Company.com is migrating from a third party managed disk subsystem to an IBM TotalStorage Enterprise Storage Server. Connection of the new storage server is complete, and it has been tested on all of the nodes in the three node HACMP cluster.  How does the customer migrate to the new storage server with minimum down time?()A、 Shut down one node at a time and let the other node serve the applicationB、 Stop HACMP with the forced option and perform migration of the disks on one node,then restart HACMPC、 Stop both nodes and perform the migration all at once using standard AIX commands in parallel, then restart the clusterD、 Use C-SPOC to add the new disks to the cluster and migrate the information off the existing disks, then remove the old disks with C-SPOC

Company.com is migrating from a third party managed disk subsystem to an IBM TotalStorage Enterprise Storage Server. Connection of the new storage server is complete, and it has been tested on all of the nodes in the three node HACMP cluster.  How does the customer migrate to the new storage server with minimum down time?()

  • A、 Shut down one node at a time and let the other node serve the application
  • B、 Stop HACMP with the forced option and perform migration of the disks on one node,then restart HACMP
  • C、 Stop both nodes and perform the migration all at once using standard AIX commands in parallel, then restart the cluster
  • D、 Use C-SPOC to add the new disks to the cluster and migrate the information off the existing disks, then remove the old disks with C-SPOC

相关考题:

Users are reporting problems connecting to servers in the remote company.com domain. The administrator suspects this to be a DNS problem.Which of the following commands would the administrator run to identify the DNS server of the remote company.com?()A. dig company.com nsB. ipconfig/allC. ifconfig-aD. dig company.com mx

Users are reporting problems connecting to servers in the remote company.com domain. The administrator suspects this to be a DNS problem. Which of the following commands would the administrator run to identify the DNS server of the remote company.com?()A、dig company.com nsB、ipconfig/allC、ifconfig-aD、dig company.com mx

During Company.com planning session,Company.com presents the details of the current  Network design. The network design serves four separate company facilities, each on as separate subnet. As part of a disaster recovery plan, the customer is evaluating the use of HACMP. Specifically, the have reviewed IPAT via IP aliasing and are questioning the number of IP subnets required.  Given the customer’s current configuration,what is the recommended minimum number of IP subnets that would be required?()A、 4B、 5C、 6D、 8

You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com policy prohibits the users from changing their password by using Outlook Web App (OWA). What should you do?()A、The best option is to set up an Outlook Web App Mailbox policy so that the users comply with the Company.com policy.B、The best option is to set up a Group Policy Object so that the users comply with the Company.com policy.C、The best option is to change the authentication settings of the OWA virtual directory so that the users comply with the Company.com policy.D、The best option is to change the authentication settings of the IISADMPWD virtual directory so that the users comply with the Company.com policy.

You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.the Company.com contains an exchange server 2010 client access server named -ex16 that is accessible via the internet with the following: mail.Company.com or autodiscover.Company.com.during the course of the day you receive an instruction from the cio to ensure that the mobile users is able to make use of auto discover on the internet.What should you do?()A、The best option is to set the external URL for Microsoft-Server-ActiveSync to $NULL.B、The best option is to set the external URL for Microsoft-Server-ActiveSync to https:// ExamWays-ex16.com/Microsoft - Server - ActiveSync.C、The best option is to set the external URL for Microsoft-Server-ActiveSync to https://mail. Company.com/Microsoft- Server- ActiveSync.D、The best option is to set the external URL for Microsoft-Server-ActiveSync to http://autodiscover. Company.com/Microsoft- Server- ActiveSync.

You work as a network exchange administrator at Company.com.the Company.com network currently consists of a single active directory forest containing a single domain named Company.com.The Company.com organization makes use of microsoft exchange server 2010 as their messaging solution.The Company.com organization currently makes use of a computer named -ex01 which hosts a single mailbox database named kingdatabase.during the course of the business week you receive instruction from Company.com to have the transaction log files of kingdatabase moved.What should you do?()A、You should consider having the Set-ExchangeServer cmdlet used.B、You should consider having the Set-MailboxDatabase cmdlet used.C、You should consider having the Move-DatabasePath cmdlet used.D、You should consider having the Move-Mailbox cmdlet used.

You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.The Company.com organization currently makes use of a computer named -ex01 which hosts a mailbox database named kingdatabase which contains 25 user mailboxes.during the course of the business week you receive instruction from Company.com to create a new public folder database named kingpublic whilst ensuring you configure kingpublic as the default public folder database for each mailbox on -ex01.What should you do?()A、you should consider having the properties of -ex01 modified.B、You should consider having the properties of KingPublic modified.C、You should consider having the properties of every mailbox modified.D、You should consider having the properties of KingDatabase modified.

You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.the Company.com contains an exchange server 2010 mailbox server named -ex20 that contains a mailbox database.a Company.com manager wants the see the last logon time of the employees at Company.com. What should you do?()A、The best option is to run the Get-MailboxDatabase from the Exchange Management Shell.B、The best option is to run the Get-MailboxStatistics from the Exchange Management Shell.C、The best option is to create and export a filter from the Exchange Management Console.D、The best option is to run the Remote Connectivity Analyzer from the Exchange Management Console.

You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com policy prohibits the users from changing their password by using Outlook Web App (OWA).However, they can use Windows to change their passwords.What should you do?()A、The best option is to configure the settings on the Segmentation tab, in the properties of the OWA virtual directory so that the users comply with the Company.com policy.B、The best option is to configure the settings on the Account tab, in the properties of the user accounts so that the users comply with the Company.com policy.C、The best option is to configure the settings on the Mailbox Features tab, in the properties of the mailboxes so that the users comply with the Company.com policy.D、The best option is to configure the settings on the Authentication tab, in the properties of the OWA virtual directory so that the users comply with the Company.com policy.

You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com security policy prohibits the employees to send certain words between them.What should you do?()A、The best option is to create an Outlook Protection Rule to comply with the Company.com security policy.B、The best option is to set up a content filtering feature to comply with the Company.com security policy.C、The best option is to create a transport rule to comply with the Company.com security policy.D、The best option is to set up a sender reputation feature to comply with the Company.com security policy.

Company.com has employed you as their Exchange administrator.The Company.com network contains an Exchange Server 2010 Organization.You are responsible for managing the Company.com network.You receive an instruction from management to reject e-mail messages that have a spam confidence level (SCL) of 5.You thus decide to configure the organization to accomplish this task. What should you do?()A、You should consider configuring the sender reputation.B、You should consider configuring the sender filtering.C、You should consider configuring the content filtering.D、You should consider configuring the recipient filtering.

You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.Company.com has merged with another company.The users at Company.com have complained that they are not able to share contacts with the users in the merge company.However, they can share free/busy information.The users at Company.com need to share contacts.What should you do?()A、You should consider changing the EWS virtual directory.B、You should consider changing the Federation Trust.C、You should consider changing the Organizational Relationship.D、You should consider changing the default sharing policy.

单选题You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com security policy prohibits the employees to send certain words between them.What should you do?()AThe best option is to create an Outlook Protection Rule to comply with the Company.com security policy.BThe best option is to set up a content filtering feature to comply with the Company.com security policy.CThe best option is to create a transport rule to comply with the Company.com security policy.DThe best option is to set up a sender reputation feature to comply with the Company.com security policy.

单选题You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.the Company.com contains an exchange server 2010 client access server named -ex13.The mobile clients at Company.com are configured to either run windows mobile 5.0, windows mobile 6.1 or windows mobile 6.5.the mobile users use the internet to connect to -ex13, using mail.Company.com.you have received instructions from the cio to equip -ex13 with a certificate.however, the mobile users need to connect to -ex13 from the internet via exchange activesync.What should you do?()AYou should consider including Company.com in the certificate.Byou should consider including -ex13.Company.com in the certificate.CYou should consider including EAS.Company.com in the certificate.DYou should consider including mail.Company.com in the certificate.

单选题You work as a network Exchange administrator at Company.com.The Company.com network  currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.The Company.com network users have been configured by Company.com to have the @Company.com email address suffix.During the course of the business week you receive instruction from Company.com to configure a public folder named KingPublic for the Internet users to post content by sending e-mail to KingPublic@Company.com.  What should you do?()AYou should consider having a new mail contact created which has the e-mail address KingPublic@Company.com.You should then have a transport rule created.BYou should consider having a new mailbox created which has the e-mail address KingPublic@Company.com.You should then have a transport rule created.CYou should consider having mail enabled for KingPublic.DYou should consider having the author role assigned to Anonymous.