- 论坛徽章:
- 0
|
<p align="left"><p align="left">最新000-903题库分享</p></p><p align="left"><p align="left">1. Which statement is true about nco_m_bridge?</p></p><p align="left"><p align="left">A. It is not required if you are not monitoring Wireless Bridges.</p></p><p align="left"><p align="left">B. It is used to write data to the datalogs and the ObjectServer.</p></p><p align="left"><p align="left">C. It is the communication link between the monitors and the ISMServer.</p></p><p align="left"><p align="left">D. It is used to maintain communication between all the monitors to keep them synchronized.</p></p><p align="left"><p align="left">Answer: B</p></p><p align="left"><p align="left">2. The logmonx module currently has communities of public and private both with access privileges of read/write. Which set of console commands would change the associated communities for only the logmonx module to public with access privileges of read only and secure with access privileges of read/create?</p></p><p align="left"><p align="left">A. community set logmonx secure rc private ro</p></p><p align="left"><p align="left">B. community set logmonx secure rc community set logmonx public ro community remove logmonx private</p></p><p align="left"><p align="left">C. community remove logmonx private community add logmonx secure rc community add logmonx public ro</p></p><p align="left"><p align="left">D. community add logmonx secure rc community set logmonx public ro community delete logmonx private</p></p><p align="left"><p align="left">Answer: B</p></p><p align="left"><p align="left">3. The ISMServer includes a feature to automatically distribute profiles to other ISMServers.</p></p><p align="left"><p align="left">What are the names given to the ISMServer distributing the profiles and the ISMServer accepting the profiles?</p></p><p align="left"><p align="left">A. father and son</p></p><p align="left"><p align="left">B. server and client</p></p><p align="left"><p align="left">C. master and slave</p></p><p align="left"><p align="left">D. primary and backup</p></p><p align="left"><p align="left">Answer: C</p></p><p align="left"><p align="left">4. When utilizing the HTTP ISM, which statement is true about license key requirements?</p></p><p align="left"><p align="left">A. One license key is required for each instance of the HTTP monitor.</p></p><p align="left"><p align="left">B. One license key is required for each user to view the collected data.</p></p><p align="left"><p align="left">C. One license key is required for each connection to the ObjectServer.</p></p><p align="left"><p align="left">D. One license key is required for each individual HTTP test that is defined.</p></p><p align="left"><p align="left">Answer: A</p></p><p align="left"><p align="left">5. If a customer intends to utilize the Netcool/SSM agent in their infrastructure, what network protocol must be allowed?</p></p><p align="left"><p align="left">A. Telnet for agent configuration</p></p><p align="left"><p align="left">B. DNS for agent name resolution</p></p><p align="left"><p align="left">C. SNMP for agent communication</p></p><p align="left"><p align="left">D. NTP for agent clock configuration</p></p><p align="left"><p align="left">Answer: C</p></p><p align="left"><p align="left">6. What is the purpose of the OID Groups required by the SNMP ISM?</p></p><p align="left"><p align="left">A. They identify the frequency of data collection.</p></p><p align="left"><p align="left">B. They contain the threshold settings used for SLA measurement.</p></p><p align="left"><p align="left">C. They determine the specific data values collected from the device.</p></p><p align="left"><p align="left">D. They contain the SNMP community string required for communication with each target device.</p></p><p align="left"><p align="left">Answer: C</p></p><p align="left"><p align="left">7. What is the most important consideration when defining Element Profiles for use in Netcool/ISM monitoring?</p></p><p align="left"><p align="left">A. Element Profile names are limited to 25 characters.</p></p><p align="left"><p align="left">B. There is a limit of 25 Element Profiles per ISMServer.</p></p><p align="left"><p align="left">C. An Element Profile can only contain tests for a single protocol.</p></p><p align="left"><p align="left">D. Access authority for ISMServer users is defined at the Element Profile level.</p></p><p align="left"><p align="left">Answer: D</p></p><p align="left"><p align="left">8. The ismbatch utility is a CLI tool that can be used to perform Netcool/ISM configuration using a textscript.What is an important consideration when using this utility?</p></p><p align="left"><p align="left">A. The utility cannot be used to add new Profiles.</p></p><p align="left"><p align="left">B. The ISMServer must be stopped while the script is running.</p></p><p align="left"><p align="left">C. The utility can only be run using a valid ISMServer user name.</p></p><p align="left"><p align="left">D. All Netcool/ISM Monitors must be stopped while the utility is running.</p></p><p align="left"><p align="left">Answer: B</p></p><p align="left"><p align="left">9. Regular Expression Matching is a powerful feature available within certain Netcool/ISM monitors. Which is a valid use of this feature?</p></p><p align="left"><p align="left">A. When used by the HTTP ISM, it can identify the differences between two HTML pages.</p></p><p align="left"><p align="left">B. When used by the DHCP ISM. it can be used to determine if a specific IP address is available.</p></p><p align="left"><p align="left">C. When used by the HTTP ISM, it can be used to determine when the last time a specific HTML page was modified.</p></p><p align="left"><p align="left">D. When used by the HTTP ISM, it can be used to verify that the expected page content was returnedfrom an HTML page.</p></p><p align="left"><p align="left">Answer: D</p></p><p align="left"><p align="left">10. The SM Configuration (SMC) application can be used to install Netcool/SSM agents on remote UNIX hosts.What is required for each target host in order to utilize this capability?</p></p><p align="left"><p align="left">A. All target hosts must reside on the same IP subnet.</p></p><p align="left"><p align="left">B. SMC must have rsh access to each target host, as this is the only technique available to SMC.</p></p><p align="left"><p align="left">C. SMC must be configured with the root user name and password, or a user with root authority, on each target host.</p></p><p align="left"><p align="left">D. SMC can only be used to install the software, so the agent installation package must be manually placed on each target host.</p></p><p align="left"><p align="left">Answer: C</p></p> |
|