Due to recent data protection legislation, your client has asked how to protect the integrity of their z/OS audit records.
What system function should be recommended?
What is the maximum amount of memory and IFLs on a Linux ONE Rockhopper II?
An account you cover has received media attention. A disgruntled administrator had root access to a Linux x86 financial server, altered the boot process, and deactivated all of the security measures. The result was that highly sensitive data was stolen.
The account security director would like to meet with you to determine if IBM Z has a solution that would prevent this from happening again.
Which IBM Z solution will prevent this type of breach?
An IBM customer in the distribution sector currently runs 14 applications on their z114 Model A01 server. Their software environment includes z/OS 1.9, CICS TS V3.2, and associated COBOL and FORTRAN language development environments. A third party database is also in use, connected to CICS and currently supported by the solution provider.
The Chief Technology Officer (CTO) has expressed a desire to upgrade their mainframe to new IBM Z server technology. The CTO believes the investment they make here would allow the company to ride out this new technology base for many years. Of high interest is the ability to dial up and down server capacity as business needs dictate. The CTO is asking for recommendations from IBM and third party suppliers.
Which of the following recommendations will most completely satisfy the CTO's requirements?
A customer has multiple IBM Z servers in their z/OS environment.
Which of the following is designed to provide 99.999% application availability?
Intel marketing argues that their chip-based encryption is equivalent to IBM Z Systems capability.
As it relates to Pervasive Encryption, which of the following statements most accurately counters this Intel-centric claim?