Monitor session 1 type span Source interface veth5 both Destination interface veth6 No shut
monitor session 1 source vlan 10 destination interface veth6 no shut
monitor session 1 type er-span source interface vlan 10 destination ip 10.1.1.10 no shut
VM002 must be removed from the Nk1V
Move VM002 to Module 5
Restart the VEM on module 5
第1题:
A customer would like to monitor traffic that is being sent to a specific virtual machine named VM001 using SPAN. The customer has another virtual machine configured as a sniffer host called VM002. What configuration is required, and what other changes will need to be made? () VSM-PRI-188# sh int vethernet 5 Vethernet5 is up Port description is VM001, Network Adapter 2 HardwarE. Virtual, address: 0050.56b0.001e (bia 0050.56b0.001e) Owner is VM "VM001", adapter is Network Adapter 2 Active on module 5 VMware DVS port 484 Port-Profile is VM-vlan-10 Port mode is access VSM-PRI-188# sh int vethernet 6 Vethernet6 is up Port description is VM002, Network Adapter 1 HardwarE. Virtual, address: 0050.56b0.0020 (bia 0050.56b0.0020) Owner is VM "VM002", adapter is Network Adapter 1 Active on module 5 VMware DVS port 485 Port-Profile is VM-vlan-10 Port mode is access
第2题:
Which statement is true about the data traffic between the access point named TKAP1 and controller TKC1?()
第3题:
Company.com would like to share CPU resources between AIX V5.3 and Linux partitions. Which solution would best satisfy this customer requirement?()
第4题:
A customer has two locations that host their pSeries servers. Traffic is being routed through the public Internet. The customer needs to exchange confidential financial data between the servers. Which of the following solutions should the pSeries technical specialist propose to the customer to secure the data?()
第5题:
Which command would you use to view interface usage details in real time?()
第6题:
Dynamic LPARs
On/Off Capacity on Demand
Uncapped Micro-Partitioning
Enterprise Workload Manager
第7题:
Has there been any recent loss of data?
How many tape drives are in the Library?
What tape technology is currently being used?
What software is being used for restoring the data?
第8题:
Change resolution on laptop
Toggle FN key and external monitor key
Try a different monitor type
Try using a different monitor cable
第9题:
HACMP-XD
SnapMirror
SyncMirror
Enhanced Remote Mirroring
第10题:
VACLs and VSPAN
RSPAN
ERSPAN
NetFlow
第11题:
nGenius Real-Time Monitor
CiscoView
Device Fault Manager
Internetwork Performance Monitor
第12题:
And I’d like some tea
And I’d also like a steak.
And perhaps some orange juice.
And I’d like to order now.
第13题:
A company would like to create and maintain a web presence by operating a web server and anFTP server for users to upload and download job specifications. Which of the following Internetconnection types would be BEST suited for this type of traffic?()
第14题:
An administrator would like to know the name of the workstation that is being repaired. Which ofthe following commands, without parameters, will provide this information?()
第15题:
A customer would like to share the processor resources automatically between logical partitions. Which of the following would accomplish this requirement without user interaction? ()
第16题:
A system without a monitor has crashed. The administrator would like to see the console output to determine a possible cause of the crash and ensure that there were no problems on reboot. Which command would be used?()
第17题:
You work as a database administrator for Supportcenter.cn. You suspect that in one of your applications the customer table is being accessed by some unauthorized users. Which option would you use to monitor the queries being executed on the customer table?()
第18题:
Install the Network Monitor driver on Server1. Run Network Monitor on Server2 to capture network traffic.
Open Network Monitor on Server2 and create a capture filter to enable the capture of all protocols. Run Network Monitor to capture network traffic.
Install Network Monitor Tools on Server1. Run Network Monitor to capture network traffic.
Open Network Monitor on Server2 and increase the capture buffer from 1 MB to 20 MB in size. Run Network Monitor to capture network traffic.
第19题:
A DCE domain
A Kerberos domain
A PPP tunnel between the servers
An IPSEC tunnel between the servers
第20题:
nGenius Real-Time Monitor
CiscoView
Device Fault Manager
Internetwork Performance Monitor
第21题:
Design the solution and present it confidently so the customer does not question it.
Design the solution and ensure the customer understands the unknowns with the new technology.
Explain to the customer that the VIO Server does not benefit them when doing server consolidation so it has not been configured.
Explain to the customer that the details surrounding the VIO Server have not been clearly defined so designing a solution is premature.
第22题:
Monitor thealert.logfile
Enable server-side SQL tracing for user sessions
Enable fine-grained auditing for the customer table
Enable Fine-Grained Access Control (FGAC) for the customer table
Write a database trigger on the customer table on the SELECT event
第23题:
Reserve Capacity on Demand
Utility Capacity on Demand
Capacity Upgrade on Demand
Uncapped Capacity on Demand
第24题:
The data traffic between the access point and controller is not encrypted.
The data traffic is encapsulated with LWAPP.
The data traffic is switched at the access point before being sent to the WLAN controller where VLAN tagging and QoS are applied.
The data traffic is encrypted with AES.
All of the above