The network administrator would like to generate synthetic traffic using the Service Assurance Agent contained in Cisco IOS. Which CiscoWorks network management application will be used to report the latency and availability for configured traffic operations on an end-to-end and hop-byhop (router-to-router) basis?()A. nGenius Real-Time MonitorB. CiscoViewC. Device Fault ManagerD. Internetwork Performance Monitor

The network administrator would like to generate synthetic traffic using the Service Assurance Agent contained in Cisco IOS. Which CiscoWorks network management application will be used to report the latency and availability for configured traffic operations on an end-to-end and hop-byhop (router-to-router) basis?()

A. nGenius Real-Time Monitor

B. CiscoView

C. Device Fault Manager

D. Internetwork Performance Monitor


相关考题:

An administrator is using a protocol analyzer to monitor traffic between two servers. However, theonly traffic that appears is broadcast and traffic originating from the administrator‘s PC.Which of the following devices is the administrator plugged into? ()A.HubB. BridgeC. SwitchD. Router

Using network monitoring tools would allow an administrator to do which of the following?() A. Configure offline devicesB. Examine performance issuesC. Install additional software and updatesD. View syslog events

An administrator is setting up a network and would like to prevent users from having the ability toplug their PC into the network to receive an IP address.Which of the following addressing schemes should the technician use?()A.NATB.DynamicC.SubnettingD.Static

You are the network administrator at TestKing. TestKing has been assigned the class C IP address 189.66.1.0 by its Internet Service Provider. If you divide the network range by using the 255.255.255.224 subnet mask, how many hosts can be supported on each network?()A.14B.16C.30D.32E.62F.64

What can a network administrator utilize by using PPP Layer 2 encapsulation (Choose three.) ()。 A.VLAN supportB.compressionC.authenticationD.sliding windowsE.multilink supportF.quality of service

What two steps need to be taken in deploying AutoQoS for enterprise on routers?()A、provide visibility into the classes of service deployed using system logging and SNMP trapsB、determine WAN settings for fragmentation, compression, encapsulation, and Frame Relay-ATM interworkingC、enable the AutoQoS VoIP for voice trafficD、generate and deploy MQC-based QoS policiesE、profile the traffic with Auto-Discovery

What are two reasons that a network administrator would use access lists (Choose two.)()。A、to control vty access into a routerB、to control broadcast traffic through a routerC、to filter traffic as it passes through a routerD、to filter traffic that originates from the routerE、to replace passwords as a line of defense against security incursions

You are a network administrator and you need to implement a routing protocol on your network that provides: * Scalability * VLSM support * Minimal overhead * Support for connecting networks using routers of multiple vendors Which of the following routing protocol would best serve your needs?()A、VTPB、RIP version 1C、EIGRPD、OSPFE、IGRPF、CDP

Which two statements describe the functions and operations of IDS and IPS systems?()A、A network administrator entering a wrong password would generate a true-negative alarm.B、A false positive alarm is generated when an IDS/IPS signature is correctly identified.C、An IDS is significantly more advanced over IPS because of its ability to prevent network attacks.D、Cisco IDS works inline and stops attacks before they enter the network.E、Cisco IPS taps the network traffic and responds after an attack.F、Profile-based intrusion detection is also known as "anomaly detection".

What are two reasons that a network administrator would use access lists? (Choose two.) ()。A、to control vty access into a router  B、to control broadcast traffic through a router  C、to filter traffic as it passes through a router  D、to filter traffic that originates from the router  E、to replace passwords as a line of defense against security incursions

What can a network administrator utilize by using PPP Layer 2 encapsulation (Choose three.) ()。A、VLAN supportB、compressionC、authenticationD、sliding windowsE、multilink supportF、quality of service

An administrator is using a protocol analyzer to monitor traffic between two servers. However, the only traffic that appears is broadcast and traffic originating from the administrator's PC. Which of the following devices is the administrator plugged into? ()A、HubB、BridgeC、SwitchD、Router

An administrator is logged into a remote server using an Xwindows client and wants to use smit. The bandwidth for the remote connection is minimal, so the administrator would like to disable the graphical version of smit to speed up display updates. Which command will start smit in the non-graphical mode?()A、smitB、msmitC、smit -CD、smit_tty

You are the administrator of a Windows 2000 network that has 1,500 Windows 2000 Professional computers. Microsoft Office 2000 was assigned to all the computers on the network by using a Group Policy object (GPO).  You deploy the Office 2000 service release to all the Windows 2000 Professional computers on the network. The service release, in addition to other software that had been assigned, fails to install on only one of the computers.   What should you do? ()A、Redeploy the service release by using a .Zap file. B、Redeploy the service release by using a .mst file. C、Restart Windows installer on the domain controller. D、Restart Windows installer on the computer that failed to install the service release.

You are the administrator of a Windows 2000 Professional network that has 1500 Windows 2000 Professional computers. Microsoft Office 2000 was installed to all the computers over the network by using Group Policy Object. You deploy an Office 2000 service release to all the Windows 2000 Professional computers on the network. The service release in addition to other software that had been assigned fails to install on only one of the computer. What should you do?()A、Re-deploy the service release by using a .ZAP file. B、Re-deploy the service release by using a .MST file. C、Restart windows installer on the domain controller. D、Restart windows installer on the computer that failed to install the service release. E、Restart Windows installer and use an .MSP file.

单选题A network administrator would like to view detailed interface status, properties, statistics, errors,and CoS packet counters.Which operational command will display this information?()Ashow interfaces extensiveBshow interfacesCshow configuration interfacesDshow interface status

多选题What can a network administrator utilize by using PPP Layer 2 encapsulation? (Choose three.)()AVLAN supportBcompressionCauthenticationDsliding windowsEmultilink supportFquality of service

多选题You work as a database administrator for Certkiller .com. You decided to manage client and server connections using Local Naming method in Certkiller .com. When you try to connect to the database you get the following error: ERROR:  ORA-12154:TNS:couldnot resolve service name  Which network configuration files would you look into to resolve this error?()Asnmp.oraBnames.oraCspfile.oraDsqlnet.oraElistener.oraFtnsnames.ora

单选题A network administrator wants to permit Telnet traffic initiated from the address book entry the10net in azone called UNTRUST to the address book entry Server in a zone called TRUST.However, the administrator does not want the server to be able to initiate any type of traffic from the TRUSTzone to the UNTRUST zone. Which configuration would correctly accomplish this task?()A AB BC CD D

单选题You are the administrator of a Windows 2000 network.  The network has 100 Windows 2000 Professional computers. A graphics application was assigned to all the computers on the network by using a Group Policy object (GPO).  You deploy a service release for the graphics application to all of the Windows 2000 Professional computers on the network. The service release, in addition to other software that had been assigned, fails to install on only one of the computers.   What should you do?()ARestart Windows Installer on the domain controller.BRestart Windows Installer on the computer that failed to install the service release.CRedeploy the service release by using an .mst file.DRedeploy the service release by using a .zap file.

单选题Using network monitoring tools would allow an administrator to do which of the following?()AConfigure offline devicesBExamine performance issuesCInstall additional software and updatesDView syslog events

单选题The network administrator would like to generate synthetic traffic using the Service AssuranceAgent contained in Cisco IOS. Which CiscoWorks network management application will be used toreport the latency and availability for configured traffic operations on an end-to-end and hop-by-hop (router-to router) basis?()A nGenius Real-Time MonitorB CiscoViewC Device Fault ManagerD Internetwork Performance Monitor

单选题You are a network administrator and you need to implement a routing protocol on your network that provides: * Scalability * VLSM support * Minimal overhead * Support for connecting networks using routers of multiple vendors Which of the following routing protocol would best serve your needs?()AVTPBRIP version 1CEIGRPDOSPFEIGRPFCDP

单选题The network administrator would like to generate synthetic traffic using the Service Assurance Agent contained in Cisco IOS. Which CiscoWorks network management application will be used to report the latency and availability for configured traffic operations on an end-to-end and hop-byhop (router-to-router) basis?()AnGenius Real-Time MonitorBCiscoViewCDevice Fault ManagerDInternetwork Performance Monitor

单选题You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. The network contains a Web server that runs IIS 6.0 and hosts a secure intranet site. All users are required to connect to the intranet site by authenticating and using HTTPS. However, because an automated Web application must connect to the Web site by using HTTP, you cannot configure the intranet site to require HTTPS.  You need to collect information about which users are connecting to the Web site by using HTTPS.   What should you do?()ACheck the application log on the Web server.BUse Network Monitor to capture network traffic on the Web server.CReview the log files created by IIS on the Web server.DConfigure a performance log to capture all Web service counters. Review the performance log data.

单选题An administrator is setting up a network and would like to prevent users from having the ability to plug their PC into the network to receive an IP address. Which of the following addressing schemes should the technician use?()ANATBDynamicCSubnettingDStatic