質問 1:What are two types of security label components that can be used with Label-Based Access Control (LBAC)? (Choose two).
A. Hierarchy
B. Range
C. Tree
D. Group
E. Set
正解:C,E
質問 2:Which statement about Binary XML is FALSE?
A. Binary XML data refers to data that is in the XDBX format.
B. Binary XML format is only used for data transmission.
C. The binary format provides a faster way to transmit and receive XML data.
D. Only textual XML data format is supported by Binary XML.
正解:D
質問 3:Which statement about BEFORE triggers is FALSE?
A. A BEFORE trigger's action is executed for each row in the set of affected rows before the trigger event executes.
B. A BEFORE trigger's action is executed for each row in the set of affected rows instead of executing the trigger event.
C. A BEFORE trigger is used to perform validation of input data and to automatically generate values for newly inserted rows.
D. A BEFORE trigger cannot be used to modify data in a database because they are activated before the trigger event is applied to the database.
正解:B
質問 4:Which type of table space can be associated with only one storage group?
A. Database managed space (DMS) File
B. System managed space (SMS)
C. Automatic storage space (AS)
D. Database managed space (DMS) Device
正解:C
質問 5:A table named SALES was created as follows:
If management wants to use Label-Based Access Control (LBAC) to protect individual columns in the SALES table, and the security policy needed (SEC_POLICY) has already been created, what must be done to protect the table as desired?
A. Add a SECURED WITH clause to every column in the SALES table and then associate the SEC_POLICY security policy with the SALES table.
B. Associate the SEC_POLICY security policy with the SALES table.
C. Add a SECURED WITH clause to every column in the SALES table.
D. Add a column with the DB2SECURITYLABEL data type to the SALES table and then associate the SEC_POLICY security policy with the table.
正解:A
質問 6:Which system command can be used to locate and return only ADM4500W messages from the DB2 diagnostics log file?
A. db2trace
B. db2fmtdiag
C. db2pd
D. db2diag
正解:D
質問 7:The following commands are executed against a database named MY_DB, which has been configured to use archival logging:
Which statement is true?
A. Upon completion of the Load, the table T1 is placed into "Backup Pending" state.
B. After a Restore and Rollforward operation, table T1 would be marked unavailable and can only be dropped.
C. Upon completion of the Load, a backup image of table T1 is automatically generated.
D. After a Restore and Rollforward operation, the loaded data is stored into a copy-image file and table T1 is fully available.
正解:B
質問 8:Which statement about the ADMIN_MOVE_TABLE procedure is true?
A. If the ADMIN_MOVE_TABLE procedure is used to move data in an active (source) table to a target table that was created beforehand, thetarget table is renamed (to the source table name) once the data has been copied into the target table.
B. The ADMIN_MOVE_TABLE procedure immediately applies all changes that occur to data in the active (source) table during the move operationto the target table.
C. If the ADMIN_MOVE_TABLE procedure is invoked with the KEEP option specified, the active (source) table will be kept and if the target table isto be created automatically, a name that is different from that of the active table must be specified for the target table.
D. The ADMIN_MOVE_TABLE procedure stores all changes that occur to data in the active (source) table during the move to a user-suppliedstaging table so they can be replayed against the target table when the move is complete.
正解:A
質問 9:When the ALTER TABLE DETACH operation is used to detach a single data partition from a partitioned table, at what point does the newly detached data partition become accessible as a standalone table?
A. Immediately after asynchronous partition detach processing completes for this data partition.
B. After a SET INTEGRITY statement is executed.
C. Immediately after the ALTER TABLE DETACH statement is executed.
D. After a truncate table operation is performed in the background.
正解:A
弊社のIBM C2090-611を利用すれば試験に合格できます
弊社のIBM C2090-611は専門家たちが長年の経験を通して最新のシラバスに従って研究し出した勉強資料です。弊社はC2090-611問題集の質問と答えが間違いないのを保証いたします。
この問題集は過去のデータから分析して作成されて、カバー率が高くて、受験者としてのあなたを助けて時間とお金を節約して試験に合格する通過率を高めます。我々の問題集は的中率が高くて、100%の合格率を保証します。我々の高質量のIBM C2090-611を利用すれば、君は一回で試験に合格できます。
弊社は失敗したら全額で返金することを承諾します
我々は弊社のC2090-611問題集に自信を持っていますから、試験に失敗したら返金する承諾をします。我々のIBM C2090-611を利用して君は試験に合格できると信じています。もし試験に失敗したら、我々は君の支払ったお金を君に全額で返して、君の試験の失敗する経済損失を減少します。
TopExamは君にC2090-611の問題集を提供して、あなたの試験への復習にヘルプを提供して、君に難しい専門知識を楽に勉強させます。TopExamは君の試験への合格を期待しています。
一年間の無料更新サービスを提供します
君が弊社のIBM C2090-611をご購入になってから、我々の承諾する一年間の更新サービスが無料で得られています。弊社の専門家たちは毎日更新状態を検査していますから、この一年間、更新されたら、弊社は更新されたIBM C2090-611をお客様のメールアドレスにお送りいたします。だから、お客様はいつもタイムリーに更新の通知を受けることができます。我々は購入した一年間でお客様がずっと最新版のIBM C2090-611を持っていることを保証します。
弊社は無料IBM C2090-611サンプルを提供します
お客様は問題集を購入する時、問題集の質量を心配するかもしれませんが、我々はこのことを解決するために、お客様に無料C2090-611サンプルを提供いたします。そうすると、お客様は購入する前にサンプルをダウンロードしてやってみることができます。君はこのC2090-611問題集は自分に適するかどうか判断して購入を決めることができます。
C2090-611試験ツール:あなたの訓練に便利をもたらすために、あなたは自分のペースによって複数のパソコンで設置できます。
安全的な支払方式を利用しています
Credit Cardは今まで全世界の一番安全の支払方式です。少数の手続きの費用かかる必要がありますとはいえ、保障があります。お客様の利益を保障するために、弊社のC2090-611問題集は全部Credit Cardで支払われることができます。
領収書について:社名入りの領収書が必要な場合、メールで社名に記入していただき送信してください。弊社はPDF版の領収書を提供いたします。
IBM DB2 10.1 DBA for Linux, UNIX, and Windows 認定 C2090-611 試験問題:
1. If the following statement is executed:
What indexes will be created for table TAB1?
A) 1 dimension-block index and 3 composite-block indexes
B) 3 dimension-block indexes and 1 composite-block index
C) 3 dimension-block indexes and 3 composite-block indexes
D) 1 dimension-block index and 1 composite-block index
2. Which action can a DBA take to retrieve bufferpool metrics information?
A) Ensure the MON_ACT_METRICS configuration parameter is enabled and query the MON_GET_BUFFERPOOL administrative view.
B) Ensure the MON_OBJ_METRICS configuration parameter is enabled and query the MON_GET_BUFFERPOOL table function.
C) Ensure the MON_ACT_METRICS configuration parameter is enabled and query the BP_HITRATIO administrative view.
D) Ensure the MON_OBJ_METRICS configuration parameter is enabled and query the BP_HITRATIO table function.
3. A table named SALES was created as follows:
If management wants to use Label-Based Access Control (LBAC) to protect individual columns in the SALES table, and the security policy needed (SEC_POLICY) has already been created, what must be done to protect the table as desired?
A) Add a SECURED WITH clause to every column in the SALES table and then associate the SEC_POLICY security policy with the SALES table.
B) Associate the SEC_POLICY security policy with the SALES table.
C) Add a SECURED WITH clause to every column in the SALES table.
D) Add a column with the DB2SECURITYLABEL data type to the SALES table and then associate the SEC_POLICY security policy with the table.
4. What information can be obtained by analyzing EXPLAIN data?
A) Access type, index use, and work load
B) Work load, access type, and join methods
C) Join methods, index use, and access type
D) Index use, work load, and join methods
5. The following commands are executed against a database named MY_DB, which has been configured to use archival logging:
Which statement is true?
A) Upon completion of the Load, the table T1 is placed into "Backup Pending" state.
B) After a Restore and Rollforward operation, table T1 would be marked unavailable and can only be dropped.
C) Upon completion of the Load, a backup image of table T1 is automatically generated.
D) After a Restore and Rollforward operation, the loaded data is stored into a copy-image file and table T1 is fully available.
質問と回答:
質問 # 1 正解: B | 質問 # 2 正解: B | 質問 # 3 正解: A | 質問 # 4 正解: C | 質問 # 5 正解: B |