1.
Which authority level allows a user to run utilities that change the data in an application database?
2.
Which trace gives information about frequent log space shortages?
3.
When creating a stored procedure that will access non DB2 resources using the authorization ID of the user invoking the stored procedure, what value must the SECURITY clause specify?
4.
Which connection type can exploit trusted connections?
5.
What should be implemented in order to audit all the activity of the install SYSADM?
6.
Which attribute(s) determine the absolute maximum number of partitions for a partition-by-growth table space?
7.
Which ALTER TABLE statement will generate a new table space version?
8.
Given that the following table (TB1) has been created with this statement: CREATE TABLE TB1 (COLA SMALLINT NOT NULL WITH DEFAULT ,COLB CHAR(5) NOT NULL WITH DEFAULT) IN DB1.TS1; Which of the following statements, which alter a table (TB1), will NOT invalidate all the plans, packages and dynamic cache statements associated with the table TB1?
9.
When defining a foreign key on a table, which statement is true?
 
10.
If a ROWID column is defined on a table as GENERATED BY DEFAULT, what must also be done?