How does PowerSC simplify security compliance and strengthen security?
By integrating with IBM X-Force to receive security updates
By encrypting SRIOV adapter traffic
By providing trusted system extensions
By creating central repository of users
Correct answer: C
Explanation:
PowerSC simplifies security compliance and strengthens security by providing trusted system extensions. Reference: http://www-01.ibm.com/common/ssi/ShowDoc.wss?docURL=/common/ssi/rep_sm/s/897/ENUS5765-PTS/index.html&lang=en&request_locale=en
PowerSC simplifies security compliance and strengthens security by providing trusted system extensions.
A customer has a virtualized system using Virtual I/O Server with multiple client partitions accessing the SAN using NPIV?
Which command on the client partition should be run to retrieve the network address of the fiber adapter?
lscfg-vp –l fcs0
lspci –vafcsi | grep “Network Address”
lspath –npiv fcs0 | grep “Network Address”
lsdev | grep fcs0
Correct answer: A
Question 3
Where is a Cluster Aware AIX cluster configuration data stored?
A NFS filesystem that is accessible by all nodes
A shared disk that is accessible from all nodes.
A master copy on one node and the data is replicated to the local disk of the other nodes
A shared system pool that is accessible by all nodes
Correct answer: B
Explanation:
The cluster repository disk is used as the central repository for the cluster configuration data. The cluster repository disk must be accessible from all nodes in the cluster and is a minimum of 10 GB in size. Given the importance of the cluster configuration data, the cluster repository disk should be backed up by a redundant and highly available storage configuration. Reference: https://www.ibm.com/developerworks/community/blogs/cgaix/entry/cluster_aware_aix1?lang=en
The cluster repository disk is used as the central repository for the cluster configuration data. The cluster repository disk must be accessible from all nodes in the cluster and is a minimum of 10 GB in size. Given the importance of the cluster configuration data, the cluster repository disk should be backed up by a redundant and highly available storage configuration.