IBM I 6.1 Certified Administrator

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Rafasol
R
Rafasol
Community Contributor
Quizzes Created: 3 | Total Attempts: 562
| Attempts: 166
SettingsSettings
Please wait...
  • 1/92 Questions

    What happens when the system ASP reaches the threshold set in SST?

    • No new jobs may enter the active state.
    • All job queues are placed on hold status.
    • The system attention light is illuminated.
    • Messages are sent to the QSYSOPR message queue.
Please wait...
About This Quiz

Test 000-976: IBM i 6.1 Certified Administrator
NOTE: his certification has been replaced by IBM Certified Academic Associate: IBM i 7.1 Administration

Test information: Number of questions: 87 Time allowed in minutes: 105 Required passing score: 55% Test languages: English
Note: There are 87 scored items and 6 unscored items.
(by Rafael Gomez)

IBM I 6.1 Certified Administrator - Quiz

Quiz Preview

  • 2. 

    Which of the following system values controls the amount of time until an idle user will automatically be logged off or disconnected from the system?

    • QIDLELMT

    • QINACTITV

    • QDSCJOBTIM

    • QENDJOBLMT

    Correct Answer
    A. QINACTITV
    Explanation
    The correct answer is QINACTITV. QINACTITV is a system value in IBM i that controls the amount of time until an idle user will automatically be logged off or disconnected from the system. This value is specified in minutes and can be set to any value between 1 and 9999. When the user remains idle for the specified time period, the system will initiate the logoff or disconnect process.

    Rate this question:

  • 3. 

    What is the minimum security level at which resource security and integrity protection are enforced?

    • 20

    • 30

    • 40

    • 50

    Correct Answer
    A. 40
    Explanation
    The minimum security level at which resource security and integrity protection are enforced is 40. This means that at a security level of 40 or higher, measures are in place to ensure the security and integrity of resources. It implies that any security level below 40 may not have the necessary safeguards to protect resources and maintain their integrity.

    Rate this question:

  • 4. 

    An administrator wants to distribute image catalogs with PTFs between systems. How can this be accomplished?

    • FTP the *IMGCLG objects in QUSRSYS.

    • FTP the QPTF library entries to the target system.

    • FTP the IFS objects to the target system.Copy the *IMGCLG objects in QUSRSYS to the target system.

    • Create a save file and save the contents of the QPTF library. FTP the save file to the target system and restore the QPTF library.

    Correct Answer
    A. FTP the IFS objects to the target system.Copy the *IMGCLG objects in QUSRSYS to the target system.
    Explanation
    To distribute image catalogs with PTFs between systems, the administrator should FTP the IFS objects to the target system and copy the *IMGCLG objects in QUSRSYS to the target system. This means transferring the necessary files from the Integrated File System (IFS) to the target system and also copying the image catalog objects from the QUSRSYS library. This ensures that both the files and the image catalogs are successfully distributed to the target system.

    Rate this question:

  • 5. 

    A system has the system value QTSEPOOL set to *BASE and interactive jobs are moved to *BASE pool when they reach time slice end. Which pool activity level will be used by the interactive jobs moved to *BASE pool?

    • The interactive jobs will use the *BASE pool activity level.

    • The interactive jobs will use the activity level of the *MACHINE system pool.

    • The interactive jobs will use the activity level of the *INTERACT system pool.

    • The interactive jobs will use the activity level of the pool which they come from.

    Correct Answer
    A. The interactive jobs will use the *BASE pool activity level.
    Explanation
    The system value QTSEPOOL is set to *BASE, which means that interactive jobs are moved to the *BASE pool when they reach the time slice end. Therefore, the interactive jobs moved to the *BASE pool will use the activity level of the *BASE pool.

    Rate this question:

  • 6. 

    Which system value controls the number of days the system retains unused spooled file storage?

    • QRCLSPLSTG

    • QRLSSPLSTG

    • QDLTSPLSTG

    • QRTNSPLSTG

    Correct Answer
    A. QRCLSPLSTG
    Explanation
    The correct answer is QRCLSPLSTG. This system value controls the number of days the system retains unused spooled file storage.

    Rate this question:

  • 7. 

    A developer accidentally cleared a physical file with the CLRPFM command. The file is being journalled with IMAGE(*BOTH). How can the corrupted field be recovered?

    • Use the ROLLBACK function to undo the CLRPFM action.

    • Use the RMVJRNCHG command to remove the one entry that cleared the file member.

    • Use the RMVJRNCHG command to roll back the changed to before the file was cleared.

    • Restore the file from the backup and use the APYJRNCHG to reapply the changes up to just prior to the file being cleared.

    Correct Answer
    A. Restore the file from the backup and use the APYJRNCHG to reapply the changes up to just prior to the file being cleared.
    Explanation
    The correct answer is to restore the file from the backup and use the APYJRNCHG command to reapply the changes up to just prior to the file being cleared. This is because the file is being journalled with IMAGE(*BOTH), which means that both the before and after images of the file changes are recorded in the journal. By restoring the file from the backup and using APYJRNCHG, the changes recorded in the journal can be reapplied, effectively recovering the corrupted field.

    Rate this question:

  • 8. 

    When the FSP logs an error to IBM i, where can the detailed information about that error be found?

    • In the QHST log

    • In SST 'Service Action Log'

    • In the IBMi system operator message queue

    • In DST 'Product Activity log' option 2 (processor)

    Correct Answer
    A. In SST 'Service Action Log'
    Explanation
    The detailed information about the error logged by the FSP can be found in the SST 'Service Action Log'.

    Rate this question:

  • 9. 

    After an IBM i upgrade, both QUSRSYS and QGPL have a status of *BACKLEVEL when you do a display of licensed programs. How can this be fixed?

    • In a restricted state, load the distribution media B29xx_01, and re-install QUSRSYS and QGPL.

    • Bring down just QINTER, and use the upgrade image catalogue to re-install both QUSRSYS and QGPL.

    • With everyone on the system, load the distribution media B29xx_01, and re-install QUSRSYS and QGPL.

    • In a restricted state, perform a RSTLIB of QGPL and QUSRSYS from the distribution media, using ALWOBJDIF(*ALL).

    Correct Answer
    A. In a restricted state, load the distribution media B29xx_01, and re-install QUSRSYS and QGPL.
    Explanation
    After an IBM i upgrade, if both QUSRSYS and QGPL have a status of *BACKLEVEL when displaying licensed programs, the issue can be fixed by loading the distribution media B29xx_01 and re-installing QUSRSYS and QGPL in a restricted state. This ensures that the necessary libraries are updated and brought up to the correct level after the upgrade.

    Rate this question:

  • 10. 

    What happens when a journal receiver created with MNGRCV(*USER) reaches its maximum size?

    • A new receiver is created in the job's current library.

    • Database writes are prohibited and jobs receive error messages.

    • All new journal entries are placed in the QDFTJRN journal receiver.

    • A new receiver is created in the QSYS library for new journal entries.

    Correct Answer
    A. Database writes are prohibited and jobs receive error messages.
    Explanation
    When a journal receiver created with MNGRCV(*USER) reaches its maximum size, database writes are prohibited and jobs receive error messages. This means that any attempt to write data to the database will be denied and jobs running in the system will receive error messages indicating that the journal receiver is full. This is because the journal receiver cannot accommodate any more journal entries, and therefore, the system prevents any further database writes to avoid potential data loss or corruption.

    Rate this question:

  • 11. 

    An IBM i 6.1 customer wants to be notified when average CPU utilization remains above 80% for more than 5 minutes. What must be done to support the requirement?

    • Use the STRMONSYS command to monitor the QSYSOPR message queue in *BREAK mode.

    • Create a job watcher definition in System Director Navigator for i to send a notification when CPU exceeds 80%.

    • Define a CPU monitor in Management Central to trigger a message when the CPU remains over 80% for a 5 minute interval.

    • Create a notification program and a job watcher definition. Then use the STRJW command to start the collection and monitoring.

    Correct Answer
    A. Define a CPU monitor in Management Central to trigger a message when the CPU remains over 80% for a 5 minute interval.
    Explanation
    To support the requirement of being notified when average CPU utilization remains above 80% for more than 5 minutes, a CPU monitor needs to be defined in Management Central. This monitor will trigger a message when the CPU remains over 80% for a 5-minute interval. This will allow the customer to receive notifications and take appropriate actions to address the high CPU utilization.

    Rate this question:

  • 12. 

    A customer has a 3 partition system with 2 switchable tape drives. The second tape drive is not currently assigned to any partition, and is not defined in the profile for the third partition. The customer needs to restore data using the second tape drive to the third partition. What is the simplest method to restore the data to the third partition?

    • Dynamically add the drive to the third partition. Restore the data.

    • Dynamically add the drive to the third partition. Shut down the partition and restart it. Restore the data.

    • Dynamically add the drive to one of the other partitions. Use the DUPTAP command to copy the data to the first tape drive. Restore the data to the third partition.

    • Dynamically add the drive to one of the other partitions. Use the DUPTAP command to copy the data to an image catalog. FTP the catalog to the desired partition. Restore the data.

    Correct Answer
    A. Dynamically add the drive to the third partition. Restore the data.
    Explanation
    The simplest method to restore the data to the third partition is to dynamically add the drive to the third partition and then restore the data. This means that the second tape drive, which is not currently assigned to any partition, will be added to the third partition. By doing so, the drive will be available for use in restoring the data to the third partition.

    Rate this question:

  • 13. 

    Assuming the appropriate PTF is installed, what is the minimum release level of IBM i Access to support Microsoft Windows 7?

    • 6.1

    • 7.1

    • 5.4

    • 5.4.5

    Correct Answer
    A. 6.1
    Explanation
    The minimum release level of IBM i Access to support Microsoft Windows 7 is 6.1.

    Rate this question:

  • 14. 

    Which of the following commands will allow the administrator to override the QQRYTIMLMT system value for a job?

    • CHGJOB

    • CHGQRYA

    • CHGJOBA

    • CHGQRYRUNA

    Correct Answer
    A. CHGQRYA
    Explanation
    The CHGQRYA command allows the administrator to override the QQRYTIMLMT system value for a job. This command is used to change the query attributes for a query, and one of the attributes that can be changed is the query time limit. By using this command, the administrator can modify the time limit for a specific job, overriding the system value set for query time limit.

    Rate this question:

  • 15. 

    An administrator has been directed to create a new DNS server instance named 'ABC' on an IBM i 6.1 partition. Which of the following overviews correctly describe how to do this?

    • Open a browser to IBM Systems Director Navigator for IBMi on the partition. Navigate to Network > Server > DNS. Select the 'create' action and follow the prompts.

    • From a command line, run the CRTTCPDNS command to create the ABC instance definition. Use SEU to edit QUSRSYS/QDNSTBL(ABC) to edit the DNS records for the instance.

    • In System i Navigator, under the system to host the DNS, navigate to Network > Servers > DNS. Right-click on DNS, then select 'New Name Server'. Follow the prompts.

    • From a command line, use STRQSH to start the PASE command prompt. Run the script: crdns -n ABC. Use the Edit File (EDTF) command on IFS file /QIBM/UserData/OS400/DNS/ABC.TBL to enter the new DNS records.

    Correct Answer
    A. In System i Navigator, under the system to host the DNS, navigate to Network > Servers > DNS. Right-click on DNS, then select 'New Name Server'. Follow the prompts.
  • 16. 

    An IBM i 6.1 system has the system value QFRCCVNRST set to 1. The administrator has restored an application library from a V5R4 system. The application is now running very slowly. Which of the following is the most likely cause of the problem?

    • The restored objects are being converted at first use.

    • The QFRCOBJCVN system value must be set to at least 4 for V5R4 objects.

    • The restored objects are using the V5R4 template, which runs more slowly on a 6.1 system.

    • The programs were compiled to a previous release which causes a performance problem at 6.1

    Correct Answer
    A. The restored objects are being converted at first use.
    Explanation
    The restored objects are being converted at first use because the system value QFRCCVNRST is set to 1. This means that when an object is accessed for the first time after being restored, it will be converted to the current release level of the system. This conversion process can cause a delay and result in the application running slowly.

    Rate this question:

  • 17. 

    An IBM i partition is operating normally for most tasks. Performance reports show that interactive response times are acceptable and batch run times are normal. System status and disk status show normal paging and I/O rates for this system. However, users are complaining of intermittent response for interactive tasks, slow ODBC access and FTP transfers taking much longer than normal. What is a likely cause of this problem?

    • The QSYSWRK subsystem has insufficient main storage so TCP/IP cannot run reliably.

    • The Ethernet switch is configured for half duplex and the IBM i Ethernet line is configured for full duplex.

    • The 'TCP maximum retransmit time' setting is too high, so the system waits too long when a frame is dropped.

    • The TCP/IP Attribute ARP Cache Timeout has been set too low and the system must perform ARP discovery too often.

    Correct Answer
    A. The Ethernet switch is configured for half duplex and the IBM i Ethernet line is configured for full duplex.
    Explanation
    The likely cause of the problem is that the Ethernet switch is configured for half duplex and the IBM i Ethernet line is configured for full duplex. This configuration mismatch can cause collisions and delays in data transmission, resulting in intermittent response for interactive tasks and slower ODBC access and FTP transfers.

    Rate this question:

  • 18. 

    Which of the following parameters on the SAV command can be used to save the Integrated File System directory /temp/files and all subordinate objects?

    • OBJ(('/temp/files/') PATTERN(('*')) SUBTREE(*DIR)

    • OBJ(('/temp/files/*') PATTERN(('*')) SUBTREE(*ALL)

    • OBJ(('/temp/files/') PATTERN(('*ALL')) SUBTREE(*DIR)

    • OBJ(('/temp/files/*') PATTERN(('*ANY')) SUBTREE(*ALL)

    Correct Answer
    A. OBJ(('/temp/files/*') PATTERN(('*')) SUBTREE(*ALL)
    Explanation
    The correct answer is OBJ(('/temp/files/*') PATTERN(('*')) SUBTREE(*ALL). This parameter combination specifies that the SAV command should save the directory /temp/files and all of its subordinate objects, using the * pattern to include all objects within the directory. The SUBTREE(*ALL) parameter ensures that all subordinate objects are saved, including directories, files, and symbolic links.

    Rate this question:

  • 19. 

    The system value QCRTOBJAUD is set to *USRPRF. When are entries sent to the audit journal if a new directory is created with the parameter CRTOBJAUD(*SYSVAL)?

    • When it is used or changed by the user who created it.

    • When it is used or changed by a user who is currently being audited.

    • When it is used or changed by a member of the group profile of the user who is currently being audited.

    • When it is used or changed by a program adopting the authority of the user who is currently being audited.

    Correct Answer
    A. When it is used or changed by a user who is currently being audited.
    Explanation
    When the system value QCRTOBJAUD is set to *USRPRF, entries are sent to the audit journal if a new directory is created with the parameter CRTOBJAUD(*SYSVAL) when it is used or changed by a user who is currently being audited. This means that any actions performed on the directory by a user who is currently being audited will be recorded in the audit journal.

    Rate this question:

  • 20. 

    Which of the following are saved using the Save System Information (SAVSYSINF) command?

    • *CMD and *MSGF objects in QSYS changed since the last SAVSYS

    • *PGM and *SRVPGM objects in QSYS changed since the last SAVSYS

    • *USRPRF and *TBL objects in QSYS changed since the last SAVSYS

    • *DTAARA and *FILE objects in QSYS changed since the last SAVSYS

    Correct Answer
    A. *CMD and *MSGF objects in QSYS changed since the last SAVSYS
    Explanation
    The Save System Information (SAVSYSINF) command is used to save information about system objects that have changed since the last system save (SAVSYS) operation. This includes *CMD and *MSGF objects in the QSYS library that have been modified. The command does not save *PGM and *SRVPGM objects, *USRPRF and *TBL objects, or *DTAARA and *FILE objects. Therefore, the correct answer is *CMD and *MSGF objects in QSYS changed since the last SAVSYS.

    Rate this question:

  • 21. 

    A user must restore libraries LIBA and LIBB. LIBA contains logical files that are dependent on physical files in LIBB. Both libraries were saved using a SAVLIB(*NONSYS) command. Which command, or group of commands, will complete the restore operation in one pass through the tape even though the physical files are restored after the logical files?

    • RSTLIB SAVLIB(LIBB LIBA) DEV(TAP01)

    • RSTLIB SAVLIB(LIBA LIBB) DEV(TAP01) DFRID(ABC)

    • RSTLIB SAVLIB(LIBA LIBB) DEV(TAP01) DFRID(ABC) RMVDFRID DFRID(ABC)

    • RSTLIB SAVLIB(LIBA LIBB) DEV(TAP01) DFRID(ABC) RSTDFROBJ DFRID(ABC)

    Correct Answer
    A. RSTLIB SAVLIB(LIBA LIBB) DEV(TAP01) DFRID(ABC) RSTDFROBJ DFRID(ABC)
    Explanation
    The correct answer is "RSTLIB SAVLIB(LIBA LIBB) DEV(TAP01) DFRID(ABC) RSTDFROBJ DFRID(ABC)". This command will complete the restore operation in one pass through the tape because it specifies both libraries to be restored, LIBA and LIBB, and includes the DFRID parameter with the value of ABC. The DFRID parameter is used to restore dependent objects, such as logical files that are dependent on physical files. The RSTDFROBJ command is used to restore dependent objects based on the DFRID value. Therefore, this command sequence ensures that both libraries are restored and any dependent objects are also restored in the correct order.

    Rate this question:

  • 22. 

    Management has directed an administrator to set up system auditing in IBM i 6.1. When the administrator tries to display the auditing system values, '*NOTAVL' is displayed. What does this mean?

    • Journal QAUDJRN has not been created in library QSYS.

    • Journal QSYS/QAUDJRN has public authority '*EXCLUDE'.

    • The journal receivers for journal QAUDJRN have public authority '*EXCLUDE'.

    • The profile the administrator is using does not have '*AUDIT' special authority.

    Correct Answer
    A. The profile the administrator is using does not have '*AUDIT' special authority.
    Explanation
    The correct answer is that the profile the administrator is using does not have '*AUDIT' special authority. This means that the administrator does not have the necessary privileges to access and display the auditing system values.

    Rate this question:

  • 23. 

    An administrator is restoring a library from SYSTEMA to SYSTEMB. The administrator knows that the library is owned by a different user on SYSTEMB. Which of the following parameters of the RSTLIB command will restore the library and set the owner of the library to the current owner of the library on SYSTEMB?

    • ALWOBJDIF(*SAME)

    • ALWOBJDIF(*OWNER)

    • ALWOBJDIF(*DFTOWN)

    • ALWOBJDIF(*CURRENT)

    Correct Answer
    A. ALWOBJDIF(*OWNER)
    Explanation
    The correct answer is ALWOBJDIF(*OWNER). This parameter of the RSTLIB command will restore the library and set the owner of the library to the current owner of the library on SYSTEMB. By specifying *OWNER, the administrator ensures that the ownership of the library is preserved during the restoration process.

    Rate this question:

  • 24. 

    Which of the following commands displays the server firmware and assists in identifying the firmware related PTFs installed for a non-HMC managed system?

    • DSPFMWSTS

    • DSPFMWLVL

    • DSPSRVFRM

    • DSPFMWPTF

    Correct Answer
    A. DSPFMWSTS
    Explanation
    The correct answer is DSPFMWSTS. This command displays the server firmware and assists in identifying the firmware related PTFs installed for a non-HMC managed system.

    Rate this question:

  • 25. 

    A customer is moving from a Power 550 running V5R3 to a Power 750 running IBM i 6.1.1. The V5R3 system was migrated to IBM i 6.1 using the 'Migration from prior supported release' (SLIP) method. During testing, none of the DDM files to remote systems function. The system value QRETSVRSEC (Retain server security data) is set to '1' (enabled). Which of the following is the most likely cause of the problem?

    • The SNADS directory entries for the remote systems were removed when migrating to IBM i 6.1

    • The host table entries for the remote systems were not migrated using the 'SLIP' migration.

    • The authentication entries in the user profile(s) used for DDM are removed when migrating to IBMi 6.1.

    • The *LOCAL relational database name entry on the remote system does not match the value on the new system.

    Correct Answer
    A. The *LOCAL relational database name entry on the remote system does not match the value on the new system.
    Explanation
    During the migration process, the *LOCAL relational database name entry on the remote system was not updated to match the value on the new system. This mismatch in the database name would cause the DDM files to remote systems to not function properly.

    Rate this question:

  • 26. 

    File XYZ is secured as follows: > An authority list, ABC, is attached to file XYZ. > Primary Group of file XYZ is set to PRIGRP, which has *CHANGE authority > File XYZ is owned by profile APPOWN > User AUSER has *EXCLUDE authority Authority list ABC specifies: *PUBLIC authority is: *USE Group Profile FILEACC has *ALL authority User profile AUSER has group profile FILEACC and PRIGRP as supplemental groups. What authority will AUSER have to file XYZ?

    • *USE

    • *ALL

    • *CHANGE

    • *EXCLUDE

    Correct Answer
    A. *EXCLUDE
    Explanation
    User AUSER will have *EXCLUDE authority to file XYZ. This is because the authority list ABC specifies that *PUBLIC authority is *USE, and AUSER is not a member of the PRIGRP primary group of file XYZ. Additionally, AUSER does not have any explicit authority specified in the authority list ABC. Therefore, the highest authority that AUSER can have is *EXCLUDE, as specified in the default authority of the file.

    Rate this question:

  • 27. 

    Which of the following is true regarding journal receivers?

    • Data can be journalled to only 1 receiver in the system ASP.

    • Data can be journalled to 2 local receivers if one is in an iASP.

    • Data can be journalled to 2 journal receivers, one local and one remote.

    • Data can be journalled to 2 local journal receivers both in the system ASP.

    Correct Answer
    A. Data can be journalled to 2 journal receivers, one local and one remote.
    Explanation
    Data can be journalled to 2 journal receivers, one local and one remote. This means that the system can create two separate journal receivers to record the journal entries. One receiver is local, meaning it is stored on the same system, while the other receiver is remote, meaning it is stored on a different system. This allows for redundancy and backup of the journal entries in case of system failure or data loss.

    Rate this question:

  • 28. 

    How can the system administrator set the expiration date for a tape?

    • Use the command SETEXPDATE on the tape volume.

    • Use the EXPDATE parameter of the SAVxxx command.

    • Use the EXPDATE parameter of the INZTAP command.

    • Use the SETLIBEXP command with the external tape library.

    Correct Answer
    A. Use the EXPDATE parameter of the SAVxxx command.
    Explanation
    The system administrator can set the expiration date for a tape by using the EXPDATE parameter of the SAVxxx command. This command allows the administrator to specify the desired expiration date for the tape, ensuring that it is not used beyond that date. By setting the expiration date using this parameter, the administrator can effectively manage the lifecycle of the tape and ensure that it is properly retired and replaced as necessary.

    Rate this question:

  • 29. 

    Which of the following commands will show the names of all objects that a user is specifically authorized to use and the specific authorities that a user has to each object?

    • WRKOBJPVT USRPRF(USERNAME)

    • WRKOBJOWN USRPRF(USERNAME)

    • DSPPVTAUT USRPRF(USERNAME) TYPE(*OBJ)

    • DSPUSRPRF USRPRF(USERNAME) TYPE(*OBJAUT)

    Correct Answer
    A. DSPUSRPRF USRPRF(USERNAME) TYPE(*OBJAUT)
    Explanation
    The command "DSPUSRPRF USRPRF(USERNAME) TYPE(*OBJAUT)" will show the names of all objects that a user is specifically authorized to use and the specific authorities that a user has to each object.

    Rate this question:

  • 30. 

    A system administrator wants to display the defined users for System Service Tools (SST). Which of the following commands is appropriate?

    • DSPUSRPRF TYPE(*SST)

    • DSPSSTUSR USRID(*ALL)

    • DSPUSRPRF TYPE(*DST)

    • DSPDSTUSR USRID(*ALL)

    Correct Answer
    A. DSPSSTUSR USRID(*ALL)
    Explanation
    The correct answer is "DSPSSTUSR USRID(*ALL)". This command is appropriate for displaying the defined users for System Service Tools (SST). The "DSPSSTUSR" command is specifically designed for displaying SST users, and the "USRID(*ALL)" parameter ensures that all users are included in the display. The other commands, "DSPUSRPRF TYPE(*SST)" and "DSPUSRPRF TYPE(*DST)", are not specifically tailored for displaying SST users and may not provide the desired information. The "DSPDSTUSR USRID(*ALL)" command is unrelated to SST users and is not appropriate for this task.

    Rate this question:

  • 31. 

    A customer has a Power 520, serial number 10-12345. It is one of several systems managed by an HMC running Version 7 firmware at TCP/IP address 10.0.0.100. Which of the following describes how to produce a system plan for this system in file MYPLAN.sysplan?

    • Select system plans from left panel, then select Create System Plan. In the pop-up window, fill in system plan name and description, click OK.

    • Select 'Service Applications' on the HMC and click the Create System Plan option. In the pop-up window, click the line with 9406-520*1012345, and specify file MYPLAN in the file name prompt.

    • Launch SPT and click 'Create New Plan.' On the next panel, click the 'Open an Existing System Plan.' In the file prompt, specify https://10.0.0.100/sysplan. After the system plan is loaded from the HMC, save to file MYPLAN.

    • Select 'System Plans' on the HMC, and then click the 'Import...' button. On the pop-up window, click the line with 9406-520*1012345. When the import completes, click the 'Save...' button and specify file MYPLAN in the file name prompt.

    Correct Answer
    A. Select system plans from left panel, then select Create System Plan. In the pop-up window, fill in system plan name and description, click OK.
    Explanation
    To produce a system plan for the Power 520 system with serial number 10-12345, the correct procedure is to select system plans from the left panel and then select Create System Plan. In the pop-up window, the user should fill in the system plan name and description, and then click OK. This will create a system plan for the specified system, which can be saved in the file MYPLAN.sysplan.

    Rate this question:

  • 32. 

    A user's library list contains PRODLIB LIBD. A user typed the following sequence of commands: CHGCURLIB CURLIB(LIBA) ADDLIBLE LIB(LIBB) POSITION(*FIRST) CHGSYSLIBL LIB(LIBC) OPTION(*ADD) All libraries contain a program named PGMUSR which is different in each library. Which program will run if the user types the command CALL PGMUSR?

    • LIBA/PGMUSR

    • LIBB/PGMUSR

    • LIBC/PGMUSR

    • LIBD/PGMUSR

    Correct Answer
    A. LIBC/PGMUSR
    Explanation
    The user's current library is changed to LIBA using the CHGCURLIB command. Then, the library LIBB is added to the library list using the ADDLIBLE command with the POSITION(*FIRST) parameter, which means that LIBB will be the first library in the library list. Next, the system library list is changed to include LIBC using the CHGSYSLIBL command with the OPTION(*ADD) parameter. This means that LIBC will be added to the end of the system library list. Therefore, when the user types the command CALL PGMUSR, the program PGMUSR in LIBC will run.

    Rate this question:

  • 33. 

    Internal audit is planning a security audit next month. The system administrator has been directed to prepare the system for the audit. Which of the following commands is used to set security features to the IBM recommended values?

    • SETSYSSEC

    • CFGSYSSEC

    • WRKSYSAUD

    • SETSYSAUD

    Correct Answer
    A. CFGSYSSEC
    Explanation
    CFGSYSSEC is the correct answer because it is the command used to configure system security settings to the recommended values by IBM. This command allows the system administrator to set various security features and parameters to ensure that the system meets the required security standards for the upcoming audit.

    Rate this question:

  • 34. 

    After a complete restore, the job log shows several logical files that have not been restored. Which of the following will complete the restore?

    • RSTLIB LIB(*NEW) PVTAUT(*NO)

    • RSTLIB(*ALL) OPTION(*NEW) PVTAUT(*YES)

    • RSTOBJ OBJ(*NEW) LIB(*ANY) PVTAUT(*YES)

    • RSTOBJ OBJ(*ALL) LIB(*ANY) OPTION(*NEW) PVTAUT(*YES)

    Correct Answer
    A. RSTOBJ OBJ(*ALL) LIB(*ANY) OPTION(*NEW) PVTAUT(*YES)
    Explanation
    The correct answer is RSTOBJ OBJ(*ALL) LIB(*ANY) OPTION(*NEW) PVTAUT(*YES). This command will restore all objects in all libraries, including logical files, with a new option and private authorities enabled.

    Rate this question:

  • 35. 

    An administrator is investigating poor performance of some applications. Several physical files have large numbers of associated logical files. Many of these logical files are used only during month-end processing. How can the administrator improve the application performance?

    • Change month-end logical files to maintenance *DLY.

    • Change the logical file description to OPTIMIZE (*WRITE)

    • Edit Rebuild Access Path (EDTRBDAP) and change the rebuild option on the month-end files to *IPL.

    • Change the logical files so they point to an inactive library. Change them back to the production library just before month end jobs run.

    Correct Answer
    A. Change month-end logical files to maintenance *DLY.
    Explanation
    By changing the month-end logical files to maintenance *DLY, the administrator can improve application performance. This is because the logical files will only be used during month-end processing, so changing them to maintenance *DLY means they will be optimized for daily maintenance tasks rather than being active all the time. This can help reduce the workload and improve overall performance for the applications.

    Rate this question:

  • 36. 

    How are IBM i FTP activities logged permanently for auditing?

    • By using an exit point application

    • By setting the QFTPAUD system value to '*QHST'

    • By setting the TCP attribute 'Log FTP' to 'Yes'

    • By activating the system audit journal (QAUDJRN)

    Correct Answer
    A. By using an exit point application
    Explanation
    IBM i FTP activities can be logged permanently for auditing by using an exit point application. Exit points are customizable points in the IBM i operating system where user-defined programs can be invoked to perform specific actions. In this case, an exit point application can be used to capture and log FTP activities, providing a permanent record for auditing purposes. This allows organizations to track and monitor FTP activities for security and compliance reasons.

    Rate this question:

  • 37. 

    Which of the following user classes by default assigns system auditing capabilities to a user profile at all security levels?

    • *PGMR

    • *SECOFR

    • *SECADM

    • *SYSOPR

    Correct Answer
    A. *SECOFR
    Explanation
    The SECOFR user class, by default, assigns system auditing capabilities to a user profile at all security levels. This means that users with the SECOFR user class have the ability to monitor and track system activities, ensuring security and compliance with auditing requirements.

    Rate this question:

  • 38. 

    Ansystem running IBM i 6.1 has a fibre attached IBM TS3500 (3584). Management has instituted a policy that any tape leaving the data center with application data must be encrypted. Which of the following tape encryption modes is supported?

    • System Managed

    • Library Managed

    • Software Managed

    • Application Managed

    Correct Answer
    A. Library Managed
    Explanation
    Library Managed tape encryption mode is supported in this scenario. This mode allows the tape library to handle the encryption process. The encryption keys are managed by the library itself, ensuring that any tape leaving the data center with application data is encrypted. This mode provides a centralized and efficient way to enforce the encryption policy without relying on individual systems or applications.

    Rate this question:

  • 39. 

    When do changes to the 'Maximum Processor' setting in an LPAR definition take effect?

    • When the partition is re-activated after a complete power down

    • When the partition is restarted with PWRDWNSYS RESTART(*YES)

    • When all partitions and the managed system are shut down and restarted

    • When all partitions in the shared processor pool are powered down and restarted

    Correct Answer
    A. When the partition is re-activated after a complete power down
    Explanation
    When the partition is re-activated after a complete power down, the changes to the 'Maximum Processor' setting in an LPAR definition take effect. This means that when the partition is completely powered off and then turned back on, the new 'Maximum Processor' setting will be applied. It is important to note that simply restarting the partition or shutting down and restarting the managed system or all partitions in the shared processor pool will not trigger the changes to take effect.

    Rate this question:

  • 40. 

    A system is using an HMC for the console. An administrator wants to start an Option 21 save from their laptop at the office before leaving and check on the job later that evening from home. How should the console session be started to start the save operation?

    • Start a shared console session from the administrator's laptop.

    • Start a dedicated console session from the administrator's laptop.

    • Start a shared console session from the HMC and the administrator's laptop.

    • Start a dedicated console session from the HMC, and a shared console session from the administrator's laptop.

    Correct Answer
    A. Start a shared console session from the HMC and the administrator's laptop.
    Explanation
    In order to start an Option 21 save from the administrator's laptop at the office and be able to check on the job later from home, a shared console session should be started from both the HMC and the administrator's laptop. This will allow the administrator to access and control the console from their laptop remotely, ensuring they can start the save operation and monitor it from home. Starting a dedicated console session from either the administrator's laptop or the HMC alone would not provide the necessary remote access and control capabilities.

    Rate this question:

  • 41. 

    A customer does a GO SAVE, OPTION 21, every night. Every day when the system starts, each LAN printer writer goes to the MSGW (Message Waiting) state and requires a reply for the Message ID CPA3394 'Load form type '&4' device &5 writer &1.' Which of the following will fix this problem?

    • CHGWTR WTR(*ALL) FORMTYPE(*SAME *NOMSG)

    • CHGWTR WTR(*ALL) FORMTYPE(*SAME) INQMSGRPY(CPA3394) RPY(G)

    • ADDRPYLE SEQNBR(140) MSGID(CPA3394) CMPDTA(*NONE *NONE) RPY(G)

    • ADDRPYLE SEQNBR(140) MSGID(CPA3394) CMPDTA(*NONE *NONE) RPY(C)

    Correct Answer
    A. ADDRPYLE SEQNBR(140) MSGID(CPA3394) CMPDTA(*NONE *NONE) RPY(G)
    Explanation
    The correct answer is ADDRPYLE SEQNBR(140) MSGID(CPA3394) CMPDTA(*NONE *NONE) RPY(G). This command adds a reply entry to the reply list for message CPA3394 with a sequence number of 140. The CMPDTA parameter specifies the comparison data for the reply, which in this case is set to *NONE *NONE. The RPY parameter is set to 'G', indicating that a generic reply will be sent. This will fix the problem by providing a reply to the message ID and allowing the LAN printer writer to continue processing without going into MSGW state.

    Rate this question:

  • 42. 

    An administrator must manually start the Apache servers after an IPL on SYSTEMA. The administrator notices that the Apache servers 'Autostart' parameter is set to *GLOBAL. Which action will automatically start all Apache servers after an IPL?

    • Change the QHTTPSVR system value QGLOBAL parameter to *YES.

    • Add the command STRHTTPSVR GLOBAL(*YES) to the systems startup program.

    • Using the IBM Web Administration for i web page, select the Advanced tab then click on 'Global Server Settings'. Set the Autostart parameter to 'Yes'.

    • Using Systemi Navigator expand My Connections > SYSTEMA > Network. Select TCP/IP then Right click 'HTTP Administration' and select properties. Check the 'Start HTTP Servers' check box.

    Correct Answer
    A. Using the IBM Web Administration for i web page, select the Advanced tab then click on 'Global Server Settings'. Set the Autostart parameter to 'Yes'.
  • 43. 

    An administrator notices that certain long-running CPU intensive batch jobs cause numerous short-running batch jobs to have excessive wait times. Changing batch job priorities is unacceptable since the numerous short batch jobs consume all the CPU needed by the longrunning jobs. What would permit the short batch jobs access to the CPU while permitting the longrunning batch jobs to run at an equal priority?

    • Shorten the wait time in the batch job class.

    • Shorten the time slice value in the batch job class.

    • Raise the maximum number of active jobs in the memory pool that runs batch jobs.

    • Use a subsystem routing entry to run the long-running batch jobs in a dedicated memory pool.

    Correct Answer
    A. Shorten the time slice value in the batch job class.
    Explanation
    Shortening the time slice value in the batch job class would allow the short batch jobs to have more frequent access to the CPU, while still allowing the long-running jobs to run at an equal priority. By reducing the time slice, the CPU will switch between different jobs more frequently, giving the short batch jobs a chance to run without excessive wait times. This solution does not require changing batch job priorities or allocating dedicated memory pools, making it a suitable option in this scenario.

    Rate this question:

  • 44. 

    An administrator attempts to change a journal so that the receivers are deleted by the system. When he attempts to change the value DLTRCV(*YES). He receives the message 'CPF70E3 : The journal receiver directory must only have attached receivers in it when DLTRCV(*YES) is specified' Which of the following procedures should be used to resolve this error?

    • Use the DLTJRNRCV command with the option *UNATTACHED to remove all receivers not attached to a journal.

    • Use the ENDJRN command to end journaling and delete all receivers. Change the value toDLTRCV(*YES)and restart journaling.

    • Use the CHGJRNA command on the journal and then press the F17 function key to work with the receiver directory. Delete all receivers not currently attached to the journal.

    • Use the WRKJRNA command on the journal and then press the F15 function key to work with the receiver directory. Delete all receivers not currently attached to the journal.

    Correct Answer
    A. Use the WRKJRNA command on the journal and then press the F15 function key to work with the receiver directory. Delete all receivers not currently attached to the journal.
    Explanation
    To resolve the error, the administrator should use the WRKJRNA command on the journal and then press the F15 function key to work with the receiver directory. This will allow them to access the receiver directory and delete all receivers that are not currently attached to the journal. By doing so, they will be able to comply with the requirement specified in the error message and successfully change the value DLTRCV(*YES) for the journal.

    Rate this question:

  • 45. 

    When changing most ASMI profile passwords, which of the following must be known?

    • The ASMI HMC profile password

    • The ASMI ADMIN profile password

    • The ASMI GENERAL profile password

    • The existing password for the profile being changed

    Correct Answer
    A. The ASMI ADMIN profile password
    Explanation
    To change most ASMI profile passwords, it is necessary to know the ASMI ADMIN profile password. This password is specifically required to access and modify the profiles in the ASMI system. It serves as a security measure to ensure that only authorized individuals with knowledge of the ASMI ADMIN password can make changes to the profiles.

    Rate this question:

  • 46. 

    An administrator has been asked to assist in defining a detailed recovery plan for objects in IFS directories that are journalled. The goal is to be able to completely reload the system with minimal intervention. Which of the following represents the correct order to restore objects?

    • Journal receivers, IFS objects, journals

    • IFS objects, journals, journal receivers

    • Journal receivers, journals, IFS objects

    • Journals, journal receivers, IFS objects

    Correct Answer
    A. Journals, journal receivers, IFS objects
    Explanation
    The correct order to restore objects in order to completely reload the system with minimal intervention is to restore the journals first, followed by the journal receivers, and then the IFS objects. This is because the journals contain the transactional data and changes made to the objects, the journal receivers store the journal entries, and the IFS objects are the actual objects stored in the IFS directories. By restoring them in this order, the system can be fully recovered with minimal data loss and intervention.

    Rate this question:

  • 47. 

    A customer at V5R2 of i5/OS, wants to upgrade to IBM i 6.1. Which of the following describes the steps needed to perform the upgrade?

    • Upgrade directly to IBMi 6.1 using automatic upgrade, and run STROBJCVN to re-encapsulate all programs for 6.1.

    • Upgrade to V5R4 of i5/OS,then run ANZOBJCVN to identify programs that will not upgrade to 6.1 before upgrading to 6.1.

    • Run ANZOBJCVN on the current release to identify programs that will not upgrade to 6.1, then upgrade to V5R4 and run STROBJCVN on those programs.

    • Upgrade first to V5R4, run STROBJCVN on all programs in user libraries, and then upgrade directly to IBMi 6.1.

    Correct Answer
    A. Upgrade to V5R4 of i5/OS,then run ANZOBJCVN to identify programs that will not upgrade to 6.1 before upgrading to 6.1.
    Explanation
    The correct answer suggests that the customer should first upgrade to V5R4 of i5/OS. After the upgrade, they should run ANZOBJCVN to identify programs that will not be able to upgrade to IBM i 6.1. This step is crucial as it allows the customer to identify any compatibility issues with their existing programs before proceeding with the upgrade. Once the incompatible programs are identified, the customer can then take appropriate actions to resolve the issues and ensure a smooth upgrade to IBM i 6.1.

    Rate this question:

  • 48. 

    An administrator is configuring virtual storage which will be owned by VIOS and used by IBM i. Which of the following correctly describes the sector size?

    • 512-byte sector AIX LUNs

    • 528-byte sector VIOS LUNs

    • 520-byte sector IBMi LUNs

    • 522-byte sector IBMi LUNs with compression

    Correct Answer
    A. 512-byte sector AIX LUNs
    Explanation
    The correct answer is 512-byte sector AIX LUNs. This means that the AIX LUNs, which are being configured for virtual storage, will have a sector size of 512 bytes.

    Rate this question:

  • 49. 

    An administrator must copy production data to a new system for high availability. How can System Reply Lists, System Values, Job and Subsystem Descriptions be restored from tape?

    • Restore the libraries QGPL and QUSRSYS.

    • Perform a Manual IPL to DST, select Change Install Options on the Install the Operation System display. Select the Message Reply List, System information, Job and Subsystem Descriptions.

    • Perform a Manual IPL to DST, select Change Install Options on the Install the Operating System display. Select the Restore option 1=Restore programs and language objects from current media set. Select the Message Reply List, System information, Job and Subsystem Descriptions.

    • Perform a Manual IPL to DST, select Change Install Options on the Install the Operating System display. Select the Restore option 4=Restore only language objects from a different media set using the current install device. Select the Message Reply List, System information, Job and Subsystem Descriptions.

    Correct Answer
    A. Perform a Manual IPL to DST, select Change Install Options on the Install the Operating System display. Select the Restore option 1=Restore programs and language objects from current media set. Select the Message Reply List, System information, Job and Subsystem Descriptions.
    Explanation
    To restore the System Reply Lists, System Values, Job and Subsystem Descriptions from tape, the administrator should perform a Manual IPL to DST and select Change Install Options on the Install the Operating System display. Then, they should choose the Restore option 1=Restore programs and language objects from the current media set. Finally, they need to select the Message Reply List, System information, Job and Subsystem Descriptions. This process will ensure that the necessary data is restored for high availability on the new system.

    Rate this question:

Quiz Review Timeline (Updated): Mar 20, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 01, 2011
    Quiz Created by
    Rafasol
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.