Vous êtes sur la page 1sur 8

Cluster in Linux Assessment

2-Which one is the block protocol?


a. nfs
c. scsi

b. cifs
d. None of the above

3- Name of the technology used to expose storage on network.


a. NAS b. SAN c. both a & b

d. None

4-Which protocol provides block level access of storage?


a. cifs
b. FCP
c. IDE
d. both b & c
5-. Fencing is used for?
a. Maintain data integrity
c. Power of cluster node

b. reboot cluster node


d. All of the above

6- Which one is shared fencing device?


a.

APC Master Switch b. HP ILOc. Dell drac d.None

7-Which one is the individual fencing device?


a. Dell drac b. APC Master Switches
c. both a & b d. None
8-Which protocol is used for heartbeat functionality?
a. TCP/IP
c. totem

b. udp
d. tcp

9- Which option is used to mount a iscsitarget in /etc/fstab.


a. defaults
b. _netdev
c. ro,defaults
d. All of the above
10- Which file system is used for failsafe cluster?
a. ext4
b. gfs2
c. ocfs d. both b & c

11-During the failover period which query works in failover cluster?


a. ready query
b. write query
c. both read & write query d. None
12- During the failover period which query works in failsafe cluster?
a. both read & write query b. Only write query
c. Only read query
d. None
13- GFS works with only?
a. Raidb. lvm
c. both a & b

c. None

14- Which command is used to list the the san devices?


a.
b.

scsils
listscsi

b. lsscsi
c. node

15-udev is used for?


a. mange cluster resources b. manage cman service
c. used for device naming d. None
16-Which command is used to read udev rule?
a. udevinfo
c. both a & b

b. scsi_id
c. udevtrigger

17- What is the location of all block devices?


a.
b.

/proc/
/opt

b. /dev/
c. node

18- How to list the open files ?


a.
b.

ls l
b.lsof
both a & b d. None

19- Failover domain is used for?


a. To run all service on a single node
b. To stop a service
c. To stick a service on a particular node

d. None
20-xfs files system is developed by?
a. RedHatb. Silicon Graphics
c. Novel c. IBM

21- Which command can be used to remove a mirror from a volume? (Choose two.)
A. vxedit

B. vxassist

D. vxevac

C. vxremove

E. vxmirror

22- Which command displays the number of paths to the datadg01 disk?
A. vxdisk list datadg01

B. vxdg list datadg01

C. vxpath list datadg01

D. vxdmpadm list datadg01

23- Which command removes the datavol volume from the datadg disk group?
A. vxedit -g datadg -rf remove datavol
B. vxvol -g datadgrmdatavol
C. vxvol -g datadg remove datavol
D. vxedit -g datadg -rfrmdatavol
24- Given the following command: vxassist -g datadg make datavol layout=raid5
ncol=3 How many disks are needed to construct the data vol volume?
A. 2

B. 3

C. 4

D. 5

25- Volume configuration data are backed up in files located in _____.


A. /etc/vx/cbr/bk B. /etc/vx/vxconfig
C. /var/vx/cbr/bk

D. /var/vx/vxconfig

26- Which methods enable you to resize both a volume and its mounted Veritas file system at the same time? (Choose two.)
A. vxresize
B. vxdisk resize
C. fsadm
D. VEA

E. vxassist
27- Which Command you can initialized a disk.
A) vxdg -i disk_1 B) vxedit k disk_1 c) vxdisksetup i disk_1 d) vxdg f disk_1

28- Which command creates a RAID-5 volume with an attached log?


A. vxassist -g datadg make datavol layout=raid5 ncol=3
B. vxassist -g datadg make datavol layout=raid5,addlogncol=3
C. vxassist -g datadg make datavol layout=raid5,raid5logncol=3
D. vxassist -g datadg make datavol layout=raid5,rlogncol=3
29- A Veritas Volume Manager (VxVM) disk named Disk_4 has been removed from the datadg disk group. Which
command is used to remove this disk from Veritas Volume Manager (VxVM) control?
A. vxdisk -g datadgrmdisk Disk_4
B. vxdiskunsetup Disk_4
C. vxdg -g datadgrmdisk Disk_4
D.vxdisksetup -r Disk_4

30- What is the default private region size for Veritas Volume Manager (VxVM) disks?
A. 8MB
B. 16MB
C. 32MB
D.64MB
31- An administrator is unable to receive output from vxprint, vxdisk list, or other reporting commands but does
have access to volumes and file system data. What is the likely cause of this problem?
A. vxconfigd has stopped running.
B. vxdctl has stopped running.
C. A disk has failed.
D. The disk.info file is corrupt

32- Most downtime is caused by.


A. Hardware failures.

C. Networking problems.

B. Software errors.

D. Scheduled maintenance

33- What is the minimum number of systems required to implement an active/passive failover
in a local cluster?
A. One
B. Two
C. Three
D. Four
34- A global cluster is:
A. A single cluster stretched across a wide-area network.
B. Multiple cooperating clusters geographically separated.
C. A combination of campus clusters and local clusters.
D. Two local, but separate, clusters that share data.

35- The goal of hardware redundancy is to:


A. Remove single points of failure.
B. Prevent failures.
C. Guarantee 100% application uptime.
D. Double bandwidth.
36- To cluster an application, you must have:
A. Primary and secondary DNS name servers.
B. Multiple network interfaces and IP addresses.
C. A database for managing shared storage.
D. Appropriate licensing for all failover target systems.
37- A persistent resource:

configuration

A. Can be taken offline, but not brought online.


B. Cannot be a parent to another resource.
C. Always depends on another resource.
D. Is used for monitoring hardware devices.
38- What role does the hashadow daemon perform in a VCS cluster? The hashadow daemon:
A. Replicates the main.cf file
B. Communicated with GAB and LLT
C. Restarts HAD if HAD fails
D. Replicates the in-memory configuration
39- A recommended practice for offline configuration is to:
A. Copy the main.cf and types.cf into a staging directory before editing.
B. Change the original main.cf while the cluster is up, then bring the cluster down.
C. Make changes to the service groups before changing cluster attributes.
D. Change resources, then service groups, then cluster attributes.

40- Why do you save and close the cluster configuration before making changes to main.cf?
A. To ensure that the latest in-memory configuration is written to disk
B. To check the syntax of the configuration in memory before making changes
C. To reset locks on the configuration files so you can make changes
D. To prevent another administrator from modifying the main.cf on another system
41- What is the effect of disabling a resource?
A. The agent stops monitoring that resource.
B. The agent takes the resource offline on the local system.
C. The resource attributes are checked for syntax errors.
D. The resource is considered faulted.
42- When you create a service group:

A. It is automatically set to run on all cluster systems.


B. It is automatically set to start and run on all cluster systems.
C. You must explicitly specify which systems can run the service group.
D. You must add all resources before the service group can be brought online.
43- When you create a resource:
A. All child resources must first be online.
B. All child resources must first be offline.
C. All parent resources must be disabled.
D. All required attributes must be set before you can bring the resource online.
44- Which cluster configuration information is optional during VCS installation?
A. Web GUI, SMTP, SNMP
B. License keys, VCS users, SNMP
C. License keys, Notifier, SNMP
D. Cluster ID, VCS users, Web GUI

45- I/O Fencing uses ________________ to fence off the data disks from nodes no longer in the cluster.
A. SCSI II reservations
B. SCSI-3 persistent reservations
C. Fibre channel locking
D. SAN controller locking
46- I/O fencing can be configured for VCS if you are using Volume Manager 5.x and:
A. You have installed the Fencing agent for VCS.
B. Your shared storage is in a SAN.
C. Your shared storage devices support SCSI-3 Persistent Reservations.
D. Your shared storage is a network appliance.
47- How will you start llt.

A. lltconfig k
B. llconfig m
C. lltconfig g
D. lltconfig c
48- How will you stop llt.
A. lltconfig k
B. llconfig U
C. lltconfig g
D. lltconfig c
49- How will you stop Had.
A. haconf
B. hashadow
C. hastart c
D. hastart

50) How will you stop Gab.


A. gabconfig -t
B. gabconfig U
C. gabconfig -c
D. gabconfig z

Vous aimerez peut-être aussi