位置:首页 > 题库频道 > 其它分类 > 计算机其它 > 专业技术初级资格程序员基础知识DB2

In a trusted context environment, if a switch request is made with an authorization ID that is not allowed on a trusted connection, what state is the connection placed in、

发布时间:2024-07-09

A.Locked

B.Waiting

C.Pending

D.Unconnected

试卷相关题目

  • 1Which SQL statement will take the ability to create tables in a table space named MYTBSP away from user USER1、

    A.REVOKE USE OF TABLESPACE mytbsp FROM user1

    B.REVOKE ALTER ON TABLESPACE mytbsp FROM user1

    C.REVOKE UPDATE OF TABLESPACE mytbsp FROM user1

    D.REVOKE CREATETAB ON TABLESPACE mytbsp FROM user1

    开始考试点击查看答案
  • 2Which method for restricting data access relies on a SQL search condition that describes what set of rows a user has access to、

    A.Authentication

    B.Authorities and privileges

    C.Label-based access control

    D.Row and column access control

    开始考试点击查看答案
  • 3Given the following statement:GRANT DELETE ON TABLE sales TO User1 WITH GRANT OPTION;Which statement is correct、

    A.USER1 can only remove the SALES table.

    B.USER1 can only remove records from the SALES table.

    C.USER1 can remove the SALES table and grant the privilege to remove the SALES table to other users.

    D.USER1 can remove records from the SALES table and grant the privilege to remove records from the SALES table to other users.

    开始考试点击查看答案
  • 4Which case will require a sequence to be dropped and recreated instead of being modified by the ALTER SEQUENCE statement、

    A.Change the data type of the sequence.

    B.Reset the sequence to its starting value.

    C.Establish new minimum or maximum values.

    D.Change the increment between future values.

    开始考试点击查看答案
  • 5What is used in conjunction with a foreign key to define a relationship between two tables、

    A.Primary key

    B.Partitioning key

    C.Check constraint

    D.Unique constraint

    开始考试点击查看答案
  • 6When is a mask used to limit access to data in a table、

    A.When mandatory access control (MAC) is used to protect the table.

    B.When discretionary access control (DAC) is used to protect the table.

    C.When label-based access control (LBAC) is used to protect the table.

    D.When row and column access control (RCAC) is used to protect the tabl

    开始考试点击查看答案
  • 7What privilege is required to create a view on a table that you are not the owner of、

    A.INSERT

    B.SELECT

    C.CREATE

    D.TRIGGER

    开始考试点击查看答案
  • 8After creating several new indexes and executing RUNSTATS, user USER1 wants to re-create apackage that is stored in the database so it will take advantage of the new indexes. Whichauthority/privilege must user USER1 be granted in order to re-create the package、

    A.BIND

    B.REBIND

    C.BINDADD

    D.BIND_REBIND

    开始考试点击查看答案
  • 9Which SQL statement will give a user named USER1 the ability to run an embedded SQL application named BENEFITS that calls a package named CORPDAT

    A.PKGA、A. GRANT EXECUTE ON APPLICATION benefits TO user1

    B.GRANT EXECUTE ON PACKAGE corpdata.pkga TO user1

    C.GRANT EXECUTE ON APPLICATION PACKAGE corpdata.pkga TO user1

    D.GRANT EXECUTE ON APPLICATION benefits USING PACKAGE corpdata.pkga TO user1

    开始考试点击查看答案
  • 10Which of the following privileges allow a user to update the comment on a sequence、

    A.ALTER

    B.USAGE

    C.UPDATE

    D.COMMENT

    开始考试点击查看答案
返回顶部