When performing a Delete Request, you notice that Optim is doing a table scan even though you have specified a ey Lookup?in the AccessWhen performing a Delete Request, you notice that Optim is doing a table scan even though you have specified a ?ey Lookup?in the Access Method of the Table Access Strategy panel for the Delete Request. Why might Optim be doing a scan even though you have specified to us e a key to access the table?
You are having an issue with your Optim Server (running on Linux) and IBM Support has asked you to enable tracing. Where would you go to enable tracing on the Optim Server?
A table contains two columns, CUSTNAME and STATE. You have created the following character expression to mask CUSTNAME: SUBSTR(CUSTNAME,1,3) CONCAT 'EE' + SUBSTR(STATE,1) || SUBSTR(CUSTNAME,5,2) Given the values shown below for CUSTNAME and STATE: CUSTNAME=SANDERS STATE=GA What reflects the value of CUSTNAME after the character expression has been applied?
You have created an Access Definition containing multiple tables. The tables each have primary keys and additional non-unique indexes that have been added over the years. While defining this archive request you have the choice of defining archive indexes. Which statement is true?
It is considered a best practice to mask data using functions that produce consistent results (e.g., the same masked values are produced each time the data is masked). Why is this considered a best practice?