A user ID/password has been compromised, and the unauthorized person has tried to access sensitive DB2 data, which the user ID is not permitted to access. The company is now interested in taking a more proactive approach to user ID protection. Which product can be used to detect this unauthorized DB2 activity and block specific requests?
In an environment where data mart sprawl crosses lines of business and fragments data analytics, which of the following reasons supports consolidation onto DB2 for z/OS?
A customer has a z13 machine with CPACF feature installed on the machine. They want to add Trusted Key Entry Workstation to support a new security project. Which z13 feature card is required to support this requirement?
Your customer has noticed that there is significantly more memory plugged in their z13 N96 than what they ordered (7072 GB), and asks for an explanation. Which of the following is an appropriate response?
IT management is proposing to senior management that they adopt a cloud solution to meet a critical requirement. Which customer requirement would a cloud solution satisfy?