A retail customer has been using a tool that encrypts data-at-rest with symmetric encryption to meet PCI-DSS requirements. However they have discovered through an audit that they lack key management procedures.
Which product can they use to immediately address this procedural gap?
Answer : C
A customer wants to restrict access to a subnet in their network to a discreet number of employers. The customer tried to restrict it through firewalls, but this solution only handles the IP addresses.
Which solution will allow them to restrict access to z/OS users?
Answer : D
Which solution is the most cost-effective to provide added capacity for a scheduled 24 hour maintenance outage?
Answer : B
Reference: http://www-03.ibm.com/systems/z/advantages/resiliency/datadriven/cuod.html
A customer has installed a z13 processor with two cryptographic coprocessors for redundancy.
What is the maximum number of z/OS LPARs that can share the installed cryptographic coprocessors?
Answer : A
Reference:
https://share.confex.com/share/124/webprogram/Handout/Session16647/SHARE%20124%
20Session%2016647%202%20March%202015.pdf
Which set of capabilities belongs to IBM DB2 Query Management Facility (QMF)?
Answer : A
Reference: http://www-
01.ibm.com/common/ssi/printableversion.wss?docURL=/common/ssi/rep_sm/f/649/
ENUS5697-QMF/index.html (highlights)