Due to recent data protection legislation, your client has asked how to protect the integrity of their z/OS audit records.
What system function should be recommended?
A. Pervasive Encryption
B. zSecure Audit
C. Crypto Express adapter
D. Signed SMF data
What customer records are required to quickly assess system performance in a z/OS environment?
A. RMF report showing FICON channel statistics
B. Network TCP records
C. SCRT records
D. SMF type 70 and 113 records
A client is concerned about their x86 database I/O response time. Further analysis reveals significant I/O wait delay.
How is the IBM Z architecture better equipped than the x86 architecture to address this specific issue?
A. It leverages the VRIO (Vector I/O) to control I/O wait.
B. It leverages the I/O subsystem to manager I/O wait.
C. It leverages the VIO (Virtual I/O) to eliminate I/O wait.
D. It leverages zIIP processors to speed-up I/O wait.
What is needed to enable dataset encryption for z/OS?
A. CPACF, Crypto coprocessor, and Secure Container levels
B. Crypto coprocessor, HCD, and RACF levels
C. Crypto coprocessor, CPACF, and RACF levels
D. CPACF, Crypto coprocessor, and ICSF levels
Prior to shipping a new IBM Z system or an upgrade, which is listed in the Designated Product List for a Pre-Sale and Pre-Install Expert Level TDA, what is necessary?
A. Option A
B. Option B
C. Option C
D. Option D
A customer is interested in IBM LinuxONE as a platform for their new cloud-based application infrastructure. A sizing exercise has shown that one LinuxONE Emperor II machine (in LM2 configuration) is sufficient for their expected workload, but the customer is concerned about putting all the application workload on a single frame.
Which set of LinuxONE features can the technical specialist remind the customer about, to help to relieve their concern?
A. RAIM memory, Capacity on Demand, SIMD
B. Processor sparing, I/O redundancy, RAIM memory
C. Processor sparing, SIMD, CPACF
D. CPACF, I/O redundancy, Capacity on Demand
What is the maximum amount of memory and IFLs on a LinuxONE Rockhopper II?
A. 8TB memory and 30 IFLs
B. 3TB memory and 15 IFLs
C. 2TB memory and 10 IFLs
D. 4TB memory and 20 IFLs
What is Pervasive Encryption running z/OS on IBM Z?
A. Encryption of only data in-flight
B. Encryption of data in-flight and at-rest
C. Encryption of all types of data on IBM Z
D. Encryption of only data at-rest
Which solution will affect the ability of the business to continue to run if a disaster should strike?
A. On/Off Capacity on Demand (OOCoD)
B. Capacity for Planned Event (CPE)
C. Customer Initiated Upgrade (CIU)
D. Capacity Backup (CBU)
A customer starts using z/OS Encryption Readiness Technology (zERT) to gather knowledge about the state of encrypted network traffic in their system. They also use Sysplex Distributor, so there is TLS-encrypted traffic routed through the distributor systems to application hosts. The distributor systems also host TLS-encrypted TN3270 services for the network.
They started gathering data from the Sysplex Distributor hosts, since encrypted traffic is routed through those systems. A large number of encrypted TCP sessions seem to be missing from the customer's analysis.
What does the customer need to do to gather full analysis data?
A. Start gathering zERT data on all z/OS systems in their environment.
B. Configure the zERT collection correctly on the Sysplex Distributor hosts.
C. Move the collection of data to the z/OS application data hosts.
D. Move the collection of data to the network routers neighboring the z/OS systems.