网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Company.com has a large network control center with an SNMP based monitoring tool running on a non-IBM Unix like system. It has become desirable for the network control center to monitor the activity of an HACMP cluster. What feature in HACMP can assist with this?()
A
hacmp.my
B
hacmp.mib
C
hacmp.defs
D
hacmp.snmp
参考答案
参考解析
解析:
暂无解析
更多 “单选题Company.com has a large network control center with an SNMP based monitoring tool running on a non-IBM Unix like system. It has become desirable for the network control center to monitor the activity of an HACMP cluster. What feature in HACMP can assist with this?()A hacmp.myB hacmp.mibC hacmp.defsD hacmp.snmp” 相关考题
考题
根据下面的文字资料回答 71~75 题 The Simple Network Management Protocol(SNMP)is an ( 1 )protocol that facilitates the exchange of management information between ( 2 ).It is part of the Transmission Control ProtocoL/Internet Protocol(TCP/IP)protocol suite. SNMP enables network( 3 )to manage network performance,find and sole network problems,and plan for( 4 ).An SNMP managed network consists of three key components:managed devices,( 5 ),and networkmanagement systems.第6题:文中( 1 )处正确的答案是( )。A.Physical LayerB.Link LayerC.Network LayerD.Transport Layer
考题
●The Simple Network Management Protocol (SNMP)is an (71) protocol that facilitates the exchange of management information between (72) .It is part of the Transmission Control Protocol/Internet Protocol(TCP/IP) protocol suite.SNMP enables network (73) to manage network performance, find and sole network problems,and plan for (74) .An SNMP-managed network consists of three key components:managed devices , (75) ,and network-management systems .(71) A.Physical LayerB.Link LayerC.Network LayerD.Transport Layer(72) A.network stationsB.network clientsC.network devicesD.network servers(73) A.serversB.administratorsC.computersD.routers(74) A.network growthB.network structureC.network architectureD.network servers(75) A.administratorsB.agentsC.managersD.servers
考题
Your network contains a server that has the SNMP Service installed.You need to configure the SNMP security settings on the server.Which tool should you use?()
A.Local Security PolicyB.ScwC.SeceditD.Services console
考题
The Simple Network Management Protocol(SNMP)is an(66)protocol that facilitates the exchange of management information between(67). It is part of the Transmission Control Protocol/Internet Protocol(TCP/IP)protocol suite. SNMP enables network(68)to manage network performance, find and sole network problems, and plan for(69)An SNMP -managed network consists of three key components: managed devices ,(70),and network -management systems .A.Physical LayerB.Link LayerC.Network LayerD.Transport Layer
考题
In the following essay, each blank has four choices. Choose the most suitable one from the four choices and write down in the answer sheet.The key to SNMP(66)is its simplicity. It has a small command set that does a good job of collecting information from(67)any network device. In a SNMP environment,(68)of the work is handled by the network management system. Devices that are being managed are not(69)with processing(70)that might affect their performance.A.popularityB.functionC.efficiencyD.power
考题
The Simple Network Management Protocol (SNMP)is an(71)protocol that facilitates the exchange of management information between(72). It is part of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite. SNMP enables network(73)to manage network performance, find and sole network problems, and plan for(74). An SNMP-man-aged network consists of three key components: managed devices,(75), and network-management systems.A.Physical LayerB.Link LayerC.Network LayerD.Transport Layer
考题
Certkiller .com has a remote data center with servers connected to a local datacenter through a high-speed network. Which of the following methods is the most convenient to use to install and upgrade the servers in the remote center using locally managed install images?()A.NIMB.HAGEO/HACMPC.NFSD.ftp, rsh and rexec
考题
Network management helps you to(66)the strengths and weaknesses of your network, as well as determine any configuration changes that may be necessary. Any controlled changes to your network and its components-especially configurations, software and(67), can have an effect on its overall efficiency. To maintain control, you need the tools and knowledge to manage all activity that has the potential to affect your(68).A.seeB.knowC.monitorD.control
考题
Network equipment supporting the use of flow control mechanisms has been recently installed. What is the purpose of flow control in a data network?()
A. It ensures that data is retransmitted if an acknowledgment is not received.B. It reassembles segments in the correct order on the destination device.C. It provides a mechanism for the receiver to control the transmission speed.D. It regulates the size of each datagram segment.E. All of the above are functions of flow control
考题
Which statement correctly describes network security settings in Cisco Network Assistant for the Catalyst Express 500 Switch?()A、The LOW setting enables broadcast storm control, but has no effect on the number of devices that can connect to a switch portB、The LOW setting enables broadcast storm control and limits the number of devices that can connect to a switch port.C、The LOW setting disables broadcast storm control but limits the number of devices that can connect to a switch portD、The default network setting is "HIGH"
考题
Company.com has a cluster with nodes that support "hot swap" adapters. During an upgrade of The network infrastructure,an additional network adapter has been added to the nodes and configured in AIX. What is the next step required to add this adapter to HACMP?() A、 Stop the node.B、 Stop the cluster.C、 Run autodiscovery.D、 Configure the IP adapter.
考题
The Schuyler and Livingston Iron Works has been working on getting its network security under control. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerability scanners to proactively identify areas of weakness, and it monitors and responds to security events as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fast lately and wants to make sure it is up to date on security measures.Which two areas of security would you advise the company to strengthen? ()A、intrusion protectionB、identityC、secure connectivityD、security management
考题
Network equipment supporting the use of flow control mechanisms has been recently installed. What is the purpose of flow control in a data network?()A、It ensures that data is retransmitted if an acknowledgment is not received.B、It reassembles segments in the correct order on the destination device.C、It provides a mechanism for the receiver to control the transmission speed.D、It regulates the size of each datagram segment.E、All of the above are functions of flow control
考题
Company.com has installed and configured a VIO server utilizing a Shared Ethernet Adapter and is investigating some network performance issues visible on the clients. The customer wants to understand the total network connectivity from the clients out to the data center routers. Which of the following commands will identify the Shared Ethernet Adapter mapping?()A、ifconfig -aB、netstat -nrC、lsmap -all -netD、lsdev -Cc adapter
考题
An administrator has had a request from the data center for method to monitor the status of an HACMP cluster. The monitoring software environment currently used is not compatible with SNM at this time, and there is not time to crate a new tool. There is also a restriction that the data center personnel not be allowed to login to the HACMP cluster nodes. What method will provide the solution for customer?() A、 The clstat.cgi program will provide a solution.B、 The customer must install Tivoli with the HACMP plugin for monitoring the cluster.C、 The clinfo program included in the HACMP distribution will solve the monitoring issues.D、 Customize the cluster to send error notifications for every event to an email at the network control center.
考题
You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.Due to numerous large e-mail messages, the average-size e-mail messages cannot reaches the Internet.You have received instructions to remove large messages from the Hub Transport servers.What should you do?()A、You should use the Queue Viewer tool.B、You should use the Exchange Control Panel (ECP) tool.C、You should use the message tracking tool.D、You should use the Windows Explorer tool.
考题
单选题An administrator has had a request from the data center for method to monitor the status of an HACMP cluster. The monitoring software environment currently used is not compatible with SNM at this time, and there is not time to crate a new tool. There is also a restriction that the data center personnel not be allowed to login to the HACMP cluster nodes. What method will provide the solution for customer?()A
The clstat.cgi program will provide a solution.B
The customer must install Tivoli with the HACMP plugin for monitoring the cluster.C
The clinfo program included in the HACMP distribution will solve the monitoring issues.D
Customize the cluster to send error notifications for every event to an email at the network control center.
考题
单选题Company.com has a cluster with nodes that support "hot swap" adapters. During an upgrade of The network infrastructure,an additional network adapter has been added to the nodes and configured in AIX. What is the next step required to add this adapter to HACMP?()A
Stop the node.B
Stop the cluster.C
Run autodiscovery.D
Configure the IP adapter.
考题
单选题Certkiller .com has a remote data center with servers connected to a local datacenter through a high-speed network. Which of the following methods is the most convenient to use to install and upgrade the servers in the remote center using locally managed install images?()A
NIMB
HAGEO/HACMPC
NFSD
ftp, rsh and rexec
考题
单选题You work as a network exchange administrator at company.com.thecompany.com network currently consists of a single active directory forest containing a single domain named company.com.the company.com organization makes use of microsoft exchange server 2010 as their messaging solution.in each of the organizational units in the company.com forest, a user has been identified to manage recipients in their specific organizational units.During the course of the business week you receive instruction from company.com to ensure that these chosen users will indeed have the ability to manage recipients in a specific organizational unit (ou).what should you do?()A
you should consider using role based access control (rbac) and having a new management scope created.B
you should consider using role based access control (rbac) and having the default management scope modified.C
you should consider having a new direct role assignment created.D
you should consider having a new management role assignment policy created.
考题
单选题Which statement is true about the distributed call control in a VoIP network?()A
the VoIP endpoints have the intelligence to set up and control callsB
Call setup and control functionality is centralized in one call agent or clusterC
Call setup and control resides in call agents that are distributed throughout the networkD
Each VoIP device has separate call control, voice packetization, and transport mechanisms
考题
单选题Company.com has recently received a new p5-570 in the data center and wants to Micro-Partition the server. The customer already has an existing HMC connected to a p690. Which of the following actions should the technical specialist take?()A
Order a POWER5 HMCB
Connect to the existing HMCC
Install an 8-port asynchronous card in the managed server to connect to the existing HMCD
Install an additional network card to the existing HMC and connect to the POWER5 service processor
考题
单选题Your network contains a server that has the SNMP Service installed.You need to configure the SNMP security settings on the server.Which tool should you use?()A
Local Security PolicyB
ScwC
SeceditD
Services console
考题
单选题You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.The Company.com network users have been configured by Company.com to have the @Company.com email address suffix.During the course of the business week you receive instruction from Company.com to configure a public folder named KingPublic for the Internet users to post content by sending e-mail to KingPublic@Company.com. What should you do?()A
You should consider having a new mail contact created which has the e-mail address KingPublic@Company.com.You should then have a transport rule created.B
You should consider having a new mailbox created which has the e-mail address KingPublic@Company.com.You should then have a transport rule created.C
You should consider having mail enabled for KingPublic.D
You should consider having the author role assigned to Anonymous.
考题
单选题Company.com has recently received a new p5-570 in the data center and intends to Micro-Partition the server. In which order should installation steps be taken?()A
Connect to the network,power on the server,Micro-Partition the serverB
Connect to the HMC,power on the server,Micro-Partition the server,connect to the networkC
Power on server,connect to the network,Micro-Partition the server,connect to the HMCD
Power on the server,connect to the HMC,Micro-Partition the server,connect to the network
考题
单选题Which statement correctly describes network security settings in Cisco Network Assistant for the Catalyst Express 500 Switch?()A
The LOW setting enables broadcast storm control, but has no effect on the number of devices that can connect to a switch portB
The LOW setting enables broadcast storm control and limits the number of devices that can connect to a switch port.C
The LOW setting disables broadcast storm control but limits the number of devices that can connect to a switch portD
The default network setting is HIGH
考题
单选题Network equipment supporting the use of flow control mechanisms has been recently installed. What is the purpose of flow control in a data network?()A
It ensures that data is retransmitted if an acknowledgment is not received.B
It reassembles segments in the correct order on the destination device.C
It provides a mechanism for the receiver to control the transmission speed.D
It regulates the size of each datagram segment.E
All of the above are functions of flow control
热门标签
最新试卷