Explore topic-wise MCQs in Certification Questions.

This section includes 28 Mcqs, each offering curated multiple-choice questions to sharpen your Certification Questions knowledge and support exam preparation. Choose a topic below to get started.

1.

With database logging, where are transaction records first placed?

A. in the logical log buffer
B. in the primary chunk
C. in the physical buffer
D. in a temporary database table
Answer» B. in the primary chunk
2.

Which statement fragments a table as round robin?

A. FRAGMENT AS ROUND ROBIN IN dbspace 1, dbspace 2
B. FRAGMENT BY ROUND ROBIN IN dbspace1, dbspace 2
C. FRAGMENT TABLE BY ROUND ROBIN IN dbspace1, dbspace 2
D. FRAGMENT BY ROUND ROBIN
Answer» C. FRAGMENT TABLE BY ROUND ROBIN IN dbspace1, dbspace 2
3.

Which of the following tools can be used to identify inefficient SQL statements without executing them?

A. QMF
B. Task Center
C. Visual Explain
D. Development Center
Answer» D. Development Center
4.

Which statement correctly changes the next extent size?

A. ALTER TABLE customer MODIFY NEXT SIZE 300
B. ALTER TABLE customer MODIFY NEXT EXTENT SIZE 300
C. ALTER TABLE customer MODIFY EXTENT SIZE 300
D. ALTER TABLE customer NEXT SIZE 300
Answer» B. ALTER TABLE customer MODIFY NEXT EXTENT SIZE 300
5.

which of the following represents a set of properties that guarantee that database transactions are processed reliably in computer science ?

A. Buffer Cache
B. ACID
C. Foreign Key
D. None
Answer» C. Foreign Key
6.

Which of the following tools is used to create subscription sets and add subscription?set members to subscription sets?

A. Journal
B. License Center
C. Replication Center
D. Development Center
Answer» D. Development Center
7.

Which of the following extenders allows data to be presented in a three dimensional format?

A. DB2 AVI Extender
B. DB2 XML Extender
C. DB2 Text Extender
D. DB2 Spatial Extender
Answer» E.
8.

Which of the following commands will allow a Linux on iSeries administrator to quickly scan backup tapes for files saved via a tar command on a Linux system?

A. The Linux command mt
B. The Linux command cpio
C. The OS/400 command RST option(*print)
D. The OS/400 command DSPTAP option(*savrst)
Answer» C. The OS/400 command RST option(*print)
9.

Which of the following DB2 data types CANNOT be used to contain the date an employee was hired?

A. CLOB
B. TIME
C. VARCHAR
D. TIMESTAMP
Answer» C. VARCHAR
10.

Where is fragment information stored?

A. in the physical logs
B. in the reserved pages
C. in the system catalog tables
D. in the first page of the database tblspace
Answer» D. in the first page of the database tblspace
11.

Which of the following can be kept in memory when the DB2 configuration parameter KEEPFENCED is enabled?

A. SQLDAS after their cursor is closed.
B. Referential integrity maps after a join.
C. Stored procedure processes after they are run.
D. Tables after they have been read into the buffer pool.
Answer» D. Tables after they have been read into the buffer pool.
12.

What is a requirement to connect a V6R1 IBM i host to an XIV Storage System?

A. XIV firmware V10.0.8
B. Host Attachment Kit V1.0.1
C. SAN Volume Controller (SVC)V4.2
D. Virtual I/O Server (VIOS) V2.1.1
Answer» E.
13.

Suppose an installed z/OS customer also has Power6 Servers. They are investigating consolidation of both types of servers to z/OS.Which of the following will establish the capacity for a new z/OS server?

A. AD Tools
B. CP3000
C. Estimate the AIX load and add to CP3000 results.
D. Run AIX in a z/OS LPAR to establish the loadWArialTimes New RomanZ
Answer» D. Run AIX in a z/OS LPAR to establish the loadWArialTimes New RomanZ
14.

The DBA can set the registry variable DB2_HASH_JOIN on or off because:

A. hash joins may require more resources to run.
B. hash joins are not used unless outer joins are requested.
C. If hash joins are enabled, no other join method can be used.
D. Hash joins are only needed when the tables are portioned using hash keys.
Answer» B. hash joins are not used unless outer joins are requested.
15.

What is a chunk when using raw devices?

A. a dynamic unit of disk space
B. a location in shared memory
C. a contiguous unit of disk space
D. a data table
Answer» D. a data table
16.

What help ensure that the XIV Systems cache does not become a bottleneck?

A. central cache locking mechanism
B. use of industry standard chip technology
C. each module is responsible for caching the data in that module
D. having all modules understand what is held cache at all times
Answer» D. having all modules understand what is held cache at all times
17.

Suppose a System z customer has a new CIO. The CIO is concerned about continuing operations and recovery following a catastrophe.Which of the following addresses this issue?

A. GDPS
B. TAM
C. DR
D. WASS
Answer» B. TAM
18.

Suppose a customer is planning to create a non-hosted Linux partition on an i825. Linux will have only direct-attach devices. What is the Linux console option?

A. Use OS/400 VNC support.
B. Telnet to the virtual console.
C. Share the primary partitions console.
D. Allocate a console IOA to the Linux partition.
Answer» C. Share the primary partitions console.
19.

Suppose a customer is attempting to determine what failed during the last boot sequence of the Linux partition. Which of the following can be used to determine the error condition?

A. /var/log/messages
B. /proc/startup
C. /usr/sbin/log
D. /etc/boot
Answer» B. /proc/startup
20.

Proxy servers have two main purposes :_x005F_x000D_ 1. Improve Performance  (and)_x005F_x000D_ 2.  is  ______ ?

A. Transmit Request
B. Decrease Requests
C. Increase Requests
D. Filter Requests
Answer» E.
21.

If there is a lock on an adjacent key, an insert will fail if the isolation level is set to what?

A. committed read
B. repeatable read
C. share read
D. indexed read
Answer» C. share read
22.

How To improve system redundancy using its grid architecture, where in the XIV System can a partition be mirrored?

A. on same disk in different modules
B. on disks in other modules
C. on different disks in the same module
D. on same disk, in same module, and in different modules
Answer» C. on different disks in the same module
23.

Which of the following is required for the DB2 optimizer to consider a hash join strategy?

A. Optimization level 1 or above
B. Equijion predicates
C. Registry variable DB_ANTIJOIN=YES
D. SORTHEAP large enough to contain the tables being joined
Answer» C. Registry variable DB_ANTIJOIN=YES
24.

A solution developer needs to configure the HTTP listener of an Integration Server on a Linux Server._x005F_x000D_ Which operating system privileges does the developer need to modify Integration nodeproperties and properties of integration node resources?

A. root user
B. mqm
C. mqbrks
D. mqm and mqbrks
Answer» B. mqm
25.

A VM/VSE customer wants to implement a WAS on an existing zSeries server. On which of the following operating environments would WAS best be implemented?

A. VSE
B. z/VM
C. z/OS
D. Linux
Answer» E.
26.

Explain Given the following SQL statement: GRANT REFERENCES ON TABLE tab1 TO USER usera.Which of the following describes what USERA is allowed to do?

A. Create a read?only view using TAB1.
B. Alter TAB1 to add a check constraint.
C. Define a primary key or unique constraint on TAB1.
D. Define a dependent table where TAB1 is the parent.
Answer» E.
27.

Which isolation level does a database without logging default to?

A. committed read
B. dirty read
C. mode ANSI
D. repeatable read
Answer» C. mode ANSI
28.

What are the advantages of fragmentation?

A. reduced disk space requirements
B. higher availability
C. finer granularity of archives and resources
D. parallel scans are possible with PDQ
Answer» C. finer granularity of archives and resources