Exam4Training

IBM C2090-318 DB2 12 System Administrator for z/OS Online Training

Question #1

In any disaster recovery scenario, a direct relationship exists between the frequency at which image copies are taken and sent to the recovery site and which of the following?

  • A . The ability to perform a RESTORE SYSTEM
  • B . Time spent rebuilding indexes at disaster site
  • C . The amount of data that could potentially be lost
  • D . The total number of incremental image copies made

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

https://www.ibm.com/support/knowledgecenter/beta/bg/SSEPEK_11.0.0/admin/src/tpc/db2 z_disasterrecoveryprep.html

In any disaster recovery scenario, system-wide points of consistency are necessary for maintaining data integrity and preventing a loss of data. A direct relationship exists between the frequency at which you make and send copies to the recovery site and the amount of data that you can potentially lose.

Question #2

Which statement is TRUE if the PARAMDEG_DPSI subsystem parameter is set to the default value of 0?

  • A . Parallelism for DPSI is disabled
  • B . The DB2 optimizer will not consider DPSI for access path selection
  • C . DB2 creates multiple child tasks but works on one task at a time when DPSI is used to drive parallelism
  • D . DB2 will use the value specified for the PARAMDEG subsystem parameter to control the degree of parallelism when DPSI is used

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation: 0

Specifies that Db2 uses the value that is specified for the PARAMDEG subsystem parameter, instead of PARAMDEG_DPSI, to control the degree of parallelism when DPSI is used to drive parallelism. This is the default value for the field. https://www.ibm.com/support/knowledgecenter/en/SSEPEK_12.0.0/inst/src/tpc/db2z_ipf_paramdegdpsi.html

Question #3

Which of the following commands can be used to show the client correlation token in order to find details such as the ip-address. port-address and unique-id to identify the distributed transaction?

  • A . -DISPLAY LOCATION OB.
  • B . -DISPLAY DDF DETAIL
  • C . -DISPLAY THREADH DETAIL
  • D . -DISPLAY FUNCTION SPECIFIC

Reveal Solution Hide Solution

Correct Answer: C
Question #4

Which of the following is an advantage of role-based security?

  • A . If you DROP a role that owns objects, those objects will also be dropped
  • B . Within a trusted connection. DB2 allows multiple roles to be associated with any given thread at any point in time
  • C . Roles are used to provide a more flexible technique than security group definitions or userids in assigning and controlling authorization
  • D . If a role creates an object, a user requires no additional privileges to access the object if the access uses that role as the object owner in the SQL statement

Reveal Solution Hide Solution

Correct Answer: A
Question #5

To simulate a new buffer pool size, what buffer pool parameter is used?

  • A . PGFIX
  • B . VPSIZE
  • C . SPSIZE
  • D . AUTOSI2E

Reveal Solution Hide Solution

Correct Answer: C
Question #6

Which service class does not have a goal, but runs with a fixed dispatching priority above all of the other work on the system?

  • A . ONLINE
  • B . SYSSTC
  • C . SYSTEM
  • D . SYSOTHER

Reveal Solution Hide Solution

Correct Answer: B
Question #7

At what point in the upgrade process is the catalog migrated to DB2 12?

  • A . Completion of DSNTIJTC job
  • B . At the completion of CATMAI NT in function level 500
  • C . After issuing command -ACTIVATE FUNCTION LEVEL (V12R1M100)
  • D . After issuing command -ACTIVATE FUNCTION LEVEL (V12R1M500)

Reveal Solution Hide Solution

Correct Answer: B
Question #8

Which of the following is TRUE about the SYSCTRL authority?

  • A . It is designed to allow access to all data directly in DB2
  • B . It is designed not to be a part of the administrative authorizations
  • C . It is designed so group privileges cannot be granted to SYSCTRL
  • D . It is designed to be an administrator in a system with sensitive data

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

https://www.ibm.com/support/knowledgecenter/SSEPEK_10.0.0/seca/src/tpc/db2z_sysctrla uthority.html

The SYSCTRL authority is designed for administering a system that contains sensitive data. With the SYSCTRL authority, you have nearly complete control of

the DB2® subsystem. However, you cannot access user data directly unless you are explicitly granted the privileges to do so.

Question #9

Which type of trace is used to record transaction-level data that is written when the processing for a transaction is completed?

  • A . Audit
  • B . Monitor
  • C . Statistics
  • D . Accounting

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

Accounting traceThe accounting trace records transaction-level data that is written when the processing for a transaction is completed. It provides data that enables you to conduct DB2 capacity planning and to tune application programs.

https://www.ibm.com/support/knowledgecenter/SSEPEK_10.0.0/perf/src/tpc/db2z_tracetyp es.html

Question #10

Which stored procedures need to be set up in order to register an XML schema?

  • A . XSR_VALI DATE and XSR_COMPLETE
  • B . XSR_REGISTERandXSR_COMPLETE
  • C . XSR_VALIDATE and XSR_ADDSCHEMADOC
  • D . XSR ADDSCHEMADOCandXSR COMPLETE

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

https://www.ibm.com/support/knowledgecenter/SSEPGG_11.1.0/com.ibm.db2.luw.xml.doc/ doc/c0022711.html

When a database is created, the stored procedures used to register XML schemas are also created. To register XML schemas through the stored procedure method, invoke the XSR_REGISTER, XSR_ADDSCHEMADOC and XSR_COMPLETE stored procedures with the CALL statement.

Question #11

Considering the following command:

-CANCEL THREAD {*) FORCE

In which of the following situations can it be used?

  • A . On local threads that are not in DB2
  • B . On application threads that update NOT LOGGED table spaces
  • C . If you are terminating a distributed thread that is part of a global transaction
  • D . If the CANCEL THREAD command without the FORCE option does not terminate the thread

Reveal Solution Hide Solution

Correct Answer: D
Question #12

Which of the following utilities would produce information needed to identify UNDO information for a transaction?

  • A . DSNJU003
  • B . DSNJU004
  • C . DSNJLOGF
  • D . DSN1LOGP

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

https://www.ibm.com/support/knowledgecenter/SSEPEK_12.0.0/pdf/db2z_12_ugrefbook.p df

Question #13

Az/OS system has some storage constraints. The results of-DIS STATS(INDEXMEMORYUSAGE) shows that a huge amount of storage is used for the fast index traversal processes.

What can be done to avoid this storage usage?

  • A . Reorganize the listed indexes
  • B . Set subsystem parameter INDEX_CLEANUP_THREADS to 0
  • C . Set subsystem parameter INDEX_MEMORY_CONTROL to DISABLE
  • D . Issue SQL statement ALTER INDEX ixname REGENERATE USING APPLICATION COMPATIBILITY V12R1M500 for the listed indexes

Reveal Solution Hide Solution

Correct Answer: C
Question #14

Which of the following catalog or directory table spaces maintain their recovery information in the DB2 log?

  • A . DSNDB06.SYSDDF
  • B . DSNDB01.SYSUTILX
  • C . DSNDB01.SYSSPT01
  • D . DSNDB01.SYSLGRNX

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

https://www.ibm.com/support/knowledgecenter/en/SSEPEK_11.0.0/ugref/src/tpc/db2z_reco vercatalogdirectoryobjects.html

Use the following general guidelines for all of the steps in this task:

✑ If you copy your catalog or directory indexes, use the RECOVER utility to recover your indexes. Otherwise, use the REBUILD INDEX utility to rebuild those indexes.

✑ For all catalog and directory table spaces, you can list the IBM®-defined indexes that have the COPY YES attribute in the same RECOVER utility statement.

✑ Recovery of the items in the list can be done concurrently or included in the same job step. However, the following restrictions apply:

Question #15

CPU utilization for a DB2 subsystem suddenly increased by approximately 20% and is still at this high level after 24 hours. No increase in workload was expected.

What would be the most efficient analysis to perform?

  • A . Check that the WLM settings are set correctly
  • B . Start a system-wide performance trace to identify the workload which is causing the high CPU
  • C . Execute a -DISPLAY STATS command to identify the workload which is causing the high CPU
  • D . Execute a -DISPLAY TRACED command to check if there are additional traces running or if the global trace is on

Reveal Solution Hide Solution

Correct Answer: B
Question #16

Which of the following is required to successfully issue the -ACTIVATE command in a data sharing environment?

  • A . All active members must be running DB2 12
  • B . Only one member may be active when the command is issued
  • C . The command must be issued with installation SYSADM authority
  • D . The member on which the command is issued must be started in maintenance mode

Reveal Solution Hide Solution

Correct Answer: C
Question #17

Which library contains the early code for DB2 12?

  • A . SDSNLINK
  • B . SDSNLOD2
  • C . SDSNLOAD
  • D . SDSNMACS

Reveal Solution Hide Solution

Correct Answer: A
A

Explanation:

The link list look-aside address space (LLA), which contains the Db2 12 early (ERLY) code from the SDSNLINK load module library. https://www.ibm.com/support/knowledgecenter/SSEPEK_12.0.0/inst/src/tpc/db2z_refreshdb2zosmigr.html

Question #18

Which DB2 command is used to turn on the recording of CPU usage information for a package?

  • A . -START RLIMIT
  • B . -START TRACE
  • C . -START PROFILE
  • D . -START DYNQUERYCAPTURE

Reveal Solution Hide Solution

Correct Answer: D
Question #19

Which of the following migration steps is optional?

  • A . Tailor the DB2 catalog
  • B . Define DB2 12 to z/OS
  • C . Define DB2 initialization parameters: DSNTIJUZ
  • D . Verify the integrity of the DB2 catalog and directory

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

https://www.ibm.com/support/knowledgecenter/SSEPEK_12.0.0/inst/src/tpc/db2z_runlinkch kr.html

Question #20

Given the following scenario:

A table has been dropped accidentally and you need to restore the object. DSN1COPY will be used to restore the object but the PSID and the original OBID of the object is not known.

Which stand alone utility will allow you to retrieve that information?

  • A . DSNJLOGF
  • B . DSN1PRNT
  • C . DSN1LOGP
  • D . DSN1SDMP

Reveal Solution Hide Solution

Correct Answer: B
Exit mobile version