网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
多选题
A customer would like to monitor traffic that is being sent to a specific virtual machine named VM001 using SPAN. The customer has another virtual machine configured as a sniffer host called VM002. What configuration is required, and what other changes will need to be made? () VSM-PRI-188# sh int vethernet 5 Vethernet5 is up Port description is VM001, Network Adapter 2 HardwarE. Virtual, address: 0050.56b0.001e (bia 0050.56b0.001e) Owner is VM "VM001", adapter is Network Adapter 2 Active on module 5 VMware DVS port 484 Port-Profile is VM-vlan-10 Port mode is access VSM-PRI-188# sh int vethernet 6 Vethernet6 is up Port description is VM002, Network Adapter 1 HardwarE. Virtual, address: 0050.56b0.0020 (bia 0050.56b0.0020) Owner is VM "VM002", adapter is Network Adapter 1 Active on module 5 VMware DVS port 485 Port-Profile is VM-vlan-10 Port mode is access
A
Monitor session 1 type span Source interface veth5 both Destination interface veth6 No shut
B
monitor session 1 source vlan 10 destination interface veth6 no shut
C
monitor session 1 type er-span source interface vlan 10 destination ip 10.1.1.10 no shut
D
VM002 must be removed from the Nk1V
E
Move VM002 to Module 5
F
Restart the VEM on module 5
参考答案
参考解析
解析:
暂无解析
更多 “多选题A customer would like to monitor traffic that is being sent to a specific virtual machine named VM001 using SPAN. The customer has another virtual machine configured as a sniffer host called VM002. What configuration is required, and what other changes will need to be made? () VSM-PRI-188# sh int vethernet 5 Vethernet5 is up Port description is VM001, Network Adapter 2 HardwarE. Virtual, address: 0050.56b0.001e (bia 0050.56b0.001e) Owner is VM "VM001", adapter is Network Adapter 2 Active on module 5 VMware DVS port 484 Port-Profile is VM-vlan-10 Port mode is access VSM-PRI-188# sh int vethernet 6 Vethernet6 is up Port description is VM002, Network Adapter 1 HardwarE. Virtual, address: 0050.56b0.0020 (bia 0050.56b0.0020) Owner is VM "VM002", adapter is Network Adapter 1 Active on module 5 VMware DVS port 485 Port-Profile is VM-vlan-10 Port mode is accessAMonitor session 1 type span Source interface veth5 both Destination interface veth6 No shutBmonitor session 1 source vlan 10 destination interface veth6 no shutCmonitor session 1 type er-span source interface vlan 10 destination ip 10.1.1.10 no shutDVM002 must be removed from the Nk1VEMove VM002 to Module 5FRestart the VEM on module 5” 相关考题
考题
Your hair needs ____; would you like me ____ it for you?
A.cutting...doingB.to cut...doingC.to be cut...to doD.being cut...to do
考题
As the brochures you sent us were() damaged in the mail, we would like you to mail us some more.A、badB、hardlyC、veryD、severely
考题
Which command would you use to view interface usage details in real time?()
A. show interfaces terseB. show interfaces extensiveC. monitor interface trafficD. monitor traffic interface
考题
The network administrator would like to generate synthetic traffic using the Service Assurance Agent contained in Cisco IOS. Which CiscoWorks network management application will be used to report the latency and availability for configured traffic operations on an end-to-end and hop-byhop (router-to-router) basis?()A. nGenius Real-Time MonitorB. CiscoViewC. Device Fault ManagerD. Internetwork Performance Monitor
考题
A customer would like to monitor traffic that is being sent to a specific virtual machine named VM001 using SPAN. The customer has another virtual machine configured as a sniffer host called VM002. What configuration is required, and what other changes will need to be made? () VSM-PRI-188# sh int vethernet 5 Vethernet5 is up Port description is VM001, Network Adapter 2 HardwarE. Virtual, address: 0050.56b0.001e (bia 0050.56b0.001e) Owner is VM "VM001", adapter is Network Adapter 2 Active on module 5 VMware DVS port 484 Port-Profile is VM-vlan-10 Port mode is access VSM-PRI-188# sh int vethernet 6 Vethernet6 is up Port description is VM002, Network Adapter 1 HardwarE. Virtual, address: 0050.56b0.0020 (bia 0050.56b0.0020) Owner is VM "VM002", adapter is Network Adapter 1 Active on module 5 VMware DVS port 485 Port-Profile is VM-vlan-10 Port mode is access A、 Monitor session 1 type span Source interface veth5 both Destination interface veth6 No shutB、 monitor session 1 source vlan 10 destination interface veth6 no shutC、 monitor session 1 type er-span source interface vlan 10 destination ip 10.1.1.10 no shutD、 VM002 must be removed from the Nk1VE、 Move VM002 to Module 5F、 Restart the VEM on module 5
考题
A company would like to create and maintain a web presence by operating a web server and anFTP server for users to upload and download job specifications. Which of the following Internetconnection types would be BEST suited for this type of traffic?()A、SatelliteB、FiberC、4G mobile hotspotD、DSL
考题
Which statement is true about the data traffic between the access point named TKAP1 and controller TKC1?()A、 The data traffic between the access point and controller is not encrypted.B、 The data traffic is encapsulated with LWAPP.C、 The data traffic is switched at the access point before being sent to the WLAN controller where VLAN tagging and QoS are applied.D、 The data traffic is encrypted with AES.E、 All of the above
考题
An administrator would like to know the name of the workstation that is being repaired. Which ofthe following commands, without parameters, will provide this information?()A、HostnameB、IpconfigC、NetstatD、Ping
考题
Company.com would like to share CPU resources between AIX V5.3 and Linux partitions. Which solution would best satisfy this customer requirement?()A、Micro-PartitioningB、Partition Load ManagerC、eWLMD、Grid Toolbox
考题
A customer would like to share the processor resources automatically between logical partitions. Which of the following would accomplish this requirement without user interaction? ()A、 Dynamic LPARsB、 On/Off Capacity on DemandC、 Uncapped Micro-PartitioningD、 Enterprise Workload Manager
考题
A customer has two locations that host their pSeries servers. Traffic is being routed through the public Internet. The customer needs to exchange confidential financial data between the servers. Which of the following solutions should the pSeries technical specialist propose to the customer to secure the data?()A、A DCE domainB、A Kerberos domainC、A PPP tunnel between the serversD、An IPSEC tunnel between the servers
考题
A system without a monitor has crashed. The administrator would like to see the console output to determine a possible cause of the crash and ensure that there were no problems on reboot. Which command would be used?()A、alogB、swconsC、lsconsD、syslog
考题
Which command would you use to view interface usage details in real time?()A、show interfaces terseB、show interfaces extensiveC、monitor interface trafficD、monitor traffic interface
考题
You work as a database administrator for Supportcenter.cn. You suspect that in one of your applications the customer table is being accessed by some unauthorized users. Which option would you use to monitor the queries being executed on the customer table?()A、Monitor thealert.logfileB、Enable server-side SQL tracing for user sessionsC、Enable fine-grained auditing for the customer tableD、Enable Fine-Grained Access Control (FGAC) for the customer tableE、Write a database trigger on the customer table on the SELECT event
考题
单选题A customer would like to share the processor resources automatically between logical partitions. Which of the following would accomplish this requirement without user interaction? ()A
Dynamic LPARsB
On/Off Capacity on DemandC
Uncapped Micro-PartitioningD
Enterprise Workload Manager
考题
单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains Windows Server 2003 computers and Windows XP Professional computers. You configure a server named Server1 to be a file server. The written company security policy states that you must analyze network traffic that is sent to and from all file servers.You need to capture file-transfer network traffic that is being sent to and from Server1. You install Network Monitor Tools from a Windows Server 2003 product CD-ROM on a server named Server2, which is on the same network segment as Server1.You run Network Monitor on Server2. However, Network Monitor captures only network traffic that is sent to and from Server2. You need to capture all network traffic that is sent to and from Server1. What should you do?()A
Install the Network Monitor driver on Server1. Run Network Monitor on Server2 to capture network traffic.B
Open Network Monitor on Server2 and create a capture filter to enable the capture of all protocols. Run Network Monitor to capture network traffic.C
Install Network Monitor Tools on Server1. Run Network Monitor to capture network traffic.D
Open Network Monitor on Server2 and increase the capture buffer from 1 MB to 20 MB in size. Run Network Monitor to capture network traffic.
考题
单选题A storage specialist is assessing a customer’s tape backup environment. Which of the following questions would be the most appropriate question to identify the customer’s environment?()A
Has there been any recent loss of data?B
How many tape drives are in the Library?C
What tape technology is currently being used?D
What software is being used for restoring the data?
考题
单选题A customer has two locations that host their pSeries servers. Traffic is being routed through the public Internet. The customer needs to exchange confidential financial data between the servers. Which of the following solutions should the pSeries technical specialist propose to the customer to secure the data?()A
A DCE domainB
A Kerberos domainC
A PPP tunnel between the serversD
An IPSEC tunnel between the servers
考题
单选题A user would like to use an external monitor with their laptop, but when the monitor is plugged in and connected to the laptop, the screen does not display on the monitor. Which of the following is the BEST way to display an image on both the monitor and the laptop?()A
Change resolution on laptopB
Toggle FN key and external monitor keyC
Try a different monitor typeD
Try using a different monitor cable
考题
单选题The network administrator would like to generate synthetic traffic using the Service AssuranceAgent contained in Cisco IOS. Which CiscoWorks network management application will be used toreport the latency and availability for configured traffic operations on an end-to-end and hop-by-hop (router-to router) basis?()A
nGenius Real-Time MonitorB
CiscoViewC
Device Fault ManagerD
Internetwork Performance Monitor
考题
单选题The customer would like to replicate their data from site A to site B. This distance is approximately325 meters between the sites. The customer has a DS5000 with 6 DS EXP5000 expansionshelves that hold approximately 40 TB of data. Which method of replication would be supported?()A
HACMP-XDB
SnapMirrorC
SyncMirrorD
Enhanced Remote Mirroring
考题
单选题Upon announcement,the specific details surrounding the Virtual I/O Server requirements and performance are still being defined. The customer has engaged IBM to provide a server consolidation solution and would like to take advantage of the VIO Server benefits. How should the pSeries technical specialist best address this?()A
Design the solution and present it confidently so the customer does not question it.B
Design the solution and ensure the customer understands the unknowns with the new technology.C
Explain to the customer that the VIO Server does not benefit them when doing server consolidation so it has not been configured.D
Explain to the customer that the details surrounding the VIO Server have not been clearly defined so designing a solution is premature.
考题
单选题You are responsible for network monitoring and need to monitor traffic over a routed network from a remote source to an IDS or IPS located in the headquarters site. What would you use in order to accomplish this?()A
VACLs and VSPANB
RSPANC
ERSPAND
NetFlow
考题
单选题You work as a database administrator for Supportcenter.cn. You suspect that in one of your applications the customer table is being accessed by some unauthorized users. Which option would you use to monitor the queries being executed on the customer table?()A
Monitor thealert.logfileB
Enable server-side SQL tracing for user sessionsC
Enable fine-grained auditing for the customer tableD
Enable Fine-Grained Access Control (FGAC) for the customer tableE
Write a database trigger on the customer table on the SELECT event
考题
单选题The network administrator would like to generate synthetic traffic using the Service Assurance Agent contained in Cisco IOS. Which CiscoWorks network management application will be used to report the latency and availability for configured traffic operations on an end-to-end and hop-byhop (router-to-router) basis?()A
nGenius Real-Time MonitorB
CiscoViewC
Device Fault ManagerD
Internetwork Performance Monitor
考题
单选题A customer would like to have the ability to permanently activate processor and memory resources as their workload increases. Which of the following supports the customer requirement?()A
Reserve Capacity on DemandB
Utility Capacity on DemandC
Capacity Upgrade on DemandD
Uncapped Capacity on Demand
考题
单选题Customer: I think I’ll have the tomato soup to start._____ Waiter: Right. And would you like croutons in your soup? Customer: No, thank you. Waiter: How would you like your steak? Rare, medium or well done?A
And I’d like some teaB
And I’d also like a steak.C
And perhaps some orange juice. D
And I’d like to order now.
考题
单选题Which statement is true about the data traffic between the access point named TKAP1 and controller TKC1?()A
The data traffic between the access point and controller is not encrypted.B
The data traffic is encapsulated with LWAPP.C
The data traffic is switched at the access point before being sent to the WLAN controller where VLAN tagging and QoS are applied.D
The data traffic is encrypted with AES.E
All of the above
热门标签
最新试卷