网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
In order to cluster IBM SONAS interface nodes so that they can serve the same data, the interface nodes must coordinate their locking and recovery. This coordination is done through().
A

SONAS Health Center

B

SONAS Cluster Manager

C

Tivoli Storage Manager

D

Windows Active Directory


参考答案

参考解析
解析: 暂无解析
更多 “单选题In order to cluster IBM SONAS interface nodes so that they can serve the same data, the interface nodes must coordinate their locking and recovery. This coordination is done through().A SONAS Health CenterB SONAS Cluster ManagerC Tivoli Storage ManagerD Windows Active Directory” 相关考题
考题 通过以下哪个简单的统一界面可以监控IBM DS8000、DS4000磁盘系统性能?() A.IBM Total Storage Productivity CenterB.IBM Tivoli Storage ManagerC.IBM DirectorD.IBM Storage Manager

考题 Which two considerations must you take into account when deploying a Junos Pulse Access Control Service cluster?() A. State synchronization occurs only through the internal network interface card (NIC)B. Latency of the WAN must be less than 300 ms.C. Authenticating endpoints must be on the same LAN segment.D. Cluster members must use the same hardware platfor

考题 In order to cluster IBM SONAS interface nodes so that they can serve the same data, the interface nodes must coordinate their locking and recovery. This coordination is done through(). A. SONAS Health CenterB. SONAS Cluster ManagerC. Tivoli Storage ManagerD. Windows Active Directory

考题 Which two considerations must you take into account when deploying a Junos Pulse Access Control Service cluster?()A、State synchronization occurs only through the internal network interface card (NIC)B、Latency of the WAN must be less than 300 ms.C、Authenticating endpoints must be on the same LAN segment.D、Cluster members must use the same hardware platfor

考题 In order to cluster IBM SONAS interface nodes so that they can serve the same data, the interface nodes must coordinate their locking and recovery. This coordination is done through().A、SONAS Health CenterB、SONAS Cluster ManagerC、Tivoli Storage ManagerD、Windows Active Directory

考题 The en0 interface on Node1 of a two-node cluster has failed. This adapter is configured with a boot addressand under stable operations also has the service address of the cluster’s single resource group. The resourcegroup is configured with the fallback option. The HA network was configured for IPAT via aliasing and now theservice address is on the en1 interface in the cluster. The en0 interface has already been physically replacedand configured with the boot address. Which of the following will return the cluster to its original state andminimize cluster downtime?()A、Run cluster synchronization.B、Restart cluster services on Node1.C、Perform a swap_adapter using C-SPOCD、Restart cluster services on both nodes

考题 Company.com has a six-node concurrent resource group with an application that is accessed by  a web connection to the cluster nodes. How is the workload moved to another cluster node during a node failure?()  A、 The concurrent application must control the web interface through application monitoring.B、 A second resource group will be required to move the web application and IP label to a new node during a node failure.C、 The concurrent resource group can support multiple IP labels through IP aliasing so all IP labels are defined in the concurrent resource group.D、 The dynamic node priority facility in HACMP will relocate the web application and the IP label,if it is correctly defined in the application start and stop script.

考题 Which storage subsystem can place files from the same directory in different storage poolsautomatically for improved performance?()A、 XIV system B、 SONAS C、 DS5300 D、 DS8700

考题 A large shipping company that is standardized on Fibre Channel storage has just acquired a regional shipping company that is using an IBM XIV system. The large company would like to integrate the XIV system into the environment and manage all data through a single management interface. Which product should be suggested so that all data can be managed?()A、IBM DS8700B、IBM XIV GUIC、IBM System Storage N7600D、IBM SAN Volume Controller (SVC)

考题 The user base of a three-node cluster has increased. In order to add clustered users to all nodes, which of the following steps should be performed?()  A、 On one of the nodes,add the users via C-SPOC ’Add a User to the Cluster’smit menu.B、 Use C-SPOC to synchronize the password files between cluster nodes.C、 On all of the nodes,add the users to the /etc/passwd and system security files,and then synchronize the cluster.D、 On one of the nodes,add the users to the /tec/passwd and system security files,add home directories,and use cron to automate the movement of system security files between nodes.

考题 Company.com is migrating from a third party managed disk subsystem to an IBM TotalStorage Enterprise Storage Server. Connection of the new storage server is complete, and it has been tested on all of the nodes in the three node HACMP cluster.  How does the customer migrate to the new storage server with minimum down time?()A、 Shut down one node at a time and let the other node serve the applicationB、 Stop HACMP with the forced option and perform migration of the disks on one node,then restart HACMPC、 Stop both nodes and perform the migration all at once using standard AIX commands in parallel, then restart the clusterD、 Use C-SPOC to add the new disks to the cluster and migrate the information off the existing disks, then remove the old disks with C-SPOC

考题 What is the IBM tool used to configure the IBM System Storage DS5000 system?()A、DS Storage ManagerB、Tivoli Storage ManagerC、Remote Support ManagerD、Tivoli Provisioning Manager

考题 Which storage subsystem can scale in a single image to multiple petabytes of physical disk?()A、XIV system B、SONAS C、DS5300 D、DS8700

考题 Which storage subsystem provides high availability with the support for more than two processingnodes?()A、XIV and SONAS B、XIV and DS8700 C、SONAS and N7700 D、SONAS and DS8700

考题 You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain.   You administer a Network Load Balancing cluster that consists of three nodes. Each node runs Windows Server 2003 and contains a single network adapter. The Network Load Balancing cluster can run only in unicast mode. The Network Load Balancing cluster has converged successfully.   To increase the utilization of the cluster, you decide to move a particular application to each node of the cluster. For this application to run, you must add a Network Load Balancing port rule to the nodes of the cluster.   You start Network Load Balancing Manager on the second node of the cluster. However, Network Load Balancing Manager displays a message that it cannot communicate with the other two nodes of the cluster.  You want to add the port rule to the nodes of the cluster.   What should you do?  ()A、 Use Network Load Balancing Manager on the Network Load Balancing default host to add the port rule.B、 Change the host priority of the second node to be the highest in the cluster, and then use Network Load Balancing Manager to add the port rule.C、 Run the nlb.exe drain command on each node, and then use Network Load Balancing Manager to add the port rule.D、 Add the port rule through Network Connections Properties on each node.

考题 You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain.   You administer a four-node Network Load Balancing cluster. All nodes run Windows Server 2003. The cluster has converged successfully. You use Network Load Balancing Manager on the default host to configure all nodes of the cluster.   The nodes have a single network adapter and are connected to the same switching hub device.   Administrators of non-cluster servers that are connected to the same switching hub device report that their servers receive traffic that is destined for the cluster nodes. Receiving this additional network traffic impairs the network performance of the non-cluster servers.   You need to ensure that traffic destined for only the cluster nodes is not sent to all ports of the switching hub device.  You do not want to move the cluster to another switching hub device.   What should you do? ()A、 On one node, run the nlb.exe reload command.B、 On each node, run the wlbs.exe drainstop command.C、 Use Network Load Balancing Manager to enable Internet Group Management Protocol (IGMP) support on the cluster.D、 Use Network Load Balancing Manager to add a second cluster IP address.

考题 You add a Windows Server 2008 R2 server with the Hyper-V role installed to an existing Hyper-V failover cluster.  After you move a virtual machine (VM) to the new cluster node, Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 reports the status of the VM as Unsupported Cluster Configuration. You need to be able to manage the VM by using VMM. What should you do?()A、Disable TCP Chimney Offload on the new cluster nodes network adaptersB、Disable the TCP/IP Offload Engine (TOE) on the new cluster nodes network adapters.C、Move the VM configuration file to a local storage device, and update the pointer to the file.D、Update the virtual networking configuration of the new cluster node to match the virtual networking configuration of the original cluster nodes.

考题 Which IBM software technology is a key component of SONAS?()A、 PowerHA B、 Tivoli Storage Manager (TSM)C、 Tivoli Productivity Center (TPC) D、 General Parallel File System (GPFS)

考题 单选题You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain.   You administer a Network Load Balancing cluster that consists of three nodes. Each node runs Windows Server 2003 and contains a single network adapter. The Network Load Balancing cluster can run only in unicast mode. The Network Load Balancing cluster has converged successfully.   To increase the utilization of the cluster, you decide to move a particular application to each node of the cluster. For this application to run, you must add a Network Load Balancing port rule to the nodes of the cluster.   You start Network Load Balancing Manager on the second node of the cluster. However, Network Load Balancing Manager displays a message that it cannot communicate with the other two nodes of the cluster.  You want to add the port rule to the nodes of the cluster.   What should you do?  ()A  Use Network Load Balancing Manager on the Network Load Balancing default host to add the port rule.B  Change the host priority of the second node to be the highest in the cluster, and then use Network Load Balancing Manager to add the port rule.C  Run the nlb.exe drain command on each node, and then use Network Load Balancing Manager to add the port rule.D  Add the port rule through Network Connections Properties on each node.

考题 单选题The en0 interface on Node1 of a two-node cluster has failed. This adapter is configured with a boot addressand under stable operations also has the service address of the cluster’s single resource group. The resourcegroup is configured with the fallback option. The HA network was configured for IPAT via aliasing and now theservice address is on the en1 interface in the cluster. The en0 interface has already been physically replacedand configured with the boot address. Which of the following will return the cluster to its original state andminimize cluster downtime?()A Run cluster synchronization.B Restart cluster services on Node1.C Perform a swap_adapter using C-SPOCD Restart cluster services on both nodes

考题 单选题You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain.   You administer a four-node Network Load Balancing cluster. All nodes run Windows Server 2003. The cluster has converged successfully. You use Network Load Balancing Manager on the default host to configure all nodes of the cluster.   The nodes have a single network adapter and are connected to the same switching hub device.   Administrators of non-cluster servers that are connected to the same switching hub device report that their servers receive traffic that is destined for the cluster nodes. Receiving this additional network traffic impairs the network performance of the non-cluster servers.   You need to ensure that traffic destined for only the cluster nodes is not sent to all ports of the switching hub device.  You do not want to move the cluster to another switching hub device.   What should you do? ()A  On one node, run the nlb.exe reload command.B  On each node, run the wlbs.exe drainstop command.C  Use Network Load Balancing Manager to enable Internet Group Management Protocol (IGMP) support on the cluster.D  Use Network Load Balancing Manager to add a second cluster IP address.

考题 单选题An enterprise has three nodes: -Node ’A’ is a production database, -Node ’B’ is a production  Application server, and -Node ’C’ is a test and development node. Node ’C’ is used by six programmers to develop and the production application as business critical and would like to make it highly available with HACMP. Application development and testing is not business critical.  Which of the following describes the best solution?()A  There is not an adequate solution because HACMP should not be configured in this environment without a dedicated standby node.B  Nodes ’A’ and ’B’ should be configured in a cluster with mutual fallover of two cascading resource groups to provide both nodes will deliver acceptable response time with both resource groups.C  Nodes ’A’ and ’C’ should be configured in one cluster, and Nodes ’B’ and ’C’ in another cluster to prevent both the database and application server from falling over to Node ’C’ at the same time.D  Nodes ’A’, ’B’, and ’C’ should be configured in a cluster with Node ’C’ the hot standby for both the database and application server resource groups. Workload Manager (WLM) must be configured on database and application developers from over utilizing the CPU resources.

考题 单选题Company.com has a six-node concurrent resource group with an application that is accessed by  a web connection to the cluster nodes. How is the workload moved to another cluster node during a node failure?()A  The concurrent application must control the web interface through application monitoring.B  A second resource group will be required to move the web application and IP label to a new node during a node failure.C  The concurrent resource group can support multiple IP labels through IP aliasing so all IP labels are defined in the concurrent resource group.D  The dynamic node priority facility in HACMP will relocate the web application and the IP label,if it is correctly defined in the application start and stop script.

考题 单选题You add a Windows Server 2008 R2 server with the Hyper-V role installed to an existing Hyper-V failover cluster.  After you move a virtual machine (VM) to the new cluster node, Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 reports the status of the VM as Unsupported Cluster Configuration. You need to be able to manage the VM by using VMM. What should you do?()A Disable TCP Chimney Offload on the new cluster nodes network adaptersB Disable the TCP/IP Offload Engine (TOE) on the new cluster nodes network adapters.C Move the VM configuration file to a local storage device, and update the pointer to the file.D Update the virtual networking configuration of the new cluster node to match the virtual networking configuration of the original cluster nodes.

考题 单选题Which storage subsystem can place files from the same directory in different storage poolsautomatically for improved performance?()A  XIV system B  SONAS C  DS5300 D  DS8700

考题 单选题Which IBM software technology is a key component of SONAS?()A  PowerHA B  Tivoli Storage Manager (TSM)C  Tivoli Productivity Center (TPC) D  General Parallel File System (GPFS)

考题 单选题In order to cluster IBM SONAS interface nodes so that they can serve the same data, the interface nodes must coordinate their locking and recovery. This coordination is done through().A SONAS Health CenterB SONAS Cluster ManagerC Tivoli Storage ManagerD Windows Active Directory

考题 单选题The user base of a three-node cluster has increased. In order to add clustered users to all nodes, which of the following steps should be performed?()A  On one of the nodes,add the users via C-SPOC ’Add a User to the Cluster’smit menu.B  Use C-SPOC to synchronize the password files between cluster nodes.C  On all of the nodes,add the users to the /etc/passwd and system security files,and then synchronize the cluster.D  On one of the nodes,add the users to the /tec/passwd and system security files,add home directories,and use cron to automate the movement of system security files between nodes.