A customer wants to run a Cluster 1600 configuration with multiple p655 servers.  They are using the new High Performance Switch for the high-speed interconnection between nodes.  Which of the following is the only supported cluster management software?()A、CSMB、PSSPC、GPFSD、HACMP

A customer wants to run a Cluster 1600 configuration with multiple p655 servers.  They are using the new High Performance Switch for the high-speed interconnection between nodes.  Which of the following is the only supported cluster management software?()

  • A、CSM
  • B、PSSP
  • C、GPFS
  • D、HACMP

相关考题:

A customer is deploying a new Junos Pulse Access Control Service and has completed the initial boot configuration as prompted using a serial connection. The customer now wants to complete the rest of the configuration using the admin GUI.Into which port on the Junos Pulse Access Control Service should the customer plug the network cable to enable access to the admin GUI?()A. the internal interfaceB. the external interfaceC. the management interfaceD. the console interface

Which statement is true for a customer that wants to deploy compression for a circuit rated at 155 Mbps?() A. A WX60 cluster can handle 155 Mbps.B. WX devices can handle only up to 45 Mbps.C. Only a WXC500 or WXC590 can handle this requirement.D. A WXC or WX stack configuration deployment is required.

A customer has two single cluster IBM TS7700 Virtualization Engines at the same site. The customer wants to move one to a remote site and set up a grid configuration with the two clusters. The customer has fibre between the two sites. What is the most important factor to consider when planning the new configuration?()A. operator trainingB. cache size of the two clustersC. fibre bandwidth capability between the sitesD. number of stacked tape drives attached to each cluster

Which three statements describe the configuration change management feature in DCNM LAN? ()A、 Switch profiles allow configurations to be synchronized between switches and are supported with any Cisco NX-OS Software managed device.B、 DCNM LAN can archive configurations from devices even if they are not managed by the DCNM server, and the administrator can supply the device management IP address and credentials.C、 You can archive a maximum of 50 configuration versions per managed device.D、 Managed devices must be licensed in DCNM LAN before they can be used with configuration change management.E、 Device-running configuration will be archived only if it differs from the last archived version.

A new HACMP maintenance level has recently been released. An administrator is creating a  project plan that is required for applying the updates for a three-node production cluster.  To minimize downtime,what is the best way to accomplish the updates on all cluster nodes?()  A、 Perform a graceful takeover one node at a time and apply the updates.B、 Perform the updates on all nodes simultaneously using C-SPOC utilities.C、 Perform the updates on node at a time with the cluster software active.D、 Perform a graceful stop of all cluster nodes and apply updates to all nodes.

A customer is deploying a new Junos Pulse Access Control Service and has completed the initial boot configuration as prompted using a serial connection. The customer now wants to complete the rest of the configuration using the admin GUI.Into which port on the Junos Pulse Access Control Service should the customer plug the network cable to enable access to the admin GUI?()A、the internal interfaceB、the external interfaceC、the management interfaceD、the console interface

A customer wants to migrate their existing cluster onto new POWER6 hardware, and in addition requires thecluster to be migrated from PowerHA version 5.3 to 5.5. Given that AIX 6.1 and PowerHA 5.5 filesets arealready installed in the new hardware, which of the following methods would allow the customer to maintaintheir current cluster configuration?()A、Add the new nodes to the existing cluster, and perform a rolling migration and remove the original nodesfrom the clusterB、Add the new nodes to the existing cluster, and perform a non-disruptive upgrade and remove the originalnodes from the cluster.C、Create a snapshot of the existing cluster and apply the snapshot to the new cluster. Start cluster serviceson the new cluster and stop the original clusterD、Create a snapshot of the existing cluster and apply the snapshot to the new cluster. Stop cluster serviceson the original cluster and start on the new cluster

A customer has two single cluster IBM TS7700 Virtualization Engines at the same site. The customer wants to move one to a remote site and set up a grid configuration with the two clusters. The customer has fibre between the two sites. What is the most important factor to consider when planning the new configuration?()A、operator trainingB、cache size of the two clustersC、fibre bandwidth capability between the sitesD、number of stacked tape drives attached to each cluster

Multiple users call from the same location saying that they have no network connectivity. The administrator is unable to ping the main switch at that IDF. Which of the following configuration management documents would the administrator MOST likely consult to troubleshoot the issue?()A、Baseline configurationB、Security policyC、Performance and transaction logsD、Physical network diagram

An administrator will be performing a PowerHA upgrade on a cluster from version 5.3 to version 5.5. Which ofthe following tasks will verify a successful migration?()A、Use the clstat command and verify the cluster is in a stable stateB、After each node is upgraded, run a verification and synchronizationC、After all nodes are upgraded, run a verification and synchronizationD、Take a snapshot of each node and verify the configuration is the same

A customer is putting together a high-performance computing cluster of p655 nodes.  They need a total of 48 processors and want to get the best performance possible out of those systems.  They are evaluating four options and have asked the pSeries technical specialist to recommend which one would provide the best performance based on total rPerf.  Their workload may grow over time. Which of the following should the pSeries technical specialist recommend?()A、Twelve 4-way p655 nodes and add more as neededB、Six 8-way p655 nodes and add more as neededC、Six 4-way p655 nodes with four processors CoD on each node in case of growthD、Three 8-way p655 nodes with eight processors CoD on each node in case of growth

An administrator has made several topology and resource group changes on one node in a running cluster.During verification and synchronization, using the "Emulate" option, many errors are reported. Theadministrator decided the best course of action was to roll back the changes. Prior to the changes beingmade, a cluster snapshot was taken. Which of the following actions will roll back the changes with the least disruption?()A、Perform a synchronization from a node without the changes.B、Apply the cluster snapshot on both nodes while the cluster is running.C、"Restore HACMP Configuration Database from Active Configuration" on the node where the changes weremadeD、Stop the cluster using the option "Unmanage Resource Groups" and apply the cluster snapshot on thenode where the changes were made

A cluster administrator wants to create a snapshot backup of the cluster. Which smit menu can be used to dothis?()A、Extended ConfigurationB、System Management (C-SPOC)C、Problem Determination ToolsD、Initialization and Standard Configuration

A customer is looking for a reliable well-performing, cost-effective solution to a growing commercial workload.   Initially, they want to run 12 UDB partitions, each of which would need two processors and 8GB of memory.  They are looking at the p655 and want to start with three LPARS on each p655 node using a total of four nodes.   Each LPAR would need at least 4 x 6239 fibre cards and 2 x 5706 2-port 10/100/1000 Ethernet cards.   At a later date, they want to add an additional LPAR to each node to expand to a total of 16 UDB partitions. Which of the following major limitations of this solution should be mentioned to the customer?()A、The p655 supports only two LPARs.B、The p655 supports only four LPARs.C、There are not enough available slots for three LPARs.D、There are not enough available slots for four LPARs.

An administrator has a two-node PowerHA cluster in a mutual takeover configuration. He needs to updatefrom 5.5 service pack 1 to 5.5 service pack 2. Which of the following actions will perform the updates with norisk of disruption to applications running in the cluster?()A、Unmanage resource groups on all nodes, update the cluster filesets, start cluster services on all nodes,ensure cluster services stabilizeB、Update the cluster filesets on all nodes. Run ’refresh -s clstrmgrES’ on one node, wait for the cluster tostabilize, repeat for all other nodesC、Unmanage resource groups on one node, update the cluster filesets, start cluster services. Wait for thecluster to stabilize and repeat for all other nodes.D、Bring resource groups (RGs) online on all nodes concurrently, bring RGs offline on one node, update thecluster filesets, bring RGs online, repeat for all other nodes

A customer wants to implement a clustered database solution on their existing x445 servers.  A minimum of four nodes must participate in the cluster, and the customer wishes to use open standards.  Which of the following best satisfies their requirements?()A、Novell NetWare Cluster ServicesB、Red Hat Enterprise Linux Cluster SuiteC、Microsoft Windows 2003 Server with MSCSD、Microsoft Windows 2003 Enterprise Edition

Which interconnect topology is supported for pSeries cluster solutions with Cluster Systems Manager?()A、ATMB、EthernetC、SP Switch2D、Fibre Channel

Which three statements are true when working with high-availability clusters?()A、The valid cluster-id range is between 0 and 255.B、JUNOS security devices can belong to more than one cluster if cluster virtualization is enabled.C、If the cluster-id value is set to 0 on a JUNOS security device, the device will not participate in the cluster.D、A reboot is required if the cluster-id or node value is changed.E、JUNOS security devices can belong to one cluster only.

You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain.   You administer a four-node Network Load Balancing cluster. All nodes run Windows Server 2003. The cluster has converged successfully. You use Network Load Balancing Manager on the default host to configure all nodes of the cluster.   The nodes have a single network adapter and are connected to the same switching hub device.   Administrators of non-cluster servers that are connected to the same switching hub device report that their servers receive traffic that is destined for the cluster nodes. Receiving this additional network traffic impairs the network performance of the non-cluster servers.   You need to ensure that traffic destined for only the cluster nodes is not sent to all ports of the switching hub device.  You do not want to move the cluster to another switching hub device.   What should you do? ()A、 On one node, run the nlb.exe reload command.B、 On each node, run the wlbs.exe drainstop command.C、 Use Network Load Balancing Manager to enable Internet Group Management Protocol (IGMP) support on the cluster.D、 Use Network Load Balancing Manager to add a second cluster IP address.

You add a Windows Server 2008 R2 server with the Hyper-V role installed to an existing Hyper-V failover cluster.  After you move a virtual machine (VM) to the new cluster node, Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 reports the status of the VM as Unsupported Cluster Configuration. You need to be able to manage the VM by using VMM. What should you do?()A、Disable TCP Chimney Offload on the new cluster nodes network adaptersB、Disable the TCP/IP Offload Engine (TOE) on the new cluster nodes network adapters.C、Move the VM configuration file to a local storage device, and update the pointer to the file.D、Update the virtual networking configuration of the new cluster node to match the virtual networking configuration of the original cluster nodes.

Your company’s network has client computers that run Windows 7.   Multiple users share the computers in the shipping department. These computers reside in the Shipping Computers organizational unit (OU).  The company wants to deploy a new application. The application is not packaged.   You have the following requirements:   Deploy the application to all computers in the shipping department. Perform the deployment from a central location.   You need to plan the software deployment process to meet the requirements.    Which two actions should you include in the process?()A、 Create a package by using Microsoft System Center Configuration Manager.B、 Create a Group Policy object (GPO) and add a software installation policy under the Computer Configuration container.C、 In the Group Policy Management Console,link the software installation policy to the Shipping Computers OU.D、 Using Microsoft System Center Configuration Manager,create a collection that contains the shipping department users,and assign the package to the collection.E、 Using Microsoft System Center Configuration Manager,create a collection that contains the shipping department computers,and assign the package to the collection.

Certkiller .com boosts a two-node Network Load Balancing cluster which is called web. CK1 .com. The purpose of this cluster is to provide load balancing and high availability of the intranet website only. With monitoring the cluster, you discover that the users can view the Network Load Balancing cluster in their Network Neighborhood and they can use it to connect to various services by using the name web. CK1 .com.  You also discover that there is only one port rule configured for Network Load Balancing cluster.  You have to configure web. CK1 .com NLB cluster to accept HTTP traffic only.  Which two actions should you perform to achieve this objective()A、Create a new rule for TCP port 80 by using the Network Load Balancing Cluster consoleB、Run the wlbs disable command on the cluster nodesC、Assign a unique port rule for NLB cluster by using the NLB Cluster consoleD、Delete the default port rules through Network Load Balancing Cluster console

You have a Windows Server 2008 R2 Hyper-V failover cluster with a single iSCSI logical unit number (LUN) and one highly available virtual machine (HAVM). You manage the virtual environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You monitor the environment by using Microsoft System Center Operations Manager 2007 R2. You configure a new virtual machine (VM) by deploying a VHD from the VMM library and placing the VHD on the existing iSCSI LUN. You create a HAVM configuration, and you attach the VHD to the configuration. VMM reports the status of the VMs as Unsupported Cluster Configuration. You need to be able to manage the VMs by using VMM. What should you do?()A、Move the VHD of one HAVM to a new iSCSI LUN.B、Move the VHD of one HAVM to the system volume of a cluster node.C、Configure Performance and Resource Optimization (PRO) on the Windows Server 2008 R2 cluster nodes.D、Configure Windows System Resource Manager (WSRM) on the Windows Server 2008 R2 cluster nodes.

单选题A customer is interested in using two Power 550 servers to implement a new two node cluster. The cluster willbe using SAN attached disk for shared storage and will be attached to one IP network. Which of the followingadapter configurations will meet the customer requirements while reducing single points of failure?()A AB BC CD D

单选题An administrator has had a request from the data center for method to monitor the status of an  HACMP cluster. The monitoring software environment currently used is not compatible with SNM at this time, and there is not time to crate a new tool. There is also a restriction that the data center personnel not be allowed to login to the HACMP cluster nodes. What method will provide the solution for customer?()A The clstat.cgi program will provide a solution.B The customer must install Tivoli with the HACMP plugin for monitoring the cluster.C The clinfo program included in the HACMP distribution will solve the monitoring issues.D Customize the cluster to send error notifications for every event to an email at the network control center.

多选题Which three statements are true when working with high-availability clusters?()AThe valid cluster-id range is between 0 and 255.BJUNOS security devices can belong to more than one cluster if cluster virtualization is enabled.CIf the cluster-id value is set to 0 on a JUNOS security device, the device will not participate in the cluster.DA reboot is required if the cluster-id or node value is changed.EJUNOS security devices can belong to one cluster only.

多选题Certkiller .com boosts a two-node Network Load Balancing cluster which is called web. CK1 .com. The purpose of this cluster is to provide load balancing and high availability of the intranet website only. With monitoring the cluster, you discover that the users can view the Network Load Balancing cluster in their Network Neighborhood and they can use it to connect to various services by using the name web. CK1 .com.  You also discover that there is only one port rule configured for Network Load Balancing cluster.  You have to configure web. CK1 .com NLB cluster to accept HTTP traffic only.  Which two actions should you perform to achieve this objective()ACreate a new rule for TCP port 80 by using the Network Load Balancing Cluster consoleBRun the wlbs disable command on the cluster nodesCAssign a unique port rule for NLB cluster by using the NLB Cluster consoleDDelete the default port rules through Network Load Balancing Cluster console