单选题The heartbeating over IP aliases function allows which of the following?()A Create a heartbeat network over disksB Define all boot addresses as IP aliasesC Define all IP addresses in the same network subnetD Define all boot, service and persistent addr

题目
单选题
The heartbeating over IP aliases function allows which of the following?()
A

Create a heartbeat network over disks

B

Define all boot addresses as IP aliases

C

Define all IP addresses in the same network subnet

D

Define all boot, service and persistent addresses as IP aliases when using IPAT via replacement


相似考题
参考答案和解析
正确答案: D
解析: 暂无解析
更多“单选题The heartbeating over IP aliases function allows which of the following?()A Create a heartbeat network over disksB Define all boot addresses as IP aliasesC Define all IP addresses in the same network subnetD Define all boot, service and persistent addr”相关问题
  • 第1题:

    A database administrator wants a unique IP address for each of three instances of a database.  Normally,all instances run on a large production node,but they may fallover to different standby nodes according to the dynamic node priority configuration.  What is the best way to obtain unique addresses for each of the three database instances?()

    • A、 There is no way since this cannot be configured with HACMP
    • B、 Use IP Replacement address takeover and define all service addresses on the same NIC
    • C、 Use IP Aliasing for address takeover and define each alias in a separate resource group
    • D、 Use EtherChannel to map the three alias IP addresses to the common service address defined to HACMP

    正确答案:C

  • 第2题:

    A network design shows that R1 has four different possible paths from itself to the Data Center subnets. Which one of the following commands is most likely to show you all the possible next - hop IP addresses for these four possible routes?()

    • A、show ip eigrp topology
    • B、show ip eigrp topology all - links
    • C、show ip route eigrp
    • D、show ip route eigrp all - links
    • E、show ip eigrp topology all - learned

    正确答案:B

  • 第3题:

    Which of the following allows a technician to mask a private network of IP addresses behind onepublic IP address?()

    • A、NAT
    • B、Subnetting
    • C、DHCP
    • D、DNS

    正确答案:A

  • 第4题:

    The heartbeating over IP aliases function allows which of the following?()

    • A、Create a heartbeat network over disks
    • B、Define all boot addresses as IP aliases
    • C、Define all IP addresses in the same network subnet
    • D、Define all boot, service and persistent addresses as IP aliases when using IPAT via replacement

    正确答案:C

  • 第5题:

    You perform a security audit on a server named Server1. You install the Microsoft Network Monitor 3.0 application on Server1. You find taht only some of the captured frames dsplay host mnemonic names in the Source column and the Destination column. All other frames display IP addresses. You need to display mnemonic host names instead of IP addresses for all the frames what should you do?()

    • A、 Create a new display filter and apply the filter to the capture
    • B、 Create a new capture filter and apply the filter to the capture
    • C、 Populate the Aliases table and apply the aliases to the capture
    • D、 Configure the Network Monitor Application to enable the Enable Converstations optionrecapture the data to a new file.

    正确答案:C

  • 第6题:

    Which of the following is a requirement for configuring a service IP address using IPAT via Replacement?()

    • A、The service IP must be in the same logical subnet as all boot IP addresses
    • B、The service IP must be in a different logical subnet to all boot IP addresses
    • C、The service IP must be in the same logical subnet as the persistent IP addresses
    • D、The service IP must be in the same logical subnet as one of the boot IP addresses

    正确答案:D

  • 第7题:

    单选题
    A database administrator wants a unique IP address for each of three instances of a database.  Normally,all instances run on a large production node,but they may fallover to different standby nodes according to the dynamic node priority configuration.  What is the best way to obtain unique addresses for each of the three database instances?()
    A

     There is no way since this cannot be configured with HACMP

    B

     Use IP Replacement address takeover and define all service addresses on the same NIC

    C

     Use IP Aliasing for address takeover and define each alias in a separate resource group

    D

     Use EtherChannel to map the three alias IP addresses to the common service address defined to HACMP


    正确答案: A
    解析: 暂无解析

  • 第8题:

    单选题
    Which protocol automates all of the following functions for hosts on a network: IP configuration, IP addresses, subnet masks, default gateways, and DNS server information?()
    A

    CDP

    B

    SNMP

    C

    DHCP

    D

    ARP

    E

    DNS

    F

    None of the above


    正确答案: E
    解析: 暂无解析

  • 第9题:

    单选题
    What is the purpose of a network mask?()
    A

    It is used in conjunction with the wildcard mask to determine the number of hosts on a network

    B

    It is used to define which parts of the IP address are allocated to host addresses and network prefixes

    C

    It is used to hide subnets from external networks by masking the subnets with NAT

    D

    It is used to differentiate a network as a classful network or a classless network


    正确答案: B
    解析: 暂无解析

  • 第10题:

    单选题
    Which of the following is a requirement for configuring a service IP address using IPAT via Replacement?()
    A

    The service IP must be in the same logical subnet as all boot IP addresses

    B

    The service IP must be in a different logical subnet to all boot IP addresses

    C

    The service IP must be in the same logical subnet as the persistent IP addresses

    D

    The service IP must be in the same logical subnet as one of the boot IP addresses


    正确答案: A
    解析: 暂无解析

  • 第11题:

    单选题
    Company.com wishes to use IPAT via IP replacement in a two-node mutual cluster. Each node  has two Ethernet 10/100/1000 adapters. Throughout the planning session,the customer has asked questions about subnet and VLAN requirements for the intended network topology.  Which of the following best describes the network requirements?()
    A

     The service IP addresses must be on a separate subnet and VLAN.

    B

     The non-service and service IP addresses must be on the same subnet and on the same VLAN.

    C

     All interfaces on a node must be in different subnets. All subnets must be on the same VLAN. 

    D

     One non-service and one service IP address must be on the same logical subnet. All interfaces must be on the same VLAN.


    正确答案: A
    解析: 暂无解析

  • 第12题:

    单选题
    Company.com has decided to implement VPN for all network traffic. How might this might affect HACMP?()
    A

     Only the heartbeat IP network can exist in a VPN style network.

    B

     HACMp must have separate VPN’s for all ’non-service’ and ’service’ adapter networks.

    C

     If a VPN is used for IP traffic the heartbeating must be done over disk connections.

    D

     HACMP can exist in a VPN network environment,but special considerations must be addressed.


    正确答案: C
    解析: 暂无解析

  • 第13题:

    Which protocol automates all of the following functions for hosts on a network: IP configuration, IP addresses, subnet masks, default gateways, and DNS server information?()

    • A、CDP
    • B、SNMP
    • C、DHCP
    • D、ARP
    • E、DNS
    • F、None of the above

    正确答案:C

  • 第14题:

    Which of the following protocols define the rules and processes used to transmit and receive block storage applications over TCP/IP?()

    • A、iSCSI
    • B、VoIP
    • C、Distributed Applications over IP
    • D、HTTPS

    正确答案:A

  • 第15题:

    In a cluster using /etc/hosts for name resolution, which of the following describes the minimum requirementsfor the /etc/hosts file?()

    • A、IP address and IP label of each service and boot interface in the cluster
    • B、IP address and IP label of each service and boot interface in the cluster, loopback interface, and the hostname of the node
    • C、IP address and IP label of each service and boot interface in the cluster, the loopbackinterface, and the cluster gateway
    • D、IP address and IP label of each service and boot interface in the cluster, the loopbackinterface, the cluster gateway, and the subnet network addresses

    正确答案:B

  • 第16题:

    What is the purpose of a network mask?()

    • A、It is used in conjunction with the wildcard mask to determine the number of hosts on a network
    • B、It is used to define which parts of the IP address are allocated to host addresses and network prefixes
    • C、It is used to hide subnets from external networks by masking the subnets with NAT
    • D、It is used to differentiate a network as a classful network or a classless network

    正确答案:B

  • 第17题:

    Company.com wishes to use IPAT via IP replacement in a two-node mutual cluster. Each node  has two Ethernet 10/100/1000 adapters. Throughout the planning session,the customer has asked questions about subnet and VLAN requirements for the intended network topology.  Which of the following best describes the network requirements?()  

    • A、 The service IP addresses must be on a separate subnet and VLAN.
    • B、 The non-service and service IP addresses must be on the same subnet and on the same VLAN.
    • C、 All interfaces on a node must be in different subnets. All subnets must be on the same VLAN. 
    • D、 One non-service and one service IP address must be on the same logical subnet. All interfaces must be on the same VLAN.

    正确答案:D

  • 第18题:

    单选题
    A network for a two-node cluster has been planned. The network administrator has explained that the networkdoes not support gratuitous ARP. Which of the following steps will ensure that clients are able to connect tothe cluster after a failover takes place?()
    A

    Implement heartbeating over IP aliases

    B

    Implement persistent service IP addresses

    C

    Implement IPAT aliasing with hardware address takeover (HWAT)

    D

    Implement IPAT replacement with hardware address takeover (HWAT)


    正确答案: D
    解析: 暂无解析

  • 第19题:

    单选题
    In a cluster using /etc/hosts for name resolution, which of the following describes the minimum requirementsfor the /etc/hosts file?()
    A

    IP address and IP label of each service and boot interface in the cluster

    B

    IP address and IP label of each service and boot interface in the cluster, loopback interface, and the hostname of the node

    C

    IP address and IP label of each service and boot interface in the cluster, the loopbackinterface, and the cluster gateway

    D

    IP address and IP label of each service and boot interface in the cluster, the loopbackinterface, the cluster gateway, and the subnet network addresses


    正确答案: A
    解析: 暂无解析

  • 第20题:

    单选题
    The heartbeating over IP aliases function allows which of the following?()
    A

    Create a heartbeat network over disks

    B

    Define all boot addresses as IP aliases

    C

    Define all IP addresses in the same network subnet

    D

    Define all boot, service and persistent addresses as IP aliases when using IPAT via replacement


    正确答案: A
    解析: 暂无解析

  • 第21题:

    单选题
    You perform a security audit on a server named Server1. You install the Microsoft Network Monitor 3.0 application on Server1. You find taht only some of the captured frames dsplay host mnemonic names in the Source column and the Destination column. All other frames display IP addresses. You need to display mnemonic host names instead of IP addresses for all the frames what should you do?()
    A

     Create a new display filter and apply the filter to the capture

    B

     Create a new capture filter and apply the filter to the capture

    C

     Populate the Aliases table and apply the aliases to the capture

    D

     Configure the Network Monitor Application to enable the Enable Converstations optionrecapture the data to a new file.


    正确答案: C
    解析: 暂无解析

  • 第22题:

    单选题
    Which of the following allows a technician to mask a private network of IP addresses behind onepublic IP address?()
    A

    NAT

    B

    Subnetting

    C

    DHCP

    D

    DNS


    正确答案: A
    解析: 暂无解析

  • 第23题:

    单选题
    Which of the following protocols define the rules and processes used to transmit and receive block storage applications over TCP/IP?()
    A

    iSCSI

    B

    VoIP

    C

    Distributed Applications over IP

    D

    HTTPS


    正确答案: B
    解析: 暂无解析

  • 第24题:

    单选题
    A network design shows that R1 has four different possible paths from itself to the Data Center subnets. Which one of the following commands is most likely to show you all the possible next - hop IP addresses for these four possible routes?()
    A

    show ip eigrp topology

    B

    show ip eigrp topology all - links

    C

    show ip route eigrp

    D

    show ip route eigrp all - links

    E

    show ip eigrp topology all - learned


    正确答案: B
    解析: 暂无解析