单选题While reviewing the HACMP log file, a warning message appears stating that a custom event script could not be found. A check of the current path settings indicates that all required paths are present.  What step can be taken to correct the missing path

题目
单选题
While reviewing the HACMP log file, a warning message appears stating that a custom event script could not be found. A check of the current path settings indicates that all required paths are present.  What step can be taken to correct the missing paths issues during cluster event processing?()
A

 Move the custom script to a different location such as /usr/sbin.

B

 Include required paths at the start of the custom script.

C

 Synchronize and verify the cluster to ensure both nodes are the same.

D

 Create a pre event that sets the correct paths and executes the script.


相似考题
更多“单选题While reviewing the HACMP log file, a warning message appears stating that a custom event script could not be found. A check of the current path settings indicates that all required paths are present.  What step can be taken to correct the missing path”相关问题
  • 第1题:

    An administrator is reviewing the /tmp/hacmp.out after an unsuccessful fallover and notice that  the event stop_server PROD_DB failed.  Besides manually intervening,what step must be performed to return the cluster to a stable state?()  

    • A、 Recover From HACMP Script Failure.
    • B、 Release Locks Set By Dynamic Reconfiguration.
    • C、 Rerun HACMP cluster verification and synchronization.
    • D、 Restore HACMP configuration Database From Active Configuration.

    正确答案:A

  • 第2题:

    While reviewing the hacmp.out after a node failure,an administrator realizes that the custom Event queue_down did not execute. The queue_down event shows up when a list of custom events is displayed.  What would be the next logical step to resolve this problem?()

    • A、 Delete the custom event and add a pre event and synchronize.
    • B、 Synchronize the cluster and recheck the cluster custom events.
    • C、 Create an application server that will stop and start the queues.
    • D、 Add a pre or post event to appropriate cluster events and synchronize.

    正确答案:D

  • 第3题:

    You have a login-path named "adamlocal" that was created by using the mysql_config_editor command. You need to check what is defined for this login_path to ensure that it is correct for you deployment. You execute this command: $mysql_config_editor print –login-path=adamlocal What is the expected output of this command?()

    • A、The command prints all parameter for the login-path. The password is replaced with stars
    • B、The command prints the encrypted entry for the login-path. The is only possible to see if an entry exists
    • C、The command prints all parameters for the login-path. The password is shown only when you provide the  –password option
    • D、The command prints all parameters for the login-path. The password is printed in plain tex

    正确答案:A

  • 第4题:

    Your network consists of a single domain. All domain controllers run Windows Server 2003 Service Pack 2 (SP2). All client computers run Windows XP Professional Service Pack 3 (SP3). You need to ensure that users’ personal settings are the same when they log on to different client computers in the domain. What should you do? ()

    • A、From the properties of each user account, configure a profile path.
    • B、From the properties of each user account, configure a home folder path.
    • C、From the Default Domain Policy, configure a logon script that runs Loadstate.exe.
    • D、From the Default Domain Policy, configure a logon script that runs Scanstate.exe.

    正确答案:A

  • 第5题:

    You have 15 computers that run Windows 7. You need to implement a monitoring solution that meets the following requirements.Sends an e-mail notification when an application error is logged in the event log .Runs a script to restart the computer if an application error occurs between 17.00 and 07.00 .Minimizes the administrative effort required to monitor applications. What should you do?()

    • A、On all the computers,configure a custom view. Configure a custom task for the application error events.
    • B、On a computer,configure a custom view to display the application errors. Configure a custom task for the application error events.
    • C、On a central computer, configure an event subscription. On all of the computers, configure a custom task in the Forwarded Events log.
    • D、On all the computers,configure an event subscription to a central computer. On the central computer,configure a custom task in the Forwarded Events log.

    正确答案:D

  • 第6题:

    单选题
    In the past several months, manual intervention has been required to correct improper cluster configuration changes. The administrator received a directive from management to create a more effective strategy for making the changes required fro month-end processing.  How can HACMP be used to meet the requirements of management’s directive?()
    A

     Create a snapshot for each of the required cluster configurations.

    B

     Create a custom snapshot method to handle the configuration changes.

    C

     Create a custom verification method to verify configuration changes.

    D

     Create a cluster custom event to mange required configuration changes.


    正确答案: A
    解析: 暂无解析

  • 第7题:

    单选题
    Your network consists of a single domain. All domain controllers run Windows Server 2003 Service Pack 2 (SP2). All client computers run Windows XP Professional Service Pack 3 (SP3). You need to ensure that users’ personal settings are the same when they log on to different client computers in the domain. What should you do? ()
    A

    From the properties of each user account, configure a profile path.

    B

    From the properties of each user account, configure a home folder path.

    C

    From the Default Domain Policy, configure a logon script that runs Loadstate.exe.

    D

    From the Default Domain Policy, configure a logon script that runs Scanstate.exe.


    正确答案: B
    解析: 暂无解析

  • 第8题:

    单选题
    You are the network administrator for the Berlin office of The company network consists of a single Active Directory domain named The Berlin office contains 15 file servers that contain confidential files. All the file servers run either Windows Server 2003 or Windows 2000 Server. All the file servers are in the BerlinFilePrint organizational unit (OU). TestKing's security department sets a rule that specifies the size and retention settings for the Security event log of all file servers. The rule also specified that local administrators on servers cannot override the changes you make to the settings for the Security event log. You need to define a method to modify the Security event log settings on each file server in the Berlin office in order to meet the states requirements. What should you do?()
    A

    Modify the local security policy on each file server.Define the size and retention settings for the Security event log.

    B

    Create a security template on one of the file servers by using the Security Configuration and Analysis tool. Define the size and retention settings for the Security event log in the template. Import the security template into the local security policy of the other 14 file servers.

    C

    Use Event Viewer to modify the event log properties on each file server. Define the size and retention settings for the Security event log.

    D

    Create a new Group Policy object (GPO) and link it to the BerlinFilePrint OU. In the GPO, define the size and retention settings for the Security event log.


    正确答案: C
    解析: 暂无解析

  • 第9题:

    单选题
    You have a login-path named "adamlocal" that was created by using the mysql_config_editor command. You need to check what is defined for this login_path to ensure that it is correct for you deployment. You execute this command: $mysql_config_editor print –login-path=adamlocal What is the expected output of this command?()
    A

    The command prints all parameter for the login-path. The password is replaced with stars

    B

    The command prints the encrypted entry for the login-path. The is only possible to see if an entry exists

    C

    The command prints all parameters for the login-path. The password is shown only when you provide the  –password option

    D

    The command prints all parameters for the login-path. The password is printed in plain tex


    正确答案: A
    解析: 暂无解析

  • 第10题:

    单选题
    While reviewing the hacmp.out after a node failure,an administrator realizes that the custom Event queue_down did not execute. The queue_down event shows up when a list of custom events is displayed.  What would be the next logical step to resolve this problem?()
    A

     Delete the custom event and add a pre event and synchronize.

    B

     Synchronize the cluster and recheck the cluster custom events.

    C

     Create an application server that will stop and start the queues.

    D

     Add a pre or post event to appropriate cluster events and synchronize.


    正确答案: B
    解析: 暂无解析

  • 第11题:

    单选题
    You have 15 computers that run Windows 7. You need to implement a monitoring solution that meets thefollowing requirements. Sends an e-mail notification when an application error is logged in the event log  Runs a script to restart the computer if an application error occurs between 17:00 and 07:00 Minimizes the administrative effort required to monitor applications. What should you do?()
    A

    On all the computers, configure a custom view. Configure a custom task for the application error events.

    B

    On a computer, configure a custom view to display the application errors. Configure a custom task forthe application error events.

    C

    On a central computer, configure an event subscription. On all of the computers, configure a customtask in the Forwarded Events log.

    D

    On all the computers, configure an event subscription to a central computer. On the central computer,configure a custom task in the Forwarded Events log.


    正确答案: C
    解析: 暂无解析

  • 第12题:

    单选题
    What is required during the initial creation of a cluster?()
    A

     Nothing,because HACMP will discover the configuration

    B

     The cluster name and a TCP/IP path to each of the nodes

    C

     The cluster name and ID and a TCP/IP path to each of the nodes

    D

     The cluster name and ID node names and a TCP/IP path to each of the nodes


    正确答案: B
    解析: 暂无解析

  • 第13题:

    What is required during the initial creation of a cluster?()

    • A、 Nothing,because HACMP will discover the configuration
    • B、 The cluster name and a TCP/IP path to each of the nodes
    • C、 The cluster name and ID and a TCP/IP path to each of the nodes
    • D、 The cluster name and ID node names and a TCP/IP path to each of the nodes

    正确答案:B

  • 第14题:

    While reviewing the HACMP log file, a warning message appears stating that a custom event script could not be found. A check of the current path settings indicates that all required paths are present.  What step can be taken to correct the missing paths issues during cluster event processing?()  

    • A、 Move the custom script to a different location such as /usr/sbin.
    • B、 Include required paths at the start of the custom script.
    • C、 Synchronize and verify the cluster to ensure both nodes are the same.
    • D、 Create a pre event that sets the correct paths and executes the script.

    正确答案:B

  • 第15题:

    You have 15 computers that run Windows 7. You need to implement a monitoring solution that meets thefollowing requirements. Sends an e-mail notification when an application error is logged in the event log  Runs a script to restart the computer if an application error occurs between 17:00 and 07:00 Minimizes the administrative effort required to monitor applications. What should you do?()

    • A、On all the computers, configure a custom view. Configure a custom task for the application error events.
    • B、On a computer, configure a custom view to display the application errors. Configure a custom task forthe application error events.
    • C、On a central computer, configure an event subscription. On all of the computers, configure a customtask in the Forwarded Events log.
    • D、On all the computers, configure an event subscription to a central computer. On the central computer,configure a custom task in the Forwarded Events log.

    正确答案:D

  • 第16题:

    You are the network administrator for the Berlin office of The company network consists of a single Active Directory domain named The Berlin office contains 15 file servers that contain confidential files. All the file servers run either Windows Server 2003 or Windows 2000 Server. All the file servers are in the BerlinFilePrint organizational unit (OU). TestKing's security department sets a rule that specifies the size and retention settings for the Security event log of all file servers. The rule also specified that local administrators on servers cannot override the changes you make to the settings for the Security event log. You need to define a method to modify the Security event log settings on each file server in the Berlin office in order to meet the states requirements. What should you do?()

    • A、Modify the local security policy on each file server.Define the size and retention settings for the Security event log.
    • B、Create a security template on one of the file servers by using the Security Configuration and Analysis tool. Define the size and retention settings for the Security event log in the template. Import the security template into the local security policy of the other 14 file servers.
    • C、Use Event Viewer to modify the event log properties on each file server. Define the size and retention settings for the Security event log.
    • D、Create a new Group Policy object (GPO) and link it to the BerlinFilePrint OU. In the GPO, define the size and retention settings for the Security event log.

    正确答案:D

  • 第17题:

    单选题
    An administrator has written a script to check that the contents of an application configuration file are identicalon all cluster nodes. The script has also been associated with a user defined custom verification method. Theadministrator would like the contents of this file to be checked and verified automatically on a daily basis.How can this be achieved?()
    A

    By using a job scheduler such as cron

    B

    By enabling automatic cluster verification

    C

    By including the script name in the file /usr/es/sbin/cluster/etc/clverify.rc

    D

    By including the custom method name in the file /usr/es/sbin/cluster/etc/rc.authomethods


    正确答案: D
    解析: 暂无解析

  • 第18题:

    单选题
    A storage specialist needs to automate some tasks triggered in the event of disaster recovery.  What is the best solution to accomplish this()
    A

    using the DS GUI, step through Real Time Manager, Copy Services, Create custom scripts; actions and event conditions can be defined that triggerthe script; there is no need for a password

    B

    create a shell script usingdscli commands; trigger the script from the operating system, and call the script using the -pwd option with the password

    C

    create a password file; create a shell script using dscli commands; trigger the script from the operating system

    D

    create a password file; create a shell script usingdscli commands; trigger the script from the operating system; call the dscli script with the dscli -script  -pwdfile command


    正确答案: A
    解析: 暂无解析

  • 第19题:

    单选题
    You have 15 computers that run Windows 7. You need to implement a monitoring solution that meets the following requirements.Sends an e-mail notification when an application error is logged in the event log .Runs a script to restart the computer if an application error occurs between 17.00 and 07.00 .Minimizes the administrative effort required to monitor applications. What should you do?()
    A

    On all the computers,configure a custom view. Configure a custom task for the application error events.

    B

    On a computer,configure a custom view to display the application errors. Configure a custom task for the application error events.

    C

    On a central computer, configure an event subscription. On all of the computers, configure a custom task in the Forwarded Events log.

    D

    On all the computers,configure an event subscription to a central computer. On the central computer,configure a custom task in the Forwarded Events log.


    正确答案: C
    解析: 暂无解析

  • 第20题:

    单选题
    In which scenario will you issue the following command?()      SQL> RECOVER DATABASE UNTIL TIME ’2005-10-04 : 12:09:08’ USING        BACKUP CONTROLFILE;
    A

     when all the control files are missing and only a binary backup of the current control file exists

    B

     when a multiplexed copy of the current control file is missing

    C

    when all the control files are missing and only a script containing the CREATE CONTROLFILE statement exists

    D

     when the SPFILE is missing


    正确答案: D
    解析: 暂无解析

  • 第21题:

    单选题
    What command will allow the operator to add the current working directory to the command search path?()
    A

    export PATH=pwd

    B

    export PATH=$PWD

    C

    export PATH=$PATH:pwd

    D

    export PATH=$PATH:$PWD


    正确答案: B
    解析: 暂无解析

  • 第22题:

    单选题
    While reviewing the HACMP log file, a warning message appears stating that a custom event script could not be found. A check of the current path settings indicates that all required paths are present.  What step can be taken to correct the missing paths issues during cluster event processing?()
    A

     Move the custom script to a different location such as /usr/sbin.

    B

     Include required paths at the start of the custom script.

    C

     Synchronize and verify the cluster to ensure both nodes are the same.

    D

     Create a pre event that sets the correct paths and executes the script.


    正确答案: B
    解析: 暂无解析

  • 第23题:

    单选题
    Your network contains a server named Server1 that runs Windows Server 2008 R2. You need to ensure that an administrator is notified by e-mail if the Event Viewer logs any error. What should you do from the Event Viewer console?()
    A

    Create a custom view, and then click the Filter Current Custom View action.

    B

    Create a custom view, and then click the Attach Task to This Custom View action.

    C

    From the System log, click the Filter Current Log action.

    D

    From the System log, select an Error event, and then click the Attach Task to This Event action.


    正确答案: C
    解析: 暂无解析

  • 第24题:

    单选题
    An administrator is reviewing the /tmp/hacmp.out after an unsuccessful fallover and notice that  the event stop_server PROD_DB failed.  Besides manually intervening,what step must be performed to return the cluster to a stable state?()
    A

     Recover From HACMP Script Failure.

    B

     Release Locks Set By Dynamic Reconfiguration.

    C

     Rerun HACMP cluster verification and synchronization.

    D

     Restore HACMP configuration Database From Active Configuration.


    正确答案: C
    解析: 暂无解析