MCQs > IT & Programming > DB2 Administration MCQs > Basic DB2 Administration MCQs

Basic DB2 Administration MCQ

1. Which of the following can a DBA do to determine what an image copies, active logs and archive logs will  be required for the recovery of a table space?


Answer

Correct Answer: Run the Report Recovery utility

Note: This Question is unanswered, help us to find answer for this one

2. Which of the following table space characteristics for a system Managed (SMS) table space can be modified with the ALTER TABLESPACE Statements?  


Answer

Correct Answer: Prefetch Size

Note: This Question is unanswered, help us to find answer for this one

3. what is the root page in DB2?


Answer

Correct Answer: It is a B-tree's top page

Note: This Question is unanswered, help us to find answer for this one

4. What is a deadlock?


Answer

Correct Answer: A deadlock occurs when transactions are executed at the same time

Note: This Question is unanswered, help us to find answer for this one

5. Which of the following COPY utility statements will backup table space DBTAB1.TS1 preparing 2 copies for local use and 2 copies for disater recovery use?


Answer

Correct Answer: Copy Tablespace DBTAB1.TS1 LOCAL(DD1,DD2) OFFSITE(DD3,DD4)...

Note: This Question is unanswered, help us to find answer for this one

6. Which of the following index type will cause the rows of the table to be arranged on the disk according to the ordering of their index keys?


Answer

Correct Answer: Clustered Index

Note: This Question is unanswered, help us to find answer for this one

7. Which function does QUIESCE perform?


Answer

Correct Answer: It flushes all DB2 buffers on to the disk

Note: This Question is unanswered, help us to find answer for this one

8. What are segmented table spaces?


Answer

Correct Answer: Table spaces divided into segments of 4 to 64 pages

Note: This Question is unanswered, help us to find answer for this one

9. Can you use LOCK TABLE on a view?  


Answer

Correct Answer: No 

Note: This Question is unanswered, help us to find answer for this one

10. How do you perform the EXPLAIN of a dynamic SQL statement?


Answer

Correct Answer: By using SPUFI or QMF to EXPLAIN the dynamic SQL statement

Note: This Question is unanswered, help us to find answer for this one

11. Which of the following cannot be done with the ALTER TABLE statement?


Answer

Correct Answer: Change the cache value for an identity column

Note: This Question is unanswered, help us to find answer for this one

12. Where is the output of EXPLAIN stored?


Answer

Correct Answer: In userid.PLAN_TABLE

Note: This Question is unanswered, help us to find answer for this one

13. A DBA issues the command:-DIS DB(DSNDB06) SPACE(*) LOCKS. In the LOCKINFO field the following data is reported: H-IS,S,C. When Will the lock first be released by DB2?


Answer

Correct Answer: COMMIT

Note: This Question is unanswered, help us to find answer for this one

14. What does sqlcode -922 denote?


Answer

Correct Answer: Authorization failure

Note: This Question is unanswered, help us to find answer for this one

15. What does the term IMAGECOPY mean?


Answer

Correct Answer: It is a full backup of a DB2 table

Note: This Question is unanswered, help us to find answer for this one

16. Which of the following is true when joining a table with DB2 Relational Connect function?


Answer

Correct Answer: The DB2 optimizer is aware that some tables are on remote machines, and where appropriate will rewrite SQL before sending it to the remote machine

Note: This Question is unanswered, help us to find answer for this one

17. How many clustering indexes can be defined for a table?


Answer

Correct Answer: One

Note: This Question is unanswered, help us to find answer for this one

18. If a user accidentally drops a table and commits work, which of the following recovers the dropped table?


Answer

Correct Answer: If ALTER TABLESPACE..DROPPED TABLE RECOVERY on enabled,restore tablespace,role forward

Note: This Question is unanswered, help us to find answer for this one

19. When is the access path determined for dynamic SQL?


Answer

Correct Answer: At run time

Note: This Question is unanswered, help us to find answer for this one

20. Which of the following is not true for a segmented table space?


Answer

Correct Answer: It is more efficient for table spaces greater than 4 GB

Note: This Question is unanswered, help us to find answer for this one

21. What is a DB2 bind?


Answer

Correct Answer: A process that builds an access path to DB2 tables

Note: This Question is unanswered, help us to find answer for this one

22. How does DB2 determine which lock-size to use?


Answer

Correct Answer: It is based on the lock-size given while creating the tablespace

Note: This Question is unanswered, help us to find answer for this one

23. What is a DB2 access path?


Answer

Correct Answer: It is a method used to access data specified in DB2

Note: This Question is unanswered, help us to find answer for this one

24. What is dynamic SQL?  


Answer

Correct Answer: An SQL statement created at program execution time

Note: This Question is unanswered, help us to find answer for this one

25. Can you update a view which is based on more than one table?


Answer

Correct Answer: No 

Note: This Question is unanswered, help us to find answer for this one

26. What happens during a DB2 Checkpoint?


Answer

Correct Answer: Both a and b

Note: This Question is unanswered, help us to find answer for this one

27. The various locking levels available are:  


Answer

Correct Answer: Page, Table, Tablespace

Note: This Question is unanswered, help us to find answer for this one

28. Which of the following statements will gather only the index statistics for the table john.table1?


Answer

Correct Answer: Runstats on table john.table1 for indexes all
Runstats on table john.table1 and indexes all 

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

29. What do you need to do before you perform EXPLAIN?


Answer

Correct Answer: Create PLAN_TABLE  under the AUTHID

Note: This Question is unanswered, help us to find answer for this one

30. The various locks available are _____________.  


Answer

Correct Answer: All of the above 

Note: This Question is unanswered, help us to find answer for this one

31. When is the authorization check on DB2 objects done - at BIND time or run time?


Answer

Correct Answer: At run time

Note: This Question is unanswered, help us to find answer for this one

32. Which of the following ALTER TABLESPACE statements causes DB2 to record data page changes in the space map pages of a segmented table space DSN8D71A.DSN8S71E?


Answer

Correct Answer: ALTER TABLESPAcE dsn8d71a.dsn8s7ie Trackmod yes;

Note: This Question is unanswered, help us to find answer for this one

33. What is RUNSTATS?


Answer

Correct Answer: It is a utility used to collect statistics

Note: This Question is unanswered, help us to find answer for this one

34. What are partitioned table spaces?


Answer

Correct Answer: Table spaces divided into parts

Note: This Question is unanswered, help us to find answer for this one

35. Which of the following commands will give the minimum point in time recovery for table spaces of a recoverable database?


Answer

Correct Answer: List tablespace show detail
Get db cfg for <database-alias 

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

36. Which DB2 catalog table can be used to determine if a user has authorization to bind a new plan?


Answer

Correct Answer: SYSUSERAUTH

Note: This Question is unanswered, help us to find answer for this one

37. What is a clustering index?  


Answer

Correct Answer: A mandatory index defined on a partitioned table space

Note: This Question is unanswered, help us to find answer for this one

38. Index cardinality represents:


Answer

Correct Answer: The number of distinct values a column Contains

Note: This Question is unanswered, help us to find answer for this one

39. Which of the following is required to import data into a table?


Answer

Correct Answer: LOAD authority on the table

Note: This Question is unanswered, help us to find answer for this one

40. What does the term EXPLAIN denote?


Answer

Correct Answer: It displays the access path as determined by the optimizer

Note: This Question is unanswered, help us to find answer for this one

41. Is the parameter, “database_memory” configured automatically?

Answer

Correct Answer: Yes.

Note: This Question is unanswered, help us to find answer for this one

42. Which of the following allows index data to be stored on separate devices from table data?

Answer

Correct Answer: DMS table spaces

Note: This Question is unanswered, help us to find answer for this one

43. Given the following statements: CREATE TABLE T1 (COL1 INT NOT NULL PRIMARY KEY, COL2 CHAR, COL3 CLOB (40K), COL4 VARCHAR(10)); CREATE UNIQUE INDEX IND_1 ON T1 (COL1, COL2) INCLUDE (COL3) ALLOW REVERSE SCANS; The CREATE UNIQUE INDEX statement will fail because:

Answer

Correct Answer: LOB columns cannot be used in an index.

Note: This Question is unanswered, help us to find answer for this one

44. What technique can be used to reduce the number of calculations in a query?

Answer

Correct Answer: Shared aggregation.

Note: This Question is unanswered, help us to find answer for this one

45. What does it mean if the the null indicator = 0

Answer

Correct Answer: The field is not null

Note: This Question is unanswered, help us to find answer for this one

46. Which of the following DSNZPARMs is necessary to influence access path selection for certain queries?

Answer

Correct Answer: OPTHINTS

Note: This Question is unanswered, help us to find answer for this one

47. Given the following statement: CREATE TABLESPACE smt1 MANAGED BY DATABASE USING (FILE 'smt01' 1024K) How many pages will be created for the table space?

Answer

Correct Answer: 256

Note: This Question is unanswered, help us to find answer for this one

48. Given the following DDL statements: CREATE TABLE person OF person_t (REF IS OID USER GENERATED) CREATE TABLE emp OF emp_t UNDER person INHERIT SELECT PRIVILEGES CREATE TABLE student OF student_t UNDER person INHERIT SELECT PRIVILEGES Which of the following will drop all tables associated with the hierarchy?

Answer

Correct Answer: Dropping the table hierarchy called PERSON

Note: This Question is unanswered, help us to find answer for this one

49. What does it mean if the the null indicator = -1

Answer

Correct Answer: The field is null

Note: This Question is unanswered, help us to find answer for this one

50. To set up a client that can access DB2 UDB through DB2 Connect Enterprise Edition, which of the following is the minimum software client that must be installed?

Answer

Correct Answer: DB2 Runtime Client

Note: This Question is unanswered, help us to find answer for this one

51. Which of the following RACF profiles would be used to allow IMS to access DB2 DSN1?

Answer

Correct Answer: DSN1.MASS

Note: This Question is unanswered, help us to find answer for this one

52. What parameter and option must be set before using a DB2 DBMS?

Answer

Correct Answer: Federated, YES.

Note: This Question is unanswered, help us to find answer for this one

53. Which of the following explicit system privileges allows the user to create new plans and packages without being able to also execute them?

Answer

Correct Answer: BINDAGENT

Note: This Question is unanswered, help us to find answer for this one

54. An audit trace shows that TSO user TSOID1 with DBADM authority, is continually attempting to update a table in DB2 subsystem DSN1 that is not supposed to be updated. Which of the following will prevent access to the DB2 subsystem?

Answer

Correct Answer: Change TSOID1 ‘s access to DSNR resource class DSN1.BATCH to NONE

Note: This Question is unanswered, help us to find answer for this one

55. If you have a poorly clustered index with random synchronous I/Ss, what clause would you use to prevent an impending delay?

Answer

Correct Answer: OPTIMIZE FOR

Note: This Question is unanswered, help us to find answer for this one

56. Given that there are two containers in table space Smart1 and the following statement: ALTER TABLESPACE Smart1 REDUCE (ALL 100 M) Which of the following will happen?

Answer

Correct Answer: Each container in table space Smart1 will be reduced in size by 100 MB.

Note: This Question is unanswered, help us to find answer for this one

57. Given the following table definition: CREATE TABLE smarterer_list (empid INTEGER, points INTEGER CONSTRAINT chk CHECK (points <= 100) NOT ENFORCED ) and the statement: INSERT INTO smarterer_list VALUES (98, 100), (123,123), (101, 98) How many records will be retrieved by the following statement? SELECT * FROM smarterer_list

Answer

Correct Answer: 3

Note: This Question is unanswered, help us to find answer for this one

58. What table space characteristic can affect how your compiler operates?

Answer

Correct Answer: Container characteristics.

Note: This Question is unanswered, help us to find answer for this one

59. Which of the following is not a statistic collected during RUNSTATS

Answer

Correct Answer: None of the above

Note: This Question is unanswered, help us to find answer for this one

60. DB2 Enterprise Server Edition (ESE) is running on Linux and needs to validate the userids and passwords on the z/OS server for the DB2 clients connecting to DB2 for z/OS. Which of the following authentication levels satisfies this while providing authentication for other DB2 clients at the DB2 ESE server?

Answer

Correct Answer: DCS

Note: This Question is unanswered, help us to find answer for this one

61. What is intra-partition parallelism?

Answer

Correct Answer: A technique that utilizes multiple subagents to scan an index, or table.

Note: This Question is unanswered, help us to find answer for this one

62. Which of the following kinds of table spaces allows LOBs to use the filesystem cache?

Answer

Correct Answer: An SMS table space 

Note: This Question is unanswered, help us to find answer for this one

63. Which of the following is correct about the EXPLAIN statement

Answer

Correct Answer: EXPLAIN is used to display the access path as determined by the optimizer for a SQL statement. It can be used in SPUFI (for single SQL statement) or in BIND step (for embedded SQL)

Note: This Question is unanswered, help us to find answer for this one

64. A DBA needs to use the DSN command processor to delete DB2 packages that are no longer needed. Which of the following choices is correct for the DBA to use?

Answer

Correct Answer: FREE Package (<collid>.<name of package>.<version id>)

Note: This Question is unanswered, help us to find answer for this one

65. What type of parameter is “dbheap”?

Answer

Correct Answer: Database.

Note: This Question is unanswered, help us to find answer for this one

66. What is one way that a query might be rewritten?

Answer

Correct Answer: Operation merging.

Note: This Question is unanswered, help us to find answer for this one

67. To prepare an embedded SQL program for use with a host-language compiler, which of the following database components is required?

Answer

Correct Answer: Precompiler

Note: This Question is unanswered, help us to find answer for this one

68. Which of the following tools can be used to edit related backup tasks created in the Task Center

Answer

Correct Answer: Command Center

Note: This Question is unanswered, help us to find answer for this one

69. Which of the following actions will occur when issuing the command FORCE APPLICATION ALL?

Answer

Correct Answer: Uncommitted units of work are rolled back

Note: This Question is unanswered, help us to find answer for this one

70. Given the following code: EXEC SQL EXECUTE IMMEDIATE: sqlstmt Which of the following values must sqlstmt contain so that all rows are deleted from the STAFF table?

Answer

Correct Answer: DELETE FROM staff

Note: This Question is unanswered, help us to find answer for this one

71. If your columns are indexed, what clause would you run for the RUNSTATS command to collect statistics?

Answer

Correct Answer: ONLY ON KEY COLUMNS

Note: This Question is unanswered, help us to find answer for this one

72. What two types of configuration files does DB2 use?

Answer

Correct Answer: Database manager configuration files, and database configuration files for the database itself.

Note: This Question is unanswered, help us to find answer for this one

73. What should be considered when specifying an optimization level?

Answer

Correct Answer: A query's use of static or dynamic SQL.

Note: This Question is unanswered, help us to find answer for this one

74. What condition would lead to distribution statistics not being collected?

Answer

Correct Answer: Unique data values.

Note: This Question is unanswered, help us to find answer for this one

75. Where would the optimizer gather information to estimate the amount of prefetching for a tablespace?

Answer

Correct Answer: The PREFETCHSIZE and EXTENTSIZE columns in SYSCAT.TABLESPACES.

Note: This Question is unanswered, help us to find answer for this one

76. At which of the following times is the access control authorization routine (DSNX@XAC) invoked?

Answer

Correct Answer: At DB2 startup

Note: This Question is unanswered, help us to find answer for this one

77. If an object is created statically by a role within a trusted context and the ROLE AS OBJECT OWNER clause is specified, who becomes the object owner when executing the package?

Answer

Correct Answer: The role

Note: This Question is unanswered, help us to find answer for this one

78. Which of the following can be changed with an ALTER statement

Answer

Correct Answer: Tablespace

Note: This Question is unanswered, help us to find answer for this one

79. What is the parameter to configure the default database path?

Answer

Correct Answer: dftdbpath

Note: This Question is unanswered, help us to find answer for this one

80. What does it mean if the the null indicator = -2

Answer

Correct Answer: The field value is truncated

Note: This Question is unanswered, help us to find answer for this one

81. Which of the following is an important step in developing a performance-improvement process?

Answer

Correct Answer: Make one adjustment at a time.

Note: This Question is unanswered, help us to find answer for this one

82. Which two of the following identify which users have SYSCTRL authority?

Answer

Correct Answer: D&E

Note: This Question is unanswered, help us to find answer for this one

83. What is a scenario in which you would be using a single buffer pool?

Answer

Correct Answer: You are working on a test system.

Note: This Question is unanswered, help us to find answer for this one

84. What calculation can you use to estimate your overhead cost?

Answer

Correct Answer: Average seek time in miliseconds + (0.5 * rotational latency)

Note: This Question is unanswered, help us to find answer for this one

85. What are EDUs responsible for?

Answer

Correct Answer: EDUs process most of the SQL processing for applications.

Note: This Question is unanswered, help us to find answer for this one

86. Under what context is pushdown analysis utilized?

Answer

Correct Answer: Use with a federated database.

Note: This Question is unanswered, help us to find answer for this one

87. After entering a query, what is the first step the SQL compiler takes?

Answer

Correct Answer: Parsing the query.

Note: This Question is unanswered, help us to find answer for this one

88. Which of the following must be set to restrict clients from being able to discover any DB2 instances on a server?

Answer

Correct Answer: DB2 Administration Server configuration parameter DISCOVER to DISABLE

Note: This Question is unanswered, help us to find answer for this one

89. In a UNIX-based environment, where would the database manager configuration file be found?

Answer

Correct Answer: The sqllib subdirectory.

Note: This Question is unanswered, help us to find answer for this one

90. Why would you need to execute RUNSTATS regularly when using the SQL compiler?

Answer

Correct Answer: Executing RUNSTATS provides the most current data which is used by the optimizer to create an effective access plan.

Note: This Question is unanswered, help us to find answer for this one

91. I have 5 SQL Select statements connected by a Union/Union All. How many times should I have to specificy union to eliminate duplicate rows?

Answer

Correct Answer: Once

Note: This Question is unanswered, help us to find answer for this one

92. What is the benefit of prefetching data?

Answer

Correct Answer: It holds frequently accessed data in memory.

Note: This Question is unanswered, help us to find answer for this one

93. What is a DB2 IMAGECOPY

Answer

Correct Answer: It's a full backup of a table which can be used in recovery

Note: This Question is unanswered, help us to find answer for this one

94. Which of the following DB2 objects allows multiple users to access data in a table with each user only being able to access certain portions of the data?

Answer

Correct Answer: View

Note: This Question is unanswered, help us to find answer for this one

95. When working with concurrency controls, what happens when the number of locks held on rows and tables is equal to the percentage of the locklist specified by maxlocks?

Answer

Correct Answer: Lock escalation.

Note: This Question is unanswered, help us to find answer for this one

96. Why is the deadlock detector an important part of DB2 architecture?

Answer

Correct Answer: When a computational stalemate occurs, an external application is necessary to break the deadlock.

Note: This Question is unanswered, help us to find answer for this one

97. Given the code: EXEC SQL DECLARE cursor1 CURSOR FOR SELECT name, age, b_date FROM person; EXEC SQL OPEN cursor1; Under which of the following situations will the above cursor be implicitly closed?

Answer

Correct Answer: When a COMMIT statement is issued

Note: This Question is unanswered, help us to find answer for this one

98. Why is a primary key needed on a table?

Answer

Correct Answer: To ensure referential integrity between tables

Note: This Question is unanswered, help us to find answer for this one

99. Is the autorestart parameter configurable on-line?

Answer

Correct Answer: Yes.

Note: This Question is unanswered, help us to find answer for this one

100. Which of the following is a parameter that would specify the maximum size of a memory segment?

Answer

Correct Answer: dbheap

Note: This Question is unanswered, help us to find answer for this one

101. When is it best to tune your system?

Answer

Correct Answer: When you have identified the constraints needed to be relieved.

Note: This Question is unanswered, help us to find answer for this one

102. REORG is a function that organizes data on physical storage to recluster rows, positioning overflowed rows to reclaim space and to free up space. When is it used?

Answer

Correct Answer: (All of these)

Note: This Question is unanswered, help us to find answer for this one

103. What is an example of an instance when the database manager would allocate memory?

Answer

Correct Answer: When an application connects to the database.

Note: This Question is unanswered, help us to find answer for this one

104. If you wish to update your statistics after a change in your database, what utility can be executed?

Answer

Correct Answer: RUNSTATS

Note: This Question is unanswered, help us to find answer for this one

105. What is an example of an environmental consideration in DB2 administration?

Answer

Correct Answer: Federated databases being affected by server options.

Note: This Question is unanswered, help us to find answer for this one

106. Which of the following are fields from SQLCA

Answer

Correct Answer: (All of these)

Note: This Question is unanswered, help us to find answer for this one

107. When would phantom read phenomenon occur?

Answer

Correct Answer: When another application inserts new data or updates existing data that would satisfy your application's query.

Note: This Question is unanswered, help us to find answer for this one

108. On the client side, what is linked with the DB2 Universal Database client library?

Answer

Correct Answer: Local or remote applications, or both.

Note: This Question is unanswered, help us to find answer for this one

109. Which of the following is required to use the IMPORT utility to import data into a table?

Answer

Correct Answer: INSERT privilege on the table

Note: This Question is unanswered, help us to find answer for this one

110. Why would you want to specify an optimization class when compiling an SQL query?

Answer

Correct Answer: So the optimizer chooses the most efficient access plan for that query.

Note: This Question is unanswered, help us to find answer for this one

111. When writing a query with a primary key, how would the DISTINCT clause be applied?

Answer

Correct Answer: It would not be applied. The DISTINCT clause is redundant.

Note: This Question is unanswered, help us to find answer for this one

112. Which two of the following types of storage management methods are supported by DB2 OLAP Server?

Answer

Correct Answer: Both Hierarchical and Network

Note: This Question is unanswered, help us to find answer for this one

113. A DBA wishes to audit all access to the non-audited table OWNER.Smartemp. Assuming no audit traces are started, which of the following steps are needed to audit access to this table?

Answer

Correct Answer: - -START TRACE AUDIT CLASS (4,5) and ALTER TABLE OWNER.Smartemp AUDIT ALL

Note: This Question is unanswered, help us to find answer for this one

114. What object types is the lock mode S (Share) applicable to?

Answer

Correct Answer: Rows, blocks, and tables.

Note: This Question is unanswered, help us to find answer for this one

115. What is a federated database?

Answer

Correct Answer: A federated database is a system including a DB2 DBMS (federated database) and one or more data sources.

Note: This Question is unanswered, help us to find answer for this one