What should the administrator do to reclaim the deleted record space in the available time?
A customer has determined that a large table contains a high percentage of deleted records.
Attempts to reorganize the table to reclaim the deleted record space exceed the available time to
keep users locked out.
What should the administrator do to reclaim the deleted record space in the available time?
What should the administrator do?
All IBM-supplied user profiles and administrators’ profiles in a system have inadvertently been
disabled and an administrator needs to regain access into the system.
What should the administrator do?
Which sequence of actions will complete the restore in the minimum amount of time?
During a disaster recovery test the restore job abnormally ended. The administrator discovered
that 95 of the 200 libraries on the system were restored, including the main database libraries. The
remaining libraries represent less than 10% of the system.
Which sequence of actions will complete the restore in the minimum amount of time?
Which command should the administrator use?
An administrator needs to clear the data from a large number of save files in multiple libraries. The
administrator has written a program that displays all of the objects in a library to an output file. The
output file includes:
The program reads through all the entries in the file.
The administrator needs to insert a statement that will clear the data from save files only.
Which command should the administrator use?
How can the administrator restore the application directories but omit all files ending with the log extension
An administrator is restoring an application that contains many IFS directories. The saved
application version was saved from another system using the SAV command and has hundreds of
unnecessary log files (*.log) spread across its directories and subdirectories.
How can the administrator restore the application directories but omit all files ending with the log
extension?
Which option in the Securely Tools menu will accomplish the task?
An audit requires a listing of programs that inherit authority greater than the authority of the
submitting user. Which option in the Securely Tools menu will accomplish the task?
which P address should the administrator telnet, using port 2300, to get console access?
An administrator needs to access an IBM i console remotely through the HMC. To which P
address should the administrator telnet, using port 2300, to get console access?
What caused the backup to fail?
The following CL program was created to perform an application backup:
The operator later reports that the backup failed and all of the subsystems had to be restarted.
What caused the backup to fail?
What should the administrator do next to troubleshoot the printer?
An administrator has a new, local, IP-based printer that is not communicating with the system.
Ping is successful using the printer IP address and the printer name, and response time is
acceptable. Users can print from Windows.
What should the administrator do next to troubleshoot the printer?
What are the IBM recommended setup steps for the system audit journal and journal receivers when using librar
What are the IBM recommended setup steps for the system audit journal and journal receivers
when using library JRNLIB as the secured library?