单选题You are creating a cluster. The tables in the cluster have a relatively uniform distribution of values in the index column and the queries against the clustered table will almost use an equality operator to retrieve the desired row. Which type of cluster will you create?()A Index clusterB Hash clusterC Sorted Hash clusterD Real Application Cluster

单选题
You are creating a cluster. The tables in the cluster have a relatively uniform distribution of values in the index column and the queries against the clustered table will almost use an equality operator to retrieve the desired row. Which type of cluster will you create?()
A

 Index cluster

B

 Hash cluster

C

 Sorted Hash cluster

D

 Real Application Cluster


参考解析

解析: 暂无解析

相关考题:

In which three cases would you use the USING clause?()A、You want to create a nonequijoin.B、The tables to be joined have multiple NULL columns.C、The tables to be joined have columns of the same name and different data types.D、The tables to be joined have columns with the same name and compatible data types.E、You want to use a NATURAL join, but you want to restrict the number of columns in the join condition.

What are two reasons to create synonyms?()A、You have too many tables.B、Your tables are too long.C、Your tables have difficult names.D、You want to work on your own tables.E、You want to use another schema's tables.F、You have too many columns in your tables.

You have been tasked with installing two SRX 5600 platforms in a high-availability cluster. Which requirement must be met for a successful installation?()A、You must enable SPC detect within the configuration.B、You must enable active-active failover for redundancy.C、You must ensure all SPCs use the same slot placement.D、You must configure auto-negotiation on the control ports of both devices

During an HACMP migration,two nodes of a four-node cluster have been migrated. The existing hardware of the remaining two nodes do not meet the pre-requisites of the HACMP level that is being installed.  Which of the following is the best method for resolving this issue?()A、 Upgrade the unsupported hardware and continue with the migration.B、 Restore the two nodes that have been migrated with a cluster snapshot.C、 Restore the two nodes that have not been migrated with a cluster snapshot.D、 Synchronize the cluster to allow the nodes that didn’t migrate to join the cluster.

You are creating a cluster. The tables in the cluster have a relatively uniform distribution of values in the index column and the queries against the clustered table will almost use an equality operator to retrieve the desired row. Which type of cluster will you create?()A、 Index clusterB、 Hash clusterC、 Sorted Hash clusterD、 Real Application Cluster

You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain.   You administer a Network Load Balancing cluster that consists of three nodes. Each node runs Windows Server 2003 and contains a single network adapter. The Network Load Balancing cluster can run only in unicast mode. The Network Load Balancing cluster has converged successfully.   To increase the utilization of the cluster, you decide to move a particular application to each node of the cluster. For this application to run, you must add a Network Load Balancing port rule to the nodes of the cluster.   You start Network Load Balancing Manager on the second node of the cluster. However, Network Load Balancing Manager displays a message that it cannot communicate with the other two nodes of the cluster.  You want to add the port rule to the nodes of the cluster.   What should you do?  ()A、 Use Network Load Balancing Manager on the Network Load Balancing default host to add the port rule.B、 Change the host priority of the second node to be the highest in the cluster, and then use Network Load Balancing Manager to add the port rule.C、 Run the nlb.exe drain command on each node, and then use Network Load Balancing Manager to add the port rule.D、 Add the port rule through Network Connections Properties on each node.

You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. On two cluster-ready nodes, you intend to perform an installation of a SQL Server 2008 mission-critical cluster. Constant availability is needed by the mission-critical cluster. You have to configure the SQL Server cluster to failover and reduce the service disruption to the least. Which failover option should you use?()  A、You should allow failback only during non-business hours B、You should immediately allow failbackC、You should prevent automatic failback D、You should allow failback only during business hours

Your environment includes a Windows Server 2008 R2 Hyper-V failover cluster. You manage the virtual environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2.  You plan to perform maintenance on the Hyper-V failover cluster. You need to complete the maintenance on the failover cluster while maximizing the uptime of the virtual machines (VMs).  What should you do prior to starting maintenance on each cluster node?()A、Use Failover Cluster Manager to pause the cluster nodeB、Use Failover Cluster Manager to perform a quick migration of all VMs to another cluster nodeC、Use VMM to place the cluster node in maintenance modeD、Use VMM to pause all VMs and move them to another cluster node

You host 16 virtual machines that are distributed evenly across an 8-node Windows Server 2008 R2 Hyper-V failover cluster. You plan to perform live migrations of the VMs to prepare for the installation of software updates on the cluster. You need to perform the maximum number of simultaneous live migrations. How many live migrations should you perform simultaneously?()A、oneB、twoC、fourD、eight

You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain.   You administer a four-node Network Load Balancing cluster. All nodes run Windows Server 2003. The cluster has converged successfully. You use Network Load Balancing Manager on the default host to configure all nodes of the cluster.   The nodes have a single network adapter and are connected to the same switching hub device.   Administrators of non-cluster servers that are connected to the same switching hub device report that their servers receive traffic that is destined for the cluster nodes. Receiving this additional network traffic impairs the network performance of the non-cluster servers.   You need to ensure that traffic destined for only the cluster nodes is not sent to all ports of the switching hub device.  You do not want to move the cluster to another switching hub device.   What should you do? ()A、 On one node, run the nlb.exe reload command.B、 On each node, run the wlbs.exe drainstop command.C、 Use Network Load Balancing Manager to enable Internet Group Management Protocol (IGMP) support on the cluster.D、 Use Network Load Balancing Manager to add a second cluster IP address.

You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain.   You administer a three-node Network Load Balancing cluster. Each cluster node runs Windows Server 2003 and has a single network adapter. The cluster has converged successfully.   You notice that the nodes in the cluster run at almost full capacity most of the time. You want to add a fourth node to the cluster. You enable and configure Network Load Balancing on the fourth node.   However, the cluster does not converge to a four-node cluster. In the System log on the existing three nodes, you find the exact same TCP/IP error event. The event has the following description: "The system detected an address conflict for IP address 10.50.8.70 with the system having network hardware address 02:BF://0A:32:08:46."   In the System log on the new fourth node, you find a similar TCP/error event with the following description: "The system detected an address conflict for IP address 10.50.8.70 with the system having network hardware address 03:BF://0A:32:08:46." Only the hardware address is different in the two descriptions.  You verify that IP address 10.50.8.70 is configured as the cluster IP address on all four nodes.  You want to configure a four-node Network Load Balancing cluster.   What should you do?  ()A、 Configure the fourth node to use multicast mode.B、 Remove 10.50.8.70 from the Network Connections Properties of the fourth node.C、 On the fourth node, run the nlb.exe resume command.D、 On the fourth node, run the wlbs.exe reload command.

You have a Windows Server 2008 R2 Hyper-V failover cluster.  You manage the virtual environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You need to find out whether the failover cluster is properly configured to support highly available virtual machines (VMs).  Which PowerShell cmdlet should you run?()A、Test-ClusterB、Enable-VMHostC、Get-VMHostRatingD、Test-ClusterResourceFailure

You work as the Exchange administrator at Company.com.The Company.com network contains an Exchange Server 2010 Organization.The organization contains the subsequent servers: the Company.com organization contains one mailbox database as well as one public folder database.You receive an instruction from the cio to ensure that in the event of -ex03 failure the public folders will remain available.What should you do?()A、You should consider creating a database availability group (DAG). Thereafter -ex03 and mbx2 should be added to the dag.B、You should consider creating a public folder database on -ex04.Thereafter the replication settings should be changed on every public folder.C、You should consider creating a public folder database on -ex04.Thereafter the replication settings should be changed on the public folder database.D、You should consider creating a Failover Cluster.Thereafter -ex03 and -ex04 should be added to the failover cluster.

You are configuring a failover cluster for a database server. You are assigning four nodes to the cluster. Allnodes have access to a SAN,and adequate storage is available. Which of the following options should youchoose for your quorum configuration?()A、Node MajorityB、Node And Disk MajorityC、Node And File Share MajorityD、No Majority: Disk Only

You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 cluster. According to the company requirement, the failover response of the cluster has to be tested. The company assigns this task to you. On the cluster, you have to implement a manual failover.  What should you do? () A、The contents of a shared folder on the active node should be encrypted by using Encrypting File System (EFS) B、You should restore a backup to the active node C、You should get rid of the shared array from the active node D、From the active node, you have to uplug the network cable(s)

单选题During an HACMP migration,two nodes of a four-node cluster have been migrated. The existing hardware of the remaining two nodes do not meet the pre-requisites of the HACMP level that is being installed.  Which of the following is the best method for resolving this issue?()A Upgrade the unsupported hardware and continue with the migration.B Restore the two nodes that have been migrated with a cluster snapshot.C Restore the two nodes that have not been migrated with a cluster snapshot.D Synchronize the cluster to allow the nodes that didn’t migrate to join the cluster.

单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now in a high security environment, you manage a SQL Server 2008 cluster. You intend to configure and use encrypted connections for the clustered virtual SQL Server. You have to install a certificate. The cetification will be used for encryption. What should you do?()AIn the cluster quorum drive, install the encryption certificate BIn the SQL Server shared disk, install the encryption certificate Cin the cluster group, install the encryption certificate. DOn each individual node, install the encryption certificate

单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. On two cluster-ready nodes, you intend to perform an installation of a SQL Server 2008 mission-critical cluster. Constant availability is needed by the mission-critical cluster. You have to configure the SQL Server cluster to failover and reduce the service disruption to the least. Which failover option should you use?()AYou should allow failback only during non-business hours BYou should immediately allow failbackCYou should prevent automatic failback DYou should allow failback only during business hours

单选题You are an administrator of an active/passive cluster of MAG Series devices running in mixed- mode configuration (IF-MAP server and authenticating users). The active user count is quickly approaching the maximum limit of the cluster. You have been directed to reconfigure the cluster to an active/active cluster and add a new license to increase the total number of active users the cluster can support. What must you do before changing the cluster configuration?()AApply the new license to the passive node of the cluster.BConfigure an external load balancer to hold the V IP.CDisable the active node in the cluster.DRemove the IF-MAP server configuration.

多选题Certkiller .com boosts a two-node Network Load Balancing cluster which is called web. CK1 .com. The purpose of this cluster is to provide load balancing and high availability of the intranet website only. With monitoring the cluster, you discover that the users can view the Network Load Balancing cluster in their Network Neighborhood and they can use it to connect to various services by using the name web. CK1 .com.  You also discover that there is only one port rule configured for Network Load Balancing cluster.  You have to configure web. CK1 .com NLB cluster to accept HTTP traffic only.  Which two actions should you perform to achieve this objective()ACreate a new rule for TCP port 80 by using the Network Load Balancing Cluster consoleBRun the wlbs disable command on the cluster nodesCAssign a unique port rule for NLB cluster by using the NLB Cluster consoleDDelete the default port rules through Network Load Balancing Cluster console

单选题You need to design the Exchange 2003 server configuration for remote e-mail access. What should you do?()AConfigure the front-end servers in each branch office to be members of a new Active Directory siteBConfigure the back-end servers to have server encryption certificates issued by a commercial certification authority (CA)CConfigure two back-end servers to be members of a Network Load Balancing cluster. Configure Network Load Balancing for inbound RPC connectionsDConfigure multiple front-end servers in each branch office to be members of a Network Load Balancing cluster. Configure Network Load Balancing for inbound HTTPS connections

单选题You are configuring a failover cluster for a database server. You are assigning four nodes to the cluster. Allnodes have access to a SAN,and adequate storage is available. Which of the following options should youchoose for your quorum configuration?()ANode MajorityBNode And Disk MajorityCNode And File Share MajorityDNo Majority: Disk Only

单选题Your network includes 40 servers that run Windows Server 2008 R2. You plan to virtualize the servers by using Hyper-V in a failover cluster.  Your plan must allow for up to two offline host servers while still maintaining highly available virtual machines. You need to recommend the minimum number of Hyper-V host servers for the cluster.  How many servers should you recommend?()AthreeBfourCfiveDsix

单选题Your environment includes a Windows Server 2008 R2 Hyper-V failover cluster. You manage the virtual environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You plan to perform maintenance on the Hyper-V failover cluster. You need to complete the maintenance on the failover cluster while maximizing the uptime of the virtual machines (VMs). What should you do prior to starting maintenance on each cluster node?()AUse Failover Cluster Manager to perform a quick migration of all VMs to another cluster nodeBUse Failover Cluster Manager to pause the cluster nodeCUse VMM to place the cluster node in maintenance modeDUse VMM to pause all VMs and move them to another cluster node

单选题What does the FORCE option for creating a view do?()Acreates a view with constraintsBcreates a view even if the underlying parent table has constraintsCcreates a view in another schema even if you don't have privilegesDcreates a view regardless of whether or not the base tables exist

单选题You work as the Exchange administrator at Company.com.The Company.com network contains an Exchange Server 2010 Organization.The organization contains the subsequent servers: the Company.com organization contains one mailbox database as well as one public folder database.You receive an instruction from the cio to ensure that in the event of -ex03 failure the public folders will remain available.What should you do?()AYou should consider creating a database availability group (DAG). Thereafter -ex03 and mbx2 should be added to the dag.BYou should consider creating a public folder database on -ex04.Thereafter the replication settings should be changed on every public folder.CYou should consider creating a public folder database on -ex04.Thereafter the replication settings should be changed on the public folder database.DYou should consider creating a Failover Cluster.Thereafter -ex03 and -ex04 should be added to the failover cluster.

多选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 cluster. According to the company requirement, the failover response of the cluster has to be tested. The company assigns this task to you. On the cluster, you have to implement a manual failover.  What should you do? ()AThe contents of a shared folder on the active node should be encrypted by using Encrypting File System (EFS)BYou should restore a backup to the active nodeCYou should get rid of the shared array from the active nodeDFrom the active node, you have to uplug the network cable(s)