Ensurepass.com : Ensure you pass the IT Exams
2018 Jan IBM Official New Released C2090-611
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/C2090-611.html

DB2 10.1 DBA for Linux, UNIX, and Windows

Question No: 81 – (Topic 2)

Given the following command: LOAD FROM newrows.del OF DEL INSERT INTO mytab ALLOW READ ACCESS Which statement(s) must be executed before applications can query the newly loaded data?

  1. SET INTEGRITY FOR mytab IMMEDIATE CHECKED

  2. ALTER TABLE mytab CHECK (COL IS VALIDATED)

  3. ALTER TABLE mytab ALLOW READ ACCESS IMMEDIATE CHECKED

  4. ALTER TABLE mytab ALLOW READ ACCESS;

SET INTEGRITY FOR mytab IMMEDIATE UNCHECKED;

Answer: A

Question No: 82 – (Topic 2)

How is the time that anagent waits for log records to be flushed to disk calculated?

  1. LOG_END_TIME divided by TOTAL_COMMITS

  2. LOG_WAIT_TIME divided by TOTAL_COMMITS

  3. LOG_WRITE_TIME divided by TOTAL_COMMITS

  4. LOG_FLUSH_TIME divided by TOTAL_COMMITS

Answer: C Explanation:

Which tool should be used to collect data during a potential hang without stopping the database manager?

  1. db2ls

  2. db2dart

  3. db2fodc

  4. db2cklog Answer: C

Question No: 83 – (Topic 2)

Which statement is true about Insert Time Clustering (ITC) tables?

  1. An existing MDC table can be converted to an ITC table.

  2. ITC tables have similar characteristics to MDC tables, except they don#39;t use block indexes.

  3. The ITC table is anMDC table defined with a single TIMESTAMP type column in the ORGANIZE BY clause.

  4. ITC tables are created with the CREATE TABLE command by specifying the ORGANIZE BY INSERT TIME clause.

Answer: D

Question No: 84 – (Topic 2)

Which statement about DB2 aggregate registry variables is true?

  1. An aggregate registry variable that is explicitly set by an application cannotbe overwritten.

  2. An aggregate registry variable overrides any corresponding explicitly set registry variable.

  3. A registry variable that is explicitly set by an application can only be overwritten by

    aggregate registry variable.

  4. A registry variablethat is implicitly configured through an aggregate registry variable may also be explicitly defined.

Answer: D

Question No: 85 – (Topic 2)

If the following command is executed: CREATE DATABASE sample RESTRICTIVE

Which statement is true?

  1. No authorities or privileges will be granted to PUBLIC.

  2. Only the creator is allowed to access the SAMPLE database.

  3. PUBLIC will hold only SELECT privilege on the system catalog views.

  4. The RESTRICT_ACCESS database configuration parameter must be setto YES by the creator.

Answer: A

Question No: 86 – (Topic 2)

Which DB2 product/feature should be used if you want to enable client reroute for transactions and connections based on workload?

  1. pureScale

  2. Advanced Server Edition

  3. Data Partitioning Feature

  4. Enterprise Server Edition

Answer: A

Question No: 87 – (Topic 2)

Which statement about primary keys is true?

  1. A table can have multiple primary keys.

  2. A primary key accepts one, and only one, NULL value.

  3. A unique index, with matching columns of the primary key, must be created before a primary key can be created.

  4. A unique bidirectional index is automatically created for the columns of the primary key, if an appropriate unique index does not already exist.

Answer: D

Question No: 88 – (Topic 2)

Which statement regarding compression for temporary tables is true?

  1. Temporary tables can only be compressed using adaptive compression.

  2. Temporary tables can only be compressed using classic row compression.

  3. Compression for temporary tables can be dynamically enabled and disabled.

  4. The DB2 optimizer automatically decides to use classic row compression or adaptive compression for temporary tables.

Answer: B

Question No: 89 – (Topic 2)

Which statement is correct when describing Range Clustered Tables (RCT) as compared to regular base tables that use at least one index?

  1. RCTs require less logging, less buffer pool space, and less maintenance.

  2. RCTs require more logging, less buffer pool space, and more maintenance.

  3. RCTs require less logging, more buffer pool space, and less maintenance.

  4. RCTs require more logging, more buffer pool space, and less maintenance.

Answer: A

Question No: 90 – (Topic 2)

What type of Label-Based Access Control (LBAC) security label component is used to define a scale in which the first element listed represents the highest level of trust a person can have and the last element listed represents the lowest level of trust a person can

have?

  1. Set

  2. Array

  3. Tree

  4. Range

Answer: B

100% Ensurepass Free Download!
Download Free Demo:C2090-611 Demo PDF
100% Ensurepass Free Guaranteed!
C2090-611 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.