單項選擇題What is the first step of the core baselining process? ()

A. Verify that the SNMP MIB is supported in the relevant core device.
B. Implement monitoring using SNMP or RMON.
C. Poll and record specific SNMP MIB objects from the device.
D. Implement threshold monitoring using RMON.


您可能感興趣的試卷

你可能感興趣的試題

1.多項選擇題Which three statements correctly describe the Cisco Validated Designs program? ()(Choose three.)

A. includes three design levels
B. incorporates products and technologies into enterprise, service provider, and commercial systems
C. extends the value of designs through a sustained development plan
D. does not factor customer input design process
E. facilitates faster and more reliable customer deployments
F. incorporates a narrow range of technologies and products

2.單項選擇題Which description best characterizes the Cisco mobility solution?()

A. provides high-level integrated security from the wireless access point to the client and automatically encrypts voice and data in transit
B. authenticates users and devices so that it is impossible for a rogue device to be connected to the network
C. allows you to centralize management, automate repetitive tasks, and provision IP services easily
D. centralizes your infrastructure and allows you to share resources more effectively by combining separate data centers into an interconnected SAN

3.單項選擇題Which Cisco solution was developed to let you create separate networks on one SAN; thus providingyou with improved availability, security, and backup? ()

A. Cisco Direct Attached Storage
B. Cisco Direct Storage Area Network
C. Cisco Virtual Storage Area Network
D. Cisco Virtual Attached Storage Network

4.多項選擇題What are the three specific characteristics of the Cisco SAN solution for the data center? ()(Choosethree.)

A. It provides multiprotocol support.
B. It provides improved availability, strong security, and business continuance measures.
C. It enables you to connect Cisco VSAN technology and DAS technology.
D. It reduces cost and complexity by providing an easy transition to evolving technologies.
E. It allows you to create separate networks on the VSAN.
F. It allows you to migrate to new technologies without a complete equipment upgrade.

5.單項選擇題What is the result when all Cisco Enterprise Campus Architecture components are designed withinteroperability in mind? ()

A. high availability
B. strengthened security
C. improved connectivity options
D. continuity of service

7.多項選擇題Which two benefits are provided when Cisco enterprise solutions are employed across all places in thenetwork?()

A. regular upgrade process
B. multivendor support
C. cost savings
D. product variety
E. well-tested interoperability

8.多項選擇題What are two outcomes of deploying virtual SANs? ()(Choose two.)

A. increased administration
B. improved availability
C. reduced backup
D. increased security
E. greater storage demand

9.單項選擇題Which term represents the mode that is used when the router stores log messages in RAM memory?()

A. syslog logging
B. terminal logging
C. buffered logging
D. console logging

10.多項選擇題What are the three main parts of a syslog message? ()(Choose three.)

A. severity level
B. facility
C. log message name
D. time stamp
E. error codes
F. access privilege

最新試題

Which keyword is used with the debug ipv6 [keyword] command to troubleshoot neighbor discovery problems?()

題型:單項選擇題

On the Catalyst 6500 Series switch, which command is used to establish a console connection to the Firewall Services Module?()

題型:單項選擇題

You are an experienced network administrator in an international corporation. One of your clients asks you to configure a network for a financial trading center which requires multiple high-value transactions.And the transactions are very important to the client. In such a situation, which two of the following are basic and most important requirements concerning the configuration? ()(Choose two.)

題型:多項選擇題

With a VPN Accelerator Module 2+ (VAM2+) installed in a Cisco 7200 series router, what will be the resulting action when entering the command no crypto engine accelerator slot number?()

題型:單項選擇題

Which command is used to view IPv6 parameters related to the BGP process?()

題型:單項選擇題

In a high-availability network, which command, when placed on ports that have connected end stations, will allow you to prevent delays in service for end stations by placing a port in blocking mode?()

題型:單項選擇題

What are four advantages to using tunnel brokers in an IPv6 transition environment?()

題型:多項選擇題

Refer to the exhibit. Which two of these statements are correct? (Choose two.)()

題型:多項選擇題

Refer to the exhibit. Analyze the two traceroutes that are displayed. Which of these statements is correct in describing what most likely caused the traceroute differences?()

題型:單項選擇題

When a Cisco router is configured for SSH, it acts as an ()?

題型:單項選擇題