Scenario: A security audit reveals unauthorized access attempts in a DB2 database. What steps should the DBA take to investigate and mitigate potential security risks?
- Review database logs to identify the source and nature of unauthorized access attempts.
- Implement two-factor authentication for all database users.
- Disable access to the database temporarily until the issue is resolved.
- Increase firewall restrictions to block suspicious IP addresses.
The correct option is to review database logs to identify the source and nature of unauthorized access attempts. Database logs often contain valuable information about login attempts, failed authentication, and suspicious activities, which can help the DBA understand the scope of the security breach and take appropriate actions to mitigate risks. Implementing two-factor authentication, temporarily disabling access, or enhancing firewall restrictions are valid security measures but may not directly address the ongoing security breach.
Loading...
Related Quiz
- What considerations should be taken into account when designing efficient user-defined functions in DB2?
- The VARIANCE() function in DB2 returns the ________ of the values in a column.
- What is the impact of having too many indexes on a table in DB2?
- How does denormalization impact data integrity and consistency in a database?
- Which SQL command is used to delete records from a table?