Pass4itsure > IBM > IBM Certified Database Administrator > C2090-611 > C2090-611 Online Practice Questions and Answers

C2090-611 Online Practice Questions and Answers

Questions 4

Due to a hardware failure, it appears that there may be some corruption in database DB_1 as DB2 is reporting a "bad page". DB2DART is performed for the entire database and it appears that several bad pages were detected in table space TBSP_1. What command can be used to recover the database and repair the corruption in table space TBSP_1?

A. RESTART DATABASE

B. RECOVER DATABASE

C. RESTORE TABLESPACE

D. ROLLFORWARD DATABASE

Buy Now
Questions 5

What unit of measurement is used to represent the cumulative total cost of a node in a Visual Explain access plan diagram?

A. CPU cycles

B. Elapsed time, in milliseconds

C. Processing instructions performed

D. Timerons

Buy Now
Questions 6

If the current value for self-tuning memory is: Self Tuning Memory (SELF_TUNING_MEM) = ON (Inactive) Which statement is true?

A. Self-tuning is occurring only on the instance memory area.

B. The memory tuner is actively tuning the memory on the system.

C. Self-tuning is not occurring because it is waiting for the database to be recycled.

D. Self-tuning is not occurring because there are less than two memory consumers enabled.

Buy Now
Questions 7

A table named SALES was created as follows:

If management wants to use Label-Based Access Control (LBAC) to protect individual rows in the SALES table, and the security policy needed (SEC_POLICY) has already been created, what must be done to protect the table as desired?

A. Associate the SEC_POLICY security policy with the SALES table.

B. Add a column with the DB2SECURITYLABEL data type to the SALES table.

C. Add a column with the DB2SECURITYLABEL data type to the SALES table and then associate the SEC_POLICY security policy with the table.

D. Add a SECURED WITH clause to every column in the SALES table and then associate the SEC_POLICY security policy with the SALES table.

Buy Now
Questions 8

Which statement regarding snapshot administrative views and snapshot monitor table functions is true?

A. Snapshot administrative views cannot be used with monitor switches or monitor reset commands while snapshot table functions have no suchrestrictions.

B. Snapshot table functions cannot be used with monitor switches or monitor reset commands while snapshot administrative views have no suchrestrictions.

C. Snapshot administrative views provide the option to choose between data from a single database partition or a data subset from across alldatabase partitions while snapshot table functions provide access to data from each database partition.

D. Snapshot administrative views provide access to data from each database partition while snapshot table functions provide the option to choosebetween data from a single database partition or a data subset from across all database partitions.

Buy Now
Questions 9

How is the time that an agent waits for log records to be flushed to disk calculated?

A. LOG_END_TIME divided by TOTAL_COMMITS

B. LOG_WAIT_TIME divided by TOTAL_COMMITS

C. LOG_WRITE_TIME divided by TOTAL_COMMITS

D. LOG_FLUSH_TIME divided by TOTAL_COMMITS

Buy Now
Questions 10

If the following statements are executed in the order shown: Which statement is true?

A. Insert, update, and delete operations can be performed against table TAB2.

B. Data stored in table TAB1 is automatically copied to table TAB2 immediately after table TAB2 is created.

C. Insert, update, and delete operations performed against table TAB1 are automatically cascaded to table TAB2.

D. The REFRESH TABLE statement must be executed before insert, update, and delete operations performed against table TAB1 will be seen intable TAB2.

Buy Now
Questions 11

Which statement is NOT true about a database restore operation?

A. A table space restore operation must be done offline.

B. A table space is not usable until the restore operation completes successfully.

C. A user can restore a database from a backup image on a 32-bit level into a 64-bit level, but not vice versa.

D. A database restore operation requires an exclusive connection. No applications can run against the database while the operation is inprogress.

Buy Now
Questions 12

A table named SALES was created as follows:

If management wants to use Label-Based Access Control (LBAC) to protect individual columns in the SALES table, and the security policy needed (SEC_POLICY) has already been created, what must be done to protect the table as desired?

A. Associate the SEC_POLICY security policy with the SALES table.

B. Add a SECURED WITH clause to every column in the SALES table.

C. Add a column with the DB2SECURITYLABEL data type to the SALES table and then associate the SEC_POLICY security policy with the table.

D. Add a SECURED WITH clause to every column in the SALES table and then associate the SEC_POLICY security policy with the SALES table.

Buy Now
Questions 13

What authorization is needed to use the AUDIT statement to create an audit policy?

A. DBADM

B. SYSADM

C. SECADM

D. SYSMAINT

Buy Now
Exam Code: C2090-611
Exam Name: DB2 10.1 DBA for Linux UNIX and Windows
Last Update: Dec 20, 2024
Questions: 118
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99