When planning a new disk unit to populate the reserved 16U space on a z14 ZR1, what could prevent installation?
A. 8U minimum and two power cords
B. Weight and power consumption
C. Height and maximum capacity
D. 6U minimum and Flash
Why are IBM Db2 z/OS customers uniquely positioned to take advantage of hybrid transactional and analytical processing (HTAP)?
A. They can leverage high-value, sensitive data in a security-rich environment with the IBM Db2 Analytics Accelerator.
B. They can use IBM Open Data Analytics for z/OS to securely combine data and insight from sources other than IBM Z.
C. They can easily scale with Db2 for z/OS Machine Learning.
D. They can use IBM Query Management Facility (QMF) to reliably optimize IBM Z data sources.
What can a general purpose CP on the LinuxONE Rockhopper II or Emperor II be used for?
A. IBM Db2 Analytics Accelerator (IDAA)
B. Geographically Dispersed Parallel Sysplex (GDPS)
C. Secure Service Container (SSC)
D. Dynamic Provision Manager (DPM)
A potential client has never had any exposure to IBM Z architecture. You were told that the client is working on a project to deploy a non-structured type database into x86 servers as part of a cloud offering.
Which components of the database as a service solution should be presented to this future client?
A. LinuxONE, Linux, and MySQL DB
B. LinuxONE, Linux, and Db2 DB
C. LinuxONE, Linux, and Oracle DB
D. LinuxONE, Linux, and Mongo DB
A customer purchased a z14 M02 (two drawer) 710 with 1TB of active memory and 2TB of pre-planned memory installed. They are planning for the release of a new product which will require, for several days, additional processor and memory capacity. They have a CIU (Customer Initiated Upgrade) contract already in place.
Utilizing CIU and OOCoD (On Off Capacity On Demand), which of the following options will satisfy the customer's requirement?
A. Temporarily activate twice the amount of owned processor capacity that is present but not characterized in the two drawers, and purchase increments of the pre-planned memory up to the amount that is present in the two drawers.
B. Temporarily activate all of the additional processor capacity that is present but not characterized in the two drawers, and purchase increments of the pre-planned memory up to the amount that is present in
the two drawers.
C. Temporarily activate all of the processor capacity that is present but not characterized in the two drawers, and temporarily add all the additional pre-panned memory increments up to the amount of that is present in the two drawers.
D. Temporarily activate twice the amount of owned processor capacity that is present but not characterized in the two drawers, and temporarily add up to twice the amount of the active memory using the pre-planned memory in the two drawers.
What IBM Z technology can be used to securely deploy application services using IBM Cloud Private, without having to change the application code to exploit the secure environment?
A. CPACF with Crypto Express
B. TKE Workstation
C. Crypto Express
D. Secure Service Container
A security administrator would like to know more details about Coupling Facility Encryption. Their main concern is with Coupling Facility CPU overhead once encryption has been implemented.
Which ICF overhead consideration is associated with Coupling Facility Encryption?
A. Overhead is dependent on the number and type of structures to be encrypted.
B. Encryption is z/OS based and will not impact Coupling Facility overhead.
C. A Pervasive Encryption assessment can determine the overhead.
D. Once ICA links are implemented, overhead will not be impacted.
A customer currently owns a z13s. The customer decides to purchase a z14 ZR1 and connect it to the z13s in a Parallel Sysplex. The two IBM Z machines will be 200 meters apart.
Which sysplex connectivity proposal is correct?
A. Add ICA SR links to the z13s and order ICA SR on the z14 ZR1.
B. Add IFB 1X links to the z13s and order CE LR links on the z14 ZR1.
C. Add IFB 1X links to the z13s and order IFB 1X links on the z14 ZR1.
D. Add CE LR links to the z13s and order CE LR links on the z14 ZR1.
A customer with a z14 has FICON16S+ defined as native FICON wants to optimize the execution of requests to their Storage DS88XX device.
Which technology should be implemented for optimizing the Channel?
A. CPACF
B. zHPF
C. SCSI
D. FCTC
A customer starts using z/OS Encryption Readiness Technology (zERT) to gather knowledge about the state of encrypted network traffic in their system. They also use Sysplex Distributor, so there is TLS-encrypted traffic routed through the distributor systems to application hosts. The distributor systems also host TLS-encrypted TN3270 services for the network.
They started gathering data from the Sysplex Distributor hosts, since encrypted traffic is routed through those systems. A large number of encrypted TCP sessions seem to be missing from the customer's analysis.
What does the customer need to do to gather full analysis data?
A. Start gathering zERT data on all z/OS systems in their environment.
B. Configure the zERT collection correctly on the Sysplex Distributor hosts.
C. Move the collection of data to the z/OS application data hosts.
D. Move the collection of data to the network routers neighboring the z/OS systems.