单项选择题
An administrator runs clstat on a cluster node and receives the following response: ’Can not get Cluster Information.’ Which of the following daemons may need to be started in order to correct this problem?()
A. topsvcs
B. clinfoES
C. snmpinfo
D. clsmuxpdES
相关考题
-
单项选择题
During a cluster synchronization, an administrator inadvertently performs al ctrl ’C’ causing the synchronization to fail. After restarting the resynchronization, the administrator notices a message stating that a previous dare operation has been detected. What is the best way to resolve this problem?()
A. Perform a ’Recover from HACMP Script Failure’.
B. Perform a ’Release Lock Set By Dynamic Reconfiguration’.
C. Perform a graceful stop an& start of all cluster processing.
D. Perform a ’Restore HACMP Configuration Database from Active Configuration’. -
单项选择题
When the clverify utility is run,verification checks use ODM data provided by the common communication infrastructure. This provides efficient access to configuration ODMs from the other nodes. The utility manages these files by storing the copies in various directories depending on the success or failure of the verification pass. By default,this directory is "/var/hacmp/clverify/current/nodename/ if the ’current’ directory still exists when clverify stops running,this indicates which of the following?()
A. A successful completion of clverify
B. A problem with the clverify utility
C. All nodes agree on active configuration
D. Configuration differences between current and last successful clverify -
单项选择题
Theuserbaseofathree-nodeclusterhasincreased.Inordertoaddclustereduserstoallnodes,whichofthefollowingstepsshouldbeperformed?()
A. On one of the nodes,add the users via C-SPOC ’Add a User to the Cluster’smit menu.
B. Use C-SPOC to synchronize the password files between cluster nodes.
C. On all of the nodes,add the users to the /etc/passwd and system security files,and then synchronize the cluster.
D. On one of the nodes,add the users to the /tec/passwd and system security files,add home directories,and use cron to automate the movement of system security files between nodes.
