Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

HP HP0-661 Exam - Cheat-Test.com

Free HP0-661 Sample Questions:

Q: 1 Which advantage does the NonStop S-series RISC processor provide over CISC processors in earlier systems?
A. customized, special purpose instructions
B. numerous addressing modes
C. optimized instruction pipelines
D. multicycle machine instructions
Answer: C

Q: 2 Which statement best describes disk cache blocks?
A. Entry sequenced index blocks are always kept in cache.
B. Different disk cache block sizes exist to assist in performance tuning.
C. Different file types require different disk cache block sizes.
D. Changes to disk cache block values take effect after the next system cold load.
Answer: B

Q: 3 Power to the NonStop S-series enclosures is set to the proper voltage by _____.
A. configuring the power switch on the PMCU
B. auto-ranging circuitry within the power supply
C. ordering the proper part number for the voltage required
D. ordering the power adapter appropriate to the voltage supplied
Answer: B

Q: 4 A service processor ________. Select TWO.
A. has interfaces to both the ServerNet hardware and the serial maintenance bus (SMB)
B. runs its own independent operating system
C. connects directly to system fans
D. routes Guardian interprocess communications
E. manages communications only to the processor within its enclosure
Answer: A, B

Q: 5 What is a mandatory requirement for installing a single-enclosure NonStop S74000 server?
A. raised floor
B. ventilated room
C. air conditioning
D. 240V power
Answer: B

Q: 6 Which term identifies a collection of routers and ServerNet links?
A. adapter
B. fabric
C. SAC
D. LIF
Answer: B

Q: 7 Which component does NOT contain at least one ServerNet Addressable Controller?
A. IOMF CRU
B. SWAN concentrator
C. E4SA
D. PMF CRU
Answer: B

Q: 8 ServerNet routing tables are generated based on the ______? Select TWO.
A. SCF configured settings in the $ZZKRN subsystem
B. settings in the group ID switches
C. number of routers between nodes
D. manner in which the SEB cables are routed
E. ServerNet topology configuration setting for the group
Answer: B, E

Q: 9 Which peripherals can you connect to a NonStop S-series server via AWAN?
A. ATM devices
B. standard serial printers
C. tape drives
D. X.25 connected devices
Answer: B

Q: 10 Group numbers are important because they _______.
A. correspond to the processor numbers housed within the group
B. identify the system enclosure in which a system component is located
C. provide the ability to easily switch disk drives from group to group
D. determine the order in which I/O enclosures are added to the system
Answer: B

Q: 11 TSM workstations can be connected to either a public LAN or a dedicated TSM LAN. Which functions are available to TSM when installed for use on the Public LAN? Select TWO.
A. low level link
B. service application
C. EMS event viewer
D. system start
E. notification director
Answer: B, C

Q: 12 Two processors within a single enclosure connect to each other through which component?
A. SEBs
B. PMCU
C. backplane
D. IOMFs
Answer: C

Q: 13 A ServerNet buffer board is a part of _______.
A. an IOMF CRU
B. a PMF CRU
C. a SWAN concentrator
D. a PMCU
Answer: A

Q: 14 What is the primary function of the Expand subsystem?
A. transfers data between geographically dispersed NonStop systems
B. allows a single node to grow beyond 16 processors
C. connects multiple NonStop systems together to form one network
D. connects NonStop systems to systems manufactured by other vendors
Answer: C

Q: 15 What are advantages of a message-based operating system architecture? Select TWO.
A. It supports system and peripheral expansion to match business growth.
B. All messages are shared between processes using shared-memory buffers.
C. Programmers can select different memory buffer sizes based on message priority.
D. Applications do not need to be modified when adding new hardware or processes since the operating system translates device and process names into their physical locations.
E. Additional networking software is not needed to extend the capability of the message-based operating system to a network of NonStop systems.
Answer: A, D

Q: 16 Why does disk I/O throughput improve as systems are expanded?
A. Disk process checkpointing is reduced.
B. More logical volumes are available for use.
C. Larger NonStop TMF audit trails are possible.
D. The newly added disks are faster.
Answer: B

Q: 17 In accessing a local process, users and user programs need only provide the name of the process. Why?
A. The file system translates the process name to a physical location using internal tables.
B. All processes on the system keep tables that contain the names of all other processes on the system.
C. A process in a processor can only communicate with other processes in the same processor.
D. Processes do not communicate by name as they need to know the location of the process they are trying to access.
Answer: A

Q: 18 An enterprise management tool is typically used to operate and manage _______.
A. computer systems from different vendors
B. similar computer systems spread throughout a large enterprise
C. distributed database systems on large networks
D. multiple databases on a single system
Answer: A

Q: 19 Which software is required to implement RDF?
A. TCP/IP
B. NonStop TMF
C. NonStop TS/MP
D. RSC
Answer: B

Q: 20 A business transaction consists of _______.
A. all steps necessary to transform a database from one consistent state to another
B. all steps necessary to transform a data file from one consistent state to another
C. all steps necessary to transform a local database from one consistent state to another
D. an individual record update on a local or remote data file
Answer: A

Q: 21 The disk process helps to ensure data integrity by enforcing _______.
A. programmer-requested record locking only
B. programmer-requested file locking only
C. programmer-requested file and record locking only
D. record and file locking at the NonStop TMF transaction level
Answer: D

Q: 22 Middleware is best described as _______.
A. software an application programmer writes to access privileged procedures
B. software between two application server processes
C. the process Pathsend servers use for link requests in a Pathway environment
D. software an application uses to receive services from an operating system
Answer: D

Q: 23 Which statement is NOT correct if a system processor fails?
A. Other processors can take over the failed processor's workload by activating copies of the processes that were running in the failed processor.
B. The individual processor failure does not stop the system operation as a whole.
C. The system needs to be cold-loaded once the failed processor is physically replaced.
D. The NonStop S-series server uses the message system as the basis for an efficient failure detection mechanism.
Answer: C

Q: 24 What is a fabric in a NonStop S-series server?
A. the bus equivalent of the DynaBus+
B. a collection of connected routers and ServerNet links
C. an I/O channel
D. another term for Tetra-16 topology
Answer: B

Q: 25 The difference between an audited and unaudited data file is that an _______.
A. audited data file is automatically archived by the NonStop TMF subsystem while an unaudited data file must be manually archived
B. unaudited file can be recovered to the last successfully completed transaction using the NonStop TMF"recover" command
C. audited file can be recovered to the last successfully completed transaction using the Backup and Restore utilities
D. audited file can be recovered to the last successfully completed transaction using the NonStop TMF"recover files" command
Answer: D

Q: 26 The NonStop TMF subsystem performs transaction backout by _______.
A. setting the data fields on a user's application screen to initial values in response to a transaction cancellation request
B. reversing the data changes in the local data file and setting the data fields on a user's application screen to initial values in response to a transaction cancellation request
C. reversing all database changes for a given transaction after the transaction has been completed
D. using audit trail information to reverse all database changes associated with a given active transaction
Answer: D

Q: 27 You change disk cache block size .5 from 1000 blocks to 2000 blocks. This means you have increased the cache memory available for files with block size of _______.
A. 512 bytes
B. 1024 bytes
C. 2048 bytes
D. 4096 bytes
Answer: A

Q: 28 What type of performance improvement can be achieved by adding additional processors to a NonStop server?
A. exponential
B. geometric
C. linear
D. fractional
Answer: C

Q: 29 A persistent generic process can _______.
A. only be a system process
B. accept DEFINEs, PARAMs, or ASSIGNs
C. be added, deleted, or modified by SCF
D. only be stopped by user 255,255
Answer: C

Q: 30 Programs compiled for earlier NonStop systems will run on NonStop S-series servers if _______.
A. the relevant run-time libraries are included in the system library
B. addresses are aligned to 32-bit boundaries
C. only 32-bit data items are used
D. the PFS is at least 1024 bytes
Answer: A


© 2014 Cheat-Test.com, All Rights Reserved