Test 000-800 IBM PureApplication System V1.1 System Adminisration


Search Tips   |   Advanced Search

Cloud configuration and management (29%)

  1. Compare and contrast the purpose of IP groups, cloud groups, and environment profiles, and explain their relationships.

  2. Identify workload isolation requirements and design a solution to allocate cloud resources.

  3. Identify network isolation requirements and design an IP group configuration based on the requirements.

  4. Create and configure IP groups and cloud groups.

  5. Identify resource sharing requirements and design an environment profile configuration based on the requirements.

  6. Configure and deploy shared services.

  7. Manage license allocation across workloads.

Access control management (16%)

  1. Evaluate and compare authentication options (local and LDAP).

  2. Configure PureApplication System to use an LDAP repository for authentication.

  3. Identify asset management requirements and design an authorization scheme based on the requirements.

  4. Compare and contrast security roles and resource access privileges.

  5. Manage access to system and workload resources with users and groups.

Business continuity (16%)

  1. Compare and contrast disaster recovery configuration approaches.

  2. Define a disaster recovery strategy for a system.

  3. Implement disaster recovery using the system's built-in disaster recovery tools.

  4. Define a backup and restore strategy for the various system and workload resources.

  5. Explain the system's high availability capabilities, including workload failover and hardware redundancy.

Workload and system monitoring (16%)

  1. Monitor running workloads using the built-in monitoring tools.

  2. Modify a virtual system pattern to add monitoring.

  3. Configure PureApplication System monitoring to send system events to an enterprise event monitor.

  4. Monitor workloads deployed on PureApplication System using an existing enterprise monitoring infrastructure.

  5. Monitor performance of system resources and identify potential problems using built-in tools.

  6. Set trace levels and analyze logs and event queues to identify potential system issues.

Catalog and workload management (12%)

  1. Maintain the workload catalog with current IBM images, pattern types, and emergency fixes.

  2. Specify the default virtual image to be used for virtual application deployments.

  3. Analyze pattern deployment failure scenarios and their causes.

Command-line interface (CLI) scripts (12%)

  1. Compare and contrast the integrated console to the CLI.

  2. Develop scripts that appropriately use the various command categories and permissions for CLI commands.

  3. Manage system resources using the CLI.