The network administrator would like to generate synthetic traffic using the Service Assurance Agent contained in Cisco IOS. Which CiscoWorks network management application will be used to report the latency and availability for configured traffic operati

题目

The network administrator would like to generate synthetic traffic using the Service Assurance Agent contained in Cisco IOS. Which CiscoWorks network management application will be used to report the latency and availability for configured traffic operations on an end-to-end and hop-byhop (router-to-router) basis?()

A. nGenius Real-Time Monitor

B. CiscoView

C. Device Fault Manager

D. Internetwork Performance Monitor


相似考题
更多“The network administrator would like to generate synthetic traffic using the Service Assur ”相关问题
  • 第1题:

    What can a network administrator utilize by using PPP Layer 2 encapsulation (Choose three.) ()。

    A.VLAN support

    B.compression

    C.authentication

    D.sliding windows

    E.multilink support

    F.quality of service


    参考答案:B, C, E

  • 第2题:

    What are two reasons that a network administrator would use access lists (Choose two.)()。

    • A、to control vty access into a router
    • B、to control broadcast traffic through a router
    • C、to filter traffic as it passes through a router
    • D、to filter traffic that originates from the router
    • E、to replace passwords as a line of defense against security incursions

    正确答案:A,C

  • 第3题:

    Which two statements describe the functions and operations of IDS and IPS systems?()

    • A、A network administrator entering a wrong password would generate a true-negative alarm.
    • B、A false positive alarm is generated when an IDS/IPS signature is correctly identified.
    • C、An IDS is significantly more advanced over IPS because of its ability to prevent network attacks.
    • D、Cisco IDS works inline and stops attacks before they enter the network.
    • E、Cisco IPS taps the network traffic and responds after an attack.
    • F、Profile-based intrusion detection is also known as "anomaly detection".

    正确答案:B,F

  • 第4题:

    What can a network administrator utilize by using PPP Layer 2 encapsulation (Choose three.) ()。

    • A、VLAN support
    • B、compression
    • C、authentication
    • D、sliding windows
    • E、multilink support
    • F、quality of service

    正确答案:B,C,E

  • 第5题:

    An administrator is logged into a remote server using an Xwindows client and wants to use smit. The bandwidth for the remote connection is minimal, so the administrator would like to disable the graphical version of smit to speed up display updates. Which command will start smit in the non-graphical mode?()

    • A、smit
    • B、msmit
    • C、smit -C
    • D、smit_tty

    正确答案:C

  • 第6题:

    You are the administrator of a Windows 2000 Professional network that has 1500 Windows 2000 Professional computers. Microsoft Office 2000 was installed to all the computers over the network by using Group Policy Object. You deploy an Office 2000 service release to all the Windows 2000 Professional computers on the network. The service release in addition to other software that had been assigned fails to install on only one of the computer. What should you do?()

    • A、Re-deploy the service release by using a .ZAP file. 
    • B、Re-deploy the service release by using a .MST file. 
    • C、Restart windows installer on the domain controller. 
    • D、Restart windows installer on the computer that failed to install the service release. 
    • E、Restart Windows installer and use an .MSP file. 

    正确答案:D

  • 第7题:

    多选题
    What can a network administrator utilize by using PPP Layer 2 encapsulation? (Choose three.)()
    A

    VLAN support

    B

    compression

    C

    authentication

    D

    sliding windows

    E

    multilink support

    F

    quality of service


    正确答案: C,A
    解析: 暂无解析

  • 第8题:

    单选题
    A network administrator wants to permit Telnet traffic initiated from the address book entry the10net in azone called UNTRUST to the address book entry Server in a zone called TRUST.However, the administrator does not want the server to be able to initiate any type of traffic from the TRUSTzone to the UNTRUST zone. Which configuration would correctly accomplish this task?()
    A

    A

    B

    B

    C

    C

    D

    D


    正确答案: B
    解析: 暂无解析

  • 第9题:

    单选题
    Using network monitoring tools would allow an administrator to do which of the following?()
    A

    Configure offline devices

    B

    Examine performance issues

    C

    Install additional software and updates

    D

    View syslog events


    正确答案: B
    解析: 暂无解析

  • 第10题:

    单选题
    You are a network administrator and you need to implement a routing protocol on your network that provides: * Scalability * VLSM support * Minimal overhead * Support for connecting networks using routers of multiple vendors Which of the following routing protocol would best serve your needs?()
    A

    VTP

    B

    RIP version 1

    C

    EIGRP

    D

    OSPF

    E

    IGRP

    F

    CDP


    正确答案: C
    解析: 暂无解析

  • 第11题:

    单选题
    You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. The network contains a Web server that runs IIS 6.0 and hosts a secure intranet site. All users are required to connect to the intranet site by authenticating and using HTTPS. However, because an automated Web application must connect to the Web site by using HTTP, you cannot configure the intranet site to require HTTPS.  You need to collect information about which users are connecting to the Web site by using HTTPS.   What should you do?()
    A

    Check the application log on the Web server.

    B

    Use Network Monitor to capture network traffic on the Web server.

    C

    Review the log files created by IIS on the Web server.

    D

    Configure a performance log to capture all Web service counters. Review the performance log data.


    正确答案: D
    解析: 暂无解析

  • 第12题:

    What two steps need to be taken in deploying AutoQoS for enterprise on routers?()

    • A、provide visibility into the classes of service deployed using system logging and SNMP traps
    • B、determine WAN settings for fragmentation, compression, encapsulation, and Frame Relay-ATM interworking
    • C、enable the AutoQoS VoIP for voice traffic
    • D、generate and deploy MQC-based QoS policies
    • E、profile the traffic with Auto-Discovery

    正确答案:D,E

  • 第13题:

    You are a network administrator and you need to implement a routing protocol on your network that provides: * Scalability * VLSM support * Minimal overhead * Support for connecting networks using routers of multiple vendors Which of the following routing protocol would best serve your needs?()

    • A、VTP
    • B、RIP version 1
    • C、EIGRP
    • D、OSPF
    • E、IGRP
    • F、CDP

    正确答案:D

  • 第14题:

    What are two reasons that a network administrator would use access lists? (Choose two.) ()。

    • A、to control vty access into a router  
    • B、to control broadcast traffic through a router  
    • C、to filter traffic as it passes through a router  
    • D、to filter traffic that originates from the router  
    • E、to replace passwords as a line of defense against security incursions 

    正确答案:A,C

  • 第15题:

    An administrator is using a protocol analyzer to monitor traffic between two servers. However, the only traffic that appears is broadcast and traffic originating from the administrator's PC. Which of the following devices is the administrator plugged into? ()

    • A、Hub
    • B、Bridge
    • C、Switch
    • D、Router

    正确答案:C

  • 第16题:

    You are the administrator of a Windows 2000 network that has 1,500 Windows 2000 Professional computers. Microsoft Office 2000 was assigned to all the computers on the network by using a Group Policy object (GPO).  You deploy the Office 2000 service release to all the Windows 2000 Professional computers on the network. The service release, in addition to other software that had been assigned, fails to install on only one of the computers.   What should you do? ()

    • A、Redeploy the service release by using a .Zap file. 
    • B、Redeploy the service release by using a .mst file. 
    • C、Restart Windows installer on the domain controller. 
    • D、Restart Windows installer on the computer that failed to install the service release. 

    正确答案:D

  • 第17题:

    单选题
    A network administrator would like to view detailed interface status, properties, statistics, errors,and CoS packet counters.Which operational command will display this information?()
    A

    show interfaces extensive

    B

    show interfaces

    C

    show configuration interfaces

    D

    show interface status


    正确答案: C
    解析: 暂无解析

  • 第18题:

    多选题
    You work as a database administrator for Certkiller .com. You decided to manage client and server connections using Local Naming method in Certkiller .com. When you try to connect to the database you get the following error: ERROR:  ORA-12154:TNS:couldnot resolve service name  Which network configuration files would you look into to resolve this error?()
    A

    snmp.ora

    B

    names.ora

    C

    spfile.ora

    D

    sqlnet.ora

    E

    listener.ora

    F

    tnsnames.ora


    正确答案: E,A
    解析: 暂无解析

  • 第19题:

    单选题
    You are the administrator of a Windows 2000 network.  The network has 100 Windows 2000 Professional computers. A graphics application was assigned to all the computers on the network by using a Group Policy object (GPO).  You deploy a service release for the graphics application to all of the Windows 2000 Professional computers on the network. The service release, in addition to other software that had been assigned, fails to install on only one of the computers.   What should you do?()
    A

    Restart Windows Installer on the domain controller.

    B

    Restart Windows Installer on the computer that failed to install the service release.

    C

    Redeploy the service release by using an .mst file.

    D

    Redeploy the service release by using a .zap file.


    正确答案: D
    解析: 暂无解析

  • 第20题:

    单选题
    The network administrator would like to generate synthetic traffic using the Service AssuranceAgent contained in Cisco IOS. Which CiscoWorks network management application will be used toreport the latency and availability for configured traffic operations on an end-to-end and hop-by-hop (router-to router) basis?()
    A

     nGenius Real-Time Monitor

    B

     CiscoView

    C

     Device Fault Manager

    D

     Internetwork Performance Monitor


    正确答案: B
    解析: 暂无解析

  • 第21题:

    单选题
    The network administrator would like to generate synthetic traffic using the Service Assurance Agent contained in Cisco IOS. Which CiscoWorks network management application will be used to report the latency and availability for configured traffic operations on an end-to-end and hop-byhop (router-to-router) basis?()
    A

    nGenius Real-Time Monitor

    B

    CiscoView

    C

    Device Fault Manager

    D

    Internetwork Performance Monitor


    正确答案: A
    解析: 暂无解析

  • 第22题:

    单选题
    An administrator is setting up a network and would like to prevent users from having the ability to plug their PC into the network to receive an IP address. Which of the following addressing schemes should the technician use?()
    A

    NAT

    B

    Dynamic

    C

    Subnetting

    D

    Static


    正确答案: D
    解析: 暂无解析