Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

CA Technologies CAT-280 - CA AppLogic r3 Administrator Exam

Page: 2 / 2
Total 50 questions

In which situation would you use a Blacklist mode of discovery?

A.

When the backbone network is dedicated to the Backbone Fabric Controller (BFC)

B.

When the backbone network is shared by more than one BFC

C.

When the BFC is not the only DHCP server on the network

D.

For servers that have not yet had their BIOS configured

In CA AppLogic, a class definition consists of a class descriptor and one or more class volumes. What does a class volume contain?

A.

A reference to a storage Logical Unit Number (LUN)

B.

All the software required to boot and operate an instance of this class

C.

A reference to the IP address or host name of the commodity server on which the object is stored

D.

The characteristics of the appliance as a component, including its inputs, outputs, configuration properties, and their default values and hardware resources

You want to grant a user direct access to a grid controller without having to use the grid shell. To do this, you will need to create the user and modify the access control list (ACL) to access the grid object. During this procedure, which action do you need to perform for the sshkey= “ ” attribute?

A.

Populate the attribute with the user’s public key when you run the user create command.

B.

Populate the attribute with the user’s private key when you run the user create command and do no more.

C.

Populate the attribute with the user’s private key and set a root password on the grid controller to allow remote access.

D.

Populate the attribute on the Active Directory/Lightweight Directory Access Protocol (LDAP) server with the user’s public key.

Which statement about CA AppLogic applications is TRUE?

A.

They are secondary entities and must be combined with other components to run as end-to-end services.

B.

They are multi-system objects that require multiple components to run them as a distributed application.

C.

They are hardware dependent and normally contain references to hardware such as servers, IP addresses, and host names.

D.

They are complete N-tier virtual business services, which include everything, from firewalls to data sources, needed to provision the service to a customer.

Which statement about CA AppLogic abstraction and virtualization is TRUE?

A.

CA AppLogic virtualizes direct access to peripheral devices, such as tape drives.

B.

For each type of virtual resource, there are several scalable, system wide resource pools.

C.

CA AppLogic virtualizes access to two types of peripheral devices: block storage devices and serial ports.

D.

CA AppLogic abstracts hardware into three different types of virtual resources: virtual volumes, virtual network interfaces, and compute.