A customer has a new z14 and would like Container Pricing for the z/OS system based on their monthly usage.
How will the pricing be based through Resourcelink tables?
A. MIPS
B. LSPR
C. ITRR
D. MSU
A z14 ZR1 is configured for Capacity Marker W06 and 6 IFLs. At the time of purchase, the customer had not expected growth. Therefore, the CPC was configured as a Max12 (FC#0637). However, additional Java workload makes the deployment of a zIIP engine feasible.
What are the considerations, if any, that the customer has to include into their plans for upgrading?
A. Depending on the type of specially engine (IFL, ICF, zIIP, or SAP) the additional resource can be added concurrently to the existing CPC model.
B. None. The upgrade is done by changing the microcode and can be activated concurrently.
C. A change in the z14 ZR1 CPC drawer feature upgrade is disruptive. The additional engine will have an impact on the maintenance cost.
D. All IBM software contracts have to be checked and amended to include the new zIIP engine.
The IBM z14 has an Integrated Firmware Processor (IFP), which is used to manage native PCle features.
Which groups of native features are managed by the IFP?
A. zHyperlink Express, zEDC, FICON Express 16s
B. Coupling Express LR, RoCE Express2, ICA SR
C. Crypto Express, zEDC, Flash Express
D. zEDC, RoCE Express2, Coupling Express LR
A customer purchased a z14 M02 (two drawer) 710 with 1TB of active memory and 2TB of pre-planned memory installed. They are planning for the release of a new product which will require, for several days, additional processor and memory capacity. They have a CIU (Customer Initiated Upgrade) contract already in place.
Utilizing CIU and OOCoD (On Off Capacity On Demand), which of the following options will satisfy the customer's requirement?
A. Temporarily activate twice the amount of owned processor capacity that is present but not characterized in the two drawers, and purchase increments of the pre-planned memory up to the amount that is present in the two drawers.
B. Temporarily activate all of the additional processor capacity that is present but not characterized in the two drawers, and purchase increments of the pre-planned memory up to the amount that is present in
the two drawers.
C. Temporarily activate all of the processor capacity that is present but not characterized in the two drawers, and temporarily add all the additional pre-panned memory increments up to the amount of that is present in the two drawers.
D. Temporarily activate twice the amount of owned processor capacity that is present but not characterized in the two drawers, and temporarily add up to twice the amount of the active memory using the pre-planned memory in the two drawers.
Which of the following planning considerations is required when ordering the 16U reserved feature?
A. Order the number of I/O cables that will be needed.
B. Plan for the number of rack-mounted disks.
C. Order a MES for the third of fourth PCle+ I/O drawer.
D. Plan for the number of power cords required.
A client wants to add the Live Guest Relocation (LGR) feature to their IBM Z environment. Which of the following actions supports this requirement?
A. Enabling Single System Image (SSI) on z/OS v2.3 or newer
B. Applying the latest APAR to z/VM v5.4
C. Enabling Security Server on z/OS
D. Enabling Single System Image (SSI) on z/VM v6.4 or newer
What is the maximum amount of memory and IFLs on a LinuxONE Rockhopper II?
A. 8TB memory and 30 IFLs
B. 3TB memory and 15 IFLs
C. 2TB memory and 10 IFLs
D. 4TB memory and 20 IFLs
Which IBM Z I/O adapter can connect to an IBM storage device?
A. OSA-Express6S GbE
B. Crypto Express6S
C. zHyperLink Express
D. ICA SR
Which solution will affect the ability of the business to continue to run if a disaster should strike?
A. On/Off Capacity on Demand (OOCoD)
B. Capacity for Planned Event (CPE)
C. Customer Initiated Upgrade (CIU)
D. Capacity Backup (CBU)
An account you cover has received media attention. A disgruntled administrator had root access to a Linux x86 financial server, altered the boot process, and deactivated all of the security measures. The result was that highly sensitive data was stolen.
The account security directory would like to meet with you to determine if IBM Z has a solution that would prevent this from happening again.
Which IBM Z solution will prevent this type of breach?
A. Activate Integrated Cryptographic Service Facility (ICSF) along with the secure crypto coprocessor using AES keys.
B. Enable Pervasive Encryption to protect system data sets.
C. Implement the combination of RACF, z/VM, and zSecure products.
D. Use Secure Service Container to build, deploy, and manage a systems appliance.