SCP DUMPS - Question and Answers Volume 7



Which two management protocols should you use to measure the effectiveness of your QoS implementation? (Choose two.)
A. Syslog
B. SNMP
C. NetFlow
D. WMI
E. SSHv2
Answer: BC

Which management protocol should you use to analyze network traffic in and out of a router interface?
A. WMI
B. Syslog
C. IP service level agreement (SLA)
D. sFlow
Answer: D

Users are complaining that a network connection is slow.
How should SNMP be used to verify performance of the interface?
A. verify bandwidth usage via ifInOctets
B. verify status via the ifTable
C. verify that SNMP agent is responding
D. verify the performance via ifSpeed
Answer: A

Orion NPM is monitoring the performance of DS-3 utilizing standard MIBs in the ifTable. Occasionally, the reported traffic rates for this interface spike well above45 Mbps.
What is the most likely cause?
A. heavy network traffic
B. carrier mis configuration
C. counter rollovers
D. database issues
Answer: C

 Orion NPM is using SNMP to poll a router and track interface traffic rates. The data are collected every
5 minutes, and the most recent values collected for a specific interface are 1,000,000 and 2,000,000 octets.
What is the approximate average rate of traffic for this interface?
A. 1 Kbps
B. 3 Kbps
C. 16 Kbps
D. 26 Kbps
Answer: D

When using a network management system (NMS) to monitor network interfaces on a router, you notice that statistics are wrong after an interface card is physically removed from the device.
What has most likely caused this problem?
A. interface re-indexing
B. device configuration
C. counter rollovers
D. access lists
Answer: A

Which two reporting requirements should you consider when specifying data roll-up settings for a network management system (NMS)? (Choose two.)
A. data encryption
B. data format
C. data granularity
D. monitoring coverage
E. data retention
Answer: CE

Which advantage do SNMP traps and Syslog have over SNMP polling?
A. reliability of event detection
B. ability to poll events in real-time
C. ease of configuration
D. speed of event detection
Answer: D

How can you use a network management system (NMS)to ensure service level agreement (SLA) parameters are realistic for your environment?
A. increase data collection period
B. configuredata summarization
C. reducedata retention period
D. baseline network performance
Answer: D

Your service level agreement (SLA) dictates that you must be able to notify the appropriate parties
When systems are down for over2 minutes and report on data for the last 120 days .Your network management system (NMS) has been configured to collect status every 10minutes and summarize and retain data for 90 days.
Which two settings should you change in the NMS to meet the business requirements? (Choose two.)
A. increase data retention to 120 days
B. configure status polling to occur every5 minutes
C. summarize hourly data into weekly data every 120 days
D. configure status polling to occur every minute
E. summarize hourly data into weekly data every 90 days
Answer: AD

What should you do to track whether a new configuration has alleviated slow network performance?
A. compare ICMP availability before and after the change
B. compare application responsiveness before and after the change
C. monitor the affected devices for stability
D. monitor bandwidth utilization on affected interfaces
Answer: B

The IT budgeting department has asked you for reports that will help them better plan for increases in monthly recurring costs. Which report should you set up to help the IT budgeting department meet this objective?
A. router inventory
B. WAN interface utilization
C. LAN interface utilization
D. available switch ports
Answer: B

IT management wants to know how they can lower their total power consumption by consolidating equipment and shutting off unnecessary equipment.
Which type of report can you create to help them plan for this?
A. bandwidth utilization
B. available switch ports
C. router CPU utilization
D. total NetFlow endpoints
Answer: B

The IT planning department has asked for a report to help them understand when they need to implement IPv6.
Which report would offer them the greatest amount of relevant information?
A. unique Net Flow exporters
B. DHCP server CPU utilization
C. number of subnets
D. IP address utilization trends
Answer: D

You are planning a network management implementation where the network has several low bandwidth
WAN links.
Which two network management protocols are most likely to cause heavy traffic on WANs and should therefore be considered carefully before deployment? (Choose two.)
A. Syslog
B. SSH
C. SMTP
D. NetFlow
E. ICMP
Answer: AD

Which two sources provide detailed visibility into router interface traffic? (Choose two.)
A. SNMP statistics
B. SNMP traps
C. NetFlow
D. Syslog
E. CDP
Answer: AC

A network engineer is planning to deploy a network management system (NMS) to monitor a network.
Which two UDP ports should be enabled in router access control lists and firewalls so the NMS can effectively monitor devices? (Choose two.)
A. 160
B. 161
C. 162
D. 163
E. 164
Answer: BC

A network engineer has been asked to monitor 1.an Object Identifier (OID) using a custom poller. The custom poller does not seem to be working, so the engineer takes a packet capture from the router in question. To best filter the capture data and determine if the router is sending information about that OID, what would the engineer filter on?
(A) Destination IP address of the network management system (NMS) and port 162
(B) Destination IP address of the router and port 161
(C) Destination IP address of the network management system (NMS) and port 161
(D) Destination IP address of the router and port 162

When is NetFlow data exported from a router to a NetFlow collector?
(A) When the router is queried by the NetFlow collector
(B) Whenever the router configuration is changed
(C) When ten or more conversations have started
(D) When a TCP conversation is finished

While attempting to monitor a Windows 2003 Server using WMI, a network management system is unable to pull the requested values from the server. Packet traces reveal that the requests are making it to and from the server.
What is the most likely cause of the problem?
(A) Firewall rules
(B) Windows updates
(C) WMI versioning
(D) Windows permissions

Your network management system (NMS) leverages WMI to query Windows servers for status. Each of the servers is a part of the same Active Directory domain and utilizes the same credentials for login and authorization. Overnight, one of the server’s stops responding to queries from the NMS. A quick check reveals that the server is otherwise running normally.
What should you check or verify next?
(A) The SNMP service is running on the server.
(B) The server has all available Windows updates installed.
(C) The WMI service is running on the server.
(D) The WMI user has read permissions allowed.

A managed service provider (MSP) is planning to deploy a network management system
(NMS) to monitor multiple customer networks. The MSP must choose between a centralized or distributed management architecture. What are the two most important factors to consider? (Choose two.)
(A) Available bandwidth between the MSP and customers
(B) Total number of devices to be managed
(C) Choice of SNMP version for polling
(D) Overlapping IP address space between customers
(E) Choice of SSL versus VPN tunnel for Communication

A switch has started to show recent CPU spikes and buffer misses. No users have complained.
You are able to telnet to the device, but the device has stopped responding to SNMP. What is the most likely cause?
(A) There is an SNMP-based Denial of Service (DOS) attack on a server plugged into the switch.
(B) SNMP has been manually disabled.
(C) The switch is getting overloaded and has de-prioritized SNMP responses.
(D) There is an IP address conflict on the switch.

Which list of protocols is in order from lowest impact on network bandwidth to highest impact on network bandwidth?
(A) SNMP, ICMP, NetFlow, WMI
(B) NetFlow, ICMP, WMI, SNMP
(C) ICMP, SNMP, WMI, NetFlow
(D) SNMP, ICMP, WMI, NetFlow

Which type of Syslog message indicates the lowest severity level?
(A) Alerts
(B) Critical
(C) Debugging
(D) Errors
(E) Informational
(F) Notifications

Which protocol is the most secure for establishing remote terminal access to a system?
(A) Telnet
(B) SNMPv2
(C) SSHv2
(D) SNMPv3

Which aspect of network monitoring typically causes a network management system (NMS) database to grow quickly?
(A) Bandwidth utilization
(B) NetFlow collection
(C) CPU utilization
(D) Application performance

Which calculation should you use to filter out peaks in network utilization data?
(A) Six sigma
(B) Standard deviation
(C) 95th percentile
(D) Harmonic mean

Your network management system (NMS) indicates that a device is down. As a troubleshooting step you attempt to telnet to the device, and you are able to successfully connect. However, pinging the device fails.
What should you do next to troubleshoot this situation?
(A) Verify layer 2 connectivity to the device
(B) Verify that the "down" device can ping the NMS
(C) Verify that the ICMP service on the NMS is functioning
(D) Verify the SNMP community string for the Device

You have recently started deploying a new type of router on your network. What should you do to ensure that the SNMP traps received from these devices are correctly interpreted by your network management system (NMS)?
(A) Contact the router vendor for a firmware update
(B) Review your firewall rules to ensure the traps are not being blocked enroute
(C) Contact the router vendor for the latest MIBs and apply to your NMS
(D) Verify that your NMS is using the correct SNMP community strings

Your company outsources CRM to a SaaS company. Users are complaining that the CRM is down. You are able to verify that Internet connectivity is good and that other Internet sites can be accessed. You contact the CRM provider and find that none of their other customers are having issues. You attempt to ping the IP address from your network management system (NMS), but the ping fails.
After reviewing recent changes to your outside router's configuration, you determine that an access control list (ACL) update is causing the problem. At which layer of the OSI model is the problem occurring?
(A) Layer 1
(B) Layer 2
(C) Layer 3
(D) Layer 5

You need to create an account that can see only a subset of the nodes being monitored by Solar Winds NPM. What would you add to the account to make this possible?
(A) Account views
(B) Account limitations
(C) Account permissions
(D) View permissions

One of your network engineers is using both Solar Winds NPM and Engineer's Toolset. The engineer cannot access the toolset from within the Orion Web Console. What should you enable on the engineer's Orion account?
(A) Allow Administrator Rights
(B) Allow Browser Integration
(C) Allow Pass Link
(D) Allow Advanced Customization

Universal Device Pollers (UnDP) can be applied to which two object types? (Choose two.)
(A) Nodes
(B) Volumes
(C) Interfaces
(D) Applications
(E) Monitors

Where should an alert should be created for a Universal Device Poller (UnDP)?
(A) Basic Alerts Manager
(B) Universal Device Poller
(C) Orion Web Console
(D) Advanced Alert Manager

What can be accomplished with the Report Grouping feature in Report Writer?
(A) limit the content of the reports
(B) modify the format of the reports
(C) manage the distribution of the reports
(D) schedule the distribution of the reports

You have been asked for a report that shows the top 50 interfaces by percent utilization.
What is the most time-efficient way to create this report in SolarWinds NPM?
(A) create a new interface report and restrict to the top 50 using a filter
(B) run the default top 25 interfaces by percent utilization over different time frames
(C) edit default top 25 interfaces by percent utilization report and update to the top 50
(D) create a new advanced SQL query report

You have been asked to provide reports on bandwidth utilization during business hours for each of your remote sales offices for the last month. How should you design this report in SolarWinds NPM?
(A) pull all of the usage data and average it by month
(B) pull last month's usage data and sort it by time of day
(C) pull this year's usage data and filter by month
(D) pull last month's usage data and filter out non-business hours

In Solar Winds NPM, you want to send an alert to Engineer A first. If Engineer A fails to acknowledge the alert within 30 minutes, you want to send the alert to Engineer. Which two settings must be defined to achieve this type of alert escalation? (Choose two.)
(A) suppress this alert (Do Not Trigger) when the following condition exists
(B) reset this alert when the following condition exists
(C) execute this action XX minutes/hours/days after the alert
(D) check this alert every XX seconds/minutes/hours
(E) do not trigger this action until the condition exists for more than XX seconds/minutes/hours
(F) do not execute this action if the alert has been acknowledged

You have added several WAN routers from different company sites to a network map and added a link line connecting the routers. How do you display link status on an SolarWinds
NPM map?
(A) drag and drop the status object on the link line
(B) edit the link line and select the appropriate router interface
(C) edit the router interface and enable Link Status
(D) edit Router Status and enable the Link Status option

During the planning process, which two factors determine the license level required for SolarWinds NPM? (Choose two.)
(A) total number of nodes
(B) total number of CPUs of monitored devices
(C) total number of users
(D) total number of interfaces
(E) total number of sites
Related Posts Plugin for WordPress, Blogger...