网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
The user base of a three-node cluster has increased. In order to add clustered users to all nodes, which of the following steps should be performed?()
A

 On one of the nodes,add the users via C-SPOC ’Add a User to the Cluster’smit menu.

B

 Use C-SPOC to synchronize the password files between cluster nodes.

C

 On all of the nodes,add the users to the /etc/passwd and system security files,and then synchronize the cluster.

D

 On one of the nodes,add the users to the /tec/passwd and system security files,add home directories,and use cron to automate the movement of system security files between nodes.


参考答案

参考解析
解析: 暂无解析
更多 “单选题The user base of a three-node cluster has increased. In order to add clustered users to all nodes, which of the following steps should be performed?()A  On one of the nodes,add the users via C-SPOC ’Add a User to the Cluster’smit menu.B  Use C-SPOC to synchronize the password files between cluster nodes.C  On all of the nodes,add the users to the /etc/passwd and system security files,and then synchronize the cluster.D  On one of the nodes,add the users to the /tec/passwd and system security files,add home directories,and use cron to automate the movement of system security files between nodes.” 相关考题
考题 Which command would you use to enable chassis cluster on an SRX device, setting the cluster ID to 1 and node to 0?() A. user@host# set chassis cluster cluster-id 1 node 0 rebootB. user@host set chassis cluster id 1 node 0 rebootC. user@host set chassis cluster cluster-id 1 node 0 rebootD. user@host# set chassis cluster id 1 node 0 reboot

考题 A base operating system has just been installed, successfully rebooted, and the user is now logged in as root. The user wants the server software bundle installed, but has additional software that must be installed with the bundle. Which of the following procedures should be performed to complete the installation?()A.Add the software to /usr/sys/inst.imagesB.Update the bundle file in /usr/sys/inst.imagesC.Install the bundle filelists and run update allD.Add the software to the bundle file in /usr/sys/inst.data/sys_bundles

考题 下面是一个用户自定义的消息,哪一种消息定义是正确的?( )A.WM_MyMessage=User_Base+100B.WM_MyMessage=CM_Base+100C.WM_MyMessage=WM_Base+100D.WM_MyMessage=WM_USER+100

考题 A new HACMP maintenance level has recently been released. An administrator is creating a  project plan that is required for applying the updates for a three-node production cluster.  To minimize downtime,what is the best way to accomplish the updates on all cluster nodes?()  A、 Perform a graceful takeover one node at a time and apply the updates.B、 Perform the updates on all nodes simultaneously using C-SPOC utilities.C、 Perform the updates on node at a time with the cluster software active.D、 Perform a graceful stop of all cluster nodes and apply updates to all nodes.

考题 If both nodes in a chassis cluster initialize at different times, which configuration example will allow you to ensure that the node with the higher priority will become primary for your RGs other than RG0?()A、[edit chassis cluster] user@host# show redundancy-group 1 { node 0 priority 200; node 1 priority 150;preempt; }B、[edit chassis cluster] user@host# show redundancy-group 1 { node 0 priority 200; node 1 priority 150; monitoring; }C、[edit chassis cluster] user@host# show redundancy-group 1 { node 0 priority 200; node 1 priority 150; control-link-recovery; }D、[edit chassis cluster] user@host# show redundancy-group 1 { node 0 priority 200; node 1 priority 150; strict-priority; }

考题 When the rc.cluster script is executed, cluster processes are started in what orde?()A、 topsvcs,clstrmgr,clsmuxpd,grpsvcs,emsvcs,clinfoB、 topsvcs,grpsvcs,emsvcs,clstrmgr,clsmupxpd,clinfoC、 clstrmgr,clsmuxpd,clinfo,topsvcs,grpsvcs,emsvcsD、 clstrmgr,topsvcs,clxmuxpd,clinfo,grpsvcs,emsvcs

考题 During a cluster functionality test, and administrator performs a graceful stop for Node ’B’ in a three-node cluster. What is the expected state of the cluster after Node ’B’successfully completes?()  A、 All cluster resources halt on Node ’B’,and one or both surviving nodes will gracefully acquire the resources.B、 All cluster processes halt on Node ’B’,the cluster resources remain active,and the remaining  nodes take no action.C、 All cluster processes stay active on Node ’B’,cluster resources are halted,and the remaining nodes take no action.D、 All cluster resources will stop,cluster processes halt on Node ’B’,and the remaining cluster nodes take no action.

考题 A user has changed their password using the passwd command, and notices that the change is only made tothe local node. When the administrator changes the user’s password from the command line using the passwd command thechange is made cluster-wide. What is the most likely cause of this problem?()A、The user has a UID less than 200B、The user has been defined as an administrative userC、The file /usr/es/sbin/cluster/clpasswd is not executable by the userD、The user needs explicit authorization to change their password cluster-wide

考题 An administrator has written a script to check that the contents of an application configuration file are identicalon all cluster nodes. The script has also been associated with a user defined custom verification method. Theadministrator would like the contents of this file to be checked and verified automatically on a daily basis.How can this be achieved?()A、By using a job scheduler such as cronB、By enabling automatic cluster verificationC、By including the script name in the file /usr/es/sbin/cluster/etc/clverify.rcD、By including the custom method name in the file /usr/es/sbin/cluster/etc/rc.authomethods

考题 Company.com has a three-node cluster (Node ’A’, Node ’B’, and Node ’C’) with three resource  Groups (rg1, rg2, and rg3). Node ’A’ has twice as many CPUs and twice as much memory as the two test add development Nodes ’B’ and ’C’. During normal production processing, all resource groups are active on Node ’A’.  What is most efficient way to configure the cluster to manage the workload?()   A、 Use thee cascading resource groups where ’rg1’ and ’rg2’ fallover to Node ’B’ and ’rg3’ falls over to Node ’C’B、 Use Dynamic Node Priority resource groups with a priority chain consisting of Node ’A’ then Node ’B’ then Node ’C’C、 Use three rotating resource groups with ’rg1’ and ’rg2’ falling over to node ’B’ and ’rg3’ falling over to Node ’C’D、 Upgrade Nodes ’B’ and ’C’ to be equal to Node ’A in CPU and memory resources to enable the cluster to synchronize three resource groups

考题 A three-node cluster experienced a node failure. The resource groups were acquired as cexpected. The node has been repaired,and HACMP has been restarted.  How does the operator determine that the node has successfully re-integrated into the cluster?()  A、 Use the clstat command.B、 Use the cIRGinfor command.C、 Tail the /etc/hacmp.out file and wait for "node_up_complete" to finish successfully.D、 Tail the /usr/es/adm/cluster.log file and wait for "node_up_complete" to finish successfully.

考题 An administrator is configuring a new cluster and has a requirement for a notification to be generated if the /tmp File System becomes greater than 90% full. Which of the following PowerHA components will support theadministrator’s requirement?()A、Pre-defined EventsB、User-defined EventsC、Remote notification methodsD、The integration between RMC and WebSM

考题 A cluster node has been started and has not acquired the resources in the resource groups.  Which log file will show the details of any event script processing that has occurred?()  A、 /tmp/hacmp.outB、 /tmp/clstrmgr.debugC、 /usr/es/adm/cluster.logD、 /var/adm/hacmp/hacmp.out

考题 The user base of a three-node cluster has increased. In order to add clustered users to all nodes, which of the following steps should be performed?()  A、 On one of the nodes,add the users via C-SPOC ’Add a User to the Cluster’smit menu.B、 Use C-SPOC to synchronize the password files between cluster nodes.C、 On all of the nodes,add the users to the /etc/passwd and system security files,and then synchronize the cluster.D、 On one of the nodes,add the users to the /tec/passwd and system security files,add home directories,and use cron to automate the movement of system security files between nodes.

考题 A base operating system has just been installed, successfully rebooted, and the user is now logged in as root. The user wants the server software bundle installed, but has additional software that must be installed with the bundle. Which of the following procedures should be performed to complete the installation?()A、Add the software to /usr/sys/inst.imagesB、Update the bundle file in /usr/sys/inst.imagesC、Install the bundle filelists and run update allD、Add the software to the bundle file in /usr/sys/inst.data/sys_bundles

考题 Which command would you use to enable chassis cluster on an SRX device, setting the cluster ID to 1 and node to 0?()A、user@host# set chassis cluster cluster-id 1 node 0 rebootB、user@host set chassis cluster id 1 node 0 rebootC、user@host set chassis cluster cluster-id 1 node 0 rebootD、user@host# set chassis cluster id 1 node 0 reboot

考题 You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain.   You administer a three-node Network Load Balancing cluster. Each cluster node runs Windows Server 2003 and has a single network adapter. The cluster has converged successfully.   You notice that the nodes in the cluster run at almost full capacity most of the time. You want to add a fourth node to the cluster. You enable and configure Network Load Balancing on the fourth node.   However, the cluster does not converge to a four-node cluster. In the System log on the existing three nodes, you find the exact same TCP/IP error event. The event has the following description: "The system detected an address conflict for IP address 10.50.8.70 with the system having network hardware address 02:BF://0A:32:08:46."   In the System log on the new fourth node, you find a similar TCP/error event with the following description: "The system detected an address conflict for IP address 10.50.8.70 with the system having network hardware address 03:BF://0A:32:08:46." Only the hardware address is different in the two descriptions.  You verify that IP address 10.50.8.70 is configured as the cluster IP address on all four nodes.  You want to configure a four-node Network Load Balancing cluster.   What should you do?  ()A、 Configure the fourth node to use multicast mode.B、 Remove 10.50.8.70 from the Network Connections Properties of the fourth node.C、 On the fourth node, run the nlb.exe resume command.D、 On the fourth node, run the wlbs.exe reload command.

考题 单选题A user has changed their password using the passwd command, and notices that the change is only made tothe local node. When the administrator changes the user’s password from the command line using the passwd command thechange is made cluster-wide. What is the most likely cause of this problem?()A The user has a UID less than 200B The user has been defined as an administrative userC The file /usr/es/sbin/cluster/clpasswd is not executable by the userD The user needs explicit authorization to change their password cluster-wide

考题 单选题The user base of a three-node cluster has increased. In order to add clustered users to all nodes, which of the following steps should be performed?()A  On one of the nodes,add the users via C-SPOC ’Add a User to the Cluster’smit menu.B  Use C-SPOC to synchronize the password files between cluster nodes.C  On all of the nodes,add the users to the /etc/passwd and system security files,and then synchronize the cluster.D  On one of the nodes,add the users to the /tec/passwd and system security files,add home directories,and use cron to automate the movement of system security files between nodes.

考题 单选题Node ’C’ has just completed reintegration in a three-node cluster. The hacmp.out logifle displays  The event node_up_complete for Node ’C’. The cluster administrator wishes to verify that the cluster is stable.  In addition to reviewing the cluster log files,what utility should be run to verify the cluster state?()A  clstatB  clinfoC  cldiagD  clverify

考题 单选题A three-node cluster experienced a node failure. The resource groups were acquired as cexpected. The node has been repaired,and HACMP has been restarted.  How does the operator determine that the node has successfully re-integrated into the cluster?()A  Use the clstat command.B  Use the cIRGinfor command.C  Tail the /etc/hacmp.out file and wait for node_up_complete to finish successfully.D  Tail the /usr/es/adm/cluster.log file and wait for node_up_complete to finish successfully.

考题 单选题When the rc.cluster script is executed, cluster processes are started in what orde?()A  topsvcs,clstrmgr,clsmuxpd,grpsvcs,emsvcs,clinfoB  topsvcs,grpsvcs,emsvcs,clstrmgr,clsmupxpd,clinfoC  clstrmgr,clsmuxpd,clinfo,topsvcs,grpsvcs,emsvcsD  clstrmgr,topsvcs,clxmuxpd,clinfo,grpsvcs,emsvcs

考题 单选题During a cluster functionality test, and administrator performs a graceful stop for Node ’B’ in a three-node cluster. What is the expected state of the cluster after Node ’B’successfully completes?()A  All cluster resources halt on Node ’B’,and one or both surviving nodes will gracefully acquire the resources.B  All cluster processes halt on Node ’B’,the cluster resources remain active,and the remaining  nodes take no action.C  All cluster processes stay active on Node ’B’,cluster resources are halted,and the remaining nodes take no action.D  All cluster resources will stop,cluster processes halt on Node ’B’,and the remaining cluster nodes take no action.

考题 单选题You need to design a configuration for the mailbox servers. What should you do?()A Create two Exchange Server 2003 computers. Place the mailboxes for main office users on one server, and place the mailboxes for remote users on the other serverB Create a Network Load Balancing cluster that contains two Exchange Server 2003 computers. Place half of the user mailboxes on one server, and place half of the user mailboxes on the other serverC Create a Microsoft Cluster Server cluster that contains two Exchange Server 2003 computers. Place all of the user mailboxes on one server and configure the other server as a failover nodeD Create a Microsoft Cluster Server cluster that contains two Exchange Server 2003 computers. Place half of the user mailboxes on one server, and place half of the user mailboxes on the other server

考题 多选题Your company has an Active Directory Domain Services (AD DS) domain. You have a Windows Server 2008 R2 Hyper-V server. You manage the virtual environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You need to ensure that a user can create new virtual machines (VMs) on only a specific set of servers . The user must not be able to see or manage servers outside of that set within VMM . Which two actions should you perform?()ACreate a host group. Add the host servers that the user will manage to the host group.BCreate a failover cluster. Join the host servers that the user will manage to the failover cluster.CUsing Authorization Manager, assign the user to a role with the necessary permission to manage the servers by using VMM.DUsing Authorization Manager, assign the user to a role with the necessary permission to manage the servers by using the VMM Self-Service Portal.

考题 单选题The en0 interface on Node1 of a two-node cluster has failed. This adapter is configured with a boot addressand under stable operations also has the service address of the cluster’s single resource group. The resourcegroup is configured with the fallback option. The HA network was configured for IPAT via aliasing and now theservice address is on the en1 interface in the cluster. The en0 interface has already been physically replacedand configured with the boot address. Which of the following will return the cluster to its original state andminimize cluster downtime?()A Run cluster synchronization.B Restart cluster services on Node1.C Perform a swap_adapter using C-SPOCD Restart cluster services on both nodes

考题 单选题A new HACMP maintenance level has recently been released. An administrator is creating a  project plan that is required for applying the updates for a three-node production cluster.  To minimize downtime,what is the best way to accomplish the updates on all cluster nodes?()A  Perform a graceful takeover one node at a time and apply the updates.B  Perform the updates on all nodes simultaneously using C-SPOC utilities.C  Perform the updates on node at a time with the cluster software active.D  Perform a graceful stop of all cluster nodes and apply updates to all nodes.

考题 单选题An administrator has written a script to check that the contents of an application configuration file are identicalon all cluster nodes. The script has also been associated with a user defined custom verification method. Theadministrator would like the contents of this file to be checked and verified automatically on a daily basis.How can this be achieved?()A By using a job scheduler such as cronB By enabling automatic cluster verificationC By including the script name in the file /usr/es/sbin/cluster/etc/clverify.rcD By including the custom method name in the file /usr/es/sbin/cluster/etc/rc.authomethods