单项选择题
Which of the following options are valid choices for cluster communication security?()
	A.rsh and ssh
	B.Standard and VPN
	C.rhost and .shosts
	D.Classic and Enhanced
相关考题
- 
                                    单项选择题
                                    
 A customer synchronizes the cluster in a virtualized environment. During the process the following warning isdisplayed: "For nodes with a single Network Interface Card per logical network configured, it is recommended to includethe file ’/usr/es/sbin/cluster/netmon.cf’ with a pingable IP address as described in the PowerHA PlanningGuide". What should the customer do next?()
 A.Ignore the warning as synchronization completed successfully. 
 B.Populate the /usr/es/sbin/cluster/netmon.cf file with one or many IP addresses external to the cluster.
 C.Create another virtual adapter on each node and set-up PowerHA networking in a more traditional fashion
 D.Populate the /usr/es/sbin/cluster/netmon.cf file with any of the boot IP addresses on one of the othercluster nodes
- 
                                    单项选择题
                                    
 Anadministratorwillusethediscoveryprocesstocaptureinformationaboutcommonclusterstorage.Whichofthefollowingcommandsshouldtheadministratorrunoneachparticipatingnodeagainsttheshareddiskhdisk3toensurethatthisdiskissuccessfullyidentifiedbythediscoveryprocess?()
 A.chpv -ay hdisk3 
 B.cfgmgr -l hdisk3
 C.chdev l hdisk3 a pv=yes
 D.chdev l hdisk3 a reserve_policy=no_reserve
- 
                                    单项选择题
                                    
 WhichofthefollowingcommandswillallowanadministratortodetermineiftheIBMRSCTpre-requisitecomponentsforclusteringareinstalledatthecorrectversion?()
 A.lppchk -v rsct.bundle 
 B.lslpp -l bos.rsct.rte
 C.lslpp -l rsct.basic.rte
 D.lppchk -v cluster.es.server.rte
 
             
             
                
            