|
Question 1. Which statement about AAM's Network Interface Card (NIC)-to-NIC feature is true? A. If one NIC fails, another will be configured to take its place. B. Communications can be routed from one NIC to another NIC. C. If one NIC is overloaded, another NIC will be configured to assist with traffic. D. Two NIC's are paired together as a single logical NIC twice the capacity and function. Answer: Question 2. Which two conditions must be validated before installing the AAM 5.x agent on the Solaris operating system? (choose two) A. Motif 1.2 installed B. Any user with a UID = 0 C. Minimum of two networks D. Spare system running Solaris 2.6 or later. Answer: Question 3. Which statement describes an AAM Utility Process? A. A Utility Process runs using the account of the user that started it. B. A Utility Process can transition to the failed state if its existence monitor is incorrectly written. C. A Utility Process is an unmanaged process that can be started from the Management Console, from a Resource Group, or from a rule. D. When contained within a Resource Group, a Utility Process will typically run while the group is brought online, and be stopped when the resource group is taken offline. Answer: Question 4. You want to modify your configuration to ensure that a data source can be detached if a disk cable becomes disconnected. In the Resource Group console, you should__________________ A. enable Availability Tracking B. change the ft_Disk_Failure setting C. configure the system to halt or reboot D. adjust the startups/shutdown sequence Answer: Question 5. Which statement is always true? A. You can stop monitoring an offline or online Resource Group. B. You cannot stop monitoring a Resource Group, unless it is offline. C. If you stop monitoring a Resource Group, it will transition to offline. D. If you enable monitoring a Resource Group, all Resource Group elements will transition to online. Answer: Question 6. Which three are reasons for testing file system data source attachment and detachment on all applicable nodes prior to implementing AAM? (Choose three) A. to ensure that file system mount points exist on all applicable nodes B. to ensure that shared storage devices are properly shared to all applicable nodes. C. to ensure that data sources can be mounted and accessed without error on all applicable nodes. D. To ensure that file system owner usernames or accounts and groups exist on all applicable nodes. E. To ensure that AAM is capable of setting file system permissions correctly on all applicable nodes. Answer: Question 7. An AAM node has detected that it has become isolated, initiated its default isolation script, and rebooted. Which procedure describes AAM behavior on reboot? A. AAM initiates the evaluated isolation network algorithm to determine the appropriate action. B. AAM starts, periodically pinging the verification addresses until it receives a response, and comes online. C. AAM reads the value of the NODE_HALT_ON_REBOOT flag from the configuration database. If the flag is set to zero (false), it starts as normal. D. The AAM default startup includes an isolation check before full initialization. If the node is isolated, it waits periodically pining the isolation addresses until it receives a response, and comes online. Answer: Question 8. What is the purpose of isolation detection? A. to prevent a split-brain scenario from occurring. B. to determine if a remote node is isolated from the domain C. to determine if the Resource Group is isolated from the preferred node. D. to determine if the Network Interface Card (NIC) is isolated when using NIC-NIC failover. Answer: Question 9. Which statement is true about node aliases? A. The node alias must be defined as an alias in DNS. B. For a node alias to be activated, ip limit must be set to at least two. C. The node alias will register the server service on a Windows node. D. The node alias IP address must be in the local/etc/host file when activated on a UNIX node. Answer: Question 10. Which two statements are true about the AAM isolation detection feature? (choose two) A. All agents are responsible for isolation detection. B. Only primary agents are responsible for isolation detection. C. If, within half of the minimum detection time, no heartbeats are received, a ping is sent to each isolation address. D. If, within half of the minimum detection time, no heartbeats are received, a ping is sent across the verification line. Answer: Question 11. For which three tasks is the ft agent process responsible? (choose three) A. monitoring heart beating B. performing name resolution C. handling management requests D. starting the other agent processes E. maintaining a copy of the replicated database F. managing the existence and response monitors Answer: Question 12. Which two statements accurately describe the Command Line interface (CLI)? (Choose two) A. It is convenient for executing commands from scripts. B. Extra debugging capabilities are enabled if it is run on a domain node. C. It provides the only means for performing certain diagnostic commands. D. If no agents are running in the domain, its diagnostic commands allow for determining the cause of failure. Answer: Question 13. Which three methods should you use to test Resource Group failover? A. manually relocate the Resource Group B. power off the node hosting the Resource Group C. remove a Network interface Card (NIC) from a NIC Group D. shut down the agent on the node hosting the Resource Group E. set Process Will Be Restarted Up To one and stop a managed process that is contained in the Resource Group. Answer: Question 14. You have a two-node domain on which there are two networks, both of which are configured as domain lines. To test the configuration prior to going into production, you have assigned private IP address. The systems are now ready to go into production and the base IP address of the two Network interface Cards (NIC) are changed. Which scenario is true? A. The isolation detection feature of the product will be disabled because the source IP addresses are no longer valid. B. The next time the systems are restarted, AAM will auto-detect the changed IP addresses and both NICs will continue to be used as domain lines. C. The configuration should be backed up, then the software re-installed with the new IP addresses. After the agent is restarted, the configuration should be restored. D. The backbone will fail to start because it cannot communicate on either of the networks defined in the sites file. You must first edit the sites file, then restart the backbone. Answer: Question 15. What should you do to cause the Resource Group to wait between objects in the startup sequence? A. Insert an event in the startup sequence B. Insert a delay into the startup sequence C. Increase the wait value on the preceding object D. Increase the wait before startup value on the subsequent object. Answer: Question 16. Your AAM domain has been functioning correctly for some time. Its failover functionality has been continually and successfully tested throughout this period. Suddenly, you start to notice strange behavior, inconsistencies are seen in the GUI, the application fails over a number of times for no reason, and you cannot always restart AAM on either node. What might be the cause of this problem? A. The-sites file has been corrupted. B. The nodename of one of the nodes has been changed. C. An AAM port number is being used by another application. D. The base IP address has been changed on one node's public interface. Answer: Question 17. You have installed AAM on two Windows 2000 nodes. When you start the AAM agent software on each node, the state of the Network interface Cards (NICs) on each node rapidly changes from a state of Alive, to a state of No Response. What is the cause of this problem? A. A gateway on the network failed. B. No NIC group tests IPs have been configured. C. You changed the state of the NIC to Unmanaged. D. A subnet address has not been supplied for the NIC group. Answer: Question 18. Which three resource objects can be contained within a Resource Group? (Choose three) A. rule B. process C. IP address D. Utility process E. Network Interface Card (NIC) Answer: Question 19. You are installing the AAM agent and console on a Solaris node. Which two environment variables should be set? (choose two) A. FT_DIR B. FT_SETUP C. FT_DOMAIN D. FT_STARTUP E. FT_CONSOLE Answer: Question 20. Which two features of an AAM domain help prevent split-brain problems (network partition) (choose two) A. verification line B. secondary agents C. network path testing D. additional domain lines E. ft Failure Policy environment variable. Answer:
|
Question 1. Which choice is a valid stereotype for a record? A. Array B. CSV C. ExternalType D. Form Answer: A Question 2. ProgramAcalls ProgramB. Both programs access a relational database. What is the primary difference between the EGL system variables sqlLib.sqlData and sysVar.sqlData? A. sqlLib.sqlData and sysVar.sqlData are interchangeable and always have the same values. B. sqlLib.sqlData contains all the available information from the SQLCA; sysVar.sqlData only contains the SQLCODE. C. The scope ofsysVar.sqlData is local to each program; the scope of sqlLib.sqlData is global so that both ProgramA and ProgramB can access the results of the most recent SQL I/O statement regardless of which program the I/O occurred in. D. There is no system variable namedsqlLib.sqlData. Answer: B Question 3. Which statement demonstrates how to call a DB2 Stored Procedure passing three parameters and returning a result set? A. callstoredProcedureName (parm1, parm2, parm3); B. execute #sql {call storedProcedureName(parm1, parm2, parm3)}; C. openresultSetID with #sql {call storedProcedureName (:parm1, :parm2, :parm3)}; D. The current implementation for EGL only supports calling DB2 Stored Procedures for Insert/Update/Delete. Answer: B Question 4. Which EGL statement demonstrates the correct way to initialize a dynamic array of integers so that the first element has the value 3? A. myArray INT =3; B. myArray INT[] =3; C. myArray INT[3]; D. myArray INT[3] =3; Answer: C Question 5. Which EGL move statement is valid? A. move RECORDA to RECORDBbyByte; B. move RECORDA to RECORDBbyPosition; C. move RECORDA to RECORDB withVAGenCompat; D. move RECORDA to RECORDB for INDEX1 to INDEX2; Answer: A Question 6. What is the BEST technique to retrieve SQL data in the situation where there might be hundreds of rows that satisfy the criteria for the WHERE clause? A. An open statement with themultipleRows option B. An open statement followed by a loop of get next statements to retrieve all the rows C. A get statement with implicit SQL to retrieve all the rows into a dynamic array D. A get statement with a customized SQL WHERE clause and set boundaries for the retrieve using the SQL BETWEEN predicate Answer: C Question 7. Which choice is ONLY supported in generated COBOL programs? A. DL/I access B. Text forms C. BIRT reports D. eliminatesystemdependentcode build descriptor option Question 8. Which statement is true about the linkage options part? A. ThecallLink element provides details on how a call statement is to be implemented when calling a particular program, but has no effect on generation for the called program. B. ThefileLink element provides details on whether to use remote MQ queues. C. ThetransferToProgram element provides details on how a transfer to program statement is to be implemented when transferring control to a particular program. D. ThetransferToTransaction element provides details on how a transfer to transaction statement is to be implemented when transferring control to a particular transaction in transactional environments such as CICS, but has no effect on generation of programs for nontransactional environments. Answer: B Question 9. An EGL application running in a stateless environment (Web, CICS, or IMS) has presented data to the user for update. What is the BEST way to update an SQL row containing many columns if there is a chance that some other user could change the data? A. Reread the row before the update and ensure all columns are the same as before the data was presented to the user B. Reread the row andcompare some column that is known to be changed on every update (a timestamp, for example) C. Lock the row across the userthink time so no one else can change it D. Just update the row as quickly as possible Answer: A Question 10. Which method is used to create and update code templates? A. click the Windows > Preferences > EGL menu B. pressCtrl+T to bring up a template editor during an EGL edit session C. right-click within an EGLedit session and then click the Create Template option D. add the Template view to any perspective and then use the menus to create or update code templates for this view
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.