IBM C9030-644 Exam Practice Questions (P. 2)
- Full Access (65 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #6
A customer has a zBC12 running Linux on z Systems under KVM. They learned about IBM Wave and how this tool makes it easier to manage, monitor (real-time), and provision Linux guests on z Systems.
Which would be the appropriate action to enable them to run IBM Wave?
Which would be the appropriate action to enable them to run IBM Wave?
- AEnable SIMD on the zBC12.
- BUpgrade from the zBC12 to a z13s.
- COrder additional 3 IFLs on the zBC12.
- DReplace KVM with z/VM.
Correct Answer:
D
IBM Wave for z/VM is a provisioning and productivity management solution for managing virtual servers with z/VM.
The IBM Wave interface provides an innovative approach to the task of managing one or multiple IBM Z systems . Each system can be configured with one or many z/VM instances that can each run virtual Linux servers.
References:
https://www.ibm.com/support/knowledgecenter/en/SS6JTX/waveadmin/wave_intro_overview.html
D
IBM Wave for z/VM is a provisioning and productivity management solution for managing virtual servers with z/VM.
The IBM Wave interface provides an innovative approach to the task of managing one or multiple IBM Z systems . Each system can be configured with one or many z/VM instances that can each run virtual Linux servers.
References:
https://www.ibm.com/support/knowledgecenter/en/SS6JTX/waveadmin/wave_intro_overview.html
send
light_mode
delete
Question #7
The IBM account has requested an analysis to review a zEC12 upgrade to a z13.
What analysis tool is required to ensure the z13 machine channels are reviewed to meet the customers FICON Express 16S performance requirements?
What analysis tool is required to ensure the z13 machine channels are reviewed to meet the customers FICON Express 16S performance requirements?
- AzPCR
- BzCP3000
- CzBNA
- DzSCON
Correct Answer:
A
The IBM Processor Capacity Reference for z Systems (zPCR) tool has been changed to support the new z/OS workload categories.
Note: Capacity Planning Tool (GA Level) for z13 and zBX Model 4 include zPCR, zTPM, zCP3000, zBNA, zSoftCap, zTPM, zSCON.
Incorrect Answers:
B: The zCP3000 VM Extract Utility (CP3KVMXT) reads CP Monitor data and generates an Enterprise Data File (EDF) of system and workload related measurements for input into zCP3000. It supports VM running as native or in a partition. It can be used to model interactive VM workloads or workloads under guest operating systems such as Linux.
C: IBM z Systems Batch Network Analyzer (zNBA) can be used to analyze client-provided System Management Facilities (SMF) records to identify jobs and data sets that are candidates for zEDC compression, across a specified time window, typically a batch window.
D: zSCON is used for OEM Server Consolidation onto System z.
A
The IBM Processor Capacity Reference for z Systems (zPCR) tool has been changed to support the new z/OS workload categories.
Note: Capacity Planning Tool (GA Level) for z13 and zBX Model 4 include zPCR, zTPM, zCP3000, zBNA, zSoftCap, zTPM, zSCON.
Incorrect Answers:
B: The zCP3000 VM Extract Utility (CP3KVMXT) reads CP Monitor data and generates an Enterprise Data File (EDF) of system and workload related measurements for input into zCP3000. It supports VM running as native or in a partition. It can be used to model interactive VM workloads or workloads under guest operating systems such as Linux.
C: IBM z Systems Batch Network Analyzer (zNBA) can be used to analyze client-provided System Management Facilities (SMF) records to identify jobs and data sets that are candidates for zEDC compression, across a specified time window, typically a batch window.
D: zSCON is used for OEM Server Consolidation onto System z.
send
light_mode
delete
Question #8
You are leading a planning meeting for a disaster recovery (DR) test when a high-level company executive drops in to ask why the company should spend so much time and money on disaster recovery.
What is the most accurate response to this non-technical question?
What is the most accurate response to this non-technical question?
- AA company should plan for business resiliency because it doesn’t want to fail a tax audit.
- BA company should plan for business resiliency to address future growth.
- CA company should plan for business resiliency due to the risk of fraud.
- DA company should plan for business resiliency in light of the (actual or potential) money that could be lost in case of an outage.
Correct Answer:
D
D
send
light_mode
delete
Question #9
Which functionality provides a high speed networking link for sharing data using server-to-server communications, at low latency, and with lower CPU overhead than traditional TCP/IP communications?
- ASMC-R
- BzEDC
- COSA Express5S
- DHigh performance FICON
Correct Answer:
A
With SMC-R, System z network capability takes a new leap, strengthening performance for sharing data and reducing data transmission network overhead. The new System z RDMA over Converged Ethernet (RoCE) feature 10GbE RoCE Expressenables industry-standard RDMA capability on the System z platform. As an RDMA-capable network interface card (RNIC), it can transfer data using direct memory-to-memory communication, reducing the CPU overhead of the networking software stack. SMC-R provides application transparent exploitation of this new RoCE feature reducing the network overhead and latency of data transfers, effectively offering the benefits of optimized network performance across processors. This breakthrough also lowers the CPU cost associated when moving large amounts of data.
Incorrect Answers:
B: Using the zEnterprise Data Compression (zEDC) enhancements.
This enhancement allows storage administrations to exploit zEnterprise data compression (zEDC) for non-VSAM compressed format data sets. Unlike previous compression types, no separate dictionary needs to be created, as zEDC compression hides the dictionary in the data stream. A new dictionary starts in each compression unit. The system can decompress the segment as is.
C: OSA-Express is an integrated hardware feature that provides direct connection to clients on local area networks (LANs). The OSA-Express feature plugs into an I/O slot just like a channel card. Fiber-optic cable connects the OSA-Express feature to the network.
References:
https://www-01.ibm.com/software/network/commserver/SMC/
A
With SMC-R, System z network capability takes a new leap, strengthening performance for sharing data and reducing data transmission network overhead. The new System z RDMA over Converged Ethernet (RoCE) feature 10GbE RoCE Expressenables industry-standard RDMA capability on the System z platform. As an RDMA-capable network interface card (RNIC), it can transfer data using direct memory-to-memory communication, reducing the CPU overhead of the networking software stack. SMC-R provides application transparent exploitation of this new RoCE feature reducing the network overhead and latency of data transfers, effectively offering the benefits of optimized network performance across processors. This breakthrough also lowers the CPU cost associated when moving large amounts of data.
Incorrect Answers:
B: Using the zEnterprise Data Compression (zEDC) enhancements.
This enhancement allows storage administrations to exploit zEnterprise data compression (zEDC) for non-VSAM compressed format data sets. Unlike previous compression types, no separate dictionary needs to be created, as zEDC compression hides the dictionary in the data stream. A new dictionary starts in each compression unit. The system can decompress the segment as is.
C: OSA-Express is an integrated hardware feature that provides direct connection to clients on local area networks (LANs). The OSA-Express feature plugs into an I/O slot just like a channel card. Fiber-optic cable connects the OSA-Express feature to the network.
References:
https://www-01.ibm.com/software/network/commserver/SMC/
send
light_mode
delete
Question #10
Which z/OS function prevents unauthorized alteration of data in memory?
- AStorage protection key
- BResource Management Facility
- CSystem Management Facility
- DDirect Address Translation
Correct Answer:
A
Storage protection keys cannot be altered by application programs. There is no way, using the storage protection function, for a normal application program (not an authorized program) to protect part of its virtual memory from other parts of the application in the same address space.
Note: Mainframe hardware has a storage protection function, which is normally used to prevent unauthorized alteration of storage. Storage protection is also used to prevent unauthorized reading of storage areas, although z/OS protects only small areas of storage this way.
Storage protection works on 4K pages. It deals only with real memory, not virtual memory. When a page of virtual memory is copied from disk to a free page in main storage, z/OS also sets an appropriate storage protection key in that page of main storage.
Storage protection was much more significant before multiple address spaces came into use. When multiple users and jobs were in a single address space (or in real memory in the days before virtual memory), protecting a user's memory from corruption (or inappropriate data peeking) was critical. With z/OS, the primary protection for each user's memory is the isolation provided by multiple address spaces.
References:
https://www.ibm.com/support/knowledgecenter/zosbasics/com.ibm.zos.zsecurity/zsecc_066.htm
A
Storage protection keys cannot be altered by application programs. There is no way, using the storage protection function, for a normal application program (not an authorized program) to protect part of its virtual memory from other parts of the application in the same address space.
Note: Mainframe hardware has a storage protection function, which is normally used to prevent unauthorized alteration of storage. Storage protection is also used to prevent unauthorized reading of storage areas, although z/OS protects only small areas of storage this way.
Storage protection works on 4K pages. It deals only with real memory, not virtual memory. When a page of virtual memory is copied from disk to a free page in main storage, z/OS also sets an appropriate storage protection key in that page of main storage.
Storage protection was much more significant before multiple address spaces came into use. When multiple users and jobs were in a single address space (or in real memory in the days before virtual memory), protecting a user's memory from corruption (or inappropriate data peeking) was critical. With z/OS, the primary protection for each user's memory is the isolation provided by multiple address spaces.
References:
https://www.ibm.com/support/knowledgecenter/zosbasics/com.ibm.zos.zsecurity/zsecc_066.htm
send
light_mode
delete
All Pages