Due to a hardware failure, it appears that there may be some corruption in database DB_1 as DB2 is reporting a "bad page". DB2DART is performed for the entire database and it appears that several bad pages were detected in table space TBSP_1. What command can be used to recover the database and repair the corruption in table space TBSP_1?
A. RESTART DATABASE
B. RECOVER DATABASE
C. RESTORE TABLESPACE
D. ROLLFORWARD DATABASE
What unit of measurement is used to represent the cumulative total cost of a node in a Visual Explain access plan diagram?
A. CPU cycles
B. Elapsed time, in milliseconds
C. Processing instructions performed
D. Timerons
If the current value for self-tuning memory is: Self Tuning Memory (SELF_TUNING_MEM) = ON (Inactive) Which statement is true?
A. Self-tuning is occurring only on the instance memory area.
B. The memory tuner is actively tuning the memory on the system.
C. Self-tuning is not occurring because it is waiting for the database to be recycled.
D. Self-tuning is not occurring because there are less than two memory consumers enabled.
A table named SALES was created as follows:
If management wants to use Label-Based Access Control (LBAC) to protect individual rows in the SALES table, and the security policy needed (SEC_POLICY) has already been created, what must be done to protect the table as desired?
A. Associate the SEC_POLICY security policy with the SALES table.
B. Add a column with the DB2SECURITYLABEL data type to the SALES table.
C. Add a column with the DB2SECURITYLABEL data type to the SALES table and then associate the SEC_POLICY security policy with the table.
D. Add a SECURED WITH clause to every column in the SALES table and then associate the SEC_POLICY security policy with the SALES table.
Which statement regarding snapshot administrative views and snapshot monitor table functions is true?
A. Snapshot administrative views cannot be used with monitor switches or monitor reset commands while snapshot table functions have no suchrestrictions.
B. Snapshot table functions cannot be used with monitor switches or monitor reset commands while snapshot administrative views have no suchrestrictions.
C. Snapshot administrative views provide the option to choose between data from a single database partition or a data subset from across alldatabase partitions while snapshot table functions provide access to data from each database partition.
D. Snapshot administrative views provide access to data from each database partition while snapshot table functions provide the option to choosebetween data from a single database partition or a data subset from across all database partitions.
How is the time that an agent waits for log records to be flushed to disk calculated?
A. LOG_END_TIME divided by TOTAL_COMMITS
B. LOG_WAIT_TIME divided by TOTAL_COMMITS
C. LOG_WRITE_TIME divided by TOTAL_COMMITS
D. LOG_FLUSH_TIME divided by TOTAL_COMMITS
If the following statements are executed in the order shown: Which statement is true?
A. Insert, update, and delete operations can be performed against table TAB2.
B. Data stored in table TAB1 is automatically copied to table TAB2 immediately after table TAB2 is created.
C. Insert, update, and delete operations performed against table TAB1 are automatically cascaded to table TAB2.
D. The REFRESH TABLE statement must be executed before insert, update, and delete operations performed against table TAB1 will be seen intable TAB2.
Which statement is NOT true about a database restore operation?
A. A table space restore operation must be done offline.
B. A table space is not usable until the restore operation completes successfully.
C. A user can restore a database from a backup image on a 32-bit level into a 64-bit level, but not vice versa.
D. A database restore operation requires an exclusive connection. No applications can run against the database while the operation is inprogress.
A table named SALES was created as follows:
If management wants to use Label-Based Access Control (LBAC) to protect individual columns in the SALES table, and the security policy needed (SEC_POLICY) has already been created, what must be done to protect the table as desired?
A. Associate the SEC_POLICY security policy with the SALES table.
B. Add a SECURED WITH clause to every column in the SALES table.
C. Add a column with the DB2SECURITYLABEL data type to the SALES table and then associate the SEC_POLICY security policy with the table.
D. Add a SECURED WITH clause to every column in the SALES table and then associate the SEC_POLICY security policy with the SALES table.
What authorization is needed to use the AUDIT statement to create an audit policy?
A. DBADM
B. SYSADM
C. SECADM
D. SYSMAINT