Virtual Storage MCQs

Virtual Storage MCQs

The following Virtual Storage MCQs have been compiled by our experts through research, in order to test your knowledge of the subject of Virtual Storage. We encourage you to answer these 60+ multiple-choice questions to assess your proficiency.
Please continue by scrolling down.

1: With regard to CLIST, which of the following built-in functions is used to convert data from DBCS to EBCDIC character sets?

A.   &SYSDSN

B.   &SYSONEBYTE

C.   &SYSLC

D.   &SYSTWOBYTE

2: Which of the following JES2 commands is used to stop all system initiators, job transmitters, punches, printers, and SYSOUT transmitters after they complete their current activity?

A.   $S

B.   $P

C.   $1 EXIT(nnn)

D.   $Z A

3: With regard to Kerberos database propagation, which of the following KDC cannot be used for listening propagation requests on the propagation port?

A.   primary KDC

B.   Secondary KDC

C.   Neither Option a nor b can be used

D.   Both Option a and b can be used

4: With regard to RACF utilities, what is the use of the following utility? "lRRUT200"

A.  

It can be used to recognize the inconsistencies in the internal structure of the RACF database. 

B.  

It can be used to format a dataset on DASD. which can further be used as the RACF database.

C.  

It can be used for unloading the RACF database to a sequential data set.

D.  

It can be used to remove all references of the users IDS or group names that do not exist in the RACF database.


5:

With regard to the MODIFY DFS operator command, which of the following statements is/are TRUE?

1. It can be used to start an individual DFS server daemon

2. It can be used to View the status of DFS server daemons

3. It can be used to stop an individual DFS server daemon

4. It can be used to stop all DFS server daemons


A.  

Only Statements1 and 3 are true

B.  

Only Statements 3 and 4 are true

C.  

Only Statement 2 is true

D.  

Only Statements 2 and 3 are true

E.  

All Statements 1. 2. 3. and 4 are true  

6: While adding user definitions to TSO/E with the ACCOUNT command. by using which of the following symbols as initial password. we cannot modify it later with the CHANGE sub-command?

A.   #

B.   @

C.   &

D.   *

7: With regard to TSO/E CLIST, which of the following symbols is used for exponentiation?

A.   x

B.   /

C.   **

D.   //

8: The "Backup-while-open" attribute is associated with which of the following SMS classes?

A.   Management class

B.   Data class

C.   Storage class

9: Which of the following components of the Interactive System Productivity Facility (ISPF) base element provides input and output services?

A.   Dialog Manager (DM)

B.   Program Development Facility (PDF)

C.   Software Conf‌iguration and Library Manager (SCLM)

D.   Client/Server Component

10: With regard to z/OS UNIX base element, which of the following components/services is NOT available in the z/OS V2R1 system?

A.   Shell

B.   Integrated Call Level Interface

C.   Debugger

D.   Parallel Environment

11: With regard to NFS, which of the following types of locking provides a mandatory locking interface?

A.   Byte-range

B.   Share reservations

C.   Both options a and b

12: Which of the following protocols is supported by the IBM z/OS capacity provisioning management?

A.   Only SNMP

B.   Only BCPii

C.   Both protocols are supported

D.   Neither protocol is supported

13: Which of the following networking protocols is provided by the Job Entry Subsystem 3 (JES3)?

A.   Only BSC and SNA

B.   Only SNA and TCP/IP

C.   Only TCP/1P and BSC

D.   BSC, SNA, and TCP/IP

E.   Only TCP/lP

14: In the IBM 2108 architecture, what is the size of the program status word (PSW)?

A.   8 bytes

B.   16 bytes

C.   24 bytes

D.   31 bytes

15: With regard to RACF utilities, which utility can be used to create those reports of RACF audit records that cannot be processed by RACF report writer?

A.   IRRRIDOO

B.   IRRDBUOO

C.   IRRADUOO

D.   |RRUT4OO

16: Which of the following features of IBM leS can be enabled dynamically, and provides automated Direct Access Storage Device (DASD) storage management?

A.   HCM

B.   DFSMStvs

C.   DFSMShsm

D.   DFSORT

17: With regard to the Interactive System Productivity Facility (ISPF), which of the following function keys is used to issue the "Cancel" command so as to remove a pull-down menu. if we do not want to make a selection?

A.   F2

B.   F8

C.   F12

D.   F16

18: Which of the below-given options can be used to remove users definition from TSO/E?

A.   Only the ACCOUNT command

B.   Only the ENROLL option

C.   Both the ENROLL option and the ACCOUNT command

D.   Both the ENROLL option and RACF commands

E.   Only RACF commands

19: Which of the following IBM z/OS optional features CANNOT be enabled dynamically?

A.   RMF

B.   XL C/C++

C.   Security Server

D.   z/OS Security Level 3

20: In IBM z/OS, which of the following Resource Management Facility (RMF) monitors uses the concept of "Contention Analysis" for the collection of data?

A.   Monitor l

B.   Monitor ll

C.   Monitor In

21: Which of the following options is NOT a Network Job Entry (NJE) protocol?

A.   BSC

B.   SNA

C.   CTC

D.   SNMP

22:

With regard to MVS JCL, which of the following symbols that we def‌ine are valid only for the current job?

1. JCL symbols

2. System symbols


A.  

Only1 

B.  

Only 2

C.  

Both 1 and 2

D.  

Neither1 nor 2

23:

What is the use of the following JES2 command?

SLjob


A.  

It is used to display the information about active jobs

B.  

It is used to display the information about specif‌ic jobs

C.  

It is used to display the information about inactive jobs

D.  

It is used to display the count of output group information

24: Which of the following options is a data management utility program that prints records from data sets?

A.   IEBUPDTE

B.   IEBPTPCH

C.   IEBCOMPR

D.   IEBDG

25: With regard to JES2 messages, which of the following routing code ranges are reserved for IBM use only?

A.   13 to 20

B.   21 to 28

C.   30 to 40

D.   65 to 96

26: If a CLIST data set is created with the EDIT command, then what is the default block size of the data set?

A.   1024 bytes

B.   2048 bytes

C.   3120 bytes

D.   4200 bytes

27: On which of the following JES2 commands, the ".JOBQ" parameter cannot be specif‌ied?

A.   $E Job

B.   $H Job

C.   $0 Job

D.   $C Job

28: Which of the following trust relationships is NOT supported by network authentication service for z/OS?

A.   Peer trust

B.   Transitive trust

C.   Both are supported

D.   None of the above is supported

29: With regard to the Interactive System Productivity Facility (ISPF), which of the following platforms does not support Workstation Agent (WSA)?

A.   Microsoft Windows 2000

B.   Solaris

C.   HP—UX

D.   OS X Yosemite

30: While sending and receiving data in Network Job Entry (NJE), which of the following networking protocols uses virtual telecommunication access method (VTAM) to control the sessions between the nodes?

A.   SNA

B.   TCP/IP

C.   BSC

31: With regard to TSO/E CLISTS, when alternative libraries are specified with the ALTLIB command, then which of the following types of libraries is searched f‌irst during implicit execution?

A.   Application level

B.   User level

C.   System level

32:

Choose True or False.

The Interactive System Productivity Facility (ISPF) cannot process members whose names are in lowercase.


A.  

True 

B.  

False

33: Which of the following options can be used to define users to TSO/E?

A.   Only the ENROLL option

B.   Only RACF commands

C.   Both options a and b can be used

D.   Neither option a nor b can be used

34: Which of the following options is a RACF database split/merge/extend utility?

A.   IRRMINOO

B.   IRRUT400

C.   IRRDBUOO

D.   IRRADUOO

35: With regard to the Resource Management Facility in IBM z/OS, SnapShot monitoring is performed with which of the following monitors?

A.   Monitor I

B.   Monitor ||

C.   Monitor III

A.   XEQ

B.   PAUSE

C.   DATASET

D.   XMIT

37: What is the use of the function key "F3" in the Interactive System Productivity Facility (ISPF)?

A.   Moves the cursor to action bar

B.   Moves the screen down the scroll amount

C.   Divides the screen into two logical screens

D.   Ends the current function

38: Which of the following statements about IBM z/OSMF Capacity Provisioning Task functions is false?

A.   We can view the status of the provisioning manager.

B.   We can export domain conf‌igurations.

C.   We can remove the provisioning manager.

D.   We can modify the provisioning policy.

39: With regard to member selection lists in the Interactive System Productivity Facility (ISPF), which of the following line commands is used to reset the member?

A.   B

B.   D

C.   G

D.   v

40: What is the maximum number of processors on which the Job Entry Subsystem 3 (JESS) can run in a sysplex?

A.   16

B.   28

C.   30

D.   32

41: In the MVS Job Control Language, what is the maximum number of job steps a job can have?

A.   64

B.   128

C.   255

D.   767

42: With regard to Job control statements, how many JOB statements can be contained in onejob?

A.   One

B.   Two

C.   Three

D.   Any number Of statements

43: Which of the following ISPF system commands enables us to edit, browse or view a data set from a command line?

A.   FKA

B.   EPDF

C.   ENVIRON

D.   CMDE

44: In which ofthe following VSAM Data Sets, only relative byte address can be used to access the records?

A.   Key-sequenced data set

B.   Relative-record data set

C.   Entry-sequenced data set

D.   Linear data set

45: With regard to JES2 messages, which of the following routing codes is used for disaster recovery?

A.   9

B.   29

C.   32

D.   44

46: With regard to JESS, which of the following Job Entry Control Language (JECL) statements is used to identify a nonstandard job?

A.   PROCESS

B.   NET

C.   MAIN

D.   NETACCT

47: With regard to KDC error codes, which code indicates that the server entry is expired?

A.   0

B.   2

C.   4

D.   6

48: Which of the following error codes indicates invalid operators, with regard to CLlST statement error codes?

A.   844

B.   944

C.   994

D.   544

49: Which ofthe following RACF commands is used to repair the RACF database by changing its internal blocks?

A.   BLKUPD

B.   ADDSD

C.   SETROPTS

D.   RACDCERT ALTER

50: Which of the following options is a RACF cross-reference utility?

A.   IRRUT4OO

B.   IRRRIDOO

C.   |RRUT100

D.   IRRMINOO