Pass4itsure > IBM > IBM Certified System Administrator > A2090-610 > A2090-610 Online Practice Questions and Answers

A2090-610 Online Practice Questions and Answers

Questions 4

Which statement is true about an index that is used to support a UNIQUE constraint?

A. It must not contain more than one column.

B. It cannot be used in a referential constraint.

C. It must be defined with the UNIQUE attribute.

D. It must be defined as UNIQUE WHERE NOT NULL.

Buy Now
Questions 5

When an application using a temporary table terminates or disconnects from the database unexpectedly, what happens to the temporary table and any data stored in it?

A. The data in the table is deleted and the table persists.

B. The data in the table is deleted and the table is implicitly dropped.

C. The temporary table is converted to a base table and the data is deleted.

D. The temporary table is converted to a base table and the data is persistent.

Buy Now
Questions 6

Which statement about triggers is true?

A. A trigger is designed to return specific types of values and contains executable code.

B. A trigger is designed to return specific types of values but contains no executable code.

C. A trigger performs actions to capture details about an activity like a join operation against multiple tables.

D. A trigger performs actions in response to an event like an INSERT, UPDATE or DELETE operation on a table.

Buy Now
Questions 7

When is a mask used to limit access to data in a table?

A. When mandatory access control (MAC) is used to protect the table.

B. When discretionary access control (DAC) is used to protect the table.

C. When label-based access control (LBAC) is used to protect the table.

D. When row and column access control (RCAC) is used to protect the table.

Buy Now
Questions 8

Which statement is valid about the Row and Column Access Control (RCAC) feature?

A. A row mask's access control rule is defined by an SQL CASE expression; a column permission's access control rule is defined by an SQLsearch condition.

B. A row permission's access control rule is defined by an SQL CASE expression; a column mask's access control rule is defined by an SQLsearch condition.

C. A row mask's access control rule is defined by an SQL search condition; a column permission's access control rule is defined by an SQL CASEexpression.

D. A row permission's access control rule is defined by an SQL search condition; a column mask's access control rule is defined by an SQL CASEexpression.

Buy Now
Questions 9

Which DB2 object limits the user's ability to retrieve data from a table by defining a SQL statement in the object?

A. View

B. Index

C. Trigger

D. Check constraint

Buy Now
Questions 10

A table named EMPLOYEES was created as follows:

What will be the results?

A. 0

B. 1

C. 2

D. 3

Buy Now
Questions 11

Which DB2 object is associated with PREVIOUS VALUE and NEXT VALUE expressions?

A. View

B. Table

C. Sequence

D. Identity Column

Buy Now
Questions 12

What type of large object (LOB) is used to store LOB data together with the formatted rows on data pages, instead of in a separate LOB storage object?

A. inline

B. binary

C. internal

D. partitioned

Buy Now
Questions 13

Which statement about roll back operations is correct?

A. When a ROLLBACK statement is executed, all locks held by the terminating transaction are released.

B. When a ROLLBACK TO SAVEPOINT statement is executed, all locks acquired up to the savepoint are released.

C. When a ROLLBACK TO SAVEPOINT statement is executed, all locks acquired after the savepoint are released.

D. When a ROLLBACK statement is executed, all locks acquired for open cursors that were declared WITH HOLD, are held.

Buy Now
Exam Code: A2090-610
Exam Name: Assessment: DB2 10.1 Fundamentals - Assessment
Last Update: Jan 02, 2025
Questions: 138
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99