IBM Certification Interview Questions

 
1.
Explain What are three advantages of fragmentation?

A. higher availability
B. reduced disk space requirements
C. parallel scans are possible with PDQ
D. finer granularity of archives and resources
2.
Explain Given the following SQL statement: GRANT REFERENCES ON TABLE tab1 TO USER usera
Which of the following describes what USERA is allowed to do?
A.Create a read?only view using TAB1. B.Alter TAB1 to add a check constraint.
C.Define a primary key or unique constraint on TAB1.
D.Define a dependent table where TAB1 is the parent.
3.
What help ensure that the XIV Systems cache does not become a bottleneck?

A. central cache locking mechanism
B. use of industry standard chip technology
C. each module is responsible for caching the data in that module
D. having all modules understand what is held cache at all times
4.
Which statement fragments a table as round robin?

A. FRAGMENT AS ROUND ROBIN IN dbspace 1, dbspace 2
B. FRAGMENT TABLE BY ROUND ROBIN IN dbspace1, dbspace 2
C. FRAGMENT BY ROUND ROBIN IN dbspace1, dbspace 2
D. FRAGMENT BY ROUND ROBIN
5.
Which of the following can be kept in memory when the DB2 configuration parameter
KEEPFENCED is enabled?

A. SQLDAS after their cursor is closed. B. Referential integrity maps after a join.
C. Stored procedure processes after they are run.
D. Tables after they have been read into the buffer pool.
6.
Explain Which of the following commands will allow a Linux on iSeries administrator to quickly scan backup tapes for files saved via a tar command on a Linux system?

A The Linux command mt
B The Linux command cpio
C The OS/400 command RST option(*print)
D The OS/400 command DSPTAP option(*savrst)
7.
Suppose A customer has ordered a 10 module XIV System. How many interface modules are active in this configuration?
8.
What is a requirement to connect a V6R1 IBM i host to an XIV Storage System?

A. XIV firmware V10.0.8
B. Host Attachment Kit V1.0.1
C. SAN Volume Controller (SVC)V4.2
D. Virtual I/O Server (VIOS) V2.1.1
9.
Which statement correctly changes the next extent size?

A. ALTER TABLE customer MODIFY NEXT SIZE 300
B. ALTER TABLE customer MODIFY NEXT EXTENT SIZE 300
C. ALTER TABLE customer MODIFY EXTENT SIZE 300
D. ALTER TABLE customer NEXT SIZE 300
10.
Explain Which two solutions, once installed and configured, can be used to move workloads without disruption? (Choose two)

A. XIV partitions
B. XIV Data Mover (XDM)
C. SAN Volume Controller
D. XIV Data Migration Function
E. Tivoli Storage Productivity Center for Replication V4
11.
Explain Which two types of fragmentation are allowed in a CREATE TABLE statement?

A. disk striping
B. dbspace
C. indexing
D. round robin
E. mirroring F. tblspace G. sorting
H. expression
12.
A VM/VSE customer wants to implement a WAS on an existing zSeries server. On which of the following operating environments would WAS best be implemented?

A. VSE
B. z/VM
C. z/OS
D. Linux
13.
How To improve system redundancy using its grid architecture, where in the XIV System can a partition be mirrored?

A. on disks in other modules
B. on same disk in different modules
C. on different disks in the same module
D. on same disk, in same module, and in different modules
14.
Explain Which of the following tools is used to create subscription sets and add subscription?set members to subscription sets?
A.Journal
B.License Center
C.Replication Center
D.Development Center
15.
Explain Which two of the following SQL data types should be used to store a small binary image?
A.CLOB
B.BLOB
C.VARCHAR
D.GRAPHIC
E.VARCHAR FOR BIT DATA
16.
Suppose a customer is planning to create a non-hosted Linux partition on an i825. Linux will have only direct-attach devices. What is the Linux console option?

A Use OS/400 VNC support.
B Telnet to the virtual console.
C Share the primary partitions console.
D Allocate a console IOA to the Linux partition.
17.
Where is fragment information stored?

A. in the system catalog tables
B. in the physical logs
C. in the reserved pages
D. in the first page of the database tblspace
18.
What is a chunk when using raw devices?

A. a contiguous unit of disk space
B. a dynamic unit of disk space
C. a location in shared memory
D. a data table
19.
Which three can be locked?

A. a row
B. a page
C. a column
D. a key
E. shared memory
20.
Which of the following tools can be used to identify inefficient SQL statements without executing them?
A.QMF
B.Task Center
C.Visual Explain
D.Development Center
21.
Which two of the following table space attributes can be changes after the table space has been created?

A. Page size
B. Extent size
C. Transfer rate
D. Table space type
E. Table space name
22.
Explain Which isolation level does a database without logging default to?

A. committed read
B. dirty read
C. mode ANSI
D. repeatable read
23.
In which two situations would you use a round robin fragmentation strategy?

A. When all fragments must be second
B. To create uneven data distributions
C. When queries perform sequential scans and you have little information about the data being stored.
D. When tables are accessed with a high degree of selectivity
24.
Explain If there is a lock on an adjacent key, an insert will fail if the isolation level is set to what?

A. committed read
B. repeatable read
C. share read
D. indexed read
25.
Suppose a System z customer has a new CIO. The CIO is concerned about continuing operations and recovery following a catastrophe.
Which of the following addresses this issue?

A. GDPS
B. TAM
C. DR
D. WASS
26.
Explain What is database administration NOT concerned with?

A. indexing
B. creating tables
C. accessing data
D. application building
27.
Explain Which of the following is required for the DB2 optimizer to consider a hash join strategy?

A. Equijion predicates
B. Optimization level 1 or above
C. Registry variable DB_ANTIJOIN=YES
D. SORTHEAP large enough to contain the tables being joined
28.
Suppose a customer is attempting to determine what failed during the last boot sequence of the Linux
partition. Which of the following can be used to determine the error condition?

A /var/log/messages
B /proc/startup
C /usr/sbin/log
D /etc/boot
29.
Which of the following extenders allows data to be presented in a three?dimensional format?
A.DB2 AVI Extender
B.DB2 XML Extender
C.DB2 Text Extender
D.DB2 Spatial Extender
30.
Explain Which of the following commands will format a new disk drive partition in Linux on iSeries?

A mkts -e2
B mkfs.ext2
C mkfs -ext2 &It;path to device >
D mkfs format -e2
31.
Explain When creating a regular DMS table space, what is the minimum number of extents that must be specified?

A. 1
B. 3
C. 4
D. 6
E. 8
32.
The DBA can set the registry variable DB2_HASH_JOIN on or off because:
A. hash joins may require more resources to run.
B. hash joins are not used unless outer joins are requested.
C. If hash joins are enabled, no other join method can be used.
D. Hash joins are only needed when the tables are portioned using hash keys.
33.
Suppose an application bound with isolation level Uncommitted Read updates a row. Which of the following is true regarding the locking of this row?
A.No row lock is acquired when the row is updated.
B.The row lock is released when the cursor accessing the row is closed.
C.The row lock is released when the application issues a COMMIT statement.
D.The row lock is released when the cursor accessing the row is moved to the next row.
34.
When Disk space for a table is allocated in one or more units called what?

A. tblspaces
B. extents
C. blobs
D. chunks
35.
Explain Which of the following DB2 data types CANNOT be used to contain the date an employee was hired?
A.CLOB
B.TIME
C.VARCHAR
D.TIMESTAMP
36.
Explain the Given following DDL statement
CREATE TABLE RMW TABEL46″
11″ INTEGER
D11″ DECIMAL (1′0)NOT NULL
D12″ DECIMAL (1′0) NOT NULL
S7″ SMALLINT
C8″ CHAR(1) WITH DEFAULT)
organize by (
(D12″ ;D11″))
How many indexes will be created?

A. 1
B. 2
C. 3
D. 4
37.
Suppose an installed z/OS customer also has Power6 Servers. They are investigating consolidation of both types of servers to z/OS.
Which of the following will establish the capacity for a new z/OS server?

A. AD Tools
B. Estimate the AIX load and add to CP3000 results.
C. CP3000
D. Run AIX in a z/OS LPAR to establish the loadWArialTimes New RomanZ
38.
Explain With database logging, where are transaction records first placed?

A. in a temporary database table
B. in the logical log buffer
C. in the primary chunk
D. in the physical buffer