MCQs > IT & Programming > Virtual Storage MCQs > Basic Virtual Storage MCQs

Basic Virtual Storage MCQ

1. While defining users to TSO/E, which of the following entries in the user attributes data set (UADS) are mandatory?

Answer

Correct Answer: User location
Password/Null f‌ield
Account number

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

2. Which of the following attributes are associated with the SMS Management class?

Answer

Correct Answer: Migration attributes
Space management attributes
Aggregate backup attributes

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

3. Which of the following statements regarding Extended-Format Data Sets are FALSE?

Answer

Correct Answer: The maximum size limit for the VSAM data set is 4GB
They cannot support data stripping

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

4. With regard to record file system RFS restrictions, which of the following statements are FALSE?

Answer

Correct Answer: Only two PDS members can be Opened at a time for writing
PDS members can be directly moved between PDSsf

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

5. Which of the following data set types is/are NOT supported by the Interactive System Productivity Facility (ISPF)?

Answer

Correct Answer: Direct access data set
Generation data group (GDP)-based data set

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

6. In IBM z/OS, which of the following options are supported by the NFS server?

Answer

Correct Answer: Direct access
Partitioned data sets
VSAM RRDS

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

7. Which of the following statements with regard to ISPF are false?

Answer

Correct Answer: ISPF panels can be used to activate mixed-case password support.
ISPF panels can be used to deactivate mixed-case password support

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

8. Which of the following Dialog test options are not available for a "OUAL" ISPF primary command?

Answer

Correct Answer: Tables
Traces
Variables

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

9. With regard to Advanced Copy Services functions in IBM z/OS, which of the following Options are point-in-time copy functions?

Answer

Correct Answer: CC
FlashCopy
SnapShot

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

10. In the Interactive System Productivity Facility (ISPF), the f‌irst character of the member name of a partitioned data set can be:

Answer

Correct Answer: F
@
$

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

11. Which of the following kinds of information CANNOT be viewed for a Panel type of applications through application manager?

Answer

Correct Answer: Variables def‌ined
Libraries required

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

12. Does the SMB server support Internet Protocol version 6 (IPv6)?

Answer

Correct Answer: No

Note: This Question is unanswered, help us to find answer for this one

13. Which ofthe following RACF commands is used to repair the RACF database by changing its internal blocks?

Answer

Correct Answer: BLKUPD

Note: This Question is unanswered, help us to find answer for this one

14. Which of the following error codes indicates invalid operators, with regard to CLlST statement error codes?

Answer

Correct Answer: 844

Note: This Question is unanswered, help us to find answer for this one

15. With regard to KDC error codes, which code indicates that the server entry is expired?

Answer

Correct Answer: 2

Note: This Question is unanswered, help us to find answer for this one

16. In which ofthe following VSAM Data Sets, only relative byte address can be used to access the records?

Answer

Correct Answer: Entry-sequenced data set

Note: This Question is unanswered, help us to find answer for this one

17. What is the maximum number of processors on which the Job Entry Subsystem 3 (JESS) can run in a sysplex?

Answer

Correct Answer: 32

Note: This Question is unanswered, help us to find answer for this one

18. With regard to member selection lists in the Interactive System Productivity Facility (ISPF), which of the following line commands is used to reset the member?

Answer

Correct Answer: G

Note: This Question is unanswered, help us to find answer for this one

19. Which of the following statements about IBM z/OSMF Capacity Provisioning Task functions is false?

Answer

Correct Answer: We can remove the provisioning manager.

Note: This Question is unanswered, help us to find answer for this one

20. Which of the following statements are NOT related to JES2 JECL statements?

Answer

Correct Answer: XEQ
XMIT

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

21.

Choose True or False.

The Interactive System Productivity Facility (ISPF) cannot process members whose names are in lowercase.


Answer

Correct Answer:

True 


Note: This Question is unanswered, help us to find answer for this one

22. With regard to TSO/E CLISTS, when alternative libraries are specified with the ALTLIB command, then which of the following types of libraries is searched f‌irst during implicit execution?

Answer

Correct Answer: User level

Note: This Question is unanswered, help us to find answer for this one

23. While sending and receiving data in Network Job Entry (NJE), which of the following networking protocols uses virtual telecommunication access method (VTAM) to control the sessions between the nodes?

Answer

Correct Answer: SNA

Note: This Question is unanswered, help us to find answer for this one

24. With regard to the Interactive System Productivity Facility (ISPF), which of the following platforms does not support Workstation Agent (WSA)?

Answer

Correct Answer: OS X Yosemite

Note: This Question is unanswered, help us to find answer for this one

25. On which of the following JES2 commands, the ".JOBQ" parameter cannot be specif‌ied?

Answer

Correct Answer: $E Job

Note: This Question is unanswered, help us to find answer for this one

26. If a CLIST data set is created with the EDIT command, then what is the default block size of the data set?

Answer

Correct Answer: 3120 bytes

Note: This Question is unanswered, help us to find answer for this one

27.

What is the use of the following JES2 command?

SLjob


Answer

Correct Answer:

It is used to display the count of output group information


Note: This Question is unanswered, help us to find answer for this one

28.

With regard to MVS JCL, which of the following symbols that we def‌ine are valid only for the current job?

1. JCL symbols

2. System symbols


Answer

Correct Answer:

Only1 


Note: This Question is unanswered, help us to find answer for this one

29. In IBM z/OS, which of the following Resource Management Facility (RMF) monitors uses the concept of "Contention Analysis" for the collection of data?

Answer

Correct Answer: Monitor In

Note: This Question is unanswered, help us to find answer for this one

30. Which of the following IBM z/OS optional features CANNOT be enabled dynamically?

Answer

Correct Answer: z/OS Security Level 3

Note: This Question is unanswered, help us to find answer for this one

31. Which of the below-given options can be used to remove users definition from TSO/E?

Answer

Correct Answer: Only the ENROLL option

Note: This Question is unanswered, help us to find answer for this one

32. With regard to the Interactive System Productivity Facility (ISPF), which of the following function keys is used to issue the "Cancel" command so as to remove a pull-down menu. if we do not want to make a selection?

Answer

Correct Answer: F12

Note: This Question is unanswered, help us to find answer for this one

33. With regard to RACF utilities, which utility can be used to create those reports of RACF audit records that cannot be processed by RACF report writer?

Answer

Correct Answer: IRRADUOO

Note: This Question is unanswered, help us to find answer for this one

34. Which of the following networking protocols is provided by the Job Entry Subsystem 3 (JES3)?

Answer

Correct Answer: Only TCP/1P and BSC

Note: This Question is unanswered, help us to find answer for this one

35. With regard to NFS, which of the following types of locking provides a mandatory locking interface?

Answer

Correct Answer: Share reservations

Note: This Question is unanswered, help us to find answer for this one

36. With regard to z/OS UNIX base element, which of the following components/services is NOT available in the z/OS V2R1 system?

Answer

Correct Answer: Integrated Call Level Interface

Note: This Question is unanswered, help us to find answer for this one

37. Which of the following components of the Interactive System Productivity Facility (ISPF) base element provides input and output services?

Answer

Correct Answer: Dialog Manager (DM)

Note: This Question is unanswered, help us to find answer for this one

38. The "Backup-while-open" attribute is associated with which of the following SMS classes?

Answer

Correct Answer: Data class

Note: This Question is unanswered, help us to find answer for this one

39. With regard to TSO/E CLIST, which of the following symbols is used for exponentiation?

Answer

Correct Answer: **

Note: This Question is unanswered, help us to find answer for this one

40. While adding user definitions to TSO/E with the ACCOUNT command. by using which of the following symbols as initial password. we cannot modify it later with the CHANGE sub-command?

Answer

Correct Answer: *

Note: This Question is unanswered, help us to find answer for this one

41.

With regard to the MODIFY DFS operator command, which of the following statements is/are TRUE?

1. It can be used to start an individual DFS server daemon

2. It can be used to View the status of DFS server daemons

3. It can be used to stop an individual DFS server daemon

4. It can be used to stop all DFS server daemons


Answer

Correct Answer:

All Statements 1. 2. 3. and 4 are true  


Note: This Question is unanswered, help us to find answer for this one

42. With regard to RACF utilities, what is the use of the following utility? "lRRUT200"

Answer

Correct Answer:

It can be used to recognize the inconsistencies in the internal structure of the RACF database. 


Note: This Question is unanswered, help us to find answer for this one

43. With regard to Kerberos database propagation, which of the following KDC cannot be used for listening propagation requests on the propagation port?

Answer

Correct Answer: primary KDC

Note: This Question is unanswered, help us to find answer for this one

44. Which of the following JES2 commands is used to stop all system initiators, job transmitters, punches, printers, and SYSOUT transmitters after they complete their current activity?

Answer

Correct Answer: $P

Note: This Question is unanswered, help us to find answer for this one

45. With regard to CLIST, which of the following built-in functions is used to convert data from DBCS to EBCDIC character sets?

Answer

Correct Answer: &SYSONEBYTE

Note: This Question is unanswered, help us to find answer for this one