When configuring a single SRX210 as a firewall enforcer to a MAG4610 active/passive cluster, which statement supports a fault-tolerant configuration?()A、The cluster VIP is defined on the MAG4610 cluster, and the VIP of the cluster is defined as an instance on the SRX Series device.B、The cluster VIP is not defined on the MAG4610 cluster, and the IP address of both the active and passive nodes of the cluster are defined as separate instances on the SRX Series device.C、The cluster VIP is defined on the MAG4610 cluster, and the IP address of the active node is defined as an instance on the SRX Series device.D、The cluster VIP is not defined on the MAG4610 cluster, and the IP address of the passive node is defined as an instance on the SRX Series device.

When configuring a single SRX210 as a firewall enforcer to a MAG4610 active/passive cluster, which statement supports a fault-tolerant configuration?()

  • A、The cluster VIP is defined on the MAG4610 cluster, and the VIP of the cluster is defined as an instance on the SRX Series device.
  • B、The cluster VIP is not defined on the MAG4610 cluster, and the IP address of both the active and passive nodes of the cluster are defined as separate instances on the SRX Series device.
  • C、The cluster VIP is defined on the MAG4610 cluster, and the IP address of the active node is defined as an instance on the SRX Series device.
  • D、The cluster VIP is not defined on the MAG4610 cluster, and the IP address of the passive node is defined as an instance on the SRX Series device.

相关考题:

When using UTM features in an HA cluster, which statement is true for installing the licenses on the cluster members?() A. One UTM cluster license will activate UTM features on both members.B. Each device will need a UTM license generated for its serial number.C. Each device will need a UTM license generated for the cluster, but licenses can be applied to either member.D. HA clustering automatically comes with UTM licensing, no additional actions are needed.

You are configuring an active/passive cluster of SRX Series devices as the firewall enforcer on a MAG Series device.Which statement is true?() A. Multiple Infranet Enforcer instances are created with a single serial number of an SRX Series device defined in each configuration.B. A single Infranet Enforcer instance is created with both serial numbers of the clustered SRX Series devices defined in the configuration.C. Multiple Infranet Enforcer instances are created with a single IP address of an SRX Series device defined in each configuration.D. A single Infranet enforcer instance is created with the VIP of the clustered SRX Series device defined in the configuration.

During a cluster functionality test, and administrator performs a graceful stop for Node ’B’ in a three-node cluster. What is the expected state of the cluster after Node ’B’successfully completes?()  A、 All cluster resources halt on Node ’B’,and one or both surviving nodes will gracefully acquire the resources.B、 All cluster processes halt on Node ’B’,the cluster resources remain active,and the remaining  nodes take no action.C、 All cluster processes stay active on Node ’B’,cluster resources are halted,and the remaining nodes take no action.D、 All cluster resources will stop,cluster processes halt on Node ’B’,and the remaining cluster nodes take no action.

An administrator has written a script to check that the contents of an application configuration file are identicalon all cluster nodes. The script has also been associated with a user defined custom verification method. Theadministrator would like the contents of this file to be checked and verified automatically on a daily basis.How can this be achieved?()A、By using a job scheduler such as cronB、By enabling automatic cluster verificationC、By including the script name in the file /usr/es/sbin/cluster/etc/clverify.rcD、By including the custom method name in the file /usr/es/sbin/cluster/etc/rc.authomethods

A customer wants to migrate their existing cluster onto new POWER6 hardware, and in addition requires thecluster to be migrated from PowerHA version 5.3 to 5.5. Given that AIX 6.1 and PowerHA 5.5 filesets arealready installed in the new hardware, which of the following methods would allow the customer to maintaintheir current cluster configuration?()A、Add the new nodes to the existing cluster, and perform a rolling migration and remove the original nodesfrom the clusterB、Add the new nodes to the existing cluster, and perform a non-disruptive upgrade and remove the originalnodes from the cluster.C、Create a snapshot of the existing cluster and apply the snapshot to the new cluster. Start cluster serviceson the new cluster and stop the original clusterD、Create a snapshot of the existing cluster and apply the snapshot to the new cluster. Stop cluster serviceson the original cluster and start on the new cluster

Company.com complains that an outage is required when adding a new filesystem to cluster. The  System management function of HACMP (C-SPOC) functions in which manner when adding filesystems to a cluster?()  A、 Adds to all nodes with the cluster running.B、 Adds to all nodes with the cluster stopped.C、 Adds with the cluster running,uses "Lazy Update" to perform the logical volume synchronization.D、 Adds to all nodes with the cluster running but requires the volume groups to be exported andimported after.

An administrator is configuring a new cluster and has a requirement for a notification to be generated if the /tmp File System becomes greater than 90% full. Which of the following PowerHA components will support theadministrator’s requirement?()A、Pre-defined EventsB、User-defined EventsC、Remote notification methodsD、The integration between RMC and WebSM

An administrator has a 2 node cluster running PowerHA version 5.5. They remove a resource group from theactive cluster configuration. When performing a verify and synchronize of the cluster, the administrator getsthe following error: "migcheck[471]: cl_connect() error, nodename=Node1, rc=-1 cldare: A communication error prevents obtaining the VRMF from remote nodes. A DARE event cannot be run until this is corrected. Please ensureclcomd is running." What is the most likely cause of this error?()A、There is a DARE lock in placeB、A PowerHA migration is in progressC、Cluster services is not active on the other nodeD、The other cluster node is running a different version of RSCT

An architect is configuring a PowerHA cluster in the following way:The cluster will consist of two nodes. Each node will have two boot interfaces configured as a single PowerHA network. The cluster is to have asingle resource group with a single service address.Heartbeating over aliased is not to be used. What is the minimum number of subnets required to implement this cluster?()A、1B、2C、3D、4

A step in the HACMP test plan is to gracefully stop the cluster on a node and to verify that the Shared resources fallover to the standby node. To prepare for this testing step, both nodes in the two-node cluster are in a stable state with the single resource group active on Node ’A’.  Which of the following is the best way to execute this portion of the test plan?()  A、 Execute "lssrc -g cluster stop" on Node ’A’B、 Execute "cat /etc//motd /dev/kmem" on Node ’A’C、 Execute "/usr/es/sbin/cluster/utilities/sclstop -gr" on Node ’A’D、 Find the pid of cluster manager daemon on Node ’A’ and issue a "kill-9" against the pid

An administrator has made several topology and resource group changes on one node in a running cluster.During verification and synchronization, using the "Emulate" option, many errors are reported. Theadministrator decided the best course of action was to roll back the changes. Prior to the changes beingmade, a cluster snapshot was taken. Which of the following actions will roll back the changes with the least disruption?()A、Perform a synchronization from a node without the changes.B、Apply the cluster snapshot on both nodes while the cluster is running.C、"Restore HACMP Configuration Database from Active Configuration" on the node where the changes weremadeD、Stop the cluster using the option "Unmanage Resource Groups" and apply the cluster snapshot on thenode where the changes were made

An administrator wants to use the online planning worksheets as an aid to configuring a PowerHA cluster.Which PowerHA fileset would the administrator need to install in order to obtain this tool?()A、cluster.es.hawB、cluster.es.worksheetsC、cluster.es.tools.worksheetsD、cluster.es.server.worksheets

When does the Online Planning Worksheet tool run a validation?()A、When loading and activating a definition file into an inactive clusterB、When exporting a definition to a cluster node or saving a definition fileC、When importing a definition from an active cluster or saving a definition fileD、When loading a definition into an active cluster or synchronizing a definition file

When using UTM features in an HA cluster, which statement is true for installing the licenses on the cluster members?()A、One UTM cluster license will activate UTM features on both members.B、Each device will need a UTM license generated for its serial number.C、Each device will need a UTM license generated for the cluster, but licenses can be applied to either member.D、HA clustering automatically comes with UTM licensing, no additional actions are needed.

You are an administrator of an active/passive cluster of MAG Series devices running in mixed- mode configuration (IF-MAP server and authenticating users). The active user count is quickly approaching the maximum limit of the cluster. You have been directed to reconfigure the cluster to an active/active cluster and add a new license to increase the total number of active users the cluster can support. What must you do before changing the cluster configuration?()A、Apply the new license to the passive node of the cluster.B、Configure an external load balancer to hold the V IP.C、Disable the active node in the cluster.D、Remove the IF-MAP server configuration.

Which three statements are true when working with high-availability clusters?()A、The valid cluster-id range is between 0 and 255.B、JUNOS security devices can belong to more than one cluster if cluster virtualization is enabled.C、If the cluster-id value is set to 0 on a JUNOS security device, the device will not participate in the cluster.D、A reboot is required if the cluster-id or node value is changed.E、JUNOS security devices can belong to one cluster only.

You are deploying a Junos Pulse Access Control Service cluster in active/passive mode. How do you configure the IP address on the SRX Series devices?()A、Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP as the IP address the instance.B、Configure multiple Junos Pulse Access Control Service instances on the enforcer, specifying the specific IP address each device in a separate instance.C、Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP and active node address in the instance.D、Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP and passive node address in the instance.

Two MAG4610s are running in an active/passive cluster configuration. The system administrator is planning to apply a service package to the cluster.Which process should the administrator follow?()A、Perform the upgrade on the active node of the cluster. When completed, the node reboots and then pushes the service package to the passive node automatically.B、Perform the upgrade on the passive node of the cluster. When completed, the node reboots and then pushes the service package to the active node automatically.C、On the clustering status page, disable the active node. Perform the upgrade on the disabled node. When completed and the node reboots, enable the node on the clustering status page.Repeat the process on the passive node.D、On the clustering status page, disable the passive node. Perform the upgrade on the disabled node. When completed and the node reboots, enable the node on the clustering status page.Repeat the process on the active node.

You are configuring a failover cluster for a database server. You are assigning four nodes to the cluster. Allnodes have access to a SAN,and adequate storage is available. Which of the following options should youchoose for your quorum configuration?()A、Node MajorityB、Node And Disk MajorityC、Node And File Share MajorityD、No Majority: Disk Only

单选题An administrator has written a script to check that the contents of an application configuration file are identicalon all cluster nodes. The script has also been associated with a user defined custom verification method. Theadministrator would like the contents of this file to be checked and verified automatically on a daily basis.How can this be achieved?()ABy using a job scheduler such as cronBBy enabling automatic cluster verificationCBy including the script name in the file /usr/es/sbin/cluster/etc/clverify.rcDBy including the custom method name in the file /usr/es/sbin/cluster/etc/rc.authomethods

单选题During a cluster functionality test, and administrator performs a graceful stop for Node ’B’ in a three-node cluster. What is the expected state of the cluster after Node ’B’successfully completes?()A All cluster resources halt on Node ’B’,and one or both surviving nodes will gracefully acquire the resources.B All cluster processes halt on Node ’B’,the cluster resources remain active,and the remaining  nodes take no action.C All cluster processes stay active on Node ’B’,cluster resources are halted,and the remaining nodes take no action.D All cluster resources will stop,cluster processes halt on Node ’B’,and the remaining cluster nodes take no action.

单选题When does the Online Planning Worksheet tool run a validation?()AWhen loading and activating a definition file into an inactive clusterBWhen exporting a definition to a cluster node or saving a definition fileCWhen importing a definition from an active cluster or saving a definition fileDWhen loading a definition into an active cluster or synchronizing a definition file

单选题You are configuring a failover cluster for a database server. You are assigning four nodes to the cluster. Allnodes have access to a SAN,and adequate storage is available. Which of the following options should youchoose for your quorum configuration?()ANode MajorityBNode And Disk MajorityCNode And File Share MajorityDNo Majority: Disk Only

多选题Which three statements are true when working with high-availability clusters?()AThe valid cluster-id range is between 0 and 255.BJUNOS security devices can belong to more than one cluster if cluster virtualization is enabled.CIf the cluster-id value is set to 0 on a JUNOS security device, the device will not participate in the cluster.DA reboot is required if the cluster-id or node value is changed.EJUNOS security devices can belong to one cluster only.

单选题When configuring a single SRX210 as a firewall enforcer to a MAG4610 active/passive cluster, which statement supports a fault-tolerant configuration?()AThe cluster VIP is defined on the MAG4610 cluster, and the VIP of the cluster is defined as an instance on the SRX Series device.BThe cluster VIP is not defined on the MAG4610 cluster, and the IP address of both the active and passive nodes of the cluster are defined as separate instances on the SRX Series device.CThe cluster VIP is defined on the MAG4610 cluster, and the IP address of the active node is defined as an instance on the SRX Series device.DThe cluster VIP is not defined on the MAG4610 cluster, and the IP address of the passive node is defined as an instance on the SRX Series device.

单选题An architect is configuring a PowerHA cluster in the following way:The cluster will consist of two nodes. Each node will have two boot interfaces configured as a single PowerHA network. The cluster is to have asingle resource group with a single service address.Heartbeating over aliased is not to be used. What is the minimum number of subnets required to implement this cluster?()A1B2C3D4

单选题You are configuring an active/passive cluster of SRX Series devices as the firewall enforcer on a MAG Series device.Which statement is true?()AMultiple Infranet Enforcer instances are created with a single serial number of an SRX Series device defined in each configuration.BA single Infranet Enforcer instance is created with both serial numbers of the clustered SRX Series devices defined in the configuration.CMultiple Infranet Enforcer instances are created with a single IP address of an SRX Series device defined in each configuration.DA single Infranet enforcer instance is created with the VIP of the clustered SRX Series device defined in the configuration.