logo

CuriousTab

CuriousTab

Discussion


Home Certification IBM Certification Comments

  • Question
  • What help ensure that the XIV Systems cache does not become a bottleneck?


  • Options
  • A. central cache locking mechanism
  • B. use of industry standard chip technology
  • C. each module is responsible for caching the data in that module
  • D. having all modules understand what is held cache at all times

  • Correct Answer
  • each module is responsible for caching the data in that module 


  • IBM Certification problems


    Search Results


    • 1. Explain Given the following SQL statement: GRANT REFERENCES ON TABLE tab1 TO USER usera.Which of the following describes what USERA is allowed to do?

    • Options
    • A. Create a read?only view using TAB1.
    • B. Alter TAB1 to add a check constraint.
    • C. Define a primary key or unique constraint on TAB1.
    • D. Define a dependent table where TAB1 is the parent.
    • Discuss
    • 2. What are the advantages of fragmentation?

    • Options
    • A. reduced disk space requirements
    • B. higher availability
    • C. finer granularity of archives and resources
    • D. parallel scans are possible with PDQ
    • Discuss
    • 3. Suppose a customer is attempting to determine what failed during the last boot sequence of the Linux partition. Which of the following can be used to determine the error condition?

    • Options
    • A. /var/log/messages
    • B. /proc/startup
    • C. /usr/sbin/log
    • D. /etc/boot
    • Discuss
    • 4. Suppose a System z customer has a new CIO. The CIO is concerned about continuing operations and recovery following a catastrophe.Which of the following addresses this issue?

    • Options
    • A. GDPS
    • B. TAM
    • C. DR
    • D. WASS
    • Discuss
    • 5. Which statement correctly changes the next extent size?

    • Options
    • A. ALTER TABLE customer MODIFY NEXT SIZE 300
    • B. ALTER TABLE customer MODIFY NEXT EXTENT SIZE 300
    • C. ALTER TABLE customer MODIFY EXTENT SIZE 300
    • D. ALTER TABLE customer NEXT SIZE 300
    • Discuss
    • 6. Which of the following can be kept in memory when the DB2 configuration parameter KEEPFENCED is enabled?

    • Options
    • A. SQLDAS after their cursor is closed.
    • B. Referential integrity maps after a join.
    • C. Stored procedure processes after they are run.
    • D. Tables after they have been read into the buffer pool.
    • Discuss
    • 7. Which of the following commands will allow a Linux on iSeries administrator to quickly scan backup tapes for files saved via a tar command on a Linux system?

    • Options
    • A. The Linux command mt
    • B. The Linux command cpio
    • C. The OS/400 command RST option(*print)
    • D. The OS/400 command DSPTAP option(*savrst)
    • Discuss
    • 8. What is a requirement to connect a V6R1 IBM i host to an XIV Storage System?

    • Options
    • A. XIV firmware V10.0.8
    • B. Host Attachment Kit V1.0.1
    • C. SAN Volume Controller (SVC)V4.2
    • D. Virtual I/O Server (VIOS) V2.1.1
    • Discuss
    • 9. A VM/VSE customer wants to implement a WAS on an existing zSeries server. On which of the following operating environments would WAS best be implemented?

    • Options
    • A. VSE
    • B. z/VM
    • C. z/OS
    • D. Linux
    • Discuss
    • 10. How To improve system redundancy using its grid architecture, where in the XIV System can a partition be mirrored?

    • Options
    • A. on same disk in different modules
    • B. on disks in other modules
    • C. on different disks in the same module
    • D. on same disk, in same module, and in different modules
    • Discuss


    Comments

    There are no comments.

Enter a new Comment