Which command can be used to adjust the system checkpoint frequency?
A. -SET LOG
B. -SET ARCHIVE
C. -ARCHIVE LOG
D. -RECOVER BSDS
A member of a data sharing group is suffering from elongated response times. You suspect that sysplex workload balancing (WLB) is not working properly for the DDF work (not evenly distributing the work among the different members).
What is the simplest way to verify how the DDF threads are distributed amongst the different members?
A. Execute the-DIS GROUP command.
B. Execute the -DIS DDF DETAIL command on each member.
C. Execute the -DIS THDO DETAIL SCOPE(GROUP) command.
D. Executed the -DIS LOCATION(') DETAIL command on each member.
In an environment with a large amount of dynamic SQL, which subsystem parameter should be adjusted to increase the amount of memory available for caching statements in the global dynamic statement cache?
A. EDMPOOL
B. EDMDBDC
C. MAXKEEPD
D. EDMSTMTC
The use of the work file database for RID list processing is controlled by the value of which subsystem parameter?
A. MAXRBLK
B. WFDBSEP
C. MAXTEMPS
D. MAXTEMPS RID
Local buffer pool updated pages are queued by data set until they are written out to DASD when which event occurs?
A. A page is added.
B. A COMMIT is executed.
C. When VPSEQT is reached.
D. A system checkpoint is taken.g
How can conditional restarts affect sequence objects?
A. Gaps may exist.
B. Duplicate entries will be deleted.
C. All values will be reset beginning from 1.
D. All values will be reset beginning from 0.
Which trace can be helpful in determining the resources involved with locking (i.e. deadlocks, timeouts) at a subsystem level?
A. Statistics trace class 1
B. Statistics trace class 3
C. Accounting trace class 1
D. Accounting trace class 3
A given buffer pool is to be used for sequentially accessed pages only. Setting which buffer pool attribute to 0 (zero) will disable parallel processing operations in this buffer pool?
A. DWQT
B. VDWQT
C. VPSEQT
D. VPPSEQT
In order to guarantee complete security for your DB2 subsystem, which statement is correct?
A. BSDS and catalog VSAM data sets should always be protected by the SYSADM authority.
B. BSDS and catalog VSAM data sets should always be protected by the MSTR address space.
C. BSDS and catalog VSAM data sets should always be protected by an external security profile.
D. BSDS and catalog VSAM data sets should always be protected by the BSDS system privilege
Given a subsystem parameter of SEPARATE_SECURITY=YES, what level of security has the authority to create and start audit policies?
A. SYSOPR
B. SYSADM
C. SECADM
D. SQLADM
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only IBM exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your C2090-317 exam preparations and IBM certification application, do not hesitate to visit our Vcedump.com to find your solutions here.