READ Free Dumps For IBM- A2090-612
Question ID 22430 | Which connection type can exploit trusted connections? |
Option A | IMS |
Option B | CAF |
Option C | CICS |
Option D | RRSAF |
Correct Answer | D |
Question ID 22431 | What should be implemented in order to audit all the activity of the install SYSADM? |
Option A | DATA CAPTURE CHANGES should be set on all tables. |
Option B | A DB2 audit policy should be established, identifying the SYSADM ID to be audited. |
Option C | The DB2 authorization exit should be modified to convert the install SYSADM ID to another ID. |
Option D | Nothing can be done, the install SYSADM has the highest authority and is not controlled or monitored. |
Correct Answer | B |