A.Table
B.Columns
C.Table and Alias
D.Columns and Alias
第1题:
A user needs to create a trigger that will update table T2 whenever a row is added to table T1. Assuming the user has all appropriate privileges for table T2, which privilege is required on table T1 to create the trigger?()
A.REFERENCES
B.SELECT
C.UPDATE
D.ALTER
第2题:
A.Instance
B.Table space
C.System catalog
D.Schema repository
第3题:
A.CONTROL
B.UPDATE
C.USAGE
D.ALTER
第4题:
An Alias can be an alternate name for which DB2 object?()
第5题:
Which method will configure an e-mail notification when permanent hardware errors are logged in the errorlog?()
第6题:
Which of the following statements is used to revoke all DML privileges on table EMPLOYEE from user TOM?()
第7题:
A user utilizing an alias to update a subset of columns in a table must have UPDATE privileges on which of the following DB2 objects?()
第8题:
Assuming PUBLIC has been granted all privileges on table T1, which of the following statements would continue to permit any user to add rows to table T1, but not remove them?()
第9题:
You have been tasked with performing an update to the IDP attack database. Which three requirements areincluded as part of this task?()
第10题:
Which data dictionary table should you query to view the object privileges granted to the user on specific columns? ()
第11题:
Each extra column in the copy with more columns must not have a default value
Columns that are common to both versions of the table must be defined in the same order on the master and the slave
The slave database cannot have more columns than the master. Only the master database can have more columns
Columns that are common to both versions of the table must come first in the table definition, before any additional columns are additional columns are defined on either server
The master database cannot have more columns than the slave. Only the slave deatbase can have more columns
第12题:
Table
Columns
Table and Alias
Columns and Alias
第13题:
A.REVOKE DROP ON t1 FROM PUBLIC
B.REVOKE UPDATE ON t1 FROM PUBLIC
C.REVOKE DELETE ON t1 FROM PUBLIC
D.REVOKE CONTROL ON t1 FROM PUBLIC
第14题:
A.Sequence
B.Trigger
C.Schema
D.View
第15题:
A user can ping everything on the local network earth.net from an AIX box (which is located on earth.net). However, if the user tries to ping something on another network (mars.net) the user must type the fully qualified hostname. What can the user do so that the fully qualified hostname does not have to be typed every time the user wants to access ANY machine on mars.net?()
第16题:
You need to replicate a table from a master to a slave. The master and slave copies of the table will have different number of columns. Which two conditions must be true?()
第17题:
A user needs to create a trigger that will update table T2 whenever a row is added to table T1. Assuming the user has all appropriate privileges for table T2, which privilege is required on table T1 to create the trigger?()
第18题:
Which of the following describes the objects of a DB2 database and their relationships?()
第19题:
Which of the following privileges permits a user to update the comment on a sequence?()
第20题:
Which method will configure an e-mail notification when permanent hardware errors are logged in the errorlog?()
第21题:
The user HR owns the EMP table. The user HR grants privileges to the user SCOTT by using this command: SQL> GRANT SELECT,INSERT,UPDATE ON emp TO scott WITH GRANT OPTION; The user SCOTT executes this command to grant privileges to the user JIM: SQL> GRANT SELECT,INSERT,UPDATE ON hr.emp TO jim; Now, the user HR decides to revoke privileges from JIM using this command: SQL> REVOKE SELECT,INSERT,UPDATE ON emp FROM jim; Which statement is true after HR issues the REVOKE command()
第22题:
You are adatabase developer. You develop atask management application that connect stoa SQLServer 2008 database named TaskDB.Users logon to the application by using a SQLServer login. The application contains amodule named Task that assigns tasks tousers. Information about the setasks is stored in the Tasks table of the TaskDB data base. The Tasks table contains multiple columns. These include the Close Dateand Estimated Timecolumns. The application must meet the following security requirements: Users assigned toad atabase role named User 1 canupd ate all task information columns except the Close Date and the Estimated Time columns in the Tasks table. Administrative users assigned toad atabase role named Task_Admin canupd ateall task information in the Tasks table.You needto design a strategy to meet the security requirements. Which two actions should you perform?()
第23题:
The IDP security package must be installed after it is downloaded.
The device must be rebooted to complete the update.
The device must be connected to a network.
An IDP license must be installed on your device.
You must be logged in as the root user