New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Note! Following C2090-619 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

C2090-619 Exam Dumps - IBM Informix 12.10 System Administrator

Go to page:
Question # 9

Which two statements are true? (Choose two.)

A.

Logical log files must always reside in rootdbs.

B.

Having too little log space does not affect performance.

C.

Having too much log space does not affect performance.

D.

Simple large objects in blobspaces are not logged and they are included in the log backup in which the object was created.

E.

Simple large objects in blobspaces are not logged and they are not included in the log backup in which the object was created.

Full Access
Question # 10

To potentially return unused extent pages to the chunk free list, an Informix administrator would execute which storage optimization operation?

A.

Shrink

B.

Repack

C.

Compress

D.

Defragment

Full Access
Question # 11

Which statement accurately describes the mapped user functionality in Informix?

A.

The DBSA can control the access to the database at the table level by creating different security labels for each user.

B.

The DBSA can create different roles for each user in order to verify whether the user who is attempting an operation has the necessaryprivileges.

C.

The DBSA can configure the server to allow database access by external users who do not have operating system accounts on the hostcomputer.

D.

The DBSA can grant access to the database server to users of the host computer operating system by implementing different authenticationmechanisms for each user.

Full Access
Question # 12

Which step must be performed to enable Secure Socket Layer (SSL) connections to Informix?

A.

Configure encrypt virtual processors in the ONCONFIG file.

B.

Configure poll threads for SSL connections in the ONCONFIG file.

C.

Specify the SSL connection protocol in the sqlhosts file or registry entry.

D.

Specify the name of the label of the server digital certificate in the ONCONFIG file.

Full Access
Question # 13

The DBA wants to define a replicate as follows:

Which condition must be true for the command to execute successfully?

A.

The table table1 should have col1 as its primary key.

B.

The table table1 should have CRCOLS shadow columns.

C.

The table table1 should have a constraint on column col1.

D.

The table table1 should have an unique index on column col2.

Full Access
Question # 14

Which ONCONFIG parameter would you use to disable the automatic creation or extension of chunks?

A.

SP_WAITTIME

B.

SP_THRESHOLD

C.

SP_AUTOEXPAND

D.

SP_CHUNKEXTEND

Full Access
Question # 15

The DBA updated the uto_crsd?Scheduler task in the SYSADMIN database with the following SQL commands:The DBA updated the ?uto_crsd?Scheduler task in the SYSADMIN database with the following SQL commands: UPDATE ph_task SET tk_enable = ?WHERE tk_name = uto_crsd?UPDATE ph_task SET tk_enable = ??WHERE tk_name = ?uto_crsd? UPDATE ph_threshold SET value = ?WHERE name = UTODEFRAG_ENABLED?UPDATE ph_threshold SET value = ??WHERE name = ?UTODEFRAG_ENABLED? UPDATE ph_threshold SET value = ?000?WHERE name = UTOCOMPRESS_ROWS?UPDATE ph_threshold SET value = ?000?WHERE name = ?UTOCOMPRESS_ROWS? What will be the effect of auto_crsd database scheduler task on the tables?

A.

Compress all tables with less than 5000 rows.

B.

Compress and defragment tables with more than 5000 uncompressed rows.

C.

Compress, repack and shrink tables with more than 5000 uncompressed rows.

D.

Do not compress, repack, shrink and defragment any table with more than 5000 rows.

Full Access
Question # 16

The total number of locks allocated equals the value specified by the LOCKS configuration parameter. What is the behavior of the database server when more locks are now requested?

A.

The user encounters a lock request error.

B.

More memory is allocated for additional lock structures from DS_TOTAL_MEMORY.

C.

More memory is allocated for additional lock structures in the VIRTUAL section of shared memory.

D.

More memory is allocated for additional lock structures in the RESIDENT section of shared memory.

Full Access
Go to page: