下沙论坛

 找回密码
 注册论坛(EC通行证)

QQ登录

QQ登录

下沙大学生网QQ群8(千人群)
群号:6490324 ,验证:下沙大学生网。
用手机发布本地信息严禁群发,各种宣传贴请发表在下沙信息版块有问必答,欢迎提问 提升会员等级,助你宣传
新会员必读 大学生的论坛下沙新生必读下沙币获得方法及使用
查看: 2890|回复: 3
打印 上一主题 下一主题

HP0-632 题库下载

[复制链接]
头像被屏蔽

该用户从未签到

跳转到指定楼层
1
发表于 2009-2-19 15:01:19 | 只看该作者 回帖奖励 |倒序浏览 |阅读模式

, B3 `2 v( a( ?& IHP0-632 : NNM 1(7.x) Essentials# Y" y) X1 u* g5 V9 p

) ?& G# g: n3 ?$ T# uNNM 1(7.x) Essentials 题库根据厂家考试的变化动态更新,在厂家考题每次发生变化后,我们承诺2天内更新 NNM 1(7.x) Essentials 题库。确保 NNM 1(7.x) Essentials 考题的覆盖率始终都在96%以上。
6 Y2 `8 L5 k4 ^2 M
% c0 L6 a' b* p$ y6 {% u1 g6 g1.
/ e9 u0 r2 L# \. yYou have finished installing several connector-type network devices that only have a MAC address and would like to discover them using your management stations. What do you need to verify next?6 `7 C3 w, r/ v2 w! t' B6 y8 X" Y, D
A.that NNM ET discovery is enabled
0 w4 U$ c( M) N+ y) R% ~7 qB.that the Discover Level-2 Objects box under IP Discovery Polling options is checked
: H: m/ a) u4 R' S0 lC.that the Don't Discover Level-2 Objects box under IP Discovery Polling options is NOT checked
8 i, I/ G/ C: m' ~1 O' L; GD.that the Perform Topology Checks on Connector devices box under General Polling is checked: u) B, U2 F% K& N
Correct:B
; n) A' x) j$ B2 [$ v; K- F) ?2.NNM Advanced Edition 7 on Unix now provides a function to convert syslog messages to SNMP traps. Where is this feature documented?
( I( k9 f9 E" ?6 ^A.This is an unsupported feature so no documentation exists.7 U% W% p2 ^( N4 w7 v; j$ N
B.in the Using Extended Topology manual" V0 K, o) F, t
C.in the Syslog Integration white paper
* V% O. c) x  _- }( QD.in the Unix man pages
8 C* X$ T1 y( z: p+ n- J0 \- _1 Y; tCorrect:C
: E5 H) l0 u3 I8 V3.An existing NNM Advanced Edition installation is required to support monitoring of Cisco HSRP groups. Which additional Smart Plug-in (SPI) software license needs to be purchased?
2 @5 J3 i/ M' x5 t' H* U0 jA.SPI for Advanced Routing
, ?& z/ C0 U7 D' YB.SPI for Multicast
3 r  K3 m9 H0 d6 KC.SPI for LAN/WAN edge
7 W: T* G' Z; o+ c6 ?D.SPI for MPLS& G  {* V7 g8 x/ j! ]
Correct:A & c- j. L  W) y# B* C* {, [
4.What is the supported mechanism for authorizing users in NNM7 Dynamic Views?
0 o5 }2 L, {2 lA.operating system based user and password
9 \9 r* A1 Q; u" ^B.Java Naming and Directory Interface (JNDI)# `5 R  r; C' W7 x8 h4 J6 k7 W7 u% j- z
C.Tomcat memory realms7 ?6 X/ X8 u8 X
D.ODBC realms0 E: i( r9 G1 l6 c9 t1 }5 M
Correct:C
  M) {# a$ L) J) I4 Y' o5 y( O5.What is the minimum supported Java Plug-in required for Microsoft Internet Explorer when used to display Dynamic Views?- r  p3 \9 R- |
A.JPI 1.3.1_021 u  h, ?) n# o6 \' l: x6 b" y
B.Microsoft Java Virtual Machine build 3805% O$ C6 c- Y# n8 U2 ?
C.JPI 1.4.1_05
; R: X* T) b4 w- n7 J1 }: jD.JPI 1.4.2_01; _$ g. i7 g/ U+ n' G2 C/ t
Correct % B7 b1 n6 w2 y7 a, q5 d
6.Dynamic Views in NNM 7 allow nodes to be added and deleted from the discovered topology. Which statement is true?
2 h9 ^5 V4 q) s( n# F: v! `A.Dynamic Views now support a read-write mode.4 Y+ F0 s. r/ |0 q
B.These actions are secured by allowing them only to occur on a browser session launched locally on the NNM system.% {# I# Q7 r$ u; g2 i8 {" o
C.The menu items to perform these actions are not enabled by default.) d9 S" E8 `5 A$ U+ S% t% ^: i
D.These actions are secured based on NNM user credentials.6 `/ G" D* M2 P
Correct 0 r7 j3 z6 x" }0 Y3 v: `
7.Which command backs up the Extended Topology database?% c$ ^* V6 z2 s- f, \7 x6 ~. \
A.ovbackup.ovpl
: Q9 q) o: V. k4 z- G' ~: cB.BackupExtTopo.ovpl: z- `: ~, l2 G2 y# f: @
C.ovet_backup.ovpl7 u) F7 o" l# u! M
D.ovet_topodump.ovpl
  c2 K$ ]+ F! H. R, QCorrect:A ; B: C' M+ f$ w  J
8.What are the options to gather the interface/node ratio? Select TWO.0 o8 s  p6 m& Y5 W7 {
A.ovobjprint
% W6 J* t9 x. }& [3 y- J0 C( iB.ovtopodump' Y" n" S6 Z/ {' ?3 p4 G
C.Home Base / Discovery Status / View Topology Summary
/ B. b' W4 _6 v7 x& t& Z0 BD.ovdwquery
. z9 B$ e/ f5 {' s6 YE.ovstatus; j3 l* V$ T* Y: O  J& t
Correct:B C
6 B, R1 Q5 D; Q7 h1 }: l( ]5 l9.To clean out old trend data from the data warehouse without affecting the SNMPCollect database, the command parameter would be _______.
9 U' q& h) {- \" l, aA.-delpriorto- F% r6 K/ \" s3 z( G9 ?2 \" |) Z
B.-trimpriorto
  }1 H: M# Y+ q1 b; k5 U6 kC.-exportpriorto
5 Q$ \& \. u9 ?% [D.-unloadpriorto' _! f8 P; [# [( F! ^* O7 L/ }2 B
Correct:B
) H, C. s0 F* ^( c! O  M1 a- M! Y& ^10.NNM automatically detects poorly performing DNS Servers by timing DNS requests. The network administrator can improve NNM performance by modifying _____________ .( b6 H9 c! Q' Y
A.xnmevents.conf
( z; w; X( ?, n3 a4 y% ~+ @& {( TB.netmon.lrf
" @5 L, s, ], N& q: R; J6 L4 z% _% uC.SnmpCollect_DNS.arf
1 m9 l4 K. v! Y& _, _, zD.trapd.conf
# i; @5 J* D' HE.ovet_disco.lrf% K, ~7 ?( E3 [, N* D/ k- v# b. x
Correct:B
分享到:  QQ好友和群QQ好友和群 QQ空间QQ空间 腾讯微博腾讯微博 腾讯朋友腾讯朋友
收藏收藏 分享分享 顶 踩

本版积分规则

关闭

下沙大学生网推荐上一条 /1 下一条

快速回复 返回顶部 返回列表