Elance DB2 Administrator Test Answers 2015
·
What is a federated database?
A federated database is a system including a DB2
DBMS (federated database) and one or more data sources.
A federated database is a database that uses a Java
wrapper.
A federated database is a database that is totally
isolated.
A federated database is a database that exists on a
cloud network.
Given the following code: EXEC SQL EXECUTE
IMMEDIATE: sqlstmt Which of the following values must sqlstmt contain so that
all rows are deleted from the STAFF table?
DROP TABLE staff
DROP * FROM staff
DELETE FROM staff
DELETE * FROM staff
A DBA wishes to audit all access to the
non-audited table OWNER.Smartemp. Assuming no audit traces are started, which
of the following steps are needed to audit access to this table?
- -START TRACE AUDIT CLASS (5)
- -START TRACE AUDIT CLASS (4,5)
- -START TRACE AUDIT CLASS (4,5) and ALTER TABLE
OWNER.Smartemp AUDIT ALL
- -START TRACE AUDIT CLASS (4,5) and ALTER TABLE
OWNER.Smartemp DATA
Which two of the following types of storage
management methods are supported by DB2 OLAP Server?
Multi Dimensional
Relational
Both Hierarchical and Network
Hierarchical
On the client side, what is linked with the
DB2 Universal Database client library?
The network.
Local or remote applications, or both.
Remote applications only.
Local applications only.
What is an example of an environmental
consideration in DB2 administration?
Federated databases being detected.
Federated databases being affected by server
options.
Federated databases being shut down.
Federated databases being affected by the user.
Which of the following are fields from SQLCA
(All of these)
SQLCODE
SQLERRD
SQLERRM
When would phantom read phenomenon occur?
When another application reads data that is
entered.
When the system starts producing data without user
imput.
When another application inserts new data or
updates existing data that would satisfy your application's query.
When another application is running concurrently
with DB2.
If you wish to update your statistics after a
change in your database, what utility can be executed?
UPSTATS
NEWSTATS
RUNSTATS
GOSTATS
Which of the following is required to use the
IMPORT utility to import data into a table?
ALTER privilege on the table
INSERT privilege on the table
LOAD authority on the table
SYSCTRL authority
What is the primary focus of performance
tuning, and how should performance tuning should take place?
Speed, and daily
Efficiency, and incrementally.
Performance, and yearly.
Security, and hourly.
Which of the following is a parameter that
would specify the maximum size of a memory segment?
dbheapdb
bdheap
heapdb
dbheap
What is an example of an instance when the
database manager would allocate memory?
When the database is being compiled.
When the database is idle.
When hardware is being installed.
When an application connects to the database.
Why would you want to specify an optimization
class when compiling an SQL query?
So the optimizer chooses the most efficient access
plan for that query.
So the optimizer chooses the slowest access plan
for that query.
So the organizer chooses the fastest access plan
for that query.
So that Optimus Prime chooses the slowest access
plan for that query.
When working with concurrency controls, what
happens when the number of locks held on rows and tables is equal to the
percentage of the locklist specified by maxlocks?
Row escalation.
Lock escalation.
Table escalation.
Lock reduction.
When is it best to tune your system?
Every day.
When the system is down.
Quarterly.
When you have identified the constraints needed to
be relieved.
What is the benefit of prefetching data?
It holds all the data in the memory.
It holds frequently accessed data in memory.
It automatically compiles SQL statements for you.
It automatically writes stored procedures for you.
I have 5 SQL Select statements connected by a
Union/Union All. How many times should I have to specificy union to eliminate
duplicate rows?
3 times
5 times
Once
4 times
REORG is a function that organizes data on
physical storage to recluster rows, positioning overflowed rows to reclaim
space and to free up space. When is it used?
After deletes
(All of these)
After segments of a tablespaces have become
fragmented
After heavy updates and inserts
Given the code: EXEC SQL DECLARE cursor1
CURSOR FOR SELECT name, age, b_date FROM person; EXEC SQL OPEN cursor1; Under
which of the following situations will the above cursor be implicitly closed?
When a COMMIT statement is issued
When there are no rows in the result set
When an OPEN Statement is issued
When a CLOSE statement is issued
Why is the deadlock detector an important part
of DB2 architecture?
When a computational stalemate occurs, an external
application is necessary to shut down the system.
When a computational stalemate occurs, an external
application is necessary to maintain the deadlock.
When a computational stalemate occurs, an external
application is necessary to break the deadlock.
It tells the users how safe the system is.
What is a DB2 IMAGECOPY
It's a full backup of a table which can be used in
recovery
It's a full backup of a table which may or may not
be able to be used in recovery
It's a partial backup of a table (depending on
certain criteria) which can be used in recovery
It's a partial backup of a table (depending on
certain criteria) which cannot be used in recovery
Is the autorestart parameter configurable
on-line?
Yes, but it must be turned off first.
Yes.
Yes, but it must be off-line first.
Why is a primary key needed on a table?
To ensure referential integrity between tables
To support duplicate values
To support table check constraints
To provide free space on each index page for new
data
After entering a query, what is the first step
the SQL compiler takes?
Check its semantics.
Generate remote SQL.
Parsing the query.
Rewrite the query.
Which of the following DB2 objects allows multiple
users to access data in a table with each user only being able to access
certain portions of the data?
View
Summary Table
Table Constraint
Dimension Table
Which of the following must be set to restrict
clients from being able to discover any DB2 instances on a server?
DB2 Administration Server configuration parameter
SEARCH to DISABLE
DISCOVER_DB parameter to DISABLE
DISCOVER_INST parameter to DISABLE on a DB2
instance
DB2 Administration Server configuration parameter
DISCOVER to DISABLE
What are EDUs responsible for?
EDUs act as a compiler to use SQL.
EDUs process SQL.
EDUs process the security functions to use SQL.
EDUs process most of the SQL processing for applications.
What calculation can you use to estimate your
overhead cost?
Average seek time in minutes + (0.5 * relational
latency)
Average seek time in minutes + (0.5 * rotational
latency)
Average seek time in miliseconds + (0.5 *
rotational latency)
Total seek time in miliseconds + (0.5 * rotational
latency)
Under what context is pushdown analysis
utilized?
Use with the standard database.
Use with an encrypted database.
Use with a federated database.
Use with a large database.
When writing a query with a primary key, how
would the DISTINCT clause be applied?
It would not be applied. The DISTINCT clause is
redundant.
It would be applied to locked threads.
It would be applied to primary keys.
It would be applied to redundant SQL statements.
At which of the following times is the access
control authorization routine (DSNX@XAC) invoked?
At DB2 startup
When executing a DB2 GRANT statement
When DB2 has cached authorization information
During any authorization check if NO was specified
in the USE PROTECTION field of the DSNTIPP panel
In a UNIX-based environment, where would the
database manager configuration file be found?
The sqldb2 subdirectory.
The sqllib subdirectory.
The sqletc subdirectory.
The t-sqllib subdirectory.
Why would you need to execute RUNSTATS
regularly when using the SQL compiler?
Executing RUNSTATS provides the most current data
which is used by the optimizer to create an effective access plan.
Executing RUNSTATS optimizes the data in the right
order so the compiler can send it to the optimizer.
Executing RUNSTATS optimizes the compiler so the
updater can encode SQL statements sequentially.
Executing RUNSTATS updates the optimizer so it can
compile the data properly.
Which two of the following identify which
users have SYSCTRL authority?
The database manager configuration
The database configuration
D&E
The operating system security
Is the parameter, “database_memory” configured
automatically?
Yes.
Only partially. The rest of it has to be
partitioned correctly.
Yes, however the settings need to be configured
manually.
Yes, however part of it is left to manual
configuration for security reasons.
What does it mean if the the null indicator =
-2
The field has spaces
The field value is truncated
The field has blanks
The field is null
Which of the following can be changed with an
ALTER statement
Constraint
Tablespace
Index
If an object is created statically by a role
within a trusted context and the ROLE AS OBJECT OWNER clause is specified, who
becomes the object owner when executing the package?
The current SQLID (If set)
The schema name
The owner keyword
The role
What condition would lead to distribution
statistics not being collected?
Unique data values.
Equal data values.
Consecutive data values.
Excessive data values.
To prepare an embedded SQL program for use
with a host-language compiler, which of the following database components is
required?
Binder
Stored Procedure Builder
Precompiler
Application Development Center
What is the parameter to configure the default
database path?
dftdbpath
dftdb
dbpath
dftdbpdb
Which of the following tools can be used to
edit related backup tasks created in the Task Center
Journal
Development Center
Command Center
Operations Center
Which of the following actions will occur when
issuing the command FORCE APPLICATION ALL?
Uncommitted units of work are rolled back
No new database connections are allowed
Disconnect warning messages are sent to connected
users
Uncommitted units of work are committed
What two types of configuration files does DB2
use?
Database manager compression files, and database
compression files for the database itself.
Database log files, and database configuration
files for the database itself.
Database cache configuration files, and database
master files for the database itself.
Database manager configuration files, and database
configuration files for the database itself.
DB2 Enterprise Server Edition (ESE) is running
on Linux and needs to validate the userids and passwords on the z/OS server for
the DB2 clients connecting to DB2 for z/OS. Which of the following authentication
levels satisfies this while providing authentication for other DB2 clients at
the DB2 ESE server?
HOST
DRDA
DCS
CLIENT
What object types is the lock mode S (Share)
applicable to?
Rows, blocks, and tuples.
Rows, blocks, and units.
Rows, blocks, and tables.
Rows, blocks, and blips.
What should be considered when specifying an
optimization level?
A query's use of logical or dynamic SQL.
A query's use of active or passive SQL.
A query's use of static or dynamic SQL.
A query's use of PL/SQL or T-SQL.
What is one way that a query might be
rewritten?
Operation cloning.
Operation compiling.
Operation churning.
Operation merging.
A DBA needs to use the DSN command processor
to delete DB2 packages that are no longer needed. Which of the following
choices is correct for the DBA to use?
FREE Package (<collid>.<name of
package>.<version id>)
SPUFI or QMF with the DROP statement
DROP PLAN (<plan name>) PKLIST
(<collid>.<name of a particular package>.<version id>)
DROP Package (<collid>.<name of
package>.<version id>)
What is intra-partition parallelism?
A technique that utilizes multiple databases to
scan an index, or hard disk.
A technique that utilizes multiple subagents to
scan an index, or table.
A technique that utilizes multiple subagents to
scan an index, or table.
A technique that partitions multiple subagents to
format an index, or table.
Which of the following is an important step in
developing a performance-improvement process?
Make one adjustment at a time.
Make all adjustments in step.
Don't adjust the system's performance.
Plan all of your adjustments and do them in one
step.
Which of the following is correct about the
EXPLAIN statement
EXPLAIN is used to display the access path as
determined by the optimizer for a SQL statement. It can be used in SPUFI (for
single SQL statement) or in BIND step (for embedded SQL)
EXPLAIN is used to display the access path as
determined by the optimizer for a SQL statement. It cannot be used in SPUFI
(for single SQL statement) or in BIND step (for embedded SQL
EXPLAIN is used to display the access path as
determined by the optimizer for a SQL statement. It can be used in SPUFI (for
single SQL statement) but not in the BIND step
EXPLAIN is used to execute a SQL statement. It can
be used in SPUFI (for single SQL statement) or in BIND step (for embedded SQL)
What is a scenario in which you would be using
a single buffer pool?
Your system is locked.
You are working on a test system.
The system has errors.
You working on a broken system.
What type of parameter is “dbheap”?
System.
Configuration.
Database.
Network.
Which of the following kinds of table spaces
allows LOBs to use the filesystem cache?
A DMS table space created with raw devices
A user temporary table space
A system temporary table space
An SMS table space
If your columns are indexed, what clause would
you run for the RUNSTATS command to collect statistics?
ONLY ON KEY COLUMNS
ONLY ON KEY STATS
ONLY ON STAT COLUMNS
ONLY FROM STAT COLUMNS
Given the following command: CREATE TABLESPACE
Smt1 MANAGED BY SYSTEM USING ( 'path1' ) EXTENTSIZE 16 PREFETCHSIZE 32 In a
single partition database, how can the amount of storage available to the table
space Smt1 be increased?
Free up disk space on path1
Add a container to Smt1
Increase the extent size of the table space
Extend the container
What type of performance impact does the
configuration parameter, “blk_log_dsk_ful” have on the system?
None.
It shuts the system down completely because it
can't document errors.
It slows down the system because the log file is
full.
It speeds up the system because it no longer logs
data.
Where would the optimizer gather information
to estimate the amount of prefetching for a tablespace?
All of the columns in SYSCAT.TABLESPACES.
The CATSIZE and EXTENTSIZE columns in
CAT.TABLESPACES.
The PRECAT and EXTENTIZER columns in
SYSCAT.TABLESPACES.
The PREFETCHSIZE and EXTENTSIZE columns in
SYSCAT.TABLESPACES.
What table space characteristic can affect how
your compiler operates?
Operator characteristics.
Compiler characteristics.
DB2 characteristics.
Container characteristics.
Which of the following can be done by a user
who is granted the CONTROL privilege on an INDEX?
Drop the index
Alter the index
Create an index extension on the index
Add columns to the index
Which of the following RACF profiles would be
used to allow IMS to access DB2 DSN1?
DSNR.IMS
DSN1.SASS
DSN1.MASS
DSN1.IMS
Which of the following explicit system
privileges allows the user to create new plans and packages without being able
to also execute them?
CREATEDBA
BINDAGENT
CREATEIN
BINDADD
Given that there are two containers in table
space Smart1 and the following statement: ALTER TABLESPACE Smart1 REDUCE (ALL
100 M) Which of the following will happen?
Each container in table space Smart1 that has no
data will be reduced in size to 100 MB.
Each container in table space Smart1 will be
reduced in size by 100 MB.
Each container in table space Smart1 will be
reduced in size to 100 MB.
The total size of table space Smart1 will be
reduced to 100 MB.
Which of the following is not a statistic
collected during RUNSTATS
Percent of rows in clustering sequence
None of the above
No of rows in the table
No of distinct values of indexed column
To set up a client that can access DB2 UDB
through DB2 Connect Enterprise Edition, which of the following is the minimum
software client that must be installed?
DB2 Administration Client
DB2 Application Development Client
DB2 Runtime Client
DB2 Personal Edition
What parameter and option must be set before
using a DB2 DBMS?
DB2, YES.
Federated, YES.
Federated, NO.
DBMS, YES.
Given the following table definition: CREATE
TABLE smarterer_list (empid INTEGER, points INTEGER CONSTRAINT chk CHECK
(points <= 100) NOT ENFORCED ) and the statement: INSERT INTO smarterer_list
VALUES (98, 100), (123,123), (101, 98) How many records will be retrieved by
the following statement? SELECT * FROM smarterer_list
3
1
2
0
An audit trace shows that TSO user TSOID1 with
DBADM authority, is continually attempting to update a table in DB2 subsystem
DSN1 that is not supposed to be updated. Which of the following will prevent
access to the DB2 subsystem?
Change TSOID1 ‘s access to DSNR resource class
DSN1.BATCH to NONE
Change TSOID1 ‘s access to DSNR resource class
DSN1.BATCH to READ
REVOKE DBADM FROM TSOID1
Change TSOID1 ‘s access to DSNR resource class
DSN1.TSO to NONE
What does it mean if the the null indicator =
-1
The field is truncated
The field has spaces
The field is null
The field has blanks
What is a technique to access non-contiguous
data pages more efficiently?
List sequential parameters.
List sequential prefetch.
List all prefetch.
Lock sequential prefetch.
If you have a poorly clustered index with
random synchronous I/Ss, what clause would you use to prevent an impending
delay?
OPTIMIZE FOR
OPTIMIZE NOW
OPTIMIZE
OPTIMIZE ON
Given the following statement: CREATE
TABLESPACE smt1 MANAGED BY DATABASE USING (FILE 'smt01' 1024K) How many pages
will be created for the table space?
512
1024
256
128
What does it mean if the the null indicator =
0
The field is null
The field is truncated
The field has blanks
The field is not null
What technique can be used to reduce the
number of calculations in a query?
Compiled aggregation.
Shared aggregation.
Compiled pairing.
Paired aggregation.
Which of the following DSNZPARMs is necessary
to influence access path selection for certain queries?
STDSQL
PARTKEYU
OPTHINTS
DESCSTAT
Given the following DDL statements: CREATE
TABLE person OF person_t (REF IS OID USER GENERATED) CREATE TABLE emp OF emp_t
UNDER person INHERIT SELECT PRIVILEGES CREATE TABLE student OF student_t UNDER
person INHERIT SELECT PRIVILEGES Which of the following will drop all tables
associated with the hierarchy?
Dropping all columns from the subtables STUDENT and
EMP
Deleting all rows from the person hierarchy
Dropping the PERSON table
Dropping the table hierarchy called PERSON
Given the following statements: CREATE TABLE
T1 (COL1 INT NOT NULL PRIMARY KEY, COL2 CHAR, COL3 CLOB (40K), COL4
VARCHAR(10)); CREATE UNIQUE INDEX IND_1 ON T1 (COL1, COL2) INCLUDE (COL3) ALLOW
REVERSE SCANS; The CREATE UNIQUE INDEX statement will fail because:
A unique index cannot include an existing primary
key.
Reverse scans are not supported on multi-column
indexes.
LOB columns cannot be used in an index.
INCLUDE columns are not supported in indexes that
support REVERSE SCANS.
Which of the following allows index data to be
stored on separate devices from table data?
DMS table spaces
The table space containers defined on different
devices
SMS table spaces
TMS table spaces
Subscribe to:
Posts (Atom)