IBM C2010-576 - Fundamentals of Applying Tivoli Network and Service Assurance Solutions V1 Exam
Page: 2 / 13
Total 64 questions
Question #6 (Topic: )
Who can identify the network discovery and monitoring tools that are in use at a customer's
site?
site?
A. the operations staff
B. the system administrator
C. the network engineering staff
D. the owner of the current system
Answer: C
Question #7 (Topic: )
Applications hosted on the servers are going down very frequently in a customer's
environment which is affecting their Service Level Agreement.
What are the first two points of investigation?
environment which is affecting their Service Level Agreement.
What are the first two points of investigation?
A. server capacity
B. application logs
C. end user latency
D. performance fine tuning
E. discuss with operations engineer
Answer: A,C
Question #8 (Topic: )
If a customer utilizes outside consultants for staff support, when should these resources be
included in the contact plan?
included in the contact plan?
A. Never; outside consultants are competitors.
B. If they are more experienced than the customer's staff.
C. When their role or responsibility is relevant to the project.
D. When their contracts are scheduled to last more than 6 months.
Answer: B
Question #9 (Topic: )
Which two groups within a customer's organization are most likely to be impacted by
implementing Network and Service Assurance software?
implementing Network and Service Assurance software?
A. Physical Security
B. Human Resources
C. Tools Management
D. Capacity and Planning
E. Site Planning and Real Estate
Answer: D
Question #10 (Topic: )
A customer requires a Proof of Technology to be completed using IBM Tivoli Netcool
Performance Manager with their production network.
Acustomer team(s) responsible for which three areas must be included in the planning for
this effort?
Performance Manager with their production network.
Acustomer team(s) responsible for which three areas must be included in the planning for
this effort?
A. Financial Controller
B. Database Administration
C. auditing the network for security violations
D. monitoring bandwidth usage in the network
E. network intrusion detection and denial of service attacks
F. Service Level Agreements with internal and external parties maintained
Answer: B,C,F