|
Question 1. Which ITIL process has responsibility in preventing unauthorized access to data? A. Availability Management B. IT Service Continuity Management C. Release Management D. Security Management Answer: D Question 2. Where are agreements regarding Security Management recorded? A. in a Configuration Management Database (CMDB) B. in a Service Level Agreement (SLA) C. in a Definitive Software Library (DSL) D. in a Capacity Plan Answer: B Question 3. Which ITIL process handles the implementation of the policy for access management and access to information systems? A. Availability Management B. Incident Management C. Release Management D. Security Management Answer: D Question 4. Which ITIL process ensures that the information that has been made available satisfies the specified information security requirements? A. Availability Management B. IT Service Continuity Management C. Security Management D. Service Level Management Answer: C Question 5. Which of the following describes the basic concept of Integrity in the Security Management process? A. the capacity to verify the correctness of the data B. the correctness of the data C. protection of the data against unauthorized access and use D. access to the data at any moment Answer: B Question 6. Security Management includes a number of sub-processes. Which activity of Security Management leads to a security sub-clause in the Service Level Agreement (SLA)? A. Implement B. Maintenance C. Plan D. Control Answer: C Question 7. The Deming quality circle is a model for control based on quality. Which step in this model must be taken first? A. adjustment B. measurement C. planning D. implementation Answer: C Question 8. A process is a logically coherent series of activities for a pre-defined goal. What is the process owner responsible for? A. setting up the process B. implementing the process C. describing the process D. the result of the process Answer: D Question 9. What is the difference between a process and a project? A. A process is continuous and has no end date, whereas a project has a finite lifespan. B. A project is continuous and has no end date, whereas a process has a finite lifespan. C. A process stops when the objective has been achieved, whereas a project does not stop when the objective is met. D. In a project the focus is not on the result, whereas with a process the result is important. Answer: A Question 10. What is the basis of the ITIL approach to Service Management? A. departments B. IT resources C. officials D. interrelated activities Answer: D Question 11. Which of the following is a benefit of using ITIL? A. that the users can influence the IT organization providing the IT services B. that the quality and the costs of the IT services can be controlled more efficiently C. that the organization around the IT services can be set up faster D. that it is finally possible to charge for IT services Answer: B Question 12. Which activity takes place immediately after recording and registering an incident? A. analysis and diagnosis B. classification C. matching D. solving and restoring Answer: B Question 13. In an organization, the purchasing department has relocated internally - not just the people, but also their IT resources. A Service Desk employee has been commissioned to relocate this department's workstations. In which ITIL process is this employee now playing a role? A. Change Management B. Incident Management C. Problem Management D. Configuration Management Answer: A Question 14. Information is regularly exchanged between Problem Management and Change Management. What information is this? A. Known Errors from Problem Management, on the basis of which Change Management can generate Requests for Change (RFCs) B. RFCs resulting from Known Errors C. RFCs from the users that Problem Management passes on to Change Management D. RFCs from the Service Desk that Problem Management passes on to Change Management Answer: B Question 15. In IT Service Continuity Management various precautionary measures are taken, for example using an emergency power provision. Which of the following ITIL processes could also initiate this kind of measure? A. Availability Management B. Capacity management C. Change Management D. Incident Management Answer: A
|
Question 1. A System i customer has an iSCSI attached BladeCenter with 14 blades. The BladeCenter has Ethernet switches installed in Bay 1 and Bay 3. They would like to use a second initiator port on one of their blades. What parts are needed? A. 1 Ethernet switch in Bay 2 B. 1 Ethernet switch in Bay 4 C. 1 Ethernet switch in Bay 2 and a second initiator HBA on the blade D. 1 Ethernet switch in Bay 4 and a second initiator HBA on the blade Answer: B Question 2. When adding an IXS/IXA to a System i, what changes need to be considered for the i5/OS memory pools? A. The *MACHINE pool must use expert cache. B. The *MACHINE pool will need more memory. C. A private pool for the virtual LAN should be established. D. A shared pool for the Integration for Windows Server Licensed Program Product (LPP) is required. Answer: B Question 3. A customer has a System i5 520 1/2-way with five 70 GB RAID protected disk drives that are at 50% capacity. The current i5/OS applications are very I/O intensive. A performance-critical SQL server application that requires 100 GB of storage is going to be installed on a uni-processor integrated server. Which of the following solutions meets the performance requirement of the SQL application? A. Add 2 GB of System i memory. B. Activate an on-demand processor. C. Add three drives to the current RAID set. D. Create a new user ASP to contain the application storage spaces. Answer: C Question 4. If six blade servers are installed in a BladeCenter, which I/O BAY supports the second port of the initiator iSCSI HBAs of all installed blade servers? A. Bay 1 B. Bay 2 C. Bay 3 D. Bay 4 Answer: D Question 5. A customer has an i825, running V5R3, with an x360 IXA attached server. They are upgrading to an i520 and migrating their IXA to iSCSI. In addition to purchasing new System i hardware, which of the following steps are required to deliver a working solution? A. Replace IXA in the x360 with iSCSI initiator HB A. Migrate i825 onto i520 at V5R3M5. Follow iSCSI install read me first to complete the iSCSI configuration and installation. B. Replace x360 with x3850. Add iSCSI initiator HBA to x3850. Migrate i825 onto i520 at V5R3M5. Follow iSCSI install read me first to complete the iSCSI configuration and installation. C. Upgrade the i5/OS on i825 to V5R4. Replace IXA in the x360 with iSCSI initiator HB A. Migrate i825 onto i520. Follow iSCSI install read me first to complete the iSCSI configuration and installation. D. Upgrade the i5/OS on i825 to V5R4. Replace x360 with x3850. Add iSCSI initiator HBA to x3850. Migrate i825 onto i520. Follow iSCSI install read me first to complete the Iscsi configuration and installation. Answer: D Question 6. A customer that wants to install multiple iSCSI servers needs to ensure which of the following software products are required to be installed on their System i? A. 5722-TC1 *BASE TCP/IP Connectivity Utilities 5722-WSV iSeries Integration for Windows Server 5722-DG1 IBM HTTP Server for i5/OS B. 5722-TC1 *BASE TCP/IP Connectivity Utilities 5722-DR1 IBM Director 5.10 5722-DG1 IBM HTTP Server for i5/OS C. 5722-TC1 *BASE TCP/IP Connectivity Utilities 5722-DR1 IBM Director 5.10 5722-WSV iSeries Integration for Windows Server D. 5722-TC1 *BASE TCP/IP Connectivity Utilities 5722-SS1 option 12: Host Servers 5722-DG1 IBM HTTP Server for i5/OS Answer: B Question 7. A customer with a System i model 520 with two 5095 expansion units wants to add two IXA attached integrated servers. What HSL configuration is recommended? A. Add a separate loop for the IXAs. B. Alternate the towers and the IXAs, one by one, in the loop. C. Place the IXAs in the center of the loop, leaving the towers adjacent to the 520 unit. D. Place the towers in the center of the loop, leaving the IXAs adjacent to the 520 unit. Answer: C Question 8. A customer has two System x servers attached via iSCSI to a System i5 520. The application to be run on each server requires two initiator HBAs. What is the minimum number of target HBAs required? A. 1 B. 2 C. 3 D. 4 Answer: B Question 9. A customer has a System i 520, seven standalone IBM x336 servers, and three standalone Dell PowerEdge servers. All of the Windows applications running on these servers have very low I/O. They would like to integrate all the Intel servers to the 520 with one target iSCSI HBA, while reusing existing hardware. How many of these servers can be integrated? A. Seven IBM servers B. Seven IBM servers and one Dell server C. Seven IBM servers and one Dell server using iSCSI software initiator D. Seven IBM servers and three Dell servers using iSCSI software initiator Answer: A Question 10. A customer with a System i model 550 wants to implement 14 integrated servers on a BladeCenter. Two of the blade servers will be running SQL server, drive large amounts of I/O, and require dedicated target HBAs for their data drives. The other blade servers run typical workloads without excessive I/O, but the customer does not know the amount of disk I/O that their servers currently drive. What is the recommended minimum number of HBAs needed? A. Two target HBAs, plus one for redundancy B. Five target HBAs, plus one for redundancy C. Seven target HBAs, plus one for redundancy D. Eight target HBAs, plus one for redundancy Answer: C
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.