In complex DB2 recovery scenarios, it is important to understand the scope of which objects require recovery.
Which DB2 utility provides a list of the names of all table spaces in the table space set that is specified and a list of all the tables in those table spaces?
A. CHECK
B. REPORT
C. QUIESCE
D. RECOVER
You execute the following SQL against the CDB (Communications Database) of your DB2 subsystem:
INSERT INTO SYSIBM.IPNAMES
(UNKNAME.SECURITY_OUT.USERNAMES,IBMREQD.IPADDR) VALUES ('REMOTEDB'. 'P\ 'O'. 'N',
*123.34.45.56');
INSERT INTO SYSIBM.IPLIST (LINKNAMEJPADDRJBMREQD) VALUES ('REMOTEDB', '123.34.45.56',
*N');
INSERT INTO SYSIBM.IPLIST (LINKNAMEJPADDRJBMREQD) VALUES C REMOTEDB', '123.34.45.57',
'N');
INSERT INTO SYSIBM.USERNAMES
(TYPE,AUTHID.LINKNAME,NEWAUTHID.PASSWORD,IBMREQD) VALUES (T, 'USER1'.
'USER2\ ", ,PWD2,1 *N');
INSERT INTO SYSIBM.USERNAMES
(TYPE,AUTHID.LINKNAME,NEWAUTHID.PASSWORDJBMREQD) VALUES ('O', 'USER1'. 'USER3', *',
'PWD3', 'N');
There is no trusted connection to REMOTEDB. USER1 issues a query addressing remote data source
REMOTEDB on your DB2 subsystem.
Which authorization id will be used on the remote data source REMOTEDB?
A. USER1
B. USER2
C. USER3
D. USER4
A column mask is defined on TB_A. Which statement runs successfully?
A. SELECT ' FROM TB_A UNION ALL SELECT ' FROM TB_B
B. SELECT ' FROM TB_A INTERSECT SELECT * FROM TB_B
C. SELECT ' FROM TB_A EXCEPT ALL SELECT ' FROM TB_B
D. SELECT'FROM TB A INTERSECT ALL SELECT * FROM TB B
Which statement regarding DSN1LOGP is FALSE?
A. DSN1 LOGP does not require DB2 privileges.
B. DSN1 LOGP runs on archive data sets when DB2 is running.
C. DSN1 LOGP can read logs that have been compressed by DFSMS.
D. DSN1 LOGP can print the log records for both base and clone table objects.
Which utility can be used to reset the copy-pending status?
A. REPAIR
B. DSNJU003
C. DSN1COPY
D. COPYTOCOPY
In order to guarantee complete security for your DB2 subsystem, which statement is correct?
A. BSDS and catalog VSAM data sets should always be protected by the SYSADM authority.
B. BSDS and catalog VSAM data sets should always be protected by the MSTR address space.
C. BSDS and catalog VSAM data sets should always be protected by an external security profile.
D. BSDS and catalog VSAM data sets should always be protected by the BSDS system privilege
Your production DB2 subsystem is up and running, the following message is received:
DSNJ126I - BSDS ERROR FORCED SINGLE BSDS MODE because one of the BSDS volumes is offline.
After the volume is back online, in order to ensure a securely running system, what is the least disruptive scenario to correct this error?
A. Run the recover BSDS utility.
B. Issue the -RECOVER BSDS command.
C. IDCAMS REPRO the correct BSDS VSAM replacing the corrupt BSDS VSAM.
D. Wait until the next stop and then start the DB2 subsystem to correct the problem.
One of your applications is experiencing long elapsed times. You notice from DB2 accounting data that 90% of the class 2 elapsed time consists of class 3 suspension time.
Which statement describes the behavior of the application?
A. The application is the victim of excessive performance tracing.
B. The application spends the majority of its time waiting on the network.
C. The application contains complex SQL statements that are CPU intensive.
D. The application spends the majority of its time waiting for buffer pool I/O and log I/O.
For migration to DB2 11, we must implement the early code (ERLY). What DB2 library contains the early code for DB2?
A. prefix.SDSNLINK
B. prefix.SDSNEXIT
C. prefix.SDSNLOD2
D. prefix.SDSNLOAD
What utility can benefit from the additional zllP (IBM System z Integrated Information Processor) enablement inDB2 11?
A. COPY
B. RUNSTATS
C. CHECK INDEX
D. MODIFY STATISTICS