Which of the following techniques CANNOT be used to implement DB2 based row level authorization in a read-only environment for a specific table?

Which of the following techniques CANNOT be used to implement DB2 based row level authorization in a read-only environment for a specific table?
A. Using a view.
B. Using a VALIDPROC.
C. Using multi-level security.
D. Using masks and permissions.

Download Printable PDF. VALID exam to help you PASS.

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.