When creating a DASD data set, you specify the amount of space needed explicitly through the _____ parameter, or implicitly by using the information...
Besides JCL, other common methods for allocating data sets include the ______ utility program, or using _____ to automate the allocation of data sets.
Besides JCL, other common methods for allocating data sets include the ______ utility program, or using _____ to automate the allocation of data sets.
Answer: Besides...
The HLQ for a user's data sets is typically controlled by the _____.
The HLQ for a user's data sets is typically controlled by the _____.
Answer: security syste...
What are the rules of naming segments or qualifiers?
What are the rules of naming segments or qualifiers?
(1) Limited to eight characters
(2) First must be alphabetic (A to Z) or special (#, @, $)
(3)...
You can use a set of TSO menus ______. One menu guides the user through allocation of a data set.
You can use a set of TSO menus ______. One menu guides the user through allocation of a data set.
Answer: Interactive System Productivity F...
You can use the ______ command to create data sets. The command actually guides you through the allocation values that you must specify.
You can use the ______ command to create data sets. The command actually guides you through the allocation values that you must specify.
Answer: TSO...
You can allocate data sets through a multifunction services program called ______ ______ ________; Include commonly used commands for working with data sets, such as ALLOCATE, ALTER, DELETe, and PRINT.
You can allocate data sets through a multifunction services program called ______ ______ ________; Include commonly used commands for working with data...
A volume Label, stored at track 0 or cylinder 0, identifies?
A volume Label, stored at track 0 or cylinder 0, identifies?
Answer: Each DASD Volum...
The number of ______ and their capacity vary with the device. Each device has an access mechanism that contains read/write heads to transfer data as the recording surface rotates past them.
The number of ______ and their capacity vary with the device. Each device has an access mechanism that contains read/write heads to transfer data as...
The recording surface on each volume is divided into many concentric ______
The recording surface on each volume is divided into many concentric ______
Answer: Track...
What 4 features does DASD volumes have in common?
What 4 features does DASD volumes have in common?
(1) Data Recording
(2) Data Checking
(3) Data format
(4) Programmin...
Is the basic z/OS file structure hierarchal or not hierarchical?
Is the basic z/OS file structure hierarchal or not hierarchical?
Answer: Not Hierarchica...
A data set can be located by what three things?
A data set can be located by what three things?
(1) Device Type
(2) Volume Serial Number
(3) Data Set Nam...
What are the three primary uses for DASD volumes?
What are the three primary uses for DASD volumes?
(1) Storing Data
(2) Executable Programs
(3) Temporary Working Storag...
What are 5 commonly used Access methods?
What are 5 commonly used Access methods?
(1) QSAM (Queued Sequential Acces Method) (heavy used)
(2) BSAM (Basic Sequential Access Method (for special...
z/OS requires that the ______ _______ reside on a DASD that is always mounted on a drive that is online to the system.
z/OS requires that the ______ _______ reside on a DASD that is always mounted on a drive that is online to the system.
Answer: master catal...
To enable the system to locate a specific data set quickly, z/OS includes a data set known as the ______ _______ that permits access to any of the data sets in the computer system or to other catalogs of data sets.
To enable the system to locate a specific data set quickly, z/OS includes a data set known as the ______ _______ that permits access to any of the data...
Use ____ volumes for storing data and executable programs, including the operating system itself, and for temporary working storage; Can use one of these volume for many different data sets, and reallocate or re use space on the volume.
Use ____ volumes for storing data and executable programs, including the operating system itself, and for temporary working storage; Can use one of...
Are known as sequential access devices because data sets on ____ must be accessed sequentially.
Are known as sequential access devices because data sets on ____ must be accessed sequentially.
Answer: Tap...
_____ or ____ are most frequently used for storing data sets on a long-term basis.
_____ or ____ are most frequently used for storing data sets on a long-term basis.
Answer: Disks or Tape are most frequently used for storing...
Generally, the operating system loads the members of a PDS into storage ____________, but it can access members directly when selecting a program for execution.
Generally, the operating system loads the members of a PDS into storage ____________, but it can access members directly when selecting a program for...
In a mainframe system, the channel subsystem manages the use of ___ _______, such as disks, tapes, and printers, while z/OS associates the data for a given task with a ______.
In a mainframe system, the channel subsystem manages the use of ___ _______, such as disks, tapes, and printers, while z/OS associates the data for...
If you use TSO/E, a command called ____ creates a shell for you. You can work in the shell environment until exiting or temporarily switching back to the TSO/E environment.
If you use TSO/E, a command called ____ creates a shell for you. You can work in the shell environment until exiting or temporarily switching back to...
The ________ provide a command interface to the z/OS UNIX environment. You can access the shell either by logging on to TSO/E or by using the remote login facilities of TCP/IP (rlogin).
The ________ provide a command interface to the z/OS UNIX environment. You can access the shell either by logging on to TSO/E or by using the remote...
________ should be viewed as a system management interface and a development interface for traditional z/OS programming.
________ should be viewed as a system management interface and a development interface for traditional z/OS programming.
Answer: TSO/ISP...
____ provides utilities, an editor and ____ applications to the user. To the extent permitted by various security controls, an ____ user has full access to most z/OS system functions.
____ provides utilities, an editor and ____ applications to the user. To the extent permitted by various security controls, an ____ user has full access...
____ is a menu-driven interface for user interaction with a z/OS system. The ____ environment is executed from native TSO.
____ is a menu-driven interface for user interaction with a z/OS system. The ____ environment is executed from native TSO.
Answer: ISP...
Differences between direct shell login and 3270 terminal support.
Differences between direct shell login and 3270 terminal support.
(1) You cannot switch to SO/E. However, you can use the TSO SHELL command to run...
There are some differences between the asynchronous terminal support (______ _____ _____) and the 3270 terminal support (____ _______)
There are some differences between the asynchronous terminal support (______ _____ _____) and the 3270 terminal support (____ _______)
Answer: There...
You can telnet into the shell. To log in, use the ______ command from your workstation or from another system with telnet client support.
You can telnet into the shell. To log in, use the ______ command from your workstation or from another system with telnet client support.
Answer: You...
You can rlogin (remote log in) o the shell from a system that has ______ client support. To log in, use the ______ command syntax supported at your site supported at your site.
You can rlogin (remote log in) o the shell from a system that has ______ client support. To log in, use the ______ command syntax supported at your...
You can log in directly to the z/OS UNIX shell from a system that is connected to z/OS through ______.
You can log in directly to the z/OS UNIX shell from a system that is connected to z/OS through ______.
Answer: You can log in directly to the...
Shell is a command processor that allows you to use what three 3 things?
Shell is a command processor that allows you to use what three 3 things?
(1) Invoke shell commands or utilities that request services from the system
(2)...
What are the three ways a user can invoke the z/OS UNIX shell?
What are the three ways a user can invoke the z/OS UNIX shell?
(1) From a 3270 display or a workstation running a 3270 emulator
(2) From a TCP/IP-attached...
What are the three functions that the z/OS UNIX Shell be used for?
What are the three functions that the z/OS UNIX Shell be used for?
Answer:
(1) Invoke shell scripts and utilities
(2) Write Shell scripts (a named...
The _______ primary command hides lines that contain a search string from view and replaces them with a dashed line. To see the lines again, you enter either the ____, ______or _____ ________ command.
The _______ primary command hides lines that contain a search string from view and replaces them with a dashed line. To see the lines again, you enter...
You can use __=____ to help you edit data sets. ___ in edit mode displays the entire editor tutorial.
You can use __=____ to help you edit data sets. ___ in edit mode displays the entire editor tutorial.
Answer: You can use F1=HELP to help you...
______ placed on the ____ _______, and ____ ________ are three different ways in which you can modify the contents of the data set.
______ placed on the ____ _______, and ____ ________ are three different ways in which you can modify the contents of the data set.
Answer: Primary...
To commit your changes, use ___ or ____. To exit the data set without saving your changes, enter ______ on the edit command line.
To commit your changes, use ___ or ____. To exit the data set without saving your changes, enter ______ on the edit command line.
Answer: To...
To _____, ____, _____, or ____ ____, place these commands directly on the line numbers where the action should occur.
To _____, ____, _____, or ____ ____, place these commands directly on the line numbers where the action should occur.
Answer: To insert, copy,...
To find and change text, you can enter commands on the _____ ______ ____.
To find and change text, you can enter commands on the _____ ______ ____.
Answer: To find and change text, you can enter commands on the editor...
To ____ the contents of a data set, move the cursor to the area of the record to be changed and type over the existing text.
To ____ the contents of a data set, move the cursor to the area of the record to be changed and type over the existing text.
Answer: To edit...
To view a data set's contents, enter a _ ______ as a line command in the column.
To view a data set's contents, enter a _ ______ as a line command in the column.
Answer: To view a data set's contents, enter a v (view) as a...
To edit a data set's contents, enter an _ ______ to the left of the data set name, In the data set, each line of text is known as a ______.
To edit a data set's contents, enter an _ ______ to the left of the data set name, In the data set, each line of text is known as a ______.
Answer: To...
To sell all of the possible actions you might take for a given data set, specify _______ _____ ___ in the command column to the left of the data set name.
To sell all of the possible actions you might take for a given data set, specify _______ _____ ___ in the command column to the left of the data set...
A data set name is usually _________, which one or more periods used to create the separate data set _________ of one to eight characters.
A data set name is usually _________, which one or more periods used to create the separate data set _________ of one to eight characters.
Answer: A...
What is a file used on z/OS to store data or executable code?
What is a file used on z/OS to store data or executable code?
Answer: Data Se...
What command will show you what the PA1 key is?
What command will show you what the PA1 key is?
Answer: LISTC LEVEL (SYS1) AL...
What does PC operating systems use for creating a file?
What does PC operating systems use for creating a file?
Answer: byte stream file syste...
Logging onto TSO requires a ____ device, or more commonly, a _____ runnin on the PC.
Logging onto TSO requires a ____ device, or more commonly, a _____ runnin on the PC.
Answer: Logging onto TSO requires a 3270 display device,...
What perspectives does a parallel sysplex solution provides for a single system image?
What perspectives does a parallel sysplex solution provides for a single system image?
(1) Data access
(2) Dynamic Transaction Routing
(3) User...
What 3 areas does ARM reduce operator intervention?
What 3 areas does ARM reduce operator intervention?
(1) Detection of the failure of a critical job or started task
(2) Automatic restart after a...
Customers can use ___ to add temporary processing capacity to a backup machine in the event of an unforeseen loss of server capability because of an emergency.
Customers can use ___ to add temporary processing capacity to a backup machine in the event of an unforeseen loss of server capability because of an...
This feature is available through CIU, and uses ____ for temporary increases in processor capacity. With temporary processor capacity, customers manage both predictable and unpredictable surges in capacity demands.
This feature is available through CIU, and uses ____ for temporary increases in processor capacity. With temporary processor capacity, customers manage...
What three supportive functions make up the Intelligent Resource Director?
What three supportive functions make up the Intelligent Resource Director?
(1) Workload Manager LPAR CPU Management
(2) Dynamic Channel-Path Management...
Configurations with shared DASD, CTC connections, and shared job queues are known as ___
Configurations with shared DASD, CTC connections, and shared job queues are known as ___
Answer: Loosely Couple System...
A system with six LPARs, each a separate z/OS system, has ____ z/OS images.
A system with six LPARs, each a separate z/OS system, has ____ z/OS images.
Answer: si...
Some mainframes have models that can be configured to operate slower than the potential speed of their CPs. This is known as ___
Some mainframes have models that can be configured to operate slower than the potential speed of their CPs. This is known as ___
Answer: running...
A __ is a processor that has not been characterized for use: Each of the processors begin as a ___ and is characterized by IBM during installation or at a later time.
A __ is a processor that has not been characterized for use: Each of the processors begin as a ___ and is characterized by IBM during installation or...
The IOCDS and profile both reside in the __: can be connected to one or more hardware management consoles (HMCs)
The IOCDS and profile both reside in the __: can be connected to one or more hardware management consoles (HMCs)
Answer: Support Element (mobile...
Partitioning control specifications are, in part, contained in an input/output control data set and are partly contained in a _____
Partitioning control specifications are, in part, contained in an input/output control data set and are partly contained in a _____
Answer: system...
Also known as main storage: cannot be shared among LPARS: Provides the system with directly addressable, fast-access electronic storage of data: Both data and programs must be loaded into central storage before they can be processed by this: Maximum ___ is restricted by hardware and system architecture.
Also known as main storage: cannot be shared among LPARS: Provides the system with directly addressable, fast-access electronic storage of data: Both...
A Type 1 (or native) _____ is software that runs directly on a given hardware platform (as an operating system control program). A Type 2 (or hosted) _____ is software that runs within an operating system environment such as VMWare.
A Type 1 (or native) _____ is software that runs directly on a given hardware platform (as an operating system control program). A Type 2 (or hosted)...
What does the LPAR Hypervisor come standard?
What does the LPAR Hypervisor come standard?
Answer: Processor Resource/Systems Manager (PR/SM...
What feature allows multiple I/Os to execute concurrently against the same disk device without queuing. This functionality allows a device to contain more than one access path using a base address along with aliases. It is implemented through the Enterprise Storage System (ESS) using ____
What feature allows multiple I/Os to execute concurrently against the same disk device without queuing. This functionality allows a device to contain...
Each disk device unit is represented by ____ in each z/OS image: Small piece of virtual storage describing the characteristics of a device to the operating system and contains the device address to denote status as well as tracking the progress of the I/O to the device.
Each disk device unit is represented by ____ in each z/OS image: Small piece of virtual storage describing the characteristics of a device to the operating...
What 4 objects are combined to create the device number?
What 4 objects are combined to create the device number?
(1) CHPID numbers
(2) Switch Port Numbers
(3) Control Unit Addresses
(4) Unit Addres...
Multiple partitions can sometimes share CHPIDs known as
Multiple partitions can sometimes share CHPIDs known as
Answer: Spannin...
___ and ___ channels connect to only one device or one port on a switch.
___ and ___ channels connect to only one device or one port on a switch.
Answer: ESCON and FICO...
____ addresses are two composed of two hexadecimal digits.
____ addresses are two composed of two hexadecimal digits.
Answer: CHPI...
Parallel channels have been replaced with what two types of channels?
Parallel channels have been replaced with what two types of channels?
(1) Enterprise Systems Connection (ESCON)
(2) FIber CONnection (FICON) (note)...
A technique used to access a single disk drive by multiple systems is called
A technique used to access a single disk drive by multiple systems is called
Answer: Multiple Allegianc...
By convention, what address is generally used if there are multiple addresses that can be contrived?
By convention, what address is generally used if there are multiple addresses that can be contrived?
Answer: The lowest address (although all...
Currently, how many channels can a mainframe machine have?
Currently, how many channels can a mainframe machine have?
Answer: over 100...
What is contained in the Central Processing Complex?
What is contained in the Central Processing Complex?
(1) main storage
(2) one or more central processors
(3) Timers
(4) Channel...
What was terms used in the early days of S/360 to describe the system processor?
What was terms used in the early days of S/360 to describe the system processor?
(1) Central Processing Unit
(2) System
(3) Processo...
How many sub parameters are in the amount of space parameter for the SPACE parameter?
How many sub parameters are in the amount of space parameter for the SPACE parameter?
(1) Primary Extent Size
(2) Secondary Exten size
(3) Indicates...
What must you provide if you set the DISP parameter to new?
What must you provide if you set the DISP parameter to new?
(1) Data set name
(2) Type of device for the data set
(3) volser if it is a disk or...
What would happen if you specified DISP=NEW for a data set that already exists?
What would happen if you specified DISP=NEW for a data set that already exists?
Answer: JCL Error messag...
What is the default disposition parameters (for normal and abnormal end) for DISP?
What is the default disposition parameters (for normal and abnormal end) for DISP?
Answer: Leave the data set as it was before the job step ...
In the DISP field for both normal and abnormal ending what parameter: Allow a later job step to specify a final disposition.
In the DISP field for both normal and abnormal ending what parameter: Allow a later job step to specify a final disposition.
Answer: PAS...
In the DISP field for both normal and abnormal ending what parameter: Keep the data set but uncatalog it at the end of the job step.
In the DISP field for both normal and abnormal ending what parameter: Keep the data set but uncatalog it at the end of the job step.
Answer:&nbs...
In the DISP field for both normal and abnormal ending what parameter: Keep and catalog the data set at the end of the job step.
In the DISP field for both normal and abnormal ending what parameter: Keep and catalog the data set at the end of the job step.
Answer: CATL...
In the DISP field for both normal and abnormal ending what parameter: Keep (but not catalog) the data set at the end of the job step.
In the DISP field for both normal and abnormal ending what parameter: Keep (but not catalog) the data set at the end of the job step.
Answer:&nbs...
In the DISP field for both normal and abnormal ending what parameter: Delete (and uncatalog) the data set at the end of the job step.
In the DISP field for both normal and abnormal ending what parameter: Delete (and uncatalog) the data set at the end of the job step.
Answer:&nbs...
The JCL statements that request and control execution of a program and that specify the resources needed to run the program
The JCL statements that request and control execution of a program and that specify the resources needed to run the program
Answer: Job Ste...
In the DISP field, what status: Indicates that the data set already exists and the current job must have exclusive access while it is running. If the current job opens the data set for output, the output will be appended to the current end of the data set.
In the DISP field, what status: Indicates that the data set already exists and the current job must have exclusive access while it is running. If the...
In the DISP field, what status: Indicates that the data set already exists and that several concurrent jobs can share access while they are running. All the concurrent jobs must specify SHR.
In the DISP field, what status: Indicates that the data set already exists and that several concurrent jobs can share access while they are running....
In the DISP field, what status: Indicates that the data set already exists and that this job will have exclusive access to it while it is running.
In the DISP field, what status: Indicates that the data set already exists and that this job will have exclusive access to it while it is running.
...
In the DISP field, what status: Indicates that a new data set will be created. This job has exclusive access to the data set while it is running. The data set must not already exist on the same volume as the new data set or be in a system or user catalog.
In the DISP field, what status: Indicates that a new data set will be created. This job has exclusive access to the data set while it is running. The...
___ parameter advises the system about the data set enqueuing needed for this job to prevent conflicting usage of the data set by other jobs.
___ parameter advises the system about the data set enqueuing needed for this job to prevent conflicting usage of the data set by other jobs.
Ans...
In the DD statement, Everything following this statement is data input (even //) until the two alphanumeric or special characters specified are encountered in column 1.
In the DD statement, Everything following this statement is data input (even //) until the two alphanumeric or special characters specified are encountered...
In the DD statement, Input data or control statements follow. This is a method of passing data to a program from the JCL stream.
In the DD statement, Input data or control statements follow. This is a method of passing data to a program from the JCL stream.
Answer: ...
In the DD statement, Results in a null input or throwing away data written to this ddname.
In the DD statement, Results in a null input or throwing away data written to this ddname.
Answer: DUMM...
In the DD statement, The tape label expected (No Label or Standard Label followed by data set location). A tape can store multiple data sets; each data set on the tape is in a file position. The first data set on tape is file 1.
In the DD statement, The tape label expected (No Label or Standard Label followed by data set location). A tape can store multiple data sets; each data...
In the DD statement, This is the data set organization, which can be sequential, partitioned, and so on.
In the DD statement, This is the data set organization, which can be sequential, partitioned, and so on.
Answer: DSORG...
In the DD statement, Stores records in a block of this size, typically a multiple of LRECL. A value of 0 will let the system pick the best value.
In the DD statement, Stores records in a block of this size, typically a multiple of LRECL. A value of 0 will let the system pick the best value.
...
In the DD statement, The record format, which can be fixed, blocked, variable, and so on.
In the DD statement, The record format, which can be fixed, blocked, variable, and so on.
Answer: RECFM...
In the DD statement, Logical record length, which is the number of bytes/characters in each record.
In the DD statement, Logical record length, which is the number of bytes/characters in each record.
Answer: LRECL...
In the DD statement, The data set control block parameter that has numerous sub parameters.
In the DD statement, The data set control block parameter that has numerous sub parameters.
Answer: DCB...
In the DD statement, Routes output to a remote destination
In the DD statement, Routes output to a remote destination
Answer: DEST...
In the DD statement, the system disk, tape, special device type, or esoteric (local name)
In the DD statement, the system disk, tape, special device type, or esoteric (local name)
Answer: UNIT...
In the DD statement, the volume name, disk name, or tape name
In the DD statement, the volume name, disk name, or tape name
Answer: VOL=SER...
In the DD statement, what defines a print location (and the output queue or data set)
In the DD statement, what defines a print location (and the output queue or data set)
Answer: SYSOUT...
In the DD statement, the amount of disk storage requested for a new data set
In the DD statement, the amount of disk storage requested for a new data set
Answer: SPACE...
In the DD statement, data set disposition, such as whether the data set needs to be created or already exists, and whether the data set can be shared by more than one job
In the DD statement, data set disposition, such as whether the data set needs to be created or already exists, and whether the data set can be shared...
In the DD statement, the name of the data set; this can include creation of temporary or new data sets or a reference back to the data set name
In the DD statement, the name of the data set; this can include creation of temporary or new data sets or a reference back to the data set name
A...
Specifies inputs and outputs for the program in the EXEC statement
Specifies inputs and outputs for the program in the EXEC statement
Answer: DD statement (Data Definition Statement...
What EXEC parameter imposes a time limit.
What EXEC parameter imposes a time limit.
Answer: TIME...
What EXEC parameter is boolean logic for controlling execution of other EXEC steps in this job. If, THEN, ELSE JCL statements exist that are superior to using ____; however, lots of old JCL may exist in production environments using this statement.
What EXEC parameter is boolean logic for controlling execution of other EXEC steps in this job. If, THEN, ELSE JCL statements exist that are superior...
What EXEC parameter is known to pass parameters to the program
What EXEC parameter is known to pass parameters to the program
Answer: PARM...
JCL that gives the name of a program to be executed
JCL that gives the name of a program to be executed
Answer: EXEC statemen...
What accounting field controls the number of system messages to be received
What accounting field controls the number of system messages to be received
Answer: MSGLEVEL...
What accounting field directs job output to a particular output queue
What accounting field directs job output to a particular output queue
Answer: MSGCLASS...
What accounting field directs a JCL statement to execute on a particular input queue
What accounting field directs a JCL statement to execute on a particular input queue
Answer: CLASS...
What accounting field delays or holds the job from running. It will be released later
What accounting field delays or holds the job from running. It will be released later
Answer: TYPRUN...
What accounting field specifies that the job will assume the authority of the user ID specified
What accounting field specifies that the job will assume the authority of the user ID specified
Answer: USER...
What accounting field sends notification of job completion to a particular user, such asa the submitter of the job
What accounting field sends notification of job completion to a particular user, such asa the submitter of the job
Answer: NOTIFY...
What accounting field requests specific memory resources to be allocate to the job
What accounting field requests specific memory resources to be allocate to the job
Answer: REGION...
JCL that identifies the job and the user who submits it
JCL that identifies the job and the user who submits it
Answer: JOB statemen...
When it comes to allocation, the difference in method of execution is that TSO executes the sort in the __________ while JCL is used to execute the sort in the __________.
When it comes to allocation, the difference in method of execution is that TSO executes the sort in the __________ while JCL is used to execute the...
Each JCL DD statement is equivalent to what command
Each JCL DD statement is equivalent to what command
Answer: TSO ALLOCA...
This provides inputs and outputs to the execution program on the EXEC statement. This statement links a data set or other I/O device or function to a ddname coded in the program. __ statements are associated with a particular job step.
This provides inputs and outputs to the execution program on the EXEC statement. This statement links a data set or other I/O device or function to...
Provides the name of a program to execute. There can be multiple ___ statements in a job. Each ____ statement within the same job is a job step.
Provides the name of a program to execute. There can be multiple ___ statements in a job. Each ____ statement within the same job is a job step.
...
What provides a name (jobname) to the system for this batch workload. It can optionally include accounting information and a few job-wide parameters?
What provides a name (jobname) to the system for this batch workload. It can optionally include accounting information and a few job-wide parameter...
What are the three basic JCL statements?
What are the three basic JCL statements?
(1) JOB
(2) EXEC
(3) ...
Which job requires a high proficiency with JCL, to create, monitor, correct, and rerun company's daily batch workload?
Which job requires a high proficiency with JCL, to create, monitor, correct, and rerun company's daily batch workload?
Answer: Production Control...
If you submit JCL for batch proceeding, what do you do with JCL procedures (PROCS)
If you submit JCL for batch proceeding, what do you do with JCL procedures (PROCS)
Answer: Sta...
Tells the system what program to execute and defines its inputs and outputs.
Tells the system what program to execute and defines its inputs and outputs.
Answer: Job Control Language (JC...
TSO ISPF Commands
Interrupt the current operation
PA1
Redisplay the current screen
PA2
Enter the Tutorial
PF1/13
Enter split-screen mode
PF2/14
Terminate the current...
Which describes Virtual Interface?
Which describes Virtual Interface?
1. It uses Telnet or SSH protocols for access.
2. It requires an active network connectio...
Which describes a console port?
Which describes a console port?
1.It displays startup, debugging, and error messages by default.
2.It can be used to restore an out-of-box configuration...
What is a user trying to determine when issuing a ping 10.1.1.1 command on a PC?
What is a user trying to determine when issuing a ping 10.1.1.1 command on a PC?
Answer: if there is connectivity with the destination devic...
Refer to the exhibit. A switch was configured as shown. A ping to the default gateway was issued, but the ping was not successful. Other switches in the same network can ping this gateway. What is a possible reason for this?
Refer to the exhibit. A switch was configured as shown. A ping to the default gateway was issued, but the ping was not successful. Other switches in...
What criterion must be followed in the design of an IPv4 addressing scheme for end devices?
What criterion must be followed in the design of an IPv4 addressing scheme for end devices?
Answer: Each IP address must be unique within the...
What command can be used on a Windows PC to see the IP configuration of that computer?
What command can be used on a Windows PC to see the IP configuration of that computer?
Answer: ipconfi...
What benefit does DHCP provide to a network?
What benefit does DHCP provide to a network?
Answer: Hosts can connect to the network and get an IP address without manual configuration...
Why would a Layer 2 switch need an IP address?
Why would a Layer 2 switch need an IP address?
Answer: to enable the switch to be managed remotel...
Which interface allows remote management of a Layer 2 switch?
Which interface allows remote management of a Layer 2 switch?
Answer: the switch virtual interfac...
Which statement is true about the running configuration file in a Cisco IOS device?
Which statement is true about the running configuration file in a Cisco IOS device?
Answer: It affects the operation of the device immediately...
While trying to solve a network issue, a technician made multiple changes to the current router configuration file. The changes did not solve the problem and were not saved. What action can the technician take to discard the changes and work with the file in NVRAM?
While trying to solve a network issue, a technician made multiple changes to the current router configuration file. The changes did not solve the problem...
Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords. (Choose three.)
Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords. (Choose...
A new network administrator has been asked to enter a banner message on a Cisco device. What is the fastest way a network administrator could test whether the banner is properly configured?
A new network administrator has been asked to enter a banner message on a Cisco device. What is the fastest way a network administrator could test whether...
What is a result of using the service password-encryption command on a Cisco network device?
What is a result of using the service password-encryption command on a Cisco network device?
Answer: All passwords in the configuration are not...
Which two characters are allowed as part of the hostname of a Cisco device? (Choose two.)
Which two characters are allowed as part of the hostname of a Cisco device? (Choose two.)
1.Numbers
2.Underlin...
Why is it important to configure a hostname on a device?
Why is it important to configure a hostname on a device?
Answer: to identify the device during remote access (SSH or telnet...
Which two functions are provided to users by the context-sensitive help feature of the Cisco IOS CLI? (Choose two.)
Which two functions are provided to users by the context-sensitive help feature of the Cisco IOS CLI? (Choose two.)
1.displaying a list of all available...
A router has a valid operating system and a configuration stored in NVRAM. When the router boots up, which mode will display?
A router has a valid operating system and a configuration stored in NVRAM. When the router boots up, which mode will display?
Answer: user EXEC...
A network administrator needs to keep the user ID, password, and session contents private when establishing remote CLI connectivity with a switch to manage it. Which access method should be chosen?
A network administrator needs to keep the user ID, password, and session contents private when establishing remote CLI connectivity with a switch to...
Which procedure is used to access a Cisco 2960 switch when performing an initial configuration in a secure environment?
Which procedure is used to access a Cisco 2960 switch when performing an initial configuration in a secure environment?
Answer: Use the console...
A network administrator is planning an IOS upgrade on several of the head office routers and switches. Which three questions must be answered before continuing with the IOS selection and upgrade? (Choose three.)
A network administrator is planning an IOS upgrade on several of the head office routers and switches. Which three questions must be answered before...
Which two features are characteristics of flash memory? (Choose two.)
Which two features are characteristics of flash memory? (Choose two.)
1.Flash provides nonvolatile storage.
2.The contents of flash may be overwr...
Subscribe to:
Posts (Atom)