Need Computer or IT support at your small business?

Pass4sure | Get Certified Pass4sure A4040-129 Exam Prep. - csj.cc

Real Exam Questions and Answers of A4040-129

Updated A4040-129 Q&A @ Killexams

Complete examcollection is provided Here   |   View [DL] Article Home

A4040-129 - Accessment: IBM i 7.1 Administration - Real Exam Questions

Vendor Name IBM
Exam Code A4040-129
Exam Name Accessment: IBM i 7.1 Administration
Questions and Answers 164 Q & A
Updated On September 19, 2017
PDF Download Mirror A4040-129 Brain Dump
Get Full Version Killexams A4040-129 Full Version

We have our experts working continuously for the collection of real exam questions of A4040-129. All the pass4sure actual questions and answers of A4040-129 collected by our team are reviewed and updated by our A4040-129 certified team. We remain connected to the candidates appeared in the A4040-129 test to get their reviews about the A4040-129 test, we collect A4040-129 exam tips and tricks, their experience about the techniques used in the real A4040-129 exam, the mistakes they done in the real test and then improve our material accordingly. Once you go through our pass4sure practice test containing questions and answers, you will feel confident about all the topics of test and feel that your knowledge has been greatly improved. These pass4sure questions and answers are not just practice qustions, these are real exam questions and answers that are enough to pass the A4040-129 exam at first attempt.

IBM certifications are highly required across IT organizations. HR managers prefer candidates who not only have an understanding of the topic, but having completed certification exams in the subject. All the IBM certifications provided on csj.cc are accepted worldwide. We are trusted A4040-129 practice test provider containing actual questions.

Are you looking for pass4sure real exams questions and answers for the IBM Accessment: IBM i 7.1 Administration exam practice? csj.cc is here to provide you one most updated and quality sources that is Killexams.com. They have compiled a database of questions from actual exams in order to let you prepare and pass A4040-129 exam on the first attempt. All training materials on the killexams.com site are up to date and verified by industry experts.

Why Killexams.com is the Ultimate choice of A4040-129 Practice Test for certification preparation?

1. A quality product that Help You Prepare for Your Exam with actual questions :

csj.cc provide access to Killexams.com which is the ultimate preparation source for passing the IBM A4040-129 exam. We have carefully complied and assembled real exam questions and answers and made A4040-129 practice test, which are updated with the same frequency as real exam is updaed, and reviewed by industry experts. Our IBM certified experts from multiple organizations are talented and qualified / certified individuals who have reviewed each question and answer and explanation section in order to help you understand the concept and pass the IBM exam. The best way to prepare A4040-129 exam is not reading a text book, but taking practice test with real questions and understanding the correct answers. Practice questions help prepare you for not only the concepts, but also the method in which questions and answer options are presented during the real exam.

2. User Friendly Mobile Device Access:

Killexams provide extremely user friendly access to Killexams.com products. The focus of the website is to provide accurate, updated, and to the point material to help you study and pass the Accessment: IBM i 7.1 Administration. You can quickly get the real questions and answer database. The site is mobile friendly to allow study anywhere, as long as you have internet connection. You can just load the PDF in mobile and study anywhere.

3. Access the Most Recent Accessment: IBM i 7.1 Administration Real Questions & Answers:

Our Exam databases are regularly updated throughout the year to include the latest real questions and answers from the IBM A4040-129 exam. Having Accurate, authentic and current real exam questions, you will pass your exam on the first try!

4. Our Pass4sure Materials Are Verified by Killexams.com Industry Experts:

We are doing struggle to providing you with accurate Accessment: IBM i 7.1 Administration exam questions & answers, along with explanations. We make the value of your time and money, that is why every question and answer on csj.cc has been verified by IBM certified experts. They are highly qualified and certified individuals, who have many years of professional experience related to the IBM exams.

5. csj.cc Provide all Killexams.com Exam Questions and Include Detailed Answers with Explanations:

Unlike many other exam prep websites, Killexams.com provides not only updated actual IBM A4040-129 exam questions, but also detailed answers, explanations and diagrams. This is important to help the candidate not only understand the correct answer, but also details about the options that were incorrect.

Benefits of Preminus Access to Exam Materials

The csj.cc team has worked directly with Killexams.com experts to provide you with the actual questions and answers from the latest syllabus of the IBM A4040-129 exam. Real Questions are provided for the most effective way of preparing for certification exams. Premium access to exams offers several benefits, such as:

1. Print A4040-129 Exam Questions in High Quality

The Killexams.com team understands that many people preparing for certification are not always in front of a computer or internet. Additionally, some may prefer to prepare for their A4040-129 exam from printed notes. We provide the file that can be used on any device and instantly print a copy of the IBM A4040-129 questions and answers. Simply log into your My Account, Download PDF version and Print.


2. A4040-129 Exam Simulator
A4040-129 Exam Simulator is best preparation tool for your A4040-129 exam. It provide the same way that you will come across in realA4040-129 exam. It asks you all the questions, in random way, to check if you are fully prepared for the exam. All the explanations and references are provided with exhibits and images.

3. No Captcha
With Killexams.com Preminum access, there is no captcha or verification code. We capture no data relevant to the user.

4. No subscriptions
Our Premium access is a one-time payment, there are no further auto subscriptions involved in the process. You get premium access for 3 months, 6 months and 1 year, whichever suits you. Our system does not extend the validity and access until you choose to extend by your self and pay by yourself.

5. Review Sample A4040-129 exam Questions Before You Buy
Killexams.com lets you see exactly how the A4040-129 questions and answers are provided, prior to any purchase. This allows your the ability to see real examples from the Accessment: IBM i 7.1 Administration question database and how the explanation section works.

6. Continuous Improvement in the test preparation process
By purchasing premium access, you are will also support and contribute to the improvement test contents. We always welcome the feedback of candidates sit in the test in order for new candidates to prepare according to updated pattern.

How to Get Premium Access:
After you have previewed the sample A4040-129 exam questions for free, choose which certification exam you want to access and and pass. Click Buy Now and Checkout from the CART, Complete the payment process and you will receive an email with your auto generated username and password. All purchased exams will be available instantly after purchase.

Money Back Guarantee:
Killexams.com with the help of csj.cc is dedicated to provide top quality A4040-129 exam preparation materials to help you succeed in passing your A4040-129 exam and earning IBM certification. The Killexams.com site compiles real exam questions from recent tests to bring you the best material to prepare the IBM A4040-129 exam. The test questions database is continuously updated in order to provide the most Authentic, accurate and updated resource. Premium access for the IBM A4040-129 exam offers full access to IBM real questions and answers that are ultimately needed for you to get good marks in the A4040-129 exam. If you are unable to pass the IBM A4040-129 exam, and have purchases the A4040-129 exam, csj.cc will provide you another exam of your choice, absolutely FREE or Full Money Back, whichever you ask. In order to use this offer, simply contact our support team and request the new exam or refund, whichever you would like to claim. You will need to provide the scanned copy of your A4040-129 exam result card.

Read more Details »

Customer Reviews about A4040-129

Testimonials Here   |   View Vendors, Tracks Home

A4040-129 - Accessment: IBM i 7.1 Administration - Reviews

Our customers are always happy to give their reviews about the exams. Most of them are our permanent users. They do not rely on others except our team and they get exam confidence by using our questions and answers and exam simulator.

Are there authentic resources for A4040-129 study guides?

Killexams is an accurate indicator for a students and users capability to work and study for the A4040-129 exam. It is an accurate indication of their ability, especially with tests taken shortly before commencing their academic study for the A4040-129 exam. Killexams provides a reliable up to date. The A4040-129 tests give a thorough picture of candidates ability and skills.

These A4040-129 Actual Questions works in the real test.

Great coverage of A4040-129 exam concepts, so I learned exactly what I needed during the A4040-129 exam. I highly recommend this training from Killexams to everyone planning to take the A4040-129 exam.

These A4040-129 Actual Questions works in the real test.

I could undoubtedly deal with 93% marks in the end of the exam, as numerous inquiries were like the adviser for me. Much appreciated to the Killexams. I had a weight from office to split the exam A4040-129. However, I was stressed over taking a decent planning in little time. At that point, the Killexams Q&A aide showed up as a windfall for me, with its simple and short replies.

How to prepare for A4040-129 exam?

Your A4040-129 mock test papers helped me a lot in an organised and well structured preparation for the exam. Thanks to you I scored 90%. The explanation given for each answer in the mock test is so good that it gave the real revision effect to study material.

Surprised to see A4040-129 real questions!

The best preparation I have ever experienced. I took many A4040-129 certification exams, but A4040-129 turned out to be the easiest one thanks to Killexams. I have recently discovered this website and wish I knew about it a few years ago. Would have saved me a lot of sleepless nights and grey hair! The A4040-129 exam is not an easy one, especially its latest version. But the A4040-129 Q and A includes the latest questions, daily updates, and these are absolutely authentic and valid questions. Im convinced this is true cause I got most of them during my exam. I got an excellent score and thank Killexams to making A4040-129 exam stress-free.

Do you need Latest Braindumps of A4040-129 exam to pass the exam?

This exam preparation bundle included the questions I was asked at the exam - something I didnt believe could be possible. So the stuff they provide is absolutely valid. It seems to be frequently updated to keep up with the official updates made to A4040-129 exam. Very good quality, the testing engine runs smoothly and is very user friendly. Theres nothing I dont like about it.

Do a smart move, prepare these A4040-129 Questions and Answers.

Killexams materials cover every aspect of A4040-129 , around which the A4040-129 exam is built. So if youre new to it, this is a must. I needed to step up my understanding of A4040-129 qa has helped me a lot. I passed the A4040-129 exam thanks to Killexams and have been recommending it to my friends and colleagues.

Found an accurate source for real A4040-129 Latest Braindumps.

Passed the A4040-129 exam with 99% marks. Excellent! considering only 15 days preparation time. All credit goes to the Question & Answer by Killexams. Its amazing material made preparation so easy that I could even understand the hard topics at ease. Thanks a lot, Killexams for providing us such an easy and effective study guide. Hope your team keep on creating more of such guides for other IT certification tests.

I am very happy with A4040-129 exam guide.

There is not much A4040-129 exam materials out there, so I went ahead and purchased these A4040-129 questions and answers. Honestly, it won my heart with the way the information is organized. And yeah, thats right: most questions I saw on the exam were exactly what was provided by Killexams. Im relieved to have passed A4040-129 exam.

Great source of great Latest Braindumps, accurate answers.

Well, I did it and I can not believe it. I could never have passed the A4040-129 without your help. My score was so high I was amazed at my performance. Its just because of you. Thank you very much!!!

Read more Details »

Latest Exams added

Recently Updated Here   |   View Vendors, Latest Home

Latest Real Exam Questions and Answers Added to Killexams.com

We keep our visitors and customers updated regarding the latest technology certifications by providing reliable and authentic exam preparation material. Our team remain busy in updating A4040-129 exam training material as well as reviewing the real exam changes. They try best to provide each and every relevant information about the test for the candidate to get good marks and come out of test center happily.

1Z0-453 | 210-250 | 300-210 | 500-205 | 500-210 | 70-765 | 9A0-409 | C2010-555 | C2090-136 | C9010-260 | C9010-262 | C9020-560 | C9020-568 | C9050-042 | C9050-548 | C9050-549 | C9510-819 | C9520-911 | C9520-923 | C9520-928 | C9520-929 | C9550-512 | CPIM-BSP | C_TADM70_73 | C_TB1200_92 | C_TBW60_74 | C_TPLM22_64 | C_TPLM50_95 | DNDNS-200 | DSDPS-200 | E20-562 | E20-624 | E_HANABW151 | E_HANAINS151 | JN0-1330 | JN0-346 | JN0-661 | MA0-104 | MB2-711 | NSE6 | OMG-OCRES-A300 | P5050-031 |

Read more Details »

See more dumps

Direct Downloads Here   |   View Vendors, Latest Home

Real Exam Questions and Answers of exams

Here are some exams that you can explore by clicking the link below. There are thousands of exams that we provide to our candidates covering almost all the areas of certifications. Prepare our Questions and Answers and you will Pass4sure.

ST0-085 | HP0-Y38 | HP0-S30 | 599-01 | SCNS-EN | 9A0-090 | 000-004 | EX0-107 | HP2-E26 | HH0-210 | 000-289 | P2020-795 | CCBA | 050-649 | 9L0-607 | HH0-380 | RH302 | F50-521 | HP0-T01 | ST0-149 | PMBOK-5th | 9A0-084 | ADM-211 | HP0-J24 | 000-N18 | 77-602 | 000-M245 | SCNP-EN | HP0-G11 | 646-392 | E20-365 | C2090-012 | HP2-Z29 | 920-247 | HP0-M31 | HP0-390 | 9A0-090 | E20-559 | 310-879 | PRINCE2-Practitioner | HP0-S15 | JK0-U31 | CHHE | 350-022 | MK0-201 | C90-02A | 000-667 | COG-645 | HP2-K33 | 351-018 |

Read more Details »

Top of the list Vendors

Certification Vendors Here   |   View Exams, Latest Home

Industry Leading Vendors

Top notch vendors that dominate the entire world market by their technology and experties. We try to cover almost all the technology vendors and their certification areas so that our customers and visitors obtain all the information about test at one place.

PTCB | Certification-Board | Wonderlic | Juniper | ACSM | Siemens | ExtremeNetworks | ISM | Hospitality | LSI | Banking | ECCouncil | LPI | Business-Objects | LSAT | GRE | Business-Tests | Nortel | Alfresco | NVIDIA | Symantec | ACT | PRMIA | Apple | APC | Network-General | Huawei | iSQI | RES | BlackBerry | Cognos | Liferay | AIIM | F5-Networks | Oracle | Zend | IFPUG | Quality-Assurance | CIW | Isilon | SASInstitute | Amazon | GIAC | RedHat | Alcatel-Lucent | Genesys | Legato | HDI | PMI | CA-Technologies |

Read more Details »

Sample Real Exam Questions/Answers

Certification Vendors Here   |   View Exams, Latest Home

A4040-129 Demo and Sample

Note: Answers are below each question.
Samples are taken from full version.

A4040-129

QUESTION: 1

A batch job runs daily in the QBATCH subsystem with a run priority of 50. The job normally takes anhour to complete and no other batch jobs run during this time. The administrator needs to reduce the run time and requests the run priority be lowered to

40. However1 after the change, run time does not decrease. What is the likely reason that the run time did not decrease?


  1. The run priority applies to only interactive jobs.

  2. D82 Symmetric Multiprocessing has not been installed.

  3. The run priority represents only the relative importance of the job.

  4. The system value QPFRADJ (PerformanceAdjustment) is set to “No adjustment.”


Answer: C


QUESTION: 2

Which graphical tool will help identity additional details about activity on the system, to isolate the root cause of performance problems?


  1. PEX

  2. iDoctor

  3. Performance Monitor

  4. Communications Trace


Answer: B


QUESTION: 3

The threshold limit has been reached for the system ASP on a system running IBM i 7.1 . There are some disk units configured to a user ASP available. Business continuing policy prevents the administrator from stopping the system. How could the system administrator correct the storage problem in the system ASP?


  1. Increase the ASP threshold above the currently utilized storage.

  2. Concurrently remove available disk units from user ASP using the “Remove units from configuration” SST option and add them to system ASP.

  3. Switch to the backup system using an HA solution and restart the original system to DST. Remove the available disk units from user ASP and add them to system ASP.

  4. Initiate a control panel function 21 to activate DST on the system console for the affected partition. Use the DST feature to compress the parity stripe to increase available storage.


Answer: B

QUESTION: 4

An administrator needs to restore a physical file DATALIB/SMALLFILE from aSave 21 backup of library DATALIB. DATALIB has several hundred large database files plus other objects. The administrator has the job log and output from the last full save of DATALIB. What should the administrator do to restore SMALLFILE in the shortesttime?


  1. Run the RST command for object “/QSYS.LIB/DATALIB.LIB/SMALLFILE.FILE”

  2. Delete SMALLFILE, run RSTLIB specifying *NEW objects, and specify library DATALIB as the starting library.

  3. Run RSTLIB for library DATALIB specifying the position parameter for SMALLFILE in library DATALIB from the output of the save.

  4. Run RSTOBJ for DATALIB/SMALLFILE specifying the position and sequence number for SMALLFILE in library DATALIB from the output of the save.


Answer: D


QUESTION: 5

What are the keybenefits provided by database journaling?


  1. Can send updates concurrently to a second system Can back out incomplete transactions Can reduce system I/O workload

  2. Can reduce application complexity Can back out incomplete transactions Can maintain database integrity in the case of an unexpected outage

  3. Can send updates concurrently to a second system Can increase performance Can maintain database integrity in the case of an unexpected outage

  4. Can send updates concurrently to a second system

Can backout incomplete transactions and commitment control

Can maintain database integrity in the case of an unexpected outage


Answer: D


QUESTION: 6

Journaling of a large library is running on SYSTEMA and the journal is system managed. Remote journaling to SYSTEMB has been configured. Due to a communications problem between SYSTEMA and SYSTEMB, remote journaling is not working and cannot be quickly restarted. Disk utilization on SYSTEMA is increasing rapidly. To reduce disk utilization the administrator tries to delete journal receivers on SYSTEMA. Attempts fail and the following message displays: CPF705F: Receiver not replicated to 1 remote journals. What must the administrator do to delete journal receivers on SYSTEMA?


  1. Delete and recreate only thejournal, and then delete the receivers.

  2. Stop journaling, as this must be ended first, and then delete the receivers.

  3. Use the DLTJRNRCV command and change the delete option parameter to ignore target

    receivers.

  4. Use the CHGJRN command to change theManage Receivers parameter to allow user management of journal receivers and then delete the receivers.


Answer: C


QUESTION: 7

Due to an application problem, management has requested the IPL of a partition running IBM i 7.1. The administrator initiates the IPL, and during the restart phase notices the IPL is running in manual mode even though the HMC partition settings indicate B NORMAL. Why is the IPL running in manual mode?


  1. The PWRDWNSYS command restart parameter is set to *MANUAL.

  2. Manual isthe default IPL mode when there is a console problem.

  3. The QIPLTYPE system value is set to “Attended IPL, Console in debug mode”.

  4. Manual is the default IPL mode when the previous system end indicator is abnormal.


Answer: C


QUESTION: 8

An administrator has been asked to update an IBM i 7.1 system to the most current Technology Refresh available from IBM. Which method is the most appropriate to achieve the update?


  1. Perform a D-mode IPL using the Technology Group PTF package SF99707.

  2. Perform aslip install using the most current 1_Base_01 resave media available.

  3. Perform a scratch install using the most current 1_Base_01 resave media available.

  4. Perform an install of the Technology Group PTF package SF99707 using the GO PTF menu.


Answer: D


QUESTION: 9

A company has just purchased a new POWER7 server running IBM i 7.1 to replace an older system running V5R4M5. Due to a mistake by a programmer on the V5R4 system, data was accidently deleted. To recover, the administrator backs up the deleted data to virtual tape on the 7.1 server and attempts to restore it on the V5R4 server. The restore on the V5R4 server fails with a message stating the data was saved from a more recent release of the operating system. Which option will solve this problem?


  1. Save the data to physical media.

  2. Set the target release parameter to V5R4M0 when saving the data.

  3. ETP the virtual tape image catalog from the 7.1 server using binary mode.

  4. Use the target release parameter *RECOVER and the access path parameter set to VSR4MO.


Answer: B


QUESTION: 10

A disaster recovery test is being performed, using backups from a production system. The backup process is as follows:

Full system save, using GO SAVE Option 21, for weekly backup

SAVCHGOBJ LIB(*ALL) isused for daily library backup, in addition to DLO and IFS saves The disaster recovery test is at the point where libraries are ready to be restored Which pair of actions will restore the libraries to the most recent save point, in the minimum amount of time?


  1. Use RSTLIB(*NONSYS) to restore all libraries and object from the SAVE 21 weekly save. For each daily tape, run a RSTLIB for each library saved by SAVCHGOBJ.

  2. Use RSTLIB(*NONSYS) to restore all libraries and object from the SAVE 21 weekly save. Then run a RSTOBJ for each library saved by SAVCHGOBJ on the most recent daily tape.

  3. Run RSTOBJ for each library saved by SAVCHGOBJ on the most recent daily tape. Then run RSTLIB(*NONSYS) OPTION(*NEW) to restore the remaining libraries and objects from the SAVE 21 weekly save.

  4. For each daily tape, run RSTOBJ for each library saved by SAVCHGOBJ on the daily tapes.

Then run RSTOBJ(*NONSYS) OPTION(*NEW) to restore the remaining libraries and objects from the SAVE 21 weekly save.


Answer: B


QUESTION: 11

An administrator maintains four image catalogs on a host partition that are used by network- based virtual optical drives. Periodically, images are added or removed from the catalog and it must be re-exported. What is the simplest method to update the share and NES export?


  1. Create a CL program.

  2. Create a REXX program.

  3. Create a Qshell script.

  4. Run the statements manually as needed.


Answer: B

QUESTION: 12

Which statement describes server firmware delivery that uses PTF5 on a POWER7 system?


  1. A single IBM i (57703S1) PTF is ordered to update server firmware.

  2. The firmware is ordered using the marker PTF ID, such as MHxxxxx, and is installed with normal IBM i PTE commands.

  3. The server firmware PTE (MFxxxxx) is ordered from the connected HMC and is sent to the service partition for install.

  4. The HIPER PTF group is ordered for the Licensed Internal Code (5770999) and the order is flagged with Include Firmware Update *YES.


Answer: A


QUESTION: 13

A Power 720 currently has its firmwareupdate policy set to Os Managed. Which statement is correct?


  1. Server firmware updates will always be disruptive.

  2. IPLing from the A side of any partition will activate the new server firmware.

  3. Only the Service partition needs PTEs to be installed for the new server firmware to be immediately activated.

  4. Only the Managing partition needs PTF5 to be installed for the new server firmware to be temporarily activated.


Answer: B


QUESTION: 14

A customer is upgrading an HMC to a new release using Recovery DVD5 for the new release level. Which action must be completed before performing the upgrade from DVD process?


  1. Run the ‘HMC Management>Back Up HMC Data’ to DVD.

  2. Run the ‘HMC Management> Save Upgrade Data’ to HMC disk.

  3. Run the ‘HMC Management> Back Up HMC Data’ to NFS server.

  4. Run the ‘HMC Management> Save Upgrade Data’ to the administrator’s PC.


Answer: B


QUESTION: 15

Several IBM i partitions at a customer site provide outdated contact information to IBM

when problems are reported. Which command should be used to correct the contact information?


  1. CHGSVCCFG

  2. CHGCNTINF

  3. SNDSRVRQS *UPD

  4. WRKCNTINE, option 2


Answer: D


QUESTION: 16

In the Work With Shared Pools panel shown, what is the meaning of the "Minimum" column under the "Size" section?


image


  1. The minimum amount of main storage that can be assigned to the pool in GB

  2. The minimum percentage of the total main storage that can be assigned to the pool

  3. The minimum amount of main storage that the automatic tuner will assign to the pool in GB

  4. The minimum percentage of the total main storage that the automatic tuner will assign to the pool


Answer: D


QUESTION: 17

A company has acquired anew system to handle data warehousing workload, but its IP address has not yet been added to the DNS server. The administrator added an lP address for this system into host table entry of the local system. When attempting to connect using the host name, the connection fails. Using the IP address to connect works normally. What will resolve this issue?


  1. Add the gateway IP address to the local host table.

  2. Set the name resolution to *LOCAL on the TCP/IP Domain screen.

  3. Set the name resolution to *RMTONLY on the TCP/IP Domain screen.

  4. Specify the fully qualified name of the remote system when attempting to communicate with it.


Answer: B


QUESTION: 18

An administrator needs to determine the level of firmware running on an IBM i 7.1 system. How isthis done?


  1. Using the DSPFMWSTS command. The firmware levels on the system are presented in the resulting display.

  2. In DST/SST start the Hardware Service Manager. Use P16 to print the hardware configuration. The active firmware level is provided in the report heading.

  3. In DST/SST start the Hardware Service Manager. Select “Packaging Hardware Resources” option. The firmware level is displayed in the heading of the resulting panel.

  4. In Operations Navigator, right-click on the system and select “Properties.” On the resulting panel, click the “Service” tab. The firmware level is on the resulting panel.


Answer: A


QUESTION: 19

An administrator has been asked to install the following PTF packages from DVD. SF99710 Cumulative PTF Package SF99627Electronic Service Agent Group SF99707 Technology Refresh SF99708 Group Security SF99709 Group HIPER

Using Option 8 (Install Program Temporary Fix Package) on the GO PTF menu, how can the administrator install all of the above PTFs in the shortest possible time?


  1. Install all packages as a multiple volume PTF set.

  2. Install SF99710 Cumulative PTF Package as it contains all of the other PTFs.

  3. Load and permanently apply the cumulative package followed by each of the group PTFs.

  4. Install theTechnology Refresh first, IPL, then install the remaining packages as a group.


Answer: A


QUESTION: 20

Which special authorities are required to allow a user to change user profiles on a system with QSECURITY set to 40?


  1. *ALLOBJ

    *OBJMGT

  2. *SECADM

    *ALLOBJ

  3. *SECADM

    *OBJMGT

  4. *SECADM

*SER VICE


Answer: B


QUESTION: 21

An application vendor has shipped a save file with the source member for a new program. The administrator restored the new source member into the existing source file, but when checking the source file after the restore discovered that all of the previous source members were missing. Which parameter of the Restore Object (RSTOBJ) command would have allowed the administrator to restore the new member without losing the existing members?


  1. MBROPT *NEW

  2. FRCOBJCVN *NO

  3. ALWOBJDIE *FILEVL

  4. FILEMBR (*NAME *NEW)


Answer: A


QUESTION: 22

Which command will help an administrator to find the IBM i Navigator jobs?


  1. WRKJOB TYPE(*PJ)

  2. WRKJOB JOB(QZRCSRVS)

  3. WPKACTJOBJOB(*REMOTE)

  4. WRKUSRJOB USER(*CENTRAL)


Answer: B


QUESTION: 23

After an abnormal IPL, jobs that are accessing some files for the first time are spending an extended amount of time in a status of “IDX” and are taking longer to complete.

Which command should be used to enable all pending access path rebuilds to be analyzed, prioritized, and immediately executed rather than waiting for first access?


  1. WRKEFD

  2. EDTRBDAP

  3. WRKAPSTS

  4. WRKJOBAP


Answer: B


QUESTION: 24

Consider the followinggraphic. Where in System i Navigator Management Central are the message monitors configured?

image


  1. Message

  2. Commands

  3. Extreme Support

  4. Collection Services


Answer: A


QUESTION: 25

After installing IBM i 7.1 on a brand new system, only the QSECOFR user profile can login on the system console. The administrator copied the QSECOFR profile into a new user profile. When attempting to login with the new user profile, the following error is displayed: “CPF1110 not authorized to work station.” What iscausing the error?


  1. The DST Console type was not set during installation of the Os.

  2. The QLMT5ECOFR system value is set to require explicit device access.

  3. The limit device session parameter (LMTDEV55N) on the new user profile is set to tYE5.

  4. The system does not allow automatic workstation device creation for users with

*ALLOBJ authority.


Answer: B


QUESTION: 26

An administrator issues the WRKSYSACT command on a system partition using dedicated processors and the following result displays: Current processing capacity 2

What does the current processing capacity value indicate?


  1. The percentage of CPU currently available for system jobs.

  2. The share of the physical processors in the pool it is running.

  3. The number of processing units currently assigned to the partition.

  4. The number of virtual processors that are currently active in the partition.


Answer: C


QUESTION: 27

An administrator needs to upgrade their Flexible Service Processor’s (FSP) firmware for an HMC managed Power 720. They are currently running AL730_085. The latest corrective service on Fix Central is AL730_1 12_092. Which statement is correct regarding the installation of this corrective service package?


  1. Since this is an HMC managed FSP, the installation of thecorrective service will be concurrent.

  2. Since the FSP will remain at the same 730 code stream level the installation of the corrective service will be concurrent.

  3. Since the 092 is greater than the currently running 085 fix pack level, the installation of the corrective service will be disruptive.

  4. Since the 112 is greater than the currently running 085 fix pack level, the installation of the corrective service will be disruptive.


Answer: C


QUESTION: 28

On an HMC-managed system with severalpartitions, the QSECOFR password for DST/SST has been disabled for one partition. No other profiles for DST/SST are known. What procedure will reset the password to the shipped value?

  1. Sign on to the partition as QSECOFR, issue the CHGDSTPWD PASSWORD(*DEFAULT) command.

  2. Use the function in the HMC for “Users and Groups” to modify the partition’s DST password.

  3. Use the control panel function 21 from the HMC user interface to reset the SST/DST password.

  4. Connect to ASMI, use the “admin” profile to reset the DST password of the affected partition.


Answer: A


QUESTION: 29

Which command will save the access paths for Iwo physical files (PFLE1, PFILE2) when both the physical and dependent logical file (LFILE) reside in the same library?


  1. SAVOBJ(LFILE) PATH(*YES)

  2. SAVOBJ OBJ(LFILE) ACCPTH(*YES)

  3. SAVOBJ OBJ(PFILE1 PFILE2) ACCPTH(*YES)

  4. SAVACCPATH FILE(PFILE1 PFILE2) ACCPATH(*YES)


Answer: C


QUESTION: 30

An administrator needs to upgrade users’ IBM i Access for Windows emulators to use Secure Sockets Layer (SSL) protocol. The administrator used the Microsoft Windows administrator account to complete a successful upgrade and subsequent test. After re- booting the Windows PC, users log in using their ID. When users launch the IBM i Accessemulator and log into the IBM i server, the emulator session is not SSL secured, even after the successful installation. What is most likely cause of the problem?


  1. The Windows client IP address is being blocked by the exit point QIBM_SSL_DEVINIT.

  2. The IBM i Access for Windows emulator shortcut for users’ desktops were not configured for SSL.

  3. The IBM i Access for Windows emulator supports SSL only when run from a Windows administrator account.

  4. The Windows client has been assigned a new IPaddress from the DHCP server which is not registered with the System i SSL server.


Answer: B

QUESTION: 31

An administrator needs to identify which jobs are creating short CPU and disk arm usage spikes. The administrator also needs to determine what the job(s) are doing as soon as possible during or after a spike occurs. Which tool is most appropriate to use to assist with this activity?


  1. IBM i Performance Explorer (PEX)

  2. IBM i Performance Management Agent

  3. IBM System Director Navigator for i

  4. System i Navigator Management Central monitors


Answer: D


QUESTION: 32

A system administrator is restoring a saved library LIBA on the same system where it was saved several months ago, using the RSTLIB command with the Allow Object Differences (ALWOBJDIE) parameter set to *ALL.

The original library LIBA has changed since it was last saved. Several original files now have different authorization lists, and many new objects have been added. After the restore, the administrator observed that some restored files have two versions, FILEx and FILEx0001. Which setting of the ALWOBJDIF parameter will avoid this problem?


  1. *MATCH

  2. *MBRLVL

  3. *FILELVL

  4. *COMPATIBLE


Answer: D


QUESTION: 33

An administrator has prepared an update package containingthe prescribed groups and HIPER PTF5. When testing the package, a message is received stating some of the PTEs cannot be applied because others are missing. What is the most efficient approach to accomplish a successful test?


  1. Apply the latest technology refresh.

  2. Apply the latest cumulative fix package.

  3. Inspect the job log for the missing PTFs.

  4. Read the PSP for cumulative updates for missing PTFs.


Answer: C

QUESTION: 34

An administrator with an HMC managed POWER7 system needs to performa concurrent update to server firmware. Which co-requisites and/or prerequisites should the administrator consider as part of the planning process?


  1. Available flash storage on the system FSP

  2. IBM i, Licensed Internal Code PTE5, and HMC code level

  3. Ability’ of the HMC to attach to the Internet and the IBM Support ETP site for the download

  4. Service window to place the system partitions into restricted state and perform a platform IPL


Answer: B


QUESTION: 35

A customer needs to upgrade from IBM i5.4 to 7.1 . The current system is used extensively for Web serving. Extensive database activity is performed in SQL. Which factor will affect the time to perform the upgrade of the operating system?


  1. The ES Type must convert during the IBM i upgrade.

  2. The DB2 referential constraints must be manually reestablished.

  3. Some database joins must be reformatted to be compliant with new SQL standards.

  4. The logical file access paths must be rebuilt into Encoded Vector Indexes (EVI).


Answer: C


QUESTION: 36

An administrator needs to install third party software into an iASP environment. The installation is failing when the program provided by the software company attempts to create and restore library objects. What is the most efficient wayfor the administrator to install the software while maintaining the command integrity of the system?


  1. Copy the software libraries into the system ASP Then create duplicate objects into the iASP Remove the new commands when the installation completes

  2. Create a copy of the CRTLIB and RSTLIB commands, which include the iASP name, into a library that is placed first in the system portion of the library list

    Remove the new commands when the installation completes

  3. Create a copy of the CRTLIB and RSTLIB commands, which include the ASP name, into a different library Then add that library to the user portion of the library list Remove the new commands when the installation completes

  4. Create a copy of the CRTLIB and RSTLIB commands, which include the ASP name, in a different library Then add that library to the install portion of the library list

Remove the new commands when the installation completes


Answer: B


QUESTION: 37

An administrator needs to analyze performance data that has been collected. The Performance Tools temporary key has expired. How can the system administrator analyze the performance data?


  1. Adjust the QDATE system value to the day before the temporary key expired. Then rerun the performance analysis.

  2. On another system with a valid Performance Tools key, enter the command STPPERDDM to use DDM to remotely connect to the system to be evaluated.

  3. Start performance collection using System i Navigator, save the collection library and restore it to another system with a valid Performance Tools key.

  4. Start performance collection using the PM400 tab in System i Navigator and click ‘yes’ when prompted to send the data to IBM. Then review IBM’s analysis online.


Answer: C


QUESTION: 38

An administrator has successfully completedinstalling the current cumulative PTF package, most recent Technology Refresh level, plus multiple group PTEs Due to time constraints a full system backup cannot be completed, but there is time for a subset of a full system save. Which type of save willcapture the changes made by the PTF and Technology Level installation?


  1. Save System (SAVSYS)

  2. Save System Data Only (SAVE menu option 22)

  3. Save IBM product data - SAV OBJ((‘/QIBM/ProdData’)(7QOpenSys/QIBM/ProdData’))

  4. Save IBM Libraries, Save Configuration and Security Data - SAVLIB *IBM SAVCFG and SAVSECDTA


Answer: B


QUESTION: 39

A customer has determined that a large table contains a high percentage of deleted records. Attempts to reorganize the table to reclaim the deleted record spaceexceed the available time to keep users locked out. What should the administrator do to reclaim the deleted record space in the available time?

  1. Start the file reorganization with “shared updates.”

    After the reorganization completes, immediately perform a normal reorganization to reclaim the deleted record space.

  2. Start the file reorganization with “allow cancel.”

    After the reorganization completes, at the next outage window perform a reorganization with “reclaim only” to reclaim the deleted record space.

  3. Assure that the file is journaled.

    Start the file reorganization with “reclaim pending” and “shared updates.”

    At the next backup specify “complete physical file reorgs” on the library save to reclaim the space.

  4. Assure that the file is journaled.

Start the file reorganization with “allow cancel” and “shared updates.”

After the reorganization completes, at the next outage window perform a normal reorganization to reclaim the deleted record space.


Answer: D


QUESTION: 40

All IBM-supplied userprofiles and administrators’ profiles in a system have inadvertently been disabled and an administrator needs to regain access into the system. What should the administrator do?


  1. Sign on to the system console as user QSECOFR.

  2. Reinstall the system License Internal Code to reset the QSECOFR profile.

  3. Use Function 21 on the control panel 7 times to reset the QSECOFR profile.

  4. Sign on with any user that has *JOBCTL authority and CALL QIBMSECRST (‘QSECOFR’ *DEFAULT 1).


Answer: A


QUESTION: 41

During a disaster recovery test the restore job abnormally ended. The administrator discovered that 95 of the 200 libraries on the system were restored, including the main database libraries. The remaining libraries represent less than 10% of the system. Which sequence of actions will complete the restore in the minimum amount of time?


  1. Restart the restore with the RSTLIB *NONSYS command with the restore option of

    *NEW to only restore those libraries not already restored. Then continue with the remaining restores DLO, IFS etc

  2. Review the job log of the failed restore to determine why the restore failed

    Restart the restore with the RSTLIB *NONSYS command with a resume point of *LSTRST Then continue with the remaining restores DLO, IFS etc

  3. Review the joblog of the failed restore to determine the point at which the restore failed Perform a clear library for all the user libraries

    Restart the restore using the RSTLIB’NONSYS command Then continue with the remaining restores DLO, IFS etc

  4. Review the joblog of the failed restore to determine the point at which the restore failed Identify the library that was partially restored

Clear the library that was partially restored

Resume the restore using the RSTLIB *NONSYS command and specify the starting library Then continue with the remaining restores DLO, IFS etc


Answer: D


QUESTION: 42

An administrator needs to clear the data from a large number of save files in multiple libraries. The administrator has written a program that displays all of the objectsin a library to an output file. The output file includes:


image


The program reads through all the entries in the file. The administrator needs to insert a statement that will clear the data from save files only. Which command should the administrator use?


  1. IF (&ODOBAT *EQ ‘SAVF’) THEN(CLRSAVE &ODLBNM/&ODOBNM)

  2. IF (&ODOBTP *EQ ‘*SAVF’) THEN(CLRSAVE &ODLBNM/&ODOBNM)

  3. IF (&ODOBTP *EQ ‘*FILE’) THEN(CLRSAVE &ODLBNM/&ODOBNM)

  4. IF (&ODOBAT %LIKE ‘SAVF) THEN(CLRSAVE &ODLBNM/&ODOBNM)


Answer: A


QUESTION: 43

An administrator is restoring an application that contains many IFS directories. The saved application version was saved from another system using the SAV command and has hundreds of unnecessary log files (*.log) spread across its directories andsubdirectories. How can the administrator restore the application directories but omit all files ending with the log extension?


  1. Restore the application using the RST command, specifying LOG(*OMIT).

  2. Restore the application using the RST command, specifying *log in the OMIT parameter

  3. Use the RST command and set the Objects parameter (OBJ) to t.log, with the value “Include or omit” set to *OMIT.

  4. Use the RST command and set the Name Pattern parameter (PATTERN) to t.log, with the value “Include oromit” set to *OMIT.


Answer: D


QUESTION: 44

An audit requires a listing of programs that inherit authority greater than the authority of the submitting user. Which option in the Securely Tools menu will accomplish the task?


  1. Option 21 - Adopting objects

  2. Option 38- Object authority

  3. Option 40 - Program authority

  4. Option 42- User profile authority


Answer: A


QUESTION: 45

An administrator needs to access an IBM i console remotely through the HMC. To which P address should the administratortelnet, using port 2300, to get console access?


  1. To the IP address of the FSP

  2. To the IP address of the HMC

  3. Over SSH to the HMC and then select the 5250 option

  4. To the Service Tools P address of the IBM i partition


Answer: B


QUESTION: 46

The following CL program was created to perform an application backup:


image


The operator later reports that the backup failed and all of the subsystems had to be restarted. What caused the backup to fail?


  1. The backup job was submitted to an inactive subsystem.

  2. The job did not have the correct authority’ to the program.

  3. The JOBD for the submitted job does not have authority to the subsystem

  4. A MONMSG command is required to allow the subsystems to restart after a failed backup.


Answer: A


QUESTION: 47

An administrator has a new, local, IP-based printer that is not communicating with the system. Ping is successful using the printer IP address and the printer name, and response time is acceptable. Users can print from Windows. What should theadministrator do next to troubleshoot the printer?


  1. Verify that there is a route configured to the printer.

  2. Use the TRACEROUTE command to find where the connection fails.

  3. Verify that the printer address is correcting the HOSTS table on the system.

  4. Display the printer device description to confirm that the correct port has been configured.


Answer: D


QUESTION: 48

What are the IBM recommended setup steps for the system audit journal and journal receivers when using library JRNLIB as thesecured library?


  1. CRTJRNRCV JRNRCV(JRNLIB/AUDRCV0001) AUT(*USE) CRTJRN JRN(JRNLIB/QAUDJRN) JRNRCV(JRNLIB/AUDRCVOIJO1) MNGRCV(*SYSTEM) DLTRCV(*YES) AUT (*USE)

  2. CRTJRNRCV JRNRCV(JRNLIB/AUDRCV0001) AUT(*EXCLUDE) CRTJRN JRN(JRNLIB/QAUDJRN) JRNRCV(JRNLIB/AUDRCV0001) MNGRCV(*USER) DLTRCV(*YES) AUT(*USE)

  3. CRTJRNPCV JRNRCV(QSYS/AUDRCV0001) AUT(*FXCLUDE) CRTJRN JRN(QSYS/QAUDJRN) JRNRCV(JRNLIB/AUDRCV0001) MNGRCV(*SYSTEM) DLTRCV(*NO) AUT (*EXCLUDE)

  4. CRTJRNRCV JRNRCV(JRNLIB/AUDRCV0001) AUT(*EXCLUDE) CRTJRN JRN(QSYS/QAUDJRN) JRNRCV(JRNLIB/AUDRCV0001) MNGRCV(*SYSTEM) DLTRCV(*NO) AUT (*EXCLUDE)


Answer: D


QUESTION: 49

A “previous release to current release” system migration is being performed. An application

on the source system manages image files stored inthe IFS, viewed using PCs. The Go Save menu, option 21 (full system save), was used to create the backup tape used in the migration process. After the data is migrated and the new system set up, none of the images are available. Which situation on the source system IFS directory, at the time of the backup, is the most likely cause of the problem?


  1. The “Hidden file” attribute was set to “Yes”

  2. The “Can be saved” attribute was set to “No”.

  3. The “Need to archive (PC)” attribute was set to “Yes”.

  4. The “Need to archive (System)” attribute was set to “No”.


Answer: B


QUESTION: 50

When a subsystem is created using the CRTSBSD command, what is the purpose of the ASP Group (ASPGRP) parameter?


  1. Specifies the name of an Auxiliary Storage Pool (ASP)group that contains the library for the secondary language

  2. Specifies the initial setting for the Auxiliary Storage Pool (ASP) group name for the jobs running in this subsystem description

  3. Specifies the name of an Auxiliary Storage Pool (ASP) group to be included in the library name space of the subsystem monitor job

  4. Specifies the names of the Auxiliary Storage Pool (ASP) groups that may be added to the jobs running in this subsystem description using the SETASPGRP command


Answer: C


QUESTION: 51

Which special authority is required to install PTF5 on a system with the QSECURITY system value set to 40?


  1. *ALLOBJ

  2. *JOBCTL

  3. *SECADM

  4. *IOSYSCFG


Answer: A


QUESTION: 52

Given the output below from the EDTOBJTAUT (Edit Object Authority)command, what

does it mean when the *PUBLIC authority for that object is set to *AUTL?


image


  1. Only the users on the AGILE list can access the object.

  2. The 'PUBLIC object authority is obtained from the AGILE 'PUBLIC authority.

  3. The "PUBLIC objectauthority is the same as the AGILE owner's "PUBLIC authority.

  4. A user with authorization list management permissions has object management permissions


Answer: B


QUESTION: 53

How can an administrator prevent users with *SECADM and *ALLOBJ authorityfrom changing the security related system values?


  1. Using SST set the “Allow system value security changes” parameter to 2 (NO).

  2. Register a custom program which blocks the CHGSYSVAL command to the QIBM_QS V_SECURITY Exit Point.

  3. Change the default for the SYSSECVAL parameter of the Change System Value (CHGSYSVAL) command to *REVOKE.

  4. Run Change Security Attributes (CHGSECA) command with the System value security (SYS VALSEC) parameter set to *NO.


Answer: A


QUESTION: 54

A new IBM i system is being set up as an FTP host for downloads. The administrator sees that the devices connect properly, but the directory commands fail and IFS files cannot be downloaded. What can the administrator do to correct the problem?


  1. Change the FTP server’sinitial name format to *PATH.

  2. Change the file extension so that it is properly translated.

  3. Grant *PEAD authority for the files to the QTFTP user profile.

  4. Change the CCSID of the files from 65535 to the correct number for the region.


Answer: A


QUESTION: 55

An administrator is creating an IBM i 6.1 guest partition on a Power 720 with no expansion units. The host partition is an IBM i 7.1 partition. The system has only one internal DVD, located in the CEO, which is allocated to the host partition. The administrator has configured the partition profile, the client and server vSOSI adapter pair, a network server description and 12 storage spaces. There is no additional optical media device to start the D- mode IPL for this guest partition. What isthe fastest way for the administrator to complete the IBM i 6.1 installation?


  1. Use the existing DVD device that is allocated to the host partition.

  2. Reallocate the DVD device from the host partition to the guest partition.

  3. Configure another vSCSIadapter pair in order to access the existing DVD device.

  4. Convert the 6.1 DVD5 to .iso images, create a virtual optical device and load the iso images to it.


Answer: A


QUESTION: 56

Which tool can be used to report and take various actions on all user profiles with passwords that match the profile name?


  1. ANZDFTPWD

  2. ANZUSRPWD

  3. ANZUSRATR

  4. ANZPRFATR


Answer: A


QUESTION: 57

A customer has been experiencing network issues. When their network switch resets, the

Ethernet line on IBM i fails.What is the correct setting for the line description so that it will continuously retry until the network switch recovers?


  1. RESTART(*YES)

  2. CMNRCYLMT(1 0)

  3. VRYWAIT(*NOWAIT)

  4. THRESHOLD(*NOMAX)


Answer: B


QUESTION: 58

A customer is installing anew POWER7 server with IBM i as the host partition for three additional IBM i partitions. The server has just one 4 port Ethernet card. The administrator needs to achieve IP connectively for all four partitions. What should the administrator do?


  1. Purchase additional Ethernet cards for the client partitions.

  2. Connect each partition to one of the ports on the 4 port Ethernet card.

  3. On the hosting partition, create a bridge using one of the ports of the Ethernet card to a virtual Ethernet network. Connect each of the client partitions to the virtual Ethernet network.

  4. Connect each partition to a virtual network. Configure IP on each client partition to use the host partition as an IP gateway. Add routes to the corporate router pointing to the host partition as the gateway to the client partitions.


Answer: C


QUESTION: 59

What is required of all user profiles that use objects in an independent ASP?


  1. Users must have authority to the ASP device description.

  2. Users must be a member of the groupprofile that owns the ASP.

  3. The ASP group name must be specified in the initial library list.

  4. The users need to be part of the QASPGRP authorization list to allow access.


Answer: A


QUESTION: 60

A customer has applications on multiple IBM i partitions that still use green screen access. The customer needs to configure a menu option that will transfer users from partition A to partition B without requiring them to sign on to partition B. The users have identical user IDs and passwords on all partitions. What should the administrator do to allow the customer

to meet the requirement?


  1. Create a CL program for each user that has their user ID and password embedded in the TELNET command.

  2. Create a CL program for each user that has their user ID and password embedded in the STRPASTHR command.

  3. Configure the APPN connection between the partitions to be a secure connection. Set the System value QRETSVRSEC to “1” on partition A.

  4. Configure the APPC connection between the partitions to be a secure connection. Set the system value QRMTSIGN to *VERIEY on partition B.


Answer: D


QUESTION: 61

What is saved with the SAVSYSINF command?


  1. All security’ data, PTF status, and configuration objects

  2. A subset of the SAVSYS command including PTFsapplied since the last SAVSYS

  3. Network attributes, IP configuration, hosts table, routes, and line descriptions

  4. System values, network attributes, IPL attributes, job schedule entries, and cleanup settings


Answer: B


QUESTION: 62

What is the meaning of the highest schedule priority (PTYLMT) parameter, when set to 0 on the CHGJOB JOBPTY(0) command?


  1. A job is moved to the very top of the job queue

  2. A system job is moved to the very top of the processor queue

  3. A batch job is put in *HLD statuswhile it is on a job queue

  4. The job’s spooled files are moved to the very top of the output queue


Answer: A


QUESTION: 63

What is the correct command to save objects which are stored in the root file system?


  1. SAV

  2. SAVES

  3. SAVDLO

  4. SAVOBJ


Answer: A


QUESTION: 64

Some system values were changed as the result of an audit. The administrator noticed that saves are faster, but that recoveries now take longer to complete. Which system value setting would cause this to happen?


  1. Setting theQDSKCMP system value to 1 to compress the data on disk

  2. Setting the QPERADJ system value to 2 to dynamically adjust the performance

  3. Setting the QSAVACCPTH system value to 0 indicates that access paths will not be saved

  4. Setting the QALWQBJRST systemvalue to *ALWVLDERR to allow the restore of programs with validation errors to be restored


Answer: C


QUESTION: 65

The WRKSYSSTS screen on a partition displays the “% CPU used” as 150.0. What does this information indicate?


  1. The partition is using150% of the minimum processor allocation in the partition profile.

  2. The partition has two processors assigned, and the workload is using the equivalent of 1.5 processors.

  3. The partition is uncapped and using 150% of the maximum processor allocation in the partition profile.

  4. The partition is uncapped and has been assigned additional processor by the hypervisor based on workload.


Answer: D


QUESTION: 66

An administrator is experiencing a significant reduction of I/O performance. After issuing the WRKDSKSTS command and pressing Fl 1 some of the disks in the list show “DEGRADED” rather than “ACTIVE”. Why are some of the disks in “DEGRADED” status?


  1. One of the disks in the RAID set has failed.

  2. Other devices which share the I/O bus arecurrently very busy.

  3. Read/write cache has been disabled on those disks for some reason.

  4. High ambient temperature has forced the drives to temporarily run slower.


Answer: C


QUESTION: 67

A small IBM i partition has batch jobs in subsystem QBATCHthat occasionally have very high CPU usage (more than 50%), impacting system performance. The administrator needs to be able to observe these jobs on a 5250 session when they occur. Which steps should the administrator take to display the jobs when theyoccur?


  1. WRKACTJOB SBS(QBATCH) CPUPCTLMT(50) INTER VAL(10) and press E19 for

    auto refresh.

  2. WRKSYSACT SBS(QBATCH), enter 50 in the CPU Filter field1 and press F19 for auto refresh.

  3. WRKSYSACT, P20 to subset, include QBATCH, set the CPU Filter to 50%and press PIO for auto refresh.

  4. WRKACTJOB, press P20 to subset, enter 50% for the CPU, use P16 to sequence by subsystem and press P19 for auto refresh.


Answer: A


QUESTION: 68

An administrator has been provided with a POWERS system for a disaster recovery test. The Licensed Internal Code has been loaded and the disks initialized. The recovery of IBM i 7.1, which had originally been saved on a Power 720, failed. Which action will resolve the problem?


  1. Use a D-Mode IPL to install the operatingsystem.

  2. Restart the recovery specifying the Target Release parameter as 7.1.

  3. Install the operating system with the *PREV option and specify POWERS as the system to restore to.

  4. Slip-install the LIC from the source system backup, and then continue with the remainder of the install.


Answer: D


QUESTION: 69

An administrator is planning to upgrade multiple systems and partitions to IBM i 7.1. A network based image will be used to hold the install image with current PTFs. Which server type is supported with IBM i 7.1 to perform the install?

  1. NIM

  2. NES

  3. NTP

  4. TETP


Answer: B


QUESTION: 70

A system has system values QCRTAUT set to *ALL and QSECURITY to 40. A file, named PFILE, is secured by authorization list ALIST, and group profileAGROUP with authority' USE ALIST specifies "PUBLIC authority 'EXCLUDE, and AUSER with 'CHANGE authority. What authority does AUSER have to PFILE?


  1. *ALL

  2. *USE

  3. *CHANGE

  4. *EXCLUDE


Answer: C


QUESTION: 71

An administrator has been asked tocreate user profiles for4 operators. In addition to adding each operator’s user profile to the GRPOPR group, which sequence of actions will enable the operators to perform their functions, while maintaining the best possible system security?


  1. Create auser profile (GRPOPR) with a user class of *SYSOPR Create a profile for each operator with no special authority

  2. Create a user profile (GRPOPR) with no special authority Create a profile for each operator with *SAVSYS special authority

  3. Create a user profile (GRPOPR) with *IOSYSCFG special authority Create a profile for each operator with no special authority’

  4. Create a user profile (GRPOPR) with *SECADM special authority’ and a user class of

*SYSOPR Create a profile for each operator with no specialauthority’


Answer: A


QUESTION: 72

Which command is used to turn off the front panel attention light for an IBM i partition?

  1. WRKPRB (Work Problem)

  2. STRSST (Start System Service Tools)

  3. RSTATNIND (Reset Attention Indicator)

  4. DSPMSG QSYSOPR(Display Messages on QSYSOPR message queue)


Answer: B


QUESTION: 73

An administrator is using *BASIC assistance level. A new user profile is created using option 1 - Add, from the Work with User Enrollment screen. Additional special authorities need to be assigned to the profile. When creating the profile, the administrator does not see available parameters to complete this task. What must the administrator do to add the special authorities?


  1. When editing the profile, press F9 to reveal additional configuration options.

  2. Use the WRKUSRPRF command and select option 9-Work with Authority on the profile.

  3. Finish creating the profile then, using the CHGUSRPRF command, press EIO to see additional parameters.

  4. Save the user profile, then use option 2to change the profile from the Work with User Enrollment screen.


Answer: C


QUESTION: 74

An administrator created and tested a CL program to perform a nightly backup of an in- house application. The program adopts authority of the owner who is a userwith *SAVSYS special authority. The administrator can run the program without error. However, when any member of the OPERATOR group attempts to use the program, an error occurs. Which action will correct the problem and maintain system security with least effort?


  1. Grant the operators *ALLOBJ authority.

  2. Change the authority on the library and program to PUBLIC *ALL.

  3. Grant the operator group profile *USE authority to the program.

  4. Use the Grant User Authority command (GRTUSRAUT) and specify theOPERATOR group as the referenced user.


Answer: C


QUESTION: 75

An administrator needs to have a selected group of users run their batch jobs at priority 40, instead of the default of 50. in the QBATCH subsystem. In what work management object

can thedefault run priority be specified for a group of jobs?


  1. Class

  2. Pouting Entry

  3. Job Description

  4. Subsystem Description


Answer: A


QUESTION: 76

Which URL will connect remotely to the HMC with a host name of HMC for partition management?


  1. http://hmc1

  2. https://hmc1

  3. http://hmc1:2001

  4. https://hmc1:2300


Answer: B


QUESTION: 77

Which option will consume disk space at the slowest rate, while retaining the ability to use commitment control?


  1. STRJRNPF FILE(LIB1/FILE1) JRN(LIBRARY/JQURNAL) IMAGES(*BOTH) QMTJRNE(*NONE) LOGLVL(*ALL)

  2. STRJRNPF FILE(LIB1/FILE1) JRN(LIBRARY/JOURNAL) IMAGES(*BEFORE) OMTJRNE(*OPNCLO) LOGLVL(*ALL)

  3. STRJRNPF FILE(LIB1/FILE1) JRN(LIBRAPY/JOURNAL) IMAGES(*BOTH) OMTJRNE(*OPNCLO) LOGLVL (*ERRORS)

  4. STRJRNPFFILE(LIB1/FILE1) JRN(LIBRARY/JQURNAL) IMAGES(*AETER) OMTJRNE(*OPNCLO) LOGLVL (*ERRORS)


Answer: C


QUESTION: 78

An administrator is setting up a new Power 720 server with LAN Console for the first time. The connection will use a dual port Ethernet cardlocated in a PCIe card slot. After the Operations Console software is installed, the PC is cabled to the server and TCP/IP connections are configured, the server is powered on. What must the administrator do to complete the LAN Console configuration process?


  1. IPL the system to B Manual mode and configure the console device.

  2. Move the console and server network cables to the primary network.

  3. IPL the system in normal mode, start DST and sign in with 1111111.

  4. Set the console adapter location using the control panel functions.


Answer: D


QUESTION: 79

The system ASP on an IBM i 7.1 partition contains a mixture of Solid State Disk (SSD) units and Hard Disk Drive (HDD) units. The system administrator needs to move the most accessed application physical and logical files to SSDs. What should the system administrator do to permanently migrate the physical and logical files to SSDs?


  1. Migrate the data using the command STRASPBAL TYPE(*HSM) ASP(1).

  2. Migrate the data with the command STRASPBALTYPE(*MP) SUBTYPE(*SSD).

  3. Use the CHGLF and CHGPF commands to specify the preferred storage unit as *SSD

  4. Restore the physical and logical files using the RSTOBJ command, specifying *SSD as the storage unit


Answer: C


QUESTION: 80

An administratorplans to save all the system values from the source system and restore them on the target system. Which pair of actions will do this?


  1. PRTSYSINE and save the QSYSPRT generated spool file on the source system Restore the spool file and RTVSYSINE FILE(QSYSPRT) on the target system

  2. RTVSYSINF LIB(LIBA) and save the LIBA library on the source system

    Restore the LIBA library and UPDSYSINF LIB(LIBA) TYPE(*SYSVAL) on the target system

  3. RTVSYSVAL SYSVAL(*ALL) LIB(LIBA) and save the LIBA library on the source system Restore the LIBA library and UPDSYSVAL LIB(LIBA) SYSVAL(*ALL) on the target system

  4. WRKSYSVAL SYSVAL(*ALL) OUTPUT(*OUTFILE) FILE(ABC) and save the ABC

file on the source system Restore the ABC file and RTVSYSVAL SYSVAL(*ALL) FILE(ABC) on thetarget system


Answer: B


QUESTION: 81

After resetting the QSECQER DST/SST password to the default value1 the password is expired and the administrator is unable to change it from the operating system due to security restrictions. How can the password be changed with the least interruption to other users and jobs on the system?


  1. IPL the partition in manual mode, change the QSECOFR DST/SST password.

  2. Issue a control panel function 21 to activate DST and change the password there.

  3. Issue the command CHGDSTPWD again, but also special password expiration override.

  4. Use the serial interface and ASMI Admin profile to enable the QSECOFR profile for DST/SST.


Answer: B


QUESTION: 82

An administrator has successfully used a CL program to perform the nightly backup to an LTO-3 drive defined as TAPO3. A fibre attached LTO-5 drive was added later and it was configured as TAPO4 with resource name TAPO4. After updating the CL source to reflect this change, the backup is still attempting to run on the LTO-3 drive. Which action is most likely to solve the problem?


  1. Recompile the backup program.

  2. Change the resource type of TAP04 to LTO-5.

  3. Use TAPMLBU4 as fibre attached drives are only supported in library mode

  4. Vary off the LTO-3 drive so the program can find the LTO-5 drive


Answer: A


QUESTION: 83

A save file named SAVE in library QGPL contains only .bin files saved from an IFS directory. Assuming the necessary parent directories are present, how can the administrator restore the .bin files to a new directory named DIR 1?


  1. Restore the .bin files using the RSTSAVFDATA FILE (QGPL/SAVE) OBJ((‘*ALL’ INCLUDE ‘/DIR1’)

  2. Restore the .bin files using the command RST DEV(‘/QSYS.LIB/QGPL.LIB/SAVE.FILE’) OBJ((‘*ALL’ ‘INCLUDE‘/DIR’)).

  3. Use the DSPSAVF command to rind out the OLDDIRECTORY directory name, then restore the bin files using the command RST DEV(‘/QSYS.LIB/QGPL.LIB/SAVE.FILE’) OBJ((‘/OLDDIRECTORY’ INCLUDE ‘/DIR1’)).

  4. Change the current directory to DIR1, use theDSPSAVF command to find out the OLDDIRECTORY directory name, then restore the .bin files using the command RST DEV(‘/QSYS.LIB/QGPL.LIB/SAVE.FILE’) QBJ(‘/OLDDIRECTORY’ INCLUDE)).

Answer: C


QUESTION: 84

After installation of Licensed internal code (LIC) and the base operating system, the administrator IPLs with “B Normal”. After the IPL completes, the administrator received the following message when attempting to complete the installation: CPF3D8F: Cannot install library QGPL. What is wrong and whatmust the administrator do to continue the installation?


  1. Subsystems other than the controlling subsystem are running. End all subsystems and start installing the licensed programs again.

  2. The IPL partition settings were not correct.

    Change the settings to “A Manual”, IPL the system again, then start installing the licensed programs.

  3. The IPL should not have been run until the installation of licensed programs was successfully completed. Start the process again from the beginning.

  4. The option to install the library QGPL was skipped during installation of the base operating system. Run the installation process again, install the QGPL library, and then continue the installation.


Answer: A


QUESTION: 85

An administrator is upgrading 5 partitions on a single system to a new IBM i release. The IBM i partitions share a tape library configured with one drive per partition. There is one DVD drive on the system shared by the all the partitions. The maintenance window is long enough to upgrade at mostone partition using DVD media. Which approach allows the administrator to complete all the upgrades within the maintenance window?


  1. Build an image catalog with the distribution media, and copy to all partitions. Install each partition from its imagecatalog image.

  2. Build an image catalog on a Linux PC, and share it with NES to all partitions. Concurrently update all the partitions using network install to the virtualized image catalog.

  3. Build an image catalog with the distribution media on one partition.

    Save the directory with the DVD images to tapes so there is one tape for each partition. Use an alternate IPL device to install from the tapes.

  4. Concurrently IPL all partitions in “D” mode to the DVD drive in shared mode.

When all the partitionscomplete using one DVD and prompt for the next one, insert the next DVD in the drive and respond to the prompts.


Answer: A

QUESTION: 86

A customer is developing an application that needs to be deployed to IBM i servers globally. The administrator created one user named APPOWNER to own all objects in the application. What are the appropriate security characteristics for the application?


  1. This owner has no special authority.

    Users adopt this profiles authority when running the application. Developerslog on as this profile to maintain the application.

  2. This owner has no special authority and password *NONE. Authorization List, APPAUTL, is created and all objects are added to it. Developers are added to APPAUTL with *ALL authority.

  3. This owner hasno special authority and password *NONE Users adopt this profiles authority when running the application.

    Developers are members of this profile’s group with QWNER(*GRPPRE)

  4. This owner has no special authority and password *NONE. List named APPAUTL is created and all objects are added to it. Users are added to APPAUTL with *USE. Developers are added to APPAUTL with *ALL Authority.


Answer: C


QUESTION: 87

An application uses commitment control and has the following attributes: Physical files in library: APDATA Logical files in library: APLE Journals in library: APJRN Journal receivers in APJRNPCV Application objects must be saved at a transaction boundary. Which parameter of the SAVLIB command of the following supports this requirement?


  1. ACCPTH(*YES)

  2. SAVACT(*LIB)

  3. TNSBND(*YES)

  4. SAVACT(*SYNCLIB)


Answer: D


QUESTION: 88

An IBM i 7.1 partition has a system ASP that has a combination of Solid State Drive (SSD) units and Hard Disk Drive (HDD) units. The system administrator needs to permanently migrate the logical files that are randomly accessed by the application jobs to the SSDs. What is the appropriate method for identifying the most randomly accessed logical and physical files?


  1. Query the table QSYS2/SYSIXSTAT for files withlogical reads greater than U and sequence in descending order.

  2. Use WRKACTJOB command to identify the application jobs. For each job, select option

    5=Work with, then 14.

    Display open files, if active, than press Fl 1.

  3. From Performance Tools, generatea system report to an output file.

    Query the output file for logical files with random reads greater than U and sort in descending order.

  4. Trace the accessed file data using the TRCASPBAL SET(*ON) ASP(l) command. Print the report with the commandPRTTRCRPTTYPE (*FILE) QRDER(*DESC), and look for Random Reads/sec.


Answer: A


QUESTION: 89

A customer determines that run time of a weekly reporting job has begun to increase rapidly over the past several months. Examination of the file shows only normal size growth of less than 1%. The entire file is read sequentially by key and is heavily I/O blocked for performance. What should the administrator do to reduce run-time for the reporting job?


  1. Override the file to SEQONLY(*YES).

  2. Reorganize thefile to remove deleted records.

  3. Reorganize the rile in the sequence of the key field.

  4. Increase the job’s time slice and enable expert cache in the memory pool in which the job runs.


Answer: C


QUESTION: 90

Which journaling capability was addedin IBM i 7.1?


  1. End journaling can be done while a journaled file is in use.

  2. Journals larger than 1TB can have remote journals attached to them while in use.

  3. Remote journals are automatically compared and verified during suspend and resume operations.

  4. When starting journaling of the physical file, all logical files will automatically have their access paths set for SQL optimization.


Answer: A


QUESTION: 91

An administrator determines that the system slows down whenever a specific query is run and that IDX-FILEA displays when a WRKACTJOB is performed. Which tool or command can assist the administrator in determining what is causing this to occur?

  1. ANZQRY

  2. ANZIDX

  3. System i Navigator Index Adviser

  4. IBM Systems Director Database Manager


Answer: C


QUESTION: 92

The DNS server was updated with the new IP address of a remote system. Whenever the administrator tries to connect to the remote system from the local system, they are unable to do so. Which action will resolve this issue with the least disruption to the network?


  1. Remove the host route for the old IP address.

  2. Run the CHGTCPDMN command to clear DNS cache.

  3. Clear the APP cache on the administrator’s PC.

  4. Add a route with *NEXTHOP specified as the remote system name.


Answer: B


QUESTION: 93

A customer has an IBM i server that hosts web services and uploads files to other Internet- based servers. An administrator needs to add IP addresses to host additional web services, which must pass through the firewall. The firewall has a rule restricting traffic to specific IP and MAC addresses. What is the most appropriate method for the administrator to use?


  1. Create virtual IP addresses for each of the additional services.

  2. Create traditional IP addresses for each of the additional services.

  3. Purchase additional Ethernet cards. Create Ethernet lines for those cards. Configure the IP addresses on those lines.

  4. Create a virtual LAN (VLAN) and place the new IP addresses on that VLAN. Enable IP forwarding in CHGTCPA. Adda route in the firewall to the new addresses.


Answer: A


QUESTION: 94

After an upgrade from IBM i 5.4 to 7.1, an administrator is performing a disaster recovery (DR) test. LIBRARYA contains logical files that are based on physical files in LIBRARYB. The restore procedure states that the administrator must perform a second restore of LIBRARYA with the option *NEW to restore the logical files. When the second restore is performed no logical files are restored. Which statement explains why no logicalfiles were restored?


  1. The Reclaim Database Cross Reference (RCLDBXREF) command was not run after the initial restore.

  2. During the initial save, the Allow Save (ALWSAV) attribute for the logical files was set to *NO.

  3. IBM i 7.1 has the ability to defer the restore of logical files until the physical file is restored.

  4. During the second restore the administrator must use the parameter Defer ID (DFRID) with the *DFT option to restore the logical files.


Answer: C


QUESTION: 95

A customer with in-house developed applications has many custom commands in library APPLIB that relate to the application programs. As part of a system audit, the administrator needs to run a report to determine which user profiles have authority to run the commands. Given the application library APPLIB, which report from the Security Tools menu should the administrator use to complete this task?


  1. Option 21 - Adopting Objects

  2. Option 40 - Program Authority

  3. Option 49- User Profile Authority

  4. Option 25- Command PrivateAuthority


Answer: D


QUESTION: 96

Using a disaster recovery facility, an administrator has just completed the successful recovery test of a production IBM i 7.1 LPAR with only *SYSBAS. Before leaving the facility, the administrator needs to preparethe partition for the next recovery test. Which action will support this requirement?


  1. On the recovery partition command line: PWRDWNSYS OPTION(*IMMED) RESTART(*INZ) ENDSBSOPT (*NOJOBLOG)

  2. On the recovery LPAR: start dedicated service tools (STRDST).On the main menu select the option to work with disk data, then select the option to initialize the system.

  3. On the recovery LPAR: initiate a “D Manual” IPL with the IBM i 7.1 I_Base DVD loaded. When prompted, select the option to “Install Licensed Internal Code and Initialize System”.

  4. Press and hold the power button on the front of the CEC. After approximately 10 seconds, from the menu displayed on the console, select the option to “Install Licensed Internal Code and Initialize System”.

Answer: C


QUESTION: 97

Where in IBM i Navigator can suggestions for improved database performance generated by the system be viewed and implemented?


  1. Index Advisor

  2. Health Center

  3. Database Navigator

  4. SQL Plan Cache Event Monitors


Answer: A


QUESTION: 98

An administrator performed a restore using a full system save that was taken from a system running IBM i 7.1 with GO SAVE option 21. The administrator was surprised to discover that no spooled files were restored. Which action will allow the administrator to restore spooled files at the next restore operation?


  1. Set the QSAVSPOOL system value to *YES before the full system save.

  2. Set the SPLEDTA parameter to *All for all the output queues using the command CHGOUTQ, before the full system save.

  3. On the SAVE menu, before the full system save, select Option 20- Define save system and user data defaults and set “Spooled file data” to *All.

  4. On the RESTORE menu, before the full system restore, select Option 20- Define restore system and user data defaults and set “Spooled file data” to *All.


Answer: C


QUESTION: 99

How could an administrator save changed objects in directories for a specified date and time range?


  1. Use the QSavDir API and specify the date and time range as variables.

  2. Usethe SAV command and specify the date and time range for the CHGPERIOD parameter.

  3. Use the SAVCHG command and specify the date and time range for the PERIOD parameter.

  4. Use the SAVCHGOBJ command and specify the date and time range for the REEDATE and REETIME parameters.

Answer: B


QUESTION: 100

An administrator added a memory pool to a subsystem using the CHGSBSD SBSD(SBSA) POQLS((5 *SHRPOQL1 *N)) command. How can the administrator increase the activity level to 50 for the newly added memory pool?


  1. Set maximum activity level in WRKSYSACT.

  2. Use the activity level option in CHGSHRPOOL.

  3. Change the maximum active jobs using CHGSBSD.

  4. Set maximum activity using the CHGACTLVL command.


Answer: B


QUESTION: 101

A system has been redeployed,and is now a single partition IBM i 7.1 system with LAN Console. The administrator notices a message when using DSPPTE LICPGM (5770999) which states MHxxxxx PTFs cannot be installed. What is the most likely reason this is occurring?


  1. There is a damagedLIC PTF on the system.

  2. The firmware is set to accept maintenance from an HMC.

  3. INZSYS was not successfully completed when the system was reloaded.

  4. The system was not completely scratched and reloaded using IPL mode “D”.


Answer: B


QUESTION: 102

An administrator maintains a IBM i 6.1 development system with weekly PTF updates so the current cumulative, appropriate groups and current HIPER PTEs are always present for testing. An upgrade to IBM i 7.1 is planned for the system. What is critical for making certain that current fixes will also be present on the new release?


  1. The PTF cross-reference PSP document

  2. The Cumulative PTE contents PSP document

  3. The IBM i Upgrade and Corrections PSP document

  4. The IBM i Memo to Users Corrections PSPdocument


Answer: A

QUESTION: 103

During a full system restore the sign on screen is displayed before the restore completes. Which system value is the most likely cause?


  1. Restore Abend action (QRSTABD) is set to *SlGNON.

  2. Allow Object Restore(QALWOBJRST) is NOT set to *All.

  3. Verify Object Restore (QVFYOBJRST) is set to 3 or higher.

  4. Job message queue full action (QJOBMSGQFL) is set to *NOWRAP.


Answer: D


QUESTION: 104

An administrator is attempting to restore an application compiled at IBM i 6.1 to a production system running IBM i 7.1. While other programs compiled at IBM i 6.1 restored without issue, one program fails to restore on the production system even though it successfully restored to the test system. What should the administrator do to resolve the problem?


  1. Change the system value QERCCVNRST to 2.

  2. Change the system value QALWOBJRST to *ALWPGMADP.

  3. Change the FRCOBJCVN parameter of the RSTLIB command to *YES.

  4. Recompile the program on the test system, and then migrate it to the production system.


Answer: B


QUESTION: 105

The administrator has been asked to install the latest system firmware on an HMC managed system. There is no service partition. The most recent cumulative PTF package and Group PTFs were installed, but the firmware did not get updated. What is required to install the firmware on this system?


  1. System Firmware must be installed from the HMC.

  2. System Firmware must be installed from the ASMI interlace.

  3. Perform a platform IPL and select the Tside for the System Firmware.

  4. Perform a platform IPL to complete the installation of the System Firmware.


Answer: A


QUESTION: 106

An administrator needs to write a tool in CL to reorganize all database file members with

more than 10% deleted records or more than 5GB of deleted record space. The tool will need to generate and read a list of all:

  • Libraries in the system

  • Files in each library

  • Members in each file

What is the minimum number of programs that need to be created for this tool?


  1. 1

  2. 2

  3. 3

  4. 4


Answer: A


QUESTION: 107

During frequent communications failure hundreds of jobs are being ended at once. The production of these job logs significantly impact the system resources, and many spooled files are created. How could the administrator avoid the production of these job logs?


  1. Set the QINACTMSGQ system value to *NOJOBLOG

  2. Set the QCMNRCYLMT system value to infinite recovery attempts.

  3. Set the LOGOUTPUT (Job log output) parameter to *PND in the job description.

  4. Set the LOG (Message logging) parameter to 4 0 *NOLIST in the job description.


Answer: C


QUESTION: 108

A customer is installing a new POWER7 server with IBM i that needs redundant connections to the network. Which configuration provides both increased throughput as well as redundancy?


  1. Multiple Ethernet lines with Showier routes.

  2. Dual Ethernet lines with Virtual P addresses.

  3. An aggregated Ethernet line to a supported switch.

  4. Two Ethernet lines with MAXERAME(8996) and LINKSPEED(*MAX).


Answer: C


QUESTION: 109

An administrator has a save file with user created program objects that were created on another system. One of the programs cannot be restored. What is the most likely cause of

the problem?


  1. The restore command used specified Force Object Conversion parameter as *NO.

  2. The program was being restored to a library that is missing a referenced file.

  3. The program was compiled using TGTRLS(*CURRENT) on a system at a later release.

  4. The program was compiled using TGTRLS specifying a release prior to the release installed on the system.


Answer: C


QUESTION: 110

Which object has the Routing Entry Compare Data that is used by the subsystem to route a job?


  1. Class

  2. Job Description

  3. Routing Directory

  4. Workstation Entries


Answer: B


QUESTION: 111

An administrator needs to add a connection to System i Navigator to make it available for monitors, messages, and system activity. Where should the administrator configure this?


  1. Systems with partitions >Add System

  2. Endpoint systems> New End Point System

  3. My Connections > Connection to Systems> Add connection

  4. Endpoint systems> New End Point System > Discover Systems


Answer: C


QUESTION: 112

A file named XYZ is secured as follows in the graphicbelow. What authorities will AUSER have to file XYZ?

image


  1. *ALL

  2. *CHANGE

  3. *USE + Object Management

  4. * CH


Answer: D


QUESTION: 113

An administrator is connecting to the HMC for IBM i console access using IBM i Access Using port 2300. What isthe required user ID in “Connection Properties”?


  1. Q#HMC

  2. hscroot

  3. QSECOFR

  4. QCONSOLE


Answer: A


QUESTION: 114

Which statement describes a recognized security risk with programs that adopt authority?


  1. Items in IFS directories can be altered.

  2. The users job will retain elevated authority when the program ends.

  3. If the program opens a command line, a user will have access to the system at elevated authority.

  4. If the program calls another program, the called program cannot avoid running atelevated authority.


Answer: C

QUESTION: 115

An administrator with a single-partition POWER7 system needs to install new server firmware. How are server firmware updates delivered for POWERJ systems with update policy set to “OS managed”?


  1. With aPTF using marker ID MHxxxxx

  2. With a PTE using marker ID TRxxxxx

  3. With a PTE using marker ID MFxxxxx

  4. With a PTE using marker ID SIxxxxx


Answer: A


QUESTION: 116

An administrator is preparing to move to the most current release of HMC code. Which backup must be performed before updating the HMC code?


  1. Save HMC Data

  2. Save Upgrade Data

  3. Save Restore PointData

  4. Save Critical Console Data


Answer: B


QUESTION: 117

An administrator has migrated a full IBM i 7.1 system from a POWER5 serverto a new POWER7 server and has completed testing the migrated system. IFS directories /DIR1 and

/DIR2 must now be refreshed with current production data prior to going live on the new sewer. Which option will refresh the directories, and remove objects related to the migration testing?


  1. Save the directories from the production server with SAV OBJ((/DIRIP *INCLUDE) (*/DIR2rtIN0LuDE)) PVTAUT *YES)

    Restore the directories with RST OBJ((/DIRIP *INCLUDE *SAME) (*/DIR2P INCLUDE

    *SAME))PVTAUT(*YES)

  2. SAVSECDTA Save the directories from the production sewer with SAV OBJ(QJDIRIP INCLUDE) (*/DIR2 *INCLUDE))

    Restore the directories with RST OBJ((/DIRIP INCLUDE *REPLACE) (*/DIR2 * INCLUDE

    *REPLACE)) RSTUSRPRF *All RSTAUT*All

  3. Use RMVLNK */DIRIP and RMVLNK*/DIR2 /*

    SAVSECDTA Save the directories from the production sewer with SAV OBJ((YDIR1P INCLUDE) (YDIR2 * INCLUDE))

    Restore the directories with RST OBJ((/DIRIP INCLUDE *SAME) (*/DIR2P INCLUDE

    *SAME)) RSTUSRPRF *All RSTAUT*All

  4. WRKLNK ‘/’ then select option 2 and use option 9 to remove the directories. Save the directories from the production server with SAV QBJ((7DIRIP INCLUDE) (*/DIR2P INCLUDE)) PVTAUT *YES)

Restore the directories with RST OBJ((/DIRIP INCLUDE *SAME) (*/DIR2P INCLUDE

*SAME)) PVTAUT(*YES)


Answer: D


QUESTION: 118

An administrator needs to move a system from security level 30 to 40 and ensure that risk is reduced as much as possible. How should the administrator configure system security journaling to support the security level change?


  1. CHGSYSVAL QAUDCTL to *AUDLVL CHGSYSVAL QAUDLVL *AUTFAIL

    Monitor QAUDJPN for failures.

  2. CHGSYSVAL QAUDSYS to *OPSYS CHGSYSVAL QAUDLVL *INTEGRITY

    Monitor QAUDJRN for System Integrity violations.

  3. CHGSYSVAL QAUDCTL to *AUDLVL CHGSYSVAL QAUDLVL*VIOLATIONS CHGOBJAUD OBJ (*All PALL) OBJTYPE(*PGM) OBJAUD(*All)

    Monitor QAUDJPN for security violations.

  4. CHGSYSVAL QAUDSYS to *OPSYS CHGSYSVAL QAUDLVL *PGMVIO CHGOBJAUD QBJ(*All PALL) QBJTYPE(*PGM) OBJAUD(*All)

Monitor QAUDJPN for System Program & MIviolations.


Answer: A


QUESTION: 119

An administrator needs to access the HMC remotely from a browser on a desktop. When user ID “hscroot” is used, the authentication is successful. However, when user ID “admin” is used, the authentication fails, eventhough the ID has hmc super user as the Task Role. The user “admin” can sign on locally at the HMC. What is the likely cause of the problem?


  1. The web access password for “admin” is expired.

  2. Only user “hscroot” has authority to the ETH1 device.

  3. The user “admin” is not a member of the “webadmin” group.

  4. Allow Remote Access via the Web has not been checked for the user id “admin.”


Answer: D


QUESTION: 120

A customer is unable to order PTEs or send service requests to IBM. Which command

willenable connections to IBM?


  1. CRTSRVCFG ROLE(*PRIMARY)

  2. STRSRVAGTTYPE(*ACTIVATE)

  3. SNDSRVRQS ACTION(*CONEIGURE) ROLE(*PRIMARY)

  4. SNDPTEORD PTEID(*ESERV) ESERV(*PRIMARY) INIT(*YES)


Answer: A


QUESTION: 121

Based on the image displayed, which subsystem is exempt from changes by the IBM i automatic tuning function?


image


  1. TEST

  2. QINTER

  3. QBATCH

  4. QSPOOL


Answer: A


QUESTION: 122

A job schedule entry has been setup to run a daily system backup. Management has requested this backup job not run today. What is the most effective way to configure the job scheduler to automatically handle this request?


  1. Set the omit date parameter (OMITDATE) to the current date.

  2. Remove the day of the week to be omitted from the schedule day parameter (SCDDAY).

  3. Set the omit date parameter (OMITDATE) to *CURRENT and the recovery action parameter (RCYACN) to *NOSBM.

  4. Change the schedule time parameter (SCDTIME) to *NONE and the relative day of the month parameter (RELDAYMON) to the current date.


Answer: A


QUESTION: 123

What differentiates the property of objects in IFS directories from objects in the /QSYS.LIB file system?


  1. QSYS.LIB object names are case sensitive.

  2. IFS objects can be excluded from all types of backups.

  3. IFS objects cannot specifythe character set used to store data.

  4. QSYS.LIB objects *PUBLIC authority cannot be influenced by the containing object.


Answer: B


QUESTION: 124

What is the minimum special authority needed to run the PWRDWNSYS command?


  1. *JOBCTL

  2. *ALLOBJ

  3. *SERVICE

  4. *IOSYSCFG


Answer: A


QUESTION: 125

In addition to the objects in the /home directory, what additional objects are saved when SAV OBJ ((‘/home/’ *INCLUDE)) is used?


  1. Sub-directories

    Objects in the sub-directories

  2. Sub-directories

    Omitting objects in the sub-directories

  3. Security assignments

    Omitting sub-directories and their objects

  4. Sub-directories

Objects in the sub-directories Security assignments


Answer: A


QUESTION: 126

Which command should be used to determine thetotal number of jobs (active and inactive) on a system?


  1. WRKSYSSTS

  2. WRKACTJOB

  3. WRKSYSACT

  4. WRKJOBSTS


Answer: A


QUESTION: 127

An administrator needs to change the IP address used for the Operations Console LAN connection to the Power 720 50that it resides on the main network. What must the administrator do to complete this task?


  1. Enable console takeover and recovery as the connection now goes through a network switch.

  2. Access the control panel with function 65-21 and reset the consoledevice discovery sequence.

  3. Reset the console device ID, change the adapter address and recreate the Operations Console connection.

  4. Reconfigure the connection in Operations Console with a new registered DNS name that points to the new IP address.


Answer: C


QUESTION: 128

A custom application program is submitted daily by operations personnel using the CALL command. The program has a requirement that the prior days backup tape volume serial be passed via a parameter so the program can read the tape. The program has failed due to syntax errors when entering the CALL command and parameters. What can the administrator do to help minimize similar errors?


  1. Use the Check Tape command and set the Exit parameter to call the program.

  2. Create a Job Schedule Entry to call the program and prompt for the parameter.

  3. Use the command SBMJOB to call the program and set the OTAPE data area parameter to *LAST.

  4. Develop a CL program to capture the correct parameter value. call the program, and pass the parameter.


Answer: D


QUESTION: 129

A customer selected option 21 from the SAVE menu, entered their tape library TAPMLBO1 and selected to start the backup immediately. They receive the message “*MOUNTED not correct.” What should the administrator do beforerestarting the save?


  1. Use SETTAPOGY to the desired tape category.

  2. In WRKMLBSTS allocate the tape drive resource.

  3. Initialize the tape to correctly match the cartridge ID.

  4. Assure that at least two tapes are ready and initialized in the library.


Answer: A


QUESTION: 130

When installing the Group HIPER PTE5 (SE99709 for IBM i 7.1), the administrator discovered that only the first PTE on the DVD was installed. What is the most likely reason this occurred?


  1. The incorrect option on the PTE menuwas used to install the PTFs.

  2. The platform was IPLed from the “P” side1 instead of from the “T” side.

  3. A firmware upgrade was not performed prior to installing the Group HIPER.

  4. The system was IPLed from the “A” side, and needed to be IPLed from the “B” side.


Answer: A


QUESTION: 131

A change to POWER7 server firmware is being planned on an HMC managed system. The current server firmware level is AL720_108_066, and the new server firmware level will be AL730_078_035. What must theadministrator take into consideration for this task?


  1. A backup of critical FSP data needs to be scheduled.

  2. Downtime needs to be scheduled as this will be a disruptive update.

  3. The system ESP should have both network ports configured to the HMC to guard against HMC connection loss.

  4. Ensure the “Apply Immediate” option is selected on the Submit Task panel so the update will be concurrent.

Answer: B


QUESTION: 132

An administrator notices the time stamp of service processor-related messages aresignificantly different from other time stamps from events known to have occurred at the same time. The system is HMC managed. The HMC time zone shows the correct local time IBM i shows the correct local time. Where can the service processor time settingbe verified?


  1. In the QUTCOFFSET system value

  2. In the ASMI date and time settings

  3. In the Universal Time setting in System Service Tools

  4. In the date and time setting for the managed system on the HMC


Answer: B


QUESTION: 133

A POWER7 customer using disk adapters with RAID-5 and hot spare has noticed sudden and significant performance problems with an LPAR. WRKDSKSTS followed by Fl 1 shows the disk units as “DEGRADED”. The customer has attempted to check the RAID card battery in Service Toolsbut it is not listed. What is the cause of the degraded status?


  1. One of the power supplies in the disk drawer has failed.

  2. The cache battery is in the 90-day replacement warning state.

  3. The pairing of the RAID cards is broken, so the RAID cache isnot in use.

  4. The hot spare has taken over for a failed drive and is awaiting replacement.


Answer: C


QUESTION: 134

Programmers working on a software development project frequently need to save their development library (LIBX) at the prior releaselevel of the operating system. The administrator needs to change the default value of the SAVLIB command parameter to accommodate the programmers” prior release save requirement. The default value before the change was: SAVLIB LIB(LIBX) TGTRLS(*CURRENT) The default value after the change will be: SAVLIB LIB(LIBX) TGTRLS(*PRV) What should the administrator do to facilitate the change?


  1. Adjust the system value QFRCCVNRST (Force conversion on restore) to *PRV.

  2. Use the Change Command Default (CHGCMDDFT) command to change the TGTRLS parameter value to *PRV.

  3. Use the Save Restore Configuration (SAVRSTCFG) command to change the TGTRLS

    parameter value to *PRV.

  4. Use the command WRKREGINF to modify the exit point program QIBM_SAV_SECURITY and change theTGTRLS parameter value to *PRV.


Answer: B


QUESTION: 135

Which option describes one of the purposes of a manual IPL?


  1. It is required to apply PTFs.

  2. It allows more control over the system startup process.

  3. It is the only way to start the systemwhen there is a console problem.

  4. It is required to recover the system from a previous abnormal system end caused by ENDJOBABN.


Answer: B


QUESTION: 136

On a system with a single ASP, an I/O intensive batch job that normally completes in 30 minutesis still running after 2 hours. CPU utilization on the system is less than 10% and memory is not constrained. The WRKDSKSTS command shows the following:


image


What should be administrator do to improve performance?

  1. Run Start Disk Reorganization(STRDSKRGZ)

  2. Run ASP Balancing with a Balance Type of *MOVDTA

  3. RUN Reclaim Storage with a Select Type of * RSMLAC

  4. Run ASP Balancing with a Balance Type of *CAPACITY


Answer: D


QUESTION: 137

A database administrator completed a significant project to create appropriate indexes for an application. The administrator needs to see if there are any indexes the Query Engine is calling for which have not already been created. How can the administrator ensure that only the new index requests will be shown in the Index Advisor panel?


  1. In QUSRSYS, clear the first member of QENUSRTBL table.

  2. In System i Navigator> Database > SQL Plan Cache > Clear All.

  3. Copy the first member of SYSIBM/REE_CST1 into a saved member and clear the member.

  4. Right clickon Database > Index Advisor> Index Advisor> Clear All Advised Indexes.


Answer: D


QUESTION: 138

An administrator would like to order the latest cumulative1 DB2 for IBM i, and HIPER PTF groups for a system. After signing on to Fix Central and selectingthe appropriate OS release, what must be selected from the list of group fixes to acquire all these PTEs with the fastest download time?


  1. Order the cumulative PTF, which automatically includes DB2 and HIPER groups.

  2. Order the cumulative, DB2 for IBMi, and HIPER groups in three separate orders.

  3. Customize the order and order just the cumulative PTF to remove requisites and reduce transfer size.

  4. Order the cumulative in one order, then order the DB2 for IBM i and HIPER groups in a separate order.


Answer: A


QUESTION: 139

An administrator needs to establish a long-term system performance monitoring process. The administrator needs to show long-term trends in CPU and disk capacity use, with the limits for the processor model on charts. Which tool should the administrator use to support this requirement?

  1. IBM i Performance Explorer (PEX)

  2. IBM System Director Navigator for i

  3. System i Navigator Management Central

  4. IBM Performance Management for Power Systems


Answer: D


QUESTION: 140

Asystem with IBM i 7.1 has at least one lPv6 address configured. When a user tries to ping a remote system by name, the response takes a long time. Ping by IP address (for example 10.x.x.x) works without delay. Which action will fix this problem?


  1. Usethe command CHGTCPDMN and set the parameter HOSTSCHPTY to *LOCAL.

  2. Use the command CHGTCPDMN and set the parameter HOSTSCHPTY to *REMOTE.

  3. Update the Host Table Entries and add a IPv4 for that remote system name.

  4. Change the ping command default as follows: CHGCMDDFT CMD(PING) NEWDFT(ADRVERFMT(*IP4))


Answer: D


QUESTION: 141

An administrator needs to set up and configure a monitor for disk usage under Management Central. Monitors, Based on the image shown, which option is used to set up this monitor?

image


  1. Job

  2. File

  3. System

  4. Message


Answer: C


QUESTION: 142

A batch job is running a report at priori 50 on a system using IBM defaults for job run priorities. The report results are needed as soon as possible without disrupting interactiveusers. Which run priority value will support the requirement?


  1. 10

  2. 20

  3. 40

  4. 60


Answer: C


QUESTION: 143

What is saved with the SAVSECDTA command?


  1. User Profiles Group profiles Object owners

  2. User Profiles Authority Lists PrivateAuthorities

  3. Authority Lists Primary group profile Object owner assignments

  4. Private Authorities Group Profiles Primary group profile assignments


Answer: B


QUESTION: 144

IBM support asks that currently active system firmware level (MHxxxxx) bedeactivated, so the system can run on the older level. How is this accomplished?


  1. Run command DLTPTF PTE (M) RMV (*TEMP).

  2. Run the WRKFMWSTS command. Select option 4 on the *TEMP line and press “enter”.

  3. On the system panel, change the IPL mode to “B” and “P. Then restart the system.

  4. Run command RMVPTF LICPGM(5770SS1)SELECT(MHxxxxx)

DELAYED(*YES),then restart the partition.


Answer: C


QUESTION: 145

An administrator is working with users to enable them to control printers in their various departments. The required security must enable only control of the departmental printers to users in that department, as well as restricting others from using them. What should the administrator do for each department to support these requirements?


  1. Changethe output queue “authority to check” parameter to *DTAAUT. Change the

    *PUBLIC authority for the output queues and devices to *EXCLUDE

    Grant each user *CHANGE authority to each device description and output queue.

  2. Create a group profile to own theoutput queue and device decryption.

    Change the ownership of the output queue and device description to the new profile. Make the users members of the group profile.

    Grant the group profile *SPLCTL special authority.

  3. Create a group profile to own the output queue and device decryption.

    Change the ownership of the output queue and device description to the new profile. Make the users members of the group profile.

    Grant the group profile *JOBCTL special authority.

  4. Create an authorization list for thedepartments printers.

Assign the output queues and device descriptions to the authorization list. Change the output queue “authority to check” parameter to *DTAAUT. Change the *PUBLIC authority to

*EXCLUDE.

Add each user to the authorization list with *CHANGE authority.


Answer: D


QUESTION: 146

What should an administrator do to enable remote SQL between IBM i systems?


  1. Create a *RMTSQL device description for the target system.

  2. Use ADDRDBDIRE to add remote locations for the target system.

  3. Create a DDM Pile in QUSRSYS with the name of the target system.

  4. Use CRTCPGL to create a *RMTSQL type configuration list and add the target system to the list.


Answer: B


QUESTION: 147

Which command shows CPU utilization for both user jobs and IBM i system tasks?


  1. WRKSYSSTS

  2. WRKSYSACT

  3. WRKTSKSTS

  4. WRKACTJOB


Answer: B


QUESTION: 148

The user ABC, class *USER, and belongs to the APPLICATION group. The user is running the Edit Object Authority (EDTOBJAUT) command against the FILE1 physicalfile, but the command fails with the message “Not authorized to change authorities”. The APPLICATION group has *CHANGE authority to the physical file FILE1. User ABC has no other authorities to the FILE1 and can display the file data without any problem. Adding which authority for the APPLICATION group will allow user ABC to run the EDTOBJAUT command against the PILE 1 physical file?


  1. *OBJMGT

  2. *OBJUPD

  3. *OBJCHG

  4. *SECADM


Answer: A


QUESTION: 149

An administrator started the journaling for library LIBA using the command STRJRNLIB with all parameters set to the IBM default. The administrator later needs to restore more than 100 new files to library LIBA, but does not want to have the journaling started for these newly restored files. What is thefastest way to restore the files without starting the journaling?


  1. Use the CHGJRN command to change the inherit rules for library LIBA and then perform the restore.

  2. Restore the files to library LIBA and then manually end the journaling for the newlyrestored files.

  3. Use the CHGJRNOBJ command to change the inherit rules for library LIBA and then perform the restore.

  4. Use the command sequence ENDJRNLIB, STRJRNLIB, with new inherit rules for library LIBA and then perform the restore.


Answer: C


QUESTION: 150

An administrator needs to update an HMC from V7 P7.3 to V7 P7.5 and plans to use a remote server to install the new HMC code. Which remote servers or file systems are available for the update?


  1. NIM, NFS

  2. FTP1, NFS

  3. TFTP, FTP

  4. HTTP, NIM


Answer: B


QUESTION: 151

An administrator has been directed to set up server support for network appliances that use TFTP to download firmware updates. The files must be inaccessible by users, but available

for appliances to download. An IFS directory “/FIRMWARE” has been defined, and the files loaded into it. Public access to both the directory and the file objects is *NONE. Using

IBM i Navigator, which option correctly describes the remaining configuration steps to meet the requirements?


  1. Set *RX permissions for user profile QTCP on the directory and files in /FIRMWARE. Set the FTP server properties to enable TFTP access to directory /FIRMWARE.

  2. Set *RX permissions for user profile QTFTP on the directory and files in /FIRMWARE. Set the TFTP server properties to provide “read” access to directory/FIRMWARE.

  3. Set *RX permissions for user profile QSERVER on the directory and files in

    /FIRMWARE. Set the FTP server properties to enable anonymous FTP access to directory

    /FIRMWARE.

  4. Set *RX permissions for user profile QZLSFILE on the directory and files in

/FIRMWARE. Set the IBM i NetServer server properties to enable TFTP access to directory

/FIRMWARE.


Answer: B


QUESTION: 152

Library APPLIB on a test system contains a new application.The private authorities for objects in the library have been set as they should be on the production system. What should the administrator do to migrate the application to the production system?


  1. Run SAVLIB APPLIB with the Save Access Path parameter set to *AUT on the test system. Run RSTLIB APPLIB on the production system.

  2. Run SAV OBJ(/QSYS.LIB/APPLIB.LIBP) with the Private Authorities parameter set to

    *AUT on the test system. Run RSTOBJ APPLIB on the production system.

  3. Run SAVLIB APPLIB with thePrivate Authorities parameter set to *YES on the test system.

    Run RSTLIB APPLIB with the Private Authorities parameter set to *YES on the production system.

  4. Run SAVOBJ OBJ(*All) LIB(APPLIB) TYPE(*All), followed by a SAVLIBAUT APPLIB on the test system.Run RSTOBJ OBJ(*All) LIB(APPLIB) TYPE(*All), followed by RSTAUT (*LIB APPLIB) on production.


Answer: C


QUESTION: 153

The library LIBX contains a large number of files and the administrator needs to backup a physical file named WES and its associatedlogical files (named WFSOI through WES99). Using the SAVOBJ command, what is the most efficient procedure to backup the physical and logical files and ensure the quickest restore process?

  1. Use the command SAVOBJ OBJ(WES) ACCPTH(*YES) to back up all thefiles at the same time.\

  2. Back up file LIBXM/FS.

    Run the SAVOBJ command again to backup the logical files and access paths.

  3. Special generic name on the Objects parameter (WES*) to back up the all the files at the same time.

  4. Back up files LIBX(WES*TYPE(*LF) and access paths.

Run the SAVOBJ command again to backup the physical file LIBX/WFS.


Answer: C


QUESTION: 154

During a migration the system is mistakenly IPLed. The data migration is successfully resumed and completed. When theadministrator runs the RSTAUT command, no authorities are restored. What is the most likely cause of the problem?


  1. The RCLSTG command was not run before the data restore was resumed.

  2. The storage management directory was overlayed as a result of theIPL.

  3. The INZSYS command was not successfully run before restoring authorities.

  4. The private authority table loaded by the RSTUSRPRF command was automatically deleted by the system IPL.


Answer: D


QUESTION: 155

An administrator needs to see the system assigned job number and percent of processing unit time attributed to all jobs currently running. Which steps should the administrator take to accomplish this?


  1. WRKJOB JOB(t), option 3 to display job run attributes

  2. WRKACTJOB and press P11 twotimes to Display Thread Data

  3. WRKSYSACT INFTYPF(*JOBS) and press PIO to update the list

  4. WRKSYSSTS and press P19 to display Extended System Status


Answer: B


QUESTION: 156

A new sales user attempts to sign on to the system. The user is immediatelysigned oft. The users job log contains the message CPE981 0: Library SALESLIB not found. All sales applications are located in the ASP named SALES. Which parameter should the administrator set in the user profile to correct this error?

  1. JOBD

  2. GRPPRE

  3. INLIBL

  4. INLASPGRP


Answer: A


QUESTION: 157

A tape cycle consists of 5 daily save tapes. After restoring a library from the Monday tape the administrator discovered that the library restored was from 2 weeks ago rather than last week. Which action will allow the administrator to restore the correct version of the library in the future?


  1. Modify the save procedure to initialize the tape prior to the save.

  2. Use the OMITLIB parameter on the restore to omit the older versions of the library.

  3. Use sequence number *LAST on the restore to restore the most recent version of the library.

  4. Use the POSITION parameter on the restore to specify *LASTSAV restoring only the most recent version.


Answer: A


QUESTION: 158

According to IBM recommendations, which parameter setting should be applied when a new GROUP profile is created?


  1. Password parameter set to *NONE

  2. Group ID number parameter set to U

  3. User Class parameter set to *GROUP

  4. Initial Program to call parameter set to *NONE


Answer: A


QUESTION: 159

A customer has a database that is fully journaled, including remote journals. The overnight backup of the data, including access paths, completed normally. The system failed and the customer needs to recover on the remote journal system. After restoring the nightly save to the remote system, what must the administrator do to make the database usable on the remote system?

  1. Apply journal changes from the remote copy of the journal receivers to the restored data.

  2. Applyjournal changes from the remote copy of the journal receivers to the restored data. EDTRBDAP to monitor the rebuild of the access paths.

  3. Restore the saved journals to the remote system. Apply journal changes from the remote copy of the journal receivers to the restored data. EDTRBDAP to monitor the rebuild of the access paths.

  4. Restore the saved journals to the remote system. Associate the remote receivers to the restored journals. Apply journal changes from the remote copy of the journal receiversto the restored data.


Answer: A


QUESTION: 160

In the Work With Shared Pools panel shown, what is the meaning of the “Maximum” column under the “Size” section?


image


  1. The maximum amount of main storage that can be assigned to the pool in GB.

  2. Themaximum percentage of the total main storage that can be assigned to the pool.

  3. The maximum amount of main storage that the automatic tuner will assign to the pool in GB.

  4. The maximum percentage of the total main storage that the automatic tuner will assign to the pool


Answer: D


QUESTION: 161

An administrator needs to create a profile for a user, named User1 that is able to access the entire system except for the PAYROLL library. What should the administrator do to achieve

this?


  1. Create a group profile named ITADMIN.

    Create a user profile named User1 with *ALLOBJ authority and make it a member of ITADMIN.

    Grant the ITADMIN group *EXCLUDE authority to the library PAYROLL.

  2. Create a group profile named ITADMIN.

    Create a user profile named User1 with *ALLOBJ authority and make it a member of ITADMIN. Grant the user profile named User1 ‘EXCLUDE authority to the library PAYROLL.

  3. Create a group profile named ITADMIN with *ALLOBJ authority.

    Create a user profile named User1 with no special authority and make it a member of ITADMIN. Grant the ITADMIN group *EXCLUDE authority to the library PAYROLL.

  4. Create a group profile named ITADMIN with *ALLOBJ authority.

Create a user profile named User1 with no special authority and make it a member ofITADMIN. Grant the user profile named User1 *EXCLUDE authority to the library PAYROLL.


Answer: D


QUESTION: 162

An administrator is creating a new connection to an existing system, but cannot connect successfully. Which action will resolve the problem?


  1. Create a user profile for the connection.

  2. Delete, recreate, and test the connection.

  3. Enable the user profile for the connection.

  4. Change the connection to be the Management Central system.


Answer: B


QUESTION: 163

When a user opens up Database Navigator for IBM i 7.1, only the QGPL database is initially available. The user needs the list of schemas to be available each time Database Navigator is opened. What action can the administrator take to support therequirement?


  1. Add the user to the authorization list QSM1 AUTL and restart the host servers.

  2. In Application Administration for System i Navigator, enter a schema name and press the ADD button.

  3. Create a supplemental group profile that has the needed list of libraries assigned and make the user a member of that supplemental group.

  4. Create a job description with the appropriate list of libraries on it and assign the job description to the user. Have the user sign off and sign on again.


Answer: D


QUESTION: 164

An administrator wants to ensure a job on the scheduler is ignored if the system is in a restricted state at the time it is scheduled to run. What change will make this occur?


  1. Change the recovery action of the job schedule entry to *NOSBM.

  2. Change the user profile on the job schedule entry to QRECOVERY.

  3. Change the frequency option of the job schedule entry to *ACTIVE.

  4. Use the option on the WRKJQBSCDE screen for “hold when restricted.”


Answer: A

Read more Details »

We Make Sure Q&A work for you!

See Entry Test Preparation   |   Project Management, English Tests Home

Pass4sure PDFs (Pass4sure Questions and Answers), Viewable at all devices like PC Windows (all versions), Linux (All versions), Mac / iOS (iPhone/iPad and all other devices), Android (All versions). It support High Quality Printable book format. You can print and carry anywhere with you, as you like.

Testing and Training Engine Software (Pass4sure Exam Simulator) Compatible with All Windows PC (Windows 10/9/8/7/Vista/XP/2000/98 etc). Mac (Through Wine, Virtual Windows PC, Dual boot). It prepares your test for all the topics of exam, gives you exam tips and tricks by asking tricky questions, uses latest practice quiz to train you for the real test taking experience in learning mode as well as real test mode. Provides performance graphs and training history etc.

Read more »

Services Overview

We provide Pass4sure Questions and Answers and exam simulators for the candidates to prepare their exam and pass at first attempt.

Contact Us

As a team are working hard to provide the candidates best study material with proper guideline to face the real exam.

Address: 15th floor, 7# building 16 Xi Si Huan.
Telephone: +86 10 88227272
FAX: +86 10 68179899
Others: +301 - 0125 - 01258
E-mail: info@Killexams.com

We can help!

Welcome to our website. We've been serving the greater Jacksonville area for over 10 years.

With hundreds of satisfied residential, and many business customers, we at CSJ, Inc. have decided to focus on the customers that need us most. The small business customer.

Nicholas Trudeau
Computer Solutions of Jacksonville, Inc.

Nick The Computer Guy