Which statement describes the function of the GPFS Policy Engine?
A. It provides a network block abstraction for file system I/O
B. It enables monitoring of events associated with a filesystem or individual file
C. It manages where file data is placed when created and moved between storage pools
D. It provides asynchronous caching of files on remote clusters
正解:C
質問 2:
Which physical processors are initially part of the default shared processor pool?
A. All physical processors within a processor enclosure (CEO)
B. All active physical processors
C. All physical processors excluding the folded ones
D. All installed physical processors in a system, including CoD processors
正解:B
質問 3:
How do storage keys in AIX contribute to system reliability and availability?
A. They are used to prevent application memory access from an unauthorized user
B. They are used to protect memory from being accidentally overwritten by another application
C. They are used to provide active memory expansion
D. They are used to provide active memory mirroring
正解:B
質問 4:
A customer wants to implement a DB2 pureScale HPC cluster on Power Systems with AIX, and is examining the options for the communication adapters in the servers. In addition to InfiniBand, which of the following adapter types is supported?
A. Remote Direct Memory Access Over Converged Ethernet (RoCE]
B. Quad Data Rate (QDR)
C. Double Data Rate (DDR)
D. Fibre Channel Over Ethernet (FCoE]
正解:A
質問 5:
A customer plans to purchase 2 Power 740 servers, and run 10 Red Hat Linux partitions on each server. How many Red Hat licenses are required?
A. 4
B. 20
C. 10
D. 2
正解:D
質問 6:
A customer is performing a daily backup of a large amount of data to a shared SAN tape library.
Reducing the overall backup time is a major concern.
Which is the first action that should be recommended towards reducing the overall backup time?
A. Review of processor and memory capacity
B. Addition of tape drives on the tape library
C. Addition of Fibre Channel adapters
D. Analysis of throughput bottlenecks
正解:D
質問 7:
What capability does Role Based Access Control (RBAC) provide to users?
A. Perform system operations associated with roles
B. Assume a default role at login
C. Control access to system logs
D. Assume the role of root under certain circumstances
正解:A
質問 8:
A customer owns two EMC Symmetrix storage units. They are adding 4 new Power 770 servers to their environment. The customer also wants to virtualize their existing storage and add 5TB of Solid State Drives to increase performance for existing AIX and Linux LPARs.
Which single product will address all aspects of the customer's requirements?
A. Storwize V7000
B. DS8870
C. DCS3700
D. San Volume Controller
正解:A