网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
An administrator will use the discovery process to capture information about common cluster storage. Whichof the following commands should the administrator run on each participating node against the shared diskhdisk3 to ensure that this disk is successfully identified by the discovery process?()
A
chpv -ay hdisk3
B
cfgmgr -l hdisk3
C
chdev l hdisk3 a pv=yes
D
chdev l hdisk3 a reserve_policy=no_reserve
参考答案
参考解析
解析:
暂无解析
更多 “单选题An administrator will use the discovery process to capture information about common cluster storage. Whichof the following commands should the administrator run on each participating node against the shared diskhdisk3 to ensure that this disk is successfully identified by the discovery process?()A chpv -ay hdisk3B cfgmgr -l hdisk3C chdev l hdisk3 a pv=yesD chdev l hdisk3 a reserve_policy=no_reserve” 相关考题
考题
An administrator is experiencing availability issues on a Linux server. The administrator decides tocheck the server for an IP address conflict on the server. Which of the following commands should the administrator use?()A.tracerouteB.tracertC.ifconfigD.ipconfig
考题
An administrator will use the discovery process to capture information about common cluster storage. Whichof the following commands should the administrator run on each participating node against the shared diskhdisk3 to ensure that this disk is successfully identified by the discovery process?()A、chpv -ay hdisk3B、cfgmgr -l hdisk3C、chdev l hdisk3 a pv=yesD、chdev l hdisk3 a reserve_policy=no_reserve
考题
An administrator has encountered a problem with a particular piece of software installed on the server and begins the troubleshooting process. Which of the following is the FIRST place the administrator should look for specific information about the problem?()A、The supporting documentationB、The vendor websiteC、The InternetD、The server event logs
考题
An administrator is experiencing availability issues on a Linux server. The administrator decides tocheck the server for an IP address conflict on the server. Which of the following commands should the administrator use?()A、tracerouteB、tracertC、ifconfigD、ipconfig
考题
A cluster administrator is trying to configure tmssa for the non-IP network. Having installed the devices.ssa.tm.rte fileset, what is the next step that must be performed to create the target mode devices?() A、 Reboot each cluster node.B、 Change the ssa node number to a non-zero value.C、 Change the SSAR device state from defined to available.D、 Run the cfgmgr process on each node to create the target mode devices.
考题
An administrator runs clstat on a cluster node and receives the following response: ’Can not get Cluster Information.’ Which of the following daemons may need to be started in order to correct this problem?()A、 topsvcsB、 clinfoESC、 snmpinfoD、 clsmuxpdES
考题
An administrator will be performing a PowerHA upgrade on a cluster from version 5.3 to version 5.5. Which ofthe following tasks will verify a successful migration?()A、Use the clstat command and verify the cluster is in a stable stateB、After each node is upgraded, run a verification and synchronizationC、After all nodes are upgraded, run a verification and synchronizationD、Take a snapshot of each node and verify the configuration is the same
考题
An administrator is planning for a six node cluster but is concerned about the administration needed tomanage user accounts throughout the cluster. What PowerHA feature could the administrator use to reducethe administration overhead?()A、LDAP Authentication ModuleB、Smart Assist for Active DirectoryC、C-SPOC for user and password managementD、File Collections designating one node as the primary authentication node
考题
A cluster administrator has been asked to install HACMP on two nodes with the following hardware: -two CPUs, - 1GB RAM, - one 1 36GB drive, -two 10/100/1000 Ethernet adapters, and -GB Fibre Channel adapters dual attached to SAN storage. In order to eliminate single points of failure,the administrator should first add which of the following:() A、 an additional 1GB RAM to each node.B、 Another bootable mirrored disk drive.C、 A 10/100/1000 GB Ethernet adapter to be attached to a redundant switch.D、 Nothing,because this is a viable cluster solution with no single points of failure.
考题
Company.com performs cluster verification every Sunday night with a corn job. The systems administrator reviews the /var/hacmp/clverify/clverify.log on Monday morning and notice that cluster verification posted a message about inconsistent filesystem names in one of the shared volume groups. What should the administrator do?() A、 Cause a fallover to occur on the resource group.B、 Export the volume groups and re-import them on all nodes.C、 Run an importvg -L command on all the nodes in the cluster.D、 Investiage recent changes to the shared volume group and use C-SPOC to correct inconsistencies.
考题
A system administrator needs to replace a mirrored disk. After performing the proper removal process and replacing the disk, which of the following set of commands should be performed to bring the disk back into production?()A、 reboot, mklvcopy, syncvg B、 cfgmgr -vl ssar, chvg -va, syncvg C、 cfgmgr, extendvg, syncvg D、 extendvg, mklvcopy, syncvg
考题
You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain. You administer a Network Load Balancing cluster that consists of three nodes. Each node runs Windows Server 2003 and contains a single network adapter. The Network Load Balancing cluster can run only in unicast mode. The Network Load Balancing cluster has converged successfully. To increase the utilization of the cluster, you decide to move a particular application to each node of the cluster. For this application to run, you must add a Network Load Balancing port rule to the nodes of the cluster. You start Network Load Balancing Manager on the second node of the cluster. However, Network Load Balancing Manager displays a message that it cannot communicate with the other two nodes of the cluster. You want to add the port rule to the nodes of the cluster. What should you do? ()A、 Use Network Load Balancing Manager on the Network Load Balancing default host to add the port rule.B、 Change the host priority of the second node to be the highest in the cluster, and then use Network Load Balancing Manager to add the port rule.C、 Run the nlb.exe drain command on each node, and then use Network Load Balancing Manager to add the port rule.D、 Add the port rule through Network Connections Properties on each node.
考题
单选题An administrator will be performing a PowerHA upgrade on a cluster from version 5.3 to version 5.5. Which ofthe following tasks will verify a successful migration?()A
Use the clstat command and verify the cluster is in a stable stateB
After each node is upgraded, run a verification and synchronizationC
After all nodes are upgraded, run a verification and synchronizationD
Take a snapshot of each node and verify the configuration is the same
考题
单选题An administrator runs clstat on a cluster node and receives the following response: ’Can not get Cluster Information.’ Which of the following daemons may need to be started in order to correct this problem?()A
topsvcsB
clinfoESC
snmpinfoD
clsmuxpdES
考题
单选题You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain. You administer a Network Load Balancing cluster that consists of three nodes. Each node runs Windows Server 2003 and contains a single network adapter. The Network Load Balancing cluster can run only in unicast mode. The Network Load Balancing cluster has converged successfully. To increase the utilization of the cluster, you decide to move a particular application to each node of the cluster. For this application to run, you must add a Network Load Balancing port rule to the nodes of the cluster. You start Network Load Balancing Manager on the second node of the cluster. However, Network Load Balancing Manager displays a message that it cannot communicate with the other two nodes of the cluster. You want to add the port rule to the nodes of the cluster. What should you do? ()A
Use Network Load Balancing Manager on the Network Load Balancing default host to add the port rule.B
Change the host priority of the second node to be the highest in the cluster, and then use Network Load Balancing Manager to add the port rule.C
Run the nlb.exe drain command on each node, and then use Network Load Balancing Manager to add the port rule.D
Add the port rule through Network Connections Properties on each node.
考题
单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now in a high security environment, you manage a SQL Server 2008 cluster. You intend to configure and use encrypted connections for the clustered virtual SQL Server. You have to install a certificate. The cetification will be used for encryption. What should you do?()A
In the cluster quorum drive, install the encryption certificate B
In the SQL Server shared disk, install the encryption certificate C
in the cluster group, install the encryption certificate. D
On each individual node, install the encryption certificate
考题
单选题An administrator is planning for a six node cluster but is concerned about the administration needed tomanage user accounts throughout the cluster. What PowerHA feature could the administrator use to reducethe administration overhead?()A
LDAP Authentication ModuleB
Smart Assist for Active DirectoryC
C-SPOC for user and password managementD
File Collections designating one node as the primary authentication node
考题
单选题A cluster administrator has been asked to install HACMP on two nodes with the following hardware: -two CPUs, - 1GB RAM, - one 1 36GB drive, -two 10/100/1000 Ethernet adapters, and -GB Fibre Channel adapters dual attached to SAN storage. In order to eliminate single points of failure,the administrator should first add which of the following:()A
an additional 1GB RAM to each node.B
Another bootable mirrored disk drive.C
A 10/100/1000 GB Ethernet adapter to be attached to a redundant switch.D
Nothing,because this is a viable cluster solution with no single points of failure.
考题
单选题A System p administrator found a process on the server that should be stopped. Which of the following commands can be used to list all the signal actions defined for this process()A
psB
pstatC
lssigD
procsig
考题
单选题Node ’C’ has just completed reintegration in a three-node cluster. The hacmp.out logifle displays The event node_up_complete for Node ’C’. The cluster administrator wishes to verify that the cluster is stable. In addition to reviewing the cluster log files,what utility should be run to verify the cluster state?()A
clstatB
clinfoC
cldiagD
clverify
考题
单选题An administrator will use the discovery process to capture information about common cluster storage. Whichof the following commands should the administrator run on each participating node against the shared diskhdisk3 to ensure that this disk is successfully identified by the discovery process?()A
chpv -ay hdisk3B
cfgmgr -l hdisk3C
chdev l hdisk3 a pv=yesD
chdev l hdisk3 a reserve_policy=no_reserve
考题
单选题Two MAG4610s are running in an active/passive cluster configuration. The system administrator is planning to apply a service package to the cluster.Which process should the administrator follow?()A
Perform the upgrade on the active node of the cluster. When completed, the node reboots and then pushes the service package to the passive node automatically.B
Perform the upgrade on the passive node of the cluster. When completed, the node reboots and then pushes the service package to the active node automatically.C
On the clustering status page, disable the active node. Perform the upgrade on the disabled node. When completed and the node reboots, enable the node on the clustering status page.Repeat the process on the passive node.D
On the clustering status page, disable the passive node. Perform the upgrade on the disabled node. When completed and the node reboots, enable the node on the clustering status page.Repeat the process on the active node.
考题
单选题An administrator is experiencing availability issues on a Linux server. The administrator decides tocheck the server for an IP address conflict on the server. Which of the following commands should the administrator use?()A
tracerouteB
tracertC
ifconfigD
ipconfig
考题
单选题Company.com performs cluster verification every Sunday night with a corn job. The systems administrator reviews the /var/hacmp/clverify/clverify.log on Monday morning and notice that cluster verification posted a message about inconsistent filesystem names in one of the shared volume groups. What should the administrator do?()A
Cause a fallover to occur on the resource group.B
Export the volume groups and re-import them on all nodes.C
Run an importvg -L command on all the nodes in the cluster.D
Investiage recent changes to the shared volume group and use C-SPOC to correct inconsistencies.
考题
单选题An administrator has encountered a problem with a particular piece of software installed on the serverand begins the troubleshooting process. Which of the following is the FIRST place the administrator should look for specific information about the problem?()A
The supporting documentationB
The vendors websiteC
The InternetD
The servers event logs
考题
单选题An administrator has encountered a problem with a particular piece of software installed on the server and begins the troubleshooting process. Which of the following is the FIRST place the administrator should look for specific information about the problem?()A
The supporting documentationB
The vendor websiteC
The InternetD
The server event logs
考题
单选题A cluster administrator is trying to configure tmssa for the non-IP network. Having installed the devices.ssa.tm.rte fileset, what is the next step that must be performed to create the target mode devices?()A
Reboot each cluster node.B
Change the ssa node number to a non-zero value.C
Change the SSAR device state from defined to available.D
Run the cfgmgr process on each node to create the target mode devices.
考题
单选题A system administrator needs to replace a mirrored disk. After performing the proper removal process and replacing the disk, which of the following set of commands should be performed to bring the disk back into production?()A
reboot, mklvcopy, syncvg B
cfgmgr -vl ssar, chvg -va, syncvg C
cfgmgr, extendvg, syncvg D
extendvg, mklvcopy, syncvg
热门标签
最新试卷