1.
Which of the following techniques will ensure that you CANNOT encounter two active primary servers in an HADR pair?
2.
Which conditions must be met to implement HADR?
3.
Which command will back up a database named SAMPLE to a TSM server using two concurrent TSM client sessions?
4.
What is the proper set of steps to execute a redirected restore and change the container paths for a database not using automatic storage?
5.
Which command CANNOT be used to create the compression dictionary for a table?
6.
A database recovery operation (RECOVER DATABASE) failed during the roll forward phase. The DBA wants to force the RECOVER DATABASE to redo the restore phase. What must occur to accomplish this?
7.
A primary and standby database are enabled for HADR and are in peer state. The HADR_SYNCMODE configuration parameter is set to SYNC. An application connects to the primary database, issues a COMMIT and receives a successful return code in response. How were the log buffers for this unit of work processed?
8.
Which method should be used to construct an LBAC security component that represents a person's level of trust?
9.
What will the db2audit facility do when a DB2 database instance is stopped?
10.
If instance DB2INST1 is created and its authentication type is set to KRB_SERVER_ENCRYPT, which statement is true?