The cluster IP address of the UCS Fabric interconnects is used to access which three entities? ()A、CMCB、CLIC、APID、VSME、UI

The cluster IP address of the UCS Fabric interconnects is used to access which three entities? ()

  • A、CMC
  • B、CLI
  • C、API
  • D、VSM
  • E、UI

相关考题:

When configuring a single SRX210 as a firewall enforcer to a MAG4610 active/passive cluster, which statement supports a fault-tolerant configuration?() A. The cluster VIP is defined on the MAG4610 cluster, and the VIP of the cluster is defined as an instance on the SRX Series device.B. The cluster VIP is not defined on the MAG4610 cluster, and the IP address of both the active and passive nodes of the cluster are defined as separate instances on the SRX Series device.C. The cluster VIP is defined on the MAG4610 cluster, and the IP address of the active node is defined as an instance on the SRX Series device.D. The cluster VIP is not defined on the MAG4610 cluster, and the IP address of the passive node is defined as an instance on the SRX Series device.

Which statement is true about "full state backup" in a Cisco Unified Computing System?()A、 An XML file containing all details of the system, including IP address and cluster details B、 A binary file containing only service profiles, pools, and other items configured after initial configurationC、 A binary file containing all details of the system, including IP address and cluster detailsD、 An XML file containing only service profiles, pools, and other items configured after initial configurationE、 A text file with the NX-OS running configuration

APG的NODEA和NODEB都有各自的CLUSTER的IP地址

访问APG的activeNODE可以通过telnet它的node的IP地址或CLUSTER的IP地址来访问

Which of the following statements is true about IPAT via IP replacement?()  A、 Configuration of Hardware Address Takeover is supported.B、 Fewer physical network interface cards are required in the cluster.C、 It is the default for keeping a service IP labels highly available.D、 None-service ip labels must use different subnets than service IP labels.

In a cluster using /etc/hosts for name resolution, which of the following describes the minimum requirementsfor the /etc/hosts file?()A、IP address and IP label of each service and boot interface in the clusterB、IP address and IP label of each service and boot interface in the cluster, loopback interface, and the hostname of the nodeC、IP address and IP label of each service and boot interface in the cluster, the loopbackinterface, and the cluster gatewayD、IP address and IP label of each service and boot interface in the cluster, the loopbackinterface, the cluster gateway, and the subnet network addresses

What is required during the initial creation of a cluster?()A、 Nothing,because HACMP will discover the configurationB、 The cluster name and a TCP/IP path to each of the nodesC、 The cluster name and ID and a TCP/IP path to each of the nodesD、 The cluster name and ID node names and a TCP/IP path to each of the nodes

Defining an HACMP cluster using the Initialization and Standard Configuration menu is limited to the use of:()  A、 IPAT via IP aliasingB、 Custom Resource GroupsC、 Heartbeating over IP AliasesD、 Concurrent Capable Volume Groups

One service IP label and one volume group are assigned to a resource group in a cluster. An  Additional service IP label and volume group need to be added to the resource group.  How can this be done with the minimum disruption of the cluster?()  A、 Make the changes in HACMP and synchronize the cluster.B、 It cannot, because changes like this cannot be made while the cluster is running.C、 Make the changes in HACMP and wait until the next failure for the changes to take affect.D、 Use the forced option to stop the cluster,make the changes,and restart cluster services.

A cluster node has three network interfaces that support three resource groups with three service  IP labels. Each IP label uses IPAT via IP aliasing. One of the adapters fails, and all of the IP labels on it are moved to other interfaces as expected. The system supports the "hot swap" replacement of the network interfaces, and the system engineer has corrected the problem.  What will happen to the service IP lab3els when the repaired adapter is noticed by HACMP?()A、 They will migrate back to the repaired interface.B、 They will not move,the interface will join the pool of available resources.C、 They will not move; the interface will join the cluster as an available non-service adapter. D、 They will migrate to the repaired interface to create an equal number of service IP labels per interface.

A network for a two-node cluster has been planned. The network administrator has explained that the networkdoes not support gratuitous ARP. Which of the following steps will ensure that clients are able to connect tothe cluster after a failover takes place?()A、Implement heartbeating over IP aliasesB、Implement persistent service IP addressesC、Implement IPAT aliasing with hardware address takeover (HWAT)D、Implement IPAT replacement with hardware address takeover (HWAT)

During the installation of a cluster, the non-IP network failed. The cause was a connector that was  Not properly secured. The customer wants a better notification method in the event that the non-IP network fails in the future.  How could customization of the cluster be accomplished?()  A、 Customize the node up event script to send an email to the operator.B、 Have HACMP send mail when the non-IP network fails by customizing the RG_MMOVE event script.C、 Change the network module to be slower so that a temporary failure of the non-IP network would not report an error.D、 Use snmp or clinfo to monitor the status of the non-IP network and dispatch some type of warning message.

You are a network administrator for your company. The network contains a perimeter network. The perimeter network contains four Windows Server 2003, Web Edition computers that are configured as a Network Load Balancing cluster.   The cluster hosts an e-commerce Web site that must be available 24 hours per day. The cluster is located in a physically secure data center and uses an Internet-addressable virtual IP address. All servers in the cluster are configured with the Hisecws.inf template.   You need to implement protective measures against the cluster’s most significant security vulnerability.   What should you do?  ()A、 Use Encrypting File System (EFS) for all files that contain confidential data stored on the cluster.B、 Use packet filtering on all inbound traffic to the cluster.C、 Use Security Configuration and Analysis regularly to compare the security settings on all servers in the cluster with the baseline settings.D、 Use intrusion detection on the perimeter network.

You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain.   You administer a three-node Network Load Balancing cluster. Each cluster node runs Windows Server 2003 and has a single network adapter. The cluster has converged successfully.   You notice that the nodes in the cluster run at almost full capacity most of the time. You want to add a fourth node to the cluster. You enable and configure Network Load Balancing on the fourth node.   However, the cluster does not converge to a four-node cluster. In the System log on the existing three nodes, you find the exact same TCP/IP error event. The event has the following description: "The system detected an address conflict for IP address 10.50.8.70 with the system having network hardware address 02:BF://0A:32:08:46."   In the System log on the new fourth node, you find a similar TCP/error event with the following description: "The system detected an address conflict for IP address 10.50.8.70 with the system having network hardware address 03:BF://0A:32:08:46." Only the hardware address is different in the two descriptions.  You verify that IP address 10.50.8.70 is configured as the cluster IP address on all four nodes.  You want to configure a four-node Network Load Balancing cluster.   What should you do?  ()A、 Configure the fourth node to use multicast mode.B、 Remove 10.50.8.70 from the Network Connections Properties of the fourth node.C、 On the fourth node, run the nlb.exe resume command.D、 On the fourth node, run the wlbs.exe reload command.

You add a Windows Server 2008 R2 server with the Hyper-V role installed to an existing Hyper-V failover cluster.  After you move a virtual machine (VM) to the new cluster node, Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 reports the status of the VM as Unsupported Cluster Configuration. You need to be able to manage the VM by using VMM. What should you do?()A、Disable TCP Chimney Offload on the new cluster nodes network adaptersB、Disable the TCP/IP Offload Engine (TOE) on the new cluster nodes network adapters.C、Move the VM configuration file to a local storage device, and update the pointer to the file.D、Update the virtual networking configuration of the new cluster node to match the virtual networking configuration of the original cluster nodes.

You are a network adminstrator for your company. You install an intranet application on three Windows Server 2003 computers. You configure the servers as a Network Load Balancing cluster. You configure each server with two network adapters. One network adapter provides client computers access to the servers. The second network adapter is for cluster communications. Cluster communications is on a separate network segment.   The network team wants to reduce the cluster’s vulnerability to attack. These servers need to be highly available. The network team decides that the Network Load Balancing cluster needs to filter IP ports. The team wants the cluster to allow only the ports that are required for the intranet application.   You need to implement filtering so that only the intranet application ports are available on the cluster. You need to achieve this goal by using the minimum amount of administrative effort.   What should you do?  ()A、 Use Network Load Balancing Manager to configure port rules. Allow only the intranet application ports on the cluster IP address.B、 Use TCP/IP filtering on each server. Configure only the intranet application ports on the network adapter that provides client computers access to the servers.C、 Use TCP/IP filtering on each server. Configure only the intranet application ports on both of the network adapters.D、 Configure Routing and Remote Access on each server. Use Routing and Remote Access input filters to allow only the intranet application ports on the network adapter that provides client computers access to the servers.

单选题Which of the following statements is true about IPAT via IP replacement?()A Configuration of Hardware Address Takeover is supported.B Fewer physical network interface cards are required in the cluster.C It is the default for keeping a service IP labels highly available.D None-service ip labels must use different subnets than service IP labels.

单选题A customer is interested in using two Power 550 servers to implement a new two node cluster. The cluster willbe using SAN attached disk for shared storage and will be attached to one IP network. Which of the followingadapter configurations will meet the customer requirements while reducing single points of failure?()A AB BC CD D

单选题You are an administrator of an active/passive cluster of MAG Series devices running in mixed- mode configuration (IF-MAP server and authenticating users). The active user count is quickly approaching the maximum limit of the cluster. You have been directed to reconfigure the cluster to an active/active cluster and add a new license to increase the total number of active users the cluster can support. What must you do before changing the cluster configuration?()AApply the new license to the passive node of the cluster.BConfigure an external load balancer to hold the V IP.CDisable the active node in the cluster.DRemove the IF-MAP server configuration.

单选题Defining an HACMP cluster using the Initialization and Standard Configuration menu is limited to the use of:()A IPAT via IP aliasingB Custom Resource GroupsC Heartbeating over IP AliasesD Concurrent Capable Volume Groups

单选题A customer synchronizes the cluster in a virtualized environment. During the process the following warning isdisplayed: "For nodes with a single Network Interface Card per logical network configured, it is recommended to includethe file ’/usr/es/sbin/cluster/netmon.cf’ with a pingable IP address as described in the PowerHA PlanningGuide". What should the customer do next?()AIgnore the warning as synchronization completed successfully.BPopulate the /usr/es/sbin/cluster/netmon.cf file with one or many IP addresses external to the cluster.CCreate another virtual adapter on each node and set-up PowerHA networking in a more traditional fashionDPopulate the /usr/es/sbin/cluster/netmon.cf file with any of the boot IP addresses on one of the othercluster nodes

单选题One service IP label and one volume group are assigned to a resource group in a cluster. An  Additional service IP label and volume group need to be added to the resource group.  How can this be done with the minimum disruption of the cluster?()A Make the changes in HACMP and synchronize the cluster.B It cannot, because changes like this cannot be made while the cluster is running.C Make the changes in HACMP and wait until the next failure for the changes to take affect.D Use the forced option to stop the cluster,make the changes,and restart cluster services.

单选题You are a network adminstrator for your company. You install an intranet application on three Windows Server 2003 computers. You configure the servers as a Network Load Balancing cluster. You configure each server with two network adapters. One network adapter provides client computers access to the servers. The second network adapter is for cluster communications. Cluster communications is on a separate network segment.   The network team wants to reduce the cluster’s vulnerability to attack. These servers need to be highly available. The network team decides that the Network Load Balancing cluster needs to filter IP ports. The team wants the cluster to allow only the ports that are required for the intranet application.   You need to implement filtering so that only the intranet application ports are available on the cluster. You need to achieve this goal by using the minimum amount of administrative effort.   What should you do?  ()A Use Network Load Balancing Manager to configure port rules. Allow only the intranet application ports on the cluster IP address.B Use TCP/IP filtering on each server. Configure only the intranet application ports on the network adapter that provides client computers access to the servers.C Use TCP/IP filtering on each server. Configure only the intranet application ports on both of the network adapters.D Configure Routing and Remote Access on each server. Use Routing and Remote Access input filters to allow only the intranet application ports on the network adapter that provides client computers access to the servers.

单选题When configuring a single SRX210 as a firewall enforcer to a MAG4610 active/passive cluster, which statement supports a fault-tolerant configuration?()AThe cluster VIP is defined on the MAG4610 cluster, and the VIP of the cluster is defined as an instance on the SRX Series device.BThe cluster VIP is not defined on the MAG4610 cluster, and the IP address of both the active and passive nodes of the cluster are defined as separate instances on the SRX Series device.CThe cluster VIP is defined on the MAG4610 cluster, and the IP address of the active node is defined as an instance on the SRX Series device.DThe cluster VIP is not defined on the MAG4610 cluster, and the IP address of the passive node is defined as an instance on the SRX Series device.

单选题In a cluster using /etc/hosts for name resolution, which of the following describes the minimum requirementsfor the /etc/hosts file?()AIP address and IP label of each service and boot interface in the clusterBIP address and IP label of each service and boot interface in the cluster, loopback interface, and the hostname of the nodeCIP address and IP label of each service and boot interface in the cluster, the loopbackinterface, and the cluster gatewayDIP address and IP label of each service and boot interface in the cluster, the loopbackinterface, the cluster gateway, and the subnet network addresses

多选题The cluster IP address of the UCS Fabric interconnects is used to access which three entities? ()ACMCBCLICAPIDVSMEUI

单选题What is required during the initial creation of a cluster?()A Nothing,because HACMP will discover the configurationB The cluster name and a TCP/IP path to each of the nodesC The cluster name and ID and a TCP/IP path to each of the nodesD The cluster name and ID node names and a TCP/IP path to each of the nodes