Headers for cached page www.ibm.com/education/certify/tests/sam520.phtml:
HTTP/1.1 200 Document follows

Server: Domino-Go-Webserver/4.6

Date: Tue, 09 Nov 1999 16:01:17 GMT

Accept-Ranges: bytes

Content-Type: text/html

Content-Length: 61292

Last-Modified: Fri, 13 Aug 1999 07:16:33 GMT
IBM Cert - Sample Test 520 (CICS Transaction Server for OS/2 Warp )
IBM Software
SearchHomeProgramProcessCertificationsNewsNavigatorFeedback
Professional Certification Program from IBM
Home
Test 520: Edu. & Pubs.Objective

CICS Transaction Server for OS/2 Warp
Sample Test 520


1. In a typical transaction processing system, which of the following statements is NOT true?

a. Many end users run the same, or similar, programs sharing the same databases and files.
b. Programs are invoked by online input and can generate online output.
c. Programs tend to be long-running.
d. End users process unscheduled single items in unpredictable volumes and sequence.

2. Which statement with respect to CICS for OS/2 support for access to IMS data is correct?

a. IMS databases may be accessed via the X/Open XA Interface.
b. IMS databases may be accessed via DB2 OS/2.
c. IMS databases are emulated by Btrieve.
d. IMS databases may be accessed via DPL to a remote system.

3. Which book will tell you about the differences between using CICS on a mainframe and CICS for OS/2 on a workstation?

a. CICS for OS/2 Installation
b. CICS for OS/2 Operation
c. CICS for OS/2 Customisation
d. CICS for OS/2 Application Programming

4.Which statement about CICS for OS/2 is true?

a. An ISC connection between CICS for OS/2 systems supports two-phase commit.
b. An ISC connection between CICS for OS/2 and CICS for MVS/ESA supports two-phase commit.
c. An ISC connection between CICS for OS/2 and CICS for AIX supports two-phase commit.
d. CICS for OS/2 does not support two-phase commit.

5. In which IBM CICS Client directory would you find the PLIHDR subdirectory?

a. OS2
b. DOS
c. WINDOWS
d. all of the above

6. Which CICS tables can refer to entries in the connection and session table - the TCS? (Select 4 answers.)

a. FCT
b. PPT
c. DCT
d. IVP
e. PCT
f. SNT

7. Which environment variable will CICSENV set for BMS user maps?

a. CICSUSERMAP
b. USERTRL
c. USERWRK
d. CICSRGRP

8. Which are valid IBM Client initialization file sections (Select 2 answers.)?

a. PROTOCOL
b. DRIVER
c. CLIENT
d. PRINTER
e. EMULATOR

9. You are automatically updating an existing CICS for OS/2 system. Which keyword in the response file will be ignored if it is different than the previous installation?

a. COMP = CICS for OS/2 sample code
b. CFGUPDATE = MANUAL
c. OVERWRITE = YES
d. FILE = c:\CICS200

10.When browsing a file, which of these commands are allowed after an EXEC CICS READNEXT?

a. ENDBR for the same file
b. READ UPDATE for the record returned by the READNEXT
c. READPREV for the same file
d. STARTBR for the same file

11. In a Peer-to-Peer environment, which statement is NOT true?

a. Each partner is responsible for its own control functions.
b. Only synchronous communication is possible between partners.
c. A transaction can be involved in several different relationships simultaneously.
d. Control of communication is shared between partners.

12. A CICS transaction consists of three logical units of work, each of which makes modifications to a database. If the system fails during the third unit of work, what will happen?

a. All of the data modifications made by the transaction will be backed out.
b. Only the data modifications made in the third LUW will be backed out.
c. If the database is on a remote system, backout will only occur if two-phase commit is supported.
d. The data involved will not be accessible by anyone else until the transaction is rerun.

13. What is used in a CICS based Transaction Server to determine which users can access CICS files?

a. the Resource Level key
b. the Transaction Level key
c. the Access Control List
d. the Remote Procedure Calls

14. What is the least efficient way to obtain small amounts of working storage for application usage?

a. EXEC CICS GETMAIN
b. program storage
c. TWA
d. COMMAREA

15. Which CICS command can NOT use the NOSUSPEND/NOQUEUE option?

a. EXEC CICS ENQ
b. EXEC CICS READQ TS
c. EXEC CICS ALLOCATE
d. EXEC CICS READQ TD

16. What does a CICS client use to pass user data or file keys to a CICS server?

a. TWA
b. TCTUA
c. COMMAREA
d. File Area

17. Why would you want to modify the CICS autoinstall program? (Select 3 answers.)

a. to limit the total number of logged on terminals
b. to keep utilisation information about terminals
c. to avoid making entries in the WSD for all terminals to be installed
d. to handle special cases such as always allowing a particular user to log on

18. Which statements about user-written post-initialisation programs are true? (Select 3 answers.)

a. All CICS facilities, except direct communication with a terminal, are available.
b. All post-initialisation programs must be defined in the RD, as well as in the Pd.
c. Post-initialisation programs can communicate with each other via the CWA or a TWA.
d. Each post-initialisation program runs sequentially after completion of CICS initialisation and before any user sign-ons.

19. Which usage statistics can PA/2 provide?

a. OS/2 processes
b. Temporary Storage
c. Program Control
d. DB2 accesses
e. Transaction Routing requests

20. Which information can NOT be displayed in real time by CICS for OS/2 Performance Analyser/2?

a. CICS OS/2 Log File
b. transaction rate over the last hour
c. system File Manager
d. real memory use over the last hour

21. What results from invoking the CICS supplied CRTE transaction using the following command?

CRTE SYSID=REGION1

a. The SYSID REGION1 is created.
b. All CICS transactions are run on the REGION server.
c. A connection is established to the server with the local CD definition REGION1.
d. Transaction routing is enabled to the region with the local CD definition REGION1.

22. Where are files for which the changes are to be logged by the CICS for OS/2 File Manager specified?

a. in the PBROLL file
b. in the BLOG.CFG file
c. in the BROLL.LST file
d. in the CONFIG.SYS file

23. You use the File Manager CREATE command to preallocate pages when creating a new data file. Which statements are true? (Select 2 answers.)

a. Up to 64K pages can be preallocated.
b. The disk must have sufficient contiguous free space available for the allocation, or the CREATE will fail.
c. No other data file can use the preallocated space, even if the file owning it does not occupy it all.
d. When the preallocated space is filled, File Manager will automatically attempt to make a secondary allocation based on the amount initially preallocated.

24. How many DCE security servers can be defined within a DCE cell?

a. one
b. two
c. a maximum of six
d. none

25. Which CICS facility is used to run a 3270 transaction on a remote CICS system?

a. Transaction Routing
b. Function Shipping
c. Distributed Program Link
d. Distributed Transaction Processing

26. Which CICS command is used to validate user defined conversion tables?

a. CICSCVT
b. CICSVUCT
c. CICSCTBL
d. CICSLCTB

27. A Windows client is connected to a CICS for OS/2 server on a NetBIOS LAN. Which configuration statements are valid for a printer used for CICS output generated by the client?

a. It must be attached to the CICS for OS/2 server.
b. It must be attached to a separate print server.
c. It must be attached to the client that started the transaction.
d. It can be attached to any client or server on the LAN.

28. CICS for OS/2 has unexpectedly stopped. What would you do first to discover the reason?

a. View CICSMSG.LOG.
b. Take a system dump.
c. Use EXEC CIS INQUIRE TASK to see what tasks are running.
d. Inspect TD and TS queues with CEBR.




CICS Transaction Server for OS/2 Warp
Sample Test 520

Answer Key:

1. c

2. d

3. d

4. d

5. a

6. abce

7. a

8. bc

9. d

10. ac

11. b

12. b

13. a

14. a

15. b

16. c

17. abd

18. abd

19. abc

20. d

21. d

22. b

23. ac

24. a

25. a

26. d

27. d

28. a



CERTIFICATION NAVIGATOR:
Select Certification, or Test Number and Topic, or a Site Page
Site Map    Help

AND

 IBM Home Page  Support  Contact IBM  Employment  Privacy  Legal
©1998 IBM Corporation