1.
The frequency of data being changed for several tables in the new Billing application is very unpredictable. A different approach to manage Runstats for these objects is desired. To provide additional information on update patterns for the new Billing Application, the DBA can use what information to better understand the unpredictable workload patterns on the tablespaces?
2.
When specifying "A" for the acceptance option in the column SECURITY_IN in the SYSIBM.LUNAMES catalog table, which statement is correct?
3.
What is the maximum levels of backup that DB2 plan stability can support?
4.
The access path chosen for a query shows a table space scan, when it appears that there is an index available that would provide a more efficient access path. What situation could have caused a table space scan to be chosen instead of the index?
5.
You have been asked to find packages that use isolation level UR in dynamic SQL. Which trace will be utilized?
6.
Which of the following techniques CANNOT be used to implement DB2 based row level authorization in a read-only environment for a specific table?
7.
Which privilege allows the execution of the EXPLAIN STMTCACHE ALL SQL statement?
8.
What must be done in order to audit read access to a table?
9.
Which minimum system privilege allows you to create a trusted context?
10.
If security administration is separated from system and database administration, via zparm, which level of authority is required to define roles or trusted contexts?