A customer starts using z/OS Encryption Readiness Technology (zERT) to gather knowledge about the state of encrypted network traffic in their system. They also use Sysplex Distributor, so there is TLS-encrypted traffic routed through the distributor systems to application hosts. The distributor systems also host TLS-encrypted TN3270 services for the network.
They started gathering data from the Sysplex Distributor hosts, since encrypted traffic is routed through those systems. A large number of encrypted TCP sessions seem to be missing from the customer’s analysis.
What does the customer need to do to gather full analysis data?
A . Start gathering zERT data on all z/OS systems in their environment.
B . Configure the zERT collection correctly on the Sysplex Distributor hosts.
C . Move the collection of data to the z/OS application data hosts.
D . Move the collection of data to the network routers neighboring the z/OS systems.
Answer: D
Leave a Reply