What SNMP message alerts the manager to a condition on the network?()A.responseB.trapC.cetD.capture

题目
What SNMP message alerts the manager to a condition on the network?()

A.response

B.trap

C.cet

D.capture


相似考题
更多“What SNMP message alerts the manager to a condition on the network?() ”相关问题
  • 第1题:

    Which of the following would contain information regarding network device alerts using SNMP?()

    A. Syslog

    B. Audit log

    C. History log

    D. Ping sweep reports


    参考答案:A

  • 第2题:

    You are the network administrator for . In particular you administer a Windows 2003 server named TestKing13. You need to use Disk Management to configure a partition on TestKing13.When you attempt to access Disk Management, you receive the following error message:"Unable to connect Logical Disk Manager service."You verify that the Logical Disk Manager service is started.What is the most likely cause of the problem?()

    A. There is not enough available space on the boot partition.

    B. The disk performance counters are disabled.

    C. The Logical Disk Manager Administrative service is disabled.

    D. The Windows 2003 Administration Tools Pack is not installed


    参考答案:C

  • 第3题:

    ●下面关于SNMP的说法中正确的是(55)。

    (55)

    A.SNMP Agent记录网络设备的信息

    B.SNMP Agent收集SNMP Manager所记录的信息

    C.MIB保存于SNMP Manager中

    D.Trap报文由SNMP Manager生成


    正确答案:A

  • 第4题:

    Simple Network Management Protocol (SNMP) is an Internet Standard protocol for collecting and organizing information about managed devices on IP networks and for modifying that information to change device(). SNMP is a component of the Internet Protocol Suiteas defined by the Internet( )Task Force. SNMP operates in the(请作答此空)layer of the Internet protocol suite. All SNMP messages are transported via User( )Protocol. An SNMP-managed network consists of three key components: a) Managed devices, b) ( )(i.e.,software which runs on managed devices), and c) Network management station (NMS) (i.e., software which runs on the manager).

    A.physical
    B.datA.link
    C.transport
    D.application

    答案:D
    解析:
    简单英语阅读题。

  • 第5题:

    You are the network administrator for ExamSheet.net. Your network has 210 Windows 2000 Professional computers and eleven Windows 2000 Server computers. Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled. A user named Sandra leaves ExamSheet.net. You decrypt the files for her manager. When the manager attempts to open any of the files, he receives the following error message: "Access is denied." You want the manager to be able to access the files.  What should do? ()

    • A、Move the files from Sandra’s folder to the manager’s folder.
    • B、Grant the manager NTFSFull Controlpermission to the files.
    • C、Run theciphercommand to create a new file encryption key for the manager.
    • D、Run theciphercommand to generate an EFS recovery agent key and certificate.
    • E、Grant the manager NTFSList Folder Contentspermissions to the folder containing Sandra’s files.

    正确答案:A,B

  • 第6题:

    Your IT manager has requested that you start providing weekly reports of CPU utilization on all network devices.Which monitoring function should be enabled on the MAG Series device?()

    • A、Admin logging
    • B、SNMP logging
    • C、Syslog server logging
    • D、Event logging

    正确答案:B

  • 第7题:

    What is the default message level configured for IBM Tivoli Federated Identity Manager?()

    • A、error messages only
    • B、disable all messages
    • C、error and warning messages only
    • D、info, error and warning messages

    正确答案:D

  • 第8题:

    单选题
    What SNMP message alerts the manager to a condition on the network?()
    A

    response

    B

    trap

    C

    cet

    D

    capture


    正确答案: B
    解析: 暂无解析

  • 第9题:

    单选题
    ou have a server that runs Windows Server 2003 Service Pack 2 (SP2).You need to view a list of current TCP/IP network connections. The list should refresh itself every 30 seconds.What should you do?()
    A

    From the System Monitor snap-in, click View Report. 

    B

    From the command prompt, run Netstat.exe 30. 

    C

    From the Performance Logs and Alerts snap-in, create a new counter log. 

    D

    From Task Manager, open the Network tab. Select Show Cumulative Data. 


    正确答案: B
    解析: 暂无解析

  • 第10题:

    单选题
    Which of the following would contain information regarding network device alerts using SNMP?()
    A

    Syslog

    B

    Audit log

    C

    History log

    D

    Ping sweep reports


    正确答案: D
    解析: 暂无解析

  • 第11题:

    单选题
    You are the administrator of your company’s network. Your network has 200 Windows 2000 Professional computers and 15 Windows 2000 Server computers. Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled.   A user named John leaves the company. You move all of the files from John’s home folder to his manager’s folder. When the manager attempts to open any of the files, she receives the following error message. “Access denied.”   You want the manager to be able to access the files. What should you do?()
    A

    Grant the manager NTFS Full Control permission to the files.

    B

    Grant the manager NTFS Take Ownership permission to the files.

    C

    Log on to the network as a recovery Agent.  Decrypt the files for the manager.

    D

    Log on to the network as a member of the Backup Operators group. Decrypt the files for the manager.


    正确答案: A
    解析: 暂无解析

  • 第12题:

    单选题
    You are the network administrator for your company. The network contains an application server running Windows Server 2003.   Users report that the application server intermittently responds slowly. When the application server is responding slowly, requests that normally take 1 second to complete take more than 30 seconds to complete. You suspect that the slow server response is because of high broadcast traffic on the network.   You need to plan how to monitor the application server and to have a message generated when broadcast traffic is high. You also want to minimize the creation of false alarms when nonbroadcast traffic is high.   What should you do?  ()
    A

     Use the Alerts option in the Performance Logs and Alerts snap-in to configure an alert to trigger when the Datagrams/sec counter in the UDPv4 object is high.

    B

     Use System Monitor and configure it to monitor the Segments/sec counter in the TCPv4 object.  

    C

     Use System Monitor and configure it to monitor the Datagrams/sec counter in the UDPv4 object.

    D

     Use the Alerts option in the Performance Logs and Alerts snap-in to configure an alert to trigger when the Datagrams/sec counter in the TCPv4 object is high.


    正确答案: D
    解析: 暂无解析

  • 第13题:

    You are a network administrator for Ezonexam.com's Windows 2000 network.

    Your network has 200 Windows 2000 Professional computers and 15 Windows 2000 Server computers.

    Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled. A user named Jack Bauer leaves the company. You grant her manager the Full Control NTFS permission to Jack's home folder. When the manager attempts to open any of the files, she receives the following error message: "Access is denied."

    What should you do?

    A.Use System File Checker (SFC) to decrypt the file.

    B.Log on the network as the Recovery Agent. Decrypt the files for the manager.

    C.Log on the network as the administrator. Use the cipher command to decrypt the files.

    D.Log on the network as a member of the Backup Operators group. Decrypt the files for the manager.


    正确答案:B
    解析:Explanation: A user has asked for EFS to be configured on his or her Windows 2000 Professional computer. You need to enable the Recovery Agent on the computer to be able to unencrypt files if the user's private key has been deleted. In this case Jack left the company and his manager needs access to the files. Even with Full Control NTFS permissions she could not get access, thus you need to make use of the recovery agent to decrypt the files for the manager. Remember that the user who encrypts a file is the only user who can access the file (except for the recovery agent).

    Incorrect answers:
    A: System file checker (sfc.exe) is a command-line utility that scans and verifies the versions of all protected system files. System file checker (sfc.exe) will discover that a protected file has been overwritten and replace it with the correct version of the file from the %systemroot%\system32\dllcache folder. This is not going to grant the manager access to the files in this case.

    C: The Cipher utility allows you to encrypt files and folders as well as check the encryption statistics. But this is not what should be used in this scenario.

    D: Membership in the Backup Operators group enables a user to back up and restore file systems regardless of permissions, ownership, encryption settings, or audit settings. Membership in this group enables you to assign users the authority to back up file systems without having to assign the users specific permissions to access the resources. However, this is not what is required here.

  • 第14题:

    What is the alert message generated by SNMP agents called ? ()

    A.trap

    B.inform

    C.get

    D.set


    参考答案:A, B

  • 第15题:

    Simple Network Management Protocol (SNMP) is an Internet Standard protocol for collecting and organizing information about managed devices on IP networks and for modifying that information to change device(). SNMP is a component of the Internet Protocol Suiteas defined by the Internet( )Task Force. SNMP operates in the( )layer of the Internet protocol suite. All SNMP messages are transported via User(请作答此空)Protocol. An SNMP-managed network consists of three key components: a) Managed devices, b) ( )(i.e.,software which runs on managed devices), and c) Network management station (NMS) (i.e., software which runs on the manager).

    A.Datum
    B.Datagram
    C.DatA.Packet
    D.DatA.Message

    答案:B
    解析:
    简单英语阅读题。

  • 第16题:

    What are three factors a network administrator must consider before implementing Netflow in the network?()

    • A、CPU utilization
    • B、where Netflow data will be sent
    • C、number of devices exporting Netflow data
    • D、port availability
    • E、SNMP version
    • F、WAN encapsulation

    正确答案:A,B,C

  • 第17题:

    What is the alert message generated by SNMP agents called ? ()

    • A、trap
    • B、inform
    • C、get
    • D、set

    正确答案:A,B

  • 第18题:

    While executing a Cluster Test Plan, the administrators realize that they will need to email the  Operations and network on-call staff in the event of a network outage.  What can be done to alert the on-call staff of network failures?()   

    • A、 Customize clstat to send a mail message.
    • B、 Customize an Event Notification method.
    • C、 Customize an Error Notification method.
    • D、 Customize clinfo to send an SNMP trap.

    正确答案:B

  • 第19题:

    You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain.   You administer a Network Load Balancing cluster that consists of three nodes. Each node runs Windows Server 2003 and contains a single network adapter. The Network Load Balancing cluster can run only in unicast mode. The Network Load Balancing cluster has converged successfully.   To increase the utilization of the cluster, you decide to move a particular application to each node of the cluster. For this application to run, you must add a Network Load Balancing port rule to the nodes of the cluster.   You start Network Load Balancing Manager on the second node of the cluster. However, Network Load Balancing Manager displays a message that it cannot communicate with the other two nodes of the cluster.  You want to add the port rule to the nodes of the cluster.   What should you do?  ()

    • A、 Use Network Load Balancing Manager on the Network Load Balancing default host to add the port rule.
    • B、 Change the host priority of the second node to be the highest in the cluster, and then use Network Load Balancing Manager to add the port rule.
    • C、 Run the nlb.exe drain command on each node, and then use Network Load Balancing Manager to add the port rule.
    • D、 Add the port rule through Network Connections Properties on each node.

    正确答案:D

  • 第20题:

    单选题
    While executing a Cluster Test Plan, the administrators realize that they will need to email the  Operations and network on-call staff in the event of a network outage.  What can be done to alert the on-call staff of network failures?()
    A

     Customize clstat to send a mail message.

    B

     Customize an Event Notification method.

    C

     Customize an Error Notification method.

    D

     Customize clinfo to send an SNMP trap.


    正确答案: D
    解析: 暂无解析

  • 第21题:

    多选题
    You are the network administrator for ExamSheet.net. Your network has 210 Windows 2000 Professional computers and eleven Windows 2000 Server computers. Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled. A user named Sandra leaves ExamSheet.net. You decrypt the files for her manager. When the manager attempts to open any of the files, he receives the following error message: "Access is denied." You want the manager to be able to access the files.  What should do? ()
    A

    Move the files from Sandra’s folder to the manager’s folder.

    B

    Grant the manager NTFSFull Controlpermission to the files.

    C

    Run theciphercommand to create a new file encryption key for the manager.

    D

    Run theciphercommand to generate an EFS recovery agent key and certificate.

    E

    Grant the manager NTFSList Folder Contentspermissions to the folder containing Sandra’s files.


    正确答案: A,B
    解析: 暂无解析

  • 第22题:

    多选题
    A network administrator enters the following command on a router: logging trap 3. What are three message types that will be sent to the Syslog server? ()
    A

    informational

    B

    emergency

    C

    warning

    D

    critical 

    E

    debug

    F

    error


    正确答案: A,B
    解析: 暂无解析

  • 第23题:

    单选题
    Your network has 200 Windows 2000 Professional computers and 15 Windows 2000 Server computers. Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled. A user named Tess King leaves the company. You grant her manager the Full Control NTFS permission to Tess's home folder. When the manager attempts to open any of the files, she receives the follo wing error message: "Access is denied." What should you do?()
    A

    Use System File Checker (SFC) to decrypt the file.

    B

    Log on the network as the Recovery Agent. Decrypt the files for the manager.

    C

    Log on the network as the administrator. Use theciphercommand to decrypt the files.

    D

    Log on the network as a member of the Backup Operators group. Decrypt the files for the manager.


    正确答案: C
    解析: 暂无解析