Which of the following solutions satisfies the requirements?

A client from the banking industry operates its IBM Z environment in two data centers with a database of 10 kilometers (6.2 miles). Each data center has one IBM z14 and one DS8K storage system, which are PPRC enabled. Due to regulations, this client has the need to implement a...

January 1, 2020 No Comments READ MORE +

How is the concept of Pervasive Encryption a potential solution to address the concern?

A z/OS customer is concerned about complying with privacy rules. How is the concept of Pervasive Encryption a potential solution to address the concern?A . It is implemented without application or database changes.B . It is implemented by only requiring database changes.C . It is implemented by requiring application changes.D...

December 28, 2019 No Comments READ MORE +

What customer records are required to quickly assess system performance in a z/OS environment?

What customer records are required to quickly assess system performance in a z/OS environment?A . RMF report showing FICON channel statisticsB . Network TCP recordsC . SCRT recordsD . SMF type 70 and 113 recordsView AnswerAnswer: D

December 27, 2019 No Comments READ MORE +

As it relates to Pervasive Encryption, which of the following statements most accurately counters this Intel-centric claim?

Intel marketing argues that their chip-based encryption is equivalent to IBM Z Systems capability. As it relates to Pervasive Encryption, which of the following statements most accurately counters this Intel-centric claim?A . Coupling IBM Pervasive Encryption with Intel encryption is sufficient as Intel exploitation requires no application changesB . Intel...

December 27, 2019 No Comments READ MORE +

How will the pricing be based through Resourcelink tables?

A customer has a new z14 and would like Container Pricing for the z/OS system based on their monthly usage. How will the pricing be based through Resourcelink tables?A . MIPSB . LSPRC . ITRRD . MSUView AnswerAnswer: D

December 25, 2019 No Comments READ MORE +

What level of recovery can they achieve by using GDPS/GM (Global Mirror)?

A client has a production data center and disaster recovery data center separated by more than 300 km. What level of recovery can they achieve by using GDPS/GM (Global Mirror)?A . RPO = 0, RTO = 0B . RPO = 0, RTO > 0C . RPO > 0, RTO =...

December 23, 2019 No Comments READ MORE +

This question requires that you evaluate the underlined text to determine if it is correct. Authorization is the process of verifying a user's credentials.

This question requires that you evaluate the underlined text to determine if it is correct. Authorization is the process of verifying a user's credentials. Instructions: Review the underlined text If it makes the statement correct, select "No change is needed." If the statement is incorrect, select the answer choice that...

December 23, 2019 No Comments READ MORE +

Which groups of native features are managed by the IFP?

The IBM z14 has an Integrated Firmware Processor (IFP), which is used to manage native PCle features. Which groups of native features are managed by the IFP?A . zHyperlink Express, zEDC, FICON Express 16sB . Coupling Express LR, RoCE Express2, ICA SRC . Crypto Express, zEDC, Flash ExpressD . zEDC,...

December 22, 2019 No Comments READ MORE +