单选题During Company.com planning session,Company.com presents the details of the current  Network design. The network design serves four separate company facilities, each on as separate subnet. As part of a disaster recovery plan, the customer is evaluating the use of HACMP. Specifically, the have reviewed IPAT via IP aliasing and are questioning the number of IP subnets required.  Given the customer’s current configuration,what is the recommended minimum number of IP subnets that would be required?()A 4B 5C 6D 8

单选题
During Company.com planning session,Company.com presents the details of the current  Network design. The network design serves four separate company facilities, each on as separate subnet. As part of a disaster recovery plan, the customer is evaluating the use of HACMP. Specifically, the have reviewed IPAT via IP aliasing and are questioning the number of IP subnets required.  Given the customer’s current configuration,what is the recommended minimum number of IP subnets that would be required?()
A

 4

B

 5

C

 6

D

 8


参考解析

解析: 暂无解析

相关考题:

Users are reporting problems connecting to servers in the remote company.com domain. The administrator suspects this to be a DNS problem.Which of the following commands would the administrator run to identify the DNS server of the remote company.com?()A. dig company.com nsB. ipconfig/allC. ifconfig-aD. dig company.com mx

During a planning meeting, Company.com indicates that they intend to make a relational  Database highly available. The application has a pre-requisite that a kernel extension be loaded from /etc/inittab.  How would this be managed in an HACMP environment?()  A、 It can be started with a crontab entry.B、 It can be created as an Application Server.C、 It can be added to a resource group as a dependency.D、 It cannot be done because HACMP provides no method to order application start/stop scripts.

A Company.com developer is designing the presentation tier for a web application that relies on a complex session bean. The session bean is still being developed and the APIs for are NOT finalized. Any changes to the session bean API directly impacts the development of the presentation tier.  Which design pattern provides a means to manage the uncertainty in the API?()A、 View HelperB、 Front ControllerC、 Composite ViewD、 Intercepting FilterE、 Business DelegateF、 Chain of Responsibility

Users are reporting problems connecting to servers in the remote company.com domain. The administrator suspects this to be a DNS problem. Which of the following commands would the administrator run to identify the DNS server of the remote company.com?()A、dig company.com nsB、ipconfig/allC、ifconfig-aD、dig company.com mx

During Company.com planning session,Company.com presents the details of the current  Network design. The network design serves four separate company facilities, each on as separate subnet. As part of a disaster recovery plan, the customer is evaluating the use of HACMP. Specifically, the have reviewed IPAT via IP aliasing and are questioning the number of IP subnets required.  Given the customer’s current configuration,what is the recommended minimum number of IP subnets that would be required?()A、 4B、 5C、 6D、 8

Company.com with an EtherChannel implementation is considering an HACMP solution. What considerations must be addressed in planning this configuration?()  A、 Hardware address takeover must be configured.B、 IPAT via IP aliasing is required for EtherChannel.C、 EtherChannel must be defined as a separate network.D、 HACMP does not support the fallover of EtherChannel.

During Company.com planning session, the LVM requirements for HACMP are provided. The administrator explains that there are five volume groups in the current production environment because filesystems constantly change due to the nature of the business. Maintenance outages are limited to one Saturday per month. There is some concern about the amount of time that will be required for outages once HACMP is installed.  With HACMP,what will be the simplest methods of managing LVM changes while minimizing required downtime.()  A、 Make changes and allows Lazy Update to sync the changes later.B、 Use the Cluster Single Point Of Control to manage LVM changes.C、 Use exportvg on the primary node and improtvg on the second node.D、 Set up a local NFS cross-mount, and use the local filesystem until the outage.

During Company.com planning session, the network administrator discusses the requirements of having a persistent MAC address associated with the IP Service address.  How can this be accomplished using HACMP?()  A、 Enable routed to handle dynamic route creation.B、 Use IPAT via IP aliasing and define the required MAC address.C、 Add the Service IP Label to the /etc/cluster/ping_client_list.D、 Use IPAT via IP replacement and define the required MAC address.

Company.com has several network adapters configured as backup paths using the Virtual IP Addressing and dynamic routing of AIX. A second node needs to be added to the environment to crate a cluster. What considerations must be addressed during the planning session?()  A、 HACMP supports most types of networks,including Virtual IP Addressing by AIX.B、 If HACMP IP aliasing is used,the devices may be the Virtual IP type used by AIX.C、 Using the AIX Virtual IP Addressing scheme HACMP can provide near fault tolerant availability of the network.D、 The AIX Virtual Addressing mechanism is not supported by HACMP,but a similar configuration can be created in HACMP.

During Company.com planning session, the discussion focuses on how the IP connections are  Managed after a cluster node failure. This is critical for the business since their production application is a Lotus Domino solution requiring multiple IP addresses and recovery time is critical.  What type of IPAT implementation would best address these requirements?()  A、 IPAT via IP aliasingB、 IPAT via IP replacementC、 IPAT via IP aliasing using HWATD、 IPAT via IP replacement using HWAT

You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com policy prohibits the users from changing their password by using Outlook Web App (OWA). What should you do?()A、The best option is to set up an Outlook Web App Mailbox policy so that the users comply with the Company.com policy.B、The best option is to set up a Group Policy Object so that the users comply with the Company.com policy.C、The best option is to change the authentication settings of the OWA virtual directory so that the users comply with the Company.com policy.D、The best option is to change the authentication settings of the IISADMPWD virtual directory so that the users comply with the Company.com policy.

You work as a network exchange administrator at Company.com.the Company.com network currently consists of a single active directory forest containing a single domain named Company.com.The Company.com organization makes use of microsoft exchange server 2010 as their messaging solution.The Company.com organization currently makes use of a computer named -ex01 which hosts a single mailbox database named kingdatabase.during the course of the business week you receive instruction from Company.com to have the transaction log files of kingdatabase moved.What should you do?()A、You should consider having the Set-ExchangeServer cmdlet used.B、You should consider having the Set-MailboxDatabase cmdlet used.C、You should consider having the Move-DatabasePath cmdlet used.D、You should consider having the Move-Mailbox cmdlet used.

You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com policy prohibits the users from changing their password by using Outlook Web App (OWA).However, they can use Windows to change their passwords.What should you do?()A、The best option is to configure the settings on the Segmentation tab, in the properties of the OWA virtual directory so that the users comply with the Company.com policy.B、The best option is to configure the settings on the Account tab, in the properties of the user accounts so that the users comply with the Company.com policy.C、The best option is to configure the settings on the Mailbox Features tab, in the properties of the mailboxes so that the users comply with the Company.com policy.D、The best option is to configure the settings on the Authentication tab, in the properties of the OWA virtual directory so that the users comply with the Company.com policy.

You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com security policy prohibits the employees to send certain words between them.What should you do?()A、The best option is to create an Outlook Protection Rule to comply with the Company.com security policy.B、The best option is to set up a content filtering feature to comply with the Company.com security policy.C、The best option is to create a transport rule to comply with the Company.com security policy.D、The best option is to set up a sender reputation feature to comply with the Company.com security policy.

You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.During the course of the business week you receive instruction from Company.com to ensure that all the network users are able to automatically schedule the use of a projector.What should you do?()A、You should consider having the schedule for the Managed Folder Assistant modified.B、You should consider having the properties of the Calendar managed default folder modified.C、You should consider having a new Sharing policy created.D、You should consider having an equipment mailbox created.

单选题You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com security policy prohibits the employees to send certain words between them.What should you do?()AThe best option is to create an Outlook Protection Rule to comply with the Company.com security policy.BThe best option is to set up a content filtering feature to comply with the Company.com security policy.CThe best option is to create a transport rule to comply with the Company.com security policy.DThe best option is to set up a sender reputation feature to comply with the Company.com security policy.

单选题Company.com has several network adapters configured as backup paths using the Virtual IP Addressing and dynamic routing of AIX. A second node needs to be added to the environment to crate a cluster. What considerations must be addressed during the planning session?()A HACMP supports most types of networks,including Virtual IP Addressing by AIX.B If HACMP IP aliasing is used,the devices may be the Virtual IP type used by AIX.C Using the AIX Virtual IP Addressing scheme HACMP can provide near fault tolerant availability of the network.D The AIX Virtual Addressing mechanism is not supported by HACMP,but a similar configuration can be created in HACMP.

单选题During a planning session, Company.com expresses concern about the behavior of the nodes  When HACMP is installed. Once department is reliant on an older piece of equipment that is critical to operations and must communicate to the database server. Previous network changes indicated that this piece of equipment does not support gratuitous ARP.  How can HACMP best incorporate this restriction into the cluster design?()A The administrator must use Hardware Address Take over with HACMP.B The clsmuxpd process and the contents of the /etc/cluster/ping_client_list can address the issue.C HACMP does not have any facility to be compatible with older devices that have limited capabilities.D HACMP can use either hardware address take over,or clinfo can update the arp cache of the clients when an adapter event occurs.

单选题You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.During the course of the business week you receive instruction from Company.com to start planning the creation of ten mailbox databases on twenty Mailbox servers whilst ensuring that you create a naming convention for all Mailbox databases. What should you do?()AYou should consider having a file name that is unique within the organization provided for each mailbox database file.BYou should consider having a file name that is unique within the Mailbox server provided for each mailbox database file.CYou should consider having a database name that is unique within the organization provided for each mailbox database file.DYou should consider having a database name that is unique within the Mailbox server provided for each mailbox database file.

单选题You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messagingsolution.During the course of the business week you receive instruction from Company.com to have a set of cmdlets grouped for administrative delegation of duties.What should you do?()AYou should consider having a new management role created.BYou should consider having a new role assignment policy created.CYou should consider having a managed folder mailbox policy created.DYou should consider having a new distribution group created.

单选题A Company.com developer is designing the presentation tier for a web application that relies on a complex session bean. The session bean is still being developed and the APIs for are NOT finalized. Any changes to the session bean API directly impacts the development of the presentation tier.  Which design pattern provides a means to manage the uncertainty in the API?()A View HelperB Front ControllerC Composite ViewD Intercepting FilterE Business DelegateF Chain of Responsibility

单选题You work as a network Exchange administrator at Company.com.The Company.com network  currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.The Company.com network users have been configured by Company.com to have the @Company.com email address suffix.During the course of the business week you receive instruction from Company.com to configure a public folder named KingPublic for the Internet users to post content by sending e-mail to KingPublic@Company.com.  What should you do?()AYou should consider having a new mail contact created which has the e-mail address KingPublic@Company.com.You should then have a transport rule created.BYou should consider having a new mailbox created which has the e-mail address KingPublic@Company.com.You should then have a transport rule created.CYou should consider having mail enabled for KingPublic.DYou should consider having the author role assigned to Anonymous.

单选题During a planning meeting, Company.com indicates that they intend to make a relational  Database highly available. The application has a pre-requisite that a kernel extension be loaded from /etc/inittab.  How would this be managed in an HACMP environment?()A It can be started with a crontab entry.B It can be created as an Application Server.C It can be added to a resource group as a dependency.D It cannot be done because HACMP provides no method to order application start/stop scripts.