IBM Certification Interview Questions And Answers
Download IBM Certification Interview Questions and Answers PDF
Sharpen your IBM Certification interview expertise with our handpicked 38 questions. Each question is crafted to challenge your understanding and proficiency in IBM Certification. Suitable for all skill levels, these questions are essential for effective preparation. Download the free PDF to have all 38 questions at your fingertips. This resource is designed to boost your confidence and ensure you're interview-ready.
38 IBM Certification Questions and Answers:
IBM Certification Job Interview Questions Table of Contents:
1 :: Explain What are three advantages of fragmentation?
A. higher availability
B. reduced disk space requirements
C. parallel scans are possible with PDQ
D. finer granularity of archives and resources
A.higher availability
Read More2 :: Explain Given the following SQL statement: GRANT REFERENCES ON TABLE tab1 TO USER usera
Which of the following describes what USERA is allowed to do?
A.Create a read?only view using TAB1. B.Alter TAB1 to add a check constraint.
C.Define a primary key or unique constraint on TAB1.
D.Define a dependent table where TAB1 is the parent.
D.Define a dependent table where TAB1 is the parent.
Read More3 :: What help ensure that the XIV Systems cache does not become a bottleneck?
A. central cache locking mechanism
B. use of industry standard chip technology
C. each module is responsible for caching the data in that module
D. having all modules understand what is held cache at all times
C.Each module is responsible for caching the data in that module
Read More4 :: Which statement fragments a table as round robin?
A. FRAGMENT AS ROUND ROBIN IN dbspace 1, dbspace 2
B. FRAGMENT TABLE BY ROUND ROBIN IN dbspace1, dbspace 2
C. FRAGMENT BY ROUND ROBIN IN dbspace1, dbspace 2
D. FRAGMENT BY ROUND ROBIN
C.FRAGMENT BY ROUND ROBIN IN dbspace1, dbspace 2
Read More5 :: Which of the following can be kept in memory when the DB2 configuration parameter
KEEPFENCED is enabled?
A. SQLDAS after their cursor is closed. B. Referential integrity maps after a join.
C. Stored procedure processes after they are run.
D. Tables after they have been read into the buffer pool.
C.Stored procedure processes after they are run.
Read More6 :: Explain Which of the following commands will allow a Linux on iSeries administrator to quickly scan backup tapes for files saved via a tar command on a Linux system?
A The Linux command mt
B The Linux command cpio
C The OS/400 command RST option(*print)
D The OS/400 command DSPTAP option(*savrst)
B. The Linux command cpio
Read More7 :: Suppose A customer has ordered a 10 module XIV System. How many interface modules are active in this configuration?
B. 4
Read More8 :: What is a requirement to connect a V6R1 IBM i host to an XIV Storage System?
A. XIV firmware V10.0.8
B. Host Attachment Kit V1.0.1
C. SAN Volume Controller (SVC)V4.2
D. Virtual I/O Server (VIOS) V2.1.1
D.Virtual I/O Server (VIOS) V2.1.1
Read More9 :: Which statement correctly changes the next extent size?
A. ALTER TABLE customer MODIFY NEXT SIZE 300
B. ALTER TABLE customer MODIFY NEXT EXTENT SIZE 300
C. ALTER TABLE customer MODIFY EXTENT SIZE 300
D. ALTER TABLE customer NEXT SIZE 300
A.ALTER TABLE customer MODIFY NEXT SIZE 300
Read More10 :: Explain Which two solutions, once installed and configured, can be used to move workloads without disruption? (Choose two)
A. XIV partitions
B. XIV Data Mover (XDM)
C. SAN Volume Controller
D. XIV Data Migration Function
E. Tivoli Storage Productivity Center for Replication V4
C. SAN Volume Controller
D. XIV Data Migration Function
Read MoreD. XIV Data Migration Function
11 :: Explain Which two types of fragmentation are allowed in a CREATE TABLE statement?
A. disk striping
B. dbspace
C. indexing
D. round robin
E. mirroring F. tblspace G. sorting
H. expression
D.round robin
Read More12 :: A VM/VSE customer wants to implement a WAS on an existing zSeries server. On which of the following operating environments would WAS best be implemented?
A. VSE
B. z/VM
C. z/OS
D. Linux
D. Linux
Read More13 :: How To improve system redundancy using its grid architecture, where in the XIV System can a partition be mirrored?
A. on disks in other modules
B. on same disk in different modules
C. on different disks in the same module
D. on same disk, in same module, and in different modules
A. on disks in other modules
Read More14 :: Explain Which of the following tools is used to create subscription sets and add subscription?set members to subscription sets?
A.Journal
B.License Center
C.Replication Center
D.Development Center
C.Replication Center
Read More15 :: Explain Which two of the following SQL data types should be used to store a small binary image?
A.CLOB
B.BLOB
C.VARCHAR
D.GRAPHIC
E.VARCHAR FOR BIT DATA
E:BLOB /VARCHAR FOR BIT DATA
Read More16 :: Suppose a customer is planning to create a non-hosted Linux partition on an i825. Linux will have only direct-attach devices. What is the Linux console option?
A Use OS/400 VNC support.
B Telnet to the virtual console.
C Share the primary partitions console.
D Allocate a console IOA to the Linux partition.
B. Telnet to the virtual console.
Read More17 :: Where is fragment information stored?
A. in the system catalog tables
B. in the physical logs
C. in the reserved pages
D. in the first page of the database tblspace
A.in the system catalog tables
Read More18 :: What is a chunk when using raw devices?
A. a contiguous unit of disk space
B. a dynamic unit of disk space
C. a location in shared memory
D. a data table
A.a contiguous unit of disk space
Read More19 :: Which three can be locked?
A. a row
B. a page
C. a column
D. a key
E. shared memory
B:a row/a page
Read More20 :: Which of the following tools can be used to identify inefficient SQL statements without executing them?
A.QMF
B.Task Center
C.Visual Explain
D.Development Center
Correct:C.Visual Explain
Read More21 :: Which two of the following table space attributes can be changes after the table space has been created?
A. Page size
B. Extent size
C. Transfer rate
D. Table space type
E. Table space name
B,E:Extent size/Table space name
Read More22 :: Explain Which isolation level does a database without logging default to?
A. committed read
B. dirty read
C. mode ANSI
D. repeatable read
B.dirty read
Read More23 :: In which two situations would you use a round robin fragmentation strategy?
A. When all fragments must be second
B. To create uneven data distributions
C. When queries perform sequential scans and you have little information about the data being stored.
D. When tables are accessed with a high degree of selectivity
A. When all fragments must be second
Read More24 :: Explain If there is a lock on an adjacent key, an insert will fail if the isolation level is set to what?
A. committed read
B. repeatable read
C. share read
D. indexed read
B.repeatable read
Read More25 :: Suppose a System z customer has a new CIO. The CIO is concerned about continuing operations and recovery following a catastrophe.
Which of the following addresses this issue?
A. GDPS
B. TAM
C. DR
D. WASS
A.GDPS
Read More