Pass Guarantee 070-680 Exam By Taking CertBus New Microsoft 070-680 VCE And PDF Braindumps


Which backup scenario will enable a VIO server to be recovered as quickly as possible in the event of a


A. mkdir/backupssavevgstruct rootvgbackupios -file /backups -mksysb /home/ios/vgbackups

B. mknfsmnt-f/backups-d/backups-hnim1 -trw-wbg-S mount/backups backupios -file /backups/viol


C. cfgsv-is rootvgsavevgstruct rootvgbackupios -file /backups -mksysb /home/ios/vgbackups

D. mkvg-vgbackupvghdisk1crfs -vjfs2 -g backupvg -m /backups -A yes -p rw -a size=10G -a

logname=INLINEmount/backupsbackupios -file /backups/vio1 .mksysb

Correct Answer: B


A customer has an IBM System Storage DS8100 with 128 DDMs and needs to add additional capacity.

What must be verified by the Business Partner during the visit to the computer room?

A. the space for the upgrade to a DS8700

B. the space on the left of the DS8000 for an expansion frame

C. the space on the right of the DS8000 for an expansion frame

D. the space to install additional DDMs in the base frame

Correct Answer: C


A customer has requested an IBM System Storage DS8700 solution to meet the following requirements:

-20% yearly growth

-29,000 IOPS

-approximately 50/50 mix of read/write operations

-small (4 KB) data transfers The storage specialist has created a Disk Magic model in which each port is

capable of approximately 2,900 to 3,100 IOPS. What is the minimum number of ports that should be

configured on the DS8700 to handle the projected workload for the first year?

A. 8

B. 10

C. 12

D. 16

Correct Answer: C


Which three tasks can be performed using System Management Console?

A. Starting JMS Server

B. Changing Properties for an Agent

C. Changing Application Server Properties

D. Setting Notification of an Application Server Shutdown

E. Changing Database Cache Limits for an Application Server

F. Resolving Problems with JMS Queue Number of Messages

Answer: D,E,F



What is the purpose of the ivrgy_tool utility with the add-acls parameter?

A. to apply the required ACLs to suffixes that were added to the Active Directory user


B. to apply the required ACLs to suffixes that were added to the IBM Tivoli Directory Server

LDAP server

C. to apply the required ACLs to suffixes that were added to the Active Directory

Application Mode (ADAM) user registry

D. to apply the required ACLs to the container objects under the /Management region of

the IBM Tivoli Access Manager for e-business V6.1.1 Object Space

Answer: B