多选题A customer would like to monitor traffic that is being sent to a specific virtual machine named VM001 using SPAN. The customer has another virtual machine configured as a sniffer host called VM002. What configuration is required, and what other changes will need to be made? () VSM-PRI-188# sh int vethernet 5  Vethernet5 is up  Port description is VM001, Network Adapter 2    HardwarE. Virtual, address: 0050.56b0.001e (bia 0050.56b0.001e)  Owner is VM "VM001", adapter is Network Adapter 2  Active on module 5   VMware DVS port 484   Port-Profile is VM-vlan-10   Port mode is access        VSM-PRI-188# sh int vethernet 6   Vethernet6 is up  Port description is VM002, Network Adapter 1  HardwarE. Virtual, address: 0050.56b0.0020 (bia 0050.56b0.0020)  Owner is VM "VM002", adapter is Network Adapter 1  Active on module 5   VMware DVS port 485   Port-Profile is VM-vlan-10   Port mode is accessAMonitor session 1 type span  Source interface veth5 both  Destination interface veth6  No shutBmonitor session 1  source vlan 10  destination interface veth6  no shutCmonitor session 1 type er-span  source interface vlan 10  destination ip 10.1.1.10  no shutDVM002 must be removed from the Nk1VEMove VM002 to Module 5FRestart the VEM on module 5

多选题
A customer would like to monitor traffic that is being sent to a specific virtual machine named VM001 using SPAN. The customer has another virtual machine configured as a sniffer host called VM002. What configuration is required, and what other changes will need to be made? () VSM-PRI-188# sh int vethernet 5  Vethernet5 is up  Port description is VM001, Network Adapter 2    HardwarE. Virtual, address: 0050.56b0.001e (bia 0050.56b0.001e)  Owner is VM "VM001", adapter is Network Adapter 2  Active on module 5   VMware DVS port 484   Port-Profile is VM-vlan-10   Port mode is access        VSM-PRI-188# sh int vethernet 6   Vethernet6 is up  Port description is VM002, Network Adapter 1  HardwarE. Virtual, address: 0050.56b0.0020 (bia 0050.56b0.0020)  Owner is VM "VM002", adapter is Network Adapter 1  Active on module 5   VMware DVS port 485   Port-Profile is VM-vlan-10   Port mode is access
A

Monitor session 1 type span       Source interface veth5 both      Destination interface veth6      No shut

B

monitor session 1      source vlan 10      destination interface veth6      no shut

C

monitor session 1 type er-span      source interface vlan 10      destination ip 10.1.1.10      no shut

D

VM002 must be removed from the Nk1V

E

Move VM002 to Module 5

F

Restart the VEM on module 5


参考解析

解析: 暂无解析

相关考题:

Your hair needs ____; would you like me ____ it for you? A.cutting...doingB.to cut...doingC.to be cut...to doD.being cut...to do

As the brochures you sent us were() damaged in the mail, we would like you to mail us some more.A、badB、hardlyC、veryD、severely

Which command would you use to view interface usage details in real time?() A. show interfaces terseB. show interfaces extensiveC. monitor interface trafficD. monitor traffic interface

The network administrator would like to generate synthetic traffic using the Service Assurance Agent contained in Cisco IOS. Which CiscoWorks network management application will be used to report the latency and availability for configured traffic operations on an end-to-end and hop-byhop (router-to-router) basis?()A. nGenius Real-Time MonitorB. CiscoViewC. Device Fault ManagerD. Internetwork Performance Monitor

A customer would like to monitor traffic that is being sent to a specific virtual machine named VM001 using SPAN. The customer has another virtual machine configured as a sniffer host called VM002. What configuration is required, and what other changes will need to be made? () VSM-PRI-188# sh int vethernet 5  Vethernet5 is up  Port description is VM001, Network Adapter 2    HardwarE. Virtual, address: 0050.56b0.001e (bia 0050.56b0.001e)  Owner is VM "VM001", adapter is Network Adapter 2  Active on module 5   VMware DVS port 484   Port-Profile is VM-vlan-10   Port mode is access        VSM-PRI-188# sh int vethernet 6   Vethernet6 is up  Port description is VM002, Network Adapter 1  HardwarE. Virtual, address: 0050.56b0.0020 (bia 0050.56b0.0020)  Owner is VM "VM002", adapter is Network Adapter 1  Active on module 5   VMware DVS port 485   Port-Profile is VM-vlan-10   Port mode is access      A、 Monitor session 1 type span  Source interface veth5 both  Destination interface veth6  No shutB、 monitor session 1  source vlan 10  destination interface veth6  no shutC、 monitor session 1 type er-span  source interface vlan 10  destination ip 10.1.1.10  no shutD、 VM002 must be removed from the Nk1VE、 Move VM002 to Module 5F、 Restart the VEM on module 5

A company would like to create and maintain a web presence by operating a web server and anFTP server for users to upload and download job specifications. Which of the following Internetconnection types would be BEST suited for this type of traffic?()A、SatelliteB、FiberC、4G mobile hotspotD、DSL

Which statement is true about the data traffic between the access point named TKAP1 and  controller TKC1?()A、 The data traffic between the access point and controller is not encrypted.B、 The data traffic is encapsulated with LWAPP.C、 The data traffic is switched at the access point before being sent to the WLAN controller where  VLAN tagging and QoS are applied.D、 The data traffic is encrypted with AES.E、 All of the above

An administrator would like to know the name of the workstation that is being repaired. Which ofthe following commands, without parameters, will provide this information?()A、HostnameB、IpconfigC、NetstatD、Ping

Company.com would like to share CPU resources between AIX V5.3 and Linux partitions. Which solution would best satisfy this customer requirement?()A、Micro-PartitioningB、Partition Load ManagerC、eWLMD、Grid Toolbox

A customer would like to share the processor resources automatically between logical partitions.  Which of the following would accomplish this requirement without user interaction? ()A、 Dynamic LPARsB、 On/Off Capacity on DemandC、 Uncapped Micro-PartitioningD、 Enterprise Workload Manager

A customer has two locations that host their pSeries servers.  Traffic is being routed through the public Internet.  The customer needs to exchange confidential financial data between the servers.  Which of the following solutions should the pSeries technical specialist propose to the customer to secure the data?()A、A DCE domainB、A Kerberos domainC、A PPP tunnel between the serversD、An IPSEC tunnel between the servers

A system without a monitor has crashed. The administrator would like to see the console output to determine a possible cause of the crash and ensure that there were no problems on reboot. Which command would be used?()A、alogB、swconsC、lsconsD、syslog

Which command would you use to view interface usage details in real time?()A、show interfaces terseB、show interfaces extensiveC、monitor interface trafficD、monitor traffic interface

You work as a database administrator for Supportcenter.cn. You suspect that in one of your applications the customer table is being accessed by some unauthorized users. Which option would you use to monitor the queries being executed on the customer table?()A、Monitor thealert.logfileB、Enable server-side SQL tracing for user sessionsC、Enable fine-grained auditing for the customer tableD、Enable Fine-Grained Access Control (FGAC) for the customer tableE、Write a database trigger on the customer table on the SELECT event

单选题A customer would like to share the processor resources automatically between logical partitions.  Which of the following would accomplish this requirement without user interaction? ()A Dynamic LPARsB On/Off Capacity on DemandC Uncapped Micro-PartitioningD Enterprise Workload Manager

单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains Windows Server 2003 computers and Windows XP Professional computers.  You configure a server named Server1 to be a file server. The written company security policy states that you must analyze network traffic that is sent to and from all file servers.You need to capture file-transfer network traffic that is being sent to and from Server1. You install Network Monitor Tools from a Windows Server 2003 product CD-ROM on a server named Server2, which is on the same network segment as Server1.You run Network Monitor on Server2. However, Network Monitor captures only network traffic that is sent to and from Server2. You need to capture all network traffic that is sent to and from Server1.  What should you do?()AInstall the Network Monitor driver on Server1. Run Network Monitor on Server2 to capture network traffic.BOpen Network Monitor on Server2 and create a capture filter to enable the capture of all protocols. Run Network Monitor to capture network traffic.CInstall Network Monitor Tools on Server1. Run Network Monitor to capture network traffic.DOpen Network Monitor on Server2 and increase the capture buffer from 1 MB to 20 MB in size. Run Network Monitor to capture network traffic.

单选题A storage specialist is assessing a customer’s tape backup environment. Which of the following questions would be the most appropriate question to identify the customer’s environment?()AHas there been any recent loss of data?BHow many tape drives are in the Library?CWhat tape technology is currently being used?DWhat software is being used for restoring the data?

单选题A customer has two locations that host their pSeries servers.  Traffic is being routed through the public Internet.  The customer needs to exchange confidential financial data between the servers.  Which of the following solutions should the pSeries technical specialist propose to the customer to secure the data?()AA DCE domainBA Kerberos domainCA PPP tunnel between the serversDAn IPSEC tunnel between the servers

单选题A user would like to use an external monitor with their laptop, but when the monitor is plugged in and connected to the laptop, the screen does not display on the monitor. Which of the following is the BEST way to display an image on both the monitor and the laptop?()AChange resolution on laptopBToggle FN key and external monitor keyCTry a different monitor typeDTry using a different monitor cable

单选题The network administrator would like to generate synthetic traffic using the Service AssuranceAgent contained in Cisco IOS. Which CiscoWorks network management application will be used toreport the latency and availability for configured traffic operations on an end-to-end and hop-by-hop (router-to router) basis?()A nGenius Real-Time MonitorB CiscoViewC Device Fault ManagerD Internetwork Performance Monitor

单选题The customer would like to replicate their data from site A to site B. This distance is approximately325 meters between the sites. The customer has a DS5000 with 6 DS EXP5000 expansionshelves that hold approximately 40 TB of data. Which method of replication would be supported?()AHACMP-XDBSnapMirrorCSyncMirrorDEnhanced Remote Mirroring

单选题Upon announcement,the specific details surrounding the Virtual I/O Server requirements and performance are still being defined.  The customer has engaged IBM to provide a server consolidation solution and would like to take advantage of the VIO Server benefits. How should the pSeries technical specialist best address this?()ADesign the solution and present it confidently so the customer does not question it.BDesign the solution and ensure the customer understands the unknowns with the new technology.CExplain to the customer that the VIO Server does not benefit them when doing server consolidation so it has not been configured.DExplain to the customer that the details surrounding the VIO Server have not been clearly defined so designing a solution is premature.

单选题You are responsible for network monitoring and need to monitor traffic over a routed network from a remote source to an IDS or IPS located in the headquarters site. What would you use in order to accomplish this?()AVACLs and VSPANBRSPANCERSPANDNetFlow

单选题You work as a database administrator for Supportcenter.cn. You suspect that in one of your applications the customer table is being accessed by some unauthorized users. Which option would you use to monitor the queries being executed on the customer table?()AMonitor thealert.logfileBEnable server-side SQL tracing for user sessionsCEnable fine-grained auditing for the customer tableDEnable Fine-Grained Access Control (FGAC) for the customer tableEWrite a database trigger on the customer table on the SELECT event

单选题The network administrator would like to generate synthetic traffic using the Service Assurance Agent contained in Cisco IOS. Which CiscoWorks network management application will be used to report the latency and availability for configured traffic operations on an end-to-end and hop-byhop (router-to-router) basis?()AnGenius Real-Time MonitorBCiscoViewCDevice Fault ManagerDInternetwork Performance Monitor

单选题A customer would like to have the ability to permanently activate processor and memory resources as their workload increases. Which of the following supports the customer requirement?()AReserve Capacity on DemandBUtility Capacity on DemandCCapacity Upgrade on DemandDUncapped Capacity on Demand

单选题Customer: I think I’ll have the tomato soup to start._____ Waiter: Right. And would you like croutons in your soup? Customer: No, thank you. Waiter: How would you like your steak? Rare, medium or well done?AAnd I’d like some teaBAnd I’d also like a steak.CAnd perhaps some orange juice. DAnd I’d like to order now.

单选题Which statement is true about the data traffic between the access point named TKAP1 and  controller TKC1?()A The data traffic between the access point and controller is not encrypted.B The data traffic is encapsulated with LWAPP.C The data traffic is switched at the access point before being sent to the WLAN controller where  VLAN tagging and QoS are applied.D The data traffic is encrypted with AES.E All of the above