A client wants to implement a highly available cluster between two sites. At each site the client has an IBMDS8300. At each site, the client would like a single node which will be connected through a SAN to the local DS8300but not the remote DS8300. Which clustering product could be used to provide high availability for this infrastructure?()A、PowerHA/XD for GLVMB、PowerHA with cross-site LVMC、PowerHA/XD for Metro MirrorD、PowerHA/XD for Global Mirror
A client wants to implement a highly available cluster between two sites. At each site the client has an IBMDS8300. At each site, the client would like a single node which will be connected through a SAN to the local DS8300but not the remote DS8300. Which clustering product could be used to provide high availability for this infrastructure?()
- A、PowerHA/XD for GLVM
- B、PowerHA with cross-site LVM
- C、PowerHA/XD for Metro Mirror
- D、PowerHA/XD for Global Mirror
相关考题:
Your client, with which you have good relations, wants you to provide him with office supplies. This task is not supported under your contract. You respond to your client's informal request using which medium?A SpeechB WrittenC OralD A and CE Form. letter
134 Your client, with which you have good relations, wants you to provide him with office supplies. This task is not supported under your contract. You respond to your client's informal request using which medium?A. SpeechB. WrittenC. OralD. A and CE. Form. letter
27. Mr Jackson is rich, but he___________ .A. isn’t in good healthB. is busy all the timeC. wants to go to universityD. never goes to a doctor
If a consumer wants to sell his CDs before the maturity date, he would do it in the primary markets.A.RightB.WrongC.Doesn't say
A customer is trying to determine which client to deploy. The customer wants to be able to perform Layer 2 authentication as well as connect to the Junos Pulse Secure Access Service.Which client should the customer deploy?()A. Windows native supplicantB. Odyssey Access ClientC. Junos PulseD. Network Connect
A client wants to improve the wireless coverage on the third floor of their house. The wirelessrouter is located in the basement and there is no easy way to run a cable to the third floor.Which of the following devices should be installed to extend the wireless coverage to cover the entirethird floor without running cables?()A.SwitchB.RouterC.RepeaterD.Bridge
A customer wants to send JMS messages to a remote WebLogic server from a Java SE application over an unreliable network connection. Which feature of WebLogic JMS will enable the customer to send messages from a Java SE client to a JMS destination that is not always easily reached?()A、SAF TargetB、SAF Imported DestinationC、SAF ClientD、SAF ServerE、Distributed SAF JMS
The company wants to evaluate making all business office users administrators on their client computers. You need to design a method to ensure that this change can be made in a manner that meets business and security requirements. What should you do?()A、On all domain controllers, implement registry access auditing for all registry keys that are considered sensitive by the company’s written security policyB、On all client computers, implement logon auditing for all user account logonsC、On all client computers, configure registry access auditing for all registry keys that are considered sensitive by the company’s written security policyD、On all domain controllers, implement logon auditing for all user account logons
You work as an application developer at Certkiller .com. Certkiller .com wants you to develop an application that stores and retrieves client information by means of a unique account number.You create a custom collection class, which implements the IDictionary interface,named ClientDictionary. The following code have been included into the new application. //Create Client objects Client c1 = new Client ("AReid", "Andy Reid", Status.Current); Client c2 = new Client ("DAustin", "Dean Austin", Status.New); //Create ClientDictionary object IDictionary cData = new ClientDictionary (); cData.Add ("10001", c1); cData.Add ("10002", c2); You use the same method to add other Client objects to the collection. You need to ensure that you are able to retrieve client information associated with the account number 10111.What should you do?()A、 Use the following code: Client foundClient;foundClient = (Client) cData.Find ("10111"); B、 Use the following code: Client foundClient;if (cData.Contains ("10111")) foundClient = cData ["10111"]; C、 Use the following code: Client foundClient;if (cData.Contains ("10111"))foundClient =(Client) cData ["10111"]; D、 Use the following code: Client foundClient;foreach (string key in cData.Keys {if (key == "10111")foundClient = (Client) cData.Values ["10111"]; }
T2000网元脚本文件导出到()目录下。A、../T2000/server/reportB、../T2000/client/jre/bin/reportC、../T2000/client/reportD、../T2000/server/script
An Enterprise customer wants to reduce the configuration effort for their Teleworker router deployments. What is one way to simplify the IPSec-related configuration in the remote routers?()A、CiscoWorks VPN Manager B、deploy Linksys routers with menu-driven configurationC、Easy VPN client mode D、disable 802.1x and Auth Proxy on the Teleworker router
A client wants to improve the wireless coverage on the third floor of their house. The wireless router is located in the basement and there is no easy way to run a cable to the third floor. Which of the following devices should be installed to extend the wireless coverage to cover the entire third floor without running cables?()A、SwitchB、RouterC、RepeaterD、Bridge
An administrator wants to install Web SMIT on a node that is not part of a cluster. Which PowerHA filesetprovides this function?()A、cluster.sysmgt.wsmB、cluster.es.client.wsmC、cluster.es.server.websmD、cluster.sysmgt.websm.rte
An administrator is logged into a remote server using an Xwindows client and wants to use smit. The bandwidth for the remote connection is minimal, so the administrator would like to disable the graphical version of smit to speed up display updates. Which command will start smit in the non-graphical mode?()A、smitB、msmitC、smit -CD、smit_tty
You are employed as the exchange administrator at TestKing.com. You are in the process of installing anew Exchange Server 2010 Organization. Outlook Web App is used throughout the organization by usersto access their e-mail. TestKing.com wants you to implement a new compliance policy that states that e-mail messaging containing client contracts be kept for two years. Management also wants users to classify e-mails relatingto client contracts as well as moving e-mail messages to other folders. You are instructed a solution thatwill comply with the set criteria. What should you do?()A、You should recommend Retention Policy Tags as well as a Retention Policy to management.B、You should recommend an OWA mailbox policy to management.C、You should recommend Managed Folder mailbox policies to management.D、You should recommend Personal Archives and an Archive policy to management.
You work as the exchange administrator at TestKing.com. The TestKing.com network contains anExchange Server 2010 Organization. TestKing.com has its headquarters in Stockholm where you arelocated. You are responsible for managing the Exchange network for TestKing.com. The Exchange organization contains two Client Access Servers. You are in the process of deploying aMicrosoft Internet Security and Acceleration (ISA) server. During the course of day you receive aninstruction from the CIO to recommend a high availability solution for the Client Access servers formanagment. Management wants OWA connections to be available in the event of one Client Access Server failing as well as ensuring that the client access services is accessible in a fail on the Client AccessServer. What should you do?()A、You should recommend the deployment of Windows Network Load Balancing.B、You should recommend publishing every Client Access server in a separate publishing rule.C、You should recommend publishing the two Client Access servers in a single publishing rule as a Web server farm.D、You should recommend the deployment of a hardware load balancer.
You use Group Policy to standardize Internet Explorer settings on Windows 7 client computers. Users occasionally change the Internet Explorer settings on individual client computers. The company wants to maintain a standard Internet Explorer configuration on all client computers. You need to ensure that the standard Internet Explorer configuration is in place each time users log on to client computers. What should you do?()A、Enable User Group Policy loopback processing mode.B、Use the Group Policy Update utility to refresh Group Policy.C、Enable Internet Explorer Maintenance Policy Processing in Group Policy.D、Use Group Policy to disable the Advanced tab of the Internet Explorer Properties dialog box.
Companycom wants to use Virtual SCSI disks to boot multiple operating systems from the same disk. How will the volumes appear in the Virtual IO Server and how will the logical volumes appear in the partition?()A、The Virtual SCSI disks are defined as logical volumes in the Virtual IO Server. The logical volumes appear as real devices (hdisks) in the client partitions. B、The Virtual IO adapters are connected to a virtual host bridge. On the Virtual IO Server they are vdisks, on the client partition, the exported disks are visible as virtual disks. C、The Virtual SCSI disks are represented in the ODM as a bus device whose parent is sysplanar0. Logical volumes will be assigned to the Virtual IO Server and virtual disks, vdisks, in the client partition. D、The Virtual IO adapters are represented as adapter devices with the virtual host bridge as their parent. On the Virtual IO Server they are vdisks attached to vscsi, on the client partition the exported disks are visible as virtual disks.
单选题Which of the following is true about Mahmoud Abuqammar?AHe wants to join militant faction after he saw three children killed by an airstrike.BHis ID paper was burned in the war, but he doesn’t want to join militant faction because no faction was helping him.CHe wants to join militant faction now, but really wants to build a family; to live, like any normal person.DHe really wants to build a family, to live, like any normal person, he is not willing to join militant faction.
单选题An administrator wants to install Web SMIT on a node that is not part of a cluster. Which PowerHA filesetprovides this function?()Acluster.sysmgt.wsmBcluster.es.client.wsmCcluster.es.server.websmDcluster.sysmgt.websm.rte
单选题Your company infrastructure includes a Windows Server 2008 R2 file server and 1,000 Windows 7 Enterprise client computers. The company wants to require a secure connection between client computers and the file server. You need to create and deploy a Group Policy object (GPO) that includes a rule for Windows Firewall with Advanced Security. What should you do?()ACreate a Tunnel rule and specify Gateway-to-client as the tunnel type.BCreate a Server-to-server rule and specify the endpoints as Any IP address and the file server IP address.CCreate an Isolation rule and specify Request authentication for inbound and outbound connections.DCreate an Authentication exemption rule and add the file server IP address to the Exempt Computers list.
单选题The company wants to evaluate making all business office users administrators on their client computers. You need to design a method to ensure that this change can be made in a manner that meets business and security requirements. What should you do?()AOn all domain controllers, implement registry access auditing for all registry keys that are considered sensitive by the company’s written security policyBOn all client computers, implement logon auditing for all user account logonsCOn all client computers, configure registry access auditing for all registry keys that are considered sensitive by the company’s written security policyDOn all domain controllers, implement logon auditing for all user account logons
单选题You are the newly appointed system administrator at Certkiller.com. You are in the process ofcreating a Microsoft ASP.NET application using Microsoft .NET Framework v3.5. The new application will make use of eleven themes. Certkiller clients will be permitted to selecttheir themes from the Web page. You need to make sure that the theme selected by a client isdisplayed when the client returns to the application. This should occur even when the client returnsto log on at a later date or from another workstation. You should take cognizance of the fact that the application operates on different storage types andin different environments. Management wants you tp store the themes selected by the clients aswell as retrieving the required theme. What should you do?()AThis can be accomplished using the Response.Cookies collection in order to store the name ofthe theme that is selected by the client.BThis can be accomplished by retrieving the required theme name from the Session object everytime the client visits a page.CThis can be accomplished by retrieving the required theme name every time the client visits apage.DThis can be accomplished by retrieving the required theme name from the Application objectevery time the client visits a page.
单选题A client wants to implement a highly available cluster between two sites. At each site the client has an IBMDS8300. At each site, the client would like a single node which will be connected through a SAN to the local DS8300but not the remote DS8300. Which clustering product could be used to provide high availability for this infrastructure?()APowerHA/XD for GLVMBPowerHA with cross-site LVMCPowerHA/XD for Metro MirrorDPowerHA/XD for Global Mirror
单选题_____AShe doesn’t need his help.BShe doesn’t like the man.CShe wants to work for the man.DShe wants to ask for help.