下沙论坛

 找回密码
 注册论坛(EC通行证)

用新浪微博连接

一步搞定

QQ登录

QQ登录

下沙大学生网QQ群8(千人群)
群号:6490324 ,验证:下沙大学生网。
用手机发布本地信息严禁群发,各种宣传贴请发表在下沙信息版块有问必答,欢迎提问 提升会员等级,助你宣传
新会员必读 大学生的论坛下沙新生必读下沙币获得方法及使用
查看: 2815|回复: 3
打印 上一主题 下一主题

HP0-632 题库下载

[复制链接]
头像被屏蔽

该用户从未签到

跳转到指定楼层
1
发表于 2009-2-19 15:01:19 | 只看该作者 回帖奖励 |倒序浏览 |阅读模式
! [* a: ?# E7 y1 ^5 |0 }
HP0-632 : NNM 1(7.x) Essentials
: ^- }" }# j: [) B
2 E& N2 P$ V" S! uNNM 1(7.x) Essentials 题库根据厂家考试的变化动态更新,在厂家考题每次发生变化后,我们承诺2天内更新 NNM 1(7.x) Essentials 题库。确保 NNM 1(7.x) Essentials 考题的覆盖率始终都在96%以上。
0 [- j: {: J3 u, J% d  h7 _ , g  s% c" a, t
1.% N, L; [3 X8 g3 Z+ ]8 N
You have finished installing several connector-type network devices that only have a MAC address and would like to discover them using your management stations. What do you need to verify next?
* i  {& f9 a; p; bA.that NNM ET discovery is enabled9 a6 l4 C  l8 F
B.that the Discover Level-2 Objects box under IP Discovery Polling options is checked7 T; E$ b$ D. o: u9 o
C.that the Don't Discover Level-2 Objects box under IP Discovery Polling options is NOT checked
9 l6 E8 K0 e8 `' r1 ED.that the Perform Topology Checks on Connector devices box under General Polling is checked
4 ?8 W1 v$ B; }; `; F% k1 Z* K8 d1 MCorrect:B
7 G. ?2 _* D1 L+ A& |* z2.NNM Advanced Edition 7 on Unix now provides a function to convert syslog messages to SNMP traps. Where is this feature documented?
8 z. J) r) E( e+ T3 k* [8 M7 LA.This is an unsupported feature so no documentation exists., L7 z9 p; e  e+ h" N! z0 A2 O" x
B.in the Using Extended Topology manual( D# s! e( \+ G5 f4 ~8 Y) t
C.in the Syslog Integration white paper3 V! |. s. o" c* l9 @4 O/ Y
D.in the Unix man pages
4 w- ]; e4 t) O" B0 k( \4 HCorrect:C . M( m1 d$ j7 a- \# ?
3.An existing NNM Advanced Edition installation is required to support monitoring of Cisco HSRP groups. Which additional Smart Plug-in (SPI) software license needs to be purchased?$ O; H8 o- \; D+ s; I7 E
A.SPI for Advanced Routing6 U' M1 g% R0 K! ?
B.SPI for Multicast
: [( n. n: }. z" I$ @C.SPI for LAN/WAN edge
% G  I- L1 c+ ~D.SPI for MPLS
  u* V( A2 W- T2 D- Q% b7 b- n. b5 zCorrect:A
2 C, V9 d+ H2 W! K% D4.What is the supported mechanism for authorizing users in NNM7 Dynamic Views?
8 W( O5 k+ [* M" w' RA.operating system based user and password
$ J; j; T8 i9 r% R4 P0 y( D9 OB.Java Naming and Directory Interface (JNDI)
+ a- _0 W( g4 }$ g8 Y) u& bC.Tomcat memory realms( B! H8 a+ D  J' a
D.ODBC realms
9 s8 J9 S1 Y$ G& D2 BCorrect:C
" _6 n6 f2 C) P+ S5.What is the minimum supported Java Plug-in required for Microsoft Internet Explorer when used to display Dynamic Views?/ T5 B$ x4 Y. M: s+ C5 p7 ?
A.JPI 1.3.1_026 }' \7 o! n4 k& I5 p% I$ J) r- A! O% A
B.Microsoft Java Virtual Machine build 3805: h. n7 N6 ^2 r$ K
C.JPI 1.4.1_05
; Q3 J% @, ~" t7 [' UD.JPI 1.4.2_01
8 Q  `7 n: u+ ?. _% c& W" jCorrect
0 R4 q  I" J- h3 h1 _6.Dynamic Views in NNM 7 allow nodes to be added and deleted from the discovered topology. Which statement is true?% F5 e5 P7 L5 V
A.Dynamic Views now support a read-write mode./ W# w) M/ K; g6 J: a4 m
B.These actions are secured by allowing them only to occur on a browser session launched locally on the NNM system.
( }7 I: g& p6 `4 \3 nC.The menu items to perform these actions are not enabled by default.
( h/ U3 x4 @/ T% [( C# A9 i2 oD.These actions are secured based on NNM user credentials.
2 X+ w! F' Y" A% eCorrect   Z% W; F  ^% z/ j6 M* R
7.Which command backs up the Extended Topology database?$ g! s6 y  I& U; a- E1 v. ^9 f
A.ovbackup.ovpl
# L! A$ o. z9 M2 aB.BackupExtTopo.ovpl
/ A. [7 k& X2 R$ _  m! bC.ovet_backup.ovpl7 O# W* R9 x+ ~8 d
D.ovet_topodump.ovpl1 H; ?, p& O2 W9 Y) V' ?4 {
Correct:A
8 O# b0 }- A" ^1 T# K8.What are the options to gather the interface/node ratio? Select TWO.% Q) r8 v; F) c% D3 w1 v2 \  _
A.ovobjprint  `7 D1 E: c; ~
B.ovtopodump* \+ u& x% V& q* h1 R7 y; Q3 X( u
C.Home Base / Discovery Status / View Topology Summary
- X( ?: X3 S& G$ V: tD.ovdwquery
8 {6 l! G" K  L  n# t/ \0 i2 YE.ovstatus
! ?" Y- w7 L; W7 E, HCorrect:B C
. w: m! B- D8 N9 q3 X9.To clean out old trend data from the data warehouse without affecting the SNMPCollect database, the command parameter would be _______.9 Q) T1 `0 C  U. N1 r6 u
A.-delpriorto% _7 p3 a/ \' k5 K
B.-trimpriorto% ]) m% y* F. ?5 X& j1 n2 d+ G
C.-exportpriorto& T3 L- j$ y; x4 E9 U
D.-unloadpriorto, `- k* x6 T& s7 Z9 s1 Q* l3 @
Correct:B . x3 e# P. o. Q$ A5 c
10.NNM automatically detects poorly performing DNS Servers by timing DNS requests. The network administrator can improve NNM performance by modifying _____________ .
( g' [5 {+ |. @: M2 \- ZA.xnmevents.conf$ R0 Z4 E* ~2 T
B.netmon.lrf
5 N$ \  W( U7 Q. J& g. `1 cC.SnmpCollect_DNS.arf
; X, y8 K* A- x: }8 A0 ^/ [* z6 I; AD.trapd.conf6 X* [2 _* ]. [7 B7 Z) A  A
E.ovet_disco.lrf% g# Q, [! q  ?  E, h" u
Correct:B
分享到:  QQ好友和群QQ好友和群 QQ空间QQ空间 腾讯微博腾讯微博 腾讯朋友腾讯朋友
收藏收藏 分享分享 顶 踩 转发到微博

本版积分规则

关闭

下沙大学生网推荐上一条 /1 下一条

快速回复 返回顶部 返回列表