If a single node database is actively being used by applications when a power failure occurs, what method is used to bring the database back to a consistent state once power has been restored?
A. Crash recovery
B. Version recovery
C. Disaster recovery
D. Roll-forward recovery
Where are column mask definitions stored?
A. In the table definition
B. In the system catalog
C. In the table space metadata
D. In the database configuration file
The following commands are executed against a database named MY_DB, which has been configured to use archival logging:
Which statement is true?
A. Upon completion of the Load, the table T1 is placed into "Backup Pending" state.
B. Upon completion of the Load, a backup image of table T1 is automatically generated.
C. After a Restore and Rollforward operation, table T1 would be marked unavailable and can only be dropped.
D. After a Restore and Rollforward operation, the loaded data is stored into a copy-image file and table T1 is fully available.
Which statement about the ADMIN_MOVE_TABLE procedure is true?
A. The ADMIN_MOVE_TABLE procedure immediately applies all changes that occur to data in the active (source) table during the move operationto the target table.
B. The ADMIN_MOVE_TABLE procedure stores all changes that occur to data in the active (source) table during the move to a user-suppliedstaging table so they can be replayed against the target table when the move is complete.
C. If the ADMIN_MOVE_TABLE procedure is used to move data in an active (source) table to a target table that was created beforehand, thetarget table is renamed (to the source table name) once the data has been copied into the target table.
D. If the ADMIN_MOVE_TABLE procedure is invoked with the KEEP option specified, the active (source) table will be kept and if the target table isto be created automatically, a name that is different from that of the active table must be specified for the target table.
Which XML format provides a faster way to transmit and receive XML data between Java pureXML applications and a DB2 server?
A. String
B. Binary
C. Delimited ASCII
D. Non-delimited ASCII
Which statement regarding snapshot administrative views and snapshot monitor table functions is true?
A. Snapshot administrative views cannot be used with monitor switches or monitor reset commands while snapshot table functions have no suchrestrictions.
B. Snapshot table functions cannot be used with monitor switches or monitor reset commands while snapshot administrative views have no suchrestrictions.
C. Snapshot administrative views provide the option to choose between data from a single database partition or a data subset from across alldatabase partitions while snapshot table functions provide access to data from each database partition.
D. Snapshot administrative views provide access to data from each database partition while snapshot table functions provide the option to choosebetween data from a single database partition or a data subset from across all database partitions.
Due to a hardware failure, it appears that there may be some corruption in database DB_1 as DB2 is reporting a "bad page". DB2DART is performed for the entire database and it appears that several bad pages were detected in table space TBSP_1. What command should be used to recover the database and repair the corruption in table space TBSP_1?
A. RESTART DATABASE
B. RESTORE DATABASE
C. RESTORE TABLESPACE
D. ROLLFORWARD DATABASE
Which is a valid statement about the Row and Column Access Control (RCAC) feature?
A. Users with SECADM authority are exempt from RCAC rules.
B. The RCAC feature uses a subset of Label Based Access Control (LBAC) functionality.
C. RCAC is a more powerful security mechanism than Label Based Access Control (LBAC).
D. When a result set is restricted due to the RCAC rules defined on a table, no warnings or errors are returned.
A table named SALES was created as follows:
If management wants to use Label-Based Access Control (LBAC) to protect individual columns in the SALES table, and the security policy needed (SEC_POLICY) has already been created, what must be done to protect the table as desired?
A. Associate the SEC_POLICY security policy with the SALES table.
B. Add a SECURED WITH clause to every column in the SALES table.
C. Add a column with the DB2SECURITYLABEL data type to the SALES table and then associate the SEC_POLICY security policy with the table.
D. Add a SECURED WITH clause to every column in the SALES table and then associate the SEC_POLICY security policy with the SALES table.
Which statement about triggers is FALSE?
A. A statement-level trigger fires only once for each SQL statement.
B. A trigger's code block can be executed either before or after a triggering event.
C. A row-level trigger fires once for each row that is affected by a triggering event.
D. A table-level trigger fires once for each table that is affected by a triggering event.