|
Question 5. When you operate in asynchronous mode, which three statements are true? (Choose three) A. You are susceptible to data loss. B. Response time is improved over long distances. C. Data is set to the remote site through all controller ports. D. I/O is acknowledged after data is written to the target site. E. Replication mode needs to be set for each remote copy set. Answer: Question 6. For what is the Appliance Manager used? (Choose two) A. To add user-defined links. B. To install SANworks applications. C. To perform network configuration. D. To change date, time, and tome zone settings. Answer: Question 7. In a DRM configuration that is totally powered down, which component is the last to be powered up? A. HSG at the target site. B. Host at the initiator site. C. HSG at the initiator site. D. Switched at the target site. Answer: Question 8. What is one form of disaster recovery? A. Multiple data paths B. Fireproof data center C. Cluster configurations D. Remote copies of data over the SAN Answer: Question 9. What are three benefits of Secure Path? (Choose three) A. Continuous monitoring B. Identifying failed disks C. Identifying failed paths D. Controller configuration E. Automated failover capability Answer: Question 10. What are three software requirements for installing Compaq SRM server? (Choose three) A. TCP/IP B. Oracle DBS C. Microsoft IIS D. Novel Netware E. Windows 2000 Advanced Server Answer: Question 11. Which HSG command adds a remote copy set to an existing association set? A. SET association-set-name ADD=remote-copy-set-name B. ADD ASSOCIATIONS association-set-name remote-copy-set-name C. SET ASSOCIATIONS association-set-name remote-copy-set-name D. ADD ASSOCIATIONS association-set-name=remote-copy-set-name Answer: Question 12. EVM is limited to _____ snapshots per HSG subsystem. SANworks Virtual Replicator is limited to ______ snapshots. A. 4; 12 B. 6; 12 C. 12; 4 D. 12; 6 Answer: Question 13. By installing a plug-in onto a system where a Compaq SRM agent is installed, you allow that SRM agent to________. A. Have a full SRM Admin privileges. B. Become a proxy for the SRM server. C. Communicate with the Management Appliance. D. Become a proxy for the Storage Works subsystem. Answer: Question 14. What is available when DRM is configured to operate in normal error mode? A. Standby B. Write-back C. Fault verification D. Write-history logging Answer: Question 15. A DRM solution provides _______. (Choose three) A. Clustering B. Maximum update C. Reduced downtime costs D. Reduced potential data loss E. Automatic failover and failback Answer: Question 16. You want to access HSG Element Manager from a network client workstation. Which three must you have? A. Java plug-in B. Fiber Channel over IP C. Fiber Channel connection to the SAN D. Netscape Navigator or Internet Explorer E. LAN access to the Management Appliance F. Access privileges to the Compaq SAN switch Answer: Question 17. On DRM, snapshots are _______. A. Remote copy sets B. Non-remote copy sets C. Synchronous copy sets D. Asynchronous copy sets Answer: Question 18. Which command stops or pauses replication between DRM sites? A. SET remote-copy-set-name STOP B. SET remote-copy-set-name SUSPEND C. SET target-node-name\target-unit-name STOP D. SET remote-copy-set-name OPERATION_MODE=SUSPEND Answer: Question 19. Which three are job operations within EVM? (Choose three) A. Cline B. Mount C. Launch D. Backup E. Terminate Answer: Question 20. Which three are steps for creating a Compaq SRM filter? (Choose three) A. Assign directories to search for filters. B. Define at least one criterion for the filter. C. Assign the filter to at least one file report type. D. Assign a user to at least one file system group. E. Apply the filter to at least one file system group.: Answer: Question 21. How do you change the administrator password on the Management Appliance? A. Launch the "Manage Users" administrator utility to change the user password. B. From the application menu launch the Appliance Manager, then select administrator password. C. Press CTL-ALT+DEL while logged in as the administrator and change the administrator password. D. Browse to the Management Appliance using port :2301, click on the login account, then select the "Changed" hyperlink to change the password. Answer: Question 22. Which three are EVM supported backup software applications? (Choose three) A. BEI UltraBac B. Legato Networker C. Veritas Net Backup D. CommVault Galaxy E. Computer Associates ARCserveIT Answer:
|
Question 1. The XMLCHAR builtin function provides the ability to do which of the following? A. Check XML for well-formedness B. Check XML for validity C. Create an XML buffer from a structure D. Read an XML file into a structure Answer: C Question 2. Which of the following is a typical deadlock situation? Situation 1: Transaction A waiting for resource_2 and Transaction B waiting for resource_1 while resource_1 is held by Transaction C and resource_2 is held by Transaction B Situation 2: Transaction A waiting for resource_1 and Transaction B waiting for resource_2 while resource_1 is held by Transaction B and resource_2 is held by Transaction C Situation 3: Transaction A Waiting for resource_2, Transaction B waiting for resource_3, Transaction C waiting for resource_1 ,while resource_1 ,resource_2 and resource_3 are held by Transactions A, B and C respectively. Situation 4: Transaction B waiting for resource_1 and Transaction C waiting for resource 2 while resource_1 is held by Transaction C and resource_2 is held by Transaction A A. Situation 1 B. Situation 2 C. Situation 3 D. Situation 4 Answer: C Question 3. Requirement: If the value of the numeric variable I is 1 it needs to be changed to 2 and vice versa. In all other cases it must remain unchanged. Which of the following solutions meets the requirement and does not require essential structural modifications when the requirement is changed to the following: If the value of the numeric variable I is 512 it needs to be changed to 731 and if the value is 814 it needs to be changed to 5. In all other cases it must be set to 111. A. lF I = 1 ! 1 = 2 THEN I = 3 - I; B. DCLONETWO(2) BIN FIXED(15) INIT(2,1); IF I = 1! I = 2 THEN I = ONETWO(I); C. SELECT (I); WHEN(1) I = 2; WHEN(2) I = 1; OTHER; END; D. IF I = 1 THEN I = 2; IF I = 2 THEN I = 1; Answer: C Question 4. Which of the following is LEAST likely to be performed by an online application? A. Checkpoint/restart logic B. Transaction processing C. End user interaction D. Sorting Answer: A Question 5. Which of the following PL/I features is NOT new with Enterprise PL/I? A. VALUE attribute for named constants. B. UNIONs or CELLs to assign identical storage to different variables. C. Writing numeric constants with the underscore sign as a separator. D. Using hexadecimal constants. Answer: D Question 6. The lead developer on a project has just learned that Pat, a highly skilled programmer on the team, has been reassigned. The lead developer is familiar with Pat's work and is concerned because no one on the team has the necessary skills to pick up the work immediately. A new employee with the required skills is joining the team next week, but the timeline for a mission critical milestone has been moved up to the end of this week. Which of the following is the most appropriate action for the lead developer to take to ensure that the critical milestone is met? A. Direct the team to cover all of Pat's work until the new employee arrives. B. Explain to the team why this change in schedule is important to the customer. C. Personally cover the work until the new employee arrives. D. Explore with the team whether they will be able to meet the new deadline. Answer: C Question 7. Given the following declarations, which statement correctly refers to X? DCL R CHAP(10); DCLX CHAR(10) BASED; DCL P PTR; DCLZ CHAR(10); P = ADDR(R); A. Z = P -> X; B. P = ADDR(X); C. Z = X; D. X='THIS IS X'; Answer: A Question 8. Prerequisite: A sorted input dataset with record length 100 contains at least one record for each of the values '1', '2', '3' in the first byte. The applied sort criteria is 1,100,ch,a. Requirements: 1.) All records with '1' in the first byte must be ignored. 2.) All records with '2' in the first byte must be written to the output dataset. 3.) If there is a '3' in the first byte, the read iteration must be left. 4.) The program must not abend or loop infinitely. If the code below does not fulfill the specifications provided above, which of the following is the most likely reason? DCL DDIN FILE RECORD INPUT; DCL DDOUT FILE RECORD OUTPUT; DCL 1 INSTRUC, 3 A CHAR(1), 3 * CHAR(99); DCL EOF_IN BIT(1) INIT('0'B); DCL (Z1,Z2,Z3,ZO) BIN FIXED(31) INIT(0); ON ENDFILE(DDIN) EOF_IN = '1'B; READ FILE(DDIN) INTO (INSTRUC); LOOP: DO WHILE (^EOF_IN); SELECT(INSTRUC.A); WHEN('1') DO; Z1 +-= Z1; ITERATE LOOP; END; WHEN('3') DO; Z3 = Z3+1; LEAVE LOOP; END; WHEN('2') DO; Z2 = Z2+1; WRITE FILE(DDOUT) FROM(INSTRUC); END; OTHER DO; ZO = ZO+1; PUT SKIP LIST(INSTRUC.A); END; END;/*select*/ READ FILE(DDIN) INTO(INSTRUC); END ;/*loop*/ A. The code does not fulfill the requirement because the program will loop infinitely. A. The code does not fulfill the requirement because the program will loop infinitely. B. The code does not fulfill the requirement because the last record with '2' in the first byte will be written twice to the outputdataset.C. The code does not fulfill the requirement because the last record with '2' in the first byte will be written twice to the output dataset. C. The code does not fulfill the requirement because not all records with '2' in the first byte will be written to the outputdataset.C. The code does not fulfill the requirement because not all records with '2' in the first byte will be written to the output dataset. D. The code fulfills therequirement.D. The code fulfills the requirement. Answer: A Question 9. Given the following declarations, which code is likely to perform best and correctly initialize structure 3? DCL 1 S UNALIGNED, 2 A CHAR(3), 2 B BIN FIXED(31), 2 C DEC FIXED(5); DCL 1 T UNALIGNED LIKE S; T = "; A. S= "; B. S = T,BY NAME; C. CALLPLIFILL(ADDR(S),'',STG(S)); D. CALLPLIMOVE(ADDR(S),ADDR(T),STG(S)); Answer: D Question 10. Given the following declarations, a list of 100 elements must be created so that the element created last can be accessed as the first element of the list. A new element is always inserted in front of the element created before. The variable NEXT in the last element should contain the value NULL. Which of the following pieces of code implements this? DCL 1 NODE BASED (ANCHOR). 2 NEXT POINTER, 2 DATA FIXED BIN (31); DCL ANCHOR POINTER; DCL P POINTER INIT (NULL()); DCL I FIXED BIN(31); A. DO I = 1 TO 100; ALLOCATE NODE; NODE.DATA = I; NODE.NEXT = P; P = ANCHOR; END; B. DO I = 1 TO 100; P = ANCHOR; ALLOCATE NODE; NOTE.DATA = I; NODE.NEXT = P; END; C. I = 1 TO 100; ALLOCATE NODE; NODE.DATA = I; NODE.NEXT = P; ANCHOR = P; END; D. DO I = 1 TO 100; NODE.DATA = I; NODE.NEXT = P; ALLOCATE NODE; P = ANCHOR; END; Answer: A
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.