Company.com has ordered an 8-way p5-570 and plans to deploy four AIX 5L v5.3 LPARs. The pre-installation system design has all eight processors being placed in the shared processor pool, and four Micro-Partitions being assigned resources from the pool. Prior to the implementation of the system, the customer informs the technical specialist that one of the applications is only supported on AIX 5L 5.2. Which of the following changes to the system design should the technical specialist make to accommodate this change?()A、Create all the partitions as AIX 5.2, each having two dedicated processors.B、Purchase a system with two additional processors that can be assigned to the AIX 5.2 Partition.C、Specify an AIX 5.2 partition using dedicated processors, reducing the number of processors in the shared pool.D、Use the virtual I/O server to manage the disks and network connections removing the need for different levels of device drivers.

Company.com has ordered an 8-way p5-570 and plans to deploy four AIX 5L v5.3 LPARs. The pre-installation system design has all eight processors being placed in the shared processor pool, and four Micro-Partitions being assigned resources from the pool. Prior to the implementation of the system, the customer informs the technical specialist that one of the applications is only supported on AIX 5L 5.2. Which of the following changes to the system design should the technical specialist make to accommodate this change?()

  • A、Create all the partitions as AIX 5.2, each having two dedicated processors.
  • B、Purchase a system with two additional processors that can be assigned to the AIX 5.2 Partition.
  • C、Specify an AIX 5.2 partition using dedicated processors, reducing the number of processors in the shared pool.
  • D、Use the virtual I/O server to manage the disks and network connections removing the need for different levels of device drivers.

相关考题:

In order to _______his fream, the boy has been studying very hard. A、realizationB、realC、reallyD、realize

In order to meet the development of the exhibition/convention industry ,a code of regulations and rules has to be formulated.()

In order to keep competitive in EC, logistics industry has begun to employ the opening, systematical and technical structure. () 此题为判断题(对,错)。

The ORDERS table has these columns:ORDER_ID NUMBER(4) NOT NULLCUSTOMER_ID NUMBER(12) NOT NULLORDER_TOTAL NUMBER(10,2)The ORDERS table tracks the Order number, the order total, and the customer to whom the Order belongs.Which two statements retrieve orders with an inclusive total that ranges between 100.00 and 2000.00 dollars? ()A. SELECT customer_id, order_id, order_total FROM orders RANGE ON order _ total (100 AND 2000) INCLUSIVE;B. SELECT customer_id, order_id, order_total FROM orders HAVING order _ total BETWEEN 100 and 2000;C. SELECT customer_id, order_id, order_total FROM orders WHERE order _ total BETWEEN 100 and 2000;D. SELECT customer_id, order_id, order_total FROM orders WHERE order_total= 100 and = 2000;E. SELECT customer_id, order_id, order_total FROM orders WHERE order_total= 100 and order_total = 2000;

In order to ________ his dream, the boy has been studying very hard. A.realizationB.realizeC.reallyD.real

In order for a stand-on vessel to take action in a situation, she must determine that the other vessel ______.A.is restricted in her ability to maneuverB.has sounded the danger signalC.is not taking appropriate actionD.has not changed course since risk of collision was determined

We regret to report that a consignment of silk piece goods()Order No.567 has not been delivered.A、withB、forC、onD、under

Company.com has non-IBM fibre attached storage. The storage is connected to a node in the  cluster that has multiple adapters and virtual paths. There is a concern about detecting the loss of one of the fibre adapters since there is no indication to the administrator that one has failed.  What feature of HACMP can be sued to assist with this issue?()  A、 Disk heartbeatB、 Error notificationC、 Event notificationD、 Application monitor

A customer has been working with your company to purchase an iDataPlex cluster. They have a configuration from IBM and are getting ready to place an order. Which should be done of the following?()A、A solution sizing questionnaireB、Verify the customer has the proper racksC、A Technical Delivery AssessmentD、Verify the customer has enough cooling in the computer room

A work order has been created to perform corrective maintenance on a defective generator. All required information has been provided in the work order, but required materials are not in stock and  have to be ordered.  What is the status of the work order, after a maintenance manager has approved the work order? ()A、 Approved (APPR)B、 Waiting on Materials (WMATL)C、 Waiting to be Scheduled (WSCH)D、 Waiting on Plant Condition (WPCOND)

Company.com has a four-node cluster (nodes ’A’, ’B’, ’C’, and ’D’). The nodes are set up in  Resource group pairs. Node ’A’ falls over to Node ’B’, and Node ’C’ falls over to Node ’C’. During a maintenance windows, it was discovered that the six resource groups on Node ’A’ are too much to be adequately handled by Node ’B’.  What could be done to better utilize the available resources during fallover?()  A、 Implement Work Load manager so that the application monitors for additional resource      requirements.B、 Add a fifth node to function as a load leveler in order to control the dispatching of the resource jobs.C、 Implement Dynamic Node Priorities in the resource groups in order to find a node with suitable system resources.D、 Reduce the number of resource groups on Node ’A’ to 1 in order to ensure faster and more robust fallover to a single system.

Company.com has a resource group that contains a database that is accessed by a web client  based on another system. The communication to the database is TCP/IP. Occasionally after a failure, the end users get unusual error messages that indicate the database server is not available. It has been determined that the web server is trying to access the database server’s information before it has completed file system recovery after a failure.  How can HACMP affect this problem?()   A、 HACMP can resequence the order to the starting of the various resource group elements by utilizing Dynamic Node Priority.B、 The order of dependency can be controlled though the HACMP resource group configuration if the web server was made to be part of the HACMP cluster.C、 HACMP can delay making the network label available until after the filesystem checks have completed with the "filesystem mounted before IP is configured".D、 The IP service label can be in a second resource group allowing the sequential processing of resource groups to control when the IP service label is made available.

You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com policy prohibits the users from changing their password by using Outlook Web App (OWA). What should you do?()A、The best option is to set up an Outlook Web App Mailbox policy so that the users comply with the Company.com policy.B、The best option is to set up a Group Policy Object so that the users comply with the Company.com policy.C、The best option is to change the authentication settings of the OWA virtual directory so that the users comply with the Company.com policy.D、The best option is to change the authentication settings of the IISADMPWD virtual directory so that the users comply with the Company.com policy.

You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com policy prohibits the users from changing their password by using Outlook Web App (OWA).However, they can use Windows to change their passwords.What should you do?()A、The best option is to configure the settings on the Segmentation tab, in the properties of the OWA virtual directory so that the users comply with the Company.com policy.B、The best option is to configure the settings on the Account tab, in the properties of the user accounts so that the users comply with the Company.com policy.C、The best option is to configure the settings on the Mailbox Features tab, in the properties of the mailboxes so that the users comply with the Company.com policy.D、The best option is to configure the settings on the Authentication tab, in the properties of the OWA virtual directory so that the users comply with the Company.com policy.

You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com security policy prohibits the employees to send certain words between them.What should you do?()A、The best option is to create an Outlook Protection Rule to comply with the Company.com security policy.B、The best option is to set up a content filtering feature to comply with the Company.com security policy.C、The best option is to create a transport rule to comply with the Company.com security policy.D、The best option is to set up a sender reputation feature to comply with the Company.com security policy.

You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.Company.com has merged with another company.The users at Company.com have complained that they are not able to share contacts with the users in the merge company.However, they can share free/busy information.The users at Company.com need to share contacts.What should you do?()A、You should consider changing the EWS virtual directory.B、You should consider changing the Federation Trust.C、You should consider changing the Organizational Relationship.D、You should consider changing the default sharing policy.

单选题A work order has been created to perform corrective maintenance on a defective generator. All required information has been provided in the work order, but required materials are not in stock and  have to be ordered.  What is the status of the work order, after a maintenance manager has approved the work order? ()A Approved (APPR)B Waiting on Materials (WMATL)C Waiting to be Scheduled (WSCH)D Waiting on Plant Condition (WPCOND)

单选题The starting air system usually has () to prevent starting if anything is not in order.Astop valvesBinterlocksCnon-return valvesDair vents

单选题The starting air system usually has () to prevent starting if anything is not in order.Adrain cocksBvent valvesCcounteractsDinterlocks

多选题The ORDERS table has these columns: ORDER_ID NUMBER(4) NOT NULL CUSTOMER_ID NUMBER(12) NOT NULL ORDER_TOTAL NUMBER(10,2) The ORDERS table tracks the Order number, the order total, and the customer to whom the Order belongs. Which two statements retrieve orders with an inclusive total that ranges between 100.00 and 2000.00 dollars? ()ASELECT customer_id, order_id, order_total FROM orders RANGE ON order _ total (100 AND 2000) INCLUSIVE;BSELECT customer_id, order_id, order_total FROM orders HAVING order _ total BETWEEN 100 and 2000;CSELECT customer_id, order_id, order_total FROM orders WHERE order _ total BETWEEN 100 and 2000;DSELECT customer_id, order_id, order_total FROM orders WHERE order_total= 100 and = 2000;ESELECT customer_id, order_id, order_total FROM orders WHERE order_total= 100 and order_total = 2000;

单选题You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com security policy prohibits the employees to send certain words between them.What should you do?()AThe best option is to create an Outlook Protection Rule to comply with the Company.com security policy.BThe best option is to set up a content filtering feature to comply with the Company.com security policy.CThe best option is to create a transport rule to comply with the Company.com security policy.DThe best option is to set up a sender reputation feature to comply with the Company.com security policy.

单选题Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.The Company.com employees use Microsoft Office Outlook 2007 to connect to their mailboxes.RPC over HTTP and Auto discover are configured on Microsoft Office Outlook 2007. Company.com has acquired a new Exchange Server 2010 server and moved the mailboxes to it.However, the employees find a problem to access their mailboxes. What should you do?()AYou should consider using Outlook Anywhere and configure it.BYou should consider creating and set up a Client Access array.CYou should consider renaming the OWA virtual directory to Exchange.DYou should consider the Switchover Server option.

单选题Company.com has non-IBM fibre attached storage. The storage is connected to a node in the  cluster that has multiple adapters and virtual paths. There is a concern about detecting the loss of one of the fibre adapters since there is no indication to the administrator that one has failed.  What feature of HACMP can be sued to assist with this issue?()A Disk heartbeatB Error notificationC Event notificationD Application monitor

单选题You work as a network Exchange administrator at Company.com.The Company.com network  currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.The Company.com network users have been configured by Company.com to have the @Company.com email address suffix.During the course of the business week you receive instruction from Company.com to configure a public folder named KingPublic for the Internet users to post content by sending e-mail to KingPublic@Company.com.  What should you do?()AYou should consider having a new mail contact created which has the e-mail address KingPublic@Company.com.You should then have a transport rule created.BYou should consider having a new mailbox created which has the e-mail address KingPublic@Company.com.You should then have a transport rule created.CYou should consider having mail enabled for KingPublic.DYou should consider having the author role assigned to Anonymous.

单选题A customer has been working with your company to purchase an iDataPlex cluster. They have a configuration from IBM and are getting ready to place an order. Which should be done of the following?()AA solution sizing questionnaireBVerify the customer has the proper racksCA Technical Delivery AssessmentDVerify the customer has enough cooling in the computer room

单选题Company.com has recently received a new p5-570 in the data center and intends to Micro-Partition the server. In which order should installation steps be taken?()AConnect to the network,power on the server,Micro-Partition the serverBConnect to the HMC,power on the server,Micro-Partition the server,connect to the networkCPower on server,connect to the network,Micro-Partition the server,connect to the HMCDPower on the server,connect to the HMC,Micro-Partition the server,connect to the network

多选题The ORDERS table has these columns: ORDER_ID NUMBER(4) NOT NULL CUSTOMER_ID NUMBER(12) NOT NULL ORDER_TOTAL NUMBER(10,2) The ORDERS table tracks the Order number, the order total, and the customer to whom the Order belongs. Which two statements retrieve orders with an inclusive total that ranges between 100.00 and 2000.00 dollars? ()ASELECT customer_id, order_id, order_total FROM orders RANGE ON order _ total (100 AND 2000) INCLUSIVE;BSELECT customer_id, order_id, order_total FROM orders HAVING order _ total BETWEEN 100 and 2000;CSELECT customer_id, order_id, order_total FROM orders WHERE order _ total BETWEEN 100 and 2000;DSELECT customer_id, order_id, order_total FROM orders WHERE order_total= 100 and = 2000;ESELECT customer_id, order_id, order_total FROM orders WHERE order_total= 100 and order_total = 2000;

单选题During a planning meeting, Company.com indicates that they intend to make a relational  Database highly available. The application has a pre-requisite that a kernel extension be loaded from /etc/inittab.  How would this be managed in an HACMP environment?()A It can be started with a crontab entry.B It can be created as an Application Server.C It can be added to a resource group as a dependency.D It cannot be done because HACMP provides no method to order application start/stop scripts.