Which protocol can cause overload on a CPU of a managed device?() A. NetflowB. WCCPC. IP SLAD. SNMP

Which protocol can cause overload on a CPU of a managed device?()

A. Netflow

B. WCCP

C. IP SLA

D. SNMP


相关考题:

Which of the following is MOST likely a managed, Layer 3 device?() A.RouterB.BridgeC.HubD.Switch

Which of the following are advantages of using Dynamic Host Configuration Protocol?() A. IP addresses can be managed from a central pointB. Computers can automatically get new addressing when moved to a different network segmentC. Media Access Control addresses can be changed automaticallyD. The network speed can automatically adjust based on the type of traffic being generatedE. The HOSTS file on the computer can be validated for proper entries

Simple Network Management Protocol (SNMP) is an Internet Standard protocol for collecting and organizing information about managed devices on IP networks and for modifying that information to change device(). SNMP is a component of the Internet Protocol Suiteas defined by the Internet( )Task Force. SNMP operates in the( )layer of the Internet protocol suite. All SNMP messages are transported via User(请作答此空)Protocol. An SNMP-managed network consists of three key components: a) Managed devices, b) ( )(i.e.,software which runs on managed devices), and c) Network management station (NMS) (i.e., software which runs on the manager).A.DatumB.DatagramC.DatA.PacketD.DatA.Message

Which three statements describe the configuration change management feature in DCNM LAN? ()A、 Switch profiles allow configurations to be synchronized between switches and are supported with any Cisco NX-OS Software managed device.B、 DCNM LAN can archive configurations from devices even if they are not managed by the DCNM server, and the administrator can supply the device management IP address and credentials.C、 You can archive a maximum of 50 configuration versions per managed device.D、 Managed devices must be licensed in DCNM LAN before they can be used with configuration change management.E、 Device-running configuration will be archived only if it differs from the last archived version.

A new computer is displaying the wrong amount of memory. Which of the following may be the cause?()A、The module is installed backwards.B、A USB device is using some memory.C、An onboard video card is using some memory.D、The CPU is using some memory.

Which of the following utilities can be used to determine the current partition information on an attached storage device?()A、Add Hardware WizardB、Device ManagerC、Disk ManagementD、Control Panel

For an incomplete recovery, which four backup types can be used by Recovery Manager (RMAN) to restore data files? ()A、RMAN image copiesB、RMAN database backupsC、RMAN tablespace backupsD、user­managed backups placed in the flash recovery areaE、user­managed backups that have been cataloged with RMANF、user­managed data file backups for which the full path name is specified

Which protocol can cause overload on a CPU of a managed device?()A、NetflowB、WCCPC、IP SLAD、SNMP

Which of the following can cause a ribbon on an impact printer to tear?()A、The fuserB、The toner cartridgeC、The platenD、The printhead

A technician plugs a USB device into the computer. The system tray displays a message that reports the device is installed, but may not work properly. Which of the following is the MOST likely cause of the message?()A、The device needs a firmware updateB、The device needs an updated driver installedC、The plugged in device is too slow for the USB port speedD、The device is incompatible with the installed version of Windows

A technician installs a new sound card but no sound can be heard. Which of the following utilities can be used to see an error?()A、MSCONFIGB、Device ManagerC、DXDIAGD、REGEDIT

Which of the following are advantages of using Dynamic Host Configuration Protocol?()A、IP addresses can be managed from a central pointB、Computers can automatically get new addressing when moved to a different network segmentC、Media Access Control addresses can be changed automaticallyD、The network speed can automatically adjust based on the type of traffic being generatedE、The HOSTS file on the computer can be validated for proper entries

The sysdumpdev command can be used to configure remote dump devices. Which of the following conditions is NOT used for a remote dump device configuration?()A、The local and the remote host must have Transmission Control Protocol/Internet Protocol (TCP/IP) installed and configured. B、The remote host must support NFS. C、The remote host must have an NFS exported directory defined such that the local host has read and write permissions to the dump file on the remote host. D、The remote host can be the same as the local host.

After upgrading the SNMP (Simple Network Management Protocol) protocol, the ()can be looked up. It is a  sequence of integers that uniquely identifies a path to a managed object.  A、 MIB (Management Information Base)B、 OID (ObjectIDentifier)C、 registerD、 community name

单选题The sysdumpdev command can be used to configure remote dump devices. Which of the following conditions is NOT used for a remote dump device configuration?()AThe local and the remote host must have Transmission Control Protocol/Internet Protocol (TCP/IP) installed and configured. BThe remote host must support NFS. CThe remote host must have an NFS exported directory defined such that the local host has read and write permissions to the dump file on the remote host. DThe remote host can be the same as the local host.

单选题A new computer is displaying the wrong amount of memory. Which of the following may be the cause?()AThe module is installed backwards.BA USB device is using some memory.CAn onboard video card is using some memory.DThe CPU is using some memory.

单选题You want to back up your 100-GB database on a remote tape device. You are required to ensure that minimum network bandwidth is consumed while transferring the backups to the tape device. The current consumption of your CPU is approximately 40 percent.Which type of backup should you perform?()Astandard backup setBimage copyCcompressed backupDuser-managed backup

多选题Which three statements describe the configuration change management feature in DCNM LAN? ()ASwitch profiles allow configurations to be synchronized between switches and are supported with any Cisco NX-OS Software managed device.BDCNM LAN can archive configurations from devices even if they are not managed by the DCNM server, and the administrator can supply the device management IP address and credentials.CYou can archive a maximum of 50 configuration versions per managed device.DManaged devices must be licensed in DCNM LAN before they can be used with configuration change management.EDevice-running configuration will be archived only if it differs from the last archived version.

单选题You want to back up your 100-GB database on a remote tape device. You are required to ensure that minimum network bandwidth is consumed while transferring the backups to the tape device.  The current consumption of your CPU is approximately 40 percent.  Which type of backup should you perform?()A standard backup setB image copyC compressed backupD user-managed backup

单选题After upgrading the SNMP (Simple Network Management Protocol) protocol, the ()can be looked up. It is a  sequence of integers that uniquely identifies a path to a managed object.A MIB (Management Information Base)B OID (ObjectIDentifier)C registerD community name

单选题A technician plugs a USB device into the computer. The system tray displays a message that reports the device is installed, but may not work properly. Which of the following is the MOST likely cause of the message?()AThe device needs a firmware updateBThe device needs an updated driver installedCThe plugged in device is too slow for the USB port speedDThe device is incompatible with the installed version of Windows

单选题Which of the following is MOST likely a managed, Layer 3 device?()ARouterBBridgeCHubDSwitch

单选题Electric cargo winches have an overload safety device which normally cuts the current to the winch motor().Aafter torque cause line pull to exceed the rated capacity of the winchBbefore the line pull reaches the rated capacity of the winchCwhen the line pull reaches the breaking strengh of the fallDbefore the safe working load of the fall is reached

多选题Which two management-software applications can you use to manage the Cisco Catalyst Express 500 Series Switches?()ACisco Network AssistantBCisco Security Device ManagerCCisco Device ManagerDCisco Adaptive Security Device Manager

多选题For an incomplete recovery, which four backup types can be used by Recovery Manager (RMAN) to restore data files? ()ARMAN image copiesBRMAN database backupsCRMAN tablespace backupsDuser­managed backups placed in the flash recovery areaEuser­managed backups that have been cataloged with RMANFuser­managed data file backups for which the full path name is specified

单选题Which protocol should be used to establish a secure terminal connection to a remote network device? Select the best response.()AARPBSSHCTelnetDWEPESNMPv1FSNMPv2

单选题Which of the following is not a factor which can interfere with the pulse of sound and cause a variation the depth reading?()AsalinityBtemperatureCthe hydrostatic pressureDVessel’s speed