网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
What are two valid Cluster load balancing methods? ()(Choose two.)
A

urlhash

B

backup chaining

C

least connections

D

fewest outstanding requests


参考答案

参考解析
解析: 暂无解析
更多 “多选题What are two valid Cluster load balancing methods? ()(Choose two.)AurlhashBbackup chainingCleast connectionsDfewest outstanding requests” 相关考题
考题 An enterprise has an internal web application that needs stickiness managed by a Cluster. Allemployees access the application through a proxy. What is the correct sticky load balancing policy? () A. urlhashB. url persistencyC. cookie persistencyD. default persistency

考题 What are two valid Cluster load balancing methods? ()(Choose two.) A. urlhashB. backup chainingC. least connectionsD. fewest outstanding requests

考题 What are three Juniper DX Cluster benefits?() (Choose three.) A. performanceB. authorizationC. compressionD. protocol validationE. UDP load balancing

考题 operate by distributing a workload evenly over multiple back end nodes.Typically the cluster will be configured with multiple redundant load-balancing front ends.A.High-availability clustersB.Load-balancing clustersC.Grid computingD.Cloud Computing

考题 What is Phantom RP used for?()A、it is used for load balancing in bidirectional PIMB、it is used for redundancy in bidirectional PIMC、it is used for redundancy in PIM-SMD、it is used for load balancing in PIM-SM

考题 What are three Juniper DX Cluster benefits?() (Choose three.)A、performanceB、authorizationC、compressionD、protocol validationE、UDP load balancing

考题 Your network contains a Web-based application that runs on Windows Server 2003. You plan to  migrate the Web-based application to Windows Server 2008 R2. You need to recommend a server  configuration to support the Web-based application. The server configuration must meet the following  requirements:   èEnsure that the application is available to all users if a single server?fails èSupport the installation of .NET applications èMinimize software costs  What should you recommend?() A、Install the Server Core installation of Windows Server 2008 R2 Standard on two servers. Configure the servers in a Network Load Balancing cluster.B、Install the full installation of Windows Server 2008 R2 Web on two servers. Configure the servers in a Network Load Balancing cluster.C、Install the full installation of Windows Server 2008 R2 Enterprise on two servers. Configure the servers in a failover cluster.D、Install the full installation of Windows Server 2008 R2 Datacenter on two servers. Configure the servers in a failover cluster.

考题 You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain.   You administer a Network Load Balancing cluster that consists of three nodes. Each node runs Windows Server 2003 and contains a single network adapter. The Network Load Balancing cluster can run only in unicast mode. The Network Load Balancing cluster has converged successfully.   To increase the utilization of the cluster, you decide to move a particular application to each node of the cluster. For this application to run, you must add a Network Load Balancing port rule to the nodes of the cluster.   You start Network Load Balancing Manager on the second node of the cluster. However, Network Load Balancing Manager displays a message that it cannot communicate with the other two nodes of the cluster.  You want to add the port rule to the nodes of the cluster.   What should you do?  ()A、 Use Network Load Balancing Manager on the Network Load Balancing default host to add the port rule.B、 Change the host priority of the second node to be the highest in the cluster, and then use Network Load Balancing Manager to add the port rule.C、 Run the nlb.exe drain command on each node, and then use Network Load Balancing Manager to add the port rule.D、 Add the port rule through Network Connections Properties on each node.

考题 Your company named Contoso, Ltd. has a two-node Network Load Balancing cluster. The cluster is intended to provide high availability and load balancing for only the intranet Web site. The name of the cluster is web.contoso.com.  You discover that Contoso users can see the Network Load Balancing cluster in the network neighborhood and can connect to various services by using the web.contoso.com name. The web.contoso.com Network Load Balancing cluster is configured with only one port rule.  You need to configure the web.contoso.com Network Load Balancing cluster to accept only HTTP traffic. Which two actions should you perform?()A、Log on to one of the cluster nodes and run the wlbs disable all command.B、Open the Network Load Balancing Clusters console and delete the default port rules.C、Open the Network Load Balancing Clusters console and create a new Allow rule for TCP port 80.D、Open the Network Load Balancing Clusters console and change the default port rule to a disabled port range rule.

考题 You plan to deploy two virtual machines (VMs) that will be configured as nodes in a failover cluster. The VMs will run file and print services. You need to recommend a storage solution for the planned deployment. What should you include in the recommendation?()A、pass-through disksB、Network Load Balancing (NLB) for the Hyper-V hostsC、virtual machine queue (VMQ)D、Cluster Shared Volumes (CSV)E、an iSCSI Storage Area Network (SAN)F、a failover cluster for the Hyper-V hostsG、Network Load Balancing (NLB) for the VMsH、Network Attached Storage (NAS)I、Microsoft System Center Operations Manager with Performance and Resource Optimization (PRO)J、Windows System Resource Manager (WSRM)K、a failover cluster between the VMsL、Virtual Machine ChimneyM、Second-Level Address Translation (SLAT)N、quick migration

考题 You need to recommend a Windows Server 2008 R2 server configuration that meets the following  requirements:   èSupports the installation of Microsoft SQL Server 2008   èProvides redundancy for SQL services if a single server fails What should you recommend?() A、Install a Server Core installation of Windows Server 2008 R2 Enterprise on two servers. Configure the servers in a failover cluster.B、Install a full installation of Windows Server 2008 R2 Standard on two servers. Configure Network Load Balancing on the two servers.C、Install a full installation of Windows Server 2008 R2 Enterprise on two servers. Configure Network Load Balancing on the two servers.D、Install a full installation of Windows Server 2008 R2 Enterprise on two servers. Configure the servers in a failover cluster.

考题 You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain.   You administer a four-node Network Load Balancing cluster. All nodes run Windows Server 2003. The cluster has converged successfully. You use Network Load Balancing Manager on the default host to configure all nodes of the cluster.   The nodes have a single network adapter and are connected to the same switching hub device.   Administrators of non-cluster servers that are connected to the same switching hub device report that their servers receive traffic that is destined for the cluster nodes. Receiving this additional network traffic impairs the network performance of the non-cluster servers.   You need to ensure that traffic destined for only the cluster nodes is not sent to all ports of the switching hub device.  You do not want to move the cluster to another switching hub device.   What should you do? ()A、 On one node, run the nlb.exe reload command.B、 On each node, run the wlbs.exe drainstop command.C、 Use Network Load Balancing Manager to enable Internet Group Management Protocol (IGMP) support on the cluster.D、 Use Network Load Balancing Manager to add a second cluster IP address.

考题 You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You work in a company named Wiikigo, Ltd. and there is a two-node Network Load Balancing cluster. Onlythe intranet Web site will be provided with the high availability and load balancing by the cluster. Thecompany names the cluster as web.wiikigo.com. You find a problem that the Network Load Balancingcluster can be seen in the network neighborhood by the Wiikigo users. And the users can utilize the web.wiikigo.com name to get access to various services. The web.wiikigo.com Network Load Balancing clusteris set with only one port rule. Since you are the technical support, you are required have the web.wiikigo.com Network Load Balancing cluster configured to receive only HTTP traffic. Which two actions should be performed to achieve the goal?()A、To achieve the goal, the Network Load Balancing Clusters console should be opened and a new Allow rule should be created for TCP port 80.B、To achieve the goal, the Network Load Balancing Clusters console should be opened and the default port rule should be modified to a disabled port range rule.C、To achieve the goal, one of the cluster nodes should be logged on to and the wlbs disable all command should be run.D、To achieve the goal, the Network Load Balancing Clusters console should be opened and the default port rules should be deleted.

考题 Your network contains two servers that run the Server Core installation of Windows Server 2008 R2.  The two servers are part of a Network Load Balancing cluster. The cluster hosts a Web site.  Administrators use client computers that run Windows 7.   You need to recommend a strategy that allows the administrators to remotely manage the Network Load  Balancing cluster. Your strategy must support automation.  What should you recommend?()A、On the servers, enable Windows Remote Management (WinRM).B、On the servers, add the administrators to the Remote Desktop Users group.C、On the Windows 7 client computers,enable Windows Remote Management (WinRM).D、On the Windows 7 client computers,add the administrators to the Remote Desktop Users group.

考题 You are a network adminstrator for your company. You install an intranet application on three Windows Server 2003 computers. You configure the servers as a Network Load Balancing cluster. You configure each server with two network adapters. One network adapter provides client computers access to the servers. The second network adapter is for cluster communications. Cluster communications is on a separate network segment.   The network team wants to reduce the cluster’s vulnerability to attack. These servers need to be highly available. The network team decides that the Network Load Balancing cluster needs to filter IP ports. The team wants the cluster to allow only the ports that are required for the intranet application.   You need to implement filtering so that only the intranet application ports are available on the cluster. You need to achieve this goal by using the minimum amount of administrative effort.   What should you do?  ()A、 Use Network Load Balancing Manager to configure port rules. Allow only the intranet application ports on the cluster IP address.B、 Use TCP/IP filtering on each server. Configure only the intranet application ports on the network adapter that provides client computers access to the servers.C、 Use TCP/IP filtering on each server. Configure only the intranet application ports on both of the network adapters.D、 Configure Routing and Remote Access on each server. Use Routing and Remote Access input filters to allow only the intranet application ports on the network adapter that provides client computers access to the servers.

考题 单选题You plan to deploy two virtual machines (VMs) that will be configured as nodes in a failover cluster. The VMs will run file and print services. You need to recommend a storage solution for the planned deployment. What should you include in the recommendation?()A pass-through disksB Network Load Balancing (NLB) for the Hyper-V hostsC virtual machine queue (VMQ)D Cluster Shared Volumes (CSV)E an iSCSI Storage Area Network (SAN)F a failover cluster for the Hyper-V hostsG Network Load Balancing (NLB) for the VMsH Network Attached Storage (NAS)I Microsoft System Center Operations Manager with Performance and Resource Optimization (PRO)J Windows System Resource Manager (WSRM)K a failover cluster between the VMsL Virtual Machine ChimneyM Second-Level Address Translation (SLAT)N quick migration

考题 单选题An enterprise has an internal web application that needs stickiness managed by a Cluster. Allemployees access the application through a proxy. What is the correct sticky load balancing policy? ()A urlhashB url persistencyC cookie persistencyD default persistency

考题 单选题You have a Windows Server 2008 R2 Hyper-V failover cluster that has 16 nodes.  You plan to load-balance eight virtual machines (VMs) on the Hyper-V failover cluster by using network load balancing (NLB). You need to ensure that the NLB cluster converges.  What should you do?()A Set the NLB cluster type to MulticastB Dedicate a virtual network for all NLB trafficC Use static MAC addresses for the parent network adapterD Enable spoofing of MAC addresses on the virtual network adapter

考题 多选题Certkiller .com boosts a two-node Network Load Balancing cluster which is called web. CK1 .com. The purpose of this cluster is to provide load balancing and high availability of the intranet website only. With monitoring the cluster, you discover that the users can view the Network Load Balancing cluster in their Network Neighborhood and they can use it to connect to various services by using the name web. CK1 .com.  You also discover that there is only one port rule configured for Network Load Balancing cluster.  You have to configure web. CK1 .com NLB cluster to accept HTTP traffic only.  Which two actions should you perform to achieve this objective()ACreate a new rule for TCP port 80 by using the Network Load Balancing Cluster consoleBRun the wlbs disable command on the cluster nodesCAssign a unique port rule for NLB cluster by using the NLB Cluster consoleDDelete the default port rules through Network Load Balancing Cluster console

考题 单选题You need to design access to Microsoft Outlook Web Access for remote users. What should you do?()A Place all user mailboxes on back-end servers. Deploy Outlook Web Access on three front-end servers that are members of the Network Load Balancing clusterB Place all user mailboxes on back-end servers that are members of a Network Load Balancing cluster. Deploy Outlook Web Access on the back-end serversC Place mailboxes for remote users on one back-end server and place all mailboxes for main office users on another back-end server. Deploy Outlook Web Access on the back-end server that contains the mailboxes for remote usersD Place all user mailboxes on two back-end servers that are members of a Network Load Balancing cluster. Place mailboxes for remote users and mailboxes for main office users into separate storage groups. Deploy Outlook Web Access on three front-end servers. Configure the front-end servers to access only the back-end Network Load Balancing cluster

考题 单选题You need to design the Exchange 2003 server configuration for remote e-mail access. What should you do?()A Configure the front-end servers in each branch office to be members of a new Active Directory siteB Configure the back-end servers to have server encryption certificates issued by a commercial certification authority (CA)C Configure two back-end servers to be members of a Network Load Balancing cluster. Configure Network Load Balancing for inbound RPC connectionsD Configure multiple front-end servers in each branch office to be members of a Network Load Balancing cluster. Configure Network Load Balancing for inbound HTTPS connections

考题 多选题Your company named Contoso, Ltd. has a two-node Network Load Balancing cluster. The cluster isintended to provide high availability and load balancing for only the intranet Web site. The name of the cluster is web.contoso.com. You discover that Contoso users can see the Network Load Balancingcluster in the network neighborhood and can connect to various services by using the web.contoso.comname. The web.contoso.com Network Load Balancing cluster is configured with only one port rule. Youneed to configure the web.contoso.com Network Load Balancing cluster to accept only HTTP traffic. Which two actions should you perform?()ALog on to one of the cluster nodes and run the wlbs disable all command.BOpen the Network Load Balancing Clusters console and delete the default port rules.COpen the Network Load Balancing Clusters console and create a new Allow rule for TCP port 80.DOpen the Network Load Balancing Clusters console and change the default port rule to a disabled port range rule.

考题 多选题What are two valid initial configuration methods supported on Juniper routers?()ACLIBJ-WebCJUNOScopeDPCMCIA flash card

考题 多选题The EtherChannel between your LAN switch and the Internet router is not load-balancing efficiently. On the switch, there are several workstations with valid IP ranges. Which load-balance algorithms can you use in the switch in order to optimize this load balancing?()Asource IP addressBdestination IP addressCper-packet load balanceDdestination MAC addressEsource MAC address

考题 多选题What are three Juniper DX Cluster benefits?() (Choose three.)AperformanceBauthorizationCcompressionDprotocol validationEUDP load balancing

考题 单选题You need to design a configuration for the mailbox servers. What should you do?()A Create two Exchange Server 2003 computers. Place the mailboxes for main office users on one server, and place the mailboxes for remote users on the other serverB Create a Network Load Balancing cluster that contains two Exchange Server 2003 computers. Place half of the user mailboxes on one server, and place half of the user mailboxes on the other serverC Create a Microsoft Cluster Server cluster that contains two Exchange Server 2003 computers. Place all of the user mailboxes on one server and configure the other server as a failover nodeD Create a Microsoft Cluster Server cluster that contains two Exchange Server 2003 computers. Place half of the user mailboxes on one server, and place half of the user mailboxes on the other server

考题 多选题What are two functions that the parameter max-session performs? ()(Choose two.)ADefines the session limit for the domain.BDefines the session limit for the tunnel instance.CUsed to control load balancing between multiple domains.DUsed to control load balancing between multiple tunnels for a domain.