Ensurepass.com : Ensure you pass the IT Exams
2018 Jan IBM Official New Released C2090-611
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/C2090-611.html

DB2 10.1 DBA for Linux, UNIX, and Windows

Question No: 1 – (Topic 1)

The following commands are executed against a database named MY_DB, which has been configured to usearchival logging:

Ensurepass 2018 PDF and VCE

Which statement is true?

  1. Upon completion of the Load, the table T1 is placed into quot;Backup Pendingquot; state.

  2. Upon completion of the Load, a backup image of table T1 is automatically generated.

  3. After a Restore and Rollforwardoperation, table T1 would be marked unavailable and can only be dropped.

  4. After a Restore and Rollforward operation, the loaded data is stored into a copy-image file and table T1 is fully available.

Answer: C

Question No: 2 – (Topic 1)

Given the followingstatement:

Ensurepass 2018 PDF and VCE

How many constraints are present in the DEPARTMENT table?

  1. 1

  2. 2

  3. 3

  4. 4

Answer: D

Question No: 3 – (Topic 1)

Which data movement utility is suitable for moving and processing large amounts of real- time data without affecting availability?

  1. INGEST

  2. REPLICATION

  3. LOAD WITH READ ACCESS

  4. IMPORT WITH BUFFERED INSERT

Answer: A

Question No: 4 – (Topic 1)

What are two types of security label components that can be used with Label-Based Access Control (LBAC)? (Choose two).

  1. Set

  2. Tree

  3. Group

  4. Range

  5. Hierarchy

Answer: A,B

Question No: 5 – (Topic 1)

If an MQT named Q1_SALES wascreated as follows:

Ensurepass 2018 PDF and VCE

Which statement will execute successfully?

  1. DELETE FROM q1_sales

  2. REFRESH TABLE q1_sales

  3. INSERT INTO q1_sales VALUES(80.2)

  4. ALTER TABLE q1_sales REFRESH IMMEDIATE

Answer: B

Question No: 6 – (Topic 1)

Whichstatement is correct when describing trusted contexts?

  1. A trusted context defines a trust relationship for a connection between the database and an external entity.

  2. A trusted context promotes the authorization level of the connection initiator and grants them DBADM authority.

  3. A trusted context defines a trust relationship between a user and a table allowing that user additional capabilities.

  4. A trusted context gives the database connection the ability to bypass auditing since authentication has already occurred.

Answer: A

Question No: 7 – (Topic 1)

Which system command can beused to locate and return only ADM4500W messages from the DB2 diagnostics log file?

  1. db2pd

  2. db2diag

  3. db2trace

  4. db2fmtdiag

Answer: B

Question No: 8 – (Topic 1)

Which statement about the ADMIN_MOVE_TABLE procedureis true?

  1. The ADMIN_MOVE_TABLE procedure immediately applies all changes that occur to data in the active (source) table during the move operation to the target table.

  2. The ADMIN_MOVE_TABLE procedure stores all changes that occur to data in the active(source) table during the move to a user-supplied staging table so they can be replayed against the target table when the move is complete.

  3. If the ADMIN_MOVE_TABLE procedure is used to move data in an active (source) table to a target table that was created beforehand, the target table is renamed (to the source table name) once the data has been copied into the target table.

  4. If the ADMIN_MOVE_TABLE procedure is invoked with the KEEP option specified, the active (source) table will be kept and if thetarget table is to be created automatically, a name that is different from that of the active table must be specified for the target table.

Answer: C

Question No: 9 – (Topic 1)

You have just converted an existing database to an automatic storage database. What can you use to move data from an existing DMS table space to an automatic storage table space, while the data remains online and available for access?

  1. The db2move command

  2. The db2relocatedb command

  3. The ADMIN_MOVE_TABLE procedure

  4. The ADMIN_MOVE_TABLE_UTIL procedure

Answer: C

Question No: 10 – (Topic 1)

Which statement regarding snapshot administrative views and snapshot monitor table functions is true?

  1. Snapshot administrative views cannot be used with monitor switches or monitor reset commands while snapshot table functions have no such restrictions.

  2. Snapshot table functions cannot be used with monitor switches or monitor reset commands while snapshot administrative views have no such restrictions.

  3. Snapshot administrative views provide the option to choose between data from a single database partition or a data subset from across all database partitions while snapshot table functions provide access to data from each database partition.

  4. Snapshot administrative views provide access to data from each database partition while snapshot table functions provide the option to choose between data from a single database partition or a data subset from across all database partitions.

Answer: D

100% Ensurepass Free Download!
Download Free Demo:C2090-611 Demo PDF
100% Ensurepass Free Guaranteed!
C2090-611 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.