Question 6 of 65

A customer has a zBC12 running Linux on z Systems under KVM. They learned about IBM Wave and how this tool makes it easier to manage, monitor (real-time), and provision Linux guests on z Systems.

Which would be the appropriate action to enable them to run IBM Wave?

Answer

Suggested Answer

The suggested answer is D.

IBM Wave for z/VM is a provisioning and productivity management solution for managing virtual servers with z/VM.
The IBM Wave interface provides an innovative approach to the task of managing one or multiple IBM Z systems . Each system can be configured with one or many z/VM instances that can each run virtual Linux servers.
References:
https://www.ibm.com/support/knowledgecenter/en/SS6JTX/waveadmin/wave_intro_overview.html
Question 7 of 65

The IBM account has requested an analysis to review a zEC12 upgrade to a z13.

What analysis tool is required to ensure the z13 machine channels are reviewed to meet the customers FICON Express 16S performance requirements?

Answer

Suggested Answer

The suggested answer is A.

The IBM Processor Capacity Reference for z Systems (zPCR) tool has been changed to support the new z/OS workload categories.
Note: Capacity Planning Tool (GA Level) for z13 and zBX Model 4 include zPCR, zTPM, zCP3000, zBNA, zSoftCap, zTPM, zSCON.
Incorrect Answers:
B: The zCP3000 VM Extract Utility (CP3KVMXT) reads CP Monitor data and generates an Enterprise Data File (EDF) of system and workload related measurements for input into zCP3000. It supports VM running as native or in a partition. It can be used to model interactive VM workloads or workloads under guest operating systems such as Linux.
C: IBM z Systems Batch Network Analyzer (zNBA) can be used to analyze client-provided System Management Facilities (SMF) records to identify jobs and data sets that are candidates for zEDC compression, across a specified time window, typically a batch window.
D: zSCON is used for OEM Server Consolidation onto System z.
Question 8 of 65

You are leading a planning meeting for a disaster recovery (DR) test when a high-level company executive drops in to ask why the company should spend so much time and money on disaster recovery.

What is the most accurate response to this non-technical question?

Answer

Suggested Answer

The suggested answer is D.

Question 9 of 65

Which functionality provides a high speed networking link for sharing data using server-to-server communications, at low latency, and with lower CPU overhead than traditional TCP/IP communications?

Answer

Suggested Answer

The suggested answer is A.

With SMC-R, System z network capability takes a new leap, strengthening performance for sharing data and reducing data transmission network overhead. The new System z RDMA over Converged Ethernet (RoCE) feature 10GbE RoCE Expressenables industry-standard RDMA capability on the System z platform. As an RDMA-capable network interface card (RNIC), it can transfer data using direct memory-to-memory communication, reducing the CPU overhead of the networking software stack. SMC-R provides application transparent exploitation of this new RoCE feature reducing the network overhead and latency of data transfers, effectively offering the benefits of optimized network performance across processors. This breakthrough also lowers the CPU cost associated when moving large amounts of data.
Incorrect Answers:
B: Using the zEnterprise Data Compression (zEDC) enhancements.
This enhancement allows storage administrations to exploit zEnterprise data compression (zEDC) for non-VSAM compressed format data sets. Unlike previous compression types, no separate dictionary needs to be created, as zEDC compression hides the dictionary in the data stream. A new dictionary starts in each compression unit. The system can decompress the segment as is.
C: OSA-Express is an integrated hardware feature that provides direct connection to clients on local area networks (LANs). The OSA-Express feature plugs into an I/O slot just like a channel card. Fiber-optic cable connects the OSA-Express feature to the network.
References:
https://www-01.ibm.com/software/network/commserver/SMC/
Question 10 of 65

Which z/OS function prevents unauthorized alteration of data in memory?

Answer

Suggested Answer

The suggested answer is A.

Storage protection keys cannot be altered by application programs. There is no way, using the storage protection function, for a normal application program (not an authorized program) to protect part of its virtual memory from other parts of the application in the same address space.
Note: Mainframe hardware has a storage protection function, which is normally used to prevent unauthorized alteration of storage. Storage protection is also used to prevent unauthorized reading of storage areas, although z/OS protects only small areas of storage this way.
Storage protection works on 4K pages. It deals only with real memory, not virtual memory. When a page of virtual memory is copied from disk to a free page in main storage, z/OS also sets an appropriate storage protection key in that page of main storage.
Storage protection was much more significant before multiple address spaces came into use. When multiple users and jobs were in a single address space (or in real memory in the days before virtual memory), protecting a user's memory from corruption (or inappropriate data peeking) was critical. With z/OS, the primary protection for each user's memory is the isolation provided by multiple address spaces.
References:
https://www.ibm.com/support/knowledgecenter/zosbasics/com.ibm.zos.zsecurity/zsecc_066.htm