Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

IBM C2090-541 Exam - Cheat-Test.com

Free C2090-541 Sample Questions:

1. Given the DDL shown below:
CREATE TABLE tab1 (coll SMALLINT );
CREATE VIEW v1 AS SELECT coll FROMtabl WHERE coll > 25 ;
CREATE VIEW V2 AS SELECT COI1 FROM v1 WITH CASCADED CHECK OPTION
CREATE VIEW v3 AS SELECT coll FROM v2 WHERE coll < 100 ;
Which statement will fail?
A. INSERT INTO v2 VALUES (35)
B. INSERT INTO v1 VALUES (5)
C. INSERT INTO v3 VALUES (25)
D. INSERT INTO v3 VALUES (200)
Answer: C

2. BOB and ALICE moved from the DEVELOPER group to the ANALYST group.
As the security administrator, which two commands would remove Bob and Alice from the DEVELOPER group? (Choose two.)
A. REVOKE ROLE developer FROM bob, alice
B. REVOKE GROUP developer FROM bob, alice
C. REVOKE ROLE developer FROM USER bob, USER alice
D. REVOKE GROUP developer FROM USER bob, USER alice
Answer: A C

3. Which statement is correct about informational constraints?
A. An informational constraint can be used by the SQL compiler to improve the access to data and query performance.
B. The database manager uses an informational constraint to enforce the uniqueness of the key during changes to the columns of the unique constraint.
C. An informational constraint is a column or combination of columns that has the same properties as a unique constraint.
D. An informational constraint specifies that every row that is inserted or updated in the table must conform to the definition of the table.
Answer: A

4. Because of an application abend, a database named PAYROLL needs to be restored to approximately 9:26 am on June 1, 2009. After the database is restored from a backup image, the command shown below is executed:
ROLLFORWARD DATABASE payroll TO 2009-06-01-09.26.44.609002
USING LOCAL TIME AND STOP
When this command is executed, the error shown below is generated:
SQL4970N Roll-forward recovery on database "PAYROLL" cannot reach the specified stop point (end-of-log or point-in-time) because of missing log file(s) on node(s) "0".
Which two commands could be used to resolve this error? (Choose two.)
A. ROLLFORWARD DATABASE payroll TO END OF LOGS AND STOP
B. ROLLFORWARD DATABASE payroll TO 2009-06-01-09.26.44.609002 USING UTC TIME AND STOP
C. ROLLFORWARD DATABASE payroll TO 2009-06-01-09.26.44.609002 USING LOCAL TIME AND STOP OVERFLOW LOG PATH /mnt/arclog
D. ROLLFORWARD DATABASE payroll TO 2009-06-01-09.26.44.609002 USING UTC TIME AND STOP NORETRIEVE MISSING RECORDS
Answer: A C

5. Which two plug-in types does the DB2 database system provide? (Choose two.)
A. Group retrieval
B. Kerberos authentication
C. Server authentication
D. Encryption authentication
Answer: A C

6. What are three authorization categories in DB2? (Choose three.)
A System-level
B Database-level
C Network-level
D Object-level
E Instance-level
Answer: ABD

7. What are three system and database level authorizations available with DB2? (Choose three.)
A SYSMON
B SYSMNT
C DBCTRL
D SYS ADM
E DBADM
Answer: A D E

8. A DBA wants to use Label Based Access Control (LBAC) to protect Individual rows in a table.
Which data type must be used to create a column to hold the necessary LBAC security data?
A. SYSPR0C.DB2LBACU\BEL
B. SYSPR0C.DB2SECURITYU\BEL
C. SYSIBM .DB2LBACLABEL
D. SYSIBM .DB2SECURITYLABEL
Answer: D

9. Which administrative authority is needed to run the audit stored procedures and table functions such as the AUDIT_DELIM_EXTRACT stored proced ure?
A DBADM
B SECADM
C SQLADM
D SYS ADM
Answer: B

10. How does the DB2 Server identify the list of GSS -API plug-ins it supports?
A. by using the SRVCON_GSSPLUGIN_LIST database manager configuration parameter
B. by using the SRVCON_GSSPLUGIN_LIST registry variable
C. by using the SRVSUPP_GSSPLUGIN_LIST database manager configuration parameter
D. by using the SRVSUPP_GSSPLUGIN_LIST registry variable
Answer: A


© 2014 Cheat-Test.com, All Rights Reserved