网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
Company.com has decided to implement VPN for all network traffic. How might this might affect HACMP?()
- A、 Only the heartbeat IP network can exist in a VPN style network.
- B、 HACMp must have separate VPN’s for all ’non-service’ and ’service’ adapter networks.
- C、 If a VPN is used for IP traffic the heartbeating must be done over disk connections.
- D、 HACMP can exist in a VPN network environment,but special considerations must be addressed.
参考答案
更多 “Company.com has decided to implement VPN for all network traffic. How might this might affect HACMP?() A、 Only the heartbeat IP network can exist in a VPN style network.B、 HACMp must have separate VPN’s for all ’non-service’ and ’service’ adapter networks.C、 If a VPN is used for IP traffic the heartbeating must be done over disk connections.D、 HACMP can exist in a VPN network environment,but special considerations must be addressed.” 相关考题
考题
You have a computer that runs Windows Vista. You create a virtual private network (VPN) connection between the computer and your company’s network.You notice that while the computer is connected through the VPN connection, users on the company network can access shared folders on the computer.You need to prevent network users from accessing your shared folders when you are connected to the company’s network by using the VPN connection.What should you do?()A.AB.BC.CD.D
考题
You are the network administrator for your company. All network servers run Windows Server 2003. Business hours are 8 A.M. to 5 P.M. You provide network assistance during business hours only.A server named Server1 stores personal files for all network users. Mobile users access Server1 by using the company‘s VPN. They must have 24-hour access to the files on Server1.You need to be able to identify the source of the recurring slowdowns in VPN access.First, you log on to Server1.What should you do next?()A. Use Task Manager to review network utilization of the VPN adapter.B. Use the Performance console to create a log of network utilization outside of business hours.C. Use System Monitor to review network utilization of the VPN connection.D. Use Task Manager to select Bytes Sent as the Network Adapter History setting.
考题
Company.com has a cluster with nodes that support "hot swap" adapters. During an upgrade of The network infrastructure,an additional network adapter has been added to the nodes and configured in AIX. What is the next step required to add this adapter to HACMP?() A、 Stop the node.B、 Stop the cluster.C、 Run autodiscovery.D、 Configure the IP adapter.
考题
An HACMP cluster is planned for two logical partitions on IBM p690 servers. Both partitions have three network interface adapters: two service adapters on a production network connected to an IP switch, and an administration adapter on a stand-alone hub that is connected to the p690 server’s HMC. Non-IP hearbeat paths cannot be configured due to the available hardware in the p690 servers. Given the resources available,what is the best configuration for this cluster?()A、 Add hardware to provide either serial heartbeats or shared disk heartbeats.B、 Define the administration network so HACMP will send heartb4eats over the non-routed network.C、 Add the administration network adapters to the production resource groups with IPAT via IP replacement selections.D、 Configure the IP Network Interface Module in HACMP with an increased heartbeat detection rate to prevent node isolation confutations.
考题
Company.com is planning for an HACMP cluster and wants to know more about the network requirements. The plan is to use IPAT via IP aliasing and heartbeating via IP aliasing to preserve the corporate IP addresses. Currently the customer uses a separate VLAN for each individual subnet. Which statement best describes how HACMP co-exists with VLAN’s in this configuration?() A、 All subnets in use by HACMP must be in the same VLAN.B、 All subnets in sue by HACMP must be in a different VLAN.C、 HACMP does not support multiple subnets when using heartbeating via IP aliasing.D、 HACMP does not support the use of VLAN.
考题
During a planning session, Company.com expresses concern about the behavior of the nodes When HACMP is installed. Once department is reliant on an older piece of equipment that is critical to operations and must communicate to the database server. Previous network changes indicated that this piece of equipment does not support gratuitous ARP. How can HACMP best incorporate this restriction into the cluster design?() A、 The administrator must use Hardware Address Take over with HACMP.B、 The clsmuxpd process and the contents of the /etc/cluster/ping_client_list can address the issue.C、 HACMP does not have any facility to be compatible with older devices that have limited capabilities.D、 HACMP can use either hardware address take over,or clinfo can update the arp cache of the clients when an adapter event occurs.
考题
Company.com with an EtherChannel implementation is considering an HACMP solution. What considerations must be addressed in planning this configuration?() A、 Hardware address takeover must be configured.B、 IPAT via IP aliasing is required for EtherChannel.C、 EtherChannel must be defined as a separate network.D、 HACMP does not support the fallover of EtherChannel.
考题
Company.com has several network adapters configured as backup paths using the Virtual IP Addressing and dynamic routing of AIX. A second node needs to be added to the environment to crate a cluster. What considerations must be addressed during the planning session?() A、 HACMP supports most types of networks,including Virtual IP Addressing by AIX.B、 If HACMP IP aliasing is used,the devices may be the Virtual IP type used by AIX.C、 Using the AIX Virtual IP Addressing scheme HACMP can provide near fault tolerant availability of the network.D、 The AIX Virtual Addressing mechanism is not supported by HACMP,but a similar configuration can be created in HACMP.
考题
Company.com has a resource group that contains a database that is accessed by a web client based on another system. The communication to the database is TCP/IP. Occasionally after a failure, the end users get unusual error messages that indicate the database server is not available. It has been determined that the web server is trying to access the database server’s information before it has completed file system recovery after a failure. How can HACMP affect this problem?() A、 HACMP can resequence the order to the starting of the various resource group elements by utilizing Dynamic Node Priority.B、 The order of dependency can be controlled though the HACMP resource group configuration if the web server was made to be part of the HACMP cluster.C、 HACMP can delay making the network label available until after the filesystem checks have completed with the "filesystem mounted before IP is configured".D、 The IP service label can be in a second resource group allowing the sequential processing of resource groups to control when the IP service label is made available.
考题
Company.com is adding HACMP to an existing pair of nodes. One node is using EtherChannel with only one adapter. The other node is using regular Ethernet connection to the switch. The customer is going to increase the number of network interfaces to two for each node. What other considerations need to be addressed in a HACMP environment?() A、 Al interfaces used for HACMP heartbeats must be identical. Differences in the interfaces will cause heartbeat failure.B、 The network interfaces should all be configured with the same frame type. The use of regular Ethernet frames is mandatory.C、 Network interfaces for HACMP must be all the same,Ethernet or 802.3. It does not matter which,as long as they are all the same.D、 HACMP can use any network interface supported by AIX. The options on the various interfaces are masked by the Ethernet switch and do not affect HACMP.
考题
A cluster node has three network interfaces that support three resource groups with three service IP labels. Each IP label uses IPAT via IP aliasing. One of the adapters fails, and all of the IP labels on it are moved to other interfaces as expected. The system supports the "hot swap" replacement of the network interfaces, and the system engineer has corrected the problem. What will happen to the service IP lab3els when the repaired adapter is noticed by HACMP?()A、 They will migrate back to the repaired interface.B、 They will not move,the interface will join the pool of available resources.C、 They will not move; the interface will join the cluster as an available non-service adapter. D、 They will migrate to the repaired interface to create an equal number of service IP labels per interface.
考题
Company.com has I/O slot constraints on two nodes that are going to be configured in an HACMP cluster. There is room for only one Network Interface Card in each node,in addition to the built-in Ethernet port on the system planer. The best HACMP configuration for these servers is to implement:() A、 A single adapter network using the Network Interface Card in each nodeB、 A single adapter network using persistent addresses on the Network Interface Card in each nodeC、 A dual adapter network using the internal Ethernet adapters as an non-service interface with IPAT via IP Replacement.D、 EtherChannel high availability for the network connections with HACMP cascading resource groups for data and application fallover
考题
You are designing a strategy to ensure that VPN users are able to access all internal resources. What should you do?()A、 Specify a static routing table entry on VPN1 for the Dallas network.B、 Specify a static routing table entry on VPN1 for the Seattle network.C、 Implement Internet Authentication Service (IAS) on VPN1.D、 Define a User Class option for Routing Remote Access Clients on the DHCP Server.
考题
You are designing the IP address assignment strategy for the VPN users. Which two actions should you perform.()A、 Configure VPN1 as a DHCP Relay Agent.B、 Configure VPN1 to assign IP Address by using DHCP server.C、 Configure VPN1 to have a static pool of IP Address from the network address of 131.107.1.0/24.D、 Configure VPN1 to have a static pool of IP Address from the network address of 192.168.1.0/24.E、 Configure the perimeter firewall to allow inbound DHCP traffic to be passed to VPN1.F、 Configure the interval firewall to allow DHCP broadcasts to be forwarded from the external network to the internal network.
考题
You have a VPN server that runs Windows Server 2003 Service Pack 2 (SP2). The VPN server is configured to have a static IP address pool. The IP address range is 10.10.10.1 to 10.10.10.200.All clients connect to the server by using PPTP. You discover that the VPN server supports only five concurrent VPN connections. You need to ensure that the VPN server supports 100 concurrent VPN connections. What should you do?() A、From Network Interfaces, create a new demand-dial interface. B、From the properties of the server, disable multilink connections. C、From the port properties, configure the WAN Miniport (PPTP) device. D、From the properties of the server, configure the IP address assignment settings.
考题
Your company has users who connect remotely to the main office through a Windows Server 2008 VPN server.You need to ensure that users cannot access the VPN server remotely from 22:00 to 05:00. What should you do?()A、Create a network policy for VPN connections. Modify the Day and time restrictions.B、Create a network policy for VPN connections. Apply an IP filter to deny access to the corporate network.C、Modify the Logon hours for all user objects to specify only the VPN server on the Computer restrictions option.D、Modify the Logon Hours for the default domain policy to enable the Force logoff when logon hours expire option.
考题
You are designing a strategy to allow users to gain VPN access to the internal network. What should you do?()A、 Allow all inbound VPN traffic to pass through the internal firewall and the perimeter firewall.B、 Allow all inbound VPN traffic to pass through the perimeter firewall only.C、 Allow all VPN traffic from the source IP address of 131.107.1.14 to pass through the internal firewall.D、 Allow all VPN traffic from the source IP address of 191.168.1.0/24 to pass through the perimeter firewall.
考题
You need to design the network to support the company’s VPN requirements for mobile users who connect to the network in Seattle. Which two actions should you perform?()A、Use a password generator application to create a preshared key, and distribute it to all mobile usersB、Use computer autoenrollment to create digital certificates that can be used to authenticate to a VPN serverC、Acquire a digital certificate that can be used for SSL from a commercial CA for each computer that established a VPN connectionD、Configure IPSec policies on all Routing and Remote Access servers to require the use of digital certificates
考题
Company.com wishes to use IPAT via IP replacement in a two-node mutual cluster. Each node has two Ethernet 10/100/1000 adapters. Throughout the planning session,the customer has asked questions about subnet and VLAN requirements for the intended network topology. Which of the following best describes the network requirements?() A、 The service IP addresses must be on a separate subnet and VLAN.B、 The non-service and service IP addresses must be on the same subnet and on the same VLAN.C、 All interfaces on a node must be in different subnets. All subnets must be on the same VLAN. D、 One non-service and one service IP address must be on the same logical subnet. All interfaces must be on the same VLAN.
考题
单选题Company.com is adding HACMP to an existing pair of nodes. One node is using EtherChannel with only one adapter. The other node is using regular Ethernet connection to the switch. The customer is going to increase the number of network interfaces to two for each node. What other considerations need to be addressed in a HACMP environment?()A
Al interfaces used for HACMP heartbeats must be identical. Differences in the interfaces will cause heartbeat failure.B
The network interfaces should all be configured with the same frame type. The use of regular Ethernet frames is mandatory.C
Network interfaces for HACMP must be all the same,Ethernet or 802.3. It does not matter which,as long as they are all the same.D
HACMP can use any network interface supported by AIX. The options on the various interfaces are masked by the Ethernet switch and do not affect HACMP.
考题
单选题Company.com has a large network control center with an SNMP based monitoring tool running on a non-IBM Unix like system. It has become desirable for the network control center to monitor the activity of an HACMP cluster. What feature in HACMP can assist with this?()A
hacmp.myB
hacmp.mibC
hacmp.defsD
hacmp.snmp
考题
单选题Company.com has several network adapters configured as backup paths using the Virtual IP Addressing and dynamic routing of AIX. A second node needs to be added to the environment to crate a cluster. What considerations must be addressed during the planning session?()A
HACMP supports most types of networks,including Virtual IP Addressing by AIX.B
If HACMP IP aliasing is used,the devices may be the Virtual IP type used by AIX.C
Using the AIX Virtual IP Addressing scheme HACMP can provide near fault tolerant availability of the network.D
The AIX Virtual Addressing mechanism is not supported by HACMP,but a similar configuration can be created in HACMP.
考题
单选题Company.com is planning for an HACMP cluster and wants to know more about the network requirements. The plan is to use IPAT via IP aliasing and heartbeating via IP aliasing to preserve the corporate IP addresses. Currently the customer uses a separate VLAN for each individual subnet. Which statement best describes how HACMP co-exists with VLAN’s in this configuration?()A
All subnets in use by HACMP must be in the same VLAN.B
All subnets in sue by HACMP must be in a different VLAN.C
HACMP does not support multiple subnets when using heartbeating via IP aliasing.D
HACMP does not support the use of VLAN.
考题
单选题You are designing a strategy to allow users to gain VPN access to the internal network. What should you do?()A
Allow all inbound VPN traffic to pass through the internal firewall and the perimeter firewall.B
Allow all inbound VPN traffic to pass through the perimeter firewall only.C
Allow all VPN traffic from the source IP address of 131.107.1.14 to pass through the internal firewall.D
Allow all VPN traffic from the source IP address of 191.168.1.0/24 to pass through the perimeter firewall.
考题
单选题Company.com wishes to use IPAT via IP replacement in a two-node mutual cluster. Each node has two Ethernet 10/100/1000 adapters. Throughout the planning session,the customer has asked questions about subnet and VLAN requirements for the intended network topology. Which of the following best describes the network requirements?()A
The service IP addresses must be on a separate subnet and VLAN.B
The non-service and service IP addresses must be on the same subnet and on the same VLAN.C
All interfaces on a node must be in different subnets. All subnets must be on the same VLAN. D
One non-service and one service IP address must be on the same logical subnet. All interfaces must be on the same VLAN.
考题
单选题Company.com has I/O slot constraints on two nodes that are going to be configured in an HACMP cluster. There is room for only one Network Interface Card in each node,in addition to the built-in Ethernet port on the system planer. The best HACMP configuration for these servers is to implement:()A
A single adapter network using the Network Interface Card in each nodeB
A single adapter network using persistent addresses on the Network Interface Card in each nodeC
A dual adapter network using the internal Ethernet adapters as an non-service interface with IPAT via IP Replacement.D
EtherChannel high availability for the network connections with HACMP cascading resource groups for data and application fallover
考题
单选题Company.com has decided to implement VPN for all network traffic. How might this might affect HACMP?()A
Only the heartbeat IP network can exist in a VPN style network.B
HACMp must have separate VPN’s for all ’non-service’ and ’service’ adapter networks.C
If a VPN is used for IP traffic the heartbeating must be done over disk connections.D
HACMP can exist in a VPN network environment,but special considerations must be addressed.
热门标签
最新试卷