单项选择题
On an existing two-node cluster, the system is configured with RAID5 SSA as the shared disk. When adding a new node to the cluster, what must be taken into consideration?()
A. Nothing,SSA can support a maximum of 8 initiators per loop.
B. The RAID5 implementation on SSA will only support two initiators per loop.
C. SSA can only support four initiators per lop when using the fat write option.
D. The RAID implementation can be used with three initiators only if the fast write cache option is used on all adapters.
相关考题
-
单项选择题
While an electrician was adding additional circuits for the Data Center, the system running the Database inadvertently powered down. The fallover of the service IP labels and volume groups to the hot standby node completed as expected; however, the database did not start. The database log file indicated that the database was already started. What is the most likely cause of this problem?()
A. The shared logical volumes and filesystems did not have database permissions.
B. There was a test instance running on the standby system that must be shutdown.
C. The tablespaces had an indicator indicating that the database had not shutdown properly.
D. The startup script for the highly available instance did not first perform cleanup operations. -
单项选择题
WhichofthefollowingstatementsistrueaboutIPATviaIPreplacement?()
A. Configuration of Hardware Address Takeover is supported.
B. Fewer physical network interface cards are required in the cluster.
C. It is the default for keeping a service IP labels highly available.
D. None-service ip labels must use different subnets than service IP labels. -
单项选择题
Company.com has installed HACMP and is configuring a three-node cluster. One of the Applications uses the AIX hostname as a key for authorization to execute on the specific computer. The application vendor was contacted and consented to having multiple copies of the application but required that only one application be active at any one point in time. How can the AIX host name dependency be managed in an HACMP environment.()
A. It cannot be managed because the application will not work properly with HACMP.
B. The application start and stop script for the application can manage the hostname.
C. HACMP will require customization to correctly manage a change in the hostname since it is tied to the primary network adapter.
D. HACMP will have to be restarted if the hostname is changed. This can be done with customization in the node_up and node_down event scripts.
