Which trace gives information about frequent log space shortages?
When creating a stored procedure that will access non DB2 resources using the authorization ID of the user invoking the stored procedure, what value must theSECURITY clause specify?
Row and column level security can be implemented using mask and permissions. Which two DB2 authorities are able to create a mask or permission? (Choose two.)
Which connection type can exploit trusted connections?
What should be implemented in order to audit all the activity of the install SYSADM?
Workload Manager (WLM) manages how many concurrent stored procedures can run in an address space and the number of concurrent stored procedures in an address space cannot exceed the value of the NUMTCB parameter. Which statement about the value of NUMTCB is correct?