Certbus > IBM > IBM Certified Advanced Database Administrator > A2090-610 > A2090-610 Online Practice Questions and Answers

A2090-610 Online Practice Questions and Answers

Questions 4

Which action needs to be performed in order to complete the definition of an application-period temporal table?

A. A transaction-start-id column must be defined for the table.

B. A history table must be defined and associated with the base table.

C. A BUSINESS_TIME period must be specified in a CREATE or ALTER of the table.

D. A unique index must be created that prevents overlapping of the BUSINESS_TIME period of the table.

Browse 138 Q&As
Questions 5

Which product is used to customize execution environments for the purpose of controlling system resources so that one department or service class does not overwhelm the system?

A. pureScale

B. Workload manager

C. Data partitioning feature

D. Self-tuning memory manager

Browse 138 Q&As
Questions 6

Application APP_A is performing updates to table TAB1 using the cursor stability (CS) isolation level. If application APP_B wants to retrieve all rows from table TAB1 without waiting for application APP_A to finish making updates, what isolation level must application APP_B use?

A. Read Stability (RS)

B. Repeatable Read (RR)

C. Uncommitted Read (UR)

D. Cursor Stability (CS)

Browse 138 Q&As
Questions 7

Which command is used to back out a subset of database changes that have been made within a unit of work?

A. COMMIT

B. ROLLBACK

C. COMMIT TO SAVEPOINT

D. ROLLBACK TO SAVEPOINT

Browse 138 Q&As
Questions 8

A table named EMPLOYEE was created as follows: Which action will prevent unauthorized users from accessing SSN data?

A. Assign the SSN column to a restricted role that only authorized users can access.

B. Only grant ACCESSCTRL authority for the SSN column to users who need to access SSN data.

C. Alter the table definition so that SSN data is stored in a separate schema that only authorized users can access.

D. Create a view for the EMPLOYEE table that does not contain the SSN column and require unauthorized users to use the view.

Browse 138 Q&As
Questions 9

Which statement about BEFORE triggers is FALSE?

A. A BEFORE trigger can be used to perform validation of input data.

B. A BEFORE trigger can be used to automatically generate values for newly inserted rows.

C. A BEFORE trigger is fired for each row in the set of affected rows before the trigger event executes.

D. A BEFORE trigger is fired for each row in the set of affected rows instead of executing the trigger event.

Browse 138 Q&As
Questions 10

When is a mask used to limit access to data in a table?

A. When mandatory access control (MAC) is used to protect the table.

B. When discretionary access control (DAC) is used to protect the table.

C. When label-based access control (LBAC) is used to protect the table.

D. When row and column access control (RCAC) is used to protect the table.

Browse 138 Q&As
Questions 11

What privilege is required to create a view on a table that you are not the owner of?

A. INSERT

B. SELECT

C. CREATE

D. TRIGGER

Browse 138 Q&As
Questions 12

Which of the following privileges allow a user to update the comment on a sequence?

A. ALTER

B. USAGE

C. UPDATE

D. COMMENT

Browse 138 Q&As
Questions 13

Given the SQL statement: CREATE ALIAS total_sales FOR sales Which statement is valid?

A. SALES can be the name of a schema.

B. SALES can be the name of a package.

C. SALES can be the name of an existing alias.

D. SALES can be the name of a declared global temporary table.

Browse 138 Q&As
Questions 14

Which DB2 object is associated with PREVIOUS VALUE and NEXT VALUE expressions?

A. View

B. Table

C. Sequence

D. Identity Column

Browse 138 Q&As
Questions 15

Given the following statements:

What will be the result?

A. Joe Smith

B. Joe Smith

C. Joe Smith>DB2

D. Joe Smith

Browse 138 Q&As
Questions 16

When a user-defined function (UDF) is created and no schema is specified, what schema is used to store the UDF?

A. The SYSIBM schema.

B. The SYSFUN schema.

C. A schema with the name of the UDF.

D. A schema with the userid of the UDF definer.

Browse 138 Q&As
Questions 17

Which statement regarding referential integrity constraints is true?

A. Multiple primary keys can be defined for a table.

B. A foreign key can reference multiple primary keys.

C. A primary key can be referenced by only one foreign key.

D. Primary keys and foreign keys are used to define relationships.

Browse 138 Q&As
Questions 18

The EXCLUSIVE MODE option of the LOCK TABLE statement is used to prevent which of the following?

A. Concurrent application processes from performing any operations on the table.

B. Concurrent application processes from performing any read-only operations on the table.

C. Concurrent applications processes that are running under the cursor stability (CS) isolation level from performing read-only operations on thetable.

D. Concurrent applications processes that are running under the uncommitted read (UR) isolation level from performing read-only operations onthe table.

Browse 138 Q&As
Exam Code: A2090-610
Exam Name: Assessment: DB2 10.1 Fundamentals - Assessment
Last Update: Apr 21, 2024
Questions: 138 Q&As

PDF

$45.99

VCE

$49.99

PDF + VCE

$59.99