免费注册 查看新帖 |

Chinaunix

  平台 论坛 博客 文库
最近访问板块 发新帖
查看: 1542 | 回复: 1
打印 上一主题 下一主题

640-760考題下載 [复制链接]

论坛徽章:
0
跳转到指定楼层
1 [收藏(0)] [报告]
发表于 2011-01-15 18:23 |只看该作者 |倒序浏览
<p align="left"><p align="left">最新640-760考題分享</p></p><p align="left"><p align="left">1.A customer complained about their network performance. You scheduled a change request that will reroute their traffic through a different node to improve performance. What must you do to verify that this change had the desired results?</p></p><p align="left"><p align="left">A.Validate the customerSLA for performance through the network.</p></p><p align="left"><p align="left">B.Collect baseline performance data before and after the change.</p></p><p align="left"><p align="left">C.Contact the customer to ensure that their performance has improved</p></p><p align="left"><p align="left">D.Document the change request so that there is an audit trail.</p></p><p align="left"><p align="left">Answer: B</p></p><p align="left"><p align="left">2.According to the ITIL. v3 framework, what triggers an incident?</p></p><p align="left"><p align="left">A. whenever a severity 3 incident is closed</p></p><p align="left"><p align="left">B. when the problem is identified as urgent</p></p><p align="left"><p align="left">C. when a problem is discovered during a change window</p></p><p align="left"><p align="left">D. when an outage is called into a service center</p></p><p align="left"><p align="left">Answer: D</p></p><p align="left"><p align="left">3.According to the ITIL. v3 framework, what is the primary reason for implementing SLAs?</p></p><p align="left"><p align="left">A. Ensure accurate measurement of response times.</p></p><p align="left"><p align="left">B. Establish an open line of communication between the customer and the service provider</p></p><p align="left"><p align="left">C. Reduce network latency.</p></p><p align="left"><p align="left">D. Provide a legal contract between the customer and the service provider.</p></p><p align="left"><p align="left">Answer: D</p></p><p align="left"><p align="left">4.Each syslog message has a numerical severity level assigned to generate error messages about software or hardware malfunctions. Which of these messages has the highest numeric severity level?</p></p><p align="left"><p align="left">A. Error</p></p><p align="left"><p align="left">B. Emergency</p></p><p align="left"><p align="left">C. Debug</p></p><p align="left"><p align="left">D. Critical</p></p><p align="left"><p align="left">E. Alert</p></p><p align="left"><p align="left">Answer: C</p></p><p align="left"><p align="left">5.Which three of these methods can you use to back up a configuration running Cisco IOS Software Release 12.2 Mainline? (Choose three.</p></p><p align="left"><p align="left">A. SNMP</p></p><p align="left"><p align="left">B. SFTP</p></p><p align="left"><p align="left">C. TFTP</p></p><p align="left"><p align="left">D. KRON</p></p><p align="left"><p align="left">E. SSH</p></p><p align="left"><p align="left">Answer: A,C,D</p></p><p align="left"><p align="left">6.A router is causing problems in the network and you want to capture as much information as you can before you manually reload or power-cycle the router. What command would you type at the CLI of the router to capture information that would be lost when the router is rebooted?</p></p><p align="left"><p align="left">A. showcrashinfo</p></p><p align="left"><p align="left">B. showsyslog</p></p><p align="left"><p align="left">C. show tech-support</p></p><p align="left"><p align="left">D. show stacks</p></p><p align="left"><p align="left">E. show memory</p></p><p align="left"><p align="left">Answer: C</p></p><p align="left"><p align="left">7.Which three steps are best practices in accurately documenting a network? (Choose three).</p></p><p align="left"><p align="left">A. Document separate Layer 2 and Layer 3 topologies.</p></p><p align="left"><p align="left">B. Document Layer 3 topology to include all switches and routers.</p></p><p align="left"><p align="left">C. Clearly document the port identifiers on all of the links.</p></p><p align="left"><p align="left">D. Clearly depict different routing domains with appropriate information such as the routing protocol and process number.</p></p><p align="left"><p align="left">E. Avoid defining router-id commands and loopbacks in the router label.</p></p><p align="left"><p align="left">F. Use connectivity details of all layers of the OSI model in diagrams.</p></p><p align="left"><p align="left">Answer: A,C,D</p></p><p align="left"><p align="left">8.Which three steps would you use to troubleshoot a performance-related problem in the network core?(Choose three.)</p></p><p align="left"><p align="left">A. define problem</p></p><p align="left"><p align="left">B. analyze problem</p></p><p align="left"><p align="left">C. determine affected users</p></p><p align="left"><p align="left">D. create action plan</p></p><p align="left"><p align="left">E. verify service-level requirements</p></p><p align="left"><p align="left">Answer: A,B,D</p></p><p align="left"><p align="left">9.Which two steps are best practices to be followed while documenting a network. (Choose two.)</p></p><p align="left"><p align="left">A. Use proper icons for different devices in the network.</p></p><p align="left"><p align="left">B. Use different colors and widths for denoting different links of different bandwidth.</p></p><p align="left"><p align="left">C. Use same icons for all types of routers and switches in the network.</p></p><p align="left"><p align="left">D. Avoid defining the router-id in the router label.</p></p><p align="left"><p align="left">E. Use connectivity details of all layers of the OSI model in diagrams.</p></p><p align="left"><p align="left">Answer: A,B</p></p><p align="left"><p align="left">10.What is the advantage of using a passive monitoring technique?</p></p><p align="left"><p align="left">A. does not require continuous measurement of traffic types</p></p><p align="left"><p align="left">B. measures application-specific parameters per traffic classes</p></p><p align="left"><p align="left">C. identifies issues and bottlenecks before they occur</p></p><p align="left"><p align="left">D. no interference with live traffic</p></p><p align="left"><p align="left">Answer: A</p></p>

论坛徽章:
0
2 [报告]
发表于 2011-01-15 19:12 |只看该作者
哈哈,谢谢了哦<br />爱肺金雪茄<br />维密<br />公爵替烟王<br />任仲传风痛康膜价格<br />铂金骑士<br />西木奶茶<br />绿瘦效果怎么样<br />步多健<br />欧汇腰椎挺<br />真味电子烟<br />婷美官网
您需要登录后才可以回帖 登录 | 注册

本版积分规则 发表回复

  

北京盛拓优讯信息技术有限公司. 版权所有 京ICP备16024965号-6 北京市公安局海淀分局网监中心备案编号:11010802020122 niuxiaotong@pcpop.com 17352615567
未成年举报专区
中国互联网协会会员  联系我们:huangweiwei@itpub.net
感谢所有关心和支持过ChinaUnix的朋友们 转载本站内容请注明原作者名及出处

清除 Cookies - ChinaUnix - Archiver - WAP - TOP