单选题An administrator will use the discovery process to capture information about common cluster storage. Whichof the following commands should the administrator run on each participating node against the shared diskhdisk3 to ensure that this disk is successfully identified by the discovery process?()Achpv -ay hdisk3Bcfgmgr -l hdisk3Cchdev l hdisk3 a pv=yesDchdev l hdisk3 a reserve_policy=no_reserve

单选题
An administrator will use the discovery process to capture information about common cluster storage. Whichof the following commands should the administrator run on each participating node against the shared diskhdisk3 to ensure that this disk is successfully identified by the discovery process?()
A

chpv -ay hdisk3

B

cfgmgr -l hdisk3

C

chdev l hdisk3 a pv=yes

D

chdev l hdisk3 a reserve_policy=no_reserve


参考解析

解析: 暂无解析

相关考题:

An administrator is experiencing availability issues on a Linux server. The administrator decides tocheck the server for an IP address conflict on the server. Which of the following commands should the administrator use?()A.tracerouteB.tracertC.ifconfigD.ipconfig

An administrator will use the discovery process to capture information about common cluster storage. Whichof the following commands should the administrator run on each participating node against the shared diskhdisk3 to ensure that this disk is successfully identified by the discovery process?()A、chpv -ay hdisk3B、cfgmgr -l hdisk3C、chdev l hdisk3 a pv=yesD、chdev l hdisk3 a reserve_policy=no_reserve

An administrator has encountered a problem with a particular piece of software installed on the server and begins the troubleshooting process. Which of the following is the FIRST place the administrator should look for specific information about the problem?()A、The supporting documentationB、The vendor websiteC、The InternetD、The server event logs

An administrator is experiencing availability issues on a Linux server. The administrator decides tocheck the server for an IP address conflict on the server. Which of the following commands should the administrator use?()A、tracerouteB、tracertC、ifconfigD、ipconfig

A cluster administrator is trying to configure tmssa for the non-IP network. Having installed the devices.ssa.tm.rte fileset, what is the next step that must be performed to create the target mode devices?()  A、 Reboot each cluster node.B、 Change the ssa node number to a non-zero value.C、 Change the SSAR device state from defined to available.D、 Run the cfgmgr process on each node to create the target mode devices.

An administrator runs clstat on a cluster node and receives the following response: ’Can not get  Cluster Information.’ Which of the following daemons may need to be started in order to correct this problem?()A、 topsvcsB、 clinfoESC、 snmpinfoD、 clsmuxpdES

An administrator will be performing a PowerHA upgrade on a cluster from version 5.3 to version 5.5. Which ofthe following tasks will verify a successful migration?()A、Use the clstat command and verify the cluster is in a stable stateB、After each node is upgraded, run a verification and synchronizationC、After all nodes are upgraded, run a verification and synchronizationD、Take a snapshot of each node and verify the configuration is the same

An administrator is planning for a six node cluster but is concerned about the administration needed tomanage user accounts throughout the cluster. What PowerHA feature could the administrator use to reducethe administration overhead?()A、LDAP Authentication ModuleB、Smart Assist for Active DirectoryC、C-SPOC for user and password managementD、File Collections designating one node as the primary authentication node

A cluster administrator has been asked to install HACMP on two nodes with the following  hardware:   -two CPUs, - 1GB RAM, - one 1 36GB drive, -two 10/100/1000 Ethernet adapters, and -GB Fibre Channel adapters dual attached to SAN storage.  In order to eliminate single points of failure,the administrator should first add which of the following:()   A、 an additional 1GB RAM to each node.B、 Another bootable mirrored disk drive.C、 A 10/100/1000 GB Ethernet adapter to be attached to a redundant switch.D、 Nothing,because this is a viable cluster solution with no single points of failure.

Company.com performs cluster verification every Sunday night with a corn job. The systems administrator reviews the /var/hacmp/clverify/clverify.log on Monday morning and notice that cluster verification posted a message about inconsistent filesystem names in one of the shared volume groups.  What should the administrator do?()  A、 Cause a fallover to occur on the resource group.B、 Export the volume groups and re-import them on all nodes.C、 Run an importvg -L command on all the nodes in the cluster.D、 Investiage recent changes to the shared volume group and use C-SPOC to correct inconsistencies.

A system administrator needs to replace a mirrored disk.  After performing the proper removal process and replacing the disk, which of the following set of commands should be performed to bring the disk back into production?()A、 reboot, mklvcopy, syncvg B、 cfgmgr -vl ssar, chvg -va, syncvg C、 cfgmgr, extendvg, syncvg D、 extendvg, mklvcopy, syncvg

You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain.   You administer a Network Load Balancing cluster that consists of three nodes. Each node runs Windows Server 2003 and contains a single network adapter. The Network Load Balancing cluster can run only in unicast mode. The Network Load Balancing cluster has converged successfully.   To increase the utilization of the cluster, you decide to move a particular application to each node of the cluster. For this application to run, you must add a Network Load Balancing port rule to the nodes of the cluster.   You start Network Load Balancing Manager on the second node of the cluster. However, Network Load Balancing Manager displays a message that it cannot communicate with the other two nodes of the cluster.  You want to add the port rule to the nodes of the cluster.   What should you do?  ()A、 Use Network Load Balancing Manager on the Network Load Balancing default host to add the port rule.B、 Change the host priority of the second node to be the highest in the cluster, and then use Network Load Balancing Manager to add the port rule.C、 Run the nlb.exe drain command on each node, and then use Network Load Balancing Manager to add the port rule.D、 Add the port rule through Network Connections Properties on each node.

单选题An administrator will be performing a PowerHA upgrade on a cluster from version 5.3 to version 5.5. Which ofthe following tasks will verify a successful migration?()AUse the clstat command and verify the cluster is in a stable stateBAfter each node is upgraded, run a verification and synchronizationCAfter all nodes are upgraded, run a verification and synchronizationDTake a snapshot of each node and verify the configuration is the same

单选题An administrator runs clstat on a cluster node and receives the following response: ’Can not get  Cluster Information.’ Which of the following daemons may need to be started in order to correct this problem?()A topsvcsB clinfoESC snmpinfoD clsmuxpdES

单选题You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain.   You administer a Network Load Balancing cluster that consists of three nodes. Each node runs Windows Server 2003 and contains a single network adapter. The Network Load Balancing cluster can run only in unicast mode. The Network Load Balancing cluster has converged successfully.   To increase the utilization of the cluster, you decide to move a particular application to each node of the cluster. For this application to run, you must add a Network Load Balancing port rule to the nodes of the cluster.   You start Network Load Balancing Manager on the second node of the cluster. However, Network Load Balancing Manager displays a message that it cannot communicate with the other two nodes of the cluster.  You want to add the port rule to the nodes of the cluster.   What should you do?  ()A Use Network Load Balancing Manager on the Network Load Balancing default host to add the port rule.B Change the host priority of the second node to be the highest in the cluster, and then use Network Load Balancing Manager to add the port rule.C Run the nlb.exe drain command on each node, and then use Network Load Balancing Manager to add the port rule.D Add the port rule through Network Connections Properties on each node.

单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now in a high security environment, you manage a SQL Server 2008 cluster. You intend to configure and use encrypted connections for the clustered virtual SQL Server. You have to install a certificate. The cetification will be used for encryption. What should you do?()AIn the cluster quorum drive, install the encryption certificate BIn the SQL Server shared disk, install the encryption certificate Cin the cluster group, install the encryption certificate. DOn each individual node, install the encryption certificate

单选题An administrator is planning for a six node cluster but is concerned about the administration needed tomanage user accounts throughout the cluster. What PowerHA feature could the administrator use to reducethe administration overhead?()ALDAP Authentication ModuleBSmart Assist for Active DirectoryCC-SPOC for user and password managementDFile Collections designating one node as the primary authentication node

单选题A cluster administrator has been asked to install HACMP on two nodes with the following  hardware:   -two CPUs, - 1GB RAM, - one 1 36GB drive, -two 10/100/1000 Ethernet adapters, and -GB Fibre Channel adapters dual attached to SAN storage.  In order to eliminate single points of failure,the administrator should first add which of the following:()A an additional 1GB RAM to each node.B Another bootable mirrored disk drive.C A 10/100/1000 GB Ethernet adapter to be attached to a redundant switch.D Nothing,because this is a viable cluster solution with no single points of failure.

单选题A System p administrator found a process on the server that should be stopped.  Which of the following commands can be used to list all the signal actions defined for this process()ApsBpstatClssigDprocsig

单选题Node ’C’ has just completed reintegration in a three-node cluster. The hacmp.out logifle displays  The event node_up_complete for Node ’C’. The cluster administrator wishes to verify that the cluster is stable.  In addition to reviewing the cluster log files,what utility should be run to verify the cluster state?()A clstatB clinfoC cldiagD clverify

单选题An administrator will use the discovery process to capture information about common cluster storage. Whichof the following commands should the administrator run on each participating node against the shared diskhdisk3 to ensure that this disk is successfully identified by the discovery process?()Achpv -ay hdisk3Bcfgmgr -l hdisk3Cchdev l hdisk3 a pv=yesDchdev l hdisk3 a reserve_policy=no_reserve

单选题Two MAG4610s are running in an active/passive cluster configuration. The system administrator is planning to apply a service package to the cluster.Which process should the administrator follow?()APerform the upgrade on the active node of the cluster. When completed, the node reboots and then pushes the service package to the passive node automatically.BPerform the upgrade on the passive node of the cluster. When completed, the node reboots and then pushes the service package to the active node automatically.COn the clustering status page, disable the active node. Perform the upgrade on the disabled node. When completed and the node reboots, enable the node on the clustering status page.Repeat the process on the passive node.DOn the clustering status page, disable the passive node. Perform the upgrade on the disabled node. When completed and the node reboots, enable the node on the clustering status page.Repeat the process on the active node.

单选题An administrator is experiencing availability issues on a Linux server. The administrator decides tocheck the server for an IP address conflict on the server. Which of the following commands should the administrator use?()AtracerouteBtracertCifconfigDipconfig

单选题Company.com performs cluster verification every Sunday night with a corn job. The systems administrator reviews the /var/hacmp/clverify/clverify.log on Monday morning and notice that cluster verification posted a message about inconsistent filesystem names in one of the shared volume groups.  What should the administrator do?()A Cause a fallover to occur on the resource group.B Export the volume groups and re-import them on all nodes.C Run an importvg -L command on all the nodes in the cluster.D Investiage recent changes to the shared volume group and use C-SPOC to correct inconsistencies.

单选题An administrator has encountered a problem with a particular piece of software installed on the serverand begins the troubleshooting process. Which of the following is the FIRST place the administrator should look for specific information about the problem?()A The supporting documentationB The vendors websiteC The InternetD The servers event logs

单选题An administrator has encountered a problem with a particular piece of software installed on the server and begins the troubleshooting process. Which of the following is the FIRST place the administrator should look for specific information about the problem?()AThe supporting documentationBThe vendor websiteCThe InternetDThe server event logs

单选题A cluster administrator is trying to configure tmssa for the non-IP network. Having installed the devices.ssa.tm.rte fileset, what is the next step that must be performed to create the target mode devices?()A Reboot each cluster node.B Change the ssa node number to a non-zero value.C Change the SSAR device state from defined to available.D Run the cfgmgr process on each node to create the target mode devices.

单选题A system administrator needs to replace a mirrored disk.  After performing the proper removal process and replacing the disk, which of the following set of commands should be performed to bring the disk back into production?()A reboot, mklvcopy, syncvg B cfgmgr -vl ssar, chvg -va, syncvg C cfgmgr, extendvg, syncvg D extendvg, mklvcopy, syncvg