In order to cluster IBM SONAS interface nodes so that they can serve the same data, the interface nodes must coordinate their locking and recovery. This coordination is done through(). A. SONAS Health CenterB. SONAS Cluster ManagerC. Tivoli Storage ManagerD. Windows Active Directory

In order to cluster IBM SONAS interface nodes so that they can serve the same data, the interface nodes must coordinate their locking and recovery. This coordination is done through().

A. SONAS Health Center

B. SONAS Cluster Manager

C. Tivoli Storage Manager

D. Windows Active Directory


相关考题:

Which two considerations must you take into account when deploying a Junos Pulse Access Control Service cluster?() A. State synchronization occurs only through the internal network interface card (NIC)B. Latency of the WAN must be less than 300 ms.C. Authenticating endpoints must be on the same LAN segment.D. Cluster members must use the same hardware platfor

A large shipping company that is standardized on Fibre Channel storage has just acquired a regional shipping company that is using an IBM XIV system. The large company would like to integrate the XIV system into the environment and manage all data through a single management interface.Which product should be suggested so that all data can be managed?()A. IBM DS8700B. IBM XIV GUIC. IBM System Storage N7600D. IBM SAN Volume Controller (SVC)

Which two considerations must you take into account when deploying a Junos Pulse Access Control Service cluster?()A、State synchronization occurs only through the internal network interface card (NIC)B、Latency of the WAN must be less than 300 ms.C、Authenticating endpoints must be on the same LAN segment.D、Cluster members must use the same hardware platfor

In order to cluster IBM SONAS interface nodes so that they can serve the same data, the interface nodes must coordinate their locking and recovery. This coordination is done through().A、SONAS Health CenterB、SONAS Cluster ManagerC、Tivoli Storage ManagerD、Windows Active Directory

Overlay Transport Virtualization (OTV) join interface is used to source the OTV encapsulated traffic and send it to the Layer 3 domain of the data center network. Which statements are true about OTV join interface? ()A、 Join interface is a Layer 3 entity, and with the Cisco NX-OS release 6.0, it can only be defined as a physical interface, physical subinterface, Layer 3 port channel, or Layer 3 port channel subinterface.B、 A single join interface can be defined and associated with a given OTV overlay.C、 Multiple overlays can also share the same join interface.D、 Join interface can be a loopback interface.E、 The join interface is a Layer 3 entity that can be defined as a physical interface but not as a logical one.

Which two statements are correct regarding Flex Links? ()A、 An interface can belong to multiple Flex Links.B、 Flex Links operate only over single pairs of links.C、 Flex Link pairs must be of the same interface typeD、 Flex Links automatically disable STP so no BPDUs are propagatedE、 Failover from active to standby on Flex Links takes less than a second

Which statements are valid for a local SPAN configuration? ()A、 Source and destination interface must be on the same hostB、 Source and destination interfaces can be on different hostsC、 Destination vEthernet interface can be on a different VLAN than the sourceD、 Destination interface can be a physical portE、 Destination interface cannot be a physical port

Company.com has a six-node concurrent resource group with an application that is accessed by  a web connection to the cluster nodes. How is the workload moved to another cluster node during a node failure?()  A、 The concurrent application must control the web interface through application monitoring.B、 A second resource group will be required to move the web application and IP label to a new node during a node failure.C、 The concurrent resource group can support multiple IP labels through IP aliasing so all IP labels are defined in the concurrent resource group.D、 The dynamic node priority facility in HACMP will relocate the web application and the IP label,if it is correctly defined in the application start and stop script.

During a planning session,it is determined that both nodes in a mutual takeover cluster will provide NFS mounts to a variety of Unix hosts.  What is the first consideration that must b4e taken into account when using NFS with HACMP?()  A、 AIX Connections will need to be installed to provide the NFS shares.B、 Mutual takeover cluster cannot provide NFS services from both nodes.C、 The major number for the volume groups needs to be the same on both nodes.D、 The no option rfc 1323 must be set to 1 and the number of biods need to be adjusted to                                         provide reasonable response times.

Company.com has a three-node cluster with six resource groups. There are two resource groups  for each node. A new hardware component will be added to one of the nodes. The customer wants to move the resource groups to other nodes,but not necessarily in the normal fallover order. Also,the resource groups must be moved at night when there is no one in the computer center. What can be done so that the resource group is moved at the most convenient normal fallover order. Also,the resource groups must be moved at night when there is no one in the computer center.  What can be done so that the resource group is moved at the most convenient time for the customer?()   A、 Create a custom resource group with a custom fallback timer to cause the system shutdown at he appropriate time.B、 Set the system to stop with "shutdown" command at the appropriate time and allow HACMP to relocate the resources.C、 Use a script that calls the cIRGmove command and place it in the cron or a queue to execute at the appropriate time.D、 Change the existing resource groups to a custom type and add a timer to perform a "shutdown -h" command at the appropriate time.

A large shipping company that is standardized on Fibre Channel storage has just acquired a regional shipping company that is using an IBM XIV system. The large company would like to integrate the XIV system into the environment and manage all data through a single management interface. Which product should be suggested so that all data can be managed?()A、IBM DS8700B、IBM XIV GUIC、IBM System Storage N7600D、IBM SAN Volume Controller (SVC)

An enterprise has three nodes: -Node ’A’ is a production database, -Node ’B’ is a production  Application server, and -Node ’C’ is a test and development node. Node ’C’ is used by six programmers to develop and the production application as business critical and would like to make it highly available with HACMP. Application development and testing is not business critical.  Which of the following describes the best solution?()  A、 There is not an adequate solution because HACMP should not be configured in this environment without a dedicated standby node.B、 Nodes ’A’ and ’B’ should be configured in a cluster with mutual fallover of two cascading resource groups to provide both nodes will deliver acceptable response time with both resource groups.C、 Nodes ’A’ and ’C’ should be configured in one cluster, and Nodes ’B’ and ’C’ in another cluster to prevent both the database and application server from falling over to Node ’C’ at the same time.D、 Nodes ’A’, ’B’, and ’C’ should be configured in a cluster with Node ’C’ the hot standby for both the database and application server resource groups. Workload Manager (WLM) must be configured on database and application developers from over utilizing the CPU resources.

The user base of a three-node cluster has increased. In order to add clustered users to all nodes, which of the following steps should be performed?()  A、 On one of the nodes,add the users via C-SPOC ’Add a User to the Cluster’smit menu.B、 Use C-SPOC to synchronize the password files between cluster nodes.C、 On all of the nodes,add the users to the /etc/passwd and system security files,and then synchronize the cluster.D、 On one of the nodes,add the users to the /tec/passwd and system security files,add home directories,and use cron to automate the movement of system security files between nodes.

Following a successful migration,it is highly recommended that concurrent Volume Groups be Converted to enhanced concurrent capable Volume Groups.  In order to follow this recommendation,what step must be completed first?()  A、 The Volume Groups must be changed with chvg -E vgname.B、 The Volume Groups must be a member of a resource group and must be varied on al nodes of       the cluster.C、 The Volume Groups must be a member of a resource group and must be varied off all nodes      of the cluster.D、 The Volume Grups cannot be changed to enhanced concurrent capable because they must be      recreated with mkvg -C vgname.

During an HACMP migration,two nodes of a four-node cluster have been migrated. The existing hardware of the remaining two nodes do not meet the pre-requisites of the HACMP level that is being installed.  Which of the following is the best method for resolving this issue?()A、 Upgrade the unsupported hardware and continue with the migration.B、 Restore the two nodes that have been migrated with a cluster snapshot.C、 Restore the two nodes that have not been migrated with a cluster snapshot.D、 Synchronize the cluster to allow the nodes that didn’t migrate to join the cluster.

Company.com has I/O slot constraints on two nodes that are going to be configured in an  HACMP cluster. There is room for only one Network Interface Card in each node,in addition to the built-in Ethernet port on the system planer.  The best HACMP configuration for these servers is to implement:()  A、 A single adapter network using the Network Interface Card in each nodeB、 A single adapter network using persistent addresses on the Network Interface Card in each nodeC、 A dual adapter network using the internal Ethernet adapters as an non-service interface with IPAT via IP Replacement.D、 EtherChannel high availability for the network connections with HACMP cascading resource groups for data and application fallover

You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain.   You administer a Network Load Balancing cluster that consists of three nodes. Each node runs Windows Server 2003 and contains a single network adapter. The Network Load Balancing cluster can run only in unicast mode. The Network Load Balancing cluster has converged successfully.   To increase the utilization of the cluster, you decide to move a particular application to each node of the cluster. For this application to run, you must add a Network Load Balancing port rule to the nodes of the cluster.   You start Network Load Balancing Manager on the second node of the cluster. However, Network Load Balancing Manager displays a message that it cannot communicate with the other two nodes of the cluster.  You want to add the port rule to the nodes of the cluster.   What should you do?  ()A、 Use Network Load Balancing Manager on the Network Load Balancing default host to add the port rule.B、 Change the host priority of the second node to be the highest in the cluster, and then use Network Load Balancing Manager to add the port rule.C、 Run the nlb.exe drain command on each node, and then use Network Load Balancing Manager to add the port rule.D、 Add the port rule through Network Connections Properties on each node.

多选题Which statements are valid for a local SPAN configuration? ()ASource and destination interface must be on the same hostBSource and destination interfaces can be on different hostsCDestination vEthernet interface can be on a different VLAN than the sourceDDestination interface can be a physical portEDestination interface cannot be a physical port

单选题In order to cluster IBM SONAS interface nodes so that they can serve the same data, the interface nodes must coordinate their locking and recovery. This coordination is done through().ASONAS Health CenterBSONAS Cluster ManagerCTivoli Storage ManagerDWindows Active Directory

单选题Company.com has I/O slot constraints on two nodes that are going to be configured in an  HACMP cluster. There is room for only one Network Interface Card in each node,in addition to the built-in Ethernet port on the system planer.  The best HACMP configuration for these servers is to implement:()A A single adapter network using the Network Interface Card in each nodeB A single adapter network using persistent addresses on the Network Interface Card in each nodeC A dual adapter network using the internal Ethernet adapters as an non-service interface with IPAT via IP Replacement.D EtherChannel high availability for the network connections with HACMP cascading resource groups for data and application fallover

单选题A large shipping company that is standardized on Fibre Channel storage has just acquired a regional shipping company that is using an IBM XIV system. The large company would like to integrate the XIV system into the environment and manage all data through a single management interface. Which product should be suggested so that all data can be managed?()AIBM DS8700BIBM XIV GUICIBM System Storage N7600DIBM SAN Volume Controller (SVC)

单选题What is the functionality of redundant interfaces (reth) in a chassis cluster?()Areth interfaces are used only for VRRP.Breth interfaces are the same as physical interfaces.Creth interfaces are pseudo-interfaces that are considered the parent interface for two physical interfaces.DEach cluster member has a reth interface that can be used to share session state information with the other cluster members.

单选题The user base of a three-node cluster has increased. In order to add clustered users to all nodes, which of the following steps should be performed?()A On one of the nodes,add the users via C-SPOC ’Add a User to the Cluster’smit menu.B Use C-SPOC to synchronize the password files between cluster nodes.C On all of the nodes,add the users to the /etc/passwd and system security files,and then synchronize the cluster.D On one of the nodes,add the users to the /tec/passwd and system security files,add home directories,and use cron to automate the movement of system security files between nodes.

多选题Overlay Transport Virtualization (OTV) join interface is used to source the OTV encapsulated traffic and send it to the Layer 3 domain of the data center network. Which statements are true about OTV join interface? ()AJoin interface is a Layer 3 entity, and with the Cisco NX-OS release 6.0, it can only be defined as a physical interface, physical subinterface, Layer 3 port channel, or Layer 3 port channel subinterface.BA single join interface can be defined and associated with a given OTV overlay.CMultiple overlays can also share the same join interface.DJoin interface can be a loopback interface.EThe join interface is a Layer 3 entity that can be defined as a physical interface but not as a logical one.

多选题Which two considerations must you take into account when deploying a Junos Pulse Access Control Service cluster?()AState synchronization occurs only through the internal network interface card (NIC)BLatency of the WAN must be less than 300 ms.CAuthenticating endpoints must be on the same LAN segment.DCluster members must use the same hardware platfor

单选题Following a successful migration,it is highly recommended that concurrent Volume Groups be Converted to enhanced concurrent capable Volume Groups.  In order to follow this recommendation,what step must be completed first?()A The Volume Groups must be changed with chvg -E vgname.B The Volume Groups must be a member of a resource group and must be varied on al nodes of       the cluster.C The Volume Groups must be a member of a resource group and must be varied off all nodes      of the cluster.D The Volume Grups cannot be changed to enhanced concurrent capable because they must be      recreated with mkvg -C vgname.

单选题The en0 interface on Node1 of a two-node cluster has failed. This adapter is configured with a boot addressand under stable operations also has the service address of the cluster’s single resource group. The resourcegroup is configured with the fallback option. The HA network was configured for IPAT via aliasing and now theservice address is on the en1 interface in the cluster. The en0 interface has already been physically replacedand configured with the boot address. Which of the following will return the cluster to its original state andminimize cluster downtime?()ARun cluster synchronization.BRestart cluster services on Node1.CPerform a swap_adapter using C-SPOCDRestart cluster services on both nodes