单选题A database administrator wants a unique IP address for each of three instances of a database. Normally,all instances run on a large production node,but they may fallover to different standby nodes according to the dynamic node priority configuration. What is the best way to obtain unique addresses for each of the three database instances?()A There is no way since this cannot be configured with HACMPB Use IP Replacement address takeover and define all service addresses on the same NICC Use IP Aliasing for address takeover and define each alias in a separate resource groupD Use EtherChannel to map the three alias IP addresses to the common service address defined to HACMP
单选题
A database administrator wants a unique IP address for each of three instances of a database. Normally,all instances run on a large production node,but they may fallover to different standby nodes according to the dynamic node priority configuration. What is the best way to obtain unique addresses for each of the three database instances?()
A
There is no way since this cannot be configured with HACMP
B
Use IP Replacement address takeover and define all service addresses on the same NIC
C
Use IP Aliasing for address takeover and define each alias in a separate resource group
D
Use EtherChannel to map the three alias IP addresses to the common service address defined to HACMP
参考解析
解析:
暂无解析
相关考题:
The Ezonexam network administrator wants to ensure that only a single web server can connect to pot Fa0/1 on a catalyst switch. The server is plugged into the switch's Fast Eth. 0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of this server is allowed by switch port Fa0/1? (Choose two)A.Configure port Fa0/1 to accept connections only from the static IP address of the serverB.Configure the MAC address of the server as a static entry associated with port Fa0/1C.Employ a proprietary connector type on Fa0/1 that is incomputable with other host connectorsD.Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the serverE.Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address
Each machine in the internet is assigned a unique network address,called(),that is used to identify the machine for communication purposesA.MAC addressB.IP addressC.host addressD.domain name address
Each machine in the ineternet is assigned a unique network address, called__(71)__,that is used to identify the machine for communication purposes.A.MAC addressB.IP addressC.host addressD.domain name address
Users have reported that they cannot access certain Internet sites. An administrator wants to test that the sites are properly resolving to an IP address. Which of the following tools would allow the administrator to test name resolution?()A. net viewB. ipconfigC. digD. ifconfig
The administrator wants to verify the current state of the OSPF database loading process. Which show command should the administrator use?() A. show ip ospf [process - id] interfaceB. show ip ospf neighborC. show ip ospf [process - id]D. show ip ospf [process - id area - id] database
In any NAT (network address translation) configuration, what is the Inside Global IP address?() A. The summarized address for all internal subnetted addresses.B. A private IP address assigned to a host on the inside network.C. A registered address that represents an inside host to an outside network.D. A unique IP address used on an internal networkE. Non of the above
Refer to the exhibit. Which three statements correctly describe Network Device A?() A.With a network wide mask of 255.255.255.128, each interface does not require an IP address.B.With a network wide mask of 255.255.255.128, each interface does require an IP address on a unique IP subnet.C.With a network wide mask of 255.255.255.0, must be a Layer 2 device for the PCs to communicate with each other.D.With a network wide mask of 255.255.255.0, must be a Layer 3 device for the PCs to communicate with each other.E.With a network wide mask of 255.255.254.0, each interface does not require an IP address.
Each machine in the internet is assigned a unique network address,called ( ) ,that is used to identify the machine for communication purposes. A.MAC address B.IP address C.host address D.domain name address
Each machine in the internet is assigned a unique network address,called(),that is used to identify the machine for communication purposesA、MAC addressB、IP addressC、host addressD、domain name address
A database administrator wants a unique IP address for each of three instances of a database. Normally,all instances run on a large production node,but they may fallover to different standby nodes according to the dynamic node priority configuration. What is the best way to obtain unique addresses for each of the three database instances?()A、 There is no way since this cannot be configured with HACMPB、 Use IP Replacement address takeover and define all service addresses on the same NICC、 Use IP Aliasing for address takeover and define each alias in a separate resource groupD、 Use EtherChannel to map the three alias IP addresses to the common service address defined to HACMP
An administrator wants to limit how much data each user is storing. Which of the following will BEST address this issue?()A、 QuotasB、 SNMPC、 Disk managementD、 ACL
In any NAT (network address translation) configuration, what is the Inside Global IP address?()A、The summarized address for all internal subnetted addresses.B、A private IP address assigned to a host on the inside network.C、A registered address that represents an inside host to an outside network.D、A unique IP address used on an internal networkE、Non of the above
Users have reported that they cannot access certain Internet sites. An administrator wants to test that the sites are properly resolving to an IP address. Which of the following tools would allow the administrator to test name resolution?()A、 net viewB、 ipconfigC、 digD、 ifconfig
In a cluster using /etc/hosts for name resolution, which of the following describes the minimum requirementsfor the /etc/hosts file?()A、IP address and IP label of each service and boot interface in the clusterB、IP address and IP label of each service and boot interface in the cluster, loopback interface, and the hostname of the nodeC、IP address and IP label of each service and boot interface in the cluster, the loopbackinterface, and the cluster gatewayD、IP address and IP label of each service and boot interface in the cluster, the loopbackinterface, the cluster gateway, and the subnet network addresses
ompany.com has recently received a new p5-570 in the data center and wants to connect it to an existing HMC environment where each of the existing POWER5 servers has been assigned a static IP address. Which of the following actions should the technical specialist perform to set the service processor network address for a static IP?()A、Configure the IP address through the first client partition.B、Configure the IP address through the ASMI menus.C、Configure the POWER5 service processor for DHCP from the HMC DHCP server.D、Configure the HMC to use the default IP address on the service processor when acquiring the managed server.
Cer-tech .com has a server that runs Windows Server 2008. You have installed the Web Server (IIS) roleon it. Cer-tech plans to host multiple websites on the server. To achieve this you configure a single IPaddress on the server. You also configure all websites to be registered in DNS to point to the single IP address configured on the server. You have to make sure that each and every website responds only to thename requests from all client machines. What should you do to achieve this task?()A、Configure the primary and secondary DNS to point to the server’s IP addressB、Configure a network address for each websiteC、Assign a unique port for each websiteD、Configure and assign a unique Host Header to each website
You have an Exchange Server 2010 organization that contains 20 Mailbox servers.You plan to create 10 mailbox databases on each Mailbox server. You need to create a naming convention for all mailbox databases. What should you include in your naming convention()? A、For each mailbox database, provide a database name that is unique within the organization.B、For each mailbox database, provide a database name that is unique within the Mailbox server.C、For each mailbox database file, provide a file name that is unique within the organization.D、For each mailbox database file, provide a file name that is unique within the Mailbox server.
You have a server that runs Windows Server 2008. The Web Server (IIS) role is installed. You plan to host multiple Web sites on the server. You configure a single IP address for the server. All Web sites are registered in DNS to point to the single IP address. You need to ensure that each Web site only responds to requests by name from all client computers. What should you do?()A、Configue a unique port for each Web site.B、Configue a unique IP address for each Web site.C、Configue a unique Host Header for each Web site.D、Edit the Hosts file on the server to add all the Web site names associated to the network address.
单选题You are developing a Windows Communication Foundation (WCF) service that must be discoverable.You need to ensure that the ServiceHost instance supports multiple discovery versions. What should you do?()A- Specify a unique DiscoveryVersion parameter for each endpoint constructor. - Use the same value for the Address property of each endpoint.B- Use the endpoint constructor without the DiscoveryVersion parameter. - Use a unique value for the Address property of each endpoint.C- Specify a unique DiscoveryVersion parameter for each endpoint constructor. - Use a unique value for the Address property of each endpoint.D- Use the endpoint constructor without the DiscoveryVersion parameter. - Use the same value for the Address property of each endpoint.
单选题Users have reported that they cannot access certain Internet sites. An administrator wants to test that the sites are properly resolving to an IP address. Which of the following tools would allow the administrator to test name resolution?()A net viewB ipconfigC digD ifconfig
多选题Refer to the exhibit. Which three statements correctly describe Network Device A?()AWith a network wide mask of 255.255.255.128, each interface does not require an IP address.BWith a network wide mask of 255.255.255.128, each interface does require an IP address on a unique IP subnet.CWith a network wide mask of 255.255.255.0, must be a Layer 2 device for the PCs to communicate with each other.DWith a network wide mask of 255.255.255.0, must be a Layer 3 device for the PCs to communicate with each other.EWith a network wide mask of 255.255.254.0, each interface does not require an IP address.
单选题The administrator wants to verify the current state of the OSPF database loading process. Which show command should the administrator use?()Ashow ip ospf [process - id] interfaceBshow ip ospf neighborCshow ip ospf [process - id]Dshow ip ospf [process - id area - id] database
单选题You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.During the course of the business week you receive instruction from Company.com to start planning the creation of ten mailbox databases on twenty Mailbox servers whilst ensuring that you create a naming convention for all Mailbox databases. What should you do?()AYou should consider having a file name that is unique within the organization provided for each mailbox database file.BYou should consider having a file name that is unique within the Mailbox server provided for each mailbox database file.CYou should consider having a database name that is unique within the organization provided for each mailbox database file.DYou should consider having a database name that is unique within the Mailbox server provided for each mailbox database file.
单选题In any NAT (network address translation) configuration, what is the Inside Global IP address?()AThe summarized address for all internal subnetted addresses.BA private IP address assigned to a host on the inside network.CA registered address that represents an inside host to an outside network.DA unique IP address used on an internal networkENon of the above
单选题In a cluster using /etc/hosts for name resolution, which of the following describes the minimum requirementsfor the /etc/hosts file?()AIP address and IP label of each service and boot interface in the clusterBIP address and IP label of each service and boot interface in the cluster, loopback interface, and the hostname of the nodeCIP address and IP label of each service and boot interface in the cluster, the loopbackinterface, and the cluster gatewayDIP address and IP label of each service and boot interface in the cluster, the loopbackinterface, the cluster gateway, and the subnet network addresses
单选题You have an Exchange Server 2010 organization that contains 20 Mailbox servers.You plan to create 10 mailbox databases on each Mailbox server. You need to create a naming convention for all mailbox databases. What should you include in your naming convention()?AFor each mailbox database, provide a database name that is unique within the organization.BFor each mailbox database, provide a database name that is unique within the Mailbox server.CFor each mailbox database file, provide a file name that is unique within the organization.DFor each mailbox database file, provide a file name that is unique within the Mailbox server.
单选题An administrator wants to limit how much data each user is storing. Which of the following will BEST address this issue?()A QuotasB SNMPC Disk managementD ACL