单选题A cluster administrator is trying to configure tmssa for the non-IP network. Having installed the devices.ssa.tm.rte fileset, what is the next step that must be performed to create the target mode devices?()A Reboot each cluster node.B Change the ssa node number to a non-zero value.C Change the SSAR device state from defined to available.D Run the cfgmgr process on each node to create the target mode devices.

单选题
A cluster administrator is trying to configure tmssa for the non-IP network. Having installed the devices.ssa.tm.rte fileset, what is the next step that must be performed to create the target mode devices?()
A

 Reboot each cluster node.

B

 Change the ssa node number to a non-zero value.

C

 Change the SSAR device state from defined to available.

D

 Run the cfgmgr process on each node to create the target mode devices.


参考解析

解析: 暂无解析

相关考题:

You are an administrator of an active/passive cluster of MAG Series devices running in mixed- mode configuration (IF-MAP server and authenticating users). The active user count is quickly approaching the maximum limit of the cluster. You have been directed to reconfigure the cluster to an active/active cluster and add a new license to increase the total number of active users the cluster can support.What must you do before changing the cluster configuration?()A. Apply the new license to the passive node of the cluster.B. Configure an external load balancer to hold the V IP.C. Disable the active node in the cluster.D. Remove the IF-MAP server configuration.

You are the administrator of two Microsoft Windows 2000 advanced server computers. On these servers, you are configuring a database that will store accounting information for your company.The data must be available at all times. Interruptions in data connectivity should not last longer than five minutes. Any changes to the database should not require you to reconfigure the client computers.How should you configure the database?A.Configure the database on the two servers as a SQL Server 2000 cluster.B.Configure the database on one server, and then configure a standby database on the second server.C.Configure the database on each server. Use Microsoft Distributed Transaction Coordinator to keep the two servers perfectly synchronized.D.Configure the database as a federated database, and then partition half the data on each server.

An administrator has added an additional network adapter to each cluster node. The adapters  have been configured and tested, and the /etc/hosts file has been updated. However,the adapters do not appear in the pick list when the administrator tries to define the adapters to HACMP.  What would be required to correct this problem?()  A、 Rerun autodiscovery.B、 Synchronize the cluster.C、 Restart cluster services.D、 Delete and recreate the adapters.

In which file can the administrator view the detailed results of the overnight cluster automatic verification?()A、clutils.logB、cluster.logC、clverify.logD、autoverify.log

An administrator is configuring an application monitor. Upon encountering an unrecoverable error the administrator does not want the resource group to failover. How can the application monitor be configured toachieve this?()A、Configure the application monitor with a restart count of 0B、Configure the application monitor with a monitor mode of NotifyC、Configure the application monitor with a notify method of MonitorD、Configure the application monitor with a failure action of Notify

An administrator attempts to install the latest security patches for an older server. When the administrator runs the patch installer, the install fails. The administrator tries again, and the installer fails again.  Which of the following is the MOST likely reason for this?()A、 The administrator improperly configured the virtual memory settings on the server.B、 The administrator is using incorrect patch switches for the install.C、 The administrator is trying to install security patches for software that is not installed.D、 The administrator is trying to install patches that require hard drive encryption on the server.

An administrator wants to install Web SMIT on a node that is not part of a cluster. Which PowerHA filesetprovides this function?()A、cluster.sysmgt.wsmB、cluster.es.client.wsmC、cluster.es.server.websmD、cluster.sysmgt.websm.rte

A cluster administrator is trying to configure tmssa for the non-IP network. Having installed the devices.ssa.tm.rte fileset, what is the next step that must be performed to create the target mode devices?()  A、 Reboot each cluster node.B、 Change the ssa node number to a non-zero value.C、 Change the SSAR device state from defined to available.D、 Run the cfgmgr process on each node to create the target mode devices.

An administrator is planning a cluster running applications in 3 separate resource groups. RGA - Database 1 RGB - Web Server RGC - Database 2 Database 1 and Database 2 must be online before the Web Server. All resource groups have a Startup Policyof Online on Home Node Only. Which of the following will ensure that the resource groups are processed in the correct order?()A、Set the Serial Acquisition OrderB、Set the Parallel Acquisition OrderC、Configure Online on the Same Node DependencyD、Configure Online on Different Nodes Dependency

An administrator runs clstat on a cluster node and receives the following response: ’Can not get  Cluster Information.’ Which of the following daemons may need to be started in order to correct this problem?()A、 topsvcsB、 clinfoESC、 snmpinfoD、 clsmuxpdES

An administrator has a 2 node cluster running PowerHA version 5.5. They remove a resource group from theactive cluster configuration. When performing a verify and synchronize of the cluster, the administrator getsthe following error: "migcheck[471]: cl_connect() error, nodename=Node1, rc=-1 cldare: A communication error prevents obtaining the VRMF from remote nodes. A DARE event cannot be run until this is corrected. Please ensureclcomd is running." What is the most likely cause of this error?()A、There is a DARE lock in placeB、A PowerHA migration is in progressC、Cluster services is not active on the other nodeD、The other cluster node is running a different version of RSCT

An administrator is planning for a six node cluster but is concerned about the administration needed tomanage user accounts throughout the cluster. What PowerHA feature could the administrator use to reducethe administration overhead?()A、LDAP Authentication ModuleB、Smart Assist for Active DirectoryC、C-SPOC for user and password managementD、File Collections designating one node as the primary authentication node

An administrator has integrated a new application into an existing resource group. An application server withstart and stop scripts was defined and added to the resource group definition. The cluster was thensynchronized. How can the new application be started with minimal downtime?()A、The administrator will need to perform an rg_move operationB、The administrator will need to un-manage and re-manage the resource groupC、The administrator will need to execute the new start script from the command lineD、The new start script will be executed as part of the DARE operation to synchronize the cluster

An administrator wants to use the online planning worksheets as an aid to configuring a PowerHA cluster.Which PowerHA fileset would the administrator need to install in order to obtain this tool?()A、cluster.es.hawB、cluster.es.worksheetsC、cluster.es.tools.worksheetsD、cluster.es.server.worksheets

How can you configure High Availability for interacting with a non-Oracle database using WebLogic?()A、Configure multiple physical data sources and reuse the same JNDI name for each.B、Use the "compatibility" option of Active GridLink to enable compatibility with non-Oracle  databases.C、Configure a single physical data source for each node in a database cluster and wrap it using  Multi Data Source.D、Configure a Data Source Group that contains a physical connection pool to each node in the  database cluster.

You need to design a Windows Server Update Services (WSUS) infrastructure that meets the  following requirements:   èThe updates must be distributed from a central location.   èAll computers must continue to receive updates in the event that a server fails. What should you include in your design?()A、Configure two WSUS servers in a Microsoft SQL Server 2008 failover cluster. Configure each WSUS  server to use a local database.B、Configure a single WSUS server to use multiple downstream servers. Configure each WSUS server touse a RAID 1 mirror and a local database.C、Configure a single WSUS server to use multiple downstream servers. Configure each WSUS server to  use a RAID 5 array and a local database.D、Configure a Microsoft SQL Server 2008 failover cluster. Configure two WSUS servers in a Network Load Balancing cluster. Configure WSUS to use the remote SQL Server 2008 database instance.

You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain.   You administer a three-node Network Load Balancing cluster. Each cluster node runs Windows Server 2003 and has a single network adapter. The cluster has converged successfully.   You notice that the nodes in the cluster run at almost full capacity most of the time. You want to add a fourth node to the cluster. You enable and configure Network Load Balancing on the fourth node.   However, the cluster does not converge to a four-node cluster. In the System log on the existing three nodes, you find the exact same TCP/IP error event. The event has the following description: "The system detected an address conflict for IP address 10.50.8.70 with the system having network hardware address 02:BF://0A:32:08:46."   In the System log on the new fourth node, you find a similar TCP/error event with the following description: "The system detected an address conflict for IP address 10.50.8.70 with the system having network hardware address 03:BF://0A:32:08:46." Only the hardware address is different in the two descriptions.  You verify that IP address 10.50.8.70 is configured as the cluster IP address on all four nodes.  You want to configure a four-node Network Load Balancing cluster.   What should you do?  ()A、 Configure the fourth node to use multicast mode.B、 Remove 10.50.8.70 from the Network Connections Properties of the fourth node.C、 On the fourth node, run the nlb.exe resume command.D、 On the fourth node, run the wlbs.exe reload command.

You are a network administrator for your company. The network contains four Windows Server 2003 computers configured as a four-node server cluster.   Each cluster node is the preferred owner of a clustered instance of Microsoft SQL Server 2000, and each cluster node is configured as a possible owner of all other instances of SQL Server. All nodes have identically configured hardware. All four nodes operate at a sustained 70 percent CPU average.   You add a server that has identically configured hardware to the cluster as a fifth node.   You want each SQL Server instance to continue operating at the same level of performance in the event of a single node failure.   What should you do? ()A、 Clear the Affect group check box in the cluster resource properties for each SQL Server instance.B、 Configure the fifth node as the only possible owner other than the existing preferred owner of the cluster resources that are associated with each SQL Server instance.C、 Configure the fifth node as the preferred owner of each cluster group that contains an SQL Server instance.D、 Enable failback on each group that contains an SQL Server instance.

You need to design the Exchange 2003 server configuration for remote e-mail access. What should you do?()A、Configure the front-end servers in each branch office to be members of a new Active Directory siteB、Configure the back-end servers to have server encryption certificates issued by a commercial certification authority (CA)C、Configure two back-end servers to be members of a Network Load Balancing cluster. Configure Network Load Balancing for inbound RPC connectionsD、Configure multiple front-end servers in each branch office to be members of a Network Load Balancing cluster. Configure Network Load Balancing for inbound HTTPS connections

You are a network administrator for your company. The network consists of a single Active Directory domain. All domain controllers and member servers run Windows Server 2003, Enterprise Edition. All client computers run Windows XP Professional.   The company has one main office and one branch office. The two offices are connected by a T1 WAN connection. There is a hardware router at each end of the connection. The main office contains 10,000 client computers, and the branch office contains 5,000 client computers.   You need to use DHCP to provide IP addresses to the Windows XP Professional computers in both offices. You need to minimize network configuration traffic on the WAN connection. Your solution needs to prevent any component involved in the DHCP architecture from becoming a single point of failure.   What should you do?  ()A、 At the main office, configure two Windows Server 2003 computers as a DHCP server cluster. Configure the branch office router as a DHCP relay agent.B、 At the main office, configure two Windows Server 2003 computers as a DHCP server cluster. At the branch office, configure a Windows Server 2003 computer as a DHCP relay agent.C、 At the main office, configure two Windows Server 2003 computers as a DHCP server cluster. At the branch office, configure two Windows Server 2003 computers as a DHCP server cluster.D、 At the main office, configure two Windows Server 2003 computers as DHCP servers. Configure one DHCP server to handle 80 percent of the IP address scope and the other DHCP server to handle 20 percent. Configure the branch office router as a DHCP relay agent.

You are a network adminstrator for your company. You install an intranet application on three Windows Server 2003 computers. You configure the servers as a Network Load Balancing cluster. You configure each server with two network adapters. One network adapter provides client computers access to the servers. The second network adapter is for cluster communications. Cluster communications is on a separate network segment.   The network team wants to reduce the cluster’s vulnerability to attack. These servers need to be highly available. The network team decides that the Network Load Balancing cluster needs to filter IP ports. The team wants the cluster to allow only the ports that are required for the intranet application.   You need to implement filtering so that only the intranet application ports are available on the cluster. You need to achieve this goal by using the minimum amount of administrative effort.   What should you do?  ()A、 Use Network Load Balancing Manager to configure port rules. Allow only the intranet application ports on the cluster IP address.B、 Use TCP/IP filtering on each server. Configure only the intranet application ports on the network adapter that provides client computers access to the servers.C、 Use TCP/IP filtering on each server. Configure only the intranet application ports on both of the network adapters.D、 Configure Routing and Remote Access on each server. Use Routing and Remote Access input filters to allow only the intranet application ports on the network adapter that provides client computers access to the servers.

单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now in a high security environment, you manage a SQL Server 2008 cluster. You intend to configure and use encrypted connections for the clustered virtual SQL Server. You have to install a certificate. The cetification will be used for encryption. What should you do?()AIn the cluster quorum drive, install the encryption certificate BIn the SQL Server shared disk, install the encryption certificate Cin the cluster group, install the encryption certificate. DOn each individual node, install the encryption certificate

单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. On two cluster-ready nodes, you intend to perform an installation of a SQL Server 2008 mission-critical cluster. Constant availability is needed by the mission-critical cluster. You have to configure the SQL Server cluster to failover and reduce the service disruption to the least. Which failover option should you use?()AYou should allow failback only during non-business hours BYou should immediately allow failbackCYou should prevent automatic failback DYou should allow failback only during business hours

单选题Node ’C’ has just completed reintegration in a three-node cluster. The hacmp.out logifle displays  The event node_up_complete for Node ’C’. The cluster administrator wishes to verify that the cluster is stable.  In addition to reviewing the cluster log files,what utility should be run to verify the cluster state?()A clstatB clinfoC cldiagD clverify

单选题You are a network adminstrator for your company. You install an intranet application on three Windows Server 2003 computers. You configure the servers as a Network Load Balancing cluster. You configure each server with two network adapters. One network adapter provides client computers access to the servers. The second network adapter is for cluster communications. Cluster communications is on a separate network segment.   The network team wants to reduce the cluster’s vulnerability to attack. These servers need to be highly available. The network team decides that the Network Load Balancing cluster needs to filter IP ports. The team wants the cluster to allow only the ports that are required for the intranet application.   You need to implement filtering so that only the intranet application ports are available on the cluster. You need to achieve this goal by using the minimum amount of administrative effort.   What should you do?  ()A Use Network Load Balancing Manager to configure port rules. Allow only the intranet application ports on the cluster IP address.B Use TCP/IP filtering on each server. Configure only the intranet application ports on the network adapter that provides client computers access to the servers.C Use TCP/IP filtering on each server. Configure only the intranet application ports on both of the network adapters.D Configure Routing and Remote Access on each server. Use Routing and Remote Access input filters to allow only the intranet application ports on the network adapter that provides client computers access to the servers.

单选题An administrator attempts to install the latest security patches for an older server. When the administrator runs the patch installer, the install fails. The administrator tries again, and the installer fails again. Which of the following is the MOST likely reason for this?()AThe administrator improperly configured the virtual memory settings on the server.BThe administrator is using incorrect patch switches for the install.CThe administrator is trying to install security patches for software that is not installed.DThe administrator is trying to install patches that require hard drive encryption on the server.

单选题You are a network administrator for your company. You install Windows Server 2003 on two servers named Server1 and Server2. You configure Server1 and Server2 as a two-node cluster.   You configure a custom application on the cluster by using the Generic Application resource, and you put all resources in the Application group. You test the cluster and verify that it fails over properly and that you can move the Applications group from one node to the other and back again.   The application and the cluster run successfully for several weeks. Users then report that they cannot access the application. You investigate and discover that Server1 and Server2 are running but the Application group is in a failed state.   You restart the Cluster service and attempt to bring the Application group online on Server1. The Application group fails. You discover that Server1 fails, restarts automatically, and fails again soon after restarting. Server1 continues to fail and restart until the Application group reports that it is in a failed state and stops attempting to bring itself back online.   You need to configure the Application group to remain on Server2 while you research the problem on Server1.   What should you do?  ()A On Server2, configure the failover threshold to 0.B On Server2, configure the failover period to 0.C Remove Server1 from the Possible owners list.D Remove Server1 from the Preferred owners list.