Pass4itsure > IBM > IBM Systems: z Systems > C1000-038 > C1000-038 Online Practice Questions and Answers

C1000-038 Online Practice Questions and Answers

Questions 4

A client has a production data center and disaster recovery data center separated by more than 300 km.

What level of recovery can they achieve by using GDPS/GM (Global Mirror)?

A. RPO = 0, RTO = 0

B. RPO = 0, RTO > 0

C. RPO > 0, RTO = 0

D. RPO > 0, RTO > 0

Buy Now
Questions 5

A client from the banking industry operates its IBM Z environment in two data centers with a database of 10 kilometers (6.2 miles). Each data center has one IBM z14 and one DS8K storage system, which are PPRC enabled.

Due to regulations, this client has the need to implement a near-continuous availability solution including long-distance disaster recovery for a new-to-build third site with a new third storage system.

Which of the following solutions satisfies the requirements?

A. GDPS Metro Global Mirror

B. GDPS Metro HyperSwap Manager

C. GDPS Metro Global – XRC

D. GDPS Global – GM

Buy Now
Questions 6

Why are IBM Db2 z/OS customers uniquely positioned to take advantage of hybrid transactional and analytical processing (HTAP)?

A. They can leverage high-value, sensitive data in a security-rich environment with the IBM Db2 Analytics Accelerator.

B. They can use IBM Open Data Analytics for z/OS to securely combine data and insight from sources other than IBM Z.

C. They can easily scale with Db2 for z/OS Machine Learning.

D. They can use IBM Query Management Facility (QMF) to reliably optimize IBM Z data sources.

Buy Now
Questions 7

What can a general purpose CP on the LinuxONE Rockhopper II or Emperor II be used for?

A. IBM Db2 Analytics Accelerator (IDAA)

B. Geographically Dispersed Parallel Sysplex (GDPS)

C. Secure Service Container (SSC)

D. Dynamic Provision Manager (DPM)

Buy Now
Questions 8

A client with a fully depreciated production zBC12 would like to upgrade to a z14 ZR1 of equal capacity. At the same time, they would complete a data center move to a location across the country requiring minimal downtime.

Which of the following would typically be the most economical way to migrate them from the zBC12 to the z14 ZR1, accommodating the data center move while providing the least amount of downtime?

A. Purchase a net new z14 ZR1 for installation in the new data center.

B. MES the zBC12 to a z14 ZR1 located in the new data center.

C. MES zBC12 to z14 ZR1 in the current location; then move the z14 ZR1 to the new location.

D. Perform a Migration Offering from zBC12 to the z14 ZR1 in the new data center.

Buy Now
Questions 9

A customer purchased a new z14 3906-M02. They want the ability to add temporary CP capacity on short notice for a spike in production work.

What authorization feature should be configured?

A. OOCoD

B. CPE

C. CBU

D. CDP

Buy Now
Questions 10

A security administrator would like to know more details about Coupling Facility Encryption. Their main concern is with Coupling Facility CPU overhead once encryption has been implemented.

Which ICF overhead consideration is associated with Coupling Facility Encryption?

A. Overhead is dependent on the number and type of structures to be encrypted.

B. Encryption is z/OS based and will not impact Coupling Facility overhead.

C. A Pervasive Encryption assessment can determine the overhead.

D. Once ICA links are implemented, overhead will not be impacted.

Buy Now
Questions 11

What is the maximum amount of memory and IFLs on a LinuxONE Rockhopper II?

A. 8TB memory and 30 IFLs

B. 3TB memory and 15 IFLs

C. 2TB memory and 10 IFLs

D. 4TB memory and 20 IFLs

Buy Now
Questions 12

An account you cover has received media attention. A disgruntled administrator had root access to a Linux x86 financial server, altered the boot process, and deactivated all of the security measures. The result was that highly sensitive data was stolen.

The account security directory would like to meet with you to determine if IBM Z has a solution that would prevent this from happening again.

Which IBM Z solution will prevent this type of breach?

A. Activate Integrated Cryptographic Service Facility (ICSF) along with the secure crypto coprocessor using AES keys.

B. Enable Pervasive Encryption to protect system data sets.

C. Implement the combination of RACF, z/VM, and zSecure products.

D. Use Secure Service Container to build, deploy, and manage a systems appliance.

Buy Now
Questions 13

A customer starts using z/OS Encryption Readiness Technology (zERT) to gather knowledge about the state of encrypted network traffic in their system. They also use Sysplex Distributor, so there is TLS-encrypted traffic routed through the distributor systems to application hosts. The distributor systems also host TLS-encrypted TN3270 services for the network.

They started gathering data from the Sysplex Distributor hosts, since encrypted traffic is routed through those systems. A large number of encrypted TCP sessions seem to be missing from the customer's analysis.

What does the customer need to do to gather full analysis data?

A. Start gathering zERT data on all z/OS systems in their environment.

B. Configure the zERT collection correctly on the Sysplex Distributor hosts.

C. Move the collection of data to the z/OS application data hosts.

D. Move the collection of data to the network routers neighboring the z/OS systems.

Buy Now
Exam Code: C1000-038
Exam Name: IBM z14 Technical Sales
Last Update: Apr 15, 2024
Questions: 44
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$45.99

VCE

$49.99

PDF + VCE

$59.99