单选题An administrator is planning for a six node cluster but is concerned about the administration needed tomanage user accounts throughout the cluster. What PowerHA feature could the administrator use to reducethe administration overhead?()ALDAP Authentication ModuleBSmart Assist for Active DirectoryCC-SPOC for user and password managementDFile Collections designating one node as the primary authentication node

单选题
An administrator is planning for a six node cluster but is concerned about the administration needed tomanage user accounts throughout the cluster. What PowerHA feature could the administrator use to reducethe administration overhead?()
A

LDAP Authentication Module

B

Smart Assist for Active Directory

C

C-SPOC for user and password management

D

File Collections designating one node as the primary authentication node


参考解析

解析: 暂无解析

相关考题:

When you access the Cisco CRS Administration page for the first time in a cluster, the system automatically initiates the cluster setup procedure. You perform this procedure one time for a cluster. Whatdo you accomplish in this procedure?()A、identify your Cisco CRS license files and location, enter information about your LDAP, and designate a Cisco CRS administrator B、identify CSQs and JTAPI user and designate a Cisco CRS administrator C、identify resources and RM user and enter information about your LDAP D、identify your Cisco CRS license files and location, enter information about your LDAP, and designate IPCC Express resources

An administrator plans to apply a fix pack to the PowerHA software using a rolling migration. At what stage ofthe migration is a cluster verification supported?()A、Individually before each node is upgradedB、Individually before and after each node is upgradedC、Individually after each node has been upgradedD、Collectively after all nodes have been upgraded

An administrator mistakenly shutdown production after a fallover because the service IP address  Was shifted from the normal production node to the standby node.  What can be done to avoid this type of mistake in the future?()  A、 Include the service IP address in the administrator’s PS1 promptB、 Alias the service IP address to the hostname in the /etc/host fileC、 Define a persistent IP address with HACMP and make it a practice to use the persistent address for administration workD、 Add a DNS entry to map the standby node name to the service IP address so telnet connections will be to the correct node

During a cluster functionality test, and administrator performs a graceful stop for Node ’B’ in a three-node cluster. What is the expected state of the cluster after Node ’B’successfully completes?()  A、 All cluster resources halt on Node ’B’,and one or both surviving nodes will gracefully acquire the resources.B、 All cluster processes halt on Node ’B’,the cluster resources remain active,and the remaining  nodes take no action.C、 All cluster processes stay active on Node ’B’,cluster resources are halted,and the remaining nodes take no action.D、 All cluster resources will stop,cluster processes halt on Node ’B’,and the remaining cluster nodes take no action.

An administrator wants to install Web SMIT on a node that is not part of a cluster. Which PowerHA filesetprovides this function?()A、cluster.sysmgt.wsmB、cluster.es.client.wsmC、cluster.es.server.websmD、cluster.sysmgt.websm.rte

An administrator has a 2 node cluster running PowerHA version 5.5. They remove a resource group from theactive cluster configuration. When performing a verify and synchronize of the cluster, the administrator getsthe following error: "migcheck[471]: cl_connect() error, nodename=Node1, rc=-1 cldare: A communication error prevents obtaining the VRMF from remote nodes. A DARE event cannot be run until this is corrected. Please ensureclcomd is running." What is the most likely cause of this error?()A、There is a DARE lock in placeB、A PowerHA migration is in progressC、Cluster services is not active on the other nodeD、The other cluster node is running a different version of RSCT

An administrator will be performing a PowerHA upgrade on a cluster from version 5.3 to version 5.5. Which ofthe following tasks will verify a successful migration?()A、Use the clstat command and verify the cluster is in a stable stateB、After each node is upgraded, run a verification and synchronizationC、After all nodes are upgraded, run a verification and synchronizationD、Take a snapshot of each node and verify the configuration is the same

An administrator is planning for a six node cluster but is concerned about the administration needed tomanage user accounts throughout the cluster. What PowerHA feature could the administrator use to reducethe administration overhead?()A、LDAP Authentication ModuleB、Smart Assist for Active DirectoryC、C-SPOC for user and password managementD、File Collections designating one node as the primary authentication node

An administrator wants to use the online planning worksheets as an aid to configuring a PowerHA cluster.Which PowerHA fileset would the administrator need to install in order to obtain this tool?()A、cluster.es.hawB、cluster.es.worksheetsC、cluster.es.tools.worksheetsD、cluster.es.server.worksheets

You are an administrator of an active/passive cluster of MAG Series devices running in mixed- mode configuration (IF-MAP server and authenticating users). The active user count is quickly approaching the maximum limit of the cluster. You have been directed to reconfigure the cluster to an active/active cluster and add a new license to increase the total number of active users the cluster can support. What must you do before changing the cluster configuration?()A、Apply the new license to the passive node of the cluster.B、Configure an external load balancer to hold the V IP.C、Disable the active node in the cluster.D、Remove the IF-MAP server configuration.

Two MAG4610s are running in an active/passive cluster configuration. The system administrator is planning to apply a service package to the cluster.Which process should the administrator follow?()A、Perform the upgrade on the active node of the cluster. When completed, the node reboots and then pushes the service package to the passive node automatically.B、Perform the upgrade on the passive node of the cluster. When completed, the node reboots and then pushes the service package to the active node automatically.C、On the clustering status page, disable the active node. Perform the upgrade on the disabled node. When completed and the node reboots, enable the node on the clustering status page.Repeat the process on the passive node.D、On the clustering status page, disable the passive node. Perform the upgrade on the disabled node. When completed and the node reboots, enable the node on the clustering status page.Repeat the process on the active node.

You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain.   You administer a Network Load Balancing cluster that consists of three nodes. Each node runs Windows Server 2003 and contains a single network adapter. The Network Load Balancing cluster can run only in unicast mode. The Network Load Balancing cluster has converged successfully.   To increase the utilization of the cluster, you decide to move a particular application to each node of the cluster. For this application to run, you must add a Network Load Balancing port rule to the nodes of the cluster.   You start Network Load Balancing Manager on the second node of the cluster. However, Network Load Balancing Manager displays a message that it cannot communicate with the other two nodes of the cluster.  You want to add the port rule to the nodes of the cluster.   What should you do?  ()A、 Use Network Load Balancing Manager on the Network Load Balancing default host to add the port rule.B、 Change the host priority of the second node to be the highest in the cluster, and then use Network Load Balancing Manager to add the port rule.C、 Run the nlb.exe drain command on each node, and then use Network Load Balancing Manager to add the port rule.D、 Add the port rule through Network Connections Properties on each node.

You deploy a Microsoft Exchange mobile messaging solution that uses Microsoft Windows Mobile 5.0 with Microsoft Messaging and Security Feature Pack.   The messaging infrastructure is configured to support the remote wipe feature.   When an administrator attempts to perform a remote wipe of a Windows Mobilebased device, the administrator receives a 401 error message.   You need to ensure that the administrator is authorized to perform remote wipes only.   What should you do?()A、Grant the administrator membership in the Domain Administrators group.B、Grant the administrator membership in the Exchange Administrators group.C、Add the new administrator account to the Discretionary Access Control List (DACL) of the Microsoft Exchange ActiveSync Administration folder.D、Select the Directory Security tab of the Exchange Server administration Web site, and then configure Read, Write, and Directory Browsing permissions.

You need to identify potential security threats. Which of the following security breaches might occur under the current IT and security practices?(Choose all that apply)()A、A virus that infects an IT administrator’s client computer could gain domain administrator privilegesB、Couriers could gain access to domain administrator privilegesC、Business office staff could discover couriers’ passwords and use them to access couriers’ informationD、All users could use their user accounts to gain the ability to install untested security patches on their client computers

单选题You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain.   You administer a Network Load Balancing cluster that consists of three nodes. Each node runs Windows Server 2003 and contains a single network adapter. The Network Load Balancing cluster can run only in unicast mode. The Network Load Balancing cluster has converged successfully.   To increase the utilization of the cluster, you decide to move a particular application to each node of the cluster. For this application to run, you must add a Network Load Balancing port rule to the nodes of the cluster.   You start Network Load Balancing Manager on the second node of the cluster. However, Network Load Balancing Manager displays a message that it cannot communicate with the other two nodes of the cluster.  You want to add the port rule to the nodes of the cluster.   What should you do?  ()A Use Network Load Balancing Manager on the Network Load Balancing default host to add the port rule.B Change the host priority of the second node to be the highest in the cluster, and then use Network Load Balancing Manager to add the port rule.C Run the nlb.exe drain command on each node, and then use Network Load Balancing Manager to add the port rule.D Add the port rule through Network Connections Properties on each node.

单选题An administrator plans to apply a fix pack to the PowerHA software using a rolling migration. At what stage ofthe migration is a cluster verification supported?()AIndividually before each node is upgradedBIndividually before and after each node is upgradedCIndividually after each node has been upgradedDCollectively after all nodes have been upgraded

单选题During a cluster functionality test, and administrator performs a graceful stop for Node ’B’ in a three-node cluster. What is the expected state of the cluster after Node ’B’successfully completes?()A All cluster resources halt on Node ’B’,and one or both surviving nodes will gracefully acquire the resources.B All cluster processes halt on Node ’B’,the cluster resources remain active,and the remaining  nodes take no action.C All cluster processes stay active on Node ’B’,cluster resources are halted,and the remaining nodes take no action.D All cluster resources will stop,cluster processes halt on Node ’B’,and the remaining cluster nodes take no action.

单选题An administrator is planning for a six node cluster but is concerned about the administration needed tomanage user accounts throughout the cluster. What PowerHA feature could the administrator use to reducethe administration overhead?()ALDAP Authentication ModuleBSmart Assist for Active DirectoryCC-SPOC for user and password managementDFile Collections designating one node as the primary authentication node

单选题Node ’C’ has just completed reintegration in a three-node cluster. The hacmp.out logifle displays  The event node_up_complete for Node ’C’. The cluster administrator wishes to verify that the cluster is stable.  In addition to reviewing the cluster log files,what utility should be run to verify the cluster state?()A clstatB clinfoC cldiagD clverify

单选题You deploy a Microsoft Exchange mobile messaging solution that uses Microsoft Windows Mobile 5.0 with Microsoft Messaging and Security Feature Pack.   The messaging infrastructure is configured to support the remote wipe feature.   When an administrator attempts to perform a remote wipe of a Windows Mobilebased device, the administrator receives a 401 error message.   You need to ensure that the administrator is authorized to perform remote wipes only.   What should you do?()AGrant the administrator membership in the Domain Administrators group.BGrant the administrator membership in the Exchange Administrators group.CAdd the new administrator account to the Discretionary Access Control List (DACL) of the Microsoft Exchange ActiveSync Administration folder.DSelect the Directory Security tab of the Exchange Server administration Web site, and then configure Read, Write, and Directory Browsing permissions.

单选题An administrator wants to install Web SMIT on a node that is not part of a cluster. Which PowerHA filesetprovides this function?()Acluster.sysmgt.wsmBcluster.es.client.wsmCcluster.es.server.websmDcluster.sysmgt.websm.rte

单选题An administrator mistakenly shutdown production after a fallover because the service IP address  Was shifted from the normal production node to the standby node.  What can be done to avoid this type of mistake in the future?()A Include the service IP address in the administrator’s PS1 promptB Alias the service IP address to the hostname in the /etc/host fileC Define a persistent IP address with HACMP and make it a practice to use the persistent address for administration workD Add a DNS entry to map the standby node name to the service IP address so telnet connections will be to the correct node

单选题When you access the Cisco CRS Administration page for the first time in a cluster, the system automatically initiates the cluster setup procedure. You perform this procedure one time for a cluster. Whatdo you accomplish in this procedure?()Aidentify your Cisco CRS license files and location, enter information about your LDAP, and designate a Cisco CRS administrator Bidentify CSQs and JTAPI user and designate a Cisco CRS administrator Cidentify resources and RM user and enter information about your LDAP Didentify your Cisco CRS license files and location, enter information about your LDAP, and designate IPCC Express resources

单选题Two MAG4610s are running in an active/passive cluster configuration. The system administrator is planning to apply a service package to the cluster.Which process should the administrator follow?()APerform the upgrade on the active node of the cluster. When completed, the node reboots and then pushes the service package to the passive node automatically.BPerform the upgrade on the passive node of the cluster. When completed, the node reboots and then pushes the service package to the active node automatically.COn the clustering status page, disable the active node. Perform the upgrade on the disabled node. When completed and the node reboots, enable the node on the clustering status page.Repeat the process on the passive node.DOn the clustering status page, disable the passive node. Perform the upgrade on the disabled node. When completed and the node reboots, enable the node on the clustering status page.Repeat the process on the active node.

单选题An administrator wants to use the online planning worksheets as an aid to configuring a PowerHA cluster.Which PowerHA fileset would the administrator need to install in order to obtain this tool?()Acluster.es.hawBcluster.es.worksheetsCcluster.es.tools.worksheetsDcluster.es.server.worksheets

单选题You need to identify potential security threats. Which of the following security breaches might occur under the current IT and security practices?(Choose all that apply)()AA virus that infects an IT administrator’s client computer could gain domain administrator privilegesBCouriers could gain access to domain administrator privilegesCBusiness office staff could discover couriers’ passwords and use them to access couriers’ informationDAll users could use their user accounts to gain the ability to install untested security patches on their client computers

单选题An administrator has a 2 node cluster running PowerHA version 5.5. They remove a resource group from theactive cluster configuration. When performing a verify and synchronize of the cluster, the administrator getsthe following error: "migcheck[471]: cl_connect() error, nodename=Node1, rc=-1 cldare: A communication error prevents obtaining the VRMF from remote nodes. A DARE event cannot be run until this is corrected. Please ensureclcomd is running." What is the most likely cause of this error?()AThere is a DARE lock in placeBA PowerHA migration is in progressCCluster services is not active on the other nodeDThe other cluster node is running a different version of RSCT

单选题You are an administrator of an active/passive cluster of MAG Series devices running in mixed- mode configuration (IF-MAP server and authenticating users). The active user count is quickly approaching the maximum limit of the cluster. You have been directed to reconfigure the cluster to an active/active cluster and add a new license to increase the total number of active users the cluster can support. What must you do before changing the cluster configuration?()AApply the new license to the passive node of the cluster.BConfigure an external load balancer to hold the V IP.CDisable the active node in the cluster.DRemove the IF-MAP server configuration.