Ýêçàìåí Tivoli 892: IBM Tivoli NetView V7.1.4 ImplementationÐàçäåëû ýêçàìåíà:Ðàçäåë 1 - Planning and Installation
Ðàçäåë 2 - Configuration
Ðàçäåë 3 - Customization
Ðàçäåë 4 - Operations, Security, Performance and Troubleshooting
Ðàçäåë 5 - Automation and Integration
Ïîäãîòîâêà ê ýêçàìåíó:Î êóðñàõ ïî ïîäãîòîâêå ó ê ýòîìó ýêçàìåíó íà ñàéòå IBM:IBM IT Training. Ñàìîñòîÿòåëüíàÿïîäãîòîâêà: Self Study: IBM Tivoli NetView V7.1.4 Product Information and Related Links What is IBM Tivoli NetView V7.1.4? IBM Tivoli NetView V7.1.4 discovers TCP/IP networks, displays network topologies, correlates and manages events and SNMP traps, monitors network health, and gathers performance data. It meets the needs of managers of large networks by providing the scalability and flexibility to manage mission-critical environments. Ïðàêòè÷åñêèé òåñò Ïðèìå÷àíèå: Ýòîò òåñò ðàçðàáîòàí ñ öåëüþ äàòü êàíäèäàòó ïðåäñòàâëåíèå î ñîäåðæàíèè è ôîðìàòå âîïðîñîâ ñåðòèôèêàöèîííîãî ýêçàìåíà. Äàííûé òåñò íå ÿâëÿåòñÿ îöåíî÷íûì òåñòîì. Âûïîëíåíèå åãî íå ãàðàíòèðóåò âûïîëíåíèå ñåðòèôèêàöèîííîãî òåñòà. 1. Why is it important to verify that NetView IP ports do not conflict with existing port assignments before installation? A. NetView does not prompt the user before killing daemons running on its ports which may lead to data corruption in other applications. B. Post-installation configuration may fail, or NetView daemons may not be able to run after installation if there is a conflict. C. If port conflicts do occur, NetView must be uninstalled and the /usr/OV/conf/netview.ports file must be modified to remove any conflicts. 2. Which two requirements are considerations when choosing between the UNIX and Windows versions of NetView? (Choose two.) A. performing ruleset editing B. configuring Mid-Level Managers C. accessing with the NetView Web console D. using Location Sensitive Topology feature E. using SmartSets to define polling intervals 3. Which three statements describe the Tivoli NetView paging utility? (Choose three.) A. A modem is required. B. Skytel access is required. C. Digital and analog lines are supported. D. The nvpagerd daemon must be restarted after configuration files are changed. E. NetView paging can be used through an event correlation rule or from the command line. 4. Which statement describes trap functionality? A. You cannot filter out an event once it has been processed by the trapd daemon. B. The best way to filter out unwanted traps is to edit the file usr/OV/conf/trapd.conf. C. The trap is not available for display in an events display workspace if it has been customized to have the "log only" event category. D. The trap will not be received by the trapd daemon if it has been customized to have the "don't log or display" event category. 5. What can result from a failure to benchmark normal response times to status polls and subsequently setting timeouts too short? A. spurious node down traps and excessive ARP traffic B. excessive and unnecessary SNMP traffic C. ping responses overloading the NetView machine's mbufs D. netmon flooding the network with ICMP traffic 6. Which two statements describe status polling in a Tivoli NetView environment? (Choose two.) A. An MLM cannot report status information to multiple NetView managers. B. If a given node appears in 2 different aliases, and 2 different polling intervals are set, the shorter interval takes precedence. C. If an MLM goes down, NetView automatically resumes status polling for the nodes the MLM is supposed to manage. D. If NetView goes down, then the nearest MLM automatically takes over status polling for the nodes that NetView is supposed to manage. 7. What are three primary functions provided by the NetView web console? (Choose three.) A. diagnostics B. java-based read-write maps C. map snapshots D. event snapshots E. status and topology views F. dynamic event displays 8. Which daemon executes commands that have been entered through the Trap Customization dialog for traps? A. trapd B. mgragentd C. ovactiond D. actionsvr 9. Which techniques can be used to include or exclude nodes during the discovery process? (Choose three.) A. checking hostname against a wildcard B. checking subnet mask against a wildcard C. checking SNMP sysObjectID against a wildcard D. checking IP address against a value, or wildcard, or range 10. What is NOT permitted by the MIB application builder? A. specifying the output display type for a MIB variable using mib.coerce B. creating help text for the generated application C. selecting labels for displaying specific MIB variables D. specifying the menu location used to access the generated application 11. Which file must be modified in order for NetView to map a node with a given SNMP sysObjectID to a specific symbol? A. oid_to_type B. if_to_sym C. oid_to_sym D. If_to_type 12. What is a valid general guideline to follow when cutting, pasting, and moving map symbols? A. Do not move symbols that are controlled by the ipmap application. B. Use the graphical interface to ensure moves between incompatible submaps do not occur. C. Symbols in the application plane of a submap should be in the application plane of the new submap after the move. D. IP network symbols (network class) and gateway symbols (connector class) should never be moved. 13. What is a characteristic of an unformatted trap in a Tivoli NetView environment? A. The trap will not be logged in the trapd daemon's log. B. The trap comes from an OID for which NetView has no MIB loaded. C. No filter in the Events Display workspace is active to include this trap. D. No specific trap information for the enterprise ID concerned has been loaded into /usr/OV/conf/C/trapd.conf. 14. Which command checks the state of NetView daemons? A. nvstatus B. ovstatus C. /usr/OV/service/dstatus D. lsdaemons -status 15. Which command begins configuring NetView security for the first time? A. nvauth B. nvsec_admin C. nvsecd D. xnmsecure 16. Why should MIBs for a device be loaded into NetView? A. If they are not loaded, SNMP access to the device is not available. B. If they are not loaded, enterprise-specific MIBs on the device cannot be browsed with the MIB browser./li> C. NetView can only discover devices and create correct symbols for devices for which MIBs have been loaded. 17. Which command assists in loading trap information from a MIB into NetView? A. loadmibtraps B. trapload C. mib2trap D. mibaddtrap 18. Which action is typically performed using the Agent Policy Manager? A. configuring SNMP agents B. configuring Mid-Level Managers C. limiting database size D. customizing mgragentd 19. Which NetView daemon is responsible for forwarding events to TEC? A. ovactiond B. nvcorrd C. actionsvr D. nvserverd 20. Which directory is least likely to contain files installed by a third party application? A. /usr/OV/registration/C B. /usr/OV/snmp_mibs C. /usr/OV/bitmaps/C D. /usr/OV/conf/registration 21. Which scenario gives better performance in an environment where multiple users are using nvevents? A. using NetView filters B. using SmartSets for event filtering C. using the freeze button D. defining as many log-only traps as possible Answer key: 1. B 2. AB 3. ADE 4. C 5. A 6. BC 7. AEF 8. C 9. ACD 10. ABD 11. C 12. C 13. D 14. B 15. B 16. B 17. C 18. B 19. D 20. D 21. D |