{"id":953,"date":"2009-03-10T08:56:51","date_gmt":"2009-03-10T00:56:51","guid":{"rendered":"http:\/\/www.killtest.com.tw\/?p=953"},"modified":"2009-03-10T09:16:03","modified_gmt":"2009-03-10T01:16:03","slug":"000-237-2","status":"publish","type":"post","link":"https:\/\/www.killtest.com.tw\/?p=953","title":{"rendered":"000-237\u8003\u53e4\u984c\u7cbe\u9078\u984c"},"content":{"rendered":"<p>\u672c\u6587\u6458\u81eaIT\u8a8d\u8b49\u4fe1\u606f\u7db2\u4e2d\u95dc\u4e8eIBM <span style=\"color: #800080;\"><a title=\"000-237\" href=\"http:\/\/www.killtest.com.tw\/index.php\/ibm\/000-237-2\/\" target=\"_blank\">000-237<\/a><\/span>\u8003\u53e4\u984c\u7684\u4e00\u5247\u5831\u9053\uff1a<\/p>\n<p>Certified Advanced Technical Expert 000-237\u8003\u8a66\u984c\u5eab\u7531KillTest\u8a8d\u8b49\u984c\u5eab\u7db2\u8cc7\u6df1IT\u8a8d\u8b49\u8b1b\u5e2b\u548cCertified Advanced Technical Expert\u7522\u54c1\u5c08\u5bb6\u7d50\u5408PROMETRIC\u6216VUE\u7684\u771f\u5be6000-237\u8003\u8a66\u74b0\u5883\u6700\u65b0\u539f\u984c\u50be\u5fc3\u6253\u9020\u3002\u984c\u5eab\u8986\u84cb\u4e86\u7576\u524d\u6700\u65b0\u7684\u771f\u5be6\u8003\u984c\uff0c\u4e26\u4e14\u5168\u90e8\u9644\u6709\u6b63\u78ba\u7b54\u6848\uff0c\u6211\u5011\u627f\u8afe\u984c\u5eab\u5c0dCertified Advanced Technical Expert 000-237(hacmp for aix 5l)\u8003\u8a66\u539f\u984c\u5b8c\u6574\u8986\u84cb\u3002000-237\u984c\u5eab\u52a9\u60a8\u8f15\u9b06\u901a\u904e\u8a8d\u8b49\u8003\u8a66\uff0c\u4e00\u6b21\u4e0d\u904e\u5168\u984d\u9000\u6b3e\u3002<\/p>\n<p>Continuous availability is required for an application in a two-node cluster. There is one rotating resource group in the cluster, and the nodes are identical machines. Client telnet connections to the application cannot be broken because it takes 20 to 30 minutes to recycle the client workstations and transactions will be lost. What configuration best <a title=\"000-237\" href=\"http:\/\/www.killtest.net\/CertifiedAdvancedTechnicalExpert\/000-237.asp\" target=\"_blank\">000-223 <\/a>provides continuous connectivity to the application \uff1f<br \/>\nA.IPAT using IP Replacement without MAC address takeover.<br \/>\nB.IPAT using IP Aliasing and hardware MAC address takeover.<br \/>\nC.None because continuous telnet connectivity cannot be provided with HACMP.<br \/>\nD.Shared service IP address assigned to multiple network interface cards on each node.<br \/>\nCorrect:C<\/p>\n<p>An existing cluster has an application node and a database node. Changes in the application require both nodes to have access to the other&#8217;s data all of the time. Which facility managed by HACMP can be implemented with the least amount of impact?<br \/>\nA.NFS<br \/>\nB.AFS<br \/>\nC.DFS<br \/>\nD.GPFS<br \/>\nCorrect:A<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u672c\u6587\u6458\u81eaIT\u8a8d\u8b49\u4fe1\u606f\u7db2\u4e2d\u95dc\u4e8eIBM 000-237\u8003\u53e4\u984c\u7684\u4e00\u5247\u5831\u9053\uff1a Certified Advanced Technical Expert 000-237\u8003\u8a66\u984c\u5eab\u7531KillTest\u8a8d\u8b49\u984c\u5eab\u7db2\u8cc7\u6df1IT\u8a8d\u8b49\u8b1b\u5e2b\u548cCertified Advanced Technical Expert\u7522\u54c1\u5c08\u5bb6\u7d50\u5408PROMETRIC\u6216VUE\u7684\u771f\u5be6000-237\u8003\u8a66\u74b0\u5883\u6700\u65b0\u539f\u984c\u50be\u5fc3\u6253\u9020\u3002\u984c\u5eab\u8986\u84cb\u4e86\u7576\u524d\u6700\u65b0\u7684\u771f\u5be6\u8003\u984c\uff0c\u4e26\u4e14\u5168\u90e8\u9644\u6709\u6b63\u78ba\u7b54\u6848\uff0c\u6211\u5011\u627f\u8afe\u984c\u5eab\u5c0dCertified Advanced Technical Expert 000-237(hacmp for aix 5l)\u8003\u8a66\u539f\u984c\u5b8c\u6574\u8986\u84cb\u3002000-237\u984c\u5eab\u52a9\u60a8\u8f15\u9b06\u901a\u904e\u8a8d\u8b49\u8003\u8a66\uff0c\u4e00\u6b21\u4e0d\u904e\u5168\u984d\u9000\u6b3e\u3002 Continuous availability is required for an application in a two-node cluster. There is one rotating resource group in the cluster, and the nodes are identical machines. Client telnet connections to the application cannot be broken because it takes [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[325,8],"tags":[251,3159],"class_list":["post-953","post","type-post","status-publish","format-standard","hentry","category-000-237-ibm","category-ibm","tag-000-237","tag-ibm"],"_links":{"self":[{"href":"https:\/\/www.killtest.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/953","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.killtest.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.killtest.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.killtest.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.killtest.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=953"}],"version-history":[{"count":3,"href":"https:\/\/www.killtest.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/953\/revisions"}],"predecessor-version":[{"id":955,"href":"https:\/\/www.killtest.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/953\/revisions\/955"}],"wp:attachment":[{"href":"https:\/\/www.killtest.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=953"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.killtest.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=953"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.killtest.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=953"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}