网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
An HACMP setting timer may used to allow:()
A

 The setting or fallback of a cluster custom resource group

B

 The cluster time to stabilize before starting a custom resource group

C

 A priority node time to acquire custom resource group at cluster start

D

 A fallover node time to process custom resource states to be monitored


参考答案

参考解析
解析: 暂无解析
更多 “单选题An HACMP setting timer may used to allow:()A  The setting or fallback of a cluster custom resource groupB  The cluster time to stabilize before starting a custom resource groupC  A priority node time to acquire custom resource group at cluster startD  A fallover node time to process custom resource states to be monitored” 相关考题
考题 there may be a need for retraining if you explorer____new technology. A)usingB)useC)to useD)used

考题 The man page for command shows the following syntax: The man page for command shows the following syntax: command [ -a | -b ] Which of the following statements is true regarding this entry?() A. Either the -a or flag -b may be used, but not both.B. If the flag -a is used then the flag -b also must be used.C. One of the -a or -b flags must be used, but not both at the same time.D. Both the flags may be used together, but neither are mandatory.

考题 BGP runs over a reliable transport ( ). This eliminates the need to implement explicit update fragmentation, retransmission, acknowledgement, and ( ). Any authentication scheme used by the transport protocol may be used in addition to BGP's own ( )mechanisms. The error notification mechanism used in BGP (请作答此空)that the transport protocol supports a “graceful” close, i.e., that all outstanding data will be delivered ( )the connection is closed.A.assumes B.imagine C.enactment D.setting

考题 In the Apache Web Server configuration, the command KeepAlive ON is used to()A、Allow a CSS to probe the serverB、Allow a connection to be closed with a TCP RESETC、Allow persistent connectionsD、Allow the use of HTTP HEAD request

考题 Which of the following statements is true regarding the VERSIONS BETWEEN clause?()  A、 The VERSIONS BETWEEN clause may be used in DML statements.B、 The VERSIONS BETWEEN clause may be used in DDL statements.C、 The VERSIONS BETWEEN clause may not be used to query past DDL changes to tables.D、 The VERSIONS BETWEEN clause may not be used to query past DML statements to tables.

考题 Your company runs Remote Desktop Services. You have a Remote Desktop Session Host (RD Session Host) server. You need to ensure that remote desktop users can print only to the printers that are installed on the RD Session Host server. What should you do?()A、Enable the Do not allow client printer redirection Group Policy setting.B、Disable the Do not allow client printer redirection Group Policy setting.C、Enable the Do not set default client printer to be default printer in a session Group Policy setting.D、Disable the Do not set default client printer to be default printer in a session Group Policy setting.

考题 Which of the following is used to deny or allow access to a wireless router network?()A、SSIDB、SNMPC、IMAPD、MAC filtering

考题 While performing a site survey to document the existing environment before implementing a new HACMP cluster, it was discovered that a port filtering firewall was being used to protect the production system. The plan is to continue using the firewall and add a second firewall to avoid a single point of failure. Each node in the two-node cluster will have all of its network adapters connected to the firewalls, and all connections to the nodes will pass through these firewalls.  What must be considered about HACMP in a firewall environment?()  A、 Firewalls are not supported in a HACMP environment.B、 HACMP uses only TCP/IP so firewalls are not relevant.C、 Specific ports must be open for HACMP communications.D、 Dynamic routing must be used to properly route packets in a firewall-protected environment.

考题 A cluster administrator is performing fallover testing during a scheduled system outage. Node ’A’  Was forced down and eventually rebooted. When Node ’A’ reintegrates into the cluster, the resource group state is offline. No errors are found in reviewing the hacmp.out file.  What could have been done to ensure the resource group was acquired when cluster processing was restarted on Node ’A’?()A、 Nothing,HACMP does not require them automatically.B、 Force the remaining nodes down,then reintegrate them all.C、 Select reacquire resources after forced down on start menu.D、 Create a setting timer to bring the resource group online.

考题 Company.com has several network adapters configured as backup paths using the Virtual IP Addressing and dynamic routing of AIX. A second node needs to be added to the environment to crate a cluster. What considerations must be addressed during the planning session?()  A、 HACMP supports most types of networks,including Virtual IP Addressing by AIX.B、 If HACMP IP aliasing is used,the devices may be the Virtual IP type used by AIX.C、 Using the AIX Virtual IP Addressing scheme HACMP can provide near fault tolerant availability of the network.D、 The AIX Virtual Addressing mechanism is not supported by HACMP,but a similar configuration can be created in HACMP.

考题 The administration staff of a large computer complex is resisting the installation of HACMP. There  Are concerns about the difficulty of managing and administering an HACMP cluster without an "administration only" network. Adding adapters to create an administration network is not possible due to limitations on the number of open IO slots in the servers.  What can be done to address this issue?()  A、 Create HACMP persistent IP labels for administration purposes.B、 Use HWAT to ensure the correct MAC address is available at all times.C、 Nothing can be done because RPAT is a characteristic of HACMP that cannot be changed.D、 Use IP aliasing within HACMP to allow the administrators constant access to the nodes.

考题 Which statement is true about the database and database-user used during installation of IMS Server?()A、A preexisting database user may be used but a new database has to be created during installation.B、A preexisting database may be used but a new database user has to be created during installation.C、A preexisting database and user may be used or a new database and user are created during installation.D、A preexisting database and user cannot be used; a new database and user are created during  installation.

考题 The man page for command shows the following syntax: The man page for command shows the following syntax: command [ -a | -b ] Which of the following statements is true regarding this entry?()A、Either the -a or flag -b may be used, but not both.B、If the flag -a is used then the flag -b also must be used.C、One of the -a or -b flags must be used, but not both at the same time.D、Both the flags may be used together, but neither are mandatory.

考题 Which statements describe the capabilities of the DBMS_NETWORK_ACL_ADMIN package?()A、It can be used to allow the access privilege settings for users but not roles.B、It can be used to allow the access privilege settings for users as well as roles.C、It can be used to control the time interval for which the access privilege is available to a user.D、It can be used to selectively restrict the access for each user in a database to different host computers.E、It can be used to selectively restrict a user's access to different applications in a specific host computer.

考题 An HACMP setting timer may used to allow:()  A、 The setting or fallback of a cluster custom resource groupB、 The cluster time to stabilize before starting a custom resource groupC、 A priority node time to acquire custom resource group at cluster startD、 A fallover node time to process custom resource states to be monitored

考题 单选题Company.com has two sites that are 3072 kilometers apart and wants to implement HACMP  between eh two locations. The nodes at each location must be capable of running the application in the event of a failure. Currently the customer’s disk technology is SCSI.  How can HACMP be used in this environment?()A  HACMP cannot span sites; the environment must be contained in a single site.B  HACMP/XD://HAGeo has unlimited distance mirroring that may be appropriate for this environment.C  HACMP cannot be split into two sites that exceed the limitation s of the storage cable length.D  HACMP/XD://PPRC that is included with the base HACMP distribution will enable site-to-site  communications in HACMP.

考题 单选题A cluster administrator is performing fallover testing during a scheduled system outage. Node ’A’  Was forced down and eventually rebooted. When Node ’A’ reintegrates into the cluster, the resource group state is offline. No errors are found in reviewing the hacmp.out file.  What could have been done to ensure the resource group was acquired when cluster processing was restarted on Node ’A’?()A  Nothing,HACMP does not require them automatically.B  Force the remaining nodes down,then reintegrate them all.C  Select reacquire resources after forced down on start menu.D  Create a setting timer to bring the resource group online.

考题 单选题Evaluate the following command:   SQLALTER SYSTEM SET db_securefile = ’IGNORE’;   What is the impact of this setting on the usage of SecureFiles?()A  It forces BasicFiles to be created even if the SECUREFILE option is specified to create the LOBB  It forces SecureFiles to be created even if the BASICFILE option is specified to create the LOBC  It does not allow the creation of SecureFiles and generates an error if the SECUREFILE option is specified to create the LOBD  It ignores the SECUREFILE option only if a Manual Segment Space Management tablespace is used and creates a BasicFile

考题 单选题Company.com has several network adapters configured as backup paths using the Virtual IP Addressing and dynamic routing of AIX. A second node needs to be added to the environment to crate a cluster. What considerations must be addressed during the planning session?()A  HACMP supports most types of networks,including Virtual IP Addressing by AIX.B  If HACMP IP aliasing is used,the devices may be the Virtual IP type used by AIX.C  Using the AIX Virtual IP Addressing scheme HACMP can provide near fault tolerant availability of the network.D  The AIX Virtual Addressing mechanism is not supported by HACMP,but a similar configuration can be created in HACMP.

考题 单选题Your company runs Remote Desktop Services. You have a Remote Desktop Session Host (RD Session Host) server. You need to ensure that remote desktop users can prin t only to the printers that are installed on the RD Session Host server. What should you do?()A Enable the Do not allow client printer redirection Group Policy setting.B Disable the Do not allow client printer redirection Group Policy setting.C Enable the Do not set default client printer to be default printer in a session Group Policy setting.D Disable the Do not set default client printer to be default printer in a session Group Policy setting.

考题 单选题Evaluate the following command: SQLALTER SYSTEM SET db_securefile = 'IGNORE'; What is the impact of this setting on the usage of SecureFiles?()A It forces BasicFiles to be created even if the SECUREFILE option is specified to create the LOBB It forces SecureFiles to be created even if the BASICFILE option is specified to create the LOBC It does not allow the creation of SecureFiles and generates an error if the SECUREFILE option is specified to create the LOBD It ignores the SECUREFILE option only if a Manual Segment Space Management tablespace is used and creates a BasicFile

考题 单选题You are the desktop administrator of your company’s network. You install a print device on a Windows XP Professional computer. This print device should be used only by the desktop administration staff and by managers. You share the printer on the network as DTA-Print and assign Allow - Print permissions to the DTA-S group, which includes staff members’ accounts, and the DTA-M group, which includes managers’ accounts. Later, the managers report that they must wait a long time for their jobs to print. You discover that the desktop administration staff generates many problematic print jobs. As a result, the managers’ print jobs must wait a long time in the print queue. You need to ensure that the managers’ print jobs print as quickly as possible while minimizing hardware costs. What should you do?()A Install a second printer for the same print device on the Windows XP Professional computer. Share this printer as DTA-Manager, and grant Allow - Print permission to the DTA-M group only. Configure a priority setting of 1 on DTA-Print. Configure a priority setting of 99 on DTA-Manager.B Install a second printer for the same print device on the Windows XP Professional computer. Share this printer as DTA-Manager, and grant Allow - Print permissions to the DTA-M group only. Configure a priority setting of 99 on DTA-Print. Configure a priority setting of 1 on DTA-Manager. C Connect a second print device to the Windows XP Professional computer. Create a printer pool from the first defined printer. Configure a priority setting of 1 on the printer pool. Grant Allow - Manage Documents permission to DTA-M group.D Connect a second print device to the Windows XP Professional computer. Create a printer pool from the first defined printer. Configure a priority setting of 99 on the printer pool. Grant Allow - Manage Documents permission to DTA-M group. 

考题 多选题Which the two are true about the JSTL core iteration custom tags?()AIt may iterate over arrays, collections, maps and strings.BThe body of the tag may contain EL code, but not scripting code.CWhen looping over collections, a loop status object may be used in the tag body.DIt may iterate over a map, but only the key of the mapping may be used in the tag body.EWhen looping over integers (for example begin1=’1’ end=’10’), a loop status object may not be used in the tag body.

考题 单选题The administration staff of a large computer complex is resisting the installation of HACMP. There  Are concerns about the difficulty of managing and administering an HACMP cluster without an "administration only" network. Adding adapters to create an administration network is not possible due to limitations on the number of open IO slots in the servers.  What can be done to address this issue?()A  Create HACMP persistent IP labels for administration purposes.B  Use HWAT to ensure the correct MAC address is available at all times.C  Nothing can be done because RPAT is a characteristic of HACMP that cannot be changed.D  Use IP aliasing within HACMP to allow the administrators constant access to the nodes.

考题 单选题Which statement is true about the database and database-user used during installation of IMS Server?()A A preexisting database user may be used but a new database has to be created during installation.B A preexisting database may be used but a new database user has to be created during installation.C A preexisting database and user may be used or a new database and user are created during installation.D A preexisting database and user cannot be used; a new database and user are created during  installation.

考题 单选题Which of the following statements is true regarding the VERSIONS BETWEEN clause?()A  The VERSIONS BETWEEN clause may be used in DML statements.B  The VERSIONS BETWEEN clause may be used in DDL statements.C  The VERSIONS BETWEEN clause may not be used to query past DDL changes to tables.D  The VERSIONS BETWEEN clause may not be used to query past DML statements to tables.

考题 多选题Which statements describe the capabilities of the DBMS_NETWORK_ACL_ADMIN package?()AIt can be used to allow the access privilege settings for users but not roles.BIt can be used to allow the access privilege settings for users as well as roles.CIt can be used to control the time interval for which the access privilege is available to a user.DIt can be used to selectively restrict the access for each user in a database to different host computers.EIt can be used to selectively restrict a user's access to different applications in a specific host computer.