免费注册 查看新帖 |

Chinaunix

  平台 论坛 博客 文库
最近访问板块 发新帖
查看: 1501 | 回复: 1
打印 上一主题 下一主题

000-903题库下载 [复制链接]

论坛徽章:
0
跳转到指定楼层
1 [收藏(0)] [报告]
发表于 2010-12-23 09:20 |只看该作者 |倒序浏览
<p align="left"><p align="left">最新000-903题库分享</p></p><p align="left"><p align="left">1. Which statement is true about nco_m_bridge?</p></p><p align="left"><p align="left">A. It is not required if you are not monitoring Wireless Bridges.</p></p><p align="left"><p align="left">B. It is used to write data to the datalogs and the ObjectServer.</p></p><p align="left"><p align="left">C. It is the communication link between the monitors and the ISMServer.</p></p><p align="left"><p align="left">D. It is used to maintain communication between all the monitors to keep them synchronized.</p></p><p align="left"><p align="left">Answer: B</p></p><p align="left"><p align="left">2. The logmonx module currently has communities of public and private both with access privileges of read/write. Which set of console commands would change the associated communities for only the logmonx module to public with access privileges of read only and secure with access privileges of read/create?</p></p><p align="left"><p align="left">A. community set logmonx secure rc private ro</p></p><p align="left"><p align="left">B. community set logmonx secure rc community set logmonx public ro community remove logmonx private</p></p><p align="left"><p align="left">C. community remove logmonx private community add logmonx secure rc community add logmonx public ro</p></p><p align="left"><p align="left">D. community add logmonx secure rc community set logmonx public ro community delete logmonx private</p></p><p align="left"><p align="left">Answer: B</p></p><p align="left"><p align="left">3. The ISMServer includes a feature to automatically distribute profiles to other ISMServers.</p></p><p align="left"><p align="left">What are the names given to the ISMServer distributing the profiles and the ISMServer accepting the profiles?</p></p><p align="left"><p align="left">A. father and son</p></p><p align="left"><p align="left">B. server and client</p></p><p align="left"><p align="left">C. master and slave</p></p><p align="left"><p align="left">D. primary and backup</p></p><p align="left"><p align="left">Answer: C</p></p><p align="left"><p align="left">4. When utilizing the HTTP ISM, which statement is true about license key requirements?</p></p><p align="left"><p align="left">A. One license key is required for each instance of the HTTP monitor.</p></p><p align="left"><p align="left">B. One license key is required for each user to view the collected data.</p></p><p align="left"><p align="left">C. One license key is required for each connection to the ObjectServer.</p></p><p align="left"><p align="left">D. One license key is required for each individual HTTP test that is defined.</p></p><p align="left"><p align="left">Answer: A</p></p><p align="left"><p align="left">5. If a customer intends to utilize the Netcool/SSM agent in their infrastructure, what network protocol must be allowed?</p></p><p align="left"><p align="left">A. Telnet for agent configuration</p></p><p align="left"><p align="left">B. DNS for agent name resolution</p></p><p align="left"><p align="left">C. SNMP for agent communication</p></p><p align="left"><p align="left">D. NTP for agent clock configuration</p></p><p align="left"><p align="left">Answer: C</p></p><p align="left"><p align="left">6. What is the purpose of the OID Groups required by the SNMP ISM?</p></p><p align="left"><p align="left">A. They identify the frequency of data collection.</p></p><p align="left"><p align="left">B. They contain the threshold settings used for SLA measurement.</p></p><p align="left"><p align="left">C. They determine the specific data values collected from the device.</p></p><p align="left"><p align="left">D. They contain the SNMP community string required for communication with each target device.</p></p><p align="left"><p align="left">Answer: C</p></p><p align="left"><p align="left">7. What is the most important consideration when defining Element Profiles for use in Netcool/ISM monitoring?</p></p><p align="left"><p align="left">A. Element Profile names are limited to 25 characters.</p></p><p align="left"><p align="left">B. There is a limit of 25 Element Profiles per ISMServer.</p></p><p align="left"><p align="left">C. An Element Profile can only contain tests for a single protocol.</p></p><p align="left"><p align="left">D. Access authority for ISMServer users is defined at the Element Profile level.</p></p><p align="left"><p align="left">Answer: D</p></p><p align="left"><p align="left">8. The ismbatch utility is a CLI tool that can be used to perform Netcool/ISM configuration using a textscript.What is an important consideration when using this utility?</p></p><p align="left"><p align="left">A. The utility cannot be used to add new Profiles.</p></p><p align="left"><p align="left">B. The ISMServer must be stopped while the script is running.</p></p><p align="left"><p align="left">C. The utility can only be run using a valid ISMServer user name.</p></p><p align="left"><p align="left">D. All Netcool/ISM Monitors must be stopped while the utility is running.</p></p><p align="left"><p align="left">Answer: B</p></p><p align="left"><p align="left">9. Regular Expression Matching is a powerful feature available within certain Netcool/ISM monitors. Which is a valid use of this feature?</p></p><p align="left"><p align="left">A. When used by the HTTP ISM, it can identify the differences between two HTML pages.</p></p><p align="left"><p align="left">B. When used by the DHCP ISM. it can be used to determine if a specific IP address is available.</p></p><p align="left"><p align="left">C. When used by the HTTP ISM, it can be used to determine when the last time a specific HTML page was modified.</p></p><p align="left"><p align="left">D. When used by the HTTP ISM, it can be used to verify that the expected page content was returnedfrom an HTML page.</p></p><p align="left"><p align="left">Answer: D</p></p><p align="left"><p align="left">10. The SM Configuration (SMC) application can be used to install Netcool/SSM agents on remote UNIX hosts.What is required for each target host in order to utilize this capability?</p></p><p align="left"><p align="left">A. All target hosts must reside on the same IP subnet.</p></p><p align="left"><p align="left">B. SMC must have rsh access to each target host, as this is the only technique available to SMC.</p></p><p align="left"><p align="left">C. SMC must be configured with the root user name and password, or a user with root authority, on each target host.</p></p><p align="left"><p align="left">D. SMC can only be used to install the software, so the agent installation package must be manually placed on each target host.</p></p><p align="left"><p align="left">Answer: C</p></p>

论坛徽章:
0
2 [报告]
发表于 2010-12-28 16:34 |只看该作者
呵呵还不错哦、UI设计
您需要登录后才可以回帖 登录 | 注册

本版积分规则 发表回复

  

北京盛拓优讯信息技术有限公司. 版权所有 京ICP备16024965号-6 北京市公安局海淀分局网监中心备案编号:11010802020122 niuxiaotong@pcpop.com 17352615567
未成年举报专区
中国互联网协会会员  联系我们:huangweiwei@itpub.net
感谢所有关心和支持过ChinaUnix的朋友们 转载本站内容请注明原作者名及出处

清除 Cookies - ChinaUnix - Archiver - WAP - TOP