网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
A highly available WebLogic cluster in UNIX is configured for automatic server migration. Node Managed is configured on both machines to start managed servers. How should you simulate a managed server failure to test whether automatic server migration is working?()
A

Shut down the managed server from the WebLogic console.

B

Shut down the managed server using the WLST command through Node Manager.

C

Run kill -9 once to kill the managed server process.

D

Run kill -9 to kill the managed server process, and run kill -9 one more time if the managed  server is restarting.


参考答案

参考解析
解析: 暂无解析
更多 “单选题A highly available WebLogic cluster in UNIX is configured for automatic server migration. Node Managed is configured on both machines to start managed servers. How should you simulate a managed server failure to test whether automatic server migration is working?()A Shut down the managed server from the WebLogic console.B Shut down the managed server using the WLST command through Node Manager.C Run kill -9 once to kill the managed server process.D Run kill -9 to kill the managed server process, and run kill -9 one more time if the managed  server is restarting.” 相关考题
考题 用java能实现对weblogic的监控吗? 我已经用JMS实现了对weblogic的serverName,ListenPort,webApp的名称、domain名称。现在想实现对weblogic的执行线程(executeQueue)、集群(cluster)、堆(heap)等,不知道应该怎么实现?

考题 Which of the following statements is true about IPAT via IP replacement?()  A、 Configuration of Hardware Address Takeover is supported.B、 Fewer physical network interface cards are required in the cluster.C、 It is the default for keeping a service IP labels highly available.D、 None-service ip labels must use different subnets than service IP labels.

考题 An enterprise has three nodes: -Node ’A’ is a production database, -Node ’B’ is a production  Application server, and -Node ’C’ is a test and development node. Node ’C’ is used by six programmers to develop and the production application as business critical and would like to make it highly available with HACMP. Application development and testing is not business critical.  Which of the following describes the best solution?()  A、 There is not an adequate solution because HACMP should not be configured in this environment without a dedicated standby node.B、 Nodes ’A’ and ’B’ should be configured in a cluster with mutual fallover of two cascading resource groups to provide both nodes will deliver acceptable response time with both resource groups.C、 Nodes ’A’ and ’C’ should be configured in one cluster, and Nodes ’B’ and ’C’ in another cluster to prevent both the database and application server from falling over to Node ’C’ at the same time.D、 Nodes ’A’, ’B’, and ’C’ should be configured in a cluster with Node ’C’ the hot standby for both the database and application server resource groups. Workload Manager (WLM) must be configured on database and application developers from over utilizing the CPU resources.

考题 Active Cache is the integration of Coherence and WebLogic Server. Which component is NOT part of this integration?()A、Coherence*WebB、Coherence*ExtendC、TopLink Grid with CoherenceD、Coherence cluster lifecycle management in WebLogic ServerE、Named cache dependency Injection

考题 A customer needs to implement a Highly Available solution for JMS that has a primary data center  and a backup. Which three steps would you perform when designing your solution?()A、Store Transaction Logs in a database and use Database stores for JMS to make replication between sites easier.B、Use file based Transaction Logs and JMS stores and implement a separate replication solution  for files in addition to database in case database replication fails.C、Implement Oracle RAC at each site to provide a highly available solution within each datacenter.D、Configure Whole Server Migration to migrate WebLogic Managed Servers from the primary to the secondary site.E、Configure Automatic Service Migration for JMS high availability within a datacenter.

考题 Which two statements are true regarding the WebLogic domain?()A、A WebLogic domain can have more than one Administration server.B、A WebLogic domain has at least one WebLogic server.C、A WebLogic domain can have at the most one cluster.  D、A WebLogic domain can cross multiple physical machines.  E、Each WebLogic domain is associated with a different Node Manager.

考题 How can an Oracle WebLogic cluster’s capacity be increased ?()A、 by adding server instances to the cluster on an existing machineB、 by adding machines to host server for more clustered instancesC、 by adding machines to the cluster to host the incremental server instancesD、 by adding node managers to an existing machine

考题 In the absence of shared storage between cluster nodes, which two actions can you take to configure a High Availability architecture?()A、Move domain logs to a highly available database.B、Move server logs to a highly available database.C、Move transaction logs to a highly available database. D、Move JMS persistent stores to a highly available database.E、Move error logs to a highly available database.

考题 In Real Operations Automation, we have Domain Template and WebLogic Scripting Tool for provisioning and configuration respectively.  Which are the other two elements ?()A、 Weblogic Cluster B、 Weblogic CacheC、 Weblogic GridD、 Weblogic Deployment 

考题 Which two outcomes result when a domain is created in development mode?()A、WebLogic server starts automatically upon the restarting of the machineB、each new cluster will automatically be created with two managed serversC、boot.properties file automatically stored  D、creation of an auto deploy folder used for the application to deploy automaticallyE、Node Manager will be automatically configured

考题 Your network includes Windows Server 2008 R2 Hyper-V failover clusters that support highly available virtual machines (VMs). You manage virtual machines by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You are planning to deploy a large number of VMs to the failover clusters. All VMs must remain available when one node of each cluster is offline. You need to determine the best placement for the new VMs among the clusters. Which two actions should you perform?()A、For each cluster, set the cluster reserve to 1B、Determine the placement for each VM by using the data that is generated by running the Get-VMPerformance PowerShell cmdletC、Determine the placement for each VM by using the data that is generated by running the Get-VMHostRating PowerShell cmdletD、For each cluster, set the cluster reserve to 0

考题 You are a network administrator for your company. The network contains a perimeter network. The perimeter network contains four Windows Server 2003, Web Edition computers that are configured as a Network Load Balancing cluster.   The cluster hosts an e-commerce Web site that must be available 24 hours per day. The cluster is located in a physically secure data center and uses an Internet-addressable virtual IP address. All servers in the cluster are configured with the Hisecws.inf template.   You need to implement protective measures against the cluster’s most significant security vulnerability.   What should you do?  ()A、 Use Encrypting File System (EFS) for all files that contain confidential data stored on the cluster.B、 Use packet filtering on all inbound traffic to the cluster.C、 Use Security Configuration and Analysis regularly to compare the security settings on all servers in the cluster with the baseline settings.D、 Use intrusion detection on the perimeter network.

考题 Your network includes Windows Server 2008 R2 Hyper-V servers. You are configuring the servers in a failover cluster that will host highly available virtual machines (HAVMs).  You plan to manage the servers in the cluster by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You need to design a storage solution for the cluster that allows you to migrate virtual machines (VMs) into and out of the cluster by using SAN migration.  Which two actions should you include in your design?()A、Enable the automount feature on each node in the clusterB、Install a Virtual Disk Service (VDS) hardware provider on each node in the clusterC、Place all VMs on a single Cluster Shared Volume (CSV)D、Place all VMs on a dedicated logical unit number (LUN)

考题 You have a Windows Server 2008 R2 Hyper-V failover cluster.  You manage the virtual environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You need to find out whether the failover cluster is properly configured to support highly available virtual machines (VMs).  Which PowerShell cmdlet should you run?()A、Test-ClusterB、Enable-VMHostC、Get-VMHostRatingD、Test-ClusterResourceFailure

考题 Your network includes Windows Server 2008 R2 Hyper-V failover clusters that support highly available virtual machines (VMs).  You manage virtual machines by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You are planning to deploy a large number of VMs to the failover clusters. All VMs must remain available when one node of each cluster is offline. You need to determine the best placement for the new VMs among the clusters.  Which two actions should you perform?()A、For each cluster, set the cluster reserve to 1B、In each cluster, place one host server in maintenance modeC、Determine the placement for each VM by using the data that is generated by running the Get-VMHostRating PowerShell cmdletD、Determine the placement for each VM by using the data that is generated by running the Get-VMPerformance PowerShell cmdlet

考题 In a scale-out environment,what is a benefit of running DB2 pureScale compared to other solutions?()A、Provides a highly available cluster of Power Systems enabling near linear scalability and disaster recovery across different sites.B、Incorporates a hardware locking mechanism which resembles the Parallel Sysplex on the mainframe, delivering performance and scalability.C、Enables near linear scalability by partitioning and clustering the database across multiple nodes, and adding nodes dynamically when needed.D、Provides scalability by employing a highly available cluster of servers interconnected by an Infiniband network and a central locking mechanism.

考题 Company.com needs to add a new file system to an existing volume group that is being made  Highly available by HACMP? What is the best procedure that minimizes down time of the applications?()  A、 Use C-SPOC to add the file system while the cluster is running.B、 Add the file system,and them perform the exportvg and importvg on the required nodes.C、 Stop the cluster,add the new file system, and synchronize the cluster then restart HACMP.D、 Break the reservation locks on the disk drives while the cluster is active and add the file system.

考题 单选题Which of the following statements is true about IPAT via IP replacement?()A  Configuration of Hardware Address Takeover is supported.B  Fewer physical network interface cards are required in the cluster.C  It is the default for keeping a service IP labels highly available.D  None-service ip labels must use different subnets than service IP labels.

考题 多选题In the absence of shared storage between cluster nodes, which two actions can you take to configure a High Availability architecture?()AMove domain logs to a highly available database.BMove server logs to a highly available database.CMove transaction logs to a highly available database.DMove JMS persistent stores to a highly available database.EMove error logs to a highly available database.

考题 单选题You are a network administrator for your company. The network contains a perimeter network. The perimeter network contains four Windows Server 2003, Web Edition computers that are configured as a Network Load Balancing cluster.   The cluster hosts an e-commerce Web site that must be available 24 hours per day. The cluster is located in a physically secure data center and uses an Internet-addressable virtual IP address. All servers in the cluster are configured with the Hisecws.inf template.   You need to implement protective measures against the cluster’s most significant security vulnerability.   What should you do?  ()A  Use Encrypting File System (EFS) for all files that contain confidential data stored on the cluster.B  Use packet filtering on all inbound traffic to the cluster.C  Use Security Configuration and Analysis regularly to compare the security settings on all servers in the cluster with the baseline settings.D  Use intrusion detection on the perimeter network.

考题 单选题Active Cache is the integration of Coherence and WebLogic Server. Which component is NOT part of this integration?()A Coherence*WebB Coherence*ExtendC TopLink Grid with CoherenceD Coherence cluster lifecycle management in WebLogic ServerE Named cache dependency Injection

考题 单选题Your network includes 40 servers that run Windows Server 2008 R2. You plan to virtualize the servers by using Hyper-V in a failover cluster. Your plan must allow for up to two offline host servers while still maintaining highly available virtual machines. You need to recommend the minimum number of Hyper-V host servers for the cluster. How many servers should you recommend?()A FiveB ThreeC FourD Six

考题 单选题Company.com needs to add a new file system to an existing volume group that is being made  Highly available by HACMP? What is the best procedure that minimizes down time of the applications?()A  Use C-SPOC to add the file system while the cluster is running.B  Add the file system,and them perform the exportvg and importvg on the required nodes.C  Stop the cluster,add the new file system, and synchronize the cluster then restart HACMP.D  Break the reservation locks on the disk drives while the cluster is active and add the file system.

考题 多选题How can an Oracle WebLogic cluster’s capacity be increased ?()Aby adding server instances to the cluster on an existing machineBby adding machines to host server for more clustered instancesCby adding machines to the cluster to host the incremental server instancesDby adding node managers to an existing machine

考题 多选题Which two statements are true regarding the WebLogic domain?()AA WebLogic domain can have more than one Administration server.BA WebLogic domain has at least one WebLogic server.CA WebLogic domain can have at the most one cluster.DA WebLogic domain can cross multiple physical machines.EEach WebLogic domain is associated with a different Node Manager.

考题 单选题The en0 interface on Node1 of a two-node cluster has failed. This adapter is configured with a boot addressand under stable operations also has the service address of the cluster’s single resource group. The resourcegroup is configured with the fallback option. The HA network was configured for IPAT via aliasing and now theservice address is on the en1 interface in the cluster. The en0 interface has already been physically replacedand configured with the boot address. Which of the following will return the cluster to its original state andminimize cluster downtime?()A Run cluster synchronization.B Restart cluster services on Node1.C Perform a swap_adapter using C-SPOCD Restart cluster services on both nodes

考题 多选题A customer needs to implement a Highly Available solution for JMS that has a primary data center  and a backup. Which three steps would you perform when designing your solution?()AStore Transaction Logs in a database and use Database stores for JMS to make replication between sites easier.BUse file based Transaction Logs and JMS stores and implement a separate replication solution  for files in addition to database in case database replication fails.CImplement Oracle RAC at each site to provide a highly available solution within each datacenter.DConfigure Whole Server Migration to migrate WebLogic Managed Servers from the primary to the secondary site.EConfigure Automatic Service Migration for JMS high availability within a datacenter.