单选题DCNM is capable of monitoring the network performance of a SAN. What are the three primary areas of this operation? ()A analyze traffic, device management, and network monitoringB DCNM-SAN, DCNM-LAN, and device managerC definition of flows, information collection, and data presentationD SNMP poll data, MIB analysis, and report generation
单选题
DCNM is capable of monitoring the network performance of a SAN. What are the three primary areas of this operation? ()
A
analyze traffic, device management, and network monitoring
B
DCNM-SAN, DCNM-LAN, and device manager
C
definition of flows, information collection, and data presentation
D
SNMP poll data, MIB analysis, and report generation
参考解析
解析:
暂无解析
相关考题:
Perform. Quality Control is the process of monitoring and recording resuks of executing the Quality Plan activities to assess performance and recommend necessary changes.( )are the techniques and tools in performing quality control. ①Activity network diagram②Cause and effect diagrams③Inspection④Flow chart⑤Work Breakdown Structure⑥Pareto chart A.①③⑤ B.②④⑤⑥ C.②③④⑤⑥ D.①②③④⑥
You are asked to configure real-time performance monitoring (RPM) between two Junos devices to track traffic in your network. Which two application traffic types can you track?() A. ICMPB. SNMPC. TCPD. HTTPS
Using network monitoring tools would allow an administrator to do which of the following?() A. Configure offline devicesB. Examine performance issuesC. Install additional software and updatesD. View syslog events
Several reports are logged stating that an application server is performing slowly. During the investigation, the administrator notices that the hard drives on the server appear to have a high level of activity.Which items should the administrator monitor using performance monitoring tools?()A. Page FileB. Disk UtilizationC. System TemperatureD. Processor UtilizationE. Network Utilization
Which two statements about authentication settings for DCNM-LAN are true? ()A、 If none of the authentication servers that are configured for the current authentication mode responds to an authentication request, the DCNM-LAN server falls back to localauthentication.B、 DCNM-LAN only supports TACACS+.C、 Each DCNM-LAN server will have the same device credentials.D、 Administering DCNM-LAN authentication settings requires an authentication license.E、 DCNM-LAN server users are local to the DCNM-LAN server.
Which network technology allows for the monitoring of active communication networks to diagnose problems and gather statistics for network administration?()A、Network securityB、Content networkingC、Network managementD、Campus local-area networking
What allows you to monitor the system performance of the Cisco CRS System (CPU, memory, etc.)?()A、Cisco Desktop Administrator B、Cisco Supervisor Desktop C、Microsoft Windows 2000 Performance Monitoring D、CRS Application Administration E、CRS Application Editor
Which of the following is not a typical maintenance task within a network maintenance model?()A、Providing technical customer supportB、Changing configurationsC、Updating softwareD、Monitoring network performanceE、Replacing hardwareF、Scheduling backups
Which three are valid methods to monitor and trend SAN port channels with DCNM?()A、 use summary view in the device managerB、 from the DCNM-SAN client, view ISLs in real time from the Performance drop-down listC、 for each port channel, select Monitor ContinuallyD、 configure traps for each port channel to utilize RMONE、 set up flows with the DCNM-SAN client and use the Performance Manager web client for performance collections
Several reports are logged stating that an application server is performing slowly. During the investigation, the administrator notices that the hard drives on the server appear to have a high level ofactivity. Which items should the administrator monitor using performance monitoring tools? ()A、 Page FileB、 Disk UtilizationC、 System TemperatureD、 Processor UtilizationE、 Network Utilization
You are asked to configure real-time performance monitoring (RPM) between two Junos devices to track traffic in your network. Which two application traffic types can you track?()A、ICMPB、SNMPC、TCPD、HTTPS
DCNM is capable of monitoring the network performance of a SAN. What are the three primary areas of this operation? () A、 analyze traffic, device management, and network monitoringB、 DCNM-SAN, DCNM-LAN, and device managerC、 definition of flows, information collection, and data presentationD、 SNMP poll data, MIB analysis, and report generation
If it is properly deployed, a controller-based access point is capable of monitoring all vlans on a network when you select which of the following modes from the ap mode drop-down menu on the controller?()A、mirrorB、rogue detectorC、snifferD、monitor
Which of the following would be considered reasonable network maintenance tasks?(Choose allthat apply.)()A、Ensuring compliance with legal regulations and corporate policiesB、Troubleshooting problem reportsC、Planning for network expansionD、Providing support to sales and marketingE、Giving presentations to managementF、Monitoring and tuning network performance
Network management saves time and money by automating which two tasks? ()A、Configuring changes to hardware and softwareB、Monitoring online purchasingC、Monitoring user access to storage filesD、Monitoring and troubleshooting network devices
An administrator is attempting to use the Tivoli Performance Viewer to see the average response time for a WebSphere Commerce command, which of the following must be done in order to be successful?()A、Enable performance monitoring of the WebSphere Application Server through the WebSphere Application Server Administrative ConsoleB、Enable performance monitoring of the WebSphere Commerce application through the WebSphere Commerce Administration ConsoleC、Install and configure Tivoli Performance Viewer on a separate machine and configure it to connect to the Application Server.D、Install and configure DB2 Intelligent Miner for Data to support the appropriate closed-loop analytics
You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003. A member server named TK1 contains a large number of files that are frequently accessed by network users. Users report unacceptable response times on TK1. You compare the current performance of TK1 to a system performance baseline that you created several weeks ago. You decide that TK1 needs a higher-performance network adapter. After you add the appropriate network adapter, users report satisfactory performance. You need to gather new server performance data so you can establish a new performance baseline for TK1. You open the Performance console. What should you do next?()A、Add all counters for the Network Interface object to the System Monitor object.B、Create a new trace log object. Under Events logged by system provider in the new object, select the Network TCP/IP setting. Start the trace log.C、Create a new counter log object. Add all counters for the Network Interface object to the new object. Start the counter.D、Create a new alert object.
You are one of the network administrators for All network servers run Windows Server 2003. TestKing operates a total of four offices. The office where you work has 15 servers. You are responsible for supporting and maintaining all of these servers. You need to design a monitoring plan that will achieve the following goals: 1. Track all performance changes on the servers. 2. Record performance data to anticipate the need for future upgrades. What should you do?()A、On each server in your office, use Performance Logs and Alerts to create a baseline log. Configure the log to collect data every five minutes for one day. Use the same counters for each server to create a log file. Schedule the log to run weekly.B、From a monitoring computer, use Performance Logs and Alerts to create a baseline log for each server in your office. Configure the log to collect data every five minutes for one day. Use the same counters for each server to create a log file. Schedule the log to run weekly.C、On each server in your office, use Performance Logs and Alerts to create threshold-based alerts. Configure the alerts to send a message to your monitoring computer when they are triggered. Set each alert to start a new scan when the alert finishes.D、From a monitoring computer use Performance Logs and Alerts to create a new counter set in System Monitor. Configure the counters to run continuously.
You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003. Your network includes domain controllers, file and print servers, and application servers. The application servers run a variety of programs, including Microsoft SQL Server 2000 and Microsoft Exchange Server 2003. Your staff are responsible for monitoring current system performance on all servers. You need to enable your staff to use System Monitor to gather performance data for each unique server type. The data will be used for trend analysis and forecasting. Which two actions should you perform? ()(Each correct answer presents part of the solution. Choose two)A、For each server, add the most common performance counters and save them as an HTML file.B、For each server, add the most common performance counters and save them as a counter report file.C、Create trace logs based on the file and schedule and trace logs to gather data.D、Create alerts on the file and schedule the alerts to gather data.E、Create counter logs based on the file and schedule the counter logs to gather data.
You need to recommend a monitoring solution for the file servers in the main office. The solution must meet the company’s technical requirements. What should you include in the recommendation?()A、File Server Resource Manager (FSRM) active file screensB、File Server Resource Manager (FSRM) passive file screensC、Performance Monitor alertsD、Performance Monitor logs
he ZXWM M900 system transmits network management information using specified monitoring channel at a rate of().A、2 Mbit/sB、10 Mbit/sC、100 Mbit/sD、1000 Mbit/s
单选题Rate your level of proficiency with managing and maintaining a server environment, including monitoring system and server performance, managing Web servers, monitoring and analyzing events, managing software updates and site licenses, monitoring file and print servers, and managing servers remotely. ()AVery HighBHighCModerateDLowEVery Low
多选题Which three statements describe user authentication in Cisco DCNM-LAN? ()ACisco DCNM-LAN server users are local to the Cisco DCNM-LAN server. Creating, changing, and removing Cisco DCNM-LAN server users has no effect on user accounts on managed devices.BA Cisco DCNM-LAN server user that has Administrator privileges can push out changes to managed devices even if the Cisco NX-OS role that is used on the discovered device has the network operator role.CCisco DCNM-LAN user roles restrict the ability of users to make changes to Cisco DCNM-LAN server settings. Cisco NX-OS user roles enforce read/write privileges on the discovered devices.DCisco DCNM-LAN allows you to configure unique credentials for each discovered device or use default credentials when you do not configure unique credentials for a device.ECisco DCNM-LAN can use AAA servers to authenticate users. Only TACACS servers are supported.
单选题Using network monitoring tools would allow an administrator to do which of the following?()AConfigure offline devicesBExamine performance issuesCInstall additional software and updatesDView syslog events
多选题Cisco DCNM-LAN supports the configuration and monitoring of many Cisco NX-OS features, including which two of these Ethernet protocols? ()AGLBPBHSRPCIRDPDVRRP
单选题What allows you to monitor the system performance of the Cisco CRS System (CPU, memory, etc.)?()ACisco Desktop Administrator BCisco Supervisor Desktop CMicrosoft Windows 2000 Performance Monitoring DCRS Application Administration ECRS Application Editor
多选题As a critical part of the design for the Enterprise Campus network, which of the following two aretrue concerning intrusion detection and prevention solution? ()AIDS is capable of both inline and promiscuous monitoring, while IPS is only capable ofpromiscuous monitoringBIDS will stop malicious traffic from reaching its intended target for certain types of attacks.CIPS processes information on Layer 3 and 4 as well as analyzing the contents and payload ofthe packets for more sophisticated embedded attacks (Layers 3 to 7)DIPS inspects traffic statefully and needs to see both sides of the connection to function properlyEIDS placement at the perimeter of Data Center outside the firewall generates many warningsthat have relatively low value because no action is likely to be taken on this information