下沙论坛

 找回密码
 注册论坛(EC通行证)

用新浪微博连接

一步搞定

QQ登录

QQ登录

下沙大学生网QQ群8(千人群)
群号:6490324 ,验证:下沙大学生网。
用手机发布本地信息严禁群发,各种宣传贴请发表在下沙信息版块有问必答,欢迎提问 提升会员等级,助你宣传
新会员必读 大学生的论坛下沙新生必读下沙币获得方法及使用
查看: 2658|回复: 3
打印 上一主题 下一主题

HP0-632 题库下载

[复制链接]
头像被屏蔽

该用户从未签到

跳转到指定楼层
1
发表于 2009-2-19 15:01:19 | 只看该作者 回帖奖励 |倒序浏览 |阅读模式
4 _5 \" Y* h  Y. N+ g$ Z
HP0-632 : NNM 1(7.x) Essentials/ ]7 e* o' g  A7 @! Q2 A
3 K$ R7 W6 Q" a% d/ V+ W3 \
NNM 1(7.x) Essentials 题库根据厂家考试的变化动态更新,在厂家考题每次发生变化后,我们承诺2天内更新 NNM 1(7.x) Essentials 题库。确保 NNM 1(7.x) Essentials 考题的覆盖率始终都在96%以上。/ f2 K( N) u) z- V0 t$ G

" q1 O6 h; X. a% u, I7 d8 ?1./ ^4 E3 k7 y9 O' a& C2 ~7 l
You have finished installing several connector-type network devices that only have a MAC address and would like to discover them using your management stations. What do you need to verify next?
* F/ K; h9 u) z0 G* C7 kA.that NNM ET discovery is enabled
/ d7 j, @$ O6 K3 o2 UB.that the Discover Level-2 Objects box under IP Discovery Polling options is checked
) y4 F! ?3 x4 l% M9 l! M$ TC.that the Don't Discover Level-2 Objects box under IP Discovery Polling options is NOT checked: J' f$ g& h5 V( m) m$ D1 ^# Q5 Q
D.that the Perform Topology Checks on Connector devices box under General Polling is checked$ M. S6 U$ B) A* k( E; [
Correct:B
& o$ \1 }  C+ S; v3 E2.NNM Advanced Edition 7 on Unix now provides a function to convert syslog messages to SNMP traps. Where is this feature documented?  \* e. s/ r- l' [
A.This is an unsupported feature so no documentation exists.8 l8 T9 Y  x; f
B.in the Using Extended Topology manual
' o! C% e! ^- b) p" E: x5 ?C.in the Syslog Integration white paper
& O% c- t; n+ f1 C% wD.in the Unix man pages9 _5 m" v; \. h+ ~
Correct:C
! t: }9 n5 `3 h# z( [4 K4 m, d2 D3.An existing NNM Advanced Edition installation is required to support monitoring of Cisco HSRP groups. Which additional Smart Plug-in (SPI) software license needs to be purchased?4 j  l3 P+ i6 n7 i& K
A.SPI for Advanced Routing+ U# s% H/ m1 Q7 S1 k7 b
B.SPI for Multicast7 Q+ S4 @6 I; p' w+ [7 b  {. V
C.SPI for LAN/WAN edge& T: R$ I' m3 f9 U7 X6 m
D.SPI for MPLS
& |8 x& K3 b8 F. H5 v2 wCorrect:A 1 r) d. ~* V) z' v6 u+ A
4.What is the supported mechanism for authorizing users in NNM7 Dynamic Views?
' j5 q9 V0 ?( e. x' L4 wA.operating system based user and password6 x9 }$ i0 Z+ \6 ], u4 n
B.Java Naming and Directory Interface (JNDI)
7 U3 n7 v' S5 G6 u/ M7 I% P' SC.Tomcat memory realms
# h! k/ `+ u7 H% G* OD.ODBC realms( I3 a) `  s8 \$ X$ M, F' @
Correct:C
9 c+ N) |8 o- Z7 i' c4 l6 g5.What is the minimum supported Java Plug-in required for Microsoft Internet Explorer when used to display Dynamic Views?
. p. N3 Z% C8 I: r$ R: oA.JPI 1.3.1_02" b/ @7 X! Z0 ^5 |; M& e
B.Microsoft Java Virtual Machine build 3805
& E# a& ~& k& m+ ]& P! f+ vC.JPI 1.4.1_05
9 V. @% C' w, L' t* m0 tD.JPI 1.4.2_01
1 Q; j' A& g: I3 T) f$ @Correct . G6 O, i( ]7 y
6.Dynamic Views in NNM 7 allow nodes to be added and deleted from the discovered topology. Which statement is true?
! f! z2 h! m* k$ M9 Q8 ZA.Dynamic Views now support a read-write mode.
0 I8 J) A+ s9 X. OB.These actions are secured by allowing them only to occur on a browser session launched locally on the NNM system.
3 Z3 t1 c+ l  |5 R* U, R3 h2 y" YC.The menu items to perform these actions are not enabled by default.( }9 A1 m+ h2 t
D.These actions are secured based on NNM user credentials.
8 h% {! s# M% p# h; o- f; [Correct
6 U5 m! |+ L- S- q7.Which command backs up the Extended Topology database?
6 g$ K) Y% t0 U, {# e. jA.ovbackup.ovpl
3 R9 C  L; z; X8 K, Z8 nB.BackupExtTopo.ovpl+ s$ J6 O. C; E" i/ e7 A0 W
C.ovet_backup.ovpl
5 e2 V6 K) o7 tD.ovet_topodump.ovpl, {& n6 n6 ?+ l4 _8 C: L% x8 e. ?
Correct:A
) ], _8 y3 Q3 b8.What are the options to gather the interface/node ratio? Select TWO.; k0 \" u2 o" @* |; Z
A.ovobjprint
: e( j5 r+ u) o% kB.ovtopodump: X7 H- i/ \8 p4 I: g0 q7 C( I5 @
C.Home Base / Discovery Status / View Topology Summary
/ A8 P# {) e( mD.ovdwquery
/ X# K" }8 u+ R. Q; {$ sE.ovstatus. B* A3 S4 @* v4 T* w+ a
Correct:B C
, m0 C! b- p5 ^8 n) b% [3 |* `. `9.To clean out old trend data from the data warehouse without affecting the SNMPCollect database, the command parameter would be _______.
& d0 n5 w$ |0 r( ^* v. D; G7 fA.-delpriorto! y+ l  O/ c# {- |
B.-trimpriorto& e+ Y& M* I! [8 U# g5 [- A
C.-exportpriorto
9 X- b) E. w0 M3 ?% JD.-unloadpriorto5 s. m) ?, d; n+ S0 h5 O/ [+ f; `7 j
Correct:B / s2 P0 l" E- X* t+ `
10.NNM automatically detects poorly performing DNS Servers by timing DNS requests. The network administrator can improve NNM performance by modifying _____________ .
3 `: O0 x0 P6 ?* D4 M2 B. w& RA.xnmevents.conf
  Z9 F1 r! G: g4 ]0 P; N/ |; uB.netmon.lrf
- M7 j: V7 @# O( m- k  }' zC.SnmpCollect_DNS.arf6 y9 D: m0 N1 m: A
D.trapd.conf. g; o0 O# }7 E  C
E.ovet_disco.lrf  P0 a4 r3 \: ?, Q0 T
Correct:B
分享到:  QQ好友和群QQ好友和群 QQ空间QQ空间 腾讯微博腾讯微博 腾讯朋友腾讯朋友
收藏收藏 分享分享 顶 踩 转发到微博

本版积分规则

关闭

下沙大学生网推荐上一条 /1 下一条

快速回复 返回顶部 返回列表