Your success in IBM C2090-612 is our sole target and we develop all our C2090-612 braindumps in a way that facilitates the attainment of this target. Not only is our C2090-612 study material the best you can find, it is also the most detailed and the most updated. C2090-612 Practice Exams for IBM C2090-612 are written to the highest standards of technical accuracy.


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for IBM C2090-612 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW C2090-612 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/C2090-612-exam-dumps.html

Q41. In which situation does adding a referential constraint place a table space containing data into check-pending status? 

A. When a primary key is defined on a table with no unique index. 

B. When a foreign key is defined on a table with the ENFORCED option. 

C. When a foreign key is defined on a table and a corresponding primary key has not been defined. 

D. When a foreign key is defined on a table with NOT ENFORCED option and a unique index has not been defined. 

Answer:

Explanation: 


Q42. Which connection type can exploit trusted connections? 

A. IMS 

B. CAF 

C. CICS 

D. RRSAF 

Answer:

Explanation: 


Q43. The billing application has a DB2 referential integrity set of three tables. TABA, TABB and TABC. Daily, Full Image copies are done for the three table spaces related to the three tables. There is a requirement to recover the three table spaces to noon time, which is about 8 hours after the full image copies were run. Which one of the following statements is true about this recovery situation? 

A. Recovery will need to be done on the children table first. 

B. No recovery is allowed since the tables have been updated. 

C. No recovery is allowed, a QUIESCE utility is missing to create a point of consistency. 

D. BSDS contains information useful to find an appropriate RBA to use for the TORBA value. 

Answer:

Explanation: 


Q44. Which DB2 performance feature is designed specifically to reduce the number of indexes that need to be created? 

A. Inline LOBs. 

B. Include columns. 

C. Hash row access. 

D. Direct row access. 

Answer:

Explanation: 


Q45. When determining what page size will be best for index compression, which utility can be used to provide information on space saved and potential buffer space wasted for each of the different page sizes? 

A. DIAGNOSE 

B. DSN1COMP 

C. DSN1PRNT 

D. DSN1LOGP 

Answer:

Explanation: 


Q46. In determining whether a REORG on an index space would improve performance, which two of the following columns would NOT be needed? (Choose two.) 

A. Column CLUSTERING in SYSIBM.SYSINDEXES 

B. Column LEAFDIST in SYSIBM.SYSINDEXPART 

C. Column CLUSTERRATIOF in SYSIBM.SYSINDEXES 

D. Column LASTUSED in SYSIBM.SYSINDEXSPACESTATS 

E. Columns LEAFNEAR and LEAFFAR in SYSIBM.SYSINDEXPART 

Answer: A,D 

Explanation: 


Q47. If security administration is separated from system and database administration, via zparm, which level of authority is required to define roles or trusted contexts? 

A. SYSADM 

B. DBADM 

C. SECADM 

D. INSTALL SYSOPR 

Answer:

Explanation: 


Q48. When planning for backup/recovery (including disaster recovery), which statement is correct? 

A. When you remote copy everything (PPRC, XRC) there is no need to take DB2 image copies anymore. 

B. As data is shared in a data sharing group, disaster recovery in a data sharing environment is identical to a non-data sharing environment. 

C. System level backups (BACKUP SYSTEM) can be used for both system wide restore on a remote site, as well as the recovery of individual objects locally. 

D. When you want to create a consistent backup point, you must use the -SET LOG SUSPEND command to freeze all activity, and then take your backups with whatever technology you prefer. 

Answer:

Explanation: 


Q49. An EBCDIC table t1 and a UNICODE table t2 are joined by t1.col1=t2.col2. Which statement is true? 

A. col2 is converted to EBCDIC 

B. col1 is converted to UNICODE 

C. SQLCode-270: Function not supported 

D. col2 and col1 are converted to UTF-32 

Answer:

Explanation: 


Q50. What is the one significant difference between sequence objects and identity columns? 

A. Identity columns can cache values and sequence objects cannot. 

B. Identity columns can be defined on tables and sequence objects cannot. 

C. Sequence objects can have a character data type and identity columns cannot. 

D. Sequence object values can be used as primary keys and identity column values cannot. 

Answer:

Explanation: