Questions


1:

A DBA is coordinating a DB2 disaster recovery and wants DB2 to

- Consider the table spaces unavailable until the disaster recovery is complete

- Do the necessary log processing

Which of the following should the DBA use to accomplish this?

  1. Issue -START DB2 ACCESS(FORCE).

  2. Issue -START DB2 ACCESS(MAINT).

  3. Set DSNZPARM parameter DEFER ALL, and then issue -START DB2.

  4. Set DSNZPARM parameter RESTART ALL, and then issue -START DB2.

2:

The audit trace cannot capture information for which of the following actions?

  1. Access to catalog tables

  2. Denied-access attempts

  3. Explicit GRANTs and REVOKEs

  4. Start of a utility job

3:

A database administrator needs the ability to create an object in a buffer pool (BP1). Which GRANT statement would provide the necessary privilege to perform this action?

  1. GRANT BUFFERPOOL1 USAGE TO authorization-id

  2. GRANT EXECUTE ON BUFFERPOOL TO authorization-id

  3. GRANT USE OF BUFFERPOOL BP1 TO authorization-id

  4. GRANT CREATIN BUFFERPOOL BP1 TO authorization-id

4:

Which of the following statements about the INCURSOR option of the LOAD utility is false?

  1. The INCURSOR option can be specified with the SHRLEVEL CHANGE option.

  2. The cursor must be defined before it is used by the LOAD utility.

  3. The specified cursor can be used with the DB2 UDB cross-loader function.

  4. Data cannot be loaded into the same table on which the cursor is defined.

5:

To verify the integrity of DB2 directory and catalog table spaces and to scan for broken links, which of the following should be run?

  1. DSNJU004

  2. DSN1CHKR

  3. DSN1LOGP

  4. CHECK INDEX

6:

If materialization has occurred for an SQL statement, which of the following will the PLAN_TABLE show?

  1. The view or nested table expression name and TABLE_TYPE of 'W'

  2. Only query blocks with the base table names and TABLE_TYPE of 'M'

  3. The base table name and TABLE_TYPE of 'W'

  4. An entry with TABLE_TYPE of 'M'

7:

To allow the image copy of an index to be used by the RECOVER utility, which of the following procedures should not be performed?

  1. Prepare and test incremental image copy jobs.

  2. Prepare and test full image copy jobs.

  3. Prepare and test recovery jobs.

  4. Create or alter the index with the COPY YES option.

8:

The statement CREATE LOB TABLESPACE ts1 creates a table space in which database?

  1. DSNLOB

  2. DSNDB01

  3. DSNDB04

  4. DSNDB06

9:

The results of the command -DISPLAY UTILITY(*) will provide all the following information except

  1. Type of utilities running

  2. Status of the utility jobs

  3. Estimated elapsed time of completion for the utility jobs

  4. Estimate of how much processing has completed for the utility jobs

10:

Compression dictionary memory is allocated within which of the following?

  1. BP0

  2. EDM pool

  3. MSTR address space

  4. DBM1 address space

11:

DB2 automatically converts to table-controlled partitioning in all the following conditions except

  1. Altering the table to add a new partition

  2. Altering the table space to specify NUMPARTS option

  3. Altering the table to rotate a partition from first to last

  4. Dropping the table space index that is defined with PART VALUES

12:

When the command DISPLAY DATABASE ADVISORY is used without the RESTRICT option, which of the following cannot be determined?

  1. A table space of a base table is in CHECK-pending (CHKP) status.

  2. A LOB table space is in auxiliary warning (AUXW) status.

  3. An index space is in the REBUILD-pending (ARBDP) status.

  4. An index space is in the informational COPY-pending (ICOPY) status.

13:

Which of the following applies to an identity column but not to a sequence object?

  1. Can be restarted

  2. Can be a decimal or an integer

  3. Is associated with a user table

  4. Is used to generate sequence values

14:

Which of the following is a main performance advantage of multirow INSERT of non-LOB data in a client/server environment?

  1. There is only one network flow from the client to the server.

  2. The data is inserted onto only one data page, so only one I/O needs to occur.

  3. Only one log record is cut, because multiple data rows are inserted as a single block.

  4. The data is inserted directly from the communication buffer to the data page in one move.

15:

If the following SQL EXEC SQL UPDATE T1 SET C1 = C1 +1; is executed, which of the following GET DIAGNOSTICS statements could be used to determine how many rows were updated?

  1. EXEC SQL GET DIAGNOSTICS :rcount = ROW_COUNT;

  2. EXEC SQL GET DIAGNOSTICS :rcount = SQLERRD;

  3. EXEC SQL GET DIAGNOSTICS :rcount = NUMBER;

  4. EXEC SQL GET DIAGNOSTICS :rcount = DB2_ROW_COUNT;

16:

Which of the following is true regarding the recovery of the DB2 catalog and directory?

  1. All objects that are related to SYSUTILX can be recovered in parallel.

  2. All catalog and directory objects can be recovered in parallel.

  3. All catalog and directory objects can be recovered in a single job step.

  4. The catalog and directory objects after SYSDBASE can be recovered in parallel.

17:

A materialized query table (MQT) is defined with the MAINTAINED BY SYSTEM option. Which of the following can be used to populate the MQT?

  1. INSERT

  2. LOAD RESUME

  3. REPLACE TABLE

  4. REFRESH TABLE

18:

When trying to determine whether a reorganization of an index is necessary, which of the following would not be of use to you?

  1. SYSIBM.SYSINDEXPART column LEAFDIST

  2. SYSIBM.SYSINDEXES column CLUSTERING

  3. SYSIBM.SYSINDEXES column CLUSTERRATIOF

  4. SYSIBM.SYSINDEXPART columns LEAFNEAR and LEAFFAR

19:

Which of the following REORG parameters will greatly reduce the elapsed time of the utility phase that alternates application usage from the original data sets to the shadow data sets of a 12-partition table space?

  1. LOG NO

  2. SORTKEYS 12

  3. KEEPDICTIONARY

  4. FASTSWITCH YES

20:

Data in a DB2 table is stored in VSAM data sets. How can sensitive DB2 data in these VSAM data sets be protected from unauthorized user access outside of DB2?

  1. Encode the data in the DB2 tables, using compression.

  2. Encrypt the data by using DB2 edit procedures or field procedures.

  3. Use RACF profiles and permits, or their equivalents, for the data sets.

  4. Use DB2 GRANT and REVOKE statements to allow certain DB2 users access to the data.

21:

The table columns CITY and STATE are used in a compound SQL WHERE clause. The optimizer might incorrectly estimate the number of qualifying rows in the table if

  1. Correlation statistics are not collected

  2. The columns are defined as variable character

  3. These columns form a composite partitioning key

  4. A single index, which contains both columns, is created

22:

After altering a check constraint on a table, which of the following utilities should you run before the table can be used?

  1. CHECK LOB

  2. CHECK DATA

  3. CHECK INDEX

  4. CHECK CONSTRAINT

23:

In the plan table, METHOD = 2 signifies

  1. Star join

  2. Hybrid join

  3. Merge-scan join

  4. Nested-oop join

24:

Which of the following is the most important factor to consider when choosing the clustering index?

  1. Random data access

  2. Sequential data access

  3. How the data is partitioned

  4. How many partitions are defined for the table space

25:

Which of the following REORG utility options can be used to determine whether a table space needs to be reorganized?

  1. REBALANCE

  2. REPORTONLY

  3. RUNSTATSONLY

  4. STATISTICS

26:

The command -DIS DB(DBTST1A) SPACE(*) RESTRICT LIMIT(*) is issued; the output shows that index space IX1 has the following status: RW,RBDP. Based on the status information, which of the following is not true about the scope of unavailability for dynamic SQL?

  1. Deletes are allowed for the table rows.

  2. Queries are allowed for the table, but DB2 does not choose an index in RBDP for an access path.

  3. Updates and inserts are allowed for table rows, even if their corresponding non-unique indexes are in RBDP status.

  4. Updates and inserts are allowed for table rows, causing DB2 to insert keys into a unique index that is in RBDP status.

27:

At a conceptual level, an "entity" on a logical model will often map to which DB2 object?

  1. Index

  2. Table

  3. Column

  4. Database

28:

Which of the following does the PAGE_RANGE column of the PLAN_TABLE indicate?

  1. Access that is limited to a subset of the table or index partitions

  2. The start and stop range for a matching index scan

  3. Index screening that has occurred for the query

  4. The range of pages for each parallelism group

29:

The PAYROLL table is defined with AUDIT ALL. A TSO user has user ID DBA007, with primary authorization ID JONES and secondary authorization ID PAYGROUP. This user updates a row in the PAYROLL TABLE after issuing a SET CURRENT SQLID = 'DBA007'. In this situation, what authorization ID is used in a DB2 audit trace record?

  1. JONES

  2. DBA007

  3. PAYGROUP

  4. DISTSERV

30:

When you are defining a primary key and before the table is usable, which of the following must be created?

  1. A unique index, using the primary-key columns

  2. A duplicate index, using the primary-key columns

  3. A clustering index, using the primary-key columns

  4. A partitioning index, using the primary-key columns

31:

Which of the following is not considered an essential disaster-recovery element?

  1. Archive logs

  2. DB2 load and exit libraries

  3. Recent image copies of all database objects

  4. REPORT RECOVERY utility output for all objects

32:

Which of the following is true when you are preparing to do a system-level point-in-time recovery to an arbitrary point in time?

  1. The SET LOG SUSPEND command is required prior to executing a BACKUP SYSTEM FULL.

  2. To restore the DB2 system to an arbitrary point in time, a BACKUP SYSTEM FULL utility is required.

  3. To restore the DB2 system to the point in time of a prior system-level backup, a cold start is required.

  4. To restore the DB2 system to an arbitrary point in time, running a BACKUP SYSTEM DATA ONLY is sufficient.

33:

Which of the following single-table predicates is considered stage 1?

  1. CASE expressions

  2. COL NOT EQUAL value

  3. COL NOT IN (correlated subquery)

  4. COL NOT EQUAL (correlated subquery)

34:

Which of the following ALTER statements could necessitate an application program modification?

  1. ALTER TABLE PROD.EMPLOYEE PRIMARY KEY(LAST_NAME)

  2. ALTER TABLE PROD.EMPLOYEE ALTER COLUMN LAST_NAME CHAR(45)

  3. ALTER TABLE PROD.EMPLOYEE ADD PART 15 VALUES("2004-01-19")

  4. ALTER TABLE PROD.EMPLOYEE ADD MATERIALIZED QUERY (fullselect)

35:

What type of cursor can take advantage of block fetching in a distributed environment to reduce the number of messages sent across the network?

  1. Cursors that update data

  2. Cursors that delete data

  3. Cursors that are defined FOR UPDATE OF

  4. Cursors that do not update or delete data

36:

A subsystem has been successfully converted to version 8. Which of the following would result if the -DISPLAY GROUP DETAIL command were run and it reported a mode of E?

  1. The system is in enable new-function mode.

  2. The catalog and directory are in Unicode and can accept long names.

  3. The catalog and directory are in Unicode and can accept long names; new V8 functions are available.

  4. The catalog and directory are in Unicode and can accept long names; data has been converted to Unicode.

37:

Which two of the following are design considerations for the version 8 Data Partitioned Secondary Indexes (DPSI)?

  1. The DPSI indexes are defined as nonunique.

  2. The DPSI index requires its own storage group.

  3. The DPSI index can be defined for a single partition.

  4. The DPSI index helps eliminate BUILD2 phase utility processing.

  5. The DPSI index cannot be used with a partitioning or type 2 index in an access path.

38:

Which of the following statements is false when the command STOP DB2 MODE(QUIESCE) is entered?

  1. There are no pending writes.

  2. There are no outstanding units of recovery.

  3. DB2 does not need to access the data sets on restart through the log.

  4. DB2 does not allow currently executing programs to complete processing.

39:

Which of the following keywords would be used to collect frequency distribution statistics on nonindexed columns?

  1. KEYCARD only

  2. FREQVAL only

  3. KEYCARD and FREQVAL

  4. COLGROUP and FREQVAL

40:

Which of the following data types allows for direct row access (PRIMARY_ACCESSTYPE=D)?

  1. ROWID

  2. INTEGER

  3. SMALLINT

  4. IDENTITY

41:

The design requirement for the TRANS table is to divide the data into 13 partitions, each of which contains one month of data that is partitioned on the transaction date. The user normally accesses the transaction table through the customer account column. The design needs to support a critical requirement for availability on the trANS table and to allow the DBA to run a SHRLEVEL NONE REORG job at the partition level, with minimal disruption to data availability. To facilitate reorganization, which of the following would best satisfy the design requirements?

  1. Create a partitioning index on the transaction date and a secondary index on the customer account.

  2. Create a single partitioning, clustering index on the combined transaction date and customer account columns.

  3. Create a table-controlled partitioned table that partitions on the transaction date. Also, create a partitioned clustering index on the customer account.

  4. Create a table-controlled partitioned table that partitions on the transaction date. Also, create a partitioning index on the combined columns transaction date and customer account.

42:

If a secondary authorization ID has been established for the DBA group DBAGRP, how can it be used to qualify unqualified objects in an SQL statement?

  1. SET CURRENT PATH = 'DBAGRP'

  2. SET CURRENT SQLID = 'DBAGRP'

  3. SET CURRENT AUTHID = 'DBAGRP'

  4. SET CURRENT USERID = 'DBAGRP'

43:

A DB2 data sharing group consists of two members: DSN1 and DSN2 on z/OS logical partitions zOS1 and zOS2, respectively. zOS1 has an unplanned outage, causing member DSN1 to fail. Now applications running on DSN2 cannot access some of the DB2 data, owing to retained locks that are held by member DSN1. Which of the following will get these retained locks resolved as quickly as possible to allow access to all the application data?

  1. Restart DB2 for member DSN1 on zOS1.

  2. Restart DB2 for member DSN1 on zOS2, using the ACCESS MAINT mode.

  3. Restart DB2 for member DSN1 on zOS2, using the restart-light mode.

  4. Recycle DSN2 and perform a group restart on zOS2 for both members DSN1 and DSN2.

44:

Which of the following statements about the RESTORE SYSTEM utility is true?

  1. Terminate the RESTORE SYSTEM utility by using the TERM UTILITY command.

  2. The RESTORE SYSTEM utility can be run from any member in a data sharing group.

  3. The RESTORE SYSTEM utility restores the logs from the log copy pool and the data from the database copy pool.

  4. If specified, a particular backup version can be used by the RESTORE SYSTEM utility.

45:

Which of the following statistics trace classes provides information about deadlocks and timeouts?

  1. Class 1

  2. Class 3

  3. Class 4

  4. Class 5

46:

Which of the following DB2 traces could be used by the DBA to assign DB2 costs to individual authorization IDs?

  1. Lock trace

  2. Audit trace

  3. Statistics trace

  4. Accounting trace

47:

If overall system performance is slow, analysis should begin with which of the following?

  1. Monitoring buffer pool hit ratios

  2. Identifying poorly performing SQL statements

  3. Locating problems at the z/OS level, using RMF

  4. Collecting trace data, using DB2 accounting classes 1, 2, 3, 7, and 8

48:

Which SQL clause provides the necessary privilege to create an object using the volumes VOL1 and VOL2 that are defined to storage group STOGRP1?

  1. USE OF STOGROUP STOGRP1

  2. USE OF VOLUMES (VOL1, VOL2)

  3. CREATE IN STOGROUP STOGRP1

  4. CREATE USING VOLUMES (VOL1, VOL2)

49:

When a CREATE INDEX statement specifies the NOT PADDED clause, which of the following statements is false?

  1. DB2 can use index-only access for the varying-length columns within the index key.

  2. DB2 does not pad any varying-length columns in the index key to their maximum lengths.

  3. Index-key comparisons are faster because DB2 compares pairs of corresponding varying-length columns as the entire key.

  4. Storage requirements for the index key can be reduced because DB2 stores only a 2-byte-length field along with the data.

50:

In a WHERE clause, why are Boolean term predicates often preferred over non-Boolean term predicates?

  1. Non-Boolean term predicates are stage 2 predicates.

  2. The optimizer does not use default filter factors for Boolean term predicates.

  3. Non-Boolean term predicates can be coded only in a query containing inner joins.

  4. Only Boolean term predicates can use matching index access on a single index.

51:

Which of the following parameter settings would allow the buffer pool to contain 20 percent random pages?

  1. VPSEQT = 80

  2. VPSIZE = 20

  3. VPRAND = 20

  4. VPSTEAL = FIFO

52:

Which of the following statements is true when adding a check constraint to a table that is not empty?

  1. The constraint is enforced immediately when it is defined.

  2. The constraint is added to the table description, but its enforcement is deferred until the next bind.

  3. The constraint is enforced or deferred, depending on the contents of the CURRENT PATH special register.

  4. The constraint is enforced or deferred, depending on the contents of the CURRENT RULES special register.

53:

Which of the following will happen when a primary key is dropped by using the DROP PRIMARY KEY clause of the ALTER TABLE?

  1. The dependent tables no longer have foreign keys.

  2. The dependent tables are placed in a CHECK-pending restricted status.

  3. The table is placed in a CHECK-pending restricted status.

  4. The table's primary index is no longer a unique index.

54:

Which of the following is true if the ALTER INDEX CLUSTER statement is used to change an index to be the clustering index for a table?

  1. A table can have multiple clustering indexes.

  2. New data inserted into the table is not placed in clustering order.

  3. Preexisting data rows are immediately put into the new clustering order.

  4. A table must be reorganized to put existing data rows into clustering order.

55:

Which of the following is an invalid WLM command to perform an operation against the application environment?

  1. VARY WLM,APPLENV=name,RESUME

  2. VARY WLM,APPLENV=name,RESTART

  3. VARY WLM,APPLENV=name,QUIESCE

  4. VARY WLM,APPLENV=name,REFRESH

56:

A DBA wants to check the health of the DB2 catalog or directory. Which of the following utilities should the DBA not use?

  1. REPAIR

  2. REPORT

  3. DSN1COPY

  4. DSN1CHKR

57:

Which of the following statements about declared temporary tables is false?

  1. Can have an index

  2. Qualified by SESSION

  3. Materialized in DSNDB07

  4. Not recorded in the catalog

58:

Table space DB1.TS1 has pages in the LPL. Which of the following can be used to start the recovery of the object?

  1. -STA DB(DB1)

  2. -STA FUNCTION SPECIFIC

  3. -STA DB(DB1) SPACENAM(TS1) ACCESS(RW)

  4. -STA DB(DB1) SPACENAM(TS1) ACCESS(FORCE)

59:

Which of the following utilities can be used to help reduce DB2 I/O?

  1. REPORT

  2. RECOVER

  3. RUNSTATS

  4. STOSPACE

60:

Which of the following most accurately describes the default buffer pool for a user-defined INDEX?

  1. BPO

  2. DSNDB04

  3. TBSBPOOL

  4. IDXBPOOL

61:

In referencing a 4,096-partition table space, when would a DBA create an NPSI instead of a DPSI?

  1. If there is a lot of contention when running utilities

  2. When the ability to rotate partitions is needed

  3. When predicates do not exist to allow page range screening

  4. When partitioned data is accessed randomly the majority of the time



DB2 for z. OS Version 8 DBA Certification Guide
DB2 for z/OS Version 8 DBA Certification Guide
ISBN: 0131491202
EAN: 2147483647
Year: 2003
Pages: 175
Authors: Susan Lawson

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net