While performing a site survey to document the existing environment before implementing a new HACMP cluster, it was discovered that a port filtering firewall was being used to protect the production system. The plan is to continue using the firewall and add a second firewall to avoid a single point of failure. Each node in the two-node cluster will have all of its network adapters connected to the firewalls, and all connections to the nodes will pass through these firewalls.  What must be considered about HACMP in a firewall environment?()  A、 Firewalls are not supported in a HACMP environment.B、 HACMP uses only TCP/IP so firewalls are not relevant.C、 Specific ports must be open for HACMP communications.D、 Dynamic routing must be used to properly route packets in a firewall-protected environment.

While performing a site survey to document the existing environment before implementing a new HACMP cluster, it was discovered that a port filtering firewall was being used to protect the production system. The plan is to continue using the firewall and add a second firewall to avoid a single point of failure. Each node in the two-node cluster will have all of its network adapters connected to the firewalls, and all connections to the nodes will pass through these firewalls.  What must be considered about HACMP in a firewall environment?()  

  • A、 Firewalls are not supported in a HACMP environment.
  • B、 HACMP uses only TCP/IP so firewalls are not relevant.
  • C、 Specific ports must be open for HACMP communications.
  • D、 Dynamic routing must be used to properly route packets in a firewall-protected environment.

相关考题:

Firewall is a (74) mechanism used by organizations to protect their LANs from the Internet.(74)A. reliableB. stableC. peacefulD. security

● Firewall is a ___(74)___ mechanism used by organizations to protect their LANs fromInternet.(74)A. reliable B. stable C. peaceful D. security

Which Web-filtering technology can be used at the same time as integrated Web filtering on a single branch SRX Series device?() A. Websense redirect Web filteringB. local Web filtering (blacklist or whitelist)C. firewall user authenticationD. ICAP

Firewall is a _______ mechanism used by organizations to protect their LANs from the Internet.A.reliableB.stableC.peacefulD.SecurityA.B.C.D.

Firewall is a(74) mechanism used by organizations to protect their LANs from the Internet.A.reliableB.stableC.peacefulD.security

Which Cisco product family can simultaneously implement firewall, VPN, content security, network access control, virtualization, anD content filtering?()A、catalyst switchesB、adaptive security appliancesC、intrusion prevention systemsD、protect link gateway

A new HACMP maintenance level has recently been released. An administrator is creating a  project plan that is required for applying the updates for a three-node production cluster.  To minimize downtime,what is the best way to accomplish the updates on all cluster nodes?()  A、 Perform a graceful takeover one node at a time and apply the updates.B、 Perform the updates on all nodes simultaneously using C-SPOC utilities.C、 Perform the updates on node at a time with the cluster software active.D、 Perform a graceful stop of all cluster nodes and apply updates to all nodes.

A banking customer has a firewall between their AMM and the remote console which is used to configure the chassis and blades. Due to security concerns, port 80 (http) is being blocked, denying any http access to the AMM. Which of the following would facilitate remote communication with the AMM using a GUI interface?()A、port 443 - SSL connection B、port 8080 ?http C、port 22 - SSH CLI D、port 427 - SLP connection

Which Web-filtering technology can be used at the same time as integrated Web filtering on a single branch SRX Series device?()A、Websense redirect Web filteringB、local Web filtering (blacklist or whitelist)C、firewall user authenticationD、ICAP

In the event of a GSS failure in a GSS cluster, which is true?()A、 The current connections are rerouted via the backup GSSB、 Secondary GSS cannot be used to configure the GSS clusterC、 All remaining GSSs in the cluster continue responding to any new queriesD、 All records in the GSS database are flushed and reconstructed again using a new master GSS

While installing the equipment for a new two-node cluster, it is discovered that the disk subsystem  Rack has one connection to the power mains. The explanation given was that the disks are to be mirrored between the two disk drawers in the rack and that a failure in either of the disk drawers would simply result in half of the disk being lost.  What can be done to avoid a single point of failure?()   A、 Customize HACMP to overcome quorum issues.B、 Add a second PDU to separate the power connections.C、 Use RAID5 when implementing two IO racks in a HACMP environment.D、 Add another shared disk to each volume group to avoid quorum issues during fallover.

Company.com has several network adapters configured as backup paths using the Virtual IP Addressing and dynamic routing of AIX. A second node needs to be added to the environment to crate a cluster. What considerations must be addressed during the planning session?()  A、 HACMP supports most types of networks,including Virtual IP Addressing by AIX.B、 If HACMP IP aliasing is used,the devices may be the Virtual IP type used by AIX.C、 Using the AIX Virtual IP Addressing scheme HACMP can provide near fault tolerant availability of the network.D、 The AIX Virtual Addressing mechanism is not supported by HACMP,but a similar configuration can be created in HACMP.

An administrator has had a request from the data center for method to monitor the status of an  HACMP cluster. The monitoring software environment currently used is not compatible with SNM at this time, and there is not time to crate a new tool. There is also a restriction that the data center personnel not be allowed to login to the HACMP cluster nodes. What method will provide the solution for customer?()  A、 The clstat.cgi program will provide a solution.B、 The customer must install Tivoli with the HACMP plugin for monitoring the cluster.C、 The clinfo program included in the HACMP distribution will solve the monitoring issues.D、 Customize the cluster to send error notifications for every event to an email at the network control center.

During an HACMP migration,two nodes of a four-node cluster have been migrated. The existing hardware of the remaining two nodes do not meet the pre-requisites of the HACMP level that is being installed.  Which of the following is the best method for resolving this issue?()A、 Upgrade the unsupported hardware and continue with the migration.B、 Restore the two nodes that have been migrated with a cluster snapshot.C、 Restore the two nodes that have not been migrated with a cluster snapshot.D、 Synchronize the cluster to allow the nodes that didn’t migrate to join the cluster.

Company.com has two sites that are 3072 kilometers apart and wants to implement HACMP  between eh two locations. The nodes at each location must be capable of running the application in the event of a failure. Currently the customer’s disk technology is SCSI.  How can HACMP be used in this environment?()  A、 HACMP cannot span sites; the environment must be contained in a single site.B、 HACMP/XD://HAGeo has unlimited distance mirroring that may be appropriate for this environment.C、 HACMP cannot be split into two sites that exceed the limitation s of the storage cable length.D、 HACMP/XD://PPRC that is included with the base HACMP distribution will enable site-to-site  communications in HACMP.

Which two statements are true regarding firewall user authentication?()A、When configured for pass-through firewall user authentication, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.B、When configured for Web firewall user authentication only, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.C、If a JUNOS security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted to perform authentication.D、If a JUNOS security device is configured for Web firewall user authentication, new sessions are automatically intercepted to perform authentication.

You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services,and configuring aweb services infrastructure. Your company has a Network Load Balancing cluster named nlb.wiikigo.com.The cluster hosts are named WEB1 and WEB2. The cluster is configured with a single port rule that evenlydistributes HTTP traffic between both hosts. WEB2 needs to be configured to handle all HTTPS traffic fornlb.wiikigo.com. You must retain the even distribution of HTTP traffic between WEB1 and WEB2. What should you do to achieve this?()A、In the properties for the cluster, create a new port rule for port TCP 443 that has the Filtering modeoption set to Single host.B、In the properties for WEB2, the Handling priority option for the TCP 443 port rule should be changed tothe value of 1.C、In the properties for WEB1, the Handling priority option for the TCP 443 port rule should be changed tothe value of 0.D、In the properties for the cluster, create a new port rule for port TCP 443 that has the Filtering modeoption set to Multiple host and the Affinity option set to the value of Single.

Your company has a single Active Directory domain. The company network is protected by a firewall.Remote users connect to your network through a VPN server by using PPTP. When the users try to connect to the VPN server, they receive the following error message: °Error 721: The remote computer is not responding.You need to ensure that users can establish a VPN connection. What should you do?()A、Open port 1423 on the firewall.B、Open port 1723 on the firewall.C、Open port 3389 on the firewall.D、Open port 6000 on the firewall.

You have a two-node Hyper-V failover cluster that uses SAN storage. You are designing storage for a new virtualization environment by using Windows Server 2008 R2.  You plan to deploy five virtual machines (VMs) per logical unit number (LUN). You need to be able to perform a live migration of a single VM while the other VMs continue to run on the host server.  What should you do?()A、Use Cluster Shared Volumes (CSVs)B、Use fixed disks on the SAN storageC、Boot the virtual machines from iSCSI LUNsD、Use dynamically expanding disks on an iSCSI LUN

Your company has a Microsoft Hyper-V Server 2008 R2 environment. You manage the environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You attempt to migrate child partitions through a firewall by using network migration. The migration fails. You need to ensure that you can successfully complete the migration. Which firewall port should you open?()A、80B、135C、445D、8554

Company.com needs to add a new file system to an existing volume group that is being made  Highly available by HACMP? What is the best procedure that minimizes down time of the applications?()  A、 Use C-SPOC to add the file system while the cluster is running.B、 Add the file system,and them perform the exportvg and importvg on the required nodes.C、 Stop the cluster,add the new file system, and synchronize the cluster then restart HACMP.D、 Break the reservation locks on the disk drives while the cluster is active and add the file system.

单选题During an HACMP migration,two nodes of a four-node cluster have been migrated. The existing hardware of the remaining two nodes do not meet the pre-requisites of the HACMP level that is being installed.  Which of the following is the best method for resolving this issue?()A Upgrade the unsupported hardware and continue with the migration.B Restore the two nodes that have been migrated with a cluster snapshot.C Restore the two nodes that have not been migrated with a cluster snapshot.D Synchronize the cluster to allow the nodes that didn’t migrate to join the cluster.

单选题In the event of a GSS failure in a GSS cluster, which is true?()A The current connections are rerouted via the backup GSSB Secondary GSS cannot be used to configure the GSS clusterC All remaining GSSs in the cluster continue responding to any new queriesD All records in the GSS database are flushed and reconstructed again using a new master GSS

单选题A new HACMP maintenance level has recently been released. An administrator is creating a  project plan that is required for applying the updates for a three-node production cluster.  To minimize downtime,what is the best way to accomplish the updates on all cluster nodes?()A Perform a graceful takeover one node at a time and apply the updates.B Perform the updates on all nodes simultaneously using C-SPOC utilities.C Perform the updates on node at a time with the cluster software active.D Perform a graceful stop of all cluster nodes and apply updates to all nodes.

单选题While installing the equipment for a new two-node cluster, it is discovered that the disk subsystem  Rack has one connection to the power mains. The explanation given was that the disks are to be mirrored between the two disk drawers in the rack and that a failure in either of the disk drawers would simply result in half of the disk being lost.  What can be done to avoid a single point of failure?()A Customize HACMP to overcome quorum issues.B Add a second PDU to separate the power connections.C Use RAID5 when implementing two IO racks in a HACMP environment.D Add another shared disk to each volume group to avoid quorum issues during fallover.

单选题An administrator has had a request from the data center for method to monitor the status of an  HACMP cluster. The monitoring software environment currently used is not compatible with SNM at this time, and there is not time to crate a new tool. There is also a restriction that the data center personnel not be allowed to login to the HACMP cluster nodes. What method will provide the solution for customer?()A The clstat.cgi program will provide a solution.B The customer must install Tivoli with the HACMP plugin for monitoring the cluster.C The clinfo program included in the HACMP distribution will solve the monitoring issues.D Customize the cluster to send error notifications for every event to an email at the network control center.

单选题Company.com needs to add a new file system to an existing volume group that is being made  Highly available by HACMP? What is the best procedure that minimizes down time of the applications?()A Use C-SPOC to add the file system while the cluster is running.B Add the file system,and them perform the exportvg and importvg on the required nodes.C Stop the cluster,add the new file system, and synchronize the cluster then restart HACMP.D Break the reservation locks on the disk drives while the cluster is active and add the file system.