Download IBM.C9030-644.PassGuide.2019-02-26.65q.vcex

Download Exam

File Info

Exam IBM z Systems Technical Support V7
Number C9030-644
File Name IBM.C9030-644.PassGuide.2019-02-26.65q.vcex
Size 327 KB
Posted Feb 26, 2019
Download IBM.C9030-644.PassGuide.2019-02-26.65q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%






Demo Questions

Question 1

Which of the following is the most critical factor of a Parallel Sysplex across multiple sites?


  1. Coordinated Timing Network (CTN)
  2. Sysplex Distributor
  3. Network bandwidth
  4. Network latency
Correct answer: A
Explanation:
GDPS is a multi-site or single-site end to end application availability solution that provides the capability to manage remote copy configuration and storage subsystems (including IBM TotalStorage Enterprise Storage Server), to automate Parallel Sysplex operation tasks and perform failure recovery from a single point of control. A Coordinated Timing Network (CTN) is a collection of servers and Coupling Facilities that are time synchronized to a time value called Coordinated Server Time. STP (Server Time Protocol) introduces the concept of a Coordinated Timing Network (CTN), to meet two key goals of System z customers:Concurrent migration from an existing External Time Reference (ETR) network to a timing network using STP. Capability of servers that cannot support STP to be synchronized in the same network as servers that support STP (z9 EC, z9 BC, z990, z890) References: System z Parallel Sysplex Best Practices (January 2011)https://www-03.ibm.com/systems/z/advantages/gdps/faqs.html
GDPS is a multi-site or single-site end to end application availability solution that provides the capability to manage remote copy configuration and storage subsystems (including IBM TotalStorage Enterprise Storage Server), to automate Parallel Sysplex operation tasks and perform failure recovery from a single point of control. 
A Coordinated Timing Network (CTN) is a collection of servers and Coupling Facilities that are time synchronized to a time value called Coordinated Server Time. 
STP (Server Time Protocol) introduces the concept of a Coordinated Timing Network (CTN), to meet two key goals of System z customers:
Concurrent migration from an existing External Time Reference (ETR) network to a timing network using STP. 
Capability of servers that cannot support STP to be synchronized in the same network as servers that support STP (z9 EC, z9 BC, z990, z890) 
References: System z Parallel Sysplex Best Practices (January 2011)
https://www-03.ibm.com/systems/z/advantages/gdps/faqs.html



Question 2

A banking customer is running a Parallel Sysplex with two z13 systems. Each server is configured with 100 CPs, 20 zllPs, 10 ICFs and 11 IFLs. 
Both systems are currently running over 85% utilization business-critical workloads. The customer needs additional capacity for future growth. 
Which solution will prevent a negative impact to the business?


  1. Upgrade the systems sequentially.
  2. Apply CoD processors to the systems.
  3. Perform a concurrent upgrade.
  4. Add a third machine to the sysplex.
Correct answer: D
Explanation:
Parallel Sysplex Advantages include incremental, granular growth with near linear scalability. With IBM's Parallel Sysplex technology, you can harness the power of up to 32 z/OS systems, yet make these systems behave like a single, logical computing facility. Incorrect Answers:B: On/Off Capacity on Demand (On/Off CoD) -This offering allows you to temporarily add additional capacity or specialty engines due to seasonal activities, period-end requirements, peaks in workload, or application testing. References: https://www-03.ibm.com/systems/z/advantages/pso/
Parallel Sysplex Advantages include incremental, granular growth with near linear scalability. With IBM's Parallel Sysplex technology, you can harness the power of up to 32 z/OS systems, yet make these systems behave like a single, logical computing facility. 
Incorrect Answers:
B: On/Off Capacity on Demand (On/Off CoD) -
This offering allows you to temporarily add additional capacity or specialty engines due to seasonal activities, period-end requirements, peaks in workload, or application testing. 
References: https://www-03.ibm.com/systems/z/advantages/pso/



Question 3

A customer is planning to use a z13s with two CPC drawers as an external coupling facility. 
What is the maximum number of Internal Coupling Facility (ICF) processors that can be used?


  1. 12
  2. 20
  3. 10
  4. 24
Correct answer: C
Explanation:
Processor Unit Summary Listed below are the minimums and maximums of processor units (PUs) that may be purchased permanently.     References: https://www-01.ibm.com/common/ssi/ShowDoc.wss?docURL=/common/ssi/rep_sm/1/877/ENUS2965-_h01/index.html&lang=en&request_locale=en
Processor Unit Summary 
Listed below are the minimums and maximums of processor units (PUs) that may be purchased permanently. 
  
References: https://www-01.ibm.com/common/ssi/ShowDoc.wss?docURL=/common/ssi/rep_sm/1/877/ENUS2965-_h01/index.html&lang=en&request_locale=en



Question 4

An existing IBM z Systems client is concerned about the associated monthly software license costs. The client’s own preliminary analysis suggested they can save money by off-loading workloads from their z Systems to x86 servers. The client is willing to work with IBM and they agreed to host an on-site workshop to discuss the matter. 
Which is the most suitable resource needed to demonstrate to the client they might be making the wrong choice?


  1. The Cloud Center of Excellence Team
  2. The Tiger Team
  3. The Oracle Center of Competency Team
  4. The Eagle Team
Correct answer: D
Explanation:
Since 2007, the Eagle Team has worked with hundreds of customers, around the world, helping them examine the cost differences between System z and distributed options. Incorrect Answers:C: The IBM security tiger team was created to: 1. Articulate and sell IBM security solutions to "C-level" executives. In other words, align security solutions to business initiatives. 2. Cut across IBM brands. Tiger team members have deep knowledge of IBM security solutions from ISS, Rational, Tivoli, Websphere, etc. The focus is on customer needs rather than internal IBM organizational boundaries. 3. Act as security advocates within IBM.References: ftp://ftp.software.ibm.com/software/os/systemz/summit/handouts/Track_1_Collateral_-_Eagle_FAQs_Version_1A.pdfhttps://www.csoonline.com/article/2236493/cisco-subnet/ibm-s-security--tiger-team-.html
Since 2007, the Eagle Team has worked with hundreds of customers, around the world, helping them examine the cost differences between System z and distributed options. 
Incorrect Answers:
C: The IBM security tiger team was created to: 1. Articulate and sell IBM security solutions to "C-level" executives. In other words, align security solutions to business initiatives. 2. Cut across IBM brands. Tiger team members have deep knowledge of IBM security solutions from ISS, Rational, Tivoli, Websphere, etc. The focus is on customer needs rather than internal IBM organizational boundaries. 3. Act as security advocates within IBM.
References: ftp://ftp.software.ibm.com/software/os/systemz/summit/handouts/Track_1_Collateral_-_Eagle_FAQs_Version_1A.pdf
https://www.csoonline.com/article/2236493/cisco-subnet/ibm-s-security--tiger-team-.html



Question 5

A customer has a Parallel Sysplex running on LPARs spread across two z13 processors in the same data center location. Each z13 has multiple FICON Express8S channel paths to one shared DS8870 subsystem. 
Which recommendation will improve the resiliency of this environment?


  1. Install a second DS8880 and mirror the data.
  2. Replace the FICON Express8S with FICON Express16S channels.
  3. Implement FICON Dynamic Routing and Forward Error Correction.
  4. Add FICON Directors and Inter-Switch Links to the infrastructure.
Correct answer: C
Explanation:
With the IBM z13 and IBM z13s servers, FICON channels are no longer restricted to the use of static SAN routing policies for ISLs for cascaded FICON directors. The z Systems servers now support dynamic routing in the SAN with the FICON Dynamic Routing (FIDR) feature. References: IBM z13 Technical Guide (May 2016), page 167
With the IBM z13 and IBM z13s servers, FICON channels are no longer restricted to the use of static SAN routing policies for ISLs for cascaded FICON directors. The z Systems servers now support dynamic routing in the SAN with the FICON Dynamic Routing (FIDR) feature. 
References: IBM z13 Technical Guide (May 2016), page 167



Question 6

A customer has a zBC12 running Linux on z Systems under KVM. They learned about IBM Wave and how this tool makes it easier to manage, monitor (real-time), and provision Linux guests on z Systems. 
Which would be the appropriate action to enable them to run IBM Wave?


  1. Enable SIMD on the zBC12.
  2. Upgrade from the zBC12 to a z13s.
  3. Order additional 3 IFLs on the zBC12.
  4. Replace KVM with z/VM.
Correct answer: D
Explanation:
IBM Wave for z/VM is a provisioning and productivity management solution for managing virtual servers with z/VM. The IBM Wave interface provides an innovative approach to the task of managing one or multiple  IBM Z systems . Each system can be configured with one or many z/VM instances that can each run virtual Linux servers. References: https://www.ibm.com/support/knowledgecenter/en/SS6JTX/waveadmin/wave_intro_overview.html
IBM Wave for z/VM is a provisioning and productivity management solution for managing virtual servers with z/VM. 
The IBM Wave interface provides an innovative approach to the task of managing one or multiple  IBM Z systems . Each system can be configured with one or many z/VM instances that can each run virtual Linux servers. 
References: https://www.ibm.com/support/knowledgecenter/en/SS6JTX/waveadmin/wave_intro_overview.html



Question 7

The IBM account has requested an analysis to review a zEC12 upgrade to a z13. 
What analysis tool is required to ensure the z13 machine channels are reviewed to meet the customer’s FICON Express 16S performance requirements?


  1. zPCR
  2. zCP3000
  3. zBNA
  4. zSCON
Correct answer: A
Explanation:
The IBM Processor Capacity Reference for z Systems (zPCR) tool has been changed to support the new z/OS workload categories. Note: Capacity Planning Tool (GA Level) for z13 and zBX Model 4 include zPCR, zTPM, zCP3000, zBNA, zSoftCap, zTPM, zSCON.Incorrect Answers:B: The zCP3000 VM Extract Utility (CP3KVMXT) reads CP Monitor data and generates an Enterprise Data File (EDF) of system and workload related measurements for input into zCP3000. It supports VM running as native or in a partition. It can be used to model interactive VM workloads or workloads under guest operating systems such as Linux.C: IBM z Systems Batch Network Analyzer (zNBA) can be used to analyze client-provided System Management Facilities (SMF) records to identify jobs and data sets that are candidates for zEDC compression, across a specified time window, typically a batch window.D: zSCON is used for OEM Server Consolidation onto System z.
The IBM Processor Capacity Reference for z Systems (zPCR) tool has been changed to support the new z/OS workload categories. 
Note: Capacity Planning Tool (GA Level) for z13 and zBX Model 4 include zPCR, zTPM, zCP3000, zBNA, zSoftCap, zTPM, zSCON.
Incorrect Answers:
B: The zCP3000 VM Extract Utility (CP3KVMXT) reads CP Monitor data and generates an Enterprise Data File (EDF) of system and workload related measurements for input into zCP3000. It supports VM running as native or in a partition. It can be used to model interactive VM workloads or workloads under guest operating systems such as Linux.
C: IBM z Systems Batch Network Analyzer (zNBA) can be used to analyze client-provided System Management Facilities (SMF) records to identify jobs and data sets that are candidates for zEDC compression, across a specified time window, typically a batch window.
D: zSCON is used for OEM Server Consolidation onto System z.



Question 8

You are leading a planning meeting for a disaster recovery (DR) test when a high-level company executive drops in to ask why the company should spend so much time and money on disaster recovery. 
What is the most accurate response to this non-technical question?


  1. A company should plan for business resiliency because it doesn’t want to fail a tax audit.
  2. A company should plan for business resiliency to address future growth.
  3. A company should plan for business resiliency due to the risk of fraud.
  4. A company should plan for business resiliency in light of the (actual or potential) money that could be lost in case of an outage.
Correct answer: D



Question 9

Which functionality provides a high speed networking link for sharing data using server-to-server communications, at low latency, and with lower CPU overhead than traditional TCP/IP communications?


  1. SMC-R
  2. zEDC
  3. OSA Express5S
  4. High performance FICON
Correct answer: A
Explanation:
With SMC-R, System z network capability takes a new leap, strengthening performance for sharing data and reducing data transmission network overhead. The new System z® RDMA over Converged Ethernet (RoCE) feature — 10GbE RoCE Express—enables industry-standard RDMA capability on the System z platform. As an RDMA-capable network interface card (RNIC), it can transfer data using direct memory-to-memory communication, reducing the CPU overhead of the networking software stack. SMC-R provides application transparent exploitation of this new RoCE feature reducing the network overhead and latency of data transfers, effectively offering the benefits of optimized network performance across processors. This breakthrough also lowers the CPU cost associated when moving large amounts of data. Incorrect Answers:B: Using the zEnterprise Data Compression (zEDC) enhancements.This enhancement allows storage administrations to exploit zEnterprise data compression (zEDC) for non-VSAM compressed format data sets. Unlike previous compression types, no separate dictionary needs to be created, as zEDC compression hides the dictionary in the data stream. A new dictionary starts in each compression unit. The system can decompress the segment as is. C: OSA-Express is an integrated hardware feature that provides direct connection to clients on local area networks (LANs). The OSA-Express feature plugs into an I/O slot just like a channel card. Fiber-optic cable connects the OSA-Express feature to the network.References: https://www-01.ibm.com/software/network/commserver/SMC/
With SMC-R, System z network capability takes a new leap, strengthening performance for sharing data and reducing data transmission network overhead. The new System z® RDMA over Converged Ethernet (RoCE) feature — 10GbE RoCE Express—enables industry-standard RDMA capability on the System z platform. As an RDMA-capable network interface card (RNIC), it can transfer data using direct memory-to-memory communication, reducing the CPU overhead of the networking software stack. SMC-R provides application transparent exploitation of this new RoCE feature reducing the network overhead and latency of data transfers, effectively offering the benefits of optimized network performance across processors. This breakthrough also lowers the CPU cost associated when moving large amounts of data. 
Incorrect Answers:
B: Using the zEnterprise Data Compression (zEDC) enhancements.
This enhancement allows storage administrations to exploit zEnterprise data compression (zEDC) for non-VSAM compressed format data sets. Unlike previous compression types, no separate dictionary needs to be created, as zEDC compression hides the dictionary in the data stream. A new dictionary starts in each compression unit. The system can decompress the segment as is. 
C: OSA-Express is an integrated hardware feature that provides direct connection to clients on local area networks (LANs). The OSA-Express feature plugs into an I/O slot just like a channel card. Fiber-optic cable connects the OSA-Express feature to the network.
References: https://www-01.ibm.com/software/network/commserver/SMC/



Question 10

Which z/OS function prevents unauthorized alteration of data in memory?


  1. Storage protection key
  2. Resource Management Facility
  3. System Management Facility
  4. Direct Address Translation
Correct answer: A
Explanation:
Storage protection keys cannot be altered by application programs. There is no way, using the storage protection function, for a normal application program (not an authorized program) to protect part of its virtual memory from other parts of the application in the same address space. Note: Mainframe hardware has a storage protection function, which is normally used to prevent unauthorized alteration of storage. Storage protection is also used to prevent unauthorized reading of storage areas, although z/OS protects only small areas of storage this way.Storage protection works on 4K pages. It deals only with real memory, not virtual memory. When a page of virtual memory is copied from disk to a free page in main storage, z/OS also sets an appropriate storage protection key in that page of main storage. Storage protection was much more significant before multiple address spaces came into use. When multiple users and jobs were in a single address space (or in real memory in the days before virtual memory), protecting a user's memory from corruption (or inappropriate data peeking) was critical. With z/OS, the primary protection for each user's memory is the isolation provided by multiple address spaces. References: https://www.ibm.com/support/knowledgecenter/zosbasics/com.ibm.zos.zsecurity/zsecc_066.htm
Storage protection keys cannot be altered by application programs. There is no way, using the storage protection function, for a normal application program (not an authorized program) to protect part of its virtual memory from other parts of the application in the same address space. 
Note: Mainframe hardware has a storage protection function, which is normally used to prevent unauthorized alteration of storage. Storage protection is also used to prevent unauthorized reading of storage areas, although z/OS protects only small areas of storage this way.
Storage protection works on 4K pages. It deals only with real memory, not virtual memory. When a page of virtual memory is copied from disk to a free page in main storage, z/OS also sets an appropriate storage protection key in that page of main storage. 
Storage protection was much more significant before multiple address spaces came into use. When multiple users and jobs were in a single address space (or in real memory in the days before virtual memory), protecting a user's memory from corruption (or inappropriate data peeking) was critical. With z/OS, the primary protection for each user's memory is the isolation provided by multiple address spaces. 
References: https://www.ibm.com/support/knowledgecenter/zosbasics/com.ibm.zos.zsecurity/zsecc_066.htm









CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files