网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
The customer has implemented an SNMPP based network monitoring tool and wishes to monitor chang3es in the cluster. The general status of the cluster is gathered via SNMP but the poling time to retrieve the status is too slow for immediate reaction to serious issues. There is a technical reason why the polling time cannot be changed.  How can HACMP report changes in its status on a more timely basis?()
A

 Create a pre/post event script to report errors more rapidly.

B

 Edit SNMP configuration file to send traps for cluster state changes.

C

 Change the option in SRC to enable trap mode for the clinfo process.

D

 Use the monitor pre-event facility in HACMP to send information to the monitoring device.


参考答案

参考解析
解析: 暂无解析
更多 “单选题The customer has implemented an SNMPP based network monitoring tool and wishes to monitor chang3es in the cluster. The general status of the cluster is gathered via SNMP but the poling time to retrieve the status is too slow for immediate reaction to serious issues. There is a technical reason why the polling time cannot be changed.  How can HACMP report changes in its status on a more timely basis?()A  Create a pre/post event script to report errors more rapidly.B  Edit SNMP configuration file to send traps for cluster state changes.C  Change the option in SRC to enable trap mode for the clinfo process.D  Use the monitor pre-event facility in HACMP to send information to the monitoring device.” 相关考题
考题 Which two of these are characteristics of MPLS VPNs?() A. Layer 3 MPLS VPNs can forward only IP packetsB. Layer 2 MPLS VPNs can forward any network protocolC. MPLS label paths are automatically formed based on Layer 2 framesD. Layer 3 MPLS VPNs can forward any network protocol based on Layer 2 framesE. In Layer 2 MPLS VPNS, the service provider controls the customer Layer 3 policies

考题 Users on the 172.17.22.0 network cannot reach the server located on the 172.31.5.0 network.The network administrator connected to console port,issued the show ip route command,and was able to ping the server.Based on the output of the show ip route command topology shown in the graphic,what is the cause of the failure?()A.IP routing is not enabledB.A static route is configured incorrectlyC.The network has not fully convergedD.The FastEthernet interface on Coffee is disabledE.The routing table on Coffee has not updatedF.The neighbor relationship table is not correctly updated

考题 Open Shortest Path First (OSPF) was designed as an ( ) gateway protocol, for use in an autonomous system such as a local area network (LAN). It implements Dijkstra's algorithm, also known as the ( ) path first algorithm. As a link-state routing protocol it was based on the link-state algorithm developed for the ARPANET in 1980 and the IS-IS routing protocol. OSPF was first standardised in 1989 as RFC 1131, which is now known as OSPF version 1.Routing protocols like OSPF calculate the shortest route to a destination through the network based on an algorithm. The first routing protocol that was widely implemented, the (请作答此空), calculated the shortest route based on hops, that is the number of routers that an IP packet had to traverse to reach the destination host. RIP successfully implemented dynamic routing, where routing tables change if the network topology changes. But RIP did not adapt its routing according to changing network conditions, such as data-transfer rate. Demand grew for a dynamic routing protocol that could calculate the fastest route to a destination. ( ) was developed so that the shortest path through a network was calculated based on the cost of the route, taking into account bandwidth, delay and load. Therefore OSPF undertakes route cost calculation on the basis of link-cost parameters, which can be weighted by the administrator. OSPF was quickly adopted because it became known for reliably calculating routes through large and complex local area networks.As a link state routing protocol, OSPF maintains link state ( ), which are really network topology maps, on every router on which it is implemented. The state of a given route in the network is the cost, and OSPF algorithm allows every router to calculate the cost of the routes to any given reachable destination. Unless the administrator has made a configuration, the link cost of a path connected to a router is determined by the bit rate (1 Gbit/s, 10 Gbit/s, etc) of the interface. A router interface with OSPF will then advertise its link cost to neighbouring routers through multicast, known as the hello procedure. All routers with OSPF implementation keep sending hello packets, and thus changes in the cost of their links become known to neighbouring routers. The information about the cost of a link, that is the speed of a point to point connection between two routers, is then cascaded through the network because OSPF routers advertise the information they receive from one neighbouring router to all other neighbouring routers. This process of flooding link state information through the network is known as synchronisation. Based on this information, all routers with OSPF implementation continuously update their link state databases with information about the network topology and adjust their routing tables.OSPF has become a popular dynamic routing protocol. Other commonly used dynamic routing protocols are the RIP and the Border Gateway Protocol (BGP). Today routers support at least one interior gateway protocol to advertise their routing tables within a local area network. Frequently implemented interior gateway protocols besides OSPF are RIP, IS-IS, and the proprietary Interior Gateway Routing Protocol (IGRP) by Cisco.A.OSPF B.RIP C.IS-IS D.EIGRP

考题 In the plan phase, network readiness assessment addresses which customer need? Select exactly 1 answer(s) from the following:()。A、an assessment of the preparedness of the customers existing system infrastructure to support a propose solutionB、a comprehensive design that has been customized based on the operations processes, network management processes, and tools of its systemC、an in-depth assessment of the operational environment required to support the operation of both the current and planned solutionsD、the optimal technologies for supporting its business requirements and objectives

考题 A customer has requested a proposal for a p5-520 with AIX 5.2 and Sysback.  There are no plans to run LPARs or Micro-Partitions on the p5-520 in the near future.  The customer has asked the pSeries technical specialist to recommend anything else that may be needed.  Which of the following should be recommended in this situation?()A、HMCB、DVD-ROMC、Tape driveD、Network switch

考题 A customer has a requirement to eliminate single points of failure for an application.  They have allocated one Ethernet adapter to each VIO server on the system. Which features of PowerVM and AIX will support the customer requirement?()A、Etherchannel and trunkingB、Network Interface Backup and EtherchannelC、Shared Ethernet Adapter (SEA) Failover and EtherchannelD、Network Interface Backup and Shared Ethernet Adapter failover

考题 One of your customers has decided to deploy location-based services in addition to existingwireless services. The customer requires that the additional access points to be deployed in monitor-onlymode. The most likely reason for this requirement is that the customer has which of these existingwireless devices?()A、Data CollectionB、802.11b/g VoIPC、802.11b and g clientsD、RFID tags

考题 Which two of these are characteristics of MPLS VPNs? ()A、 Layer 3 MPLS VPNs can forward only IP packetsB、 Layer 2 MPLS VPNs can forward any network protocolC、 MPL S label paths are automatically formed based on Layer 2 framesD、 Layer 3 MPLS VPNs can forward any network protocol based on Layer 2 framesE、 In Layer 2 MPLS VPNS, the service provider controls the customer Layer 3 policies

考题 A user on a network cannot access any network resources. The link light on the computer showsthat a connection is present. Which of the following is the MOST likely cause of the problem?()A、The wrong cable type has been used.B、. IDS has shut down the computer's switch port.C、The port on the switch is configured incorrectlyD、Spanning tree protocol was implemented.

考题 A company has implemented a wireless network for its employees. Since implementing the new network, individuals have been receiving duplicate IP addresses causing network issues. Which of the following would resolve this issue?()A、Add another wireless access point.B、Add another DHCP server.C、Disable the wireless DHCP server.D、Change the default gateway of the wireless router

考题 A company needs additional storage for a block I/O based database application. The application has low I/O bandwidth requirements across the campus. The customer has a TCP/IP infrastructure and is interested in low-cost products that are compatible with its environment. Which technology is most appropriate for this customer?()A、SANB、FCoEC、FCIPD、iSCSI

考题 A customer needs both a database and application server to communicate over a network.  The new systems will be connected to the same network as the current IBM equipment with known IBM serial numbers.  How could a pSeries technical specialist best determine which type of network card is appropriate, without making an additional call to the customer?()A、Use an Inventory Services retrieval to show adapter features.B、Retrieve previous eConfig proposals to see what others had shown.C、Call the Account Executive to ask what the customer has used in the past.D、Query the Supportline problem record database for the customer and LAN keyword matches.

考题 Machine policy templates can be assigned based on certain attributes of a machine. A customer  organizes their machines based on the following requirements:   The machines are all placed in specific Organizational Units in the Active Directory.   The customer has Citrix Servers, and they have a specific naming convention meant only for their Citrix Servers. The customer has DHCP enabled for all the client machines.   The customer has made it clear that they should not need to change anything in the existing infrastructure. Given these requirements, which single assignment attribute would be chosen for assigning machine policy templates?()A、HostnamesB、IP AddressesC、Machine Group TagD、Active Directory Groups

考题 A customer has a very large number of physical Windows-based servers and no centralized storage. Which technology solution will help the customer to reduce the footprint of their existing server estate?()A、z/OS, DS8000, TSMB、TSM, LTO-5, VMwareC、System x, VMware, XIVD、System p, VMware, DS5000

考题 The customer has implemented an SNMPP based network monitoring tool and wishes to monitor chang3es in the cluster. The general status of the cluster is gathered via SNMP but the poling time to retrieve the status is too slow for immediate reaction to serious issues. There is a technical reason why the polling time cannot be changed.  How can HACMP report changes in its status on a more timely basis?()  A、 Create a pre/post event script to report errors more rapidly.B、 Edit SNMP configuration file to send traps for cluster state changes.C、 Change the option in "SRC" to enable trap mode for the "clinfo" process.D、 Use the "monitor" pre-event facility in HACMP to send information to the monitoring device.

考题 A customer plans to implement SVC as part of a solution and has concerns regarding the resilience of the SVC architecture. The correct response to this concern is that SVC().A、is stateless with global referencing of metadataB、is based on cluster architecture with externally provided quorum disksC、is based on cluster architecture, with quorum held internally on the first cluster nodeD、is based on grid architecture, with each node holding a full mirror configuration for all other nodes

考题 A retail customer installs a BladeCenter into an existing 10/100 Ethernet network. Due to cost considerations, the customer uses Copper Pass-thru Modules. After installing this solution, the customer finds that they have no network connectivity. Which is causing the problem of the following?()A、Copper Pass-thru Modules only support 1000Mb line speeds.B、Spanning Tree has been enabled on the Copper Pass-thru Module.C、The customer does not have the latest firmware loaded on the Copper Pass-thru Module.D、The customer is using LS21 Blades

考题 Which four statements are true?()A、Has-a relationships should never be encapsulated.B、Has-a relationships should be implemented using inheritance.C、Has-a relationships can be implemented using instance variables.D、Is-a relationships can be implemented using the extends keyword.E、Is-a relationships can be implemented using the implements keyword.F、An array or a collection can be used to implement a one-to-many has-a relationship.

考题 单选题A customer has a 32-core Power 770 with 4 AIX partitions and 2 IBM i partitions. They want to improve network availability and allow for concurrent maintenance. What will support the customer requirement at least cost?()A Build the logical partition infrastructure based on 6 or more VLANs.B Build the logical partition infrastructure based on two or more IVEs.C Build the logical partition infrastructure based on Partition Mobility.D Build the logical partition infrastructure based on redundant VIO Servers.

考题 单选题A customer plans to implement SVC as part of a solution and has concerns regarding the resilience of the SVC architecture. The correct response to this concern is that SVC().A is stateless with global referencing of metadataB is based on cluster architecture with externally provided quorum disksC is based on cluster architecture, with quorum held internally on the first cluster nodeD is based on grid architecture, with each node holding a full mirror configuration for all other nodes

考题 单选题One of your customers has decided to deploy location-based services in addition to existingwireless services. The customer requires that the additional access points to be deployed in monitor-onlymode. The most likely reason for this requirement is that the customer has which of these existingwireless devices?()A Data CollectionB 802.11b/g VoIPC 802.11b and g clientsD RFID tags

考题 单选题One of your customers has decided to deploy location-based services in addition to existing wireless services. The customer requires that the additional access points to be deployed in monitor-only mode. The most likely reason for this requirement is that the customer has which of these existing wireless devices?()A 802.11b/g VoIPB Data CollectionC 802.11b and g clientsD RFID tags

考题 单选题In the plan phase, network readiness assessment addresses which customer need? Select exactly 1 answer(s) from the following:()。A an assessment of the preparedness of the customers existing system infrastructure to support a propose solutionB a comprehensive design that has been customized based on the operations processes, network management processes, and tools of its systemC an in-depth assessment of the operational environment required to support the operation of both the current and planned solutionsD the optimal technologies for supporting its business requirements and objectives

考题 单选题A user on a network cannot access any network resources. The link light on the computer showsthat a connection is present. Which of the following is the MOST likely cause of the problem?()A The wrong cable type has been used.B . IDS has shut down the computer's switch port.C The port on the switch is configured incorrectlyD Spanning tree protocol was implemented.

考题 单选题One of your customers has deployed a Layer 3 gateway in the untrusted network. Which gateway mode is appropriate for this customer?()A Virtual GatewayB Real-IP GatewayC NAT GatewayD Central Gateway

考题 单选题A retail customer installs a BladeCenter into an existing 10/100 Ethernet network. Due to cost considerations, the customer uses Copper Pass-thru Modules. After installing this solution, the customer finds that they have no network connectivity. Which of the following at is causing the problem?()A Copper Pass-thru Modules only support 1000Mb line speeds. B Spanning Tree has been enabled on the Copper Pass-thru Module. C The customer does not have the latest firmware loaded on the Copper Pass-thru Module. D The customer is using LS21 Blades 

考题 单选题One of your customers has decided to deploy location-based services in addition to existing wireless services. the customer requires that the additional access points to be deployed in  monitor-only modE. The most likely reason for this requirement is that the customer has which of these existing wireless devices?()A data collectionB 802.11b/g voipC 802.11b and g clientsD rfid tags