1、000351V426Exam : IBM 000-351Title : IBM eserver i5 iseries single system administration v5r3 Version : V4.261. Physical files contain two components, one of which is data. Which of the following is the other?A. JournalB. CatalogC. Primary keyD. File descriptionAnswer: D2. The development staff has a
2、sked the system administrator to create an Encoded Vector Index (EVI) over several database tables. Which of the following will create the EVI?A. CREATE INDEX index_name ENCODED VECTOR ON TABLE_NAMEB. CRTLF FILE(index_name) SRCFILE(SRCLIB/SRCFILE) OPTION(*EVI)C. CRTEVI FILE(index_name) SRCFILE(SRCLI
3、B/SRCFILE) OPTION(*ASC)D. In Operations Navigator, Database, Index, use the create index wizard.Answer: A3. Which of the following will ensure that parent/foreign key relationships are maintained?A. Database viewB. Database indexC. Commitment controlD. Referential constraintAnswer: D4. During a disa
4、ster test, the restore job log shows several logical files that did not restore. A display of the SAVE 21 tape shows the logical files are on the tape. Why did the logical files not restore during the RESTORE 21?A. The owners user profile was not restored to the system first.B. The option for restor
5、ing the files to a different system was not selected.C. The operating system version is not the same as the version on the system from which they were saved.D. The logical files are in a library that was restored before the library containing the physical files.Answer: D5. Which of the following is
6、a characteristic of unique primary keys?A. They will not allow null values.B. They consist of only one column.C. They are mandatory for all physical files.D. They must consist of column(s) in the lowest ordinal position(s).Answer: A6. An application has been developed that will update several files
7、during the completion of a single transaction. If the entire transaction does not complete successfully, all changes made during the transaction need to be removed. Which of the following will automate the process?A. SQL packageB. Commitment controlC. Database journalingD. Referential constraintAnsw
8、er: B7. Which of the following command lists provides the most complete backup of the system?A. SAVSYS, SAVLIB(*NONSYS), SAVDLO, SAVB. SAVLIB(*IBM), SAVLIB(*ALLUSR), SAVDLO, SAVC. SAVLIB(*IBM), SAVLIB(*ALLUSR), SAVSECDTA, SAVCFG, SAVDLOD. SAVSYS, SAVSECDTA, SAVCFG, SAVLIB(*IBM), SAVLIB(*ALLUSR)Answe
9、r: A8. What is the effect of specifying the MBROPT(*MATCH) parameter on the restore object command?A. All members are restored if all of the member names match the saved member names.B. Only the member names matching the pattern on the member parameter will be restored.C. All members from the save m
10、edia will be restored if one of the member names matches a member in the file.D. Members on the save media that match a member in the file will be restored. Members on the save media that do not match a member in the file will not be restored.Answer: A9. When using either the Backup menu or iSeries
11、Navigator, which of the following can be saved with a backup list?A. User libraries, IBM product libraries, folders, and directoriesB. IBM libraries, Operating system, security objects, and configuration objectsC. User libraries, directories, folders, security objects, and configuration objectsD. Us
12、er libraries, IBM product libraries, Operating system, directories, and configuration objectsAnswer: C10. As part of an overall backup and recovery strategy, a system administrator is using journaling on the database. Under these conditions, which of the following will be saved using the default par
13、ameters of the save changed objects (SAVCHGOBJ) command?A. All objects changed since the last full save.B. All objects changed since the last SAVCHGOBJ command.C. All objects changed since the last full save, except for journaled objects.D. All objects changed since the last SAVCHGOBJ command, excep
14、t for journaled objects.Answer: C11. What command is used to restore authorization lists?A. RSTAUTL AUTL(*ALL)B. RSTUSRPRF USRPRF(*ALL)C. RSTLIB LIB(QSYS) OBJ(*AUTL)D. RSTOBJ OBJ(*ALL) SAVLIB(*ALL) TYPE(*AUTL)Answer: B12. Which of the following commands will save all objects in the IFS?A. SAVB. SAVD
15、LOC. SAVLIB *IFSD. SAVLIB *NONSYSAnswer: A13. The SAVRST command can be used for what purpose?A. Saving or restoring IFS objectsB. Restoring IFS objects from a save fileC. Copying IFS objects to another machineD. Testing the save by immediately restoring itAnswer: C14. Which of the following is the
16、proper order for establishing journaling of physical files?A. Create receiver, create journal, start journaling fileB. Create journal, start journaling file, create receiverC. Create receiver, start journaling file, create journalD. Create journal, create receiver, start journaling physical fileAnsw
17、er: A15. A user reports that they are receiving messages indicating that a data queue is damaged. Which of the following actions will recover the data queue?A. Restore the data queue from a recent backup.B. Save the queue to a save file and restore it from the save file.C. Remove the entries from th
18、e data queue, then run the RCLRSC command.D. Run the RCLSTG command and copy the data queue from the QRCL library.Answer: A16. The system ended abnormally due to power failure, and the system was restarted. After investigation, all applications seemed to be functioning properly and users were allowe
19、d on system. What should be scheduled during the next maintenance window?A. SAVSYSB. SAVCFGC. Reclaim storageD. Restore Licensed Internal CodeAnswer: C17. Updates were made to production files instead of the test files. The application uses commitment control. What needs to be done to fix the produc
20、tion files?A. Delete test files.B. Remove journaled changes.C. Restore the application library.D. Restore production files from last backup tape.Answer: B18. A customer has gone through the first phase of a disaster recovery drill at a hotsite by restoring profiles, critical program and data librari
21、es, and object authorities. They have now restored lower priority program and data libraries but cannot re-establish security for these libraries with the restore authority command. What must be done to allow security to be re-established?A. Rerun the RSTUSRPRF command prior to running RSTAUT again.
22、B. The libraries must be restored again with the ALWOBJDIF(*ALL) parameter.C. The system must be ended to a restricted condition prior to running RSTAUT again.D. The lower priority libraries must be specified in the LIB parameter of the RSTAUT command.Answer: A19. A customer has completed RSTUSRPRF
23、*ALL and RSTLIB *ALLUSR from their production system to a hot-site recovery system. None of the objects that were secured by authorization lists have their authorization lists attached on the recovery system. What mistake did the administrator likely make during the restore?A. The RSTAUT command was
24、 omitted.B. The RSTSECDTA command was omitted.C. The ALWOBJDIF(*ALL) parameter was omitted on the restore operations.D. The *AUTL objects were not restored prior to restoring the user libraries.Answer: C20. A total site recovery plan is being tested at a disaster recovery site. Although the tape dri
25、ves at the recovery site support the tape media, the tapes are unreadable. Which of the following conditions during the save operation would cause this problem?A. The *NO option was specified on the object pre-check (PRECHK) parameter.B. The *NO option was specified on the data compression (DTACPR)
26、parameter.C. The *ONLY option was specified on the media definition (MEDDFN) parameter.D. The *YES option was specified on the use optimum block (USEOPTBLK) parameter.Answer: D21. Which of the following commands eliminates PTF cover letters and save files from system storage?A. DLTPTFB. RMVPTFC. DLT
27、PTFOBJD. DLTPTFSAVFAnswer: A22. A system administrator has been asked to permanently apply PTF MF29023. The PTF status is Temporarily Applied and the system is operating on IPL source B. Which of the following will permanently apply this PTF without a system IPL?A. Run INSPTF LICPGM(5722999) SELECT(
28、MF29023) INSTYP(*IMMDLY)B. Run APYPTF LICPGM(5722999) SELECT(MF29023) APY(*PERM) DELAYED(*NO)C. Run CHGIPLA KEYLOCPOS(*SECURE), then run APYPTF LICPGM(5722999) SELECT(MF29023) APY(*PERM) DELAYED(*PANEL)D. Set the control panel to the IPL source A, then run APYPTF LICPGM(5722999) SELECT(MF29023) APY(
29、*PERM) DELAYED(*NO)Answer: B23. A customer is planning an automatic upgrade to V5R3 for a system with non-configured disk drives. What must be done to prevent the upgrade from automatically configuring the disk units?A. Start device parity on the non-configured disk units.B. Select the Omit Disk Uni
30、ts option on the GO UPGRADE menu.C. Use Work with disk units in Service Tools to exclude the disk units.D. Load and apply the correct PTF and choose the Keep configuration option on the Prepare for install menu.Answer: D24. A V5R3 PTF order has been received that contains the CUME, HIPER, Database a
31、nd Java packages. Which of the following is the correct procedure to install these packages and minimize the impact on system availability?A. Load the HIPER, Java, Database, and CUME packages. IPL the system.B. Load the Java, Database, HIPER, and CUME packages. Save the system.C. Install the CUME pa
32、ckage and IPL. Install the HIPER package, Database package, and the Java package and IPL.D. Load the PTFs from the CUME package and apply only the immediate PTFs. Apply the rest of the packages and apply all delayed PTFs during the next IPL.Answer: A25. Before a PTF is applied permanently, in which library is it stored?A. QSYSB. QGPLC. QPTFLIBD. QSYSWRKAnswer: B26.
copyright@ 2008-2022 冰豆网网站版权所有
经营许可证编号:鄂ICP备2022015515号-1