单选题Company.com needs to add a new file system to an existing volume group that is being made  Highly available by HACMP? What is the best procedure that minimizes down time of the applications?()A Use C-SPOC to add the file system while the cluster is running.B Add the file system,and them perform the exportvg and importvg on the required nodes.C Stop the cluster,add the new file system, and synchronize the cluster then restart HACMP.D Break the reservation locks on the disk drives while the cluster is active and add the file system.

单选题
Company.com needs to add a new file system to an existing volume group that is being made  Highly available by HACMP? What is the best procedure that minimizes down time of the applications?()
A

 Use C-SPOC to add the file system while the cluster is running.

B

 Add the file system,and them perform the exportvg and importvg on the required nodes.

C

 Stop the cluster,add the new file system, and synchronize the cluster then restart HACMP.

D

 Break the reservation locks on the disk drives while the cluster is active and add the file system.


参考解析

解析: 暂无解析

相关考题:

Given that the current directory is empty, and that the user has read and write privileges to the current, and the following:Which statement is true?() A.Compilation fails.B.Nothing is added to the file system.C.Only a new file is created on the file system.D.Only a new directory is created on the file system.E.Both a new file and a new directory are created on the file system.

Given that the current directory is empty, and that the user has read and write permissions, and the following:Which statement is true?() A.Compilation fails.B.The file system has a new empty directory named dir.C.The file system has a new empty directory named newDir.D.The file system has a directory named dir, containing a file f1.txt.E.The file system has a directory named newDir, containing a file f1.txt.

The Internet is an open system,and most information is available to everyone.It is very important to add(74)to existing system for protecting the secret information.A.Web pagesB.modemC.securityD.network

The Internet is an open system, and most information is available to everyone.It is very important to add ______ to existing system for protecting the secret information.A.Web pagesB.modemC.securityD.network

A new VLAN needs to be created for an existing network. Which of the following are the minimum tasks that must be accomplished in order to create the new VLAN?()A、The VLAN must be createdB、The VLAN must be namedC、An IP address and subnet mask must be configured for the new VLAND、The desired ports must be added to the new VLANE、The VLAN must be added to the existing VTP Domain

在J2EE中,下面代码中,()不会编译错误。    A、File f = new File("/","autoexec.bat");B、DataInputStream din = new DataInputStream(new FileInputStream("autoexec.bat"));C、InputStreamReader in = new InputStreamReader(System.in);D、OutputStreamWriter out = new OutputStreamWriter(System.in);

A customer wants to migrate their existing cluster onto new POWER6 hardware, and in addition requires thecluster to be migrated from PowerHA version 5.3 to 5.5. Given that AIX 6.1 and PowerHA 5.5 filesets arealready installed in the new hardware, which of the following methods would allow the customer to maintaintheir current cluster configuration?()A、Add the new nodes to the existing cluster, and perform a rolling migration and remove the original nodesfrom the clusterB、Add the new nodes to the existing cluster, and perform a non-disruptive upgrade and remove the originalnodes from the cluster.C、Create a snapshot of the existing cluster and apply the snapshot to the new cluster. Start cluster serviceson the new cluster and stop the original clusterD、Create a snapshot of the existing cluster and apply the snapshot to the new cluster. Stop cluster serviceson the original cluster and start on the new cluster

A network administrator needs to add an additional connection to a room. The administrator adds a new Ethernet switch and must connect it to an existing switch. Which cable type should be used to connect the two switches?()A、CAT3 cableB、Serial cableC、Crossover cableD、Rollover cable

A customer wants to add a new application to their existing IBM System Storage DS5300. Theyexpect that the new application will require a minimum of 15,000 additional IOPS. What toolshould be used to determine what additional disk is required to effectively add the newapplication?()A、eConfigB、Disk MagicC、Capacity MagicD、Tivoli Storage Productivity Center for Data

A customer has an existing DS5300 system attached to two Brocade switches with eight Windowsservers. The customer wants to add their System i p750 server to this SAN. From the followingchoices what is the simplest and least expensive solution for this customer?()A、add twofibre HBAs to the System i and connect to the SANB、add twofibre HBAs to the System i and connect to the Windows ServersC、add twofibre HBAs to the System i and connect to the System i using VIOSD、add two SAS HBAs to the Systemi array and connect directly to the DS5300

A system administrator has an existing mksysb image, but would like to modify the image.data file on the mksysb before installing it on a system. Which of the following procedures is most appropriate to perform?()A、Create a new image.data file and recreate the mksysb image.B、Use the dd command to replace the image.data file on the mksysb tape.C、Use the tctl command to palce the new image.data file on the mksysb tape.D、Place the new image.data file on a diskette that will be road during the installation of the mksysb.

A new application has been added to a system which needs to automatically be started at system startup. The system administrator has decided to accomplish this by using the /etc/inittab file. Which command would be used to accomplish this in a supported manner?()A、viB、mkitabC、telinitD、startsrc

How does a system administrator add a new user to a system?()A、mkuserB、cruserC、adduserD、edit /etc/password

If the ADD DBPARTITIONNUM command is used to add a new database partition to an existing DB2 instance,which statement is correct? ()A、All existing databases in the instance are expanded to the new database partition but data cannot be stored on the newpartition until it has been added to a partition group.  B、Database partition groups within existing databases will automatically include the new database partition and willredistribute their existing data to the new partition.  C、Any single partition databases within the instance will automatically become multi-partition databases once the newpartition is added to the instance.  D、A database administrator would need to modify the db2nodes.cfg file to complete the addition of the new partition tothe instance.

Company.com is adding a new I/O drawer to an existing p5-570 with four LPARs and wants to re-balance the network cards in the I/O drawers. What is the best way to accomplish this?()A、Add the devices as virtual adapters to a VIO server first,then add the I/O drawer and create the shared ethernet adaptersB、Power down the partitions,run the diag a command when the system is brought back up and reconfigure the network cardsC、Use the rmdev command to remove the devices,shut down the partitions and move the cads,then run the cfgmgr command after rebootD、Detach the network cards,run rmdev on the devices and then dynamically reassign theadapters to the partitions and reconfigure

The file “file.txt” exists on the file system and contsins ASCII text.  Given:   try {   File f = new File(“file.txt”);    OutputStream out = new FileOutputStream(f, true);   }    catch (IOException) {}   What is the result?()A、 The code does not compile.B、 The code runs and no change is made to the file.C、 The code runs and sets the length of the file to 0.D、 An exception is thrown because the file is not closed.E、 The code runs and deletes the file from the file system.

A file system has been corrupted and needs to be restored.  Which file contains the ufsdump levels for this file system? ()A、 /etc/backupB、 /etc/ufsdumpC、 /etc/dumpdatesD、 /etc/fsdumpdates

Your company uses Microsoft Application Virtualization (App-V). You maintain the sequencing for applications. You need to add a template to an existing sequenced application. What should you do?()A、Edit the application, add the template, and then save the application with a new name.B、Sequence the template as a new application to the original application installation folder.C、Restore the sequencing computer and add the template to the original application installation folder.D、Upgrade the existing sequencing package, add the template to the package, and then save the application.

You have recently created and distributed RDP files for a certain RemoteApp program. However,you findthat the application performs poorly and needs to be migrated to a more powerful server. What should youdo to ensure that users can connect to the RemoteApp program after it is migrated?()A、Create a new TS Web Access site for the new terminal server and publish the application to the newsite.B、Re-create an RDP file for the RemoteApp program after the migration and distribute the file to users.C、Modify the properties of the existing RDP file and re-distribute the file to users.D、In TS RemoteApp Manager on the old terminal server, change the Terminal Server settings so that the server name listed is the new terminal server.

You add a Windows Server 2008 R2 server with the Hyper-V role installed to an existing Hyper-V failover cluster.  After you move a virtual machine (VM) to the new cluster node, Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 reports the status of the VM as Unsupported Cluster Configuration. You need to be able to manage the VM by using VMM. What should you do?()A、Disable TCP Chimney Offload on the new cluster nodes network adaptersB、Disable the TCP/IP Offload Engine (TOE) on the new cluster nodes network adapters.C、Move the VM configuration file to a local storage device, and update the pointer to the file.D、Update the virtual networking configuration of the new cluster node to match the virtual networking configuration of the original cluster nodes.

You are developing an application to create a new file on the local file system.You need to define specific security settings for the file. You must deny the file inheritance of any default security settings during creation.What should you do?()A、Create the file by using a new FileStream object by passing the FileSecurity object as a parameter to the FileStream constructor.B、Create a new FileSecurity object.C、Apply the permissions by using the File class.D、Create a new FileSystem Access Rule object for each permission that you need,and add each rule to the FileSecurity object.E、Create a new FileSystem Audit Rule object and add it to the FileSecurity object.

Company.com needs to add a new file system to an existing volume group that is being made  Highly available by HACMP? What is the best procedure that minimizes down time of the applications?()  A、 Use C-SPOC to add the file system while the cluster is running.B、 Add the file system,and them perform the exportvg and importvg on the required nodes.C、 Stop the cluster,add the new file system, and synchronize the cluster then restart HACMP.D、 Break the reservation locks on the disk drives while the cluster is active and add the file system.

单选题A customer has an existing SP system and needs to add cards to some of the nodes.  Which of the following applications must be used to configure the upgrade?()AMRPDPlus toolBInventory ServicesCPCRS6000 Portable ConfiguratorDeConfig - IBM Configurator for e-Business

多选题You are developing an application to create a new file on the local file system.You need to define specific security settings for the file. You must deny the file inheritance of any default security settings during creation.What should you do?()ACreate the file by using a new FileStream object by passing the FileSecurity object as a parameter to the FileStream constructor.BCreate a new FileSecurity object.CApply the permissions by using the File class.DCreate a new FileSystem Access Rule object for each permission that you need,and add each rule to the FileSecurity object.ECreate a new FileSystem Audit Rule object and add it to the FileSecurity object.

单选题A file system has been corrupted and needs to be restored.  Which file contains the ufsdump levels for this file system? ()A /etc/backupB /etc/ufsdumpC /etc/dumpdatesD /etc/fsdumpdates

单选题Company.com needs to add a new file system to an existing volume group that is being made  Highly available by HACMP? What is the best procedure that minimizes down time of the applications?()A Use C-SPOC to add the file system while the cluster is running.B Add the file system,and them perform the exportvg and importvg on the required nodes.C Stop the cluster,add the new file system, and synchronize the cluster then restart HACMP.D Break the reservation locks on the disk drives while the cluster is active and add the file system.

多选题A new VLAN needs to be created for an existing network. Which of the following are the minimum tasks that must be accomplished in order to create the new VLAN?()AThe VLAN must be createdBThe VLAN must be namedCAn IP address and subnet mask must be configured for the new VLANDThe desired ports must be added to the new VLANEThe VLAN must be added to the existing VTP Domain

单选题Given that the current directory is empty, and that the user has read and write privileges to the current directory, and the following: Which statement is true?()A Compilation fails.B Nothing is added to the file system.C Only a new file is created on the file system.D Only a new directory is created on the file system.E Both a new file and a new directory are created on the file system.