LDAP Authentication Module
Smart Assist for Active Directory
C-SPOC for user and password management
File Collections designating one node as the primary authentication node
第1题:
An administrator wants to install Web SMIT on a node that is not part of a cluster. Which PowerHA filesetprovides this function?()
第2题:
An administrator will be performing a PowerHA upgrade on a cluster from version 5.3 to version 5.5. Which ofthe following tasks will verify a successful migration?()
第3题:
An administrator wants to use the online planning worksheets as an aid to configuring a PowerHA cluster.Which PowerHA fileset would the administrator need to install in order to obtain this tool?()
第4题:
Two MAG4610s are running in an active/passive cluster configuration. The system administrator is planning to apply a service package to the cluster.Which process should the administrator follow?()
第5题:
You deploy a Microsoft Exchange mobile messaging solution that uses Microsoft Windows Mobile 5.0 with Microsoft Messaging and Security Feature Pack. The messaging infrastructure is configured to support the remote wipe feature. When an administrator attempts to perform a remote wipe of a Windows Mobilebased device, the administrator receives a 401 error message. You need to ensure that the administrator is authorized to perform remote wipes only. What should you do?()
第6题:
Use Network Load Balancing Manager on the Network Load Balancing default host to add the port rule.
Change the host priority of the second node to be the highest in the cluster, and then use Network Load Balancing Manager to add the port rule.
Run the nlb.exe drain command on each node, and then use Network Load Balancing Manager to add the port rule.
Add the port rule through Network Connections Properties on each node.
第7题:
All cluster resources halt on Node ’B’,and one or both surviving nodes will gracefully acquire the resources.
All cluster processes halt on Node ’B’,the cluster resources remain active,and the remaining nodes take no action.
All cluster processes stay active on Node ’B’,cluster resources are halted,and the remaining nodes take no action.
All cluster resources will stop,cluster processes halt on Node ’B’,and the remaining cluster nodes take no action.
第8题:
clstat
clinfo
cldiag
clverify
第9题:
cluster.sysmgt.wsm
cluster.es.client.wsm
cluster.es.server.websm
cluster.sysmgt.websm.rte
第10题:
identify your Cisco CRS license files and location, enter information about your LDAP, and designate a Cisco CRS administrator
identify CSQs and JTAPI user and designate a Cisco CRS administrator
identify resources and RM user and enter information about your LDAP
identify your Cisco CRS license files and location, enter information about your LDAP, and designate IPCC Express resources
第11题:
cluster.es.haw
cluster.es.worksheets
cluster.es.tools.worksheets
cluster.es.server.worksheets
第12题:
There is a DARE lock in place
A PowerHA migration is in progress
Cluster services is not active on the other node
The other cluster node is running a different version of RSCT
第13题:
An administrator has a 2 node cluster running PowerHA version 5.5. They remove a resource group from theactive cluster configuration. When performing a verify and synchronize of the cluster, the administrator getsthe following error: "migcheck[471]: cl_connect() error, nodename=Node1, rc=-1 cldare: A communication error prevents obtaining the VRMF from remote nodes. A DARE event cannot be run until this is corrected. Please ensureclcomd is running." What is the most likely cause of this error?()
第14题:
An administrator is planning for a six node cluster but is concerned about the administration needed tomanage user accounts throughout the cluster. What PowerHA feature could the administrator use to reducethe administration overhead?()
第15题:
You are an administrator of an active/passive cluster of MAG Series devices running in mixed- mode configuration (IF-MAP server and authenticating users). The active user count is quickly approaching the maximum limit of the cluster. You have been directed to reconfigure the cluster to an active/active cluster and add a new license to increase the total number of active users the cluster can support. What must you do before changing the cluster configuration?()
第16题:
You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain. You administer a Network Load Balancing cluster that consists of three nodes. Each node runs Windows Server 2003 and contains a single network adapter. The Network Load Balancing cluster can run only in unicast mode. The Network Load Balancing cluster has converged successfully. To increase the utilization of the cluster, you decide to move a particular application to each node of the cluster. For this application to run, you must add a Network Load Balancing port rule to the nodes of the cluster. You start Network Load Balancing Manager on the second node of the cluster. However, Network Load Balancing Manager displays a message that it cannot communicate with the other two nodes of the cluster. You want to add the port rule to the nodes of the cluster. What should you do? ()
第17题:
You need to identify potential security threats. Which of the following security breaches might occur under the current IT and security practices?(Choose all that apply)()
第18题:
Individually before each node is upgraded
Individually before and after each node is upgraded
Individually after each node has been upgraded
Collectively after all nodes have been upgraded
第19题:
LDAP Authentication Module
Smart Assist for Active Directory
C-SPOC for user and password management
File Collections designating one node as the primary authentication node
第20题:
Grant the administrator membership in the Domain Administrators group.
Grant the administrator membership in the Exchange Administrators group.
Add the new administrator account to the Discretionary Access Control List (DACL) of the Microsoft Exchange ActiveSync Administration folder.
Select the Directory Security tab of the Exchange Server administration Web site, and then configure Read, Write, and Directory Browsing permissions.
第21题:
Include the service IP address in the administrator’s PS1 prompt
Alias the service IP address to the hostname in the /etc/host file
Define a persistent IP address with HACMP and make it a practice to use the persistent address for administration work
Add a DNS entry to map the standby node name to the service IP address so telnet connections will be to the correct node
第22题:
Perform the upgrade on the active node of the cluster. When completed, the node reboots and then pushes the service package to the passive node automatically.
Perform the upgrade on the passive node of the cluster. When completed, the node reboots and then pushes the service package to the active node automatically.
On the clustering status page, disable the active node. Perform the upgrade on the disabled node. When completed and the node reboots, enable the node on the clustering status page.Repeat the process on the passive node.
On the clustering status page, disable the passive node. Perform the upgrade on the disabled node. When completed and the node reboots, enable the node on the clustering status page.Repeat the process on the active node.
第23题:
A virus that infects an IT administrator’s client computer could gain domain administrator privileges
Couriers could gain access to domain administrator privileges
Business office staff could discover couriers’ passwords and use them to access couriers’ information
All users could use their user accounts to gain the ability to install untested security patches on their client computers
第24题:
Apply the new license to the passive node of the cluster.
Configure an external load balancer to hold the V IP.
Disable the active node in the cluster.
Remove the IF-MAP server configuration.