单选题For a Juniper DX Cluster, what is a basic target server health check?()ApingBTCP health checkCLayer 7 health checkDrequest HTTP default page

单选题
For a Juniper DX Cluster, what is a basic target server health check?()
A

ping

B

TCP health check

C

Layer 7 health check

D

request HTTP default page


参考解析

解析: 暂无解析

相关考题:

You are the administrator of a 12 SQL Server 2000 computers. These servers are located in company offices throughout the world.You configure a multiserver job on the server in your company's New York City office. You configure this server as a master server, and designate the remaining 11 servers as target servers.After the job completes successfully, you decide to set up a new SQL Server 2000 computer as the master server. The new server will be named JobMaster and the other 12 servers will be target servers.You need to make the New York City server a target server instead of a master server. What should you do?A.On the New York City server, defect all 11 target servers. On the JobMaster server, enlist the 12 servers as target servers.B.On the JobMaster server, enlist all other servers as target servers.C.On the New York City server enlist the JobMaster server as a target server. Transfer the multiserver jobs from the New York City server to the JobMaster server.D.On the JobMaster server, enlist the New York City server as a target server. On the JobMaster server, enlist the other 11 servers as target servers. On the JobMaster server, defect the New York City server.

How do you disable a server from Juniper DX Cluster without terminating active client requests? () A. Delete the server.B. Soft pause the target server.C. Hard pause the target server.D. Create a new Cluster without the server.

For a Juniper DX Cluster, what is a basic target server health check?() A. pingB. TCP health checkC. Layer 7 health checkD. request HTTP default page

What are three Juniper DX Cluster benefits?() (Choose three.) A. performanceB. authorizationC. compressionD. protocol validationE. UDP load balancing

AnadministratorwantstousetheonlineplanningworksheetsasanaidtoconfiguringaPowerHAcluster.WhichPowerHAfilesetwouldtheadministratorneedtoinstallinordertoobtainthistool?() A.cluster.es.hawB.cluster.es.worksheetsC.cluster.es.tools.worksheetsD.cluster.es.server.worksheets

AnadministratorwantstoinstallWebSMITonanodethatisnotpartofacluster.WhichPowerHAfilesetprovidesthisfunction?() A.cluster.sysmgt.wsmB.cluster.es.client.wsmC.cluster.es.server.websmD.cluster.sysmgt.websm.rte

What are three Juniper DX Cluster benefits?() (Choose three.)A、performanceB、authorizationC、compressionD、protocol validationE、UDP load balancing

Which naming convention is used by Juniper Routers when archiving their configurations to a remote server?()A、yyyymmdd_HHMMSS_host-name_juniper.conf.gzB、host-name_juniper.conf.gz_yyyymmdd_HHMMSSC、yyyymmdd_HHMMSS_host-name_juniper.confD、host-name_juniper.conf_yyyymmdd_HHMMSS

How does the Juniper DX accelerate web servers? ()A、by translating HTTP requests to HTTPSB、by refusing client connections that are unnecessarily refreshed by end usersC、by multiplexing numerous client-side connections to fewer server-side connectionsD、by multiplexing numerous server-side connections to fewer client-side connections

While reviewing cluster logs, and administrator notice that an event, network_down rs232a, occurred on the previous day. After verifying the physical network connections and device states, what command can be used to verify the cluster state?()A、 clstatB、 cllsifC、 clsnapshotinfoD、 clcheck_server

A cluster administrator is trying to configure tmssa for the non-IP network. Having installed the devices.ssa.tm.rte fileset, what is the next step that must be performed to create the target mode devices?()  A、 Reboot each cluster node.B、 Change the ssa node number to a non-zero value.C、 Change the SSAR device state from defined to available.D、 Run the cfgmgr process on each node to create the target mode devices.

Which of the following commands will allow an administrator to determine if the IBM RSCT pre-requisitecomponents for clustering are installed at the correct version?()A、lppchk -v rsct.bundleB、lslpp -l bos.rsct.rteC、lslpp -l rsct.basic.rteD、lppchk -v cluster.es.server.rte

How can an Oracle WebLogic cluster’s capacity be increased ?()A、 by adding server instances to the cluster on an existing machineB、 by adding machines to host server for more clustered instancesC、 by adding machines to the cluster to host the incremental server instancesD、 by adding node managers to an existing machine

Your network contains a Web-based application that runs on Windows Server 2003. You plan to  migrate the Web-based application to Windows Server 2008 R2. You need to recommend a server  configuration to support the Web-based application. The server configuration must meet the following  requirements:   èEnsure that the application is available to all users if a single server?fails èSupport the installation of .NET applications èMinimize software costs  What should you recommend?() A、Install the Server Core installation of Windows Server 2008 R2 Standard on two servers. Configure the servers in a Network Load Balancing cluster.B、Install the full installation of Windows Server 2008 R2 Web on two servers. Configure the servers in a Network Load Balancing cluster.C、Install the full installation of Windows Server 2008 R2 Enterprise on two servers. Configure the servers in a failover cluster.D、Install the full installation of Windows Server 2008 R2 Datacenter on two servers. Configure the servers in a failover cluster.

You are a network administrator for your company. The network contains four Windows Server 2003 computers configured as a four-node server cluster.   Each cluster node is the preferred owner of a clustered instance of Microsoft SQL Server 2000, and each cluster node is configured as a possible owner of all other instances of SQL Server. All nodes have identically configured hardware. All four nodes operate at a sustained 70 percent CPU average.   You add a server that has identically configured hardware to the cluster as a fifth node.   You want each SQL Server instance to continue operating at the same level of performance in the event of a single node failure.   What should you do? ()A、 Clear the Affect group check box in the cluster resource properties for each SQL Server instance.B、 Configure the fifth node as the only possible owner other than the existing preferred owner of the cluster resources that are associated with each SQL Server instance.C、 Configure the fifth node as the preferred owner of each cluster group that contains an SQL Server instance.D、 Enable failback on each group that contains an SQL Server instance.

You add a Windows Server 2008 R2 server with the Hyper-V role installed to an existing Hyper-V failover cluster.  After you move a virtual machine (VM) to the new cluster node, Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 reports the status of the VM as Unsupported Cluster Configuration. You need to be able to manage the VM by using VMM. What should you do?()A、Disable TCP Chimney Offload on the new cluster nodes network adaptersB、Disable the TCP/IP Offload Engine (TOE) on the new cluster nodes network adapters.C、Move the VM configuration file to a local storage device, and update the pointer to the file.D、Update the virtual networking configuration of the new cluster node to match the virtual networking configuration of the original cluster nodes.

单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now in a high security environment, you manage a SQL Server 2008 cluster. You intend to configure and use encrypted connections for the clustered virtual SQL Server. You have to install a certificate. The cetification will be used for encryption. What should you do?()AIn the cluster quorum drive, install the encryption certificate BIn the SQL Server shared disk, install the encryption certificate Cin the cluster group, install the encryption certificate. DOn each individual node, install the encryption certificate

单选题How do you disable a server from Juniper DX Cluster without terminating active client requests? ()ADelete the server.BSoft pause the target server.CHard pause the target server.DCreate a new Cluster without the server.

单选题You are an administrator of an active/passive cluster of MAG Series devices running in mixed- mode configuration (IF-MAP server and authenticating users). The active user count is quickly approaching the maximum limit of the cluster. You have been directed to reconfigure the cluster to an active/active cluster and add a new license to increase the total number of active users the cluster can support. What must you do before changing the cluster configuration?()AApply the new license to the passive node of the cluster.BConfigure an external load balancer to hold the V IP.CDisable the active node in the cluster.DRemove the IF-MAP server configuration.

单选题A cluster administrator is trying to configure tmssa for the non-IP network. Having installed the devices.ssa.tm.rte fileset, what is the next step that must be performed to create the target mode devices?()A Reboot each cluster node.B Change the ssa node number to a non-zero value.C Change the SSAR device state from defined to available.D Run the cfgmgr process on each node to create the target mode devices.

单选题Which naming convention is used by Juniper Routers when archiving their configurations to a remote server?()Ayyyymmdd_HHMMSS_host-name_juniper.conf.gzBhost-name_juniper.conf.gz_yyyymmdd_HHMMSSCyyyymmdd_HHMMSS_host-name_juniper.confDhost-name_juniper.conf_yyyymmdd_HHMMSS

单选题You need to design a configuration for the Microsoft Outlook Web Access servers. What should you do?()ACreate a Network Load Balancing cluster that contains the Outlook Web Access serversBCreate a Microsoft Cluster Server cluster that contains the Outlook Web Access serversCCreate public DNS host (A) resource records for each Outlook Web Access server. Instruct each user to connect to the server that contains his or her mailboxDInstall Microsoft Application Center 2000 on the Outlook Web Access servers. Create a Web cluster that contains all of the Outlook Web Access servers

单选题While reviewing cluster logs, and administrator notice that an event, network_down rs232a, occurred on the previous day. After verifying the physical network connections and device states, what command can be used to verify the cluster state?()A clstatB cllsifC clsnapshotinfoD clcheck_server

多选题What are three Juniper DX Cluster benefits?() (Choose three.)AperformanceBauthorizationCcompressionDprotocol validationEUDP load balancing

单选题For a Juniper DX Cluster, what is a basic target server health check?()ApingBTCP health checkCLayer 7 health checkDrequest HTTP default page

单选题How does the Juniper DX accelerate web servers? ()Aby translating HTTP requests to HTTPSBby refusing client connections that are unnecessarily refreshed by end usersCby multiplexing numerous client-side connections to fewer server-side connectionsDby multiplexing numerous server-side connections to fewer client-side connections

单选题You need to design a configuration for the mailbox servers. What should you do?()ACreate two Exchange Server 2003 computers. Place the mailboxes for main office users on one server, and place the mailboxes for remote users on the other serverBCreate a Network Load Balancing cluster that contains two Exchange Server 2003 computers. Place half of the user mailboxes on one server, and place half of the user mailboxes on the other serverCCreate a Microsoft Cluster Server cluster that contains two Exchange Server 2003 computers. Place all of the user mailboxes on one server and configure the other server as a failover nodeDCreate a Microsoft Cluster Server cluster that contains two Exchange Server 2003 computers. Place half of the user mailboxes on one server, and place half of the user mailboxes on the other server

多选题How can an Oracle WebLogic cluster’s capacity be increased ?()Aby adding server instances to the cluster on an existing machineBby adding machines to host server for more clustered instancesCby adding machines to the cluster to host the incremental server instancesDby adding node managers to an existing machine