Ensurepass.com : Ensure you pass the IT Exams
2018 Jan IBM Official New Released C2090-610
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/C2090-610.html

DB2 10.1 Fundamentals

Question No: 11 – (Topic 1)

What is the purpose of a role?

  1. To define exactly what a specific user can do within a particular database once they have been authenticated.

  2. To group a collection of privileges together so that theycan be simultaneously granted to and revoked from multiple users.

  3. To establish a credible relationship between DB2 and an external entity, such as a database administrator or a middleware server.

  4. To group a collection of users together so that theycan be simultaneously granted and revoked specific authorities and privileges.

Answer: B

Question No: 12 – (Topic 1)

What is used in conjunctionwith a foreign key to define a relationship between two tables?

  1. Primary key

  2. Partitioning key

  3. Check constraint

  4. Unique constraint

Answer: A

Question No: 13 – (Topic 1)

When an application using a temporary table terminates or disconnects from the database unexpectedly,what happens to the temporary table and any data stored in it?

  1. The data in the table is deleted and the table persists.

  2. The data in the table is deleted and the table is implicitly dropped.

  3. The temporary table is converted to a base table and the data is deleted.

  4. The temporary table is converted to a base table and the data is persistent.

Answer: B

Question No: 14 – (Topic 1)

Which type of constraint can be used to ensure that an INTEGER column in a table will never be assigned more than one record that contains a NULL value?

  1. Unique constraint

  2. Primary key constraint

  3. Informational constraint

  4. Column default constraint

Answer: A

Question No: 15 – (Topic 1)

When a COMMIT statement is executed, what happens?

  1. All locks held on the database are automatically released.

  2. Data stored in global temporary tables is automatically deleted.

  3. Open cursors defined WITH HOLD are closed, but their data is retained.

  4. The current transaction is terminated and a new transaction boundary is started.

Answer: D

Question No: 16 – (Topic 1)

What is the primary purpose of a view?

  1. To enable uniqueness.

  2. To ensure data clustering.

  3. To combine data from multiple tables.

  4. To optimize queries ran against multiple tables.

Answer: C

Question No: 17 – (Topic 1)

When a user-defined function (UDF) is created and no schema is specified, what schema is used to store the UDF?

  1. The SYSIBM schema.

  2. The SYSFUN schema.

  3. A schema with the name of the UDF.

  4. A schema with the userid of the UDF definer.

Answer: D

Question No: 18 – (Topic 1)

A column mask that is to be used for row and column access control (RCAC) was created with the DISABLEoption specified. What must be done if this mask is to be used to restrict access to data stored in a table named EMPLOYEE?

  1. The column mask must be enabled; the EMPLOYEE table must be altered to activate column access control.

  2. The column mask must be enabled (column access control for the EMPLOYEE table will be activated automatically).

  3. The EMPLOYEE table must be altered to activate column access control (the column mask will be enabled automatically).

  4. The EMPLOYEE table must be altered toactivate column access control; row permission must be granted to everyone who needs to use the column mask.

Answer: A

Question No: 19 – (Topic 1)

What type of large object (LOB) is used to store LOB data together with the formatted rows on data pages, instead of in a separate LOB storage object?

  1. inline

  2. binary

  3. internal

  4. partitioned

Answer: A

Question No: 20 – (Topic 1)

A table named EMPLOYEE was created as follows:

Ensurepass 2018 PDF and VCE

Which action will prevent unauthorized users from accessing SSN data?

  1. Assign the SSN column to a restricted role that only authorized users can access.

  2. Only grant ACCESSCTRL authority for the SSN column to users who need to access SSN data.

  3. Alter the table definition so that SSN data is stored in a separate schema that only authorized users can access.

  4. Create a view for the EMPLOYEE table that does not contain the SSN column and require unauthorized users to use the view.

Answer: D

100% Ensurepass Free Download!
Download Free Demo:C2090-610 Demo PDF
100% Ensurepass Free Guaranteed!
C2090-610 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.