多选题A customer would like to monitor traffic that is being sent to a specific virtual machine named VM001 using SPAN. The customer has another virtual machine configured as a sniffer host called VM002. What configuration is required, and what other changes

题目
多选题
A customer would like to monitor traffic that is being sent to a specific virtual machine named VM001 using SPAN. The customer has another virtual machine configured as a sniffer host called VM002. What configuration is required, and what other changes will need to be made? () VSM-PRI-188# sh int vethernet 5  Vethernet5 is up  Port description is VM001, Network Adapter 2    HardwarE. Virtual, address: 0050.56b0.001e (bia 0050.56b0.001e)  Owner is VM "VM001", adapter is Network Adapter 2  Active on module 5   VMware DVS port 484   Port-Profile is VM-vlan-10   Port mode is access        VSM-PRI-188# sh int vethernet 6   Vethernet6 is up  Port description is VM002, Network Adapter 1  HardwarE. Virtual, address: 0050.56b0.0020 (bia 0050.56b0.0020)  Owner is VM "VM002", adapter is Network Adapter 1  Active on module 5   VMware DVS port 485   Port-Profile is VM-vlan-10   Port mode is access
A

Monitor session 1 type span       Source interface veth5 both      Destination interface veth6      No shut

B

monitor session 1      source vlan 10      destination interface veth6      no shut

C

monitor session 1 type er-span      source interface vlan 10      destination ip 10.1.1.10      no shut

D

VM002 must be removed from the Nk1V

E

Move VM002 to Module 5

F

Restart the VEM on module 5


相似考题
更多“A customer would like to monitor traffic that is being sent ”相关问题
  • 第1题:

    A customer would like to monitor traffic that is being sent to a specific virtual machine named VM001 using SPAN. The customer has another virtual machine configured as a sniffer host called VM002. What configuration is required, and what other changes will need to be made? () VSM-PRI-188# sh int vethernet 5  Vethernet5 is up  Port description is VM001, Network Adapter 2    HardwarE. Virtual, address: 0050.56b0.001e (bia 0050.56b0.001e)  Owner is VM "VM001", adapter is Network Adapter 2  Active on module 5   VMware DVS port 484   Port-Profile is VM-vlan-10   Port mode is access        VSM-PRI-188# sh int vethernet 6   Vethernet6 is up  Port description is VM002, Network Adapter 1  HardwarE. Virtual, address: 0050.56b0.0020 (bia 0050.56b0.0020)  Owner is VM "VM002", adapter is Network Adapter 1  Active on module 5   VMware DVS port 485   Port-Profile is VM-vlan-10   Port mode is access      

    • A、 Monitor session 1 type span       Source interface veth5 both      Destination interface veth6      No shut
    • B、 monitor session 1      source vlan 10      destination interface veth6      no shut
    • C、 monitor session 1 type er-span      source interface vlan 10      destination ip 10.1.1.10      no shut
    • D、 VM002 must be removed from the Nk1V
    • E、 Move VM002 to Module 5
    • F、 Restart the VEM on module 5

    正确答案:A,E

  • 第2题:

    Which statement is true about the data traffic between the access point named TKAP1 and  controller TKC1?()

    • A、 The data traffic between the access point and controller is not encrypted.
    • B、 The data traffic is encapsulated with LWAPP.
    • C、 The data traffic is switched at the access point before being sent to the WLAN controller where  VLAN tagging and QoS are applied.
    • D、 The data traffic is encrypted with AES.
    • E、 All of the above

    正确答案:B

  • 第3题:

    Company.com would like to share CPU resources between AIX V5.3 and Linux partitions. Which solution would best satisfy this customer requirement?()

    • A、Micro-Partitioning
    • B、Partition Load Manager
    • C、eWLM
    • D、Grid Toolbox

    正确答案:A

  • 第4题:

    A customer has two locations that host their pSeries servers.  Traffic is being routed through the public Internet.  The customer needs to exchange confidential financial data between the servers.  Which of the following solutions should the pSeries technical specialist propose to the customer to secure the data?()

    • A、A DCE domain
    • B、A Kerberos domain
    • C、A PPP tunnel between the servers
    • D、An IPSEC tunnel between the servers

    正确答案:D

  • 第5题:

    Which command would you use to view interface usage details in real time?()

    • A、show interfaces terse
    • B、show interfaces extensive
    • C、monitor interface traffic
    • D、monitor traffic interface

    正确答案:C

  • 第6题:

    单选题
    A customer would like to share the processor resources automatically between logical partitions.  Which of the following would accomplish this requirement without user interaction? ()
    A

     Dynamic LPARs

    B

     On/Off Capacity on Demand

    C

     Uncapped Micro-Partitioning

    D

     Enterprise Workload Manager


    正确答案: C
    解析: 暂无解析

  • 第7题:

    单选题
    A storage specialist is assessing a customer’s tape backup environment. Which of the following questions would be the most appropriate question to identify the customer’s environment?()
    A

    Has there been any recent loss of data?

    B

    How many tape drives are in the Library?

    C

    What tape technology is currently being used?

    D

    What software is being used for restoring the data?


    正确答案: B
    解析: 暂无解析

  • 第8题:

    单选题
    A user would like to use an external monitor with their laptop, but when the monitor is plugged in and connected to the laptop, the screen does not display on the monitor. Which of the following is the BEST way to display an image on both the monitor and the laptop?()
    A

    Change resolution on laptop

    B

    Toggle FN key and external monitor key

    C

    Try a different monitor type

    D

    Try using a different monitor cable


    正确答案: D
    解析: 暂无解析

  • 第9题:

    单选题
    The customer would like to replicate their data from site A to site B. This distance is approximately325 meters between the sites. The customer has a DS5000 with 6 DS EXP5000 expansionshelves that hold approximately 40 TB of data. Which method of replication would be supported?()
    A

    HACMP-XD

    B

    SnapMirror

    C

    SyncMirror

    D

    Enhanced Remote Mirroring


    正确答案: A
    解析: 暂无解析

  • 第10题:

    单选题
    You are responsible for network monitoring and need to monitor traffic over a routed network from a remote source to an IDS or IPS located in the headquarters site. What would you use in order to accomplish this?()
    A

    VACLs and VSPAN

    B

    RSPAN

    C

    ERSPAN

    D

    NetFlow


    正确答案: B
    解析: 暂无解析

  • 第11题:

    单选题
    The network administrator would like to generate synthetic traffic using the Service Assurance Agent contained in Cisco IOS. Which CiscoWorks network management application will be used to report the latency and availability for configured traffic operations on an end-to-end and hop-byhop (router-to-router) basis?()
    A

    nGenius Real-Time Monitor

    B

    CiscoView

    C

    Device Fault Manager

    D

    Internetwork Performance Monitor


    正确答案: A
    解析: 暂无解析

  • 第12题:

    单选题
    Customer: I think I’ll have the tomato soup to start._____ Waiter: Right. And would you like croutons in your soup? Customer: No, thank you. Waiter: How would you like your steak? Rare, medium or well done?
    A

    And I’d like some tea

    B

    And I’d also like a steak.

    C

    And perhaps some orange juice.    

    D

    And I’d like to order now.


    正确答案: B
    解析: 由waiter的问句“How would you like your steak?”可知顾客点了牛排,即选项B正确。

  • 第13题:

    A company would like to create and maintain a web presence by operating a web server and anFTP server for users to upload and download job specifications. Which of the following Internetconnection types would be BEST suited for this type of traffic?()

    • A、Satellite
    • B、Fiber
    • C、4G mobile hotspot
    • D、DSL

    正确答案:B

  • 第14题:

    An administrator would like to know the name of the workstation that is being repaired. Which ofthe following commands, without parameters, will provide this information?()

    • A、Hostname
    • B、Ipconfig
    • C、Netstat
    • D、Ping

    正确答案:A

  • 第15题:

    A customer would like to share the processor resources automatically between logical partitions.  Which of the following would accomplish this requirement without user interaction? ()

    • A、 Dynamic LPARs
    • B、 On/Off Capacity on Demand
    • C、 Uncapped Micro-Partitioning
    • D、 Enterprise Workload Manager

    正确答案:C

  • 第16题:

    A system without a monitor has crashed. The administrator would like to see the console output to determine a possible cause of the crash and ensure that there were no problems on reboot. Which command would be used?()

    • A、alog
    • B、swcons
    • C、lscons
    • D、syslog

    正确答案:A

  • 第17题:

    You work as a database administrator for Supportcenter.cn. You suspect that in one of your applications the customer table is being accessed by some unauthorized users. Which option would you use to monitor the queries being executed on the customer table?()

    • A、Monitor thealert.logfile
    • B、Enable server-side SQL tracing for user sessions
    • C、Enable fine-grained auditing for the customer table
    • D、Enable Fine-Grained Access Control (FGAC) for the customer table
    • E、Write a database trigger on the customer table on the SELECT event

    正确答案:D

  • 第18题:

    单选题
    You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains Windows Server 2003 computers and Windows XP Professional computers.  You configure a server named Server1 to be a file server. The written company security policy states that you must analyze network traffic that is sent to and from all file servers.You need to capture file-transfer network traffic that is being sent to and from Server1. You install Network Monitor Tools from a Windows Server 2003 product CD-ROM on a server named Server2, which is on the same network segment as Server1.You run Network Monitor on Server2. However, Network Monitor captures only network traffic that is sent to and from Server2. You need to capture all network traffic that is sent to and from Server1.  What should you do?()
    A

    Install the Network Monitor driver on Server1. Run Network Monitor on Server2 to capture network traffic.

    B

    Open Network Monitor on Server2 and create a capture filter to enable the capture of all protocols. Run Network Monitor to capture network traffic.

    C

    Install Network Monitor Tools on Server1. Run Network Monitor to capture network traffic.

    D

    Open Network Monitor on Server2 and increase the capture buffer from 1 MB to 20 MB in size. Run Network Monitor to capture network traffic.


    正确答案: C
    解析: 暂无解析

  • 第19题:

    单选题
    A customer has two locations that host their pSeries servers.  Traffic is being routed through the public Internet.  The customer needs to exchange confidential financial data between the servers.  Which of the following solutions should the pSeries technical specialist propose to the customer to secure the data?()
    A

    A DCE domain

    B

    A Kerberos domain

    C

    A PPP tunnel between the servers

    D

    An IPSEC tunnel between the servers


    正确答案: A
    解析: 暂无解析

  • 第20题:

    单选题
    The network administrator would like to generate synthetic traffic using the Service AssuranceAgent contained in Cisco IOS. Which CiscoWorks network management application will be used toreport the latency and availability for configured traffic operations on an end-to-end and hop-by-hop (router-to router) basis?()
    A

     nGenius Real-Time Monitor

    B

     CiscoView

    C

     Device Fault Manager

    D

     Internetwork Performance Monitor


    正确答案: B
    解析: 暂无解析

  • 第21题:

    单选题
    Upon announcement,the specific details surrounding the Virtual I/O Server requirements and performance are still being defined.  The customer has engaged IBM to provide a server consolidation solution and would like to take advantage of the VIO Server benefits. How should the pSeries technical specialist best address this?()
    A

    Design the solution and present it confidently so the customer does not question it.

    B

    Design the solution and ensure the customer understands the unknowns with the new technology.

    C

    Explain to the customer that the VIO Server does not benefit them when doing server consolidation so it has not been configured.

    D

    Explain to the customer that the details surrounding the VIO Server have not been clearly defined so designing a solution is premature.


    正确答案: A
    解析: 暂无解析

  • 第22题:

    单选题
    You work as a database administrator for Supportcenter.cn. You suspect that in one of your applications the customer table is being accessed by some unauthorized users. Which option would you use to monitor the queries being executed on the customer table?()
    A

    Monitor thealert.logfile

    B

    Enable server-side SQL tracing for user sessions

    C

    Enable fine-grained auditing for the customer table

    D

    Enable Fine-Grained Access Control (FGAC) for the customer table

    E

    Write a database trigger on the customer table on the SELECT event


    正确答案: C
    解析: 暂无解析

  • 第23题:

    单选题
    A customer would like to have the ability to permanently activate processor and memory resources as their workload increases. Which of the following supports the customer requirement?()
    A

    Reserve Capacity on Demand

    B

    Utility Capacity on Demand

    C

    Capacity Upgrade on Demand

    D

    Uncapped Capacity on Demand


    正确答案: C
    解析: 暂无解析

  • 第24题:

    单选题
    Which statement is true about the data traffic between the access point named TKAP1 and  controller TKC1?()
    A

     The data traffic between the access point and controller is not encrypted.

    B

     The data traffic is encapsulated with LWAPP.

    C

     The data traffic is switched at the access point before being sent to the WLAN controller where  VLAN tagging and QoS are applied.

    D

     The data traffic is encrypted with AES.

    E

     All of the above


    正确答案: B
    解析: 暂无解析