Weekend Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

C2090-552 Questions and Answers

Note! Following C2090-552 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

C2090-552 Questions and Answers

Question # 6

You are licensed for the Optim Test Data Management solution without the Data Privacy Option. What is the correct list of functions that you can use within a Column Map?

A.

SUBSTR, RAND, IDENTITY, SERIAL, PROP, CONCAT, SEQ

B.

RAND, SHUFFLE, PROP, AGE, CONCAT, SUBSTR, TRANS COL

C.

LOOKUP, PROP, IDENTITY, CURRENCY, SEQ, RAND

D.

SHUFFLE, SUBSTR, SERIAL, PROP, SEQ, LOOKUP

Full Access
Question # 7

In a batch file, you can direct the processing that follows the PR0CMND processing, by using the process return code, with one of the statements shown below: (1) For Windows: IF ERRORLEVEL n GOTO x (2) For UNIX or Linux: IF EXITCODE n GOTO x Which Optim command line processing function causes Optim to return the process code based on the success or failure of the process that can subsequently be used to direct the processing of other steps?

A.

OUTPUT

B.

RETURNCODE

C.

EXITCODE

D.

ERRORLEVEL

Full Access
Question # 8

What identifies the tables, relationship traversals, and selection criteria for the data to be archived?

A.

Access Definition

B.

Archive File

C.

Browse Utility

D.

Storage Profile

Full Access
Question # 9

The customer has critical production systems against which Optim archive and delete processes are run. If Optim archive and delete processes are run at the wrong time, it will impact business. Which of the following will resolve the issue?

A.

Using the Optim Configuration program, initialize Optim Security and assign a Security Administrator. For each role, grant or deny the appropriate privileges.

B.

Configure object security, which will deny access to sensitive production objects.

C.

By default, the Access Control Domain allows or denies access to particular Optim functions.

D.

Configure program security to restrict access to the Optim executables.

Full Access
Question # 10

You have created an Access Definition containing multiple tables. The tables each have primary keys and additional non-unique indexes that have been added over the years. While defining this archive request you have the choice of defining archive indexes. Which statement is true?

A.

Archive indexes do not need to be defined since Optim has already detected and included the indexes in the archive request.

B.

Archive indexes will automatically be created to mirror the indexes that exist on the tables in the archive request.

C.

Archive indexes should be specified in the Access Definition to match all of the indexes on the tables.

D.

Archive indexes should be specified in the Access Definition that will support the query workload planned for the archived data.

Full Access
Question # 11

A row in a parent table is related to rows in one of several child tables based on a value in a particular column. What is this type of Relationship called?

A.

Compound

B.

Data-Driven

C.

Symbiotic

D.

Generic

Full Access
Question # 12

For what does Optim allow you to automatically generate file names?

A.

Access Definitions, Archive Files, Extract Files

B.

Archive Requests, Insert Requests, Delete Requests, Compare Requests, Convert Requests, and Edit Requests

C.

Extract Files, Compare Files, Archive Files, Control Files, and Archive Index Files

D.

all Optim files

Full Access
Question # 13

What is the primary purpose of the Optim Relationship Index Analyzer Dialog?

A.

It automatically creates indexes regardless of the user's rights on the tables involved in relationships used in all access definitions stored in an

Optim Repository.

B.

It reviews the last time the RDBMS statistics were updated for tables used in an access definition and automatically issues the commands to update them if they have not been run since the last archive.

C.

It analyzes the index b-trees and if they are inefficient, will drop and rebuild the index automatically or can be scheduled.

D.

It analyzes DBMS indexes for relationships used with the Access Definition and to create any needed indexes, if the user has the correct privileges in the database.

Full Access
Question # 14

What are two benefits of using Optim archiving for application decommissioning? (Choose two.)

A.

Reduced maintenance costs because application and database maintenance and license fees are no longer paid for the old application and its database, but data remains accessible to the user community.

B.

Decommissioned data is needed every day by end-users and Optim caches it in memory so access is faster then the production database.

C.

Reporting from the application against the archived data can be cheaper using tiered storage.

D.

Optim can store decommissioned data in a compressed format so it will take less storage then it did in production.

E.

Applications must continue to use data in a seamless manner.

Full Access
Question # 15

A customer wants filenames that indicate archives are of General Ledger (GL) Journal Entries (JE), created each accounting period (month), as shown below. /home/<$USER>/archives/.AF Which filename would be generated from this macro? (Note: Assume that the file was created on Monday, August 29, 2011, by the person with the user ID of PSFT_GL, and the last sequential number assigned was 263.)

A.

/home/PSFT_GL/archives/Aug_s263.AF

B.

/home/PSFT_GL/archives/GLJE_MON_s264.AF

C.

/home/USER/archives/GLJE29AUG2011_s264.AF

D.

/home/PSFT_GL/archives/GLJE29AUG11_s264.AF

Full Access
Question # 16

During a proof of concept, you successfully install and configure Optim to archive data from a DB2 LUWtest application database running on an AIX server.

• A test archive (without deleting data) is initiated from the Optim Server running on a Windows 2003 server and runs successfully the first day.

• The Optim directory is on a non-application database on the Windows 2003 server.

• During the evening, the client site runs a security routine that automatically deletes any unknown or foreign objects (e.g., packages, plans, procedures) from the application databases running on the AIX server.

• The next day, the same test archive will no longer run from the Optim Server.

Which step must you perform to enable the archive to run?

A.

Drop and rebuild the Optim Directory using the Optim Directory wizard.

B.

Re-install the Optim Client and Server on the database AIX server.

C.

Update the DB Alias to the DB2 LUWtest application database.

D.

Configure security for the Optim Directory using the Optim Configuration wizard.

Full Access
Question # 17

When editing a table, one can right-click on any column and select "Lock". What does the Lock function do?

A.

"Lock" will request a table lock from the DBMS so that no other changes can be made.

B.

"Lock" will lock the column in place so that it is always visible during horizontal scrolling.

C.

"Lock" will lock the editing session so that no additional changes can be made to that column.

D.

"Lock" will lock the named Edit Request and finalize it in the Optim Directory.

Full Access
Question # 18

In which Optim processes can a Column Map be used?

A.

Archive, Restore

B.

Restore, Insert, Load, Convert

C.

Extract, Convert, Insert, Load, Delete

D.

Archive, Delete, Restore

Full Access
Question # 19

Which of the following are included in an Access Definition?

A.

Selection Criteria, Grouping Specifications

B.

Table Maps, Column Maps

C.

Column Lists, Report Specifications

D.

Privacy Functions, Sort Criteria

Full Access