1.
In a trusted context environment, if a switch request is made with an authorization ID that is not allowed on a trusted connection, what state is the connection placed in?
2.
If a user has been granted SYSCTRL authority, which activities can they perform?
3.
What is the purpose of a role?
4.
A column mask that is to be used for row and column access control (RCAC) was created with the DISABLE option specified. What must be done if this mask is to be used to restrict access to data stored in a table named EMPLOYEE?
5.
User USER1 holds both DBADM and SECADM authority and you want to separate database administration activities from security administration tasks. What authority must you have in order to revoke SECADM authority from user USER1 and assign it to someone else?
6.
Which SQL statement will allow user USER1 to create a view on a table named EMPLOYEE?
7.
Which privilege is required to invoke a user defined function?
8.
Which statement is true about an index that is used to support a UNIQUE constraint?
9.
Which statement regarding triggers is true?
10.
When an application using a temporary table terminates or disconnects from the database unexpectedly, what happens to the temporary table and any data stored in it?