Which of the following protocols can be used to retrieve system and network performance information from a router?()A、LDAPB、IMAPC、TFTPD、SNMP
Which of the following protocols can be used to retrieve system and network performance information from a router?()
- A、LDAP
- B、IMAP
- C、TFTP
- D、SNMP
相关考题:
Which of the following tools and techniques can be used to collect information for the project closure reports?A Customer SurveysB BrainstormingC Document and Performance AnalysisD Lessons LearnedE All of the above
In the following essay, each blank has four choices. Choose the most suitable one from the four choices and write down in the answer sheet.The key to SNMP(66)is its simplicity. It has a small command set that does a good job of collecting information from(67)any network device. In a SNMP environment,(68)of the work is handled by the network management system. Devices that are being managed are not(69)with processing(70)that might affect their performance.A.popularityB.functionC.efficiencyD.power
Which of the following protocols would be used in order to log into a router to configure a VLAN?() A.RDPB.SMTPC.TELNETD.FTP
Which of the following protocols is commonly used for VoIP technology?() A.TelnetB.SMTPC.SIPD.SNMP
An administrator needs to update a router configuration for a router that does not support SSH.Which of the following can be used to securely update the router configuration?() A.FTPB.SNMPv2C.TFTPD.KTTPS
Which of the following protocols should be used to monitor network performance?() A.SNTPB.SMTPC.HTTPD.SNMP
Which of the following commands is used to retrieve database names from the local catalog for DRDA host databases on System i and System z?() A.LIST DB DIRECTORYB.LIST DCS DIRECTORYC.LIST NODE DIRECTORYD.LIST ACTIVE DATABASES
When selecting a Network Interface Card (NIC), which of the following factors need to be considered?() A. The type of application used on the networkB. The type of system bus used by the computersC. The type of memory installed in each computerD. The type of media used in the network topologyE. The type of protocols used in the networkF. The physical layout of the network hosts
Which one of the following statements best explains the split horizon rule used in distance vector routing protocols?() A. Only routers can split boundaries (horizons) between concentric networks.B. Each AS must keep routing tables converged to prevent dead routes from being advertised across boundaries.C. Networks can only remain fully converged if all information is sent out all active interfaces.D. Information about a route should not be sent back in the direction from which the original update came.E. Distance vector protocols need fall back routers that are responsible for momentary loops.
Using the following information: Performance data from an existing system that a new system will replace; Performance estimates that anticipate future workloads; Micro-partitioning and logical partitioning implementations. Which of the following allows a technical sales representative to create a system design which can be imported into an HMC?()A、IBMeConfigB、IBM Performance MonitorC、IBM Workload Estimator (WLE)D、IBM System Planning Tool (SPT)
When selecting a Network Interface Card (NIC), which of the following factors need to be considered?()A、The type of application used on the networkB、The type of system bus used by the computersC、The type of memory installed in each computerD、The type of media used in the network topologyE、The type of protocols used in the networkF、The physical layout of the network hosts
Which of the following protocols is commonly used for VoIP technology?()A、TelnetB、SMTPC、SIPD、SNMP
Which of the following protocols should be used to monitor network performance?()A、SNTPB、SMTPC、HTTPD、SNMP
Which of the following protocols would be used in order to log into a router to configure a VLAN?()A、RDPB、SMTPC、TELNETD、FTP
Which of the following network protocols is used to ensure consistent time across network devices on the domain?()A、NTPB、FTPC、RTPD、IGMP
Which of the following commands is used to retrieve database names from the local catalog for DRDA host databases on System i and System z?()A、LIST DB DIRECTORYB、LIST DCS DIRECTORYC、LIST NODE DIRECTORYD、LIST ACTIVE DATABASES
Which of the following commands should be used to report statistics on network protocols used by the system?()A、 lsattrB、 pstatC、 netstatD、 ifconfig
Which of the following performance tools can be used to determine if a system is thrashing?()A、 svmon and tprofB、 vmtune and schedtuneC、 ps and schedtuneD、 vmstat and topas
Which of the following commands can be used to obtain information about filesets on the system that are later than the current maintenance level?()A、 lslpp -IB、 uname -rC、 oslevel -gD、 rpcinfo -p
单选题Which of the following protocols can be used to retrieve system and network performance information from a router?()ALDAPBIMAPCTFTPDSNMP
单选题Which of the following protocols should be used to monitor network performance?()ASNTPBSMTPCHTTPDSNMP
多选题When selecting a Network Interface Card (NIC), which of the following factors need to be considered?()AThe type of application used on the networkBThe type of system bus used by the computersCThe type of memory installed in each computerDThe type of media used in the network topologyEThe type of protocols used in the networkFThe physical layout of the network hosts
单选题Which of the following performance tools can be used to determine if a system is thrashing?()A svmon and tprofB vmtune and schedtuneC ps and schedtuneD vmstat and topas
单选题Which of the following commands should be used to report statistics on network protocols used by the system?()A lsattrB pstatC netstatD ifconfig