网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
While reviewing the HACMP log file, a warning message appears stating that a custom event script could not be found. A check of the current path settings indicates that all required paths are present. What step can be taken to correct the missing paths issues during cluster event processing?()
- A、 Move the custom script to a different location such as /usr/sbin.
- B、 Include required paths at the start of the custom script.
- C、 Synchronize and verify the cluster to ensure both nodes are the same.
- D、 Create a pre event that sets the correct paths and executes the script.
参考答案
更多 “ While reviewing the HACMP log file, a warning message appears stating that a custom event script could not be found. A check of the current path settings indicates that all required paths are present. What step can be taken to correct the missing paths issues during cluster event processing?() A、 Move the custom script to a different location such as /usr/sbin.B、 Include required paths at the start of the custom script.C、 Synchronize and verify the cluster to ensure both nodes are the same.D、 Create a pre event that sets the correct paths and executes the script.” 相关考题
考题
Your network contains a server named Server1 that runs Windows Server 2008 R2.You need to ensure that an administrator is notified by e-mail if the Event Viewer logs any error.What should you do from the Event Viewer console?()A. Create a custom view, and then click the Filter Current Custom View action.B. Create a custom view, and then click the Attach Task to This Custom View action.C. From the System log, click the Filter Current Log action.D. From the System log, select an Error event, and then click the Attach Task to This Event action.
考题
During the startup of a Windows XP Professional workstation, a message appears stating a service failed to start. Which of the following administrative areas will show what service failed?()
A. Registry utilityB. MSCONFIG utilityC. Control PanelD. Event Viewer
考题
A router is running BGP and receives more than one route for a particular prefix. Assume all the routes for this prefix have the same attributes.Which three path features would be reasons be for the rou ter to ignore some of the routes and not consider them as candidates for the best path?()A. paths from an internal BGP (iBGP) neighbor if the local autonomous system (AS) appears in the AS_PATHB. paths for which the NEXT_HOP is inaccess ibleC. paths from an external BGP (eBGP) neighbor if the local autonomous system (AS) appears in the AS_PATHD. paths for which the NEXT_HOP is accessibleE. paths that are marked as synchronized in the show ip bgp outputF. paths that are marked as not synchronized in the show ip bgp output
考题
The Testking network is utilizing RIP as the IP routing protocol. Router TK1 learns how to reach the same destination via 6 different paths. All paths have the same metric and administrative distance.With all routers using the default operation,which of the paths will be chosen to reach the destination?()A. Only the first two paths that are learned.B. Four of the paths.C. All six routes in a routed robin fashion.D. The oldest two paths in the routing table.E. The first path learned to the destination network.
考题
A router is running BGP and receives more than one route for a particular prefix. Assume all the routes for this prefix have the same attributes. Which three path features would be reasons be for the rou ter to ignore some of the routes and not consider them as candidates for the best path?()A、paths from an internal BGP (iBGP) neighbor if the local autonomous system (AS) appears in the AS_PATHB、paths for which the NEXT_HOP is inaccess ibleC、paths from an external BGP (eBGP) neighbor if the local autonomous system (AS) appears in the AS_PATHD、paths for which the NEXT_HOP is accessibleE、paths that are marked as synchronized in the show ip bgp outputF、paths that are marked as not synchronized in the show ip bgp output
考题
A storage specialist needs to automate some tasks triggered in the event of disaster recovery. What is the best solution to accomplish this()A、using the DS GUI, step through Real Time Manager, Copy Services, Create custom scripts; actions and event conditions can be defined that triggerthe script; there is no need for a passwordB、create a shell script usingdscli commands; trigger the script from the operating system, and call the script using the -pwd option with the passwordC、create a password file; create a shell script using dscli commands; trigger the script from the operating systemD、create a password file; create a shell script usingdscli commands; trigger the script from the operating system; call the dscli script with the dscli -script -pwdfile command
考题
An administrator has written a script to check that the contents of an application configuration file are identicalon all cluster nodes. The script has also been associated with a user defined custom verification method. Theadministrator would like the contents of this file to be checked and verified automatically on a daily basis.How can this be achieved?()A、By using a job scheduler such as cronB、By enabling automatic cluster verificationC、By including the script name in the file /usr/es/sbin/cluster/etc/clverify.rcD、By including the custom method name in the file /usr/es/sbin/cluster/etc/rc.authomethods
考题
During the startup of a Windows XP Professional workstation, a message appears stating a service failed to start. Which of the following administrative areas will show what service failed?()A、Registry utilityB、MSCONFIG utilityC、Control PanelD、Event Viewer
考题
In the past several months, manual intervention has been required to correct improper cluster configuration changes. The administrator received a directive from management to create a more effective strategy for making the changes required fro month-end processing. How can HACMP be used to meet the requirements of management’s directive?() A、 Create a snapshot for each of the required cluster configurations.B、 Create a custom snapshot method to handle the configuration changes.C、 Create a custom verification method to verify configuration changes.D、 Create a cluster custom event to mange required configuration changes.
考题
What is the difference between 1+1 and 1:1 protection switching?()A、 1+1 is based on APS, while 1:1 is based on IPS.B、 1:1 is used in SNCP switching, while 1+1 is used in MS-SPRing switching.C、 1+1 sends signals on Working and Protect paths, while 1:1 sends signals only on Working path.D、 1+1 sends signals on Working path ONLY, while 1:1 sends signals on both Working and Protect paths.
考题
What is the FIRST and most important step in system troubleshooting?()A、back up the system dataB、gather information about the problemC、try rebooting the system to see if that fixes the problemD、check the System Error Log or Event Log
考题
After Microsoft Windows boots, a message appears stating that a service failed to start. Which of the following can be used to find more information about this error?()A、Disk ManagerB、Control PanelC、Start MenuD、Event Viewer
考题
An administrator is reviewing the /tmp/hacmp.out after an unsuccessful fallover and notice that the event stop_server PROD_DB failed. Besides manually intervening,what step must be performed to return the cluster to a stable state?() A、 Recover From HACMP Script Failure.B、 Release Locks Set By Dynamic Reconfiguration.C、 Rerun HACMP cluster verification and synchronization.D、 Restore HACMP configuration Database From Active Configuration.
考题
Company.com has non-IBM fibre attached storage. The storage is connected to a node in the cluster that has multiple adapters and virtual paths. There is a concern about detecting the loss of one of the fibre adapters since there is no indication to the administrator that one has failed. What feature of HACMP can be sued to assist with this issue?() A、 Disk heartbeatB、 Error notificationC、 Event notificationD、 Application monitor
考题
A cluster node has been started and has not acquired the resources in the resource groups. Which log file will show the details of any event script processing that has occurred?() A、 /tmp/hacmp.outB、 /tmp/clstrmgr.debugC、 /usr/es/adm/cluster.logD、 /var/adm/hacmp/hacmp.out
考题
While reviewing the hacmp.out after a node failure,an administrator realizes that the custom Event queue_down did not execute. The queue_down event shows up when a list of custom events is displayed. What would be the next logical step to resolve this problem?()A、 Delete the custom event and add a pre event and synchronize.B、 Synchronize the cluster and recheck the cluster custom events.C、 Create an application server that will stop and start the queues.D、 Add a pre or post event to appropriate cluster events and synchronize.
考题
During a cluster synchronization, an administrator inadvertently performs al ctrl ’C’ causing the synchronization to fail. After restarting the resynchronization, the administrator notices a message stating that a previous dare operation has been detected. What is the best way to resolve this problem?() A、 Perform a ’Recover from HACMP Script Failure’.B、 Perform a ’Release Lock Set By Dynamic Reconfiguration’.C、 Perform a graceful stop an start of all cluster processing.D、 Perform a ’Restore HACMP Configuration Database from Active Configuration’.
考题
In which scenario will you issue the following command?() SQL RECOVER DATABASE UNTIL TIME ’2005-10-04 : 12:09:08’ USING BACKUP CONTROLFILE;A、 when all the control files are missing and only a binary backup of the current control file existsB、 when a multiplexed copy of the current control file is missingC、when all the control files are missing and only a script containing the CREATE CONTROLFILE statement existsD、 when the SPFILE is missing
考题
You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003. A member server named Testking1 runs IIS and hosts all content for company Web sites. One Web site is redesigned. When you browse the redesigned site, you select a hyperlink and receive the following error message: "HTTP Error 404 - File or directory not found." You verify that a necessary content file is missing from Testking1. You need to discover whether the same error was generated by any other Web server requests. What should you do?()A、Open the most recent file in C:/windows/system32/inetsrv/History. Search for error entries of type 404.B、Open the most recent file in C:/windows/system32/LogFiles/W3SVC1. Search for error entries of type 404.C、Open Event Viewer and connect to Testking1. Filter the system event log to display only events from the IISLOG event source with event ID 404.D、Open Event Viewer and connect to Testking1. Filter the application event log to display only events from the WebClient event source with event ID 404.
考题
You have 15 computers that run Windows 7. You need to implement a monitoring solution that meets thefollowing requirements. Sends an e-mail notification when an application error is logged in the event log Runs a script to restart the computer if an application error occurs between 17:00 and 07:00 Minimizes the administrative effort required to monitor applications. What should you do?()A、On all the computers, configure a custom view. Configure a custom task for the application error events.B、On a computer, configure a custom view to display the application errors. Configure a custom task forthe application error events.C、On a central computer, configure an event subscription. On all of the computers, configure a customtask in the Forwarded Events log.D、On all the computers, configure an event subscription to a central computer. On the central computer,configure a custom task in the Forwarded Events log.
考题
You are the network administrator for the Berlin office of The company network consists of a single Active Directory domain named The Berlin office contains 15 file servers that contain confidential files. All the file servers run either Windows Server 2003 or Windows 2000 Server. All the file servers are in the BerlinFilePrint organizational unit (OU). TestKing's security department sets a rule that specifies the size and retention settings for the Security event log of all file servers. The rule also specified that local administrators on servers cannot override the changes you make to the settings for the Security event log. You need to define a method to modify the Security event log settings on each file server in the Berlin office in order to meet the states requirements. What should you do?()A、Modify the local security policy on each file server.Define the size and retention settings for the Security event log.B、Create a security template on one of the file servers by using the Security Configuration and Analysis tool. Define the size and retention settings for the Security event log in the template. Import the security template into the local security policy of the other 14 file servers.C、Use Event Viewer to modify the event log properties on each file server. Define the size and retention settings for the Security event log.D、Create a new Group Policy object (GPO) and link it to the BerlinFilePrint OU. In the GPO, define the size and retention settings for the Security event log.
考题
You have 15 computers that run Windows 7. You need to implement a monitoring solution that meets the following requirements.Sends an e-mail notification when an application error is logged in the event log .Runs a script to restart the computer if an application error occurs between 17.00 and 07.00 .Minimizes the administrative effort required to monitor applications. What should you do?()A、On all the computers,configure a custom view. Configure a custom task for the application error events.B、On a computer,configure a custom view to display the application errors. Configure a custom task for the application error events.C、On a central computer, configure an event subscription. On all of the computers, configure a custom task in the Forwarded Events log.D、On all the computers,configure an event subscription to a central computer. On the central computer,configure a custom task in the Forwarded Events log.
考题
单选题An administrator has written a script to check that the contents of an application configuration file are identicalon all cluster nodes. The script has also been associated with a user defined custom verification method. Theadministrator would like the contents of this file to be checked and verified automatically on a daily basis.How can this be achieved?()A
By using a job scheduler such as cronB
By enabling automatic cluster verificationC
By including the script name in the file /usr/es/sbin/cluster/etc/clverify.rcD
By including the custom method name in the file /usr/es/sbin/cluster/etc/rc.authomethods
考题
单选题A cluster node has been started and has not acquired the resources in the resource groups. Which log file will show the details of any event script processing that has occurred?()A
/tmp/hacmp.outB
/tmp/clstrmgr.debugC
/usr/es/adm/cluster.logD
/var/adm/hacmp/hacmp.out
考题
单选题In which scenario will you issue the following command?() SQL RECOVER DATABASE UNTIL TIME ’2005-10-04 : 12:09:08’ USING BACKUP CONTROLFILE;A
when all the control files are missing and only a binary backup of the current control file existsB
when a multiplexed copy of the current control file is missingC
when all the control files are missing and only a script containing the CREATE CONTROLFILE statement existsD
when the SPFILE is missing
考题
单选题While reviewing the hacmp.out after a node failure,an administrator realizes that the custom Event queue_down did not execute. The queue_down event shows up when a list of custom events is displayed. What would be the next logical step to resolve this problem?()A
Delete the custom event and add a pre event and synchronize.B
Synchronize the cluster and recheck the cluster custom events.C
Create an application server that will stop and start the queues.D
Add a pre or post event to appropriate cluster events and synchronize.
考题
单选题An administrator is reviewing the /tmp/hacmp.out after an unsuccessful fallover and notice that the event stop_server PROD_DB failed. Besides manually intervening,what step must be performed to return the cluster to a stable state?()A
Recover From HACMP Script Failure.B
Release Locks Set By Dynamic Reconfiguration.C
Rerun HACMP cluster verification and synchronization.D
Restore HACMP configuration Database From Active Configuration.
热门标签
最新试卷