Application Server Network Deployment V8.5.5 and Liberty Profile System Administration
Fundamentals of IBM TRIRIGA Application Platform V3.2.1 Application Development
IBM Cognos Analytics Administrator V1
IBM Mobile Foundation v8.0 Application Development
Rhapsody for Systems V8
IBM DataPower Gateway V7.6 Solution Implementation
IBM Operational Decision Manager Standard V8.9.1 Application Development
IBM OpenPages Developer Fundamentals v2
IBM Blueworks Live and Business Automation Workflow Business Analyst v18
IBM App Connect Enterprise V11 Solution Development
Which three facilities are used to control authorization in DB2?
privileges, db2ssh, LBAC credentials
privileges, authority levels, certificates
db2ssh, trusted contexts, authority levels
privileges, authority levels, LBAC credentials
Which method for restricting data access relies on security labels and security policies to control what data a user can access?
Authentication
Authorities and privileges
Label-based access control
Row and column access control
Reference
What of the following is TRUE about triggers?
Triggers are activated by INSERT, UPDATE, DELETE and SELECT statements
Triggers can be used to perform data manipulation operations against complex views
Triggers can only be used to execute logic before or after appropriate SQL statements
Only one trigger for a particular event and activation time can be created for a particular table