Samc2090 320
Samc2090 320
This sample test is designed to give the candidate an idea of the content and format of the questions that
will be on the certification exam. Performance on the sample test is NOT an indicator of performance on
the certification exam and this should not be considered an assessment tool.
1) Which SQL language element can be used to define a set of actions that are executed when a
DELETE, INSERT, or UPDATE operation occurs on a specified table or view?
A. A trigger
B. A special register
C. The VALUE function
D. A referential constraint
2) When a stored procedure returns a result set to the calling program, which of the following
statements is true about the two programs?
A. The OPEN and FETCH statements are both coded in the calling program
B. The OPEN and FETCH statements are both coded in the stored procedure
C. The OPEN statement is coded in the calling program and the FETCH statement is coded in the stored
procedure
D. The OPEN statement is coded in the stored procedure and the FETCH statement is coded in the
calling program
3) For an existing nonpartitioned secondary index (NPSI) with user-managed data sets, you need
to determine the following values:
Which two DB2 Catalog tables contain the information to determine these values?
A. The final view result set includes all rows of the joined tables but eliminates redundant duplicate rows
B. The view is a join of tables and is therefore read-only
C. A column named in the WHERE, GROUP BY, or HAVING clause must be part of the view
D. All possible columns defined in A.PROJ and A.EMP have been included in the view
7) A transaction reads the same row twice and needs the same value returned each time.
However, it is not concerned about new rows appearing during the course of the transaction’s
execution. Which isolation level is appropriate?
A. Read stability
B. Repeatable read
C. Cursor stability
D. Uncommitted read
A. IRLM
B. DIST
C. MSTR
D. DBM1
9) Which of the following statement describes the effect of setting the SEPARATE_SECURITY
installation parameter to YES?
10) Which of the following SECURITY values tells DB2 to use the authorization ID of the user that
calls the stored procedure to access a non DB2 resource?
A. DB2
B. RACF
C. USER
D. DEFINER
11) What are the only predicates that can be applied to an XML data type?
12) Which of the following data types would be used to specify an implicit decimal point?
A. REAL
B. FLOAT
C. NUMERIC
D. SMALLINT
13) Which of the following types of DB2 tables would you use to store information that is derived and
summarized from other tables?
A. A clone table
B. An auxiliary table
C. A materialized query table
D. A real-time statistics table
14) In a data sharing environment, to control access to data that is of inter-DB2 interest, whenever the
data is changed, DB2 caches it in which of the following objects?
Answer Key
1. A
2. D
3. C
4. B
5. A
6. C
7. A
8. A
9. D
10. C
11. A
12. C
13. C
14. B