Summer Special Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 60certs

IBM C2090-619 Dumps

Page: 1 / 5
Total 130 questions

IBM Informix 12.10 System Administrator Questions and Answers

Question 1

Which Informix utility is used to print information about runtime statistics for all threads in the server?

Options:

A.

onstat -g sta

B.

onstat -g act

C.

onstat -g rea

D.

onstat -g cpu

Question 2

When you take a level 2 backup, what data is backed up?

Options:

A.

All new data since the last level 1 backup.

B.

All new data since the last level 2 backup.

C.

All logical logs which have not previously been backed up.

D.

All new data since the last level 0, level 1 or level 2 backup.

Question 3

Which two statements are true about Enterprise Replication of TimeSeries data types? (Choose two.)

Options:

A.

ATS and RIS files must be in XML format.

B.

The replicate must be a mastered replicate.

C.

The conflict resolution rule must be always-apply.

D.

The WHERE clause in the participant definition must include a TimeSeries column.

E.

CDR_TSINSTANCEID configuration parameter must be set to the same value for every replication server.

Question 4

Which step must be performed to enable Secure Socket Layer (SSL) connections to Informix?

Options:

A.

Configure encrypt virtual processors in the ONCONFIG file.

B.

Configure poll threads for SSL connections in the ONCONFIG file.

C.

Specify the SSL connection protocol in the sqlhosts file or registry entry.

D.

Specify the name of the label of the server digital certificate in the ONCONFIG file.

Question 5

What is the primary benefit of a Storage Pool?

Options:

A.

It allows data to be shared across instances.

B.

It allows data to be shared across dbspaces.

C.

It allows space to automatically be added to dbspaces.

D.

It allows space to be reserved for critical database operations.

Question 6

Which of the following is NOT possible during a non-root Informix Server installation?

Options:

A.

Role Separation

B.

Create users and groups

C.

Create a database server instance

D.

Secure the Informix installation directory

Question 7

The IBM Mobile Database is a mobile-optimized version of which IBM product?

Options:

A.

IBM DB2

B.

IBM Informix

C.

IBM solidDB

D.

IBM Cloudscape

Question 8

What security role is required for you to create trusted-context objects?

Options:

A.

AAO

B.

DBSA

C.

DBSSO

D.

DBSECADM

Question 9

Which statement is valid about Data consolidation using send-only replicates?

Options:

A.

You can have more than one target server.

B.

You cannot modify a server to change its mode to send-only.

C.

You cannot use this replicate for tables that include TimeSeries columns.

D.

You need to define a different replicate for each send-only primary server.

Question 10

Consider the following statements: DBSPACETEMP=tempdbs1, tempdbs2, tempdbs3; CREATE DATABASE mydb WITH LOG IN datadbs1; CREATE TEMP TABLE temp1 (col1 int); Which statement is true?

Options:

A.

The temp table will be created in datadbs1.

B.

The temp table will be created in root dbspace.

C.

The temp table will be careated in one of the dbspaces listed in DBSPACTEMP.

D.

The temp table will be created round-robin across the dbspaces in DBSPACETEMP.

Question 11

Which Enterprise Replication command CANNOT be used on replicates that include TimeSeries columns?

Options:

A.

cdr start

B.

cdr sync

C.

cdr realize

D.

cdr remaster

Question 12

Which two technologies use the ENCRYPT_MAC configuration parameter to control the level of message authentication code (MAC) generation? (Choose two.)

Options:

A.

On-disk encryption

B.

Enterprise Replication

C.

Column level encryption

D.

High-Availability Data Replication

E.

Server-to-server distributed query communication

Question 13

Which statement is true regarding the selective row-level auditing feature in Informix?

Options:

A.

You can create audit masks corresponding to row-level events of a specific table.

B.

Selective row-level auditing must be explicitly turned on using the onshowaudit utility.

C.

When you create a table, you can specify if row-level auditing should be enabled for the table.

D.

When you create a database, you can specify if row-level auditing should be enabled for all the tables within the database.

Question 14

To potentially return unused extent pages to the chunk free list, an Informix administrator would execute which storage optimization operation?

Options:

A.

Shrink

B.

Repack

C.

Compress

D.

Defragment

Question 15

The DBA wants to define a replicate as follows:

Which condition must be true for the command to execute successfully?

Options:

A.

The table table1 should have col1 as its primary key.

B.

The table table1 should have CRCOLS shadow columns.

C.

The table table1 should have a constraint on column col1.

D.

The table table1 should have an unique index on column col2.

Question 16

An Informix server is configured with multiple CPU VPs and poll threads and is experiencing NSF lock errors. What action should be taken to reduce the network shared file lock contention?

Options:

A.

Increase the value of MAX_INCOMPLETE_CONNECTIONS.

B.

Increase the value of NUMFDSERVERS and add more poll threads.

C.

Increase the value of NUMFDSERVERS and increase the number of MSC VPs.

D.

Increase the network buffer pool using the IFX_NETBUF_PVTPOOL_SIZE environment variable.

Question 17

Which configuration parameter should be set to enable asynchronous page requests when the database server detects that a query is waiting on I/O?

Options:

A.

DIRECT_IO

B.

DBUPSPACE

C.

AUTO_AIOVPS

D.

AUTO_READAHEAD

Question 18

The Rolling Window clause of the ALTER FRAGMENT MODIFY INTERVAL statement CANNOT define a purging policy on a table that has which two attributes? (Choose two.)

Options:

A.

The table has a ROWID shadow column.

B.

The table has a Fragment By Range index.

C.

The table has a Unique Key being used by ER.

D.

The Fragment Key is defined with multiple columns.

E.

The Primary Key for the table is referenced by a foreign key constraint.

Question 19

Where must the HA_FOC_ORDER configuration parameter be set?

Options:

A.

Any server in the cluster.

B.

The primary server only.

C.

The SDS secondary only.

D.

The HDR secondary only.

Page: 1 / 5
Total 130 questions