网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
On an existing two-node cluster, the system is configured with RAID5 SSA as the shared disk.  When adding a new node to the cluster, what must be taken into consideration?()
A

 Nothing,SSA can support a maximum of 8 initiators per loop.

B

 The RAID5 implementation on SSA will only support two initiators per loop.

C

 SSA can only support four initiators per lop when using the fat write option.

D

 The RAID implementation can be used with three initiators only if the fast write cache option is used on all adapters.


参考答案

参考解析
解析: 暂无解析
更多 “单选题On an existing two-node cluster, the system is configured with RAID5 SSA as the shared disk.  When adding a new node to the cluster, what must be taken into consideration?()A  Nothing,SSA can support a maximum of 8 initiators per loop.B  The RAID5 implementation on SSA will only support two initiators per loop.C  SSA can only support four initiators per lop when using the fat write option.D  The RAID implementation can be used with three initiators only if the fast write cache option is used on all adapters.” 相关考题
考题 Which statement is true about "full state backup" in a Cisco Unified Computing System?()A、 An XML file containing all details of the system, including IP address and cluster details B、 A binary file containing only service profiles, pools, and other items configured after initial configurationC、 A binary file containing all details of the system, including IP address and cluster detailsD、 An XML file containing only service profiles, pools, and other items configured after initial configurationE、 A text file with the NX-OS running configuration

考题 On an existing two-node cluster, the system is configured with RAID5 SSA as the shared disk.  When adding a new node to the cluster, what must be taken into consideration?()  A、 Nothing,SSA can support a maximum of 8 initiators per loop.B、 The RAID5 implementation on SSA will only support two initiators per loop.C、 SSA can only support four initiators per lop when using the fat write option.D、 The RAID implementation can be used with three initiators only if the fast write cache option is used on all adapters.

考题 A customer has an entry level Power System that is currently partitioned and managed by a Hardware Management Console (HMC). For operational reasons, it must be disconnected from the HMC and configured as a new development system.  How should the customer proceed to implement PowerVM Express and Integrated Virtualization Manager (IVM) on this Power System? ()A、 Install a VIO server as an additional partition and DLPAR the resources from the existing partition to the VIO server.B、 Create a service partition and install a VIO server. This will automatically move resources to the VIO server on reboot of the managed system.C、 Delete all the existing LPARs, create a new LPAR and assign all the system resources to this LPAR and then install the VIO server on this LPAR.D、 Reset the machine to Manufacturing Default Configuration and install the VIO server on the resulting partition created, which will own all system resources.

考题 While performing a site survey to document the existing environment before implementing a new HACMP cluster, it was discovered that a port filtering firewall was being used to protect the production system. The plan is to continue using the firewall and add a second firewall to avoid a single point of failure. Each node in the two-node cluster will have all of its network adapters connected to the firewalls, and all connections to the nodes will pass through these firewalls.  What must be considered about HACMP in a firewall environment?()  A、 Firewalls are not supported in a HACMP environment.B、 HACMP uses only TCP/IP so firewalls are not relevant.C、 Specific ports must be open for HACMP communications.D、 Dynamic routing must be used to properly route packets in a firewall-protected environment.

考题 Prior to implementing an LPAR system, which of the following needs to be done?()A、A graphics monitor must be attached to the serverB、Cluster System Management (CSM) software must be installedC、The LPAR system must have an Hardware Management Console (HMC) connectedD、Each LPAR must be configured with a CDROM for operating system installation

考题 A new administrator is performing fallover testing on a two-node cluster and is concerned that the cascading resource group belonging to Node ’A’ did not reintegrate properly after the cluster was restarted on Node ’A’. A stable cluster is reported by clstat,and clRGinfo reports the resource group online on Node ’B’.  What type of configuration would cause this type of behavior?()  A、 The resource group DNP has been configured.B、 The resource group option CWOF has been enabled.C、 The resource group option Inactive Takeover is set.D、 A resource group fallback timer has been configured.

考题 What is a design consideration when using existing PCIe I/O drawers in a maximum bandwidth/throughput configuration on a new Power 750 system?()A、The new system requires 1 installed processor card for the GX++ bus adapterB、The new system requires a minimum of 2 installed processor cards for the GX++ bus adapterC、The new system requires a minimum of 3 installed processor cards and the HPC InfiniBand cluster adapterD、The new system requires 1 installed processor card for the GX++ bus adapter and the HPC InfiniBand cluster adapter

考题 A system administrator wants to ensure that the cluster will failover if quorum is lost for appAvg in RG1 whichis mirrored between hdisk3 and hdisk5. Automatic error notification has been configured in this cluster. Which of the following actions should be usedto test that the cluster fails over correctly when quorum is lost for appAvg?()A、Emulate the errpt entry from the HACMP Error Notification menuB、Execute a custom test procedure from the HACMP Cluster Test Tool menuC、Emulate the LVM_SA_QUORCLOSE event from the HACMP Event Emulation menuD、Execute the automated test procedure from the HACMP Cluster Test Tool menu

考题 How can an Oracle WebLogic cluster’s capacity be increased ?()A、 by adding server instances to the cluster on an existing machineB、 by adding machines to host server for more clustered instancesC、 by adding machines to the cluster to host the incremental server instancesD、 by adding node managers to an existing machine

考题 You are a network administrator for your company. The network contains a perimeter network. The perimeter network contains four Windows Server 2003, Web Edition computers that are configured as a Network Load Balancing cluster.   The cluster hosts an e-commerce Web site that must be available 24 hours per day. The cluster is located in a physically secure data center and uses an Internet-addressable virtual IP address. All servers in the cluster are configured with the Hisecws.inf template.   You need to implement protective measures against the cluster’s most significant security vulnerability.   What should you do?  ()A、 Use Encrypting File System (EFS) for all files that contain confidential data stored on the cluster.B、 Use packet filtering on all inbound traffic to the cluster.C、 Use Security Configuration and Analysis regularly to compare the security settings on all servers in the cluster with the baseline settings.D、 Use intrusion detection on the perimeter network.

考题 You plan to deploy two virtual machines (VMs) that will be configured as nodes in a failover cluster. The VMs will run file and print services. You need to recommend a storage solution for the planned deployment. What should you include in the recommendation?()A、pass-through disksB、Network Load Balancing (NLB) for the Hyper-V hostsC、virtual machine queue (VMQ)D、Cluster Shared Volumes (CSV)E、an iSCSI Storage Area Network (SAN)F、a failover cluster for the Hyper-V hostsG、Network Load Balancing (NLB) for the VMsH、Network Attached Storage (NAS)I、Microsoft System Center Operations Manager with Performance and Resource Optimization (PRO)J、Windows System Resource Manager (WSRM)K、a failover cluster between the VMsL、Virtual Machine ChimneyM、Second-Level Address Translation (SLAT)N、quick migration

考题 You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain.   You administer a three-node Network Load Balancing cluster. Each cluster node runs Windows Server 2003 and has a single network adapter. The cluster has converged successfully.   You notice that the nodes in the cluster run at almost full capacity most of the time. You want to add a fourth node to the cluster. You enable and configure Network Load Balancing on the fourth node.   However, the cluster does not converge to a four-node cluster. In the System log on the existing three nodes, you find the exact same TCP/IP error event. The event has the following description: "The system detected an address conflict for IP address 10.50.8.70 with the system having network hardware address 02:BF://0A:32:08:46."   In the System log on the new fourth node, you find a similar TCP/error event with the following description: "The system detected an address conflict for IP address 10.50.8.70 with the system having network hardware address 03:BF://0A:32:08:46." Only the hardware address is different in the two descriptions.  You verify that IP address 10.50.8.70 is configured as the cluster IP address on all four nodes.  You want to configure a four-node Network Load Balancing cluster.   What should you do?  ()A、 Configure the fourth node to use multicast mode.B、 Remove 10.50.8.70 from the Network Connections Properties of the fourth node.C、 On the fourth node, run the nlb.exe resume command.D、 On the fourth node, run the wlbs.exe reload command.

考题 You are a network administrator for your company. The network contains four Windows Server 2003 computers configured as a four-node server cluster.   Each cluster node is the preferred owner of a clustered instance of Microsoft SQL Server 2000, and each cluster node is configured as a possible owner of all other instances of SQL Server. All nodes have identically configured hardware. All four nodes operate at a sustained 70 percent CPU average.   You add a server that has identically configured hardware to the cluster as a fifth node.   You want each SQL Server instance to continue operating at the same level of performance in the event of a single node failure.   What should you do? ()A、 Clear the Affect group check box in the cluster resource properties for each SQL Server instance.B、 Configure the fifth node as the only possible owner other than the existing preferred owner of the cluster resources that are associated with each SQL Server instance.C、 Configure the fifth node as the preferred owner of each cluster group that contains an SQL Server instance.D、 Enable failback on each group that contains an SQL Server instance.

考题 You add a Windows Server 2008 R2 server with the Hyper-V role installed to an existing Hyper-V failover cluster.  After you move a virtual machine (VM) to the new cluster node, Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 reports the status of the VM as Unsupported Cluster Configuration. You need to be able to manage the VM by using VMM. What should you do?()A、Disable TCP Chimney Offload on the new cluster nodes network adaptersB、Disable the TCP/IP Offload Engine (TOE) on the new cluster nodes network adapters.C、Move the VM configuration file to a local storage device, and update the pointer to the file.D、Update the virtual networking configuration of the new cluster node to match the virtual networking configuration of the original cluster nodes.

考题 Company.com needs to add a new file system to an existing volume group that is being made  Highly available by HACMP? What is the best procedure that minimizes down time of the applications?()  A、 Use C-SPOC to add the file system while the cluster is running.B、 Add the file system,and them perform the exportvg and importvg on the required nodes.C、 Stop the cluster,add the new file system, and synchronize the cluster then restart HACMP.D、 Break the reservation locks on the disk drives while the cluster is active and add the file system.

考题 单选题What is a design consideration when using existing PCIe I/O drawers in a maximum bandwidth/throughput configuration on a new Power 750 system?()A The new system requires 1 installed processor card for the GX++ bus adapterB The new system requires a minimum of 2 installed processor cards for the GX++ bus adapterC The new system requires a minimum of 3 installed processor cards and the HPC InfiniBand cluster adapterD The new system requires 1 installed processor card for the GX++ bus adapter and the HPC InfiniBand cluster adapter

考题 多选题Certkiller .com boosts a two-node Network Load Balancing cluster which is called web. CK1 .com. The purpose of this cluster is to provide load balancing and high availability of the intranet website only. With monitoring the cluster, you discover that the users can view the Network Load Balancing cluster in their Network Neighborhood and they can use it to connect to various services by using the name web. CK1 .com.  You also discover that there is only one port rule configured for Network Load Balancing cluster.  You have to configure web. CK1 .com NLB cluster to accept HTTP traffic only.  Which two actions should you perform to achieve this objective()ACreate a new rule for TCP port 80 by using the Network Load Balancing Cluster consoleBRun the wlbs disable command on the cluster nodesCAssign a unique port rule for NLB cluster by using the NLB Cluster consoleDDelete the default port rules through Network Load Balancing Cluster console

考题 单选题A new administrator is performing fallover testing on a two-node cluster and is concerned that the cascading resource group belonging to Node ’A’ did not reintegrate properly after the cluster was restarted on Node ’A’. A stable cluster is reported by clstat,and clRGinfo reports the resource group online on Node ’B’.  What type of configuration would cause this type of behavior?()A  The resource group DNP has been configured.B  The resource group option CWOF has been enabled.C  The resource group option Inactive Takeover is set.D  A resource group fallback timer has been configured.

考题 多选题Which two statements are true about the WebLogic Cluster ?()AClustered Servers capacity can be increased by adding new server instance to the cluster on an existing machineBClustered Servers can be on a same or different machine with same operating system onlyCClustered Servers can only be on a same machine or different operating systemDClustered Servers can be on a same or different machine with same or different operating system

考题 单选题Which statement is true about "full state backup" in a Cisco Unified Computing System?()A  An XML file containing all details of the system, including IP address and cluster details B  A binary file containing only service profiles, pools, and other items configured after initial configurationC  A binary file containing all details of the system, including IP address and cluster detailsD  An XML file containing only service profiles, pools, and other items configured after initial configurationE  A text file with the NX-OS running configuration

考题 单选题You are a network administrator for your company. The network contains a perimeter network. The perimeter network contains four Windows Server 2003, Web Edition computers that are configured as a Network Load Balancing cluster.   The cluster hosts an e-commerce Web site that must be available 24 hours per day. The cluster is located in a physically secure data center and uses an Internet-addressable virtual IP address. All servers in the cluster are configured with the Hisecws.inf template.   You need to implement protective measures against the cluster’s most significant security vulnerability.   What should you do?  ()A  Use Encrypting File System (EFS) for all files that contain confidential data stored on the cluster.B  Use packet filtering on all inbound traffic to the cluster.C  Use Security Configuration and Analysis regularly to compare the security settings on all servers in the cluster with the baseline settings.D  Use intrusion detection on the perimeter network.

考题 单选题A customer wants to migrate their existing cluster onto new POWER6 hardware, and in addition requires thecluster to be migrated from PowerHA version 5.3 to 5.5. Given that AIX 6.1 and PowerHA 5.5 filesets arealready installed in the new hardware, which of the following methods would allow the customer to maintaintheir current cluster configuration?()A Add the new nodes to the existing cluster, and perform a rolling migration and remove the original nodesfrom the clusterB Add the new nodes to the existing cluster, and perform a non-disruptive upgrade and remove the originalnodes from the cluster.C Create a snapshot of the existing cluster and apply the snapshot to the new cluster. Start cluster serviceson the new cluster and stop the original clusterD Create a snapshot of the existing cluster and apply the snapshot to the new cluster. Stop cluster serviceson the original cluster and start on the new cluster

考题 单选题Company.com needs to add a new file system to an existing volume group that is being made  Highly available by HACMP? What is the best procedure that minimizes down time of the applications?()A  Use C-SPOC to add the file system while the cluster is running.B  Add the file system,and them perform the exportvg and importvg on the required nodes.C  Stop the cluster,add the new file system, and synchronize the cluster then restart HACMP.D  Break the reservation locks on the disk drives while the cluster is active and add the file system.

考题 单选题You have a Windows Server 2008 R2 Hyper-V failover cluster with a single iSCSI logical unit number (LUN) and one highly available virtual machine (HAVM). You manage the virtual environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You monitor the environment by using Microsoft System Center Operations Manager 2007 R2. You configure a new virtual machine (VM) by deploying a VHD from the VMM library and placing the VHD on the existing iSCSI LUN. You create a HAVM configuration, and you attach the VHD to the configuration. VMM reports the status of the VMs as Unsupported Cluster Configuration. You need to be able to manage the VMs by using VMM. What should you do?()A Move the VHD of one HAVM to a new iSCSI LUN.B Move the VHD of one HAVM to the system volume of a cluster node.C Configure Performance and Resource Optimization (PRO) on the Windows Server 2008 R2 cluster nodes.D Configure Windows System Resource Manager (WSRM) on the Windows Server 2008 R2 cluster nodes.

考题 多选题How can an Oracle WebLogic cluster’s capacity be increased ?()Aby adding server instances to the cluster on an existing machineBby adding machines to host server for more clustered instancesCby adding machines to the cluster to host the incremental server instancesDby adding node managers to an existing machine

考题 单选题The Acme Rocket Corporation is integrating their existing Octel voice mail system with Cisco CallManager Express. The Octel voice mail system has four ports and a voice mail pilot point of 53222. How should the CallManager Express be configured to support this integration? ()A A separate VoIP dial peer needs to be configured for the four pilot point numbers. B Four dial peers need to be configured with the same pilot point number. C Four ephone-dns and four ephones need to be configured with the same pilot point number. D Four ephones and four dial peers need to be configured with the same pilot point number. 

考题 单选题The en0 interface on Node1 of a two-node cluster has failed. This adapter is configured with a boot addressand under stable operations also has the service address of the cluster’s single resource group. The resourcegroup is configured with the fallback option. The HA network was configured for IPAT via aliasing and now theservice address is on the en1 interface in the cluster. The en0 interface has already been physically replacedand configured with the boot address. Which of the following will return the cluster to its original state andminimize cluster downtime?()A Run cluster synchronization.B Restart cluster services on Node1.C Perform a swap_adapter using C-SPOCD Restart cluster services on both nodes