网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

What is required during the initial creation of a cluster?()

  • A、 Nothing,because HACMP will discover the configuration
  • B、 The cluster name and a TCP/IP path to each of the nodes
  • C、 The cluster name and ID and a TCP/IP path to each of the nodes
  • D、 The cluster name and ID node names and a TCP/IP path to each of the nodes

参考答案

更多 “What is required during the initial creation of a cluster?()A、 Nothing,because HACMP will discover the configurationB、 The cluster name and a TCP/IP path to each of the nodesC、 The cluster name and ID and a TCP/IP path to each of the nodesD、 The cluster name and ID node names and a TCP/IP path to each of the nodes” 相关考题
考题 Continuous availability is required for an application in a two-node cluster. There is one rotating resource group in the cluster, and the nodes are identical machines. Client telnet connections to the application cannot be broken because it takes 20 to 30 minutes to recycle the client workstations and transactions will be lost.  What configuration best provides continuous connectivity to the application?()   A、 IPAT using IP Replacement without MAC address takeover.B、 IPAT using IP Aliasing and hardware MAC address takeover.C、 None because continuous telnet connectivity cannot be provided with HACMP.D、 Shared service IP address assigned to multiple network interface cards on each node.

考题 An administrator is installing PowerHA filesets, and this cluster will be cross-mounting filesystems using NFSversion 4. Which additional fileset is required?()A、bos.net.tcp.clientB、cluster.es.nfs.rteC、bos.nfsv4.server.rteD、cluster.es.nfs.server

考题 A cluster script failed because it was unable to set the hostname, and the Cluster Manager reported the event failure. What must be done prior to sue the "HACMP Problem Determination Tools" - "Recover From Script Failure" to have the Cluster Manager resume cluster processing?()  A、 Nothing, the "Recover From Script Failure" will correct the issue.B、 Disable and re-enable the effected Ethernet adapter by using ifconfig.C、 Correct the error by setting the hostname on the effected node from the command line.D、 Verify that the clinfo daemon is running prior to executing the "recover from scriptfailure".

考题 Company.com has a cluster with nodes that support "hot swap" adapters. During an upgrade of  The network infrastructure,an additional network adapter has been added to the nodes and configured in AIX.  What is the next step required to add this adapter to HACMP?()  A、 Stop the node.B、 Stop the cluster.C、 Run autodiscovery.D、 Configure the IP adapter.

考题 An administrator has added an additional network adapter to each cluster node. The adapters  have been configured and tested, and the /etc/hosts file has been updated. However,the adapters do not appear in the pick list when the administrator tries to define the adapters to HACMP.  What would be required to correct this problem?()  A、 Rerun autodiscovery.B、 Synchronize the cluster.C、 Restart cluster services.D、 Delete and recreate the adapters.

考题 A customer synchronizes the cluster in a virtualized environment. During the process the following warning isdisplayed: "For nodes with a single Network Interface Card per logical network configured, it is recommended to includethe file ’/usr/es/sbin/cluster/netmon.cf’ with a pingable IP address as described in the PowerHA PlanningGuide". What should the customer do next?()A、Ignore the warning as synchronization completed successfully.B、Populate the /usr/es/sbin/cluster/netmon.cf file with one or many IP addresses external to the cluster.C、Create another virtual adapter on each node and set-up PowerHA networking in a more traditional fashionD、Populate the /usr/es/sbin/cluster/netmon.cf file with any of the boot IP addresses on one of the othercluster nodes

考题 While performing a site survey to document the existing environment before implementing a new HACMP cluster, it was discovered that a port filtering firewall was being used to protect the production system. The plan is to continue using the firewall and add a second firewall to avoid a single point of failure. Each node in the two-node cluster will have all of its network adapters connected to the firewalls, and all connections to the nodes will pass through these firewalls.  What must be considered about HACMP in a firewall environment?()  A、 Firewalls are not supported in a HACMP environment.B、 HACMP uses only TCP/IP so firewalls are not relevant.C、 Specific ports must be open for HACMP communications.D、 Dynamic routing must be used to properly route packets in a firewall-protected environment.

考题 In a cluster using /etc/hosts for name resolution, which of the following describes the minimum requirementsfor the /etc/hosts file?()A、IP address and IP label of each service and boot interface in the clusterB、IP address and IP label of each service and boot interface in the cluster, loopback interface, and the hostname of the nodeC、IP address and IP label of each service and boot interface in the cluster, the loopbackinterface, and the cluster gatewayD、IP address and IP label of each service and boot interface in the cluster, the loopbackinterface, the cluster gateway, and the subnet network addresses

考题 An architect is configuring a PowerHA cluster in the following way:The cluster will consist of two nodes. Each node will have two boot interfaces configured as a single PowerHA network. The cluster is to have asingle resource group with a single service address.Heartbeating over aliased is not to be used. What is the minimum number of subnets required to implement this cluster?()A、1B、2C、3D、4

考题 During Company.com planning session, the network administrator discusses the requirements of having a persistent MAC address associated with the IP Service address.  How can this be accomplished using HACMP?()  A、 Enable routed to handle dynamic route creation.B、 Use IPAT via IP aliasing and define the required MAC address.C、 Add the Service IP Label to the /etc/cluster/ping_client_list.D、 Use IPAT via IP replacement and define the required MAC address.

考题 One service IP label and one volume group are assigned to a resource group in a cluster. An  Additional service IP label and volume group need to be added to the resource group.  How can this be done with the minimum disruption of the cluster?()  A、 Make the changes in HACMP and synchronize the cluster.B、 It cannot, because changes like this cannot be made while the cluster is running.C、 Make the changes in HACMP and wait until the next failure for the changes to take affect.D、 Use the forced option to stop the cluster,make the changes,and restart cluster services.

考题 While reviewing the HACMP log file, a warning message appears stating that a custom event script could not be found. A check of the current path settings indicates that all required paths are present.  What step can be taken to correct the missing paths issues during cluster event processing?()  A、 Move the custom script to a different location such as /usr/sbin.B、 Include required paths at the start of the custom script.C、 Synchronize and verify the cluster to ensure both nodes are the same.D、 Create a pre event that sets the correct paths and executes the script.

考题 Which three statements are true when working with high-availability clusters?()A、The valid cluster-id range is between 0 and 255.B、JUNOS security devices can belong to more than one cluster if cluster virtualization is enabled.C、If the cluster-id value is set to 0 on a JUNOS security device, the device will not participate in the cluster.D、A reboot is required if the cluster-id or node value is changed.E、JUNOS security devices can belong to one cluster only.

考题 When configuring a single SRX210 as a firewall enforcer to a MAG4610 active/passive cluster, which statement supports a fault-tolerant configuration?()A、The cluster VIP is defined on the MAG4610 cluster, and the VIP of the cluster is defined as an instance on the SRX Series device.B、The cluster VIP is not defined on the MAG4610 cluster, and the IP address of both the active and passive nodes of the cluster are defined as separate instances on the SRX Series device.C、The cluster VIP is defined on the MAG4610 cluster, and the IP address of the active node is defined as an instance on the SRX Series device.D、The cluster VIP is not defined on the MAG4610 cluster, and the IP address of the passive node is defined as an instance on the SRX Series device.

考题 You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain.   You administer a three-node Network Load Balancing cluster. Each cluster node runs Windows Server 2003 and has a single network adapter. The cluster has converged successfully.   You notice that the nodes in the cluster run at almost full capacity most of the time. You want to add a fourth node to the cluster. You enable and configure Network Load Balancing on the fourth node.   However, the cluster does not converge to a four-node cluster. In the System log on the existing three nodes, you find the exact same TCP/IP error event. The event has the following description: "The system detected an address conflict for IP address 10.50.8.70 with the system having network hardware address 02:BF://0A:32:08:46."   In the System log on the new fourth node, you find a similar TCP/error event with the following description: "The system detected an address conflict for IP address 10.50.8.70 with the system having network hardware address 03:BF://0A:32:08:46." Only the hardware address is different in the two descriptions.  You verify that IP address 10.50.8.70 is configured as the cluster IP address on all four nodes.  You want to configure a four-node Network Load Balancing cluster.   What should you do?  ()A、 Configure the fourth node to use multicast mode.B、 Remove 10.50.8.70 from the Network Connections Properties of the fourth node.C、 On the fourth node, run the nlb.exe resume command.D、 On the fourth node, run the wlbs.exe reload command.

考题 You add a Windows Server 2008 R2 server with the Hyper-V role installed to an existing Hyper-V failover cluster.  After you move a virtual machine (VM) to the new cluster node, Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 reports the status of the VM as Unsupported Cluster Configuration. You need to be able to manage the VM by using VMM. What should you do?()A、Disable TCP Chimney Offload on the new cluster nodes network adaptersB、Disable the TCP/IP Offload Engine (TOE) on the new cluster nodes network adapters.C、Move the VM configuration file to a local storage device, and update the pointer to the file.D、Update the virtual networking configuration of the new cluster node to match the virtual networking configuration of the original cluster nodes.

考题 You are a network adminstrator for your company. You install an intranet application on three Windows Server 2003 computers. You configure the servers as a Network Load Balancing cluster. You configure each server with two network adapters. One network adapter provides client computers access to the servers. The second network adapter is for cluster communications. Cluster communications is on a separate network segment.   The network team wants to reduce the cluster’s vulnerability to attack. These servers need to be highly available. The network team decides that the Network Load Balancing cluster needs to filter IP ports. The team wants the cluster to allow only the ports that are required for the intranet application.   You need to implement filtering so that only the intranet application ports are available on the cluster. You need to achieve this goal by using the minimum amount of administrative effort.   What should you do?  ()A、 Use Network Load Balancing Manager to configure port rules. Allow only the intranet application ports on the cluster IP address.B、 Use TCP/IP filtering on each server. Configure only the intranet application ports on the network adapter that provides client computers access to the servers.C、 Use TCP/IP filtering on each server. Configure only the intranet application ports on both of the network adapters.D、 Configure Routing and Remote Access on each server. Use Routing and Remote Access input filters to allow only the intranet application ports on the network adapter that provides client computers access to the servers.

考题 Certkiller .com boosts a two-node Network Load Balancing cluster which is called web. CK1 .com. The purpose of this cluster is to provide load balancing and high availability of the intranet website only. With monitoring the cluster, you discover that the users can view the Network Load Balancing cluster in their Network Neighborhood and they can use it to connect to various services by using the name web. CK1 .com.  You also discover that there is only one port rule configured for Network Load Balancing cluster.  You have to configure web. CK1 .com NLB cluster to accept HTTP traffic only.  Which two actions should you perform to achieve this objective()A、Create a new rule for TCP port 80 by using the Network Load Balancing Cluster consoleB、Run the wlbs disable command on the cluster nodesC、Assign a unique port rule for NLB cluster by using the NLB Cluster consoleD、Delete the default port rules through Network Load Balancing Cluster console

考题 单选题Company.com has a cluster with nodes that support "hot swap" adapters. During an upgrade of  The network infrastructure,an additional network adapter has been added to the nodes and configured in AIX.  What is the next step required to add this adapter to HACMP?()A  Stop the node.B  Stop the cluster.C  Run autodiscovery.D  Configure the IP adapter.

考题 单选题In a cluster using /etc/hosts for name resolution, which of the following describes the minimum requirementsfor the /etc/hosts file?()A IP address and IP label of each service and boot interface in the clusterB IP address and IP label of each service and boot interface in the cluster, loopback interface, and the hostname of the nodeC IP address and IP label of each service and boot interface in the cluster, the loopbackinterface, and the cluster gatewayD IP address and IP label of each service and boot interface in the cluster, the loopbackinterface, the cluster gateway, and the subnet network addresses

考题 单选题One service IP label and one volume group are assigned to a resource group in a cluster. An  Additional service IP label and volume group need to be added to the resource group.  How can this be done with the minimum disruption of the cluster?()A  Make the changes in HACMP and synchronize the cluster.B  It cannot, because changes like this cannot be made while the cluster is running.C  Make the changes in HACMP and wait until the next failure for the changes to take affect.D  Use the forced option to stop the cluster,make the changes,and restart cluster services.

考题 单选题An administrator has added an additional network adapter to each cluster node. The adapters  have been configured and tested, and the /etc/hosts file has been updated. However,the adapters do not appear in the pick list when the administrator tries to define the adapters to HACMP.  What would be required to correct this problem?()A  Rerun autodiscovery.B  Synchronize the cluster.C  Restart cluster services.D  Delete and recreate the adapters.

考题 多选题Which three statements are true when working with high-availability clusters?()AThe valid cluster-id range is between 0 and 255.BJUNOS security devices can belong to more than one cluster if cluster virtualization is enabled.CIf the cluster-id value is set to 0 on a JUNOS security device, the device will not participate in the cluster.DA reboot is required if the cluster-id or node value is changed.EJUNOS security devices can belong to one cluster only.

考题 单选题You are a network adminstrator for your company. You install an intranet application on three Windows Server 2003 computers. You configure the servers as a Network Load Balancing cluster. You configure each server with two network adapters. One network adapter provides client computers access to the servers. The second network adapter is for cluster communications. Cluster communications is on a separate network segment.   The network team wants to reduce the cluster’s vulnerability to attack. These servers need to be highly available. The network team decides that the Network Load Balancing cluster needs to filter IP ports. The team wants the cluster to allow only the ports that are required for the intranet application.   You need to implement filtering so that only the intranet application ports are available on the cluster. You need to achieve this goal by using the minimum amount of administrative effort.   What should you do?  ()A  Use Network Load Balancing Manager to configure port rules. Allow only the intranet application ports on the cluster IP address.B  Use TCP/IP filtering on each server. Configure only the intranet application ports on the network adapter that provides client computers access to the servers.C  Use TCP/IP filtering on each server. Configure only the intranet application ports on both of the network adapters.D  Configure Routing and Remote Access on each server. Use Routing and Remote Access input filters to allow only the intranet application ports on the network adapter that provides client computers access to the servers.

考题 单选题What is required during the initial creation of a cluster?()A  Nothing,because HACMP will discover the configurationB  The cluster name and a TCP/IP path to each of the nodesC  The cluster name and ID and a TCP/IP path to each of the nodesD  The cluster name and ID node names and a TCP/IP path to each of the nodes

考题 多选题Certkiller .com boosts a two-node Network Load Balancing cluster which is called web. CK1 .com. The purpose of this cluster is to provide load balancing and high availability of the intranet website only. With monitoring the cluster, you discover that the users can view the Network Load Balancing cluster in their Network Neighborhood and they can use it to connect to various services by using the name web. CK1 .com.  You also discover that there is only one port rule configured for Network Load Balancing cluster.  You have to configure web. CK1 .com NLB cluster to accept HTTP traffic only.  Which two actions should you perform to achieve this objective()ACreate a new rule for TCP port 80 by using the Network Load Balancing Cluster consoleBRun the wlbs disable command on the cluster nodesCAssign a unique port rule for NLB cluster by using the NLB Cluster consoleDDelete the default port rules through Network Load Balancing Cluster console

考题 单选题An architect is configuring a PowerHA cluster in the following way:The cluster will consist of two nodes. Each node will have two boot interfaces configured as a single PowerHA network. The cluster is to have asingle resource group with a single service address.Heartbeating over aliased is not to be used. What is the minimum number of subnets required to implement this cluster?()A 1B 2C 3D 4