최신 DB2 000-546 무료샘플문제:
1. After using the lock event monitor to capture binary lock event data in an unformatted event table, you can convert the data into an XML or text document using which of the following Java-based tools?
A) db2exportevm
B) db2convertevm
C) db2evmonfmt
D) db2fmtevmon
2. Which two are valid BASED UPON CONNECTION attributes for a trusted context? (Choose two.)
A) Data stream encryption
B) Date and time
C) Database role
D) System authorization id
E) Application program name
3. Index INDEX1 has been created as follows: CREATE INDEX index1 ON table_x (cola) Which of the following actions can be done through an ALTER INDEX statement?
A) Make the COMPRESS attribute YES or NO.
B) Add a column to the index key.
C) Make this index the clustering index.
D) Change the PCTFREE specification.
4. When using an SQL UPDATE statement on an XML column, which statement is valid?
A) An SQL UPDATE statement can modify a portion of an XML column using the SUBSTR function.
B) An SQL UPDATE statement can update an XML column using an XMLQUERY transform expression.
C) An SQL UPDATE statement cannot be used on an XML column.
D) An SQL UPDATE statement on an XML column must supply the complete new XML document.
5. Regardless of the value set for the mon_obj_metrics parameter, data is always collected for monitor elements reported by which of the two following table functions? (Choose two.)
A) MON_GET_TABLESPACE
B) MON_GET_BUFFERPOOL
C) MON_GET_TABLE
D) MON_GET_CONTAINER
E) MON_GET_INDEX
질문과 대답:
질문 # 1 정답: C | 질문 # 2 정답: A,D | 질문 # 3 정답: A | 질문 # 4 정답: B | 질문 # 5 정답: C,E |