Which two Cloud Pak for Data System prerequisites must be met in order to forward logs to a remote log server? (Choose two.)
A. The worker nodes should be set to logging.
B. The control nodes must to be enabled with the external IP address configured.
C. The remote logging server must have at least 100 GB of storage.
D. The unset nodes should be set to logging.
E. The remote logging server must be enabled to accept forwarding messages form control nodes.
Which command displays the severity of an alert in Cloud Pak for Data System?
A. ap issues detail
B. ap issues
C. ap show detail
D. ap info -d
What utility can be used to validate the System_Name.yml file?
A. validate_config.sh
B. validateYml.py
C. ap validate System_Name.yml
D. aposYmlCheck.py
Which statement is correct regarding external LDAP configuration for Cloud Pak for Data System?
A. An administrator needs to add the user IDs from their external Windows AD server to all 3 local server groups of the system.
B. Once external LDAP support has been disabled from the system, the required users need to be recreated as local users.
C. User IDs from the external Windows AD server do not need to be added to the local server groups of the system.
D. If external LDAP is disabled, then external users do not need to be recreated, they will automatically authenticate locally.
Which node role is a candidate for the Platform Manager hub?
A. universal
B. worker
C. control
D. labeled
What is the result of running the ap issues 1001 command?
A. displays details for issue 1001
B. displays issues for component 1001
C. displays issues for user 1001
D. displays the last 1001 issues
Which tool is used to apply STIG hardening to Cloud Pak for Data System?
A. Manually change the recommended files by STIG guidelines.
B. Use the web console and configuring Home->Admin->STIG.
C. Use security_stig_manager with --applyAll.
D. Use security_comliance_manager.
What action should an administrator take based upon a vulnerability scan report?
A. Upload the report to Redhat support and wait for feedback.
B. Open it in a web browser, if a definition is evaluated as true then the system is not affected by these.
C. The administrator should patch the system based upon the findings of the report.
D. Open the report in a web browser, definitions evaluated as true mean that the system is affected by that vulnerability. Contact IBM support for guidance.
Which command can be used to stop only the applications running on Cloud Pak for Data System?
A. apstop
B. apstop -a
C. apstop -m
D. apstop -p
Which command displays the MTM and serial number from Cloud Pak for Data System?
A. ap get
B. ap info
C. ap list
D. ap version