Which two management protocols should you use
to measure the effectiveness of your QoS implementation? (Choose two.)
A. Syslog
B. SNMP
C. NetFlow
D. WMI
E. SSHv2
Answer: BC
Which management protocol should you use to
analyze network traffic in and out of a router interface?
A. WMI
B. Syslog
C. IP service level agreement (SLA)
D. sFlow
Answer: D
Users are complaining that a network
connection is slow.
How should SNMP be used to verify performance
of the interface?
A. verify
bandwidth usage via ifInOctets
B. verify status via the ifTable
C. verify that SNMP agent is responding
D. verify the performance via ifSpeed
Answer: A
Orion NPM is monitoring the performance of
DS-3 utilizing standard MIBs in the ifTable. Occasionally, the reported traffic
rates for this interface spike well above45 Mbps.
What is the most likely cause?
A. heavy network traffic
B. carrier mis configuration
C. counter
rollovers
D. database issues
Answer: C
Orion
NPM is using SNMP to poll a router and track interface traffic rates. The data
are collected every
5 minutes, and the most recent values
collected for a specific interface are 1,000,000 and 2,000,000 octets.
What is the approximate average rate of
traffic for this interface?
A. 1 Kbps
B. 3 Kbps
C. 16 Kbps
D. 26 Kbps
Answer: D
When using a network management system (NMS)
to monitor network interfaces on a router, you notice that statistics are wrong
after an interface card is physically removed from the device.
What has most likely caused this problem?
A. interface
re-indexing
B. device configuration
C. counter rollovers
D. access lists
Answer: A
Which two reporting requirements should you
consider when specifying data roll-up settings for a network management system
(NMS)? (Choose two.)
A. data encryption
B. data format
C. data
granularity
D. monitoring coverage
E. data
retention
Answer: CE
Which advantage do SNMP traps and Syslog have
over SNMP polling?
A. reliability of event detection
B. ability to poll events in real-time
C. ease of configuration
D. speed of
event detection
Answer: D
How can you use a network management system
(NMS)to ensure service level agreement (SLA) parameters are realistic for your
environment?
A. increase data collection period
B. configuredata summarization
C. reducedata retention period
D. baseline network performance
Answer: D
Your service level agreement (SLA) dictates
that you must be able to notify the appropriate parties
When systems are down for over2 minutes and
report on data for the last 120 days .Your network management system (NMS) has
been configured to collect status every 10minutes and summarize and retain data
for 90 days.
Which two settings should you change in the
NMS to meet the business requirements? (Choose two.)
A. increase
data retention to 120 days
B. configure status polling to occur every5
minutes
C. summarize hourly data into weekly data
every 120 days
D. configure
status polling to occur every minute
E. summarize hourly data into weekly data
every 90 days
Answer: AD
What should you do to track whether a new
configuration has alleviated slow network performance?
A. compare ICMP availability before and after
the change
B. compare
application responsiveness before and after the change
C. monitor the affected devices for stability
D. monitor bandwidth utilization on affected
interfaces
Answer: B
The IT budgeting department has asked you for
reports that will help them better plan for increases in monthly recurring
costs. Which report should you set up to help the IT budgeting department meet
this objective?
A. router inventory
B. WAN
interface utilization
C. LAN interface utilization
D. available switch ports
Answer: B
IT management wants to know how they can
lower their total power consumption by consolidating equipment and shutting off
unnecessary equipment.
Which type of report can you create to help
them plan for this?
A. bandwidth utilization
B. available
switch ports
C. router CPU utilization
D. total NetFlow endpoints
Answer: B
The IT planning department has asked for a
report to help them understand when they need to implement IPv6.
Which report would offer them the greatest
amount of relevant information?
A. unique Net Flow exporters
B. DHCP server CPU utilization
C. number of subnets
D. IP
address utilization trends
Answer: D
You are planning a network management
implementation where the network has several low bandwidth
WAN links.
Which two network management protocols are
most likely to cause heavy traffic on WANs and should therefore be considered
carefully before deployment? (Choose two.)
A. Syslog
B. SSH
C. SMTP
D. NetFlow
E. ICMP
Answer: AD
Which two sources provide detailed visibility
into router interface traffic? (Choose two.)
A. SNMP
statistics
B. SNMP traps
C. NetFlow
D. Syslog
E. CDP
Answer: AC
A network engineer is planning to deploy a
network management system (NMS) to monitor a network.
Which two UDP ports should be enabled in
router access control lists and firewalls so the NMS can effectively monitor
devices? (Choose two.)
A. 160
B. 161
C. 162
D. 163
E. 164
Answer: BC
A network engineer has been asked to monitor
1.an Object Identifier (OID) using a custom poller. The custom poller does not
seem to be working, so the engineer takes a packet capture from the router in
question. To best filter the capture data and determine if the router is sending
information about that OID, what would the engineer filter on?
(A) Destination IP address of the network management
system (NMS) and port 162
(B) Destination IP address of the router and port
161
(C) Destination
IP address of the network management system (NMS) and port 161
(D) Destination IP address of the router and port
162
When is NetFlow data exported from a router to
a NetFlow collector?
(A) When the router is queried by the NetFlow
collector
(B) Whenever the router configuration is changed
(C) When ten or more conversations have started
(D) When
a TCP conversation is finished
While attempting to monitor a Windows 2003 Server
using WMI, a network management system is unable to pull the requested values from
the server. Packet traces reveal that the requests are making it to and from
the server.
What is the most likely cause of the problem?
(A) Firewall rules
(B) Windows updates
(C) WMI versioning
(D) Windows
permissions
Your network management system (NMS) leverages
WMI to query Windows servers for status. Each of the servers is a part of the
same Active Directory domain and utilizes the same credentials for login and
authorization. Overnight, one of the server’s stops responding to queries from
the NMS. A quick check reveals that the server is otherwise running normally.
What should you check or verify next?
(A) The SNMP service is running on the
server.
(B) The server has all available Windows updates
installed.
(C) The WMI
service is running on the server.
(D) The WMI user has read permissions allowed.
A managed service provider (MSP) is planning to
deploy a network management system
(NMS) to monitor multiple customer networks. The
MSP must choose between a centralized or distributed management architecture.
What are the two most important factors to consider? (Choose two.)
(A) Available
bandwidth between the MSP and customers
(B) Total number of devices to be managed
(C) Choice of SNMP version for polling
(D) Overlapping
IP address space between customers
(E) Choice of SSL versus VPN tunnel for Communication
A switch has started to show recent CPU
spikes and buffer misses. No users have complained.
You are able to telnet to the device, but the
device has stopped responding to SNMP. What is the most likely cause?
(A) There is an SNMP-based Denial of Service (DOS)
attack on a server plugged into the switch.
(B) SNMP has been manually disabled.
(C) The
switch is getting overloaded and has de-prioritized SNMP responses.
(D) There is an IP address conflict on the switch.
Which list of protocols is in order from
lowest impact on network bandwidth to highest impact on network bandwidth?
(A) SNMP, ICMP, NetFlow, WMI
(B) NetFlow, ICMP, WMI, SNMP
(C) ICMP,
SNMP, WMI, NetFlow
(D) SNMP, ICMP, WMI, NetFlow
Which type of Syslog message indicates the lowest
severity level?
(A) Alerts
(B) Critical
(C) Debugging
(D) Errors
(E) Informational
(F) Notifications
Which protocol is the most secure for establishing
remote terminal access to a system?
(A) Telnet
(B) SNMPv2
(C) SSHv2
(D) SNMPv3
Which aspect of network monitoring typically causes
a network management system (NMS) database to grow quickly?
(A) Bandwidth utilization
(B) NetFlow
collection
(C) CPU utilization
(D) Application performance
Which calculation should you use to filter
out peaks in network utilization data?
(A) Six sigma
(B) Standard deviation
(C) 95th
percentile
(D) Harmonic mean
Your network management system (NMS) indicates
that a device is down. As a troubleshooting step you attempt to telnet to the
device, and you are able to successfully connect. However, pinging the device
fails.
What should you do next to troubleshoot this situation?
(A) Verify layer 2 connectivity to the device
(B) Verify
that the "down" device can ping the NMS
(C) Verify that the ICMP service on the NMS
is functioning
(D) Verify the SNMP community string for the Device
You have recently started deploying a new
type of router on your network. What should you do to ensure that the SNMP
traps received from these devices are correctly interpreted by your network
management system (NMS)?
(A) Contact the router vendor for a firmware update
(B) Review your firewall rules to ensure the traps
are not being blocked enroute
(C) Contact
the router vendor for the latest MIBs and apply to your NMS
(D) Verify that your NMS is using the correct
SNMP community strings
Your company outsources CRM to a SaaS company.
Users are complaining that the CRM is down. You are able to verify that
Internet connectivity is good and that other Internet sites can be accessed.
You contact the CRM provider and find that none of their other customers are
having issues. You attempt to ping the IP address from your network management
system (NMS), but the ping fails.
After reviewing recent changes to your
outside router's configuration, you determine that an access control list (ACL)
update is causing the problem. At which layer of the OSI model is the problem
occurring?
(A) Layer 1
(B) Layer 2
(C) Layer 3
(D) Layer 5
You need to create an account that can see only
a subset of the nodes being monitored by Solar Winds NPM. What would you add to
the account to make this possible?
(A) Account views
(B) Account
limitations
(C) Account permissions
(D) View permissions
One of your network engineers is using both Solar
Winds NPM and Engineer's Toolset. The engineer cannot access the toolset from
within the Orion Web Console. What should you enable on the engineer's Orion
account?
(A) Allow Administrator Rights
(B) Allow
Browser Integration
(C) Allow Pass Link
(D) Allow Advanced Customization
Universal Device Pollers (UnDP) can be
applied to which two object types? (Choose two.)
(A) Nodes
(B) Volumes
(C) Interfaces
(D) Applications
(E) Monitors
Where should an alert should be created for a
Universal Device Poller (UnDP)?
(A) Basic Alerts Manager
(B) Universal Device Poller
(C) Orion Web Console
(D) Advanced
Alert Manager
What can be accomplished with the Report Grouping feature in Report Writer?
(A) limit the content of the reports
(B) modify
the format of the reports
(C) manage the distribution of the reports
(D) schedule the distribution of the reports
You have been asked for a report that shows the top 50 interfaces by percent utilization.
What is the most time-efficient way to create
this report in SolarWinds NPM?
(A) create a new interface report and
restrict to the top 50 using a filter
(B) run the default top 25 interfaces by
percent utilization over different time frames
(C) edit
default top 25 interfaces by percent utilization report and update to the top
50
(D) create a new advanced SQL query report
You have been asked to provide reports on bandwidth
utilization during business hours for each of your remote sales offices for the
last month. How should you design this report in SolarWinds NPM?
(A) pull all of the usage data and average it
by month
(B) pull last month's usage data and sort it
by time of day
(C) pull this year's usage data and filter by
month
(D) pull
last month's usage data and filter out non-business hours
In Solar Winds NPM, you want to send an alert to
Engineer A first. If Engineer A fails to acknowledge the alert within 30 minutes,
you want to send the alert to Engineer. Which two settings must be defined to
achieve this type of alert escalation? (Choose two.)
(A) suppress this alert (Do Not Trigger) when
the following condition exists
(B) reset this alert when the following condition
exists
(C) execute
this action XX minutes/hours/days after the alert
(D) check this alert every XX seconds/minutes/hours
(E) do not trigger this action until the
condition exists for more than XX seconds/minutes/hours
(F) do not
execute this action if the alert has been acknowledged
You have added several WAN routers from different company sites to a network map and added a link line connecting the routers. How do you display link status on an SolarWinds
NPM map?
(A) drag and drop the status object on the
link line
(B) edit the
link line and select the appropriate router interface
(C) edit the router interface and enable Link
Status
(D) edit Router Status and enable the Link Status
option
During the planning process, which two
factors determine the license level required for SolarWinds NPM? (Choose two.)
(A) total
number of nodes
(B) total number of CPUs of monitored devices
(C) total number of users
(D) total
number of interfaces
(E) total number of sites