Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

IBM 000-357 Exam -

Free 000-357 Sample Questions:

1.A customer is using a High Availability business partner solution. They will need to journal the target system at switchover time but would like to avoid the overhead of target system journaling while operating it in target mode. Which of the following solutions will reduce the overhead and allow a quick changeover to full journaling at switchover?
A.Change the journal status to *STANDBY.
B.Change the journal status to *NOWRITE.
C.End Journal Object *ALL.
D.Change Journal Receiver status to *INACTIVE.
Answer: A

2.An administrator for an i550 with multiple LPARs wants to run different jobs after a production job finishes on the production LPAR. Job A should run if the production job ends normally, and job B should run if the production job ends abnormally. How can this be accomplished?
A.Use the HMC scheduler to set up a reactive schedule for the production LPAR on those batch jobs.
B.Use the Q_JOBEND_ABN exit program when the first job finishes.
C.Have jobs A and B access the first job's job log to see if it finished normally.
D.Install Advanced Job Scheduler (5722­JS1) and set job relationships.
Answer: D

3.The databases for an application need various levels of security. Some users need to be able to change the records (group 1), others need only read access (group 2), and the rest of the company should not be able to access the records at all. Which of the following is a valid method of securing the files?
A.Set *PUBLIC authority on all of the libraries to *EXCLUDE. Grant *USE authority to all of the database objects to group 2. Grant *ALL authority to all the users in group 1.
B.Give the group 1 users *ALLOBJ authority. Set the *PUBLIC access to the files to *READ. Set the *PUBLIC access to the library to *EXCLUDE.
C.List the specific users with change and read only access in an authorization list. Assign the authorization list to the objects and set *PUBLIC to *EXCLUDE.
D.Set *PUBLIC access to the files to *CHANGE. Place group 2 in a group profile that has only *READ authority to the files. Set *PUBLIC access to the library to *EXCLUDE.
Answer: C

4.After doing some journal analysis, it has been determined that the receiver size needs to be changed. Which of the following is required to start using receivers with the new size?
A.End journaling of all objects, delete the journal, delete the receiver, create the receiver with the new size, create the journal, and start journaling the objects.
B.Create a receiver with the new size and change the journal to use the new receiver.
C.Change the journal to generate a receiver using the new size.
D.Change the receiver to use the new size.
Answer: B

5.What is the recommended work management environment for interactive workloads?
A.All devices in a single subsystem
B.A subsystem for every 100 devices
C.A subsystem for every 300 devices
D.A subsystem for every 500 devices
Answer: C

6.An iSeries system has two i5/OS partitions. The Virtual LAN is configured to communicate between partitions for data replication. One of the partitions is connected outside the company firewall to host the company web server. What should the system administrator do in order to maximize security over the Virtual LAN between the partitions?
A.Add the QTMHHTTP and QSECOFR user profiles to the TCP/IP Port Restrictions table on each partition.
B.Enable only the *SIGNON and *FILE host servers on the partition inside the firewall.
C.Disable all TCP servers on the web partition that are not required for web serving and data replication.
D.Set up SSL on the Virtual LAN between the two partitions.
Answer: C

7.A data center with five eServer i5 systems and two HMC devices wants to have redundancy and remote access for the HMCs. How should the network be configured?
A.Place Port 1 from each of the Flexible Service Processors (FSPs) in a private network. Connect Port 1 from one HMC directly into the FSP of the Service Provider system. Connect Port 1 of the other HMC directly into the second FSP in the private network.
B.Place Port 1 on each Flexible Service Processor (FSP) and Port 1 from one HMC on a private network. Place Port 2 on each FSP and Port 1 from the other HMC on another private network. Place Port 2 from each HMC onto the public network.
C.Place Port 2 from each HMC and Port 1 from each Flexible Service Processor (FSP) on a private network. Place Port 1 from each HMC and Port 2 from each FSP on the public network.
D.Place Port 1 from each HMC and Port 1 from each Flexible Service Processor (FSP) on a private network. Place Port 2 from each HMC and FSP onto the public network.
Answer: D

8.Which of the following is an IBM supplied task role for an HMC user?
Answer: D

9.What is the minimum version of AIX supported for use on an eServer i5?
A.AIX 5L V5.0
B.AIX 5L V5.1
C.AIX 5L V5.2
D.AIX 5L V5.3
Answer: C

10.How would a secondary partition console be forced into dedicated storage tools?
A.In iSeries Navigator, Management Central, System Service Tool, set option 21 on the secondary partition.
B.Set the control panel to xx21 where 'xx' is the number of the partition.
C.Use option 21 on the Work with Partition Status in SST.
D.Call the QCPSRVPNL(Control Panel) API from a control language program and set option 21 in the service processor.
Answer: C

11.A system administrator has upgraded the central distribution system to OS/400 V5R3. They are making changes to the system startup program, which will be distributed to V5R3 and V5R2 systems in the network using SAVRSTOBJ. Which of the following CL commands when used in the system startup program will cause the distribution to fail?
Answer: D

12.The administrator of an i5/OS system has just finished activating a new TCP/IP interface which connects to a firewall. The interface is active, but iSeries programs are unable to access the Internet. Which of the following is a cause of the problem?
A.There is no route to the gateway configured for the new interface.
B.The default route for TCP/IP configurations does not have the new interface added to it.
C.A host table entry with the proper DNS server needs to be added on the new interface.
D.A TCP/IP server table entry for DNS needs to be updated with the new interface.
Answer: A

13.Which of the following is used to run a program or SQL process based on a specified database event?
A.Two­phase commit
C.Commitment control
Answer: D

14.A customer has an i5/OS system with an IXS. The IXS is implemented with one *NWSSTG for Windows and another for data. A full system backup is run weekly with the IXS varied off. They want to back up changed files daily from the IXS with their OS/400 nightly backup routine. Which
of the following will allow them to perform this backup?
A.Synchronize the profile and password that the backup runs under with the Windows server. Create a directory in QNTC with the Windows server name and add a SAV command to save changed objects in that QNTC directory.
B.Use the SAVWNTBRM with CHGONLY(*YES) in the nightly backup to save the changed objects.
C.Use the SAVCHGOBJ command with the IXSDTA(*YES) and NWSD(servername) options as part of the nightly backup.
D.Add a SAV of the QNTC directory to the nightly backup. The backup user will need to have *ALLOBJ
and *SAVSYS special authorities.
Answer: A

15.After an upgrade of an iSeries server from V5R2 to V5R3, how would the system administrator know that the cumulative PTF package applied successfully?
A.Display the messages in QSYSMSG.
B.Display data area QSF99520 for the completion status.
C.Use option 50 on the Work with Licensed Programs menu.
D.Use iSeries Management Central, Endpoint systems, Display log to review the completion history.
Answer: C

16.A customer has several iSeries servers connected with TCP/IP and Anynet. Administrator user IDs and passwords are kept in sync among all servers. When the administrators enter STRPASTHR RMTUSER(*CURRENT) RMTPWD(*NONE) to connect to remote systems they get a
'password is required' error message. What must be done to correct this problem?
A.The system value QRMTSIGN must be set to *SAMEPRF.
B.Each pair of systems must be configured as secure location pairs.
C.The SNA Network name must be changed to be the same for all systems in the network.
D.The AnyNet controllers must be set to enable password encryption.
Answer: B

17.An application performs transactions on three databases that are each on different iSeries systems. Which of the following rules governing commitment control is true?
A.If a transaction does I/O operations on each of these three iSeries, it uses three­phase commit.
B.If a transaction does I/O operations on just one of those iSeries, it uses single­phase commit.
C.If a transaction does I/O operations on at least two iSeries, it uses two­phase commit.
D.Transactions which do I/O operations on each of these three iSeries use three­phase commit only if these three iSeries are running V5R3.
Answer: C

18.A manufacturing site accesses the iSeries remotely. Daily, during the hours of 5:30 AM until
6:00 AM, the manufacturing site assembly line data entry workers complain of poor response times. At all other times the system performance is acceptable and batch throughput is acceptable. PM/400 collections are run daily on this iSeries system. What would be the first step in determining the cause of slow response?
A.Start, print, and review a communications trace for the problematic time period.
B.Review QSYSMSG for the problematic time period.
C.Review performance collections for the problematic time period.
D.Determine if the interactive assembly line data entry workers' jobs are interfering with another application during the problematic time period.
Answer: C

19.Which of the following SELECT statements will cause a TABLE PROBE when using Visual Explain?
A.Select col2 from ...
B.Select col1 from...
C.Select col1, col2 from ...
D.Select * from ...
Answer: D

20.A system administrator wants to regularly check the system for developing hardware problems before a critical failure occurs. Which of the following options is best for this purpose?
A.Review the History Log for hardware warning messages.
B.Enable Service Agent.
C.Enter the Product Activity Log service tool, then analyze and review the log for repeat entries on certain devices.
D.Use the Work with Problems command to display recorded problems, then examine the listed problem entries for hardware issues.
Answer: B

21.Which of the following HMC options is used to update the eServer i5 FSP firmware via the HMC?
A.Licensed Internal Code Updates > Change Internal Code
B.HMC Code Update > Install Corrective Service
C.Service Applications > Service Agent
D.HMC Management > HMC Configuration
Answer: A

22.A system operator is trying to sign on to a remote iSeries system using the command STRPASTHR and is getting a sign­on screen for the remote system. Which of the following system values and settings would cause this?
Answer: C

23.Which of the following would allow i5/OS to provide NFS mount points?
Answer: B

24.The administrator wants to set up the developers in an environment within the production system without creating an LPAR. The developers must have access to development libraries with the same name as the production libraries. Which of the following is the best method for doing this?
A.Set up an IASP and place the development copy of the libraries in that IASP.
B.Create a secondary ASP and place the development copy of the libraries in that ASP.
C.Create a second library file system, QSYS2.LIB, in the IFS and assign the developers' job descriptions to the new library system.
D.Create an additional database name on the *LOCAL system and change the developers' job descriptions to use the new database name.
Answer: A

25.A shared console is in use and the administrator does not know the current session key. How can the HMC administrator regain control of a partition's console?
A.Connect to the HMC, select the partition profile, and select properties. Then select Settings. After changing the console type to LAN console, change it back to HMC. Start a new shared session.
B.Select Show Details from the HMC Remote 5250 Console Partition Selection screen, then use the Disconnect option next to the current shared session. A new session key can now be created using Connect Shared.
C.Issue the command to power cycle the HMC from the console session, reconnect after the restart, and create a new session key.
D.Sign on to the HMC as HSCROOT. Choose Service Functions, Console Functions, Reset Console.
Answer: B

26.In addition to the HMC recovery CDs, what is needed to recover the HMC during a total reload?
A.Latest SAVSYS tape from the service partition
B.DVD from Backup Critical Console task
C.Latest HMC service update
D.DVD from Save Upgrade Data task
Answer: B

27.ANZPFRDTA shows that average interactive response time on the system is greater than 3 seconds every afternoon. Total fault rates for all pools are under 20 per second and percentage CPU used is 78%. The Wait to Ineligible transitions are 10­15 per second in the interactive pool. What should the system administrator do first to address this situation?
A.Increase the size of the interactive pools with storage from the *MACHINE pool.
B.Increase the size of *MACHINE since *BASE has more than enough storage.
C.Decrease MAXACT on *BASE to enable more jobs to run in the interactive pools.
D.Increase MAXACT on the interactive pools.
Answer: D

28.The system administrator must schedule an eServer i5 processor resource move for after hours processing. Which of the following should be used to perform this task?
A.iSeries Navigator
C.DST on the primary partition
D.SST on the partition needing the resources
Answer: B

29.What are the security ramifications of changing the "DDM access request" network attribute on system A from *REJECT to *OBJAUT?
A.Bi­directional DDM requests are now allowed, and object­level authorities are verified on both systems.
B.Incoming DDM requests will now be allowed on system A, and object­level authorities are verified on system B.
C.Incoming DDM requests will now be allowed on system B, and object­level authorities are verified on system A.
D.Incoming DDM requests will now be allowed on system A, and security is controlled by the object­level authorities on system A.
Answer: D

30.A system has been reloaded at a Disaster Recovery site. The LAN connection fails to vary on. Which of the following actions will correct the problem?
A.Move the LAN IOA to a slot adjacent to its controlling IOP.
B.Run RSTCFG with SRM(*ALL).
C.Vary on the bus with the LAN adapter.
D.Change the hardware resource name for the LAN adapter to match the Disaster Recovery system hardware.
Answer: D

© 2014, All Rights Reserved