单选题The user base of a three-node cluster has increased. In order to add clustered users to all nodes, which of the following steps should be performed?()A On one of the nodes,add the users via C-SPOC ’Add a User to the Cluster’smit menu.B Use C-SPOC to synchronize the password files between cluster nodes.C On all of the nodes,add the users to the /etc/passwd and system security files,and then synchronize the cluster.D On one of the nodes,add the users to the /tec/passwd and system security files,add home directories,and use cron to automate the movement of system security files between nodes.

单选题
The user base of a three-node cluster has increased. In order to add clustered users to all nodes, which of the following steps should be performed?()
A

 On one of the nodes,add the users via C-SPOC ’Add a User to the Cluster’smit menu.

B

 Use C-SPOC to synchronize the password files between cluster nodes.

C

 On all of the nodes,add the users to the /etc/passwd and system security files,and then synchronize the cluster.

D

 On one of the nodes,add the users to the /tec/passwd and system security files,add home directories,and use cron to automate the movement of system security files between nodes.


参考解析

解析: 暂无解析

相关考题:

Which command would you use to enable chassis cluster on an SRX device, setting the cluster ID to 1 and node to 0?() A. user@host# set chassis cluster cluster-id 1 node 0 rebootB. user@host set chassis cluster id 1 node 0 rebootC. user@host set chassis cluster cluster-id 1 node 0 rebootD. user@host# set chassis cluster id 1 node 0 reboot

A base operating system has just been installed, successfully rebooted, and the user is now logged in as root. The user wants the server software bundle installed, but has additional software that must be installed with the bundle. Which of the following procedures should be performed to complete the installation?()A.Add the software to /usr/sys/inst.imagesB.Update the bundle file in /usr/sys/inst.imagesC.Install the bundle filelists and run update allD.Add the software to the bundle file in /usr/sys/inst.data/sys_bundles

下面是一个用户自定义的消息,哪一种消息定义是正确的?( )A.WM_MyMessage=User_Base+100B.WM_MyMessage=CM_Base+100C.WM_MyMessage=WM_Base+100D.WM_MyMessage=WM_USER+100

A new HACMP maintenance level has recently been released. An administrator is creating a  project plan that is required for applying the updates for a three-node production cluster.  To minimize downtime,what is the best way to accomplish the updates on all cluster nodes?()  A、 Perform a graceful takeover one node at a time and apply the updates.B、 Perform the updates on all nodes simultaneously using C-SPOC utilities.C、 Perform the updates on node at a time with the cluster software active.D、 Perform a graceful stop of all cluster nodes and apply updates to all nodes.

If both nodes in a chassis cluster initialize at different times, which configuration example will allow you to ensure that the node with the higher priority will become primary for your RGs other than RG0?()A、[edit chassis cluster] user@host# show redundancy-group 1 { node 0 priority 200; node 1 priority 150;preempt; }B、[edit chassis cluster] user@host# show redundancy-group 1 { node 0 priority 200; node 1 priority 150; monitoring; }C、[edit chassis cluster] user@host# show redundancy-group 1 { node 0 priority 200; node 1 priority 150; control-link-recovery; }D、[edit chassis cluster] user@host# show redundancy-group 1 { node 0 priority 200; node 1 priority 150; strict-priority; }

When the rc.cluster script is executed, cluster processes are started in what orde?()A、 topsvcs,clstrmgr,clsmuxpd,grpsvcs,emsvcs,clinfoB、 topsvcs,grpsvcs,emsvcs,clstrmgr,clsmupxpd,clinfoC、 clstrmgr,clsmuxpd,clinfo,topsvcs,grpsvcs,emsvcsD、 clstrmgr,topsvcs,clxmuxpd,clinfo,grpsvcs,emsvcs

During a cluster functionality test, and administrator performs a graceful stop for Node ’B’ in a three-node cluster. What is the expected state of the cluster after Node ’B’successfully completes?()  A、 All cluster resources halt on Node ’B’,and one or both surviving nodes will gracefully acquire the resources.B、 All cluster processes halt on Node ’B’,the cluster resources remain active,and the remaining  nodes take no action.C、 All cluster processes stay active on Node ’B’,cluster resources are halted,and the remaining nodes take no action.D、 All cluster resources will stop,cluster processes halt on Node ’B’,and the remaining cluster nodes take no action.

A user has changed their password using the passwd command, and notices that the change is only made tothe local node. When the administrator changes the user’s password from the command line using the passwd command thechange is made cluster-wide. What is the most likely cause of this problem?()A、The user has a UID less than 200B、The user has been defined as an administrative userC、The file /usr/es/sbin/cluster/clpasswd is not executable by the userD、The user needs explicit authorization to change their password cluster-wide

An administrator has written a script to check that the contents of an application configuration file are identicalon all cluster nodes. The script has also been associated with a user defined custom verification method. Theadministrator would like the contents of this file to be checked and verified automatically on a daily basis.How can this be achieved?()A、By using a job scheduler such as cronB、By enabling automatic cluster verificationC、By including the script name in the file /usr/es/sbin/cluster/etc/clverify.rcD、By including the custom method name in the file /usr/es/sbin/cluster/etc/rc.authomethods

Company.com has a three-node cluster (Node ’A’, Node ’B’, and Node ’C’) with three resource  Groups (rg1, rg2, and rg3). Node ’A’ has twice as many CPUs and twice as much memory as the two test add development Nodes ’B’ and ’C’. During normal production processing, all resource groups are active on Node ’A’.  What is most efficient way to configure the cluster to manage the workload?()   A、 Use thee cascading resource groups where ’rg1’ and ’rg2’ fallover to Node ’B’ and ’rg3’ falls over to Node ’C’B、 Use Dynamic Node Priority resource groups with a priority chain consisting of Node ’A’ then Node ’B’ then Node ’C’C、 Use three rotating resource groups with ’rg1’ and ’rg2’ falling over to node ’B’ and ’rg3’ falling over to Node ’C’D、 Upgrade Nodes ’B’ and ’C’ to be equal to Node ’A in CPU and memory resources to enable the cluster to synchronize three resource groups

A three-node cluster experienced a node failure. The resource groups were acquired as cexpected. The node has been repaired,and HACMP has been restarted.  How does the operator determine that the node has successfully re-integrated into the cluster?()  A、 Use the clstat command.B、 Use the cIRGinfor command.C、 Tail the /etc/hacmp.out file and wait for "node_up_complete" to finish successfully.D、 Tail the /usr/es/adm/cluster.log file and wait for "node_up_complete" to finish successfully.

An administrator is configuring a new cluster and has a requirement for a notification to be generated if the /tmp File System becomes greater than 90% full. Which of the following PowerHA components will support theadministrator’s requirement?()A、Pre-defined EventsB、User-defined EventsC、Remote notification methodsD、The integration between RMC and WebSM

A cluster node has been started and has not acquired the resources in the resource groups.  Which log file will show the details of any event script processing that has occurred?()  A、 /tmp/hacmp.outB、 /tmp/clstrmgr.debugC、 /usr/es/adm/cluster.logD、 /var/adm/hacmp/hacmp.out

The user base of a three-node cluster has increased. In order to add clustered users to all nodes, which of the following steps should be performed?()  A、 On one of the nodes,add the users via C-SPOC ’Add a User to the Cluster’smit menu.B、 Use C-SPOC to synchronize the password files between cluster nodes.C、 On all of the nodes,add the users to the /etc/passwd and system security files,and then synchronize the cluster.D、 On one of the nodes,add the users to the /tec/passwd and system security files,add home directories,and use cron to automate the movement of system security files between nodes.

A base operating system has just been installed, successfully rebooted, and the user is now logged in as root. The user wants the server software bundle installed, but has additional software that must be installed with the bundle. Which of the following procedures should be performed to complete the installation?()A、Add the software to /usr/sys/inst.imagesB、Update the bundle file in /usr/sys/inst.imagesC、Install the bundle filelists and run update allD、Add the software to the bundle file in /usr/sys/inst.data/sys_bundles

Which command would you use to enable chassis cluster on an SRX device, setting the cluster ID to 1 and node to 0?()A、user@host# set chassis cluster cluster-id 1 node 0 rebootB、user@host set chassis cluster id 1 node 0 rebootC、user@host set chassis cluster cluster-id 1 node 0 rebootD、user@host# set chassis cluster id 1 node 0 reboot

You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain.   You administer a three-node Network Load Balancing cluster. Each cluster node runs Windows Server 2003 and has a single network adapter. The cluster has converged successfully.   You notice that the nodes in the cluster run at almost full capacity most of the time. You want to add a fourth node to the cluster. You enable and configure Network Load Balancing on the fourth node.   However, the cluster does not converge to a four-node cluster. In the System log on the existing three nodes, you find the exact same TCP/IP error event. The event has the following description: "The system detected an address conflict for IP address 10.50.8.70 with the system having network hardware address 02:BF://0A:32:08:46."   In the System log on the new fourth node, you find a similar TCP/error event with the following description: "The system detected an address conflict for IP address 10.50.8.70 with the system having network hardware address 03:BF://0A:32:08:46." Only the hardware address is different in the two descriptions.  You verify that IP address 10.50.8.70 is configured as the cluster IP address on all four nodes.  You want to configure a four-node Network Load Balancing cluster.   What should you do?  ()A、 Configure the fourth node to use multicast mode.B、 Remove 10.50.8.70 from the Network Connections Properties of the fourth node.C、 On the fourth node, run the nlb.exe resume command.D、 On the fourth node, run the wlbs.exe reload command.

单选题A user has changed their password using the passwd command, and notices that the change is only made tothe local node. When the administrator changes the user’s password from the command line using the passwd command thechange is made cluster-wide. What is the most likely cause of this problem?()AThe user has a UID less than 200BThe user has been defined as an administrative userCThe file /usr/es/sbin/cluster/clpasswd is not executable by the userDThe user needs explicit authorization to change their password cluster-wide

单选题The user base of a three-node cluster has increased. In order to add clustered users to all nodes, which of the following steps should be performed?()A On one of the nodes,add the users via C-SPOC ’Add a User to the Cluster’smit menu.B Use C-SPOC to synchronize the password files between cluster nodes.C On all of the nodes,add the users to the /etc/passwd and system security files,and then synchronize the cluster.D On one of the nodes,add the users to the /tec/passwd and system security files,add home directories,and use cron to automate the movement of system security files between nodes.

单选题Node ’C’ has just completed reintegration in a three-node cluster. The hacmp.out logifle displays  The event node_up_complete for Node ’C’. The cluster administrator wishes to verify that the cluster is stable.  In addition to reviewing the cluster log files,what utility should be run to verify the cluster state?()A clstatB clinfoC cldiagD clverify

单选题A three-node cluster experienced a node failure. The resource groups were acquired as cexpected. The node has been repaired,and HACMP has been restarted.  How does the operator determine that the node has successfully re-integrated into the cluster?()A Use the clstat command.B Use the cIRGinfor command.C Tail the /etc/hacmp.out file and wait for node_up_complete to finish successfully.D Tail the /usr/es/adm/cluster.log file and wait for node_up_complete to finish successfully.

单选题When the rc.cluster script is executed, cluster processes are started in what orde?()A topsvcs,clstrmgr,clsmuxpd,grpsvcs,emsvcs,clinfoB topsvcs,grpsvcs,emsvcs,clstrmgr,clsmupxpd,clinfoC clstrmgr,clsmuxpd,clinfo,topsvcs,grpsvcs,emsvcsD clstrmgr,topsvcs,clxmuxpd,clinfo,grpsvcs,emsvcs

单选题During a cluster functionality test, and administrator performs a graceful stop for Node ’B’ in a three-node cluster. What is the expected state of the cluster after Node ’B’successfully completes?()A All cluster resources halt on Node ’B’,and one or both surviving nodes will gracefully acquire the resources.B All cluster processes halt on Node ’B’,the cluster resources remain active,and the remaining  nodes take no action.C All cluster processes stay active on Node ’B’,cluster resources are halted,and the remaining nodes take no action.D All cluster resources will stop,cluster processes halt on Node ’B’,and the remaining cluster nodes take no action.

单选题You need to design a configuration for the mailbox servers. What should you do?()ACreate two Exchange Server 2003 computers. Place the mailboxes for main office users on one server, and place the mailboxes for remote users on the other serverBCreate a Network Load Balancing cluster that contains two Exchange Server 2003 computers. Place half of the user mailboxes on one server, and place half of the user mailboxes on the other serverCCreate a Microsoft Cluster Server cluster that contains two Exchange Server 2003 computers. Place all of the user mailboxes on one server and configure the other server as a failover nodeDCreate a Microsoft Cluster Server cluster that contains two Exchange Server 2003 computers. Place half of the user mailboxes on one server, and place half of the user mailboxes on the other server

多选题Your company has an Active Directory Domain Services (AD DS) domain. You have a Windows Server 2008 R2 Hyper-V server. You manage the virtual environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You need to ensure that a user can create new virtual machines (VMs) on only a specific set of servers . The user must not be able to see or manage servers outside of that set within VMM . Which two actions should you perform?()ACreate a host group. Add the host servers that the user will manage to the host group.BCreate a failover cluster. Join the host servers that the user will manage to the failover cluster.CUsing Authorization Manager, assign the user to a role with the necessary permission to manage the servers by using VMM.DUsing Authorization Manager, assign the user to a role with the necessary permission to manage the servers by using the VMM Self-Service Portal.

单选题The en0 interface on Node1 of a two-node cluster has failed. This adapter is configured with a boot addressand under stable operations also has the service address of the cluster’s single resource group. The resourcegroup is configured with the fallback option. The HA network was configured for IPAT via aliasing and now theservice address is on the en1 interface in the cluster. The en0 interface has already been physically replacedand configured with the boot address. Which of the following will return the cluster to its original state andminimize cluster downtime?()ARun cluster synchronization.BRestart cluster services on Node1.CPerform a swap_adapter using C-SPOCDRestart cluster services on both nodes

单选题A new HACMP maintenance level has recently been released. An administrator is creating a  project plan that is required for applying the updates for a three-node production cluster.  To minimize downtime,what is the best way to accomplish the updates on all cluster nodes?()A Perform a graceful takeover one node at a time and apply the updates.B Perform the updates on all nodes simultaneously using C-SPOC utilities.C Perform the updates on node at a time with the cluster software active.D Perform a graceful stop of all cluster nodes and apply updates to all nodes.

单选题An administrator has written a script to check that the contents of an application configuration file are identicalon all cluster nodes. The script has also been associated with a user defined custom verification method. Theadministrator would like the contents of this file to be checked and verified automatically on a daily basis.How can this be achieved?()ABy using a job scheduler such as cronBBy enabling automatic cluster verificationCBy including the script name in the file /usr/es/sbin/cluster/etc/clverify.rcDBy including the custom method name in the file /usr/es/sbin/cluster/etc/rc.authomethods