下沙论坛

 找回密码
 注册论坛(EC通行证)

QQ登录

QQ登录

下沙大学生网QQ群8(千人群)
群号:6490324 ,验证:下沙大学生网。
用手机发布本地信息严禁群发,各种宣传贴请发表在下沙信息版块有问必答,欢迎提问 提升会员等级,助你宣传
新会员必读 大学生的论坛下沙新生必读下沙币获得方法及使用
查看: 2905|回复: 3
打印 上一主题 下一主题

HP0-632 题库下载

[复制链接]
头像被屏蔽

该用户从未签到

跳转到指定楼层
1
发表于 2009-2-19 15:01:19 | 只看该作者 回帖奖励 |倒序浏览 |阅读模式
9 f/ _3 r) J& K9 @
HP0-632 : NNM 1(7.x) Essentials( j& r8 o% ^: {& N  M$ u1 Q

( U/ w% `: K$ o9 U3 [1 ?1 vNNM 1(7.x) Essentials 题库根据厂家考试的变化动态更新,在厂家考题每次发生变化后,我们承诺2天内更新 NNM 1(7.x) Essentials 题库。确保 NNM 1(7.x) Essentials 考题的覆盖率始终都在96%以上。3 S; ]! P  b: Z2 p' m

3 ~* \( E* g9 ]8 v# p9 S0 e1.+ E4 F) M: k# U; k6 ~) Y- m5 S
You have finished installing several connector-type network devices that only have a MAC address and would like to discover them using your management stations. What do you need to verify next?. j7 L( N# D' i! m9 G7 C, ]
A.that NNM ET discovery is enabled
- h* c/ t: _4 t" R1 w( J! b2 _) nB.that the Discover Level-2 Objects box under IP Discovery Polling options is checked
& Y7 s( M* {1 X. o* s( Y5 MC.that the Don't Discover Level-2 Objects box under IP Discovery Polling options is NOT checked3 I! \& A( o+ ?
D.that the Perform Topology Checks on Connector devices box under General Polling is checked* V  t  T- D$ ^' H5 `
Correct:B ' h) V  N$ y5 p3 P% [  C
2.NNM Advanced Edition 7 on Unix now provides a function to convert syslog messages to SNMP traps. Where is this feature documented?# I. Z/ p! n' j5 j, o
A.This is an unsupported feature so no documentation exists.! W/ b. G5 P9 {; i+ _* n, R% ~. F! j
B.in the Using Extended Topology manual
2 N; C7 N! S" s2 q4 I6 QC.in the Syslog Integration white paper: H, K- q( v1 M6 Y3 z$ r6 Y
D.in the Unix man pages
- e5 R# C" S: a: i& J% ^Correct:C : G7 U, u/ L: J# t
3.An existing NNM Advanced Edition installation is required to support monitoring of Cisco HSRP groups. Which additional Smart Plug-in (SPI) software license needs to be purchased?
( v$ @" @! y/ M2 Q4 R* pA.SPI for Advanced Routing
- i% I' s. ^2 M: m: o5 x4 uB.SPI for Multicast
5 o3 {! n; ~. iC.SPI for LAN/WAN edge
$ T3 ^9 ~3 a9 {D.SPI for MPLS6 m* C* b% z4 R" u1 @) i
Correct:A ( f" b  ?; ]; T& n0 _
4.What is the supported mechanism for authorizing users in NNM7 Dynamic Views?
! I2 G0 y' h( ~: Q) t9 ~A.operating system based user and password. P$ q) U% a  J% }2 k: Z: W- L2 ?4 p0 i) F
B.Java Naming and Directory Interface (JNDI)
* e( ]3 u! G- k/ g5 D; T$ BC.Tomcat memory realms
4 Y3 F. m* B' E" U& Q! a* T  rD.ODBC realms
2 x! H9 I( ^9 q7 ICorrect:C
/ |- v4 ?6 R2 I* m; h5.What is the minimum supported Java Plug-in required for Microsoft Internet Explorer when used to display Dynamic Views?
1 B/ R+ w0 P, c8 H* bA.JPI 1.3.1_021 o- U1 p4 @  T6 Q/ g! P5 Z# N
B.Microsoft Java Virtual Machine build 3805
0 Q+ F' ?! N+ C& H* Q- G* YC.JPI 1.4.1_05/ y4 R0 ~: j3 O
D.JPI 1.4.2_01* z5 {# B& G, l" Y7 J3 n3 m/ K$ X2 j
Correct
, U& e7 A+ P# a6.Dynamic Views in NNM 7 allow nodes to be added and deleted from the discovered topology. Which statement is true?
) H& @! D' x8 ]6 LA.Dynamic Views now support a read-write mode.
. d3 `$ D0 `& ^$ a3 ?% R6 ZB.These actions are secured by allowing them only to occur on a browser session launched locally on the NNM system.
( q1 f% h! ^- ]C.The menu items to perform these actions are not enabled by default.
* n7 w0 S5 B6 f9 f2 DD.These actions are secured based on NNM user credentials.
/ a% O1 W( j+ |* gCorrect
5 P' |0 @; R3 U, m7.Which command backs up the Extended Topology database?
% i' D6 o* Q2 l5 Q0 G0 ~! d) M' RA.ovbackup.ovpl& m( G  M( z& @6 i; f4 O
B.BackupExtTopo.ovpl7 w; [: {# o  f. l* Q# }/ _& {
C.ovet_backup.ovpl
1 |) Q# e$ l$ f- A; w; PD.ovet_topodump.ovpl5 v5 p9 O3 ]9 z( h  C' R
Correct:A
* w8 o3 z/ U8 [; f" |  _) k+ m8.What are the options to gather the interface/node ratio? Select TWO.: V1 u. i% K( ?+ i' i
A.ovobjprint
/ S7 x. o  e: `4 u, j( XB.ovtopodump* l, i) y& J, ?6 D4 U8 a2 C& s
C.Home Base / Discovery Status / View Topology Summary6 g4 [  y# u7 f/ g2 C! e$ \$ t
D.ovdwquery+ }# @, ?& U3 A" y+ b0 h) U3 g' S
E.ovstatus) T5 L$ Z! m5 k3 U. U0 `
Correct:B C
* G( f. |% r$ m' p; g& b6 _9.To clean out old trend data from the data warehouse without affecting the SNMPCollect database, the command parameter would be _______.
9 K3 ]; s1 d% p( P1 I1 O* bA.-delpriorto+ Z  w, O( r" g8 C* i. w
B.-trimpriorto
0 H, @; r7 {, ]+ z% N5 hC.-exportpriorto, V, i7 f4 n% m  V4 L
D.-unloadpriorto
, U) ^7 I8 W8 Y7 y& s; u# K. {8 zCorrect:B 9 L, B' @9 _6 D+ A
10.NNM automatically detects poorly performing DNS Servers by timing DNS requests. The network administrator can improve NNM performance by modifying _____________ .5 W/ G3 `" M" S. \
A.xnmevents.conf
. R! u5 S4 o% {B.netmon.lrf. p6 e) V" J$ v* Y0 L% v' |! D  \
C.SnmpCollect_DNS.arf8 D# Q( l" x4 y1 u; V/ o+ x
D.trapd.conf
* W+ G9 ~+ h7 \E.ovet_disco.lrf+ w; w: k$ V" W9 W, b
Correct:B
分享到:  QQ好友和群QQ好友和群 QQ空间QQ空间 腾讯微博腾讯微博 腾讯朋友腾讯朋友
收藏收藏 分享分享 顶 踩

本版积分规则

关闭

下沙大学生网推荐上一条 /1 下一条

快速回复 返回顶部 返回列表