IBM Certification Interview Questions And Answers

Download IBM Certification Interview Questions and Answers PDF

Sharpen your IBM Certification interview expertise with our handpicked 38 questions. Each question is crafted to challenge your understanding and proficiency in IBM Certification. Suitable for all skill levels, these questions are essential for effective preparation. Download the free PDF to have all 38 questions at your fingertips. This resource is designed to boost your confidence and ensure you're interview-ready.

38 IBM Certification Questions and Answers:

IBM Certification Job Interview Questions Table of Contents:

IBM Certification Job Interview Questions and Answers
IBM Certification Job Interview Questions and Answers

1 :: Explain What are three advantages of fragmentation?

A. higher availability
B. reduced disk space requirements
C. parallel scans are possible with PDQ
D. finer granularity of archives and resources

A.higher availability
Read More

2 :: Explain Given the following SQL statement: GRANT REFERENCES ON TABLE tab1 TO USER usera
Which of the following describes what USERA is allowed to do?
A.Create a read?only view using TAB1. B.Alter TAB1 to add a check constraint.
C.Define a primary key or unique constraint on TAB1.
D.Define a dependent table where TAB1 is the parent.

D.Define a dependent table where TAB1 is the parent.
Read More

3 :: What help ensure that the XIV Systems cache does not become a bottleneck?

A. central cache locking mechanism
B. use of industry standard chip technology
C. each module is responsible for caching the data in that module
D. having all modules understand what is held cache at all times

C.Each module is responsible for caching the data in that module
Read More

4 :: Which statement fragments a table as round robin?

A. FRAGMENT AS ROUND ROBIN IN dbspace 1, dbspace 2
B. FRAGMENT TABLE BY ROUND ROBIN IN dbspace1, dbspace 2
C. FRAGMENT BY ROUND ROBIN IN dbspace1, dbspace 2
D. FRAGMENT BY ROUND ROBIN

C.FRAGMENT BY ROUND ROBIN IN dbspace1, dbspace 2
Read More

5 :: Which of the following can be kept in memory when the DB2 configuration parameter
KEEPFENCED is enabled?

A. SQLDAS after their cursor is closed. B. Referential integrity maps after a join.
C. Stored procedure processes after they are run.
D. Tables after they have been read into the buffer pool.

C.Stored procedure processes after they are run.
Read More

6 :: Explain Which of the following commands will allow a Linux on iSeries administrator to quickly scan backup tapes for files saved via a tar command on a Linux system?

A The Linux command mt
B The Linux command cpio
C The OS/400 command RST option(*print)
D The OS/400 command DSPTAP option(*savrst)

B. The Linux command cpio
Read More

7 :: Suppose A customer has ordered a 10 module XIV System. How many interface modules are active in this configuration?

B. 4
Read More

8 :: What is a requirement to connect a V6R1 IBM i host to an XIV Storage System?

A. XIV firmware V10.0.8
B. Host Attachment Kit V1.0.1
C. SAN Volume Controller (SVC)V4.2
D. Virtual I/O Server (VIOS) V2.1.1

D.Virtual I/O Server (VIOS) V2.1.1
Read More

9 :: Which statement correctly changes the next extent size?

A. ALTER TABLE customer MODIFY NEXT SIZE 300
B. ALTER TABLE customer MODIFY NEXT EXTENT SIZE 300
C. ALTER TABLE customer MODIFY EXTENT SIZE 300
D. ALTER TABLE customer NEXT SIZE 300

A.ALTER TABLE customer MODIFY NEXT SIZE 300
Read More

10 :: Explain Which two solutions, once installed and configured, can be used to move workloads without disruption? (Choose two)

A. XIV partitions
B. XIV Data Mover (XDM)
C. SAN Volume Controller
D. XIV Data Migration Function
E. Tivoli Storage Productivity Center for Replication V4

C. SAN Volume Controller
D. XIV Data Migration Function
Read More

11 :: Explain Which two types of fragmentation are allowed in a CREATE TABLE statement?

A. disk striping
B. dbspace
C. indexing
D. round robin
E. mirroring F. tblspace G. sorting
H. expression

D.round robin
Read More

12 :: A VM/VSE customer wants to implement a WAS on an existing zSeries server. On which of the following operating environments would WAS best be implemented?

A. VSE
B. z/VM
C. z/OS
D. Linux

D. Linux
Read More

13 :: How To improve system redundancy using its grid architecture, where in the XIV System can a partition be mirrored?

A. on disks in other modules
B. on same disk in different modules
C. on different disks in the same module
D. on same disk, in same module, and in different modules

A. on disks in other modules
Read More

14 :: Explain Which of the following tools is used to create subscription sets and add subscription?set members to subscription sets?
A.Journal
B.License Center
C.Replication Center
D.Development Center

C.Replication Center
Read More

15 :: Explain Which two of the following SQL data types should be used to store a small binary image?
A.CLOB
B.BLOB
C.VARCHAR
D.GRAPHIC
E.VARCHAR FOR BIT DATA

E:BLOB /VARCHAR FOR BIT DATA
Read More

16 :: Suppose a customer is planning to create a non-hosted Linux partition on an i825. Linux will have only direct-attach devices. What is the Linux console option?

A Use OS/400 VNC support.
B Telnet to the virtual console.
C Share the primary partitions console.
D Allocate a console IOA to the Linux partition.

B. Telnet to the virtual console.
Read More

17 :: Where is fragment information stored?

A. in the system catalog tables
B. in the physical logs
C. in the reserved pages
D. in the first page of the database tblspace

A.in the system catalog tables
Read More

18 :: What is a chunk when using raw devices?

A. a contiguous unit of disk space
B. a dynamic unit of disk space
C. a location in shared memory
D. a data table

A.a contiguous unit of disk space
Read More

19 :: Which three can be locked?

A. a row
B. a page
C. a column
D. a key
E. shared memory

B:a row/a page
Read More

20 :: Which of the following tools can be used to identify inefficient SQL statements without executing them?
A.QMF
B.Task Center
C.Visual Explain
D.Development Center

Correct:C.Visual Explain
Read More

21 :: Which two of the following table space attributes can be changes after the table space has been created?

A. Page size
B. Extent size
C. Transfer rate
D. Table space type
E. Table space name

B,E:Extent size/Table space name
Read More

22 :: Explain Which isolation level does a database without logging default to?

A. committed read
B. dirty read
C. mode ANSI
D. repeatable read

B.dirty read
Read More

23 :: In which two situations would you use a round robin fragmentation strategy?

A. When all fragments must be second
B. To create uneven data distributions
C. When queries perform sequential scans and you have little information about the data being stored.
D. When tables are accessed with a high degree of selectivity

A. When all fragments must be second
Read More

24 :: Explain If there is a lock on an adjacent key, an insert will fail if the isolation level is set to what?

A. committed read
B. repeatable read
C. share read
D. indexed read

B.repeatable read
Read More

25 :: Suppose a System z customer has a new CIO. The CIO is concerned about continuing operations and recovery following a catastrophe.
Which of the following addresses this issue?

A. GDPS
B. TAM
C. DR
D. WASS

A.GDPS
Read More