« Adobe ACE國際認證考試介紹51-pass題庫網提供650-177最新題庫 »

想輕松通過000-541認證考試嗎?

想輕松通過000-541認證考試嗎?51-pass專業IT講師幫助您輕松過關。先附上部份考題供大家參考,更多考题請登陸www.51-pass.com題庫網。

Exam Number/Code: 000-541

Exam Name: DB2 9.7 DBA for Linux UNIX and Windows

Questions and Answers: 120Q&As

 

Updated:5-28-2010

1. Given the DDL shown below:

CREATE TABLE tab1 (coll SMALLINT );
CREATE VIEW v1 AS SELECT coll FROMtabl WHERE coll > 25 ;
CREATE VIEW V2 AS SELECT COI1 FROM v1 WITH CASCADED CHECK OPTION
CREATE VIEW v3 AS SELECT coll FROM v2 WHERE coll < 100 ;
Which statement will fail?
A. INSERT INTO v2 VALUES (35)
B. INSERT INTO v1 VALUES (5)
C. INSERT INTO v3 VALUES (25)
D. INSERT INTO v3 VALUES (200)
Answer: C
 
2. Click the Exhibit button
Given the INSERT statements shown below:
INSERT INTO applicant VALUES (1 ,’M’ 54);
INSERT INTO applicant VALUES (2, 'F’, 38);
INSERT INTO applicant VALUES (3, ‘M’, 21);
INSERT INTO applicant VALUES (4, 'F’, 91);
INSERT INTO applicant VALUES (5, 'C’, 50);
INSERT INTO applicant VALUES (6, 'C’, 70);
INSERT INTO applicant VALUES (7, 'C’, 95);
How many rows will be successfully inserted?
A. 1
B. 3
C. 5
D. 7
Answer: C
 
3. Which statement is correct about informational constraints?
A. An informational constraint can be used by the SQL compiler to improve
the access to data and query performance.
B. The database manager uses an informational constraint to enforce the
uniqueness of the key during changes to the columns of the unique constraint.
C. An informational constraint is a column or combination of columns that
has the same properties as a unique constraint.
D. An informational constraint specifies that every row that is inserted or
updated in the table must conform to the definition of the table.
Answer: A
 
4. Click the Exhibit button.
In the exhibit, where would the authentication of the supplied userid and
password from a remote client take place?
 
A. AIX operating system
B. LDAP Server
C. Kerberos Server
D. "MyPlugin.so" GSS-API plug-in
 
Answer: B
 
5. Which two plug-in types does the DB2 database system provide? (Choose two.)
A. Group retrieval
B. Kerberos authentication
C. Server authentication
D. Encryption authentication
 
Answer: A C
 
6. What are three authorization categories in DB2? (Choose three.)
A System-level
B Database-level
C Network-level
D Object-level
E Instance-level
Answer: ABD
 
7. What are three system and database level authorizations available with
DB2? (Choose three.)
A SYSMON
B SYSMNT
C DBCTRL
D SYS ADM
E DBADM
Answer: A D E
 
8. A DBA wants to use Label Based Access Control (LBAC) to protect Individual
rows in a table.
Which data type must be used to create a column to hold the necessary LBAC
security data?
A. SYSPR0C.DB2LBACU\BEL
B. SYSPR0C.DB2SECURITYU\BEL
C. SYSIBM .DB2LBACLABEL
D. SYSIBM .DB2SECURITYLABEL
Answer: D
 
9. Which administrative authority is needed to run the audit stored procedures
and table functions such as the AUDIT_DELIM_EXTRACT stored procedure?
A DBADM
B SECADM
C SQLADM
D SYS ADM
Answer: B
 
10. How does the DB2 Server identify the list of GSS-API plug-ins it supports?
A. by using the SRVCON_GSSPLUGIN_LIST database manager configuration
parameter
B. by using the SRVCON_GSSPLUGIN_LIST registry variable
C. by using the SRVSUPP_GSSPLUGIN_LIST database manager configuration
parameter
D. by using the SRVSUPP_GSSPLUGIN_LIST registry variable
Answer: A

发表评论:

◎欢迎参与讨论,请在这里发表您的看法、交流您的观点。