Which of the following techniques CANNOT be used to implement DB2 based row level
authorization in a read-only environment for a specific table?

A.
Using a view.
B.
Using a VALIDPROC.
C.
Using multi-level security.
D.
Using masks and permissions.
Explanation: