Due to a hardware failure, it appears that there may be some corruption in database DB_1 as DB2 is reporting a "bad page". DB2DART is performed for the entire database and it appears that several bad pages were detected in table space TBSP_1. What command can be used to recover the database and repair the corruption in table space TBSP_1?
A. RESTART DATABASE
B. RECOVER DATABASE
C. RESTORE TABLESPACE
D. ROLLFORWARD DATABASE
Which command will define the alternate diagnostic data directory path as /db2data/db2dump2?
A. db2set ALT_DIAGPATH=/db2data/db2dump2
B. db2set SECONDARY_DIAGPATH=/db2data/db2dump2
C. UPDATE DBM CFG USING ALT_DIAGPATH /db2data/db2dump2
D. UPDATE DBM CFG USING SECONDARY_DIAGPATH /db2data/db2dump2
In IBM Data Studio, where can you schedule script-based jobs?
A. Job Console
B. Job Manager
C. Task Manager
D. Utilities Console
Which statement about updating index statistics with the RUNSTATS command is true?
A. It requires a full index scan.
B. It can be accomplished by sampling the index.
C. It must be executed against all indexes for the table.
D. It cannot be accomplished without scanning the associated table.
Which statement describes a way to minimize the impact of a RUNSTATS operation?
A. Reduce I/O by using a shadow table space for statistics collection.
B. Execute the RUNSTATS command with the WITH DISTRIBUTION option specified.
C. Execute the RUNSTATS command with the DETAILED UNSAMPLED option specified.
D. Limit the number of pages and rows processed by using page-level or row-level table sampling.
Which statement is true regarding the workload management dispatcher?
A. The workload management dispatcher monitors work performed by entities executing in the DB2 system service class.
B. The workload management dispatcher monitors the allocation of CPU resources between service classes on a system.
C. The workload management dispatcher monitors non-DB2 work performed in fenced mode processes such as fenced stored procedures.
D. The workload management dispatcher monitors work performed by applications or middleware products that perform a portion of their workoutside of the DB2 database manager.
How can you remove all effects of compression from an index?
A. Execute the ALTER INDEX statement to turn compression off.
B. Execute the ALTER TABLE statement to turn compression off.
C. Execute the ALTER INDEX statement to turn compression off; then execute the REORG command to removed the compression dictionary.
D. Execute the ALTER TABLE statement to turn compression off; then execute the RUNSTATS command to tell the DB2 optimizer thatcompression is no longer used.
If the following statements are executed in the order shown: Which statement is true?
A. Insert, update, and delete operations can be performed against table TAB2.
B. Data stored in table TAB1 is automatically copied to table TAB2 immediately after table TAB2 is created.
C. Insert, update, and delete operations performed against table TAB1 are automatically cascaded to table TAB2.
D. The REFRESH TABLE statement must be executed before insert, update, and delete operations performed against table TAB1 will be seen intable TAB2.
Which registry variable is used to enable transparent Lightweight Directory Access Protocol (LDAP)?
A. DB2LDAP
B. DB2AUTH
C. CLNT_PW_PLUGIN
D. SRVCON_PW_PLUGIN
Which is a valid statement about the Row and Column Access Control (RCAC) feature?
A. Users with SECADM authority are exempt from RCAC rules.
B. The RCAC feature uses a subset of Label Based Access Control (LBAC) functionality.
C. RCAC is a more powerful security mechanism than Label Based Access Control (LBAC).
D. When a result set is restricted due to the RCAC rules defined on a table, no warnings or errors are returned.