Access methods refer to the way users log in and interact with which HP Network Automation objects?
A. core servers
B. satellite gateways
C. core gateways
D. network devices
Which information is required to generate a license file? (Select two.)
A. operating system version
B. database version
C. product and version
D. user count
E. HP order number
You are creating a policy rule. What is a valid rule type that can be created?
A. Hardware
B. Device
C. Diagnostics
D. Driver
Click the Exhibit button.
Which page view does the exhibit display?
A. Monitor Status
B. Event Status
C. Server Monitor
D. System Status
What is the best practice for the syslog configuration and the reason for this configuration?
A. turned off during initial deployment to prevent mass change to the production environment
B. turned off at all times for security purposes
C. turned on during initial deployment to discover all devices in the production environment
D. turned on at all times to receive device events
To which entity are command permissions assigned?
A. Partitions
B. Realm
C. Roles
D. Users
What uses up the majority of the disk capacity by HP Network Automation?
A. device configuration logs
B. configuration data in the database
C. network device traffic logs
D. NA drivers
Which port scanner do you use to discover network devices in HP Network Automation 9.0?
A. Nmap
B. Superscan
C. Unicornscan
D. Scanrand
Where are the advanced scripting languages defined in HP Network Automation?
A. device access admin settings
B. user interface admin settings
C. file in the filesystem
D. server admin settings
A user wants to see the following information: - top 5 vendors - top 5 Operating System versions
- top 10 most accessed devices - number of configuration changes in the last 7 days - change history by time of day - system status
Where can you see all of this information in one place?
A. Compliance Center
B. Statistics Dashboard
C. User and System Reports
D. System and Network reports