How does DB2 enforce access control on database objects?
- Access control lists
- Encryption
- SQL injection prevention
- User authentication
DB2 enforces access control on database objects primarily through user authentication, where only authorized users with appropriate privileges can access and manipulate the data stored within the database.
Loading...
Related Quiz
- What are the common techniques used to denormalize a database schema?
- DB2 provides built-in functions for querying and manipulating ________ data.
- Data compression in DB2 reduces the size of data by eliminating ________.
- Which of the following is a potential drawback of denormalization?
- Scalability and performance optimization in DB2's architecture involve ________.