UD.-unloadpriorto
2 }7 C7 h- J9 E3 e4 F4 ~Correct:B " n; A+ O+ B! l: X1 X3 N
10.NNM automatically detects poorly performing DNS Servers by timing DNS requests. The network administrator can improve NNM performance by modifying _____________ .: b! v6 z/ w% c
A.xnmevents.conf
6 _4 x7 R: \0 G! m) iB.netmon.lrf
: j0 t0 Q2 r+ a* T( W8 l1 AC.SnmpCollect_DNS.arf2 f9 s/ h1 K* J& I2 N) W- w  q
D.trapd.conf
9 z: X8 w8 y. }/ `( \E.ovet_disco.lrf6 R% n% j* {7 u  E( N- ?% ~! K1 _7 {
Correct:B

本版积分规则

关闭

下沙大学生网推荐上一条 /1 下一条

快速回复 返回顶部 返回列表