DBA Interview Questions and Answers – DB2 Security Management

29 May,2011 by Tom Collins

DBA Interview Questions and Answers for a DB2 on  Linux , Unix and Windows DBA focusing on DB2 Security Management

Read the DB2 Security Notes  for checklists on DB2 Authentication Types,Authorities,DB2 Privileges,Object Privileges,GRANT & REVOKE usages

What is the purpose of Authorities ?

Authorities express a set of rights to perform high level Administrative functions

Which file contains the sysmaint_group parameter ?

DB2 Database Manager Configuration file. 

 To view the parameter values is the command :

 Get dbm cfg

 To update the sysmaint_group  value. Use the command:

 Update dbm cfg using symaint_group  <my_group>

Name at least 2 authorities and privileges which are granted automatically when a database is created?

 The authorities and privileges granted automatically when a database is created are:

a)DBADM,CONNECT,CREATETAB,BINDADD,CREATE_NOT_FENCED,IMPLICIT_SCHEMA,LOAD to the database creator

b)PUBLIC is granted USE privilege on USESPACE1

c)PUBLIC is granted CONNECT,CREATETAB,BINDADD,IMPLICIT_SCHEMA

Which privilege grants a use all privileges on a VIEW?

The CONTROL view privilege .Also allows all privileges (except CONTROL) to be granted

 Which parameter in the Database Manager Configuration file holds a value determining where authentication will take place?

 The “authentication” parameter

Which privileges are required by a user to execute a stored procedure querying a table?

 EXECUTE privilege on the stored procedure ; SELECT privilege on the table

Name two database objects where SELECT privilege is managed?

Possible objects include : NICKNAME,VIEWS,TABLES

For  SYSCTRL authority , what privileges can be Granted and Revoked?

 The SYSCTRL authority can GRANT  and REVOKE the USE table space privilege.

Name three Database Privileges.

The full list of Database Privileges is:

CONNECT

QUIESCE_CONNECT

IMPLICIT_SCHEMA

CREATETAB

BINDADD

CREATE_EXTERNAL_ROUTINE

CREATE_NOT_FENCED_ROUTINE

 Where does the Kerberos authentication occur?

Kerberos authentication occurs at the server workstation.

Read the DB2 Security Notes  for checklists on DB2 Authentication Types,Authorities,DB2 Privileges,Object Privileges,GRANT & REVOKE usages

 Source:Jack Vamvas(http://www.dba-db2.com)
Author: Rambler(http://www.dba-db2.com)

Share:

Verify your Comment

Previewing your Comment

This is only a preview. Your comment has not yet been posted.

Working...
Your comment could not be posted. Error type:
Your comment has been saved. Comments are moderated and will not appear until approved by the author. Post another comment

The letters and numbers you entered did not match the image. Please try again.

As a final step before posting your comment, enter the letters and numbers you see in the image below. This prevents automated programs from posting comments.

Having trouble reading this image? View an alternate.

Working...

Post a comment on DBA Interview Questions and Answers – DB2 Security Management

Comments are moderated, and will not appear until the author has approved them.


dba-db2.com | DB2 Performance Tuning | DBA DB2:Everything | FAQ | Contact | Copyright