Which of the following can be accomplished by altering a table to use column access control?
Which of the following is an advantage of role-based security?
For best DB2 lock avoidance, which of the following BIND/REBIND options should be included in the REBIND command execution?
Which authority prevents unintended access to user data but allows installation or migration of a DB2 subsystem?
Which of the following is TRUE about the SYSCTRL authority?