1.
What ability does Custom Patterns for Linux on z Systems provide?
2.
A user ID/password has been compromised, and the unauthorized person has tried to access sensitive DB2 data, which the user ID is not permitted to access. The company is now interested in taking a more proactive approach to user ID protection. Which product can be used to detect this unauthorized DB2 activity and block specific requests?
3.
In which of these situations would a seller be more effective at proving the value of z Systems to a CFO for Data Warehousing solutions?
4.
Which factor would motivate a web-based business with a large number of aging servers to move its applications to a public Cloud-based environment?

 
5.
In an environment where data mart sprawl crosses lines of business and fragments data analytics, which of the following reasons supports consolidation onto DB2 for z/OS?
6.
A customer has a z13 machine with CPACF feature installed on the machine. They want to add Trusted Key Entry Workstation to support a new security project. Which z13 feature card is required to support this requirement?
7.
Your customer has noticed that there is significantly more memory plugged in their z13 N96 than what they ordered (7072 GB), and asks for an explanation. Which of the following is an appropriate response?
8.
IT management is proposing to senior management that they adopt a cloud solution to meet a critical requirement. Which customer requirement would a cloud solution satisfy?
9.
Which of the following is an accurate comparison statement?
10.
What is the main benefit that z Systems can bring to a customer that wants to deploy an analytical environment?