what information to better understand the unpredictable workload patterns on the tablespaces?
The frequency of data being changed for several tables in the new Billing application is very
unpredictable. A different approach to manage Runstats for these objects is desired. To provide
additional information on update patterns for the new Billing Application, the DBA can use what
information to better understand the unpredictable workload patterns on the tablespaces?
which statement is correct?
When specifying “A” for the acceptance option in the column SECURITY_IN in the
SYSIBM.LUNAMES catalog table, which statement is correct?
What is the maximum levels of backup that DB2 plan stability can support?
What is the maximum levels of backup that DB2 plan stability can support?
What situation could have caused a table space scan to be chosen instead of the index?
The access path chosen for a query shows a table space scan, when it appears that there is an
index available that would provide a more efficient access path. What situation could have caused
a table space scan to be chosen instead of the index?
Which trace will be utilized?
You have been asked to find packages that use isolation level UR in dynamic SQL. Which trace
will be utilized?
Which of the following techniques CANNOT be used to implement DB2 based row level authorization in a read-only
Which of the following techniques CANNOT be used to implement DB2 based row level
authorization in a read-only environment for a specific table?
Which privilege allows the execution of the EXPLAIN STMTCACHE ALL SQL statement?
Which privilege allows the execution of the EXPLAIN STMTCACHE ALL SQL statement?
What must be done in order to audit read access to a table?
What must be done in order to audit read access to a table?
Which minimum system privilege allows you to create a trusted context?
Which minimum system privilege allows you to create a trusted context?
which level of authority is required to define roles or trusted contexts?
If security administration is separated from system and database administration, via zparm, which
level of authority is required to define roles or trusted contexts?