单项选择题
Which of the following options are valid choices for cluster communication security?()
A.rsh and ssh
B.Standard and VPN
C.rhost and .shosts
D.Classic and Enhanced
相关考题
-
单项选择题
A customer synchronizes the cluster in a virtualized environment. During the process the following warning isdisplayed: "For nodes with a single Network Interface Card per logical network configured, it is recommended to includethe file ’/usr/es/sbin/cluster/netmon.cf’ with a pingable IP address as described in the PowerHA PlanningGuide". What should the customer do next?()
A.Ignore the warning as synchronization completed successfully.
B.Populate the /usr/es/sbin/cluster/netmon.cf file with one or many IP addresses external to the cluster.
C.Create another virtual adapter on each node and set-up PowerHA networking in a more traditional fashion
D.Populate the /usr/es/sbin/cluster/netmon.cf file with any of the boot IP addresses on one of the othercluster nodes -
单项选择题
Anadministratorwillusethediscoveryprocesstocaptureinformationaboutcommonclusterstorage.Whichofthefollowingcommandsshouldtheadministratorrunoneachparticipatingnodeagainsttheshareddiskhdisk3toensurethatthisdiskissuccessfullyidentifiedbythediscoveryprocess?()
A.chpv -ay hdisk3
B.cfgmgr -l hdisk3
C.chdev l hdisk3 a pv=yes
D.chdev l hdisk3 a reserve_policy=no_reserve -
单项选择题
WhichofthefollowingcommandswillallowanadministratortodetermineiftheIBMRSCTpre-requisitecomponentsforclusteringareinstalledatthecorrectversion?()
A.lppchk -v rsct.bundle
B.lslpp -l bos.rsct.rte
C.lslpp -l rsct.basic.rte
D.lppchk -v cluster.es.server.rte
