You are on page 1of 4

HP NNMi

Multiple Choice
Identify the choice that best completes the statement or answers the question.
____

1. By default, what values are used to monitor the status of interfaces in NNMi?
a. ICMP Echo requests
c. SNMP CDP status
b. SNMP MIB II values ifAdmin and
d. SNMP v2C getBulk requests
ifOper status

____

2. What embedded database is used within NNMi?


a. MySQL
c. SQL Server
b. Oracle
d. Postgres

____

3. Identify the function performed by NNMi Console among the following:


a. Calculation of Layer 2 and Layer 3 connectivity
b. rejection of events that are undefined or disabled
c. consolidation of topology and status information
d. performing event correlation and root cause analysis

____ 4. How can you set thresholds for trap volumes based on type and originating agent that help eliminate the
effects of SNMP trap storms?
a.
b.
c.
d.

Using iSPI Network Engineering Toolset Software


Using iSPI Performance for Metrics Software
Configuring Monitoring Settings in the Configuration workspace
Tuning parameters in the SNMP resolution.conf file

____

5. What must you do to view the list of users who are currently signed in to NNMi?
a. Select Tools > select Signed in Users.
b. Select Tools > select Users Admin - List Active User.
c. Select Reports > select Signed in Users.
d. Select Reports > select Users Admin - List Active User.

____

6. Along with adding the NNMi Server to the Device Access Control List, SNMP and ICMP
should be configured. During device discoveries, you should also ensure that DNS servers are well configured
to prevent long delays. What is the best practice when adding nodes to DNS?
a. Round-Robin is appropriate because any given hostname can map to different IPv4
addresses.
b. All nodes added to DNS must also be added to the local NNMi server host files.
c. The DNS server must not be a caching server and must forward DNS requests.
d. The DNS server has consistent hostname to IPv4 address mappings and IPv4 to
hostname mappings.

____

7. What is the primary use case for the NNMi iSPI Performance for Metrics?
a. Monitoring operational performance of network elements
b. Warehousing long-term performance data
c. Capacity planning and forecasting for network elements
d. Troubleshooting performance problems in near real-time

____

8. Identify a function among the following, which is not a capability of HP NNMi.


a. Interface Utilization and Errors

b.
c.
d.
e.
____

Performance data collection and graphing


Detailed data about devices that were discovered
Restoration of Network Device Configuration
Generate messages to Incident Browser when thresholds are exceeded

9. What is the main function of iSPIs (Intelligent Smart Plug In) in HP NNMi?
a. To improve the performance of the NNMi product
b. For Technologies which may not be needed by many users
c. To take care of geographical differences when used in other countries
d. For usage of patented Special Technologies of HP

____ 10. What type of Discovery is used by NNMI to find groups and status of HSRP andVRRP routers?
a. vLAN discovery
d. Router Redundancy Discovery
b. IP address discovery
e. Component discovery
c.
Card discovery
____ 11. Initial Discovery progress map displays up to ____ of closest Layer __ connected nodes.
a. 100, 2
d. 1000, 3
b. 100, 3
e. 100, 7
c.
1000, 2
Multiple Response
Identify one or more choices that best complete the statement or answer the question.
____ 12. What are the two categories of Network Management that are addressed by HP NNMi?
a. Fault Management
d. Performance Management
b. Configuration Management
e. Security Management
c.
Accounting Management
____ 13. Identify the major functions of NNMi among the following (Choose as many as applicable)
a. Automatic discovery of a Network
d. Component Health
b. Device and Interface status
e. End-User Network usage analysis
c.
Network Maps
____ 14. What are the two main information sources used by NNMi for Network mapping?
a. Traps sent by devices
b. Mapping iSPI installed in the Agents
c. Usage of SNMP v2C command Bulk Get
d. Polls that check for device or configuration changes
____ 15. Identify three methods among the following for processing of Events in NNMi.
a. Blocking
d. iSPIs
b. Custom Polling
e. Pairwise Correlation
c.
Deduplication
____ 16. Identify the valid attributes of Incidents under HP NNMi fro the following (Choose three answers).
a. Severity
d. Priority
b. Object Id
e. Time of origination
c.
Life Cycle state
____ 17. Identify the four types of groups supported by HP NNMi.
a. Interface groups
d. Security groups

b. Node groups
c.

e. User groups
Device groups

You might also like