ZOS Mastery
ZOS Mastery
a.IBM mainframes
b.Remote distributed processing
c.zBX
d.Server farms
Answer :D
Answer :A
3. In addition to the z/OS and z/VM operating systems, which of the following operating
systems run on IBM System z excluding zBX?
Answer :D
4. Which of the following describes the major difference between and FICON or ESCON
channels?
Answer :D
5. IBM mainframe offers specialty processors (zIIP, zAAP, SAP and IFL). Which of the
following accurately describes a function of one of these specialty processors?
Answer :B
a.CTC ring
b.Shared DASD
c.Parallel Sysplex
d.zAAP
Answer :C
a.Message format
b.Software update list
c.System log routing table descriptor
d.Three characters in message identifier
Answer :D
8. A system z architecture has two kinds of physical storage. There is central storage
and auxiliary storage. Access to central storage is _________.
a.multi-synchronous
b.asychronous
c.synchronous
d.duplexed
Answer :C
9. The range of virtual addresses that z/OS can assign to a user or separately running
program is called a(n) ___________ space.
a.Virtual
b.Physical
c.Address
d.Mapping
Answer :C
10. The subset of an address space’s pages in central storage at a given time is known
as the ________.
a.Virtual set
b.Address set
c.Working set
d.Central set
Answer :C
11. Which of the following does the PA1 key denote in TSO/E?
a.Terminate
b.Attention
c.Cancel
d.Exit
Answer :B
12. In addition to telnet, which method can be used to log in directly to the z/OS UNIX
shell through TCP/IP?
a.logon
b.rlogin
c.map
d.FTP
Answer :B
13. Which TSO command can be entered at the READY prompt to diagnose an error
message?
a.?
b.Help
c.Assist
d.Analyze
Answer :B
14. Which of the following languages can be executed as a single command from a list of
commands without compiling it?
a.CLIST or REXX
b.Assembler
c.COBOL
d.PL/1
Answer :A
15. Which of the following is a characteristic of Native TSO?
Answer :B
16. Including all name segments and periods, the length of a dataset name cannot
exceed how many characters?
a.48
b.44
c.40
d.36
Answer :B
17. When describing a data set, which of the following is a valid z/OS record format?
a.Partitioned
b.Standard
c.Shifting
d.Fixed
Answer :D
18. Whenever a new customer record is added, it is always added at the end of the data
set. Whenever the customer data set records are processed, they are always
processed starting at the beginning of the data set, each record is read and
processed, and processing stops when the last record in the data set has been
processed. What is the data set type?
a.Sequential
b.PDS/E
c.RRDS
d.PDS
Answer :A
19. Which of the following types of data sets contains a directory and members?
a.Partitioned
b.Sequential
c.VSAM
d.KSDS
Answer :A
Answer :C
21. When creating new data sets, one must specify the NEW option for the DISP
parameter of a DD statement. Which of the following is required in addition to the
NEW option when allocating disk space?
Answer :D
22. A programmer can select almost any name for a JCL DD name. There are a number
of reserved DD names that a programmer cannot use. Which of the following is a
reserved DD name?
a.//SYSDDUMP DD ?
b.//SYSABEND DD ?
c.//STOPLIB DD ?
d.//JOBLAB DD ?
Answer :B
23. Which of the following is the sequence of the job phases as they flow through the
system?
Answer :C
Answer :A
Answer :B
Answer :A
Answer :D
28. Which of the following enables processing of a batch job in a z/OS environment?
a.UNIX Services
b.ISPF
c.TSO
d.JCL
Answer :D
a.SYSOUT=
b.PARM=
c.USER=
d.UNIT=
Answer :C
Answer :B
31. Which of the following resources processes the JCL statements for each job?
a.Initiator
b.Spool
c.JES2
d.WLM
Answer :D
32. Which of the following is the reason to design an application to run online?
a.The users require online access to data and fast response time
b.Users do not require to run the application as a batch program
c.Transactions are submitted for overnight processing
d.Data is stored on tape
Answer :A
33. Which of the following is an appropriate concern for the z/OS application developer?
a.Deciding whether business rules and policies are appropriate for the project
b.Selecting the right personnel to assist in the development of the application
c.Coding and testing the software being developed for a particular project
d.Selecting the correct hardware platform to support the application
Answer :C
34. Which of the following is the most commonly used interface for z/OS application
programmers?
Answer :B
Answer :A
36. In COBOL, which statement connects a file’s internal FD name to an external JCL DD
name?
a.Record
b.Select
c.Read
d.Open
Answer :B
a.Assembler
b.COBOL
c.REXX
d.CLIST
Answer :C
a.Compile Module
b.Source Module
c.Object Module
d.Load Module
Answer :C
39. What types of modules are input to the binder or linkage editor?
a.Compiled Modules
b.Source Modules
c.Output Modules
d.Object Modules
Answer :D
40. Which of the following are used to create an executable module from an object
deck?
a.Relocation program
b.Linkage editor
c.Preprocessor
d.Precompiler
Answer :B
41. Which of the following actions ensure the "atomic" property of a transaction
processing system?
Answer :B
Answer :A
Answer :D
44. Which of the following DB2 address spaces is used to communicate with other DB2
subsystems?
Answer :A
45. Which of the following describes SQL where DB2 determines the access path at run
time?
a.Determined
b.Dynamic
c.Static
d.Agile
Answer :B
46. Which of the following is a logical database structure made up of rows and columns?
a.Table space
b.Table
c.Index
d.DBMS
Answer :B
47. Which of the following is an application program defined to DB2 and managed by the
DB2 subsystem, used to help limit the number of network calls to run queries against
the database?
Answer :C
48. Which of the following is one of DB2’s three required address spaces?
49. Which of the following is a Java API to access different forms of tabular data?
a.JDBC
b.J2EE
c.JVM
d.JMS
Answer :A
50. SSI, Cookie Support, Tracing and Logging, and Persistent Connections are
considered what type of z/OS-specific HTTP functions?
a.File Caching
b.Security
c.Add-on
d.Basic
Answer :D
51. Which of the following z/OS UNIX files determines the behavior of a z/OS HTTP
Server request passed to a plug-in?
a.plugin-cfg.xml
b.plugin-cfg xml
c.polugin.conf
d.profile
Answer :A
a.Fully written in java, can be ported to any platform that supports DBMS protocol.
b.JDBC API calls platform and database specific code to access the database.
c.JDBC default driver for z/OS
d.Offers the best performance
Answer :A
54. Which of the following describes the WebSphere Application Server (WAS) capability
to detect application failures and to restart when a failure occurs?
a.ARM
b.ASM
c.RSM
d.SRM
Answer :A
55. When an MQ application sends a "request" message type, what message type is
expected in return?
a.Datagram
b.Return
c.Result
d.Reply
Answer :D
Answer :D
57. Which of the following disk volumes contains the IPL text?
a.SYSCAT
b.SYSRES
c.SYSDLB
d.SYSZOS
Answer :B
58. Which of the following processes is needed to load a mainframe operating system?
a.TSO/E
b.IML
c.JES
d.IPL
Answer :D
59. Which of the following items directs the system to locate z/OS data sets?
a.Storage Group
b.Master Catalog
c.DB2 Tables
d.SDSF
Answer :B
60. Which of the following elements allow different z/OS systems to share PARMLIB
definitions while retaining unique values in those definitions?
a.System Parameters
b.System Messages
c.System Symbols
d.System Codes
Answer :C
61. Which of the following z/OS components controls TSO, batch job and started task
priority assignments?
a.ASM
b.RSM
c.WLM
d.VSM
Answer :C
a.Element descriptions
b.APAR Elements
c.User Elements
d.PTF Elements
Answer :A
a.SCHEDULER
b.FUNCTION
c.SPSF
d.APF
Answer :B
64. Which of the following is used to introduce new elements to the system using
SMP/E?
Answer :A,D
a.Program Debugging
b.Software Installation
c.Security Planning
d.Job Scheduling
Answer :C
66. Which of the following z/OS features allows selected programs to reside in special
libraries and thereby access sensitive z/OS system functions (such as running in
supervisor state or executing privileged instructions)?
Answer :D
67. Which of the following enables an organization to define individuals and groups with
access privileges to z/OS?
a.RACF
b.APF
c.JES
d.SVC
Answer :A
68. Which of the following software products provides basic security for a mainframe
system?
a.RACF
b.LDAP
c.PKI
d.SAF
Answer :A
69. Which of the following RACF structures retains information about users, resources,
and access authorities?
a.Templates
b.Groups
c.Profiles
d.Access
Answer :C
Answer :A
71. Which of the following allows a full panel of data entries and corrections to be sent to
the receiving SNA application when the Enter key is pressed?
Answer :D
72. Which of the following enables network devices to communicate with SNA
applications in the z/OS environment?
a.BTAM
b.VSAM
c.VTAM
d.BDAM
Answer :C
73. Which of the following describes the z/OS Communications Storage Manager (CSM)?
a.Communications Server disk storage
b.Layered network model storage
c.RFC common storage standard
d.Shared I/O buffer for data flow
Answer :D