[Free] 2018(Jan) Dumps4cert Braindumps IBM C2090-611 Dumps with VCE and PDF 51-60

By | February 2, 2018

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 Jan IBM Official New Released C2090-611
100% Free Download! 100% Pass Guaranteed!
http://www.Dumps4cert.com/C2090-611.html

DB2 10.1 DBA for Linux, UNIX, and Windows

Question No: 51 – (Topic 1)

What is the MAX_LOG database configuration parameter used for?

  1. To limit how many log files a single transaction can span.

  2. To limit the percentage of primary log space a runningtransaction can consume.

  3. To limit the total number of primary and secondary log files a database can consume.

  4. To limit the total number of secondary log files a transaction can consume before infinite logging is enabled.

Answer: B

Question No: 52 – (Topic 1)

Which statement is correct for a user who holds SECADM authority?

  1. A user who holds SECADM authority can only grant and revoke database object privileges.

  2. A user who holds SECADM authoritycan grant and revoke all database level authorities and database object privileges.

  3. A user who holds SECADM authority can only grant and revoke DBADM and SECADM database level authorities.

  4. A user who holds SECADM authority can only grant and revoke label based access control (LBAC) security labels.

Answer: B

Question No: 53 – (Topic 1)

Which statement about the db2pd tool is true?

  1. It may retrieve data that is not completely accurate.

  2. It collects information from the log buffer and active log files.

  3. It ensures that information is not retrieved on changing data.

  4. It collects information from the snapshot monitor and a predefined set of event monitors.

Answer: A

Question No: 54 – (Topic 1)

What authorization is needed to execute the CREATE MASK statement?

  1. SECADM

  2. SQLADM

  3. SYSADM

  4. SYSCTRL

Answer: A

Question No: 55 – (Topic 1)

If a single node database is actively being used by applications when a power failure occurs, what method is used to bring the database back to a consistent state once power has been restored?

  1. Crash recovery

  2. Version recovery

  3. Disaster recovery

  4. Roll-forward recovery

Answer: A

Question No: 56 – (Topic 1)

What does the FLUSH PACKAGE CACHE statement do?

  1. It removes all dynamic SQL statements from the package cache.

  2. It removes only inactive SQL statements from the package cache.

  3. It saves dynamic SQL stored in the package cache to an external file.

  4. It causes all SQL statements in the package cache that are currently in use to be recompiled.

Answer: A

Question No: 57 – (Topic 1)

If you are running DB2 in clustered environment, what utility should you use to get the status of cluster?

  1. db2istat

  2. db2clust

  3. db2haicu

  4. db2hastat

Answer: C

Question No: 58 – (Topic 1)

Which command will define the alternate diagnostic data directory path as

/db2data/db2dump2?

  1. db2set ALT_DIAGPATH=/db2data/db2dump2

  2. db2set SECONDARY_DIAGPATH=/db2data/db2dump2

  3. UPDATE DBM CFG USING ALT_DIAGPATH /db2data/db2dump2

  4. UPDATE DBM CFG USING SECONDARY_DIAGPATH /db2data/db2dump2

Answer: C

Question No: 59 – (Topic 1)

Which statement describes adaptive row compression?

  1. Adaptive compression allows for use of customized compression dictionary creation algorithms.

  2. Adaptive compression maintains a dynamic and ever changing table-level row

    compression dictionary.

  3. Adaptive compression incorporates both classic table-level row compression and page- by-page based row compression.

  4. Adaptive compression incorporates four compression approaches: tablespace-level, table-level, page-level, and bufferpool-level.

Answer: C

Topic 2, Volume B

Question No: 60 – (Topic 2)

Which statement aboutreferential constraints is true?

  1. A referential constraint can be defined against a catalog table.

  2. A referential constraint can be defined on both tables and views.

  3. A referential constraint is used to enforce a logical rule about values of one ormore columns in one or more tables.

  4. A referential constraint is used to enforce a logical rule about how values in one or more columns in a table should be referenced in a query.

Answer: C

100% Dumps4cert Free Download!
Download Free Demo:C2090-611 Demo PDF
100% Dumps4cert Free Guaranteed!
C2090-611 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.