网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
During initial cluster planning session, a requirement is mandated that application monitoring will  Be used to monitor the production database and three application servers. Since all the application servers rely on the database being active, only one resource group has been planned to manage the starting/stopping of the cluster resources.  How ill the initial design impact the use of application monitoring?()
A

 Only one application server per resource group can be monitored.

B

 Process monitoring is part of RSCT and requires no special scripts.

C

 Any application can be monitored as long as it has an application server.

D

 Having all application servers in one resource group improves recovery time.


参考答案

参考解析
解析: 暂无解析
更多 “单选题During initial cluster planning session, a requirement is mandated that application monitoring will  Be used to monitor the production database and three application servers. Since all the application servers rely on the database being active, only one resource group has been planned to manage the starting/stopping of the cluster resources.  How ill the initial design impact the use of application monitoring?()A  Only one application server per resource group can be monitored.B  Process monitoring is part of RSCT and requires no special scripts.C  Any application can be monitored as long as it has an application server.D  Having all application servers in one resource group improves recovery time.” 相关考题
考题 Which tool must be used to analyze all of the database operations performed by an application against a DB2 for i5/OS database?() A.Visual ExplainB.Activity MonitorC.SQL Performance MonitorD.DB2 Performance Monitor

考题 Because Web servers are platform. and application (71) ,they can send or request data fromlegacy or external application including database.All replies,once converted into (72) arkup language,can then be transmitted to a (73) .Used in this way,Intranets can (74) lower desktop support costs,easy links with legacy application and databases and, (75) all,ease of use.(62)A.coupledB.dependentC.independentD.related

考题 A cluster administrator decides ti implement application monitoring in order to monitor both a web application and its supporting database. The plan is to use a single resource group prod_rg and to configure one monitor method for the web app and one monitor method for the database.  Which of the following statements best describes the need for custom resource monitor?()  A、 Multiple application servers must be in a single resource group.B、 Multiple application servers per resource group may be monitored.C、 Multiple resource groups must each contain a single application server.D、 Multiple application servers in a cluster cannot use process monitoring.

考题 Which tool must be used to analyze all of the database operations performed by an application against a DB2 for i5/OS database?()A、Visual ExplainB、Activity MonitorC、SQL Performance MonitorD、DB2 Performance Monitor

考题 An enterprise has three nodes: -Node ’A’ is a production database, -Node ’B’ is a production  Application server, and -Node ’C’ is a test and development node. Node ’C’ is used by six programmers to develop and the production application as business critical and would like to make it highly available with HACMP. Application development and testing is not business critical.  Which of the following describes the best solution?()  A、 There is not an adequate solution because HACMP should not be configured in this environment without a dedicated standby node.B、 Nodes ’A’ and ’B’ should be configured in a cluster with mutual fallover of two cascading resource groups to provide both nodes will deliver acceptable response time with both resource groups.C、 Nodes ’A’ and ’C’ should be configured in one cluster, and Nodes ’B’ and ’C’ in another cluster to prevent both the database and application server from falling over to Node ’C’ at the same time.D、 Nodes ’A’, ’B’, and ’C’ should be configured in a cluster with Node ’C’ the hot standby for both the database and application server resource groups. Workload Manager (WLM) must be configured on database and application developers from over utilizing the CPU resources.

考题 During initial cluster planning session, a requirement is mandated that application monitoring will  Be used to monitor the production database and three application servers. Since all the application servers rely on the database being active, only one resource group has been planned to manage the starting/stopping of the cluster resources.  How ill the initial design impact the use of application monitoring?()  A、 Only one application server per resource group can be monitored.B、 Process monitoring is part of RSCT and requires no special scripts.C、 Any application can be monitored as long as it has an application server.D、 Having all application servers in one resource group improves recovery time.

考题 Company.com has installed HACMP and is configuring a three-node cluster. One of the Applications  uses the AIX hostname as a key for authorization to execute on the specific computer. The application vendor was contacted and consented to having multiple copies of the application but required that only one application be active at any one point in time.  How can the AIX host name dependency be managed in an HACMP environment.()  A、 It cannot be managed because the application will not work properly with HACMP.B、 The application start and stop script for the application can manage the hostname.C、 HACMP will require customization to correctly manage a change in the hostname since it is tied to the primary network adapter.D、 HACMP will have to be restarted if the hostname is changed. This can be done with customization in the node_up and node_down event scripts.

考题 To enhance the availability of an application running under HACMP, a decision was made to use  The application monitoring facility. The application consists of several components and can take several minutes to initialize. The components use socket communication and can be initialized in any order as long as it is a serial order. The customer’s concern is that if the application stop and start scripts are used during application monitoring recovery,it may take an extraordinary length of time to reset all of the application components.  What can be done to ensure the best recover time?()   A、 Use a process monitor that restarts the named processes in the original start order.B、 Use the defined application start and stop scripts to control the application if there is a failure.C、 Use multiple application monitors for this resource group to enable the monitoring of the specific components of the resource group.D、 Use application cleanup and restart scripts designed to determine the state of the various components of the application and start only the parts required.

考题 An administrator is evaluating an application for application monitoring. What command should be  Used to determine if the application can be monitored with a process monitor?()  A、 pa auxB、 ps -elC、 ps -efD、 ps -pl

考题 A user has an application server LPAR with a physical Ethernet adapter. They want to have a database LPAR also connected to the application LPAR via virtual Ethernet. Their security policies require a firewall between the application LPAR and database LPAR. Which of the following virtual Ethernet configurations satisfies the customer’s requirements?()A、The application server,firewall,and database server on the same VLANB、The application server and firewall on one VLAN,and the database server on a second VLANC、The application server on one VLAN,and the database server and firewall on a second VLAND、The application server and firewall on one VLAN,and the firewall and database server on a second VLAN

考题 You work as a database administrator for Certkiller .com. You have been asked to use a centralized administrative tool to administer your database servers and application servers. In order to achieve the objective, which component would you configure on each database server?()A、Database ControlB、Management ServerC、Management RepositoryD、Application Server ControlE、Oracle Management Agent

考题 You are a database administrator for your company. The company uses a vendor company’s application that is based on a proprietary database. You query data from the application database and import the data into a SQL Server 2005 database. The application vendor provides you with a new OLE DB driver to be used when querying the application database. Company policy prohibits connections between the SQL Server database and the application database, except when querying this data. You need to provide a way to query data from the application database. What should you?()A、Configure a Linked Server connection to the application database.B、Write a query that uses an OPENDATASOURCE command.C、Write a query that uses an OPENQUERY command.D、Configure a Remote Server connection to the application database.

考题 You are the network administrator for Testking.com. The TestKing network contains seven application servers. Each application server runs a database application named TestKingApp. Requirements for TestKingApp state that when you add a new user, you must add the user to the server that has the most available disk space. You need to ensure that you meet the requirements when you add new users to TestKingApp. What should you do?()A、Use Event Viewer to review the application logs on each of the seven servers.B、Use Performance Logs and Alerts to record the PhysicalDisk object on all seven servers.C、Use Task Manager to view the performance data on each of the seven servers.D、Use System Monitor to generate a histogram view of the LogicalDisk object on all seven servers.

考题 You are planning the migration of an existing application to Windows Azure and SQL Azure.  The original application includes a Microsoft SQL Server 2008 database.   You need to recommend an approach for ensuring that the database migrates successfully toSQL Azure.  Which two actions should you recommend?()A、 Remove all clustered indexes from the database.B、 Remove all dependencies on the Microsoft Distributed Transaction Coordinator (MSDTC) from the application.C、 Use SSL and SQL authentication to connect to the database.D、 Use SSL and Windows authentication to connect to the database.

考题 You are upgrading the database servers that are used by all of the companys applications. As the first step in the upgrade, you upgrade the development database servers. You need to verify that the upgrade of the database servers did not introduce any errors into the databases. What should you do?() A、Execute unit test scripts for each stored procedure in each database.B、Execute the stored procedures in the SQL Server Management Studio debugger, and verify the results.C、Set the database compatibility level on the database servers to 80.D、Execute the application user interface test scripts to verify proper operation.

考题 You are a network adminstrator for your company. You install an intranet application on three Windows Server 2003 computers. You configure the servers as a Network Load Balancing cluster. You configure each server with two network adapters. One network adapter provides client computers access to the servers. The second network adapter is for cluster communications. Cluster communications is on a separate network segment.   The network team wants to reduce the cluster’s vulnerability to attack. These servers need to be highly available. The network team decides that the Network Load Balancing cluster needs to filter IP ports. The team wants the cluster to allow only the ports that are required for the intranet application.   You need to implement filtering so that only the intranet application ports are available on the cluster. You need to achieve this goal by using the minimum amount of administrative effort.   What should you do?  ()A、 Use Network Load Balancing Manager to configure port rules. Allow only the intranet application ports on the cluster IP address.B、 Use TCP/IP filtering on each server. Configure only the intranet application ports on the network adapter that provides client computers access to the servers.C、 Use TCP/IP filtering on each server. Configure only the intranet application ports on both of the network adapters.D、 Configure Routing and Remote Access on each server. Use Routing and Remote Access input filters to allow only the intranet application ports on the network adapter that provides client computers access to the servers.

考题 单选题You are upgrading the database servers that are used by all of the companys applications. As the first step in the upgrade, you upgrade the development database servers. You need to verify that the upgrade of the database servers did not introduce any errors into the databases. What should you do?()A Execute unit test scripts for each stored procedure in each database.B Execute the stored procedures in the SQL Server Management Studio debugger, and verify the results.C Set the database compatibility level on the database servers to 80.D Execute the application user interface test scripts to verify proper operation.

考题 单选题To enhance the availability of an application running under HACMP, a decision was made to use  The application monitoring facility. The application consists of several components and can take several minutes to initialize. The components use socket communication and can be initialized in any order as long as it is a serial order. The customer’s concern is that if the application stop and start scripts are used during application monitoring recovery,it may take an extraordinary length of time to reset all of the application components.  What can be done to ensure the best recover time?()A  Use a process monitor that restarts the named processes in the original start order.B  Use the defined application start and stop scripts to control the application if there is a failure.C  Use multiple application monitors for this resource group to enable the monitoring of the specific components of the resource group.D  Use application cleanup and restart scripts designed to determine the state of the various components of the application and start only the parts required.

考题 单选题You are a database administrator for your company. The company uses a vendor company’s application that is based on a proprietary database. You query data from the application database and import the data into a SQL Server 2005 database. The application vendor provides you with a new OLE DB driver to be used when querying the application database. Company policy prohibits connections between the SQL Server database and the application database, except when querying this data. You need to provide a way to query data from the application database. What should you?()A Configure a Linked Server connection to the application database.B Write a query that uses an OPENDATASOURCE command.C Write a query that uses an OPENQUERY command.D Configure a Remote Server connection to the application database.

考题 单选题An enterprise has three nodes: -Node ’A’ is a production database, -Node ’B’ is a production  Application server, and -Node ’C’ is a test and development node. Node ’C’ is used by six programmers to develop and the production application as business critical and would like to make it highly available with HACMP. Application development and testing is not business critical.  Which of the following describes the best solution?()A  There is not an adequate solution because HACMP should not be configured in this environment without a dedicated standby node.B  Nodes ’A’ and ’B’ should be configured in a cluster with mutual fallover of two cascading resource groups to provide both nodes will deliver acceptable response time with both resource groups.C  Nodes ’A’ and ’C’ should be configured in one cluster, and Nodes ’B’ and ’C’ in another cluster to prevent both the database and application server from falling over to Node ’C’ at the same time.D  Nodes ’A’, ’B’, and ’C’ should be configured in a cluster with Node ’C’ the hot standby for both the database and application server resource groups. Workload Manager (WLM) must be configured on database and application developers from over utilizing the CPU resources.

考题 单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains an application server running Windows Server 2003.   Users report intermittent slow performance when they access the application server throughout the day. You find out that the network interface on the application server is being heavily used during the periods of slow performance. You suspect that a single computer is causing the problem.You need to create a plan to identify the problem computer.   What should you do?()A  Monitor the performance monitor counters on the application server by using System Monitor.  B  Monitor the network traffic on the application server by using Network Monitor.C  Monitor network statistics on the application server by using Task Manager.D  Run network diagnostics on the application server by using Network Diagnostics.

考题 单选题A cluster administrator decides ti implement application monitoring in order to monitor both a web application and its supporting database. The plan is to use a single resource group prod_rg and to configure one monitor method for the web app and one monitor method for the database.  Which of the following statements best describes the need for custom resource monitor?()A  Multiple application servers must be in a single resource group.B  Multiple application servers per resource group may be monitored.C  Multiple resource groups must each contain a single application server.D  Multiple application servers in a cluster cannot use process monitoring.

考题 单选题You are the network administrator for Testking.com. The TestKing network contains seven application servers. Each application server runs a database application named TestKingApp. Requirements for TestKingApp state that when you add a new user, you must add the user to the server that has the most available disk space. You need to ensure that you meet the requirements when you add new users to TestKingApp. What should you do?()A Use Event Viewer to review the application logs on each of the seven servers.B Use Performance Logs and Alerts to record the PhysicalDisk object on all seven servers.C Use Task Manager to view the performance data on each of the seven servers.D Use System Monitor to generate a histogram view of the LogicalDisk object on all seven servers.

考题 单选题You are a network adminstrator for your company. You install an intranet application on three Windows Server 2003 computers. You configure the servers as a Network Load Balancing cluster. You configure each server with two network adapters. One network adapter provides client computers access to the servers. The second network adapter is for cluster communications. Cluster communications is on a separate network segment.   The network team wants to reduce the cluster’s vulnerability to attack. These servers need to be highly available. The network team decides that the Network Load Balancing cluster needs to filter IP ports. The team wants the cluster to allow only the ports that are required for the intranet application.   You need to implement filtering so that only the intranet application ports are available on the cluster. You need to achieve this goal by using the minimum amount of administrative effort.   What should you do?  ()A  Use Network Load Balancing Manager to configure port rules. Allow only the intranet application ports on the cluster IP address.B  Use TCP/IP filtering on each server. Configure only the intranet application ports on the network adapter that provides client computers access to the servers.C  Use TCP/IP filtering on each server. Configure only the intranet application ports on both of the network adapters.D  Configure Routing and Remote Access on each server. Use Routing and Remote Access input filters to allow only the intranet application ports on the network adapter that provides client computers access to the servers.

考题 单选题A user has an application server LPAR with a physical Ethernet adapter. They want to have a database LPAR also connected to the application LPAR via virtual Ethernet. Their security policies require a firewall between the application LPAR and database LPAR. Which of the following virtual Ethernet configurations satisfies the customer’s requirements?()A The application server,firewall,and database server on the same VLANB The application server and firewall on one VLAN,and the database server on a second VLANC The application server on one VLAN,and the database server and firewall on a second VLAND The application server and firewall on one VLAN,and the firewall and database server on a second VLAN

考题 单选题Which components are installed on the middle tier in a WebSphere Commerce V 5.6 three-tier configuration (i.e. in a three-node topology)?()A WebSphere Commerce Server, WebSphere Application Server and Web server pluginB WebSphere Application Server, Database Client and Web server pluginC WebSphere Commerce Server, Database Server and WebSphere Application ServerD WebSphere Commerce Server, WebSphere Application Server and Database ClientE Web server, WebSphere Commerce Server and WebSphere Application Server

考题 单选题Which tool must be used to analyze all of the database operations performed by an application against a DB2 for i5/OS database?()A Visual ExplainB Activity MonitorC SQL Performance MonitorD DB2 Performance Monitor