Use this quick start guide to collect all the information about Veritas
NetBackup Administration (VCS-278) Certification exam. This study guide provides
a list of objectives and resources that will help you prepare for items on the
VCS-278 Administration of Veritas NetBackup 8.1.2 exam. The Sample Questions
will help you identify the type and difficulty level of the questions and the
Practice Exams will make you familiar with the format and environment of an
exam. You should refer this guide carefully before attempting your actual
Veritas NetBackup Administration certification exam.
The Veritas NetBackup Administration certification is mainly targeted to those
candidates who want to build their career in NetBackup domain. The Veritas
Certified Specialist (VCS) - NetBackup exam verifies that the candidate
possesses the fundamental knowledge and proven skills in the area of Veritas
NetBackup Administration.
Veritas NetBackup Administration Exam Summary: Exam Name Veritas Certified Specialist (VCS) - NetBackup
Exam Code VCS-278
Duration 105 mins
Number of Questions 75 - 85
Passing Score 65%
Books / Training Veritas NetBackup 8.1.2: Administration
Veritas NetBackup 8.1.2: Advanced Administration
Schedule Exam Pearson VUE
Sample Questions Veritas NetBackup Administration Sample Questions
Practice Exam Veritas VCS-278 Certification Practice Exam
Veritas VCS-278 Exam Syllabus Topics:
Topic Details Configure NetBackup 8.1.2 - Describe how to configure various
master/media/client settings and host properties using the NetBackup
administration console.
- Describe how to configure removable media (tape), volume pools, volume groups,
and media manager storage units.
- Describe how to configure disk and cloud storage, storage units, and storage
unit groups.
- Describe how to configure and utilize backup policies.
- Explain how to implement specialized backup solutions including synthetic
backups, True Image Restore (TIR), multiple data streams, checkpoint restart,
and the use of backup duplication solutions such as disk staging, Storage
Lifecycle Policies,
Auto Image Replication, and NetBackup Accelerator. - Describe the function, uses, configuration, and administration of the
NetBackup deduplication options, such as media server deduplication, client-side
deduplication, optimized duplication, and storage servers.
- Describe how to perform catalog backup configuration tasks.
Monitor and Maintain NetBackup 8.1.2 - Describe how to manage tape devices
and tape media. - Describe image management concepts and how to use the NetBackup
administration console to verify, expire, import, and manually duplicate backup
images.
- Describe how to manage NetBackup disk and cloud storage.
- Interpret available reports to verify and monitor NetBackup.
- Describe how and when to prioritize, cancel, suspend, resume, restart, retry
or manually run backup and duplication jobs.
- Describe how to initiate, prioritize, and monitor NetBackup restore jobs.
- Describe how to manage NetBackup Security (e.g., RBAC, host certificates).
- Describe how to install client updates (e.g., VxUpdate).
Tune NetBackup 8.1.2 - Analyze, optimize, and tune NetBackup. Troubleshoot NetBackup 8.1.2 - Interpret status codes and job details in
order to diagnose and troubleshoot failed jobs.
- Troubleshoot devices and media, including connectivity between master, media,
and client.
- Troubleshoot common issues related to NetBackup disaster recovery including
recovering the NetBackup catalog.
To ensure success in Veritas NetBackup Administration certification exam, we
recommend authorized training course, practice test and hands-on experience to
prepare for Administration of Veritas NetBackup 8.1.2 (VCS-278) exam.
QUESTION 1 What is a logical destination for NetBackup client's backup data?
A. Selection List
B. Storage Unit
C. Policy
D. Catalog
Correct Answer: B
Explanation:
The logical destinations for a NetBackup client's data include storage units,
storage unit groups, and SLP.
QUESTION 2 Which of the following is not a selection type of storage unit groups?
A. First-in First-out
B. Failover
C. Priority
D. Round Robin
Correct Answer: A
Explanation:
The four storage unit group selections include Failover, Priority, Round Robin
and Media Server Load Balancing.
QUESTION 3 Which statement is true about OpsCenter?
A. OpsCenter is a premium option from NetBackup that must be purchased
separately.
B. OpsCenter and OpsCenter Analytics are both 100% free.
C. OpsCenter cannot be used to manage NetBackup versions prior to 7.5.
D. Basic OpsCenter functionality is included with NetBackup (Additional
functionality can be added by purchasing the OpsCenter Analytics option).
Correct Answer: D
QUESTION 4 What are considerations in data protection planning?
A. Retention periods
B. Backup window availability
C. All of the above
D. Maximizing the availability of data
E. Protecting systems and applications
Correct Answer: C
QUESTION 5 Backups can be initiated by many methods.
Which method does not apply?
A. As a user scheduled backup.
B. Manually from the command line.
C. Manually from the NetBackup Administration Console.
D. Automatically, based on a policy schedule.
Number of questions: 65
Number of questions to pass: 47
Time allowed: 90 mins
Status: Live
This exam consists of 6 sections described below.
Section 1: IBM Tivoli Monitoring Infrastructure Given a basic understanding of IBM Tivoli Monitoring (ITM), describe ITM and
the various components such as IBM Tivoli Enterprise Portal Server (TEPS),
Tivoli Enterprise Monitoring Server (TEMS), agents, the data warehouse and event
synchronization so that the ITM infrastructure and its functions have been
explained.
Given a basic understanding of ITM, describe the most common Tivoli Enterprise
Monitoring Agents and their functions so that the functions of the Tivoli
Enterprise Monitoring Agent have been explained.
Given a basic understanding of ITM, describe the TEMS component and its function
so that the purpose of the TEMS has been defined.
Given a basic understanding of ITM, describe the TEPS component and its function
so that the purpose of the TEPS has been defined.
Given a basic understanding of ITM, describe the TEPS component and its function
so that the purpose of the TEPS database has been defined.
Given a basic understanding of ITM, describe the TEP clients so that the TEP
client has been defined.
Given a basic understanding of ITM, describe the usage of the data warehouse so
that the data warehouse has been defined.
Given basic familiarity with ITM, describe what the Warehouse Proxy agent (WPA)
does, what it monitors and where it can be installed so that the functions of
the WPA have been defined.
Given basic familiarity with ITM, describe what the SPA does, what it monitors
and where it can be installed so that the SPA has been defined.
Given basic familiarity with ITM, describe what the Manage Tivoli Enterprise
Monitoring Services is, what platforms it runs on and what basic functions it
provides so that the functions of the Manage Tivoli Enterprise Monitoring
Services have been explained.
Given basic familiarity with ITM, describe how ITM is able to forward situation
events from ITM to Tivoli Netcool/OMNIbus, as well as sync updates in Tivoli
Netcool/OMNIbus back into ITM so that the integration between these products has
been defined.
Given the requirement that operations staff get a console view of all incoming
and open alerts from ITM and that the ITM Situation Event Console can handle
only a limited number of events in any given period successfully, describe why
and when would you choose to implement an external event console so that the
purpose of when and why to use an external event console has been defined.
Given basic operator experience with ITM, explain how application support is the
collection of configuration data (workspaces, situations, queries, help, Take
Actions, etc.) needed by TEMS, TEPS, and the TEP clients that allows ITM data to
be viewed by a user so that application support has been defined.
Section 2: Using Monitoring Data
Given the need to perform useful event monitoring, and using the workspaces
found within the Tivoli Enterprise Portal (TEP), review the various data
elements by which a monitoring agent keeps track of the state of a managed
system. Determine the current properties and status of these managed systems,
using these data elements (attributes), to determine meaningful criteria for
analysis so that appropriate thresholds can be determined and defined in
situations.
Given the need to perform useful event monitoring, state how related attributes
are packaged together for ease of use in the Tivoli Enterprise Monitoring Server
(TEMS) so that attribute groups and their purpose have been defined.
Given the need of the ITM user to fully understand the data streams within ITM
to be able to correctly plan and implement a well performing Monitoring
environment, list the data available from ITM and match these with the
requirements from the users so that a document with full description of all
required monitoring data with their properties is available.
Given the requirement from the TEP user to have the monitoring data available in
a specific format, describe how a TEP view should be adapted to display these
data so that the TEP view has been modified and saved.
Given the requirement to visualize monitoring data on the TEP client according
to user requirements, new queries have to be created and used within a
View/Workspace so that a new query is now available from the Query selection
list.
Given the requirement of the TEP user to export monitoring data from a TEP view
to an external file, describe the actions needed to achieve this so that a new
file with monitored data is available from the TEP view.
Given the requirement from TEP users to visualize monitoring data on the TEP
Client in different formats, list the types of views that can be created in a
TEP Workspace so that the types of views have been defined.
Section 3: IBM Tivoli Monitoring Usage Given basic familiarity with IBM Tivoli Monitoring V6.3 (ITM), describe how
individual components are stopped and started on different platforms, using ITM
functionality so that the process to stop/start ITM components has been
explained.
Given a basic understanding of ITM, describe the different types of users,
including Administrators, Operations, Support teams, and Management so that the
users and their roles have been defined.
Given the need to create a new user, log on to the TEP, create the user and
assign the appropriate permissions so that the user ID has been created and is
ready for use.
Given basic familiarity with ITM, describe what a workspace is, what it can
display, its properties, what is delivered as default and what can be changed so
that workspaces within ITM have been defined.
Given the need to enable workspace admin mode, log on to the TEP, grant the
required permissions to the selected user ID, log on with the changed user ID
and enable workspace admin mode so that the workspace admin mode is enabled.
Given basic ITM knowledge, describe what level of data can be collected, what
the options are to limit or increase the amount of data collected so that ITM
data collecting options have been defined.
Given an existing View on the TEP, describe how you can limit the scope of the
rows returned from the Query so that a new view has been modified to the
requirements of the TEP user.
Given the user requirement to visualize a specific time frame of monitoring data
for a specific server or servers for a specific set of attributes, explain how
this time span should be set on the view so that the modified view reflect the
new time selection criteria.
Given the end user requirements for which monitoring data are to be collected,
define an attribute group to be collected with its specific settings so that the
historical data files will be created at the TEMA or TEMS and data will be sent
to the warehouse.
Given the requirement of TEP administrators to distribute groups of objects
(historical configurations and situations) to the same list(s) of systems, use
the Object Group Editor to assign these objects in group to managed systems or
lists of managed systems so that historical configurations and situations are
grouped to the appropriate servers.
Given the requirement to launch external applications from the TEP client,
describe the main features of this function so that the launch feature has been
described.
Given basic operator experience with ITM, describe how a user can navigate to
Take Action on a local or remote managed system and then run an Action (either a
pre-defined Action or a custom command) so that the use of Take Action has been
defined.
Section 4: IBM Tivoli Monitoring Navigation
Given basic experience with IBM Tivoli Monitoring V6.3 (ITM), explain how the
Navigator view provides access to the data that ITM collects via a hierarchical
structure (Physical by default, Custom/Logical when defined as needed) so that
the functions of the navigator tree have been explained.
Given basic familiarity with ITM, describe how one can use the Edit Navigator
View button from the Tivoli Enterprise Portal (TEP) client to create a new
Navigator View so that the process to create a new Navigator view is defined.
Given basic familiarity with ITM, describe what a Logical Navigator View is and
why it might be used (as opposed to the default Physical Navigator View) so that
the use of a Logical Navigator View is understood.
Given basic familiarity with ITM, describe how a user can navigate from the
default workspace to another workspace for the same Navigator item so that the
capability to attach multiple workspaces to a single Navigator item is
demonstrated.
Given basic familiarity with ITM, describe how to link workspaces in the TEP
client so that navigating to one particular workspace directly from another
workspace is illustrated.
Section 5: IBM Tivoli Monitoring Event Management
Given the need to perform useful event monitoring, and using the Tivoli
Enterprise Portal (TEP) features found in the situation editor, determine how
related managed systems are grouped together for ease of replication of common
analysis criteria so that when a situation is added or changed, the change is
proliferated across all related managed systems, reducing error and providing
consistency.
Given the need to perform proactive event management at times, and using the
features provided in the TEP, state reasons why event analysis with alerts is
enough (based on a situation), and when there are times that more automated
actions are required (based on a policy).
Given the need to perform proactive event management at times, and using the
features provided in the TEP, state reasons why the ITM framework event analysis
would be conducted by sampling of data, as opposed to the determination of a
pure event so that the difference between pure and sampled events has been
defined.
Given the need to perform event management and analysis to reduce business
outages, and using the features provided in the TEP, describe the steps at a
high level of setting up a situation and assigning it to a managed system so
that a situation has been set-up and assigned.
Given the need to perform event management and analysis to reduce business
outages, and using the features provided in the TEP, describe how and why one
would use the feature 'Situation Persistence' when defining a situation.
Given the need to perform event management and analysis to reduce business
outages and to find quick resolutions, using the features provided in the TEP,
describe the difference between creating a situation from the situation editor
(start from icon), or creating a situation from the navigator tree so that the
various ways to create a situation have been described.
Given the need to perform event management and analysis to reduce business
outages and to find quick resolutions, using the features provided in the TEP,
describe how and why one would use the feature 'Event Acknowledgement', to take
ownership of a situation event when it occurs so that the Event Acknowledge
feature has been explained.
Given basic familiarity with ITM, describe how pure and sampled situation events
are closed so that the difference between pure events and sampled events is
defined.
Given the need to perform event management and analysis, to reduce business
outages and to find quick resolutions, using the features provided in the TEP,
describe how and why one would need to associate a situation with a navigator
item so that how to associate a situation with a navigator item has been
defined.
Given the need to perform event management and analysis to reduce business
outages and to find quick resolutions, using the features provided in the TEP,
describe how and why one would use the feature 'Expert Advice' when defining a
situation so that the Expert Advice feature has been described.
Given basic familiarity with ITM, describe the differences between reflex
automation and workflow automation so that users can distinguish between the
two.
Given basic familiarity with ITM, describe the kind of data that can be used in
a situation and displayed in a situation event so that the use of Display Item
in situations is defined.
Given basic familiarity with ITM, describe the function of monitored,
statistical, and historical baselines in a data view so that the value of using
monitored baselines in a view is understood.
Section 6: Fundamentals of IBM Tivoli Monitoring Problem Determination
Given basic knowledge of IBM Tivoli Monitoring V6.3 (ITM), describe how a user
can determine if a component of the ITM is failing so that a user can determine
what may be failing within the ITM architecture.
The sample test is designed to give the candidate an idea of the content and
format of the questions that will be on the certification exam. Performance on
the sample test is NOT an indicator of performance on the certification exam.
This should not be considered an assessment too
Use the study guide to help pass this exam. A study guide is an easy to follow
document that will help you prepare for this exam. The guide is free and can be
downloaded immediately.
This exam has an Assessment Exam option: A9560-503 Assessment: IBM Tivoli
Monitoring V6.3 Fundamentals
Assessment exams are web-based exams that provides you, at a cheaper costs, the
ability to check your skills before taking the certification exam.
This assessment exam is available in: English
Passing the exam does not award you a certification, and it is only used to help
you assess if you are ready or not to take the certification exam.
You can register for it at Pearson VUE and it will provide you a score report,
showing you how you did in each section.
Courses and publications are offered to help you prepare for the certification
tests. The courses are recommended, but not required, before taking a
certification test. When preparing for the certification test, keep in mind that
real world experience is required to stand a reasonable chance of passing the
certification test. Courseware does not replace the requirement for experience.
Please note that course offerings are continuously being added and updated. If
you want to purchase a training course, feel free to contact an IBM Global
Training Provider.
Classroom Course
Course Title: IBM Tivoli Monitoring Fundamentals
Course Duration: 3 Days
Course Number: TM023
Course Abstract: IBM Tivoli Monitoring products monitor the performance and
availability of operating systems and applications. In this course you learn
about the Tivoli Monitoring architecture and how to navigate the Tivoli
Enterprise Portal. You also learn how to manage situation events, visualize
real-time and historical data, manage user authorities, and publish monitoring
workspaces.
Business Partners - This course does qualify for You Pass We Pay.
Status: Live An IBM Certified Associate - Tivoli Monitoring V6.3 is an individual with
entry level knowledge and experience with IBM Tivoli Monitoring V6.3. This
individual is knowledgeable about the fundamental concepts of IBM Tivoli
Monitoring V6.3 through either hands on experience or formal and informal
education. The associate should have an in-depth knowledge of the basic to
intermediate tasks required in day-to-day use of IBM Tivoli Monitoring V6.3.
To attain the IBM Certified Associate - Tivoli Monitoring V6.3 certification,
candidates must pass 1 test.
Key Areas of Competency: Explain the functionality and infrastructure of IBM Tivoli Monitoring
Describe how to use Tivoli Monitoring V6.3 data
Customize Tivoli Monitoring V6.3 data
Knowledge of Tivoli Monitoring V6.3 Navigation
Describe ITM Event Management
Recommended Prerequisite Skills Working knowledge of IBM Tivoli Monitoring V6.3 infrastructure components
Working knowledge of OS, networking, and firewall concepts
Working knowledge of Tivoli Enterprise Monitoring Agents (TEMA)
Basic knowledge of IBM Tivoli Netcool/OMNIbus
Basic knowledge of security (SSL, data encryption, GS Kit, system user accounts)
Basic knowledge of supported databases
Basic knowledge of the enterprise wide monitoring capabilities of IBM Tivoli
Monitoring V6.3
Basic knowledge of protocols including HTTP, LDAP
Basic knowledge of problem determination
Skill Levels: 1 - Basic Skill/Knowledge: Familiarity with basic functionality and
concepts, may need to rely on assistance from documentation or other resources.
2 - Working Skill/Knowledge: Working knowledge of functionality and concepts,
can use product or explain concepts with little or no assistance.
3 - Advanced Skill/Knowledge: Substantial experience with functionality or
concepts, can teach others how to use functionality or explain concepts.
4 - Expert Skill/Knowledge: Extensive and comprehensive experience with
functionality or concepts, can create or customize code, architecture, or
processes.
Requirements
This certification requires 1 exam
Exam Required:
Click on the link below to see exam details, exam objectives, suggested training
and sample tests.
C9560-503 - IBM Tivoli Monitoring V6.3 Fundamentals
QUESTION 1
Which Tivoli Enterprise Portal navigation tool is used to inform discrepancies in versions between client and server?
A. Refresh the Navigator
B. Check Discrepancies
C. Apply Pending Updates
D. Application Support Event
Answer: D
QUESTION 2
Which permission allows an administrator to share new launch definitions with other users?
A. Workspace Author Mode
B. Launch Administration Mode
C. Workspace Administration Mode
D. Launch Application Activation Mode
Answer: C
QUESTION 3
What is the purpose of the Deployment Status Summary workspace?
A. to show summary status information about remote agent deployments
B. to give an overview of the situation event status throughout the enterprise
C. to list the monitoring agents in the managed network and their online or offline status
D. to provide a visual health check of the monitoring servers in the enterprise and the application support that has been applied
Answer: A
QUESTION 4
Which two definitions are stored in a Tivoli Enterprise Portal Server database? (Choose two.)
A. Group definitions
B. Situation definitions
C. User data definitions
D. Managed systems definitions
E. Historical collection definitions
Answer: A,C
QUESTION 5
For reasons related to performance, which option can be applied to queries for data retrieval?
A. Use only one query per workspace.
B. Use an associated situation with the query.
C. Use a filter to filter the data retrieved from the query.
D. Use a policy to limit the data returned from the query.
Number of questions: 66
Number of questions to pass: 39
Time allowed: 120 mins
Status: Live
This exam consists of 15 sections described below.
Section 1 - Operating System Upgrades 7% Explain critical factors when planning an upgrade to IBM i 7.2 (from IBM i
6.1 or IBM i 7.1), including using various planning resources such as Memo to
Users, and Pre-Upgrade Verification Tool.
Explain various upgrade methods, including using image catalogues, distribution
media, network-based installations, and mixed mode migration.
Demonstrate an ability to solve problems which commonly occur before, during, or
shortly after an IBM i upgrade.
Section 2 - PTF Management 7% Work with different types of PTFs (including temp/perm, supersedes, pre/co-req,
defective) and understanding IPL source A/B/T/P).
Create and use distribution media, using image catalogues and virtual optical
devices.
Explain the concepts of HIPER, Group, Cumulative and Recommended PTFs, and
Technology Refresh; requirements for ordering PTF and FSP updates.
Section 3 - Problem Determination 8% Given a situation, explain why a problem is occurring.
Demonstrate the appropriate use of various tools to diagnose a problem (for
example, SST/DST, WRKPRB, PAL, ASMI, and various message queues).
Section 4 - Backup Tasks 8% Solve typical problems encountered during various save operations.
Explain which type of save is appropriate to a given situation (including saves
to virtual tape, save while active, full system, individual object, save
security, etc.).
Explain how to save IFS objects.
Explain the purpose of various save commands.
Explain how different types of saves affect the restore process.
Section 5 - Recovery Tasks 8% Restore various objects, including restore to different libraries, object
ownership changes, journal relationships, and LF/PF relationships; restore
deferred object apply to various restore operations.
Solve typical problems encountered during various restore operations; including
resuming a failed restore operation.
Recover the system using LIC media (including slipping LIC and D-mode IPL,
alternate IPL devices, and alternate Install devices).
Explain how to restore IFS objects.
Define system values that are critical to restore process, especially when
performing a full system restore.
Explain how to restore security and private authorities.
Section 6 - Work Management 8% Create and manage subsystems (including classes, routing entries, job queues
and job queue entries).
Create and manage job descriptions (including assigning priorities, job queues,
classes, library lists).
Manage jobs (including scheduled jobs, prestart jobs, changing the
characteristics of running jobs, and ending jobs).
Use the native Job Scheduler to automate tasks.
Use the output presented by the Work with Active Jobs, Work with System
Activity, and Work with System Status functions to perform daily performance
tuning tasks.
Section 7 - User Administration 5% Manage individual and group user profiles in IBM i.
Given a scenario, define the characteristics and appropriate uses of various
profiles.
Explain how to manage SST/DST profiles and permissions.
Explain the appropriate use of special authorities and user classes.
Section 8 - Networking 6% Create and manage a simple IP network (including creating lines, interfaces,
and routes).
Given a scenario, determine the cause of a typical networking problem.
Manage host tables and DNS entries.
Manage common servers and services (for example, FTP, SNTP, SMTP, HTTP, Telnet,
NFS, samba).
Explain creating and managing bridges and aggregated links in IBM i.
Explain how to manage remote data access (RDBDIRE, remote journaling, CFGLE,
etc.).
Section 9 - HMC Management 5% Explain how to back up the HMC (regular, and pre-update).
Explain how to restore the HMC after a failure.
Explain how to upgrade the HMC and apply firmware updates (including
demonstrating an understanding of dependent relationships such as system
firmware levels, and dual HMC configuration).
Explain how to access the HMC and system consoles remotely.
Section 10 - System Firmware (FSP) 4% Install system firmware on single-image systems and HMC-managed systems.
Explain the impact of disruptive and concurrent firmware updates.
Section 11 - Performance Management and Tuning 7% Use tools to investigate and tune system performance, including performance
collection, performance agent, Navigator for i, and monitors.
Solve common performance problems.
Explain the use of SSDs in an environment, including determining if SSDs are
practical in the environment.
Use tools to plan for OS and physical system upgrades.
Manage system performance using Work with Shared Pools functions such as expert
cache.
Section 12 - Write and debug simple CL programs & queries in support of
administrative tasks 5% Given a CL code segment, explain its use.
Create customized commands, and change command defaults.
Section 13 - Security & Compliance 10% Explain the purpose of various security related system values.
Given a situation, solve various problems related to object or system authority.
Explain how to use the Audit Journal.
Use tools to produce reports and take appropriate actions (SECTOOLS).
Demonstrate an understanding of the effect of security checking in IBM i.
Compare or contrast IFS security with library/object security.
Section 14 - Journaling & Database Management 8% Explain the benefits of journaling, including remote journaling, and
managing appropriately.
Given a situation, solve various journaling problems (including those with
remote journaling).
Given a situation, use journaling to recover database records (including those
with remote journaling).
Attach restored journals and receivers.
Create and manage journalled environments, including using remote journaling (QDFTJRN
dtaara).
Section 15 - IBM i Access, Access Client Solutions, & IBM Navigator for i 4%
Install, configure, and manage IBM i Access and Access Client Solutions for
end-users, including supporting interoperability between OS and Access releases.
Install, configure and manage Operations Console (65 plus 21).
Solve problems typically encountered by IBM i Access and Access Client Solution
users.
Use Management Central and Navigator for i tools (inventory management,
monitors, etc.).
Use database tools (visual explain, index advisor, etc.).
This exam has an Assessment Exam option: A9010-030 Assessment: IBM i
Administration V1
Assessment exams are web-based exams that provides you, at a cheaper costs, the
ability to check your skills before taking the certification exam.
This assessment exam is available in: English
Passing the exam does not award you a certification, and it is only used to help
you assess if you are ready or not to take the certification exam.
You can register for it at Pearson VUE and it will provide you a score
report, showing you how you did in each section.
All IBM certification tests presume a certain amount of "on-the-job" experience
which is not present in any classroom, Web presentation or reference material.
The recommended course and reference materials will help you gain the skill and
product knowledge outlined in the test objectives. They do not teach the answers
to the test questions, and are not intended to. This information may not cover
all subject areas in the certification test, or may contain more recent
information than is present in the certification test. Reviewing/studying the
course and reference materials will not guarantee that you will achieve
certification.
Use this training path to see the courses you need to take to achieve this skill
or certification. Click on the course boxes to access a course description, view
its schedule, and enroll. PartnerWorld Code: 04010907
Replaces PW Code: 04010906
Status: Live
The IBM Certified System Administrator - IBM i V1 is familiar with all aspects
of system administration, including upgrades from previous releases, backup and
recovery, internal and external storage management, using journaling,
understands the differences between different types of ASPs and their uses, and
has strong HMC skills.
Since administrators require hands-on capabilities with the operating system,
the accompanying certification exam only includes functionality that has been
available for at least six months prior to the exam being published. This
version of the certification (C9010-030 IBM I Administration V1) reflects IBM i
features and capabilities incorporated up through IBM i 7.2 TR2 (i.e. Technology
Refresh 2) and IBM i 7.1 TR10, available since May 2015.
Subsequent revisions of the exams will be named V2, V3, etc. With each new
version of the exam, the accompanying description will be updated to reflect the
level of operating system support that is included.
Recommended Prerequisite Skills At least two years experience, preferably more, administering IBM i running
on Power Systems servers
At least one major system hardware upgrade (for example POWER7 to POWER8)
At least one major operating system upgrade (for example, IBM i 6.1 or 7.1 to
7.2)
At least one full system restore (as if from a site-down crash)
Some experience in managing partitioned systems
Strong experience in using journaling, especially remote journaling
Understands the differences between independent ASPs, SYSBAS, and traditional
ASPs
Understands the functional differences between logical replication and
clustering
Keeps up with Technology Refreshes and has an awareness with new features and
functions
Some experience managing IBM i with SAN-attached storage
Working knowledge of the HMC
Strong familiarity with the latest Memo to Users and v7.2 TR 2
Experience with Virtualized I/O (i hosting i, VIOS) QUESTION 1
Which product gives MacBook users 5250 emulation and allows for native spooled file copy to the laptop?
A. IBM i Access for Windows using Wine on OS X
B. IBM i Access for Windows running in a virtual machine running on OS X
C. IBM i Access for OS X
D. IBM i Access Client Solutions
Answer: D
QUESTION 2
An administrator needs to secure a physical file that will have an exclusive lock by an application job.
Which object-level security will allow adding and removing private authorities without causing downtime for the application?
A. Private Authority
B. Primary Group
C. Owner
D. Authorization list
Answer: D
QUESTION 3
An administrator is recovering a single image system after a crash. The administrator has placed the latest SAVSYS into the external SAS TS2900 LTO tape drive and performed a D-Mode IPL.
Why is the system failing to find the SAVSYS media?
A. The TS2900 is an alternate installation device and requires an l_BASE_01 DVD in the alternate IPL device.
B. The TS2900 requires Alternate IPL Enablement feature to boot the SAVSYS.
C. The l_BASE_01 DVD must be loaded up to SST before a SAS tape device is
recognized.
D. The TS2900 is an alternate IPL device but not an alternate installation device.
Answer: D
QUESTION 4
What is required to restore a Hardware Management Console (HMC) to the last working configuration?
A. The last HMC back up performed via Back Up Management Console Data task
B. Recovery DVDs and the last HMC back up performed via Save Upgrade Data task
C. The last HMC back up performed via Save Upgrade Data task
D. Recovery DVDs and the last HMC back up performed via Back Up Management Console Data task
Answer: A
QUESTION 5
Given the following code sample:
DCL VAR(&USER)TYPE(*CHAR) LEN(10)
DCL VAR(&EMAIL1)TYPE(*CHAR) LEN(30)
RTVUSRPRF RTNUSRPRF(&USER)
SELECT
WHEN COND(&USER *EQ 'JOHN") THEN(CHGVAR + VAR(&EMAIL1) VALUECJOHNtgCOMPANY.COM')) OTHERWISE CMD(DO)
SNDPGMMSG MSGID(CPF9898) MSGF(QCPFMSG) +
MSGDTA('YOU ARE NOT AUTHORIZED TO USE THE TOOL') MSGTYPE
(*INFO)
CHGUSRPRF USRPRF(&USER) STATUS(*DISABLED)
GOTO CMDLBL(END)
ENDDO
ENDSELECT
STRSBS SBSD(BSTSBS)
END: ENDPGM
What will happen when user CARLA starts the program in interactive mode?
A. User gets the message YOU ARE NOT AUTHORIZED TO USE THE TOOL' and disables the user profile.
B. User gets the message YOU ARE NOT AUTHORIZED TO USE THE TOOL'.
C. User starts the BSTSBS subsystem.
D. User gets the message YOU ARE NOT AUTHORIZED TO USE THE TOOL', the user profile is disabled, and the BSTSBS subsystem is started.
Test information: Number of questions: 60
Time allowed in minutes: 90
Required passing score: 62%
Languages: English
The test contains six sections totalling approximately 60 multiple-choice
questions. The percentages after each section title reflect the approximate
distribution of the total question set across the sections.
Section 1 - Planning and Installation (16%) Identify data access restrictions
Describe database workloads
Describe data type concepts for database planning
Demonstrate knowledge of how to configure and install Informix
Demonstrate knowledge of embeddability considerations and the deployment utility
Section 2 - Security (3%) Demonstrate knowledge of authentication
Demonstrate knowledge of authorizations
Section 3 - DBMS Instances and Storage Objects (14%) Describe how to identify and connect to Informix servers and databases
Demonstrate knowledge of how to create and configure storage objects
Demonstrate general knowledge of the system databases and database catalogs
Section 4 - Informix Tables, Views and Indexes (15%) Given a scenario, describe how to create a table
Describe when referential integrity should be used
Describe methods of data value constraint
Describe the differences between a table, view, sequences, synonyms, and indices
Describe triggers and appropriate uses
Demonstrate knowledge of schema commands
Section 5 - Informix Data using SQL (14%) Describe how to use SQL to SELECT data from tables
Describe how to use SQL to UPDATE, DELETE, or INSERT data
Demonstrate knowledge of transactions
Describe how to call a procedure or invoke a user defined function
Section 6 - Data Concurrency and Integrity (10%) Identify isolation levels and their effects
Identify objects on which locks can be obtained
Describe transaction integrity mechanisms
Section 7 - Tools and Utilities (15%) Describe onstat, oninit, and onmode utilities
Demonstrate knowledge of data movement utilities
Describe sysadmin database and its functionality
Demonstrate knowledge of the features or functions available in Informix tools
Section 8 - Backup and Restore (8%) Demonstrate knowledge of backup procedures
Demonstrate knowledge of recovery procedures
Section 9 - Replication Technologies (5%) Describe the purpose of the different replication technologies
IBM Certified Database Associate - Informix 11.70 Fundamentals
Job Role Description / Target Audience The successful candidate for the IBM Certified Database Associate - Informix
11.70 Fundamentals has important knowledge, skills, and abilities necessary to
provide entry level administration of Informix, including basic SQL (Structured
Query Language), how Informix is installed, how to create databases and database
objects, security, transaction isolation, backup and recovery procedures, and
describe replication technologies and purposes.
This certification targets: Entry level technical professionals - programming, system design, architect
University students - application of information technology
Entry level DBAs - database administration
Recommended Prerequisite Skills
The following subjects are covered within this examination: Planning and Installation
Security
DBMS Instances and Storage Objects
Informix Tables, Views, and Indexes
Informix Data using SQL
Data Concurrency and Integrity
Tools and Utilities
Backup and Restore
Replication Technologies QUESTION: 1
When restoring data, which granularity of object may NOT be restored?
A. a single table
B. a single chunk
C. a single dbspace
D. an entire instance
Answer: B
QUESTION: 2
Which command would you execute to restore to a specific moment-in—time?
A. onbar—t timestamp
B. onbar—r —|og Iognum
C. onbar —r —t timestamp
D. onbar —r -| timestamp
Answer: C
QUESTION: 3
Click the Exhibit button.
An administrator created a table using the SQL statement shown in the exhibit to perform a load operation every day
at 11:00 Al\/I. What is the best way to optimize a backup strategy to recover the client table in case of a failure?
A. a |eveI—1 backup at 6:00 Al\/I everyday
B. a |eveI—0 backup soon after the load operation
C. a |eveI—1 backup on Sunday and continuous log backup
D. a |eveI—2 backup at 6:00 Al\/I every day and continuous log backup
Answer: B
QUESTION: 4
Which command option should be used to resume an interrupted onbar restore?
A. -RETRY
B. -RESTART
C. -RElNTllALZE
D. -BEGlN_AGAlN
Test information: Number of questions: 58
Time allowed in minutes: 90
Required passing score: 60%
Languages: English
The test contains six sections totalling approximately 58 multiple-choice
questions. The percentages after each section title reflect the approximate
distribution of the total question set across the sections.
Section 1 - Database Objects (16%) Demonstrate knowledge of database objects
Describe when to use SQL routines, functions and modules
Demonstrate knowledge of data types
Section 2 - Traditional Data Manipulation (31%) Demonstrate knowledge of privileges needed to access data in an application
Describe the differences between dynamic and static SQL
Demonstrate knowledge of distributed queries
Given a scenario, demonstrate knowledge of changing data
Demonstrate knowledge of cursors
Given a scenario, demonstrate the ability to manipulate large objects
Knowledge of built-in functions
Section 4 - Core Concepts (24%) Demonstrate knowledge of the difference between SQLI and Distributed
Relational Database Architecture (DRDA)
Demonstrate the ability to submit an SQL statement
Describe how to manipulate result sets
Demonstrate knowledge of problem determination
Demonstrate knowledge of isolation levels, locks and logging
Section 5 - Extensibility (16%) Demonstrate knowledge of existing database extensions
Demonstrate knowledge of UDTs
How to create functions to support UDTs
Demonstrate knowledge of casting
Demonstrate knowledge of Access Methods
IBM Certified Application Developer - Informix 11.50
Job Role Description / Target Audience This certification exam certifies that the successful candidate has an
intermediate level of skills and abilities necessary to design, build, execute
and deploy Informix 11.50 database applications, including knowledge of database
extension.
Recommended Prerequisite Skills Significant experience with intermediate or advanced level skills in
developing applications that interact with Informix databases should be
demonstrated. This individual has strong skills in Informix SQL and in database
application development concepts as well as having knowledge of the
extensibility features of Informix.
Requirements This certification requires 1 test(s).
Test(s) required:
Click on the link(s) below to see test details, test objectives, suggested
training and sample tests.
Test C2090-556 - Informix 11.50 Application Developer
QUESTION 1
What are user created temporary tables used for?
A. To persistently write temporary data to disk.
B. To share result sets across multiple sessions.
C. To access a temporary result set within one session.
D. To automatically delete data based on a time policy.
Answer: C
Explanation:
QUESTION 2
In an ANSI compliant database, what value of SQLCODE indicates a successful query that
returned no rows?
A. 100
B. -330
C. -201
D. -1
Answer: A
Explanation:
QUESTION 3
Which Committed Read isolation level statement is correct?
A. It locks all rows examined.
B. It does not check for locks.
C. It checks for locks after returning a row.
D. It checks for locks before returning a row.
Answer: D
Explanation:
QUESTION 4
Which two values can be used for connection type field from sqlhosts file when using Distributed
Relational Database Architecture (DRDA) protocol? (Choose two.)
A. ontlitcp
B. onipcshm
C. onsoctcp
D. drtlitcp
E. drsoctcp
Test information: Number of questions: 65
Time allowed in minutes: 90
Required passing score: 68%
Languages: English
Section 1: Install and update the environment (14%) Apply maintenance to the product
Demonstrate an understanding of the IBM Installation Manager and IBM Packaging
Utility and its role in installing, configuring, and maintaining IBM WebSphere
Application Servers and components both locally and remotely.
Perform a silent installation for IBM WebSphere Application Server and fix pack
installations.
Perform post-installation verification.
Troubleshoot installation problems.
Backup and restore the configuration including the use of checkpoints
Section 2: Create a high availability configuration (9%) Create multi-node topology and appropriate high availability model.
Manage nodes in an IBM WebSphere Application Server topology.
Configure and manage the HTTP server and the web server plug-in for high
availability.
Configure distributed session management for high availability and failover
scenarios.
Section 3: Configure security (17%) Configure user repositories.
Configure SSL for clients and servers.
Implement multiple security domains.
Apply administrative and application security roles.
Configure different authentication and authorization mechanisms.
Configure Java Enterprise, Web and Web Services Security.
Section 4: Monitor and tune the environment (9%) Use performance tooling to monitor the IBM WebSphere Application Server
runtime.
Tune parameters that affect IBM WebSphere Application Server performance.
Use the Performance Monitoring Infrastructure (PMI) metrics and poll MBeans for
performance data.
Configure and monitor the WebSphere Application Server caching mechanisms.
Section 5: Troubleshoot post-installation problems (11%) Enable High Performance Extensible Logging (HPEL) and view HPEL data.
Enable Cross Component Trace (XCT) and view trace data in XCT Log Viewer.
Use tools to trigger and analyze heap dumps, javacore dumps, system core dumps
and verbose Garbage Collection (GC).
Use "mustgather" documentation and/or the IBM Support Assistant to collect and
analyze diagnostic data or submit data to IBM Support.
Configure, review and analyze log files for the following: First Failure Data
Capture (FFDC), system logs, native logs, and trace logs.
Section 6: Administer and configure the environment (20%) Connect databases.
Create and manage Full profiles.
Configure resources.
Illustrate the usage of the Integrated Solutions Console.
Use the capabilities of the Job Manager tooling.
Configure or modify an IBM WebSphere Application Server environment by using
properties files and/or the monitored directory feature.
Configure an external HTTP server for the environment.
Use the standard set of command line tools to perform administrative tasks.
Section 7: Configure Intelligent Management features (6%) Use the dynamic cluster elasticity feature.
Create and configure On Demand Routers (ODR) and the ODR plug-in and associated
service policies to enable the dynamic operations.
Use health policies and actions to monitor and react to changing performance in
the environment.
Configure and maintain application editions.
Section 8: Demonstrate an understanding of a multi-tier environment (6%) Identify the components and services in an IBM WebSphere Application Server
configuration and describe how they are related or interact.
Demonstrate an understanding of how requests traverse various WebSphere
Application Server ND topologies.
Section 9: Deploy and administer applications (8%) Perform partial updates of enterprise applications, web applications, and
business level applications.
Deploy applications to an IBM WebSphere Application Server environment.
IBM Certified System Administrator - WebSphere Application Server Network
Deployment V9.0
Job Role Description / Target Audience This intermediate level certification is intended for system administrators
(system integrators, infrastructure architects, application architects and
solutions architects) who perform the installation, configuration and day-to-day
tasks associated with ensuring the smooth, reliable, and efficient operation of
an IBM WebSphere Application Server Network Deployment environment.
This includes tasks related to: 1. Architecture
2. Product Installation, Configuration, and Maintenance
3. Application Management (Deployment and Configuration)
4. Administrative Tools
5. Security Configuration
6. Clustering and Workload Management
7. Intelligent Management
8. Performance Monitoring and Tuning
9. Problem Determination
This system administrator is generally self-sufficient and can perform most of
the tasks involved in the role with limited assistance from peers, product
documentation, and vendor support services.
Recommended Prerequisite Skills
Knowledge and foundational skills one needs to possess before acquiring skills
measured on the certification test. These foundational skills are NOT measured
on the test. For skills measured on the test, see Test Objectives.
· basic Java Enterprise Edition knowledge
· basic web application architecture and deployments
· basic utilization of the command line interface and Jython/Jacl
· understanding of operating systems
· network and operating system security concepts
· networking problem determination skills
· operating system problem determination skills QUESTION 1
Which two ways are valid ways to install applications to IBM WebSphere Application Server? (Select two.)
A. wsadminscript
B. JMS messaging
C. IBM Installation Manager
D. IBM Tivoli Access Manager
E. Integrated Solutions Console
Answer: A,E
Explanation:
Deploy an application or module using the administrative console, wsadmin, programming, or deployment tools.
References:https://www.ibm.com/support/knowledgecenter/en/SSAW57_8.5.5/com.ibm.we bsphere.nd.doc/ae/crun_app_install.html
QUESTION 2
Which is true when an administrator properly updates a single file within an application?
A. The administrator can use apartial application update.
B. The administrator must redeploy the full application file.
C. The administrator can manually update the file on the file system.
D. The administrator must uninstall the application, and then, reinstall with the updated application file.
Answer: C
QUESTION 3
Which is true about software repositories for IBM Installation Manager?
A. Repositories must be local.
B. Repositories must be online.
C. Repositories can be either local or online.
D. Repositories are only in the media package.
Answer: C
Explanation:
IBM Installation Manager is a single installation program that can use remote or local software repositories to install,modify, or update certain IBM products. It determines and shows available packages, checks prerequisites and interdependencies, and installs or modifies the selected packages. You also use IBM Installation Manager to uninstall the packages that it installed.
References:http://www-01.ibm.com/support/docview.wss?uid=swg24023498
QUESTION 4
Which of the following is true about creating multiple security domains?
A. A new security domain can be created only using the administrative console.
B. Global security must be enabled before creating new multiple security domains.
C. Only usersassigned to the security-admin role can create new multiple security domains.
D. If a unique name for the domain is not specified, the system will automatically create one.
Answer: C
Explanation:
Only users assigned to the administrator role can configure multiple security domains.
References:https://www.ibm.com/support/knowledgecenter/SSAW57_8.5.5/com.ibm.websp here.nd.doc/ae/csec_sec_multiple_domains.html
Implementing Cisco Data Center Unified Fabric
Exam Number 300-165 DCII
Associated Certifications CCNP Data Center
Duration 90 minutes (60-70 questions)
Available Languages English
This exam tests a candidate's knowledge of implementing data center
infrastructure including key protocols, routing and switching protocols,
maintenance, management, operations, security, and storage.
The Implementing Cisco Data Center Infrastructure (DCII) exam (300-165) is a
90-minute, 60–70 question assessment. This exam is one of the exams associated
with the CCNP Data Center Certification. This exam tests a candidate's knowledge
of implementing Cisco data center infrastructure including key protocols,
routing and switching protocols, maintenance, management, operations, security,
and storage. The course, Implementing Cisco Data Center Infrastructure v6 (DCII),
helps candidates to prepare for this exam because the content is aligned with
the exam topics.
The following topics are general guidelines for the content likely to be
included on the exam. However, other related topics may also appear on any
specific delivery of the exam. In order to better reflect the contents of the
exam and for clarity purposes, the guidelines below may change at any time
without notice.
5.3.a Storage VDC
5.3.b FIP
5.3.c FCoE topologies
5.3.d DCB QUESTION 1 - (Topic 1)
Which statement about the Layer 3 card on the Cisco Nexus 5500 Series Switch is true?
A. BGP support is not provided, but RIP, EIGRP, and OSPF support is provided.
B. Up to two 4-port cards are supported with up to 160 Gb/s of Layer 3 forwarding capability.
C. Up to 16 FEX connections are supported.
D. Port channels cannot be configured as Layer 3 interfaces.
Answer: C
Explanation:
From the Cisco NX-OS 5.1(3)N1(1) release and later releases, each Cisco Nexus 5500 Series device can manage and support up to 24 FEXs without Layer 3. With Layer 3, the number of FEXs supported per Cisco Nexus 5500 Series device is 8. With Enhanced vPC and a dual-homed FEX topology each FEX is managed by both Cisco Nexus 5000 Series devices. As a result, one pair of Cisco Nexus 5500 Series devices can support up to 24 FEXs and 16 FEXs for Layer 2 and Layer 3.
Reference: http://www.cisco.com/en/US/docs/switches/datacenter/nexus5000/sw/mkt_ops_guides/513 _n1_1/n5k_enhanced_vpc.html
QUESTION 2 - (Topic 1)
Which statement about SNMP support on Cisco Nexus switches is true?
A. Cisco NX-OS only supports SNMP over IPv4.
B. Cisco NX-OS supports one instance of the SNMP per VDC.
C. SNMP is not VRF-aware.
D. SNMP requires the LAN_ENTERPRISE_SERVICES_PKG license.
E. Only users belonging to the network operator RBAC role can assign SNMP groups.
Answer: B
Explanation:
Cisco NX-OS supports one instance of the SNMP per virtual device context (VDC). By default, Cisco NX-OS places you in the default VDC. SNMP supports multiple MIB module instances and maps them to logical network entities. SNMP is also VRF aware. You can configure SNMP to use a particular VRF to reach the SNMP notification host receiver. You can also configure SNMP to filter notifications to an SNMP host receiver based on the VRF where the notification occurred.
Reference: http://www.cisco.com/c/en/us/td/docs/switches/datacenter/sw/5_x/nx-os/system_management/configuration/guide/sm_nx_os_cg/sm_9snmp.html
QUESTION 3 - (Topic 1)
Which three items must be configured in the port profile client in Cisco UCS Manager? (Choose three.)
A. port profile
B. DVS
C. data center
D. folder
E. vCenter IP address
F. VM port group
Answer: B,C,D
Explanation:
After associating an ESX host to a DVS, you can migrate existing VMs from the vSwitch to the DVS, and you can create VMs to use the DVS instead of the vSwitch. With the hardware-based VN-Link implementation, when a VM uses the DVS, all VM traffic passes through the DVS and ASIC-based switching is performed by the fabric interconnect.
In Cisco UCS Manager, DVSes are organized in the following hierarchy: vCenter
Folder (optional)
Datacenter
Folder (required)
DVS
At the top of the hierarchy is the vCenter, which represents a VMware vCenter instance. Each vCenter contains one or more datacenters, and optionally vCenter folders with which you can organize the datacenters. Each datacenter contains one or more required
datacenter folders. Datacenter folders contain the DVSes.
Reference: http://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/sw/gui/config/guide/1-3-1/b_UCSM_GUI_Configuration_Guide_1_3_1/UCSM_GUI_Configuration_Guide_1_3_1_c hapter28.html
QUESTION 4 - (Topic 1)
Which GLBP load-balancing algorithm ensures that a client is always mapped to the same VMAC address?
A. vmac-weighted
B. dedicated-vmac-mode
C. shortest-path and weighting
D. host-dependent
Answer: D
Explanation:
Host dependent—GLBP uses the MAC address of the host to determine which virtual MAC address to direct the host to use. This algorithm guarantees that a host gets the same virtual MAC address if the number of virtual forwarders does not change.
Reference: http://www.cisco.com/c/en/us/td/docs/switches/datacenter/sw/5_x/nx-os/unicast/configuration/guide/l3_cli_nxos/l3_glbp.html