An administrator will use the discovery process to capture information about common cluster storage. Whichof the following commands should the administrator run on each participating node against the shared diskhdisk3 to ensure that this disk is successfully identified by the discovery process?()A、chpv -ay hdisk3B、cfgmgr -l hdisk3C、chdev l hdisk3 a pv=yesD、chdev l hdisk3 a reserve_policy=no_reserve
An administrator will use the discovery process to capture information about common cluster storage. Whichof the following commands should the administrator run on each participating node against the shared diskhdisk3 to ensure that this disk is successfully identified by the discovery process?()
- A、chpv -ay hdisk3
- B、cfgmgr -l hdisk3
- C、chdev l hdisk3 a pv=yes
- D、chdev l hdisk3 a reserve_policy=no_reserve
相关考题:
An administrator is experiencing availability issues on a Linux server. The administrator decides tocheck the server for an IP address conflict on the server. Which of the following commands should the administrator use?()A.tracerouteB.tracertC.ifconfigD.ipconfig
A System p administrator found a process on the server that should be stopped. Which of the following commands can be used to list all the signal actions defined for this process()A、psB、pstatC、lssigD、procsig
An administrator has encountered a problem with a particular piece of software installed on the server and begins the troubleshooting process. Which of the following is the FIRST place the administrator should look for specific information about the problem?()A、The supporting documentationB、The vendor websiteC、The InternetD、The server event logs
A staff member reports that they cannot access the shared folder on the network; however, other staff members are reporting that they can access the shared folder. Which of the following is the BEST way to identify the problem?()A、The administrator should monitor all traffic between the staff member and the server.B、The administrator should reconfigure the RAID configuration to allow more space.C、The administrator should map a drive using the net use command.D、The administrator should allow the staff member to use a USB drive.
An administrator is experiencing availability issues on a Linux server. The administrator decides tocheck the server for an IP address conflict on the server. Which of the following commands should the administrator use?()A、tracerouteB、tracertC、ifconfigD、ipconfig
A cluster administrator is trying to configure tmssa for the non-IP network. Having installed the devices.ssa.tm.rte fileset, what is the next step that must be performed to create the target mode devices?() A、 Reboot each cluster node.B、 Change the ssa node number to a non-zero value.C、 Change the SSAR device state from defined to available.D、 Run the cfgmgr process on each node to create the target mode devices.
Company.com has non-IBM fibre attached storage. The storage is connected to a node in the cluster that has multiple adapters and virtual paths. There is a concern about detecting the loss of one of the fibre adapters since there is no indication to the administrator that one has failed. What feature of HACMP can be sued to assist with this issue?() A、 Disk heartbeatB、 Error notificationC、 Event notificationD、 Application monitor
An administrator runs clstat on a cluster node and receives the following response: ’Can not get Cluster Information.’ Which of the following daemons may need to be started in order to correct this problem?()A、 topsvcsB、 clinfoESC、 snmpinfoD、 clsmuxpdES
An administrator will be performing a PowerHA upgrade on a cluster from version 5.3 to version 5.5. Which ofthe following tasks will verify a successful migration?()A、Use the clstat command and verify the cluster is in a stable stateB、After each node is upgraded, run a verification and synchronizationC、After all nodes are upgraded, run a verification and synchronizationD、Take a snapshot of each node and verify the configuration is the same
An administrator is planning for a six node cluster but is concerned about the administration needed tomanage user accounts throughout the cluster. What PowerHA feature could the administrator use to reducethe administration overhead?()A、LDAP Authentication ModuleB、Smart Assist for Active DirectoryC、C-SPOC for user and password managementD、File Collections designating one node as the primary authentication node
A cluster administrator has been asked to install HACMP on two nodes with the following hardware: -two CPUs, - 1GB RAM, - one 1 36GB drive, -two 10/100/1000 Ethernet adapters, and -GB Fibre Channel adapters dual attached to SAN storage. In order to eliminate single points of failure,the administrator should first add which of the following:() A、 an additional 1GB RAM to each node.B、 Another bootable mirrored disk drive.C、 A 10/100/1000 GB Ethernet adapter to be attached to a redundant switch.D、 Nothing,because this is a viable cluster solution with no single points of failure.
Company.com performs cluster verification every Sunday night with a corn job. The systems administrator reviews the /var/hacmp/clverify/clverify.log on Monday morning and notice that cluster verification posted a message about inconsistent filesystem names in one of the shared volume groups. What should the administrator do?() A、 Cause a fallover to occur on the resource group.B、 Export the volume groups and re-import them on all nodes.C、 Run an importvg -L command on all the nodes in the cluster.D、 Investiage recent changes to the shared volume group and use C-SPOC to correct inconsistencies.
A system administrator needs to replace a mirrored disk. After performing the proper removal process and replacing the disk, which of the following set of commands should be performed to bring the disk back into production?()A、 reboot, mklvcopy, syncvg B、 cfgmgr -vl ssar, chvg -va, syncvg C、 cfgmgr, extendvg, syncvg D、 extendvg, mklvcopy, syncvg
Two MAG4610s are running in an active/passive cluster configuration. The system administrator is planning to apply a service package to the cluster.Which process should the administrator follow?()A、Perform the upgrade on the active node of the cluster. When completed, the node reboots and then pushes the service package to the passive node automatically.B、Perform the upgrade on the passive node of the cluster. When completed, the node reboots and then pushes the service package to the active node automatically.C、On the clustering status page, disable the active node. Perform the upgrade on the disabled node. When completed and the node reboots, enable the node on the clustering status page.Repeat the process on the passive node.D、On the clustering status page, disable the passive node. Perform the upgrade on the disabled node. When completed and the node reboots, enable the node on the clustering status page.Repeat the process on the active node.
You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain. You administer a Network Load Balancing cluster that consists of three nodes. Each node runs Windows Server 2003 and contains a single network adapter. The Network Load Balancing cluster can run only in unicast mode. The Network Load Balancing cluster has converged successfully. To increase the utilization of the cluster, you decide to move a particular application to each node of the cluster. For this application to run, you must add a Network Load Balancing port rule to the nodes of the cluster. You start Network Load Balancing Manager on the second node of the cluster. However, Network Load Balancing Manager displays a message that it cannot communicate with the other two nodes of the cluster. You want to add the port rule to the nodes of the cluster. What should you do? ()A、 Use Network Load Balancing Manager on the Network Load Balancing default host to add the port rule.B、 Change the host priority of the second node to be the highest in the cluster, and then use Network Load Balancing Manager to add the port rule.C、 Run the nlb.exe drain command on each node, and then use Network Load Balancing Manager to add the port rule.D、 Add the port rule through Network Connections Properties on each node.
Company.com has a two-node HACMP cluster with a single cascading resource group. Node ’A’ is the normal production node, and Node ’B’ is the standby node. One of the first steps in the HACMP test plan is to start the cluster and to verify that al elements for the resource group have been acquired. The administrator who is conducting the HACMP test starts the HACMP daemons on Node ’B’ with the ’smitty clstart" command. The administrator notices that Node ’B’ acquires the elements of the resource group, including a service IP labels,a shared volume group, and an application server that has been started. The expectation was that Node ’B’ would enter the cluster in a standby status, rather than acquiring production resources. What should the administrator do to correct this problem?() A、 Change the cluster to a rotating design.B、 Change the Cascading without Fallback flag to true.C、 Change the Inactive Takeover field to false in the cluster configuration.D、 Nothing should be done. This is the default behavior for cascading resource groups,and node ’A’ should have been started first.
单选题An administrator will be performing a PowerHA upgrade on a cluster from version 5.3 to version 5.5. Which ofthe following tasks will verify a successful migration?()AUse the clstat command and verify the cluster is in a stable stateBAfter each node is upgraded, run a verification and synchronizationCAfter all nodes are upgraded, run a verification and synchronizationDTake a snapshot of each node and verify the configuration is the same
单选题An administrator runs clstat on a cluster node and receives the following response: ’Can not get Cluster Information.’ Which of the following daemons may need to be started in order to correct this problem?()A topsvcsB clinfoESC snmpinfoD clsmuxpdES
单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now in a high security environment, you manage a SQL Server 2008 cluster. You intend to configure and use encrypted connections for the clustered virtual SQL Server. You have to install a certificate. The cetification will be used for encryption. What should you do?()AIn the cluster quorum drive, install the encryption certificate BIn the SQL Server shared disk, install the encryption certificate Cin the cluster group, install the encryption certificate. DOn each individual node, install the encryption certificate
单选题A cluster administrator has been asked to install HACMP on two nodes with the following hardware: -two CPUs, - 1GB RAM, - one 1 36GB drive, -two 10/100/1000 Ethernet adapters, and -GB Fibre Channel adapters dual attached to SAN storage. In order to eliminate single points of failure,the administrator should first add which of the following:()A an additional 1GB RAM to each node.B Another bootable mirrored disk drive.C A 10/100/1000 GB Ethernet adapter to be attached to a redundant switch.D Nothing,because this is a viable cluster solution with no single points of failure.
单选题Node ’C’ has just completed reintegration in a three-node cluster. The hacmp.out logifle displays The event node_up_complete for Node ’C’. The cluster administrator wishes to verify that the cluster is stable. In addition to reviewing the cluster log files,what utility should be run to verify the cluster state?()A clstatB clinfoC cldiagD clverify
单选题A staff member reports that they cannot access the shared folder on the network; however, other staff members are reporting that they can access the shared folder. Which of the following is the BEST way to identify the problem?()AThe administrator should monitor all traffic between the staff member and the server.BThe administrator should reconfigure the RAID configuration to allow more space.CThe administrator should map a drive using the net use command.DThe administrator should allow the staff member to use a USB drive.
单选题Company.com performs cluster verification every Sunday night with a corn job. The systems administrator reviews the /var/hacmp/clverify/clverify.log on Monday morning and notice that cluster verification posted a message about inconsistent filesystem names in one of the shared volume groups. What should the administrator do?()A Cause a fallover to occur on the resource group.B Export the volume groups and re-import them on all nodes.C Run an importvg -L command on all the nodes in the cluster.D Investiage recent changes to the shared volume group and use C-SPOC to correct inconsistencies.
单选题An administrator has encountered a problem with a particular piece of software installed on the serverand begins the troubleshooting process. Which of the following is the FIRST place the administrator should look for specific information about the problem?()A The supporting documentationB The vendors websiteC The InternetD The servers event logs
单选题An administrator has encountered a problem with a particular piece of software installed on the server and begins the troubleshooting process. Which of the following is the FIRST place the administrator should look for specific information about the problem?()AThe supporting documentationBThe vendor websiteCThe InternetDThe server event logs
单选题A cluster administrator is trying to configure tmssa for the non-IP network. Having installed the devices.ssa.tm.rte fileset, what is the next step that must be performed to create the target mode devices?()A Reboot each cluster node.B Change the ssa node number to a non-zero value.C Change the SSAR device state from defined to available.D Run the cfgmgr process on each node to create the target mode devices.
单选题A system administrator needs to replace a mirrored disk. After performing the proper removal process and replacing the disk, which of the following set of commands should be performed to bring the disk back into production?()A reboot, mklvcopy, syncvg B cfgmgr -vl ssar, chvg -va, syncvg C cfgmgr, extendvg, syncvg D extendvg, mklvcopy, syncvg