ImageVerifierCode 换一换
格式:DOCX , 页数:34 ,大小:34.10KB ,
资源ID:4978236      下载积分:12 金币
快捷下载
登录下载
邮箱/手机:
温馨提示:
快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。 如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝    微信支付   
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【https://www.bdocx.com/down/4978236.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录   QQ登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(000351V426.docx)为本站会员(b****3)主动上传,冰豆网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知冰豆网(发送邮件至service@bdocx.com或直接QQ联系客服),我们立即给予删除!

000351V426.docx

1、000351V426Exam : IBM 000-351Title : IBM eserver i5 iseries single system administration v5r3 Version : V4.261. Physical files contain two components, one of which is data. Which of the following is the other?A. JournalB. CatalogC. Primary keyD. File descriptionAnswer: D2. The development staff has a

2、sked the system administrator to create an Encoded Vector Index (EVI) over several database tables. Which of the following will create the EVI?A. CREATE INDEX index_name ENCODED VECTOR ON TABLE_NAMEB. CRTLF FILE(index_name) SRCFILE(SRCLIB/SRCFILE) OPTION(*EVI)C. CRTEVI FILE(index_name) SRCFILE(SRCLI

3、B/SRCFILE) OPTION(*ASC)D. In Operations Navigator, Database, Index, use the create index wizard.Answer: A3. Which of the following will ensure that parent/foreign key relationships are maintained?A. Database viewB. Database indexC. Commitment controlD. Referential constraintAnswer: D4. During a disa

4、ster test, the restore job log shows several logical files that did not restore. A display of the SAVE 21 tape shows the logical files are on the tape. Why did the logical files not restore during the RESTORE 21?A. The owners user profile was not restored to the system first.B. The option for restor

5、ing the files to a different system was not selected.C. The operating system version is not the same as the version on the system from which they were saved.D. The logical files are in a library that was restored before the library containing the physical files.Answer: D5. Which of the following is

6、a characteristic of unique primary keys?A. They will not allow null values.B. They consist of only one column.C. They are mandatory for all physical files.D. They must consist of column(s) in the lowest ordinal position(s).Answer: A6. An application has been developed that will update several files

7、during the completion of a single transaction. If the entire transaction does not complete successfully, all changes made during the transaction need to be removed. Which of the following will automate the process?A. SQL packageB. Commitment controlC. Database journalingD. Referential constraintAnsw

8、er: B7. Which of the following command lists provides the most complete backup of the system?A. SAVSYS, SAVLIB(*NONSYS), SAVDLO, SAVB. SAVLIB(*IBM), SAVLIB(*ALLUSR), SAVDLO, SAVC. SAVLIB(*IBM), SAVLIB(*ALLUSR), SAVSECDTA, SAVCFG, SAVDLOD. SAVSYS, SAVSECDTA, SAVCFG, SAVLIB(*IBM), SAVLIB(*ALLUSR)Answe

9、r: A8. What is the effect of specifying the MBROPT(*MATCH) parameter on the restore object command?A. All members are restored if all of the member names match the saved member names.B. Only the member names matching the pattern on the member parameter will be restored.C. All members from the save m

10、edia will be restored if one of the member names matches a member in the file.D. Members on the save media that match a member in the file will be restored. Members on the save media that do not match a member in the file will not be restored.Answer: A9. When using either the Backup menu or iSeries

11、Navigator, which of the following can be saved with a backup list?A. User libraries, IBM product libraries, folders, and directoriesB. IBM libraries, Operating system, security objects, and configuration objectsC. User libraries, directories, folders, security objects, and configuration objectsD. Us

12、er libraries, IBM product libraries, Operating system, directories, and configuration objectsAnswer: C10. As part of an overall backup and recovery strategy, a system administrator is using journaling on the database. Under these conditions, which of the following will be saved using the default par

13、ameters of the save changed objects (SAVCHGOBJ) command?A. All objects changed since the last full save.B. All objects changed since the last SAVCHGOBJ command.C. All objects changed since the last full save, except for journaled objects.D. All objects changed since the last SAVCHGOBJ command, excep

14、t for journaled objects.Answer: C11. What command is used to restore authorization lists?A. RSTAUTL AUTL(*ALL)B. RSTUSRPRF USRPRF(*ALL)C. RSTLIB LIB(QSYS) OBJ(*AUTL)D. RSTOBJ OBJ(*ALL) SAVLIB(*ALL) TYPE(*AUTL)Answer: B12. Which of the following commands will save all objects in the IFS?A. SAVB. SAVD

15、LOC. SAVLIB *IFSD. SAVLIB *NONSYSAnswer: A13. The SAVRST command can be used for what purpose?A. Saving or restoring IFS objectsB. Restoring IFS objects from a save fileC. Copying IFS objects to another machineD. Testing the save by immediately restoring itAnswer: C14. Which of the following is the

16、proper order for establishing journaling of physical files?A. Create receiver, create journal, start journaling fileB. Create journal, start journaling file, create receiverC. Create receiver, start journaling file, create journalD. Create journal, create receiver, start journaling physical fileAnsw

17、er: A15. A user reports that they are receiving messages indicating that a data queue is damaged. Which of the following actions will recover the data queue?A. Restore the data queue from a recent backup.B. Save the queue to a save file and restore it from the save file.C. Remove the entries from th

18、e data queue, then run the RCLRSC command.D. Run the RCLSTG command and copy the data queue from the QRCL library.Answer: A16. The system ended abnormally due to power failure, and the system was restarted. After investigation, all applications seemed to be functioning properly and users were allowe

19、d on system. What should be scheduled during the next maintenance window?A. SAVSYSB. SAVCFGC. Reclaim storageD. Restore Licensed Internal CodeAnswer: C17. Updates were made to production files instead of the test files. The application uses commitment control. What needs to be done to fix the produc

20、tion files?A. Delete test files.B. Remove journaled changes.C. Restore the application library.D. Restore production files from last backup tape.Answer: B18. A customer has gone through the first phase of a disaster recovery drill at a hotsite by restoring profiles, critical program and data librari

21、es, and object authorities. They have now restored lower priority program and data libraries but cannot re-establish security for these libraries with the restore authority command. What must be done to allow security to be re-established?A. Rerun the RSTUSRPRF command prior to running RSTAUT again.

22、B. The libraries must be restored again with the ALWOBJDIF(*ALL) parameter.C. The system must be ended to a restricted condition prior to running RSTAUT again.D. The lower priority libraries must be specified in the LIB parameter of the RSTAUT command.Answer: A19. A customer has completed RSTUSRPRF

23、*ALL and RSTLIB *ALLUSR from their production system to a hot-site recovery system. None of the objects that were secured by authorization lists have their authorization lists attached on the recovery system. What mistake did the administrator likely make during the restore?A. The RSTAUT command was

24、 omitted.B. The RSTSECDTA command was omitted.C. The ALWOBJDIF(*ALL) parameter was omitted on the restore operations.D. The *AUTL objects were not restored prior to restoring the user libraries.Answer: C20. A total site recovery plan is being tested at a disaster recovery site. Although the tape dri

25、ves at the recovery site support the tape media, the tapes are unreadable. Which of the following conditions during the save operation would cause this problem?A. The *NO option was specified on the object pre-check (PRECHK) parameter.B. The *NO option was specified on the data compression (DTACPR)

26、parameter.C. The *ONLY option was specified on the media definition (MEDDFN) parameter.D. The *YES option was specified on the use optimum block (USEOPTBLK) parameter.Answer: D21. Which of the following commands eliminates PTF cover letters and save files from system storage?A. DLTPTFB. RMVPTFC. DLT

27、PTFOBJD. DLTPTFSAVFAnswer: A22. A system administrator has been asked to permanently apply PTF MF29023. The PTF status is Temporarily Applied and the system is operating on IPL source B. Which of the following will permanently apply this PTF without a system IPL?A. Run INSPTF LICPGM(5722999) SELECT(

28、MF29023) INSTYP(*IMMDLY)B. Run APYPTF LICPGM(5722999) SELECT(MF29023) APY(*PERM) DELAYED(*NO)C. Run CHGIPLA KEYLOCPOS(*SECURE), then run APYPTF LICPGM(5722999) SELECT(MF29023) APY(*PERM) DELAYED(*PANEL)D. Set the control panel to the IPL source A, then run APYPTF LICPGM(5722999) SELECT(MF29023) APY(

29、*PERM) DELAYED(*NO)Answer: B23. A customer is planning an automatic upgrade to V5R3 for a system with non-configured disk drives. What must be done to prevent the upgrade from automatically configuring the disk units?A. Start device parity on the non-configured disk units.B. Select the Omit Disk Uni

30、ts option on the GO UPGRADE menu.C. Use Work with disk units in Service Tools to exclude the disk units.D. Load and apply the correct PTF and choose the Keep configuration option on the Prepare for install menu.Answer: D24. A V5R3 PTF order has been received that contains the CUME, HIPER, Database a

31、nd Java packages. Which of the following is the correct procedure to install these packages and minimize the impact on system availability?A. Load the HIPER, Java, Database, and CUME packages. IPL the system.B. Load the Java, Database, HIPER, and CUME packages. Save the system.C. Install the CUME pa

32、ckage and IPL. Install the HIPER package, Database package, and the Java package and IPL.D. Load the PTFs from the CUME package and apply only the immediate PTFs. Apply the rest of the packages and apply all delayed PTFs during the next IPL.Answer: A25. Before a PTF is applied permanently, in which library is it stored?A. QSYSB. QGPLC. QPTFLIBD. QSYSWRKAnswer: B26.

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1