单选题An administrator is planning for a six node cluster but is concerned about the administration needed tomanage user accounts throughout the cluster. What PowerHA feature could the administrator use to reducethe administration overhead?()A LDAP Authentic

题目
单选题
An administrator is planning for a six node cluster but is concerned about the administration needed tomanage user accounts throughout the cluster. What PowerHA feature could the administrator use to reducethe administration overhead?()
A

LDAP Authentication Module

B

Smart Assist for Active Directory

C

C-SPOC for user and password management

D

File Collections designating one node as the primary authentication node


相似考题
更多“单选题An administrator is planning for a six node cluster but is concerned about the administration needed tomanage user accounts throughout the cluster. What PowerHA feature could the administrator use to reducethe administration overhead?()A LDAP Authentic”相关问题
  • 第1题:

    An administrator wants to install Web SMIT on a node that is not part of a cluster. Which PowerHA filesetprovides this function?()

    • A、cluster.sysmgt.wsm
    • B、cluster.es.client.wsm
    • C、cluster.es.server.websm
    • D、cluster.sysmgt.websm.rte

    正确答案:B

  • 第2题:

    An administrator will be performing a PowerHA upgrade on a cluster from version 5.3 to version 5.5. Which ofthe following tasks will verify a successful migration?()

    • A、Use the clstat command and verify the cluster is in a stable state
    • B、After each node is upgraded, run a verification and synchronization
    • C、After all nodes are upgraded, run a verification and synchronization
    • D、Take a snapshot of each node and verify the configuration is the same

    正确答案:C

  • 第3题:

    An administrator wants to use the online planning worksheets as an aid to configuring a PowerHA cluster.Which PowerHA fileset would the administrator need to install in order to obtain this tool?()

    • A、cluster.es.haw
    • B、cluster.es.worksheets
    • C、cluster.es.tools.worksheets
    • D、cluster.es.server.worksheets

    正确答案:B

  • 第4题:

    Two MAG4610s are running in an active/passive cluster configuration. The system administrator is planning to apply a service package to the cluster.Which process should the administrator follow?()

    • A、Perform the upgrade on the active node of the cluster. When completed, the node reboots and then pushes the service package to the passive node automatically.
    • B、Perform the upgrade on the passive node of the cluster. When completed, the node reboots and then pushes the service package to the active node automatically.
    • C、On the clustering status page, disable the active node. Perform the upgrade on the disabled node. When completed and the node reboots, enable the node on the clustering status page.Repeat the process on the passive node.
    • D、On the clustering status page, disable the passive node. Perform the upgrade on the disabled node. When completed and the node reboots, enable the node on the clustering status page.Repeat the process on the active node.

    正确答案:A

  • 第5题:

    You deploy a Microsoft Exchange mobile messaging solution that uses Microsoft Windows Mobile 5.0 with Microsoft Messaging and Security Feature Pack.   The messaging infrastructure is configured to support the remote wipe feature.   When an administrator attempts to perform a remote wipe of a Windows Mobilebased device, the administrator receives a 401 error message.   You need to ensure that the administrator is authorized to perform remote wipes only.   What should you do?()

    • A、Grant the administrator membership in the Domain Administrators group.
    • B、Grant the administrator membership in the Exchange Administrators group.
    • C、Add the new administrator account to the Discretionary Access Control List (DACL) of the Microsoft Exchange ActiveSync Administration folder.
    • D、Select the Directory Security tab of the Exchange Server administration Web site, and then configure Read, Write, and Directory Browsing permissions.

    正确答案:C

  • 第6题:

    单选题
    You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain.   You administer a Network Load Balancing cluster that consists of three nodes. Each node runs Windows Server 2003 and contains a single network adapter. The Network Load Balancing cluster can run only in unicast mode. The Network Load Balancing cluster has converged successfully.   To increase the utilization of the cluster, you decide to move a particular application to each node of the cluster. For this application to run, you must add a Network Load Balancing port rule to the nodes of the cluster.   You start Network Load Balancing Manager on the second node of the cluster. However, Network Load Balancing Manager displays a message that it cannot communicate with the other two nodes of the cluster.  You want to add the port rule to the nodes of the cluster.   What should you do?  ()
    A

     Use Network Load Balancing Manager on the Network Load Balancing default host to add the port rule.

    B

     Change the host priority of the second node to be the highest in the cluster, and then use Network Load Balancing Manager to add the port rule.

    C

     Run the nlb.exe drain command on each node, and then use Network Load Balancing Manager to add the port rule.

    D

     Add the port rule through Network Connections Properties on each node.


    正确答案: C
    解析: 暂无解析

  • 第7题:

    单选题
    During a cluster functionality test, and administrator performs a graceful stop for Node ’B’ in a three-node cluster. What is the expected state of the cluster after Node ’B’successfully completes?()
    A

     All cluster resources halt on Node ’B’,and one or both surviving nodes will gracefully acquire the resources.

    B

     All cluster processes halt on Node ’B’,the cluster resources remain active,and the remaining  nodes take no action.

    C

     All cluster processes stay active on Node ’B’,cluster resources are halted,and the remaining nodes take no action.

    D

     All cluster resources will stop,cluster processes halt on Node ’B’,and the remaining cluster nodes take no action.


    正确答案: A
    解析: 暂无解析

  • 第8题:

    单选题
    Node ’C’ has just completed reintegration in a three-node cluster. The hacmp.out logifle displays  The event node_up_complete for Node ’C’. The cluster administrator wishes to verify that the cluster is stable.  In addition to reviewing the cluster log files,what utility should be run to verify the cluster state?()
    A

     clstat

    B

     clinfo

    C

     cldiag

    D

     clverify


    正确答案: B
    解析: 暂无解析

  • 第9题:

    单选题
    An administrator wants to install Web SMIT on a node that is not part of a cluster. Which PowerHA filesetprovides this function?()
    A

    cluster.sysmgt.wsm

    B

    cluster.es.client.wsm

    C

    cluster.es.server.websm

    D

    cluster.sysmgt.websm.rte


    正确答案: B
    解析: 暂无解析

  • 第10题:

    单选题
    When you access the Cisco CRS Administration page for the first time in a cluster, the system automatically initiates the cluster setup procedure. You perform this procedure one time for a cluster. Whatdo you accomplish in this procedure?()
    A

    identify your Cisco CRS license files and location, enter information about your LDAP, and designate a Cisco CRS administrator 

    B

    identify CSQs and JTAPI user and designate a Cisco CRS administrator 

    C

    identify resources and RM user and enter information about your LDAP 

    D

    identify your Cisco CRS license files and location, enter information about your LDAP, and designate IPCC Express resources 


    正确答案: B
    解析: 暂无解析

  • 第11题:

    单选题
    An administrator wants to use the online planning worksheets as an aid to configuring a PowerHA cluster.Which PowerHA fileset would the administrator need to install in order to obtain this tool?()
    A

    cluster.es.haw

    B

    cluster.es.worksheets

    C

    cluster.es.tools.worksheets

    D

    cluster.es.server.worksheets


    正确答案: D
    解析: 暂无解析

  • 第12题:

    单选题
    An administrator has a 2 node cluster running PowerHA version 5.5. They remove a resource group from theactive cluster configuration. When performing a verify and synchronize of the cluster, the administrator getsthe following error: "migcheck[471]: cl_connect() error, nodename=Node1, rc=-1 cldare: A communication error prevents obtaining the VRMF from remote nodes. A DARE event cannot be run until this is corrected. Please ensureclcomd is running." What is the most likely cause of this error?()
    A

    There is a DARE lock in place

    B

    A PowerHA migration is in progress

    C

    Cluster services is not active on the other node

    D

    The other cluster node is running a different version of RSCT


    正确答案: A
    解析: 暂无解析

  • 第13题:

    An administrator has a 2 node cluster running PowerHA version 5.5. They remove a resource group from theactive cluster configuration. When performing a verify and synchronize of the cluster, the administrator getsthe following error: "migcheck[471]: cl_connect() error, nodename=Node1, rc=-1 cldare: A communication error prevents obtaining the VRMF from remote nodes. A DARE event cannot be run until this is corrected. Please ensureclcomd is running." What is the most likely cause of this error?()

    • A、There is a DARE lock in place
    • B、A PowerHA migration is in progress
    • C、Cluster services is not active on the other node
    • D、The other cluster node is running a different version of RSCT

    正确答案:C

  • 第14题:

    An administrator is planning for a six node cluster but is concerned about the administration needed tomanage user accounts throughout the cluster. What PowerHA feature could the administrator use to reducethe administration overhead?()

    • A、LDAP Authentication Module
    • B、Smart Assist for Active Directory
    • C、C-SPOC for user and password management
    • D、File Collections designating one node as the primary authentication node

    正确答案:C

  • 第15题:

    You are an administrator of an active/passive cluster of MAG Series devices running in mixed- mode configuration (IF-MAP server and authenticating users). The active user count is quickly approaching the maximum limit of the cluster. You have been directed to reconfigure the cluster to an active/active cluster and add a new license to increase the total number of active users the cluster can support. What must you do before changing the cluster configuration?()

    • A、Apply the new license to the passive node of the cluster.
    • B、Configure an external load balancer to hold the V IP.
    • C、Disable the active node in the cluster.
    • D、Remove the IF-MAP server configuration.

    正确答案:D

  • 第16题:

    You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain.   You administer a Network Load Balancing cluster that consists of three nodes. Each node runs Windows Server 2003 and contains a single network adapter. The Network Load Balancing cluster can run only in unicast mode. The Network Load Balancing cluster has converged successfully.   To increase the utilization of the cluster, you decide to move a particular application to each node of the cluster. For this application to run, you must add a Network Load Balancing port rule to the nodes of the cluster.   You start Network Load Balancing Manager on the second node of the cluster. However, Network Load Balancing Manager displays a message that it cannot communicate with the other two nodes of the cluster.  You want to add the port rule to the nodes of the cluster.   What should you do?  ()

    • A、 Use Network Load Balancing Manager on the Network Load Balancing default host to add the port rule.
    • B、 Change the host priority of the second node to be the highest in the cluster, and then use Network Load Balancing Manager to add the port rule.
    • C、 Run the nlb.exe drain command on each node, and then use Network Load Balancing Manager to add the port rule.
    • D、 Add the port rule through Network Connections Properties on each node.

    正确答案:D

  • 第17题:

    You need to identify potential security threats. Which of the following security breaches might occur under the current IT and security practices?(Choose all that apply)()

    • A、A virus that infects an IT administrator’s client computer could gain domain administrator privileges
    • B、Couriers could gain access to domain administrator privileges
    • C、Business office staff could discover couriers’ passwords and use them to access couriers’ information
    • D、All users could use their user accounts to gain the ability to install untested security patches on their client computers

    正确答案:A

  • 第18题:

    单选题
    An administrator plans to apply a fix pack to the PowerHA software using a rolling migration. At what stage ofthe migration is a cluster verification supported?()
    A

    Individually before each node is upgraded

    B

    Individually before and after each node is upgraded

    C

    Individually after each node has been upgraded

    D

    Collectively after all nodes have been upgraded


    正确答案: B
    解析: 暂无解析

  • 第19题:

    单选题
    An administrator is planning for a six node cluster but is concerned about the administration needed tomanage user accounts throughout the cluster. What PowerHA feature could the administrator use to reducethe administration overhead?()
    A

    LDAP Authentication Module

    B

    Smart Assist for Active Directory

    C

    C-SPOC for user and password management

    D

    File Collections designating one node as the primary authentication node


    正确答案: B
    解析: 暂无解析

  • 第20题:

    单选题
    You deploy a Microsoft Exchange mobile messaging solution that uses Microsoft Windows Mobile 5.0 with Microsoft Messaging and Security Feature Pack.   The messaging infrastructure is configured to support the remote wipe feature.   When an administrator attempts to perform a remote wipe of a Windows Mobilebased device, the administrator receives a 401 error message.   You need to ensure that the administrator is authorized to perform remote wipes only.   What should you do?()
    A

    Grant the administrator membership in the Domain Administrators group.

    B

    Grant the administrator membership in the Exchange Administrators group.

    C

    Add the new administrator account to the Discretionary Access Control List (DACL) of the Microsoft Exchange ActiveSync Administration folder.

    D

    Select the Directory Security tab of the Exchange Server administration Web site, and then configure Read, Write, and Directory Browsing permissions.


    正确答案: D
    解析: 暂无解析

  • 第21题:

    单选题
    An administrator mistakenly shutdown production after a fallover because the service IP address  Was shifted from the normal production node to the standby node.  What can be done to avoid this type of mistake in the future?()
    A

     Include the service IP address in the administrator’s PS1 prompt

    B

     Alias the service IP address to the hostname in the /etc/host file

    C

     Define a persistent IP address with HACMP and make it a practice to use the persistent address for administration work

    D

     Add a DNS entry to map the standby node name to the service IP address so telnet connections will be to the correct node


    正确答案: D
    解析: 暂无解析

  • 第22题:

    单选题
    Two MAG4610s are running in an active/passive cluster configuration. The system administrator is planning to apply a service package to the cluster.Which process should the administrator follow?()
    A

    Perform the upgrade on the active node of the cluster. When completed, the node reboots and then pushes the service package to the passive node automatically.

    B

    Perform the upgrade on the passive node of the cluster. When completed, the node reboots and then pushes the service package to the active node automatically.

    C

    On the clustering status page, disable the active node. Perform the upgrade on the disabled node. When completed and the node reboots, enable the node on the clustering status page.Repeat the process on the passive node.

    D

    On the clustering status page, disable the passive node. Perform the upgrade on the disabled node. When completed and the node reboots, enable the node on the clustering status page.Repeat the process on the active node.


    正确答案: A
    解析: 暂无解析

  • 第23题:

    单选题
    You need to identify potential security threats. Which of the following security breaches might occur under the current IT and security practices?(Choose all that apply)()
    A

    A virus that infects an IT administrator’s client computer could gain domain administrator privileges

    B

    Couriers could gain access to domain administrator privileges

    C

    Business office staff could discover couriers’ passwords and use them to access couriers’ information

    D

    All users could use their user accounts to gain the ability to install untested security patches on their client computers


    正确答案: D
    解析: 暂无解析

  • 第24题:

    单选题
    You are an administrator of an active/passive cluster of MAG Series devices running in mixed- mode configuration (IF-MAP server and authenticating users). The active user count is quickly approaching the maximum limit of the cluster. You have been directed to reconfigure the cluster to an active/active cluster and add a new license to increase the total number of active users the cluster can support. What must you do before changing the cluster configuration?()
    A

    Apply the new license to the passive node of the cluster.

    B

    Configure an external load balancer to hold the V IP.

    C

    Disable the active node in the cluster.

    D

    Remove the IF-MAP server configuration.


    正确答案: B
    解析: 暂无解析