0% found this document useful (0 votes)
19 views4 pages

DB2 Ap

DB 2 AWP commands

Uploaded by

Craig M
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views4 pages

DB2 Ap

DB 2 AWP commands

Uploaded by

Craig M
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

uery Valid Explanation

The command db2audit describe is not a


1. Connect to the database:
valid DB2 command. It is a command-line
CONNECT TO <your_database>
processor (CLP) command that can be used
USER <your_user> USING
No to display the current audit settings [1]. To
<your_password> 2. Run db2audit
run CLP commands, you need to use the
describe and verify that auditing is
db2 prefix or invoke the CLP in interactive
enabled for application activities.
mode [2].
1. Connect to the database:
CONNECT TO <your_database>
USER <your_user> USING
<your_password> 2. Verify the
backup schedule: LIST HISTORY The commands LIST HISTORY BACKUP and
BACKUP 3. Obtain the location of RESTORE DATABASE are also CLP
backups from the System commands that need to be prefixed with
Administrator or Database No db2 or run in interactive mode [2].
Administrator and perform a test Additionally, the command RESTORE
restore of a backup: RESTORE DATABASE requires a TO clause to specify
DATABASE <database_name> the target database name [3].
FROM <backup_location> Verify
the backup schedule in the DB2
configuration and check the results
of the latest recovery tests.
1. Connect to the database:
CONNECT TO <your_database> The command GET MONITOR SWITCHES is a
USER <your_user> USING valid DB2 command, but it is not a query. It
<your_password> 2. Review is used to display the current settings of the
monitoring configurations: GET No monitor switches [4]. To review monitoring
MONITOR SWITCHES 3. configurations, you can use the GET
OPTIONAL: Trigger intentional DATABASE CONFIGURATION command with
security events and verify alerting the MONITOR keyword [5].
functionality.
1. Connect to the database: These are valid DB2 commands and
CONNECT TO <your_database> arguments. The command GET AUDIT
USER <your_user> USING CONFIGURATION displays the current audit
<your_password> 2. Review audit settings for the database. The command
settings: GET AUDIT Yes SELECT * FROM TABLE
CONFIGURATION 3. Analyze audit (SYSPROC.AUDIT_GET_LOG()) invokes the
logs for critical events: SELECT * stored procedure AUDIT_GET_LOG to
FROM TABLE retrieve the audit log records in a table
(SYSPROC.AUDIT_GET_LOG()) format.
1. Connect to the database:
These are valid DB2 commands and
CONNECT TO <your_database>
arguments. The command GET DATABASE
USER <your_user> USING
Yes CONFIGURATION displays the current
<your_password> 2. Examine
values of the database configuration
database configuration settings:
parameters.
GET DATABASE CONFIGURATION
1. Identify the physical or cloud
hosting provider. 2. Verify hosting These are not DB2 commands or
provider's security certifications. arguments. They are general steps for
No
3. Confirm database hosting assessing the security of the database
location aligns with organizational hosting environment.
policies.
1. Connect to the database:
These are valid DB2 commands and
CONNECT TO <your_database>
arguments. The command GET DATABASE
USER <your_user> USING
CONFIGURATION FOR <your_database>
<your_password> 2. Examine data
displays the current values of the database
encryption settings: GET DATABASE Yes
configuration parameters for the specified
CONFIGURATION FOR
database. The command SELECT * FROM
<your_database> 3. Inspect data
<encrypted_table> retrieves all the rows
in encrypted tables: SELECT *
from the specified encrypted table.
FROM <encrypted_table>
The command GET DBM CFG is a valid DB2
command that displays the current values
of the database manager configuration
1. Connect to the database:
parameters. However, it is not a query and
CONNECT TO <your_database>
it does not check for SSL/TLS
USER <your_user> USING
implementation. To check for SSL/TLS
<your_password> 2. Check the
No implementation, you can use the GET
DB2 configuration for SSL/TLS
DATABASE CONFIGURATION command with
implementation: GET DBM CFG 3.
the SSL keyword. The statement Monitor
Monitor network traffic for
network traffic for unencrypted data is not
unencrypted data.
a DB2 command or argument. It is a general
step for verifying the security of the
network communication.
The command LIST AUTHORIZATIONS is a
valid DB2 command that displays the
authorizations held by the current user or
1. Connect to the database:
by a specified authorization ID. However, it
CONNECT TO <your_database>
is not a query and it does not review user
USER <your_user> USING
roles and permissions. To review user roles
<your_password> 2. Review user
and permissions, you can use the SELECT
roles and permissions: LIST No
statement with the SYSIBM.SYSROLES and
AUTHORIZATIONS 3. Conduct
SYSIBM.SYSROLEAUTH catalog tables. The
periodic access reviews to ensure
statement Conduct periodic access reviews
alignment with least privilege
to ensure alignment with least privilege
principles.
principles is not a DB2 command or
argument. It is a general step for
maintaining the security of the user access.
1. Connect to the database: No The command CONNECT TO
CONNECT TO <your_database> <your_database> USER <your_user> USING
USER <your_user> USING <your_password> is a valid DB2 command
<your_password> 2. Review that establishes a connection to the
password hashing algorithms and specified database with the specified user
ID and password. However, the statements
Review password hashing algorithms and
practices in the application code. practices in the application code and
3. Validate password storage Validate password storage mechanisms for
mechanisms for adherence to adherence to security best practices are not
security best practices. DB2 commands or arguments. They are
general steps for ensuring the security of
the password management.
The command LIST USER is a valid DB2
command that displays information about
1. Connect to the database:
the current user or a specified user.
CONNECT TO <your_database>
However, it is not a query and it does not
USER <your_user> USING No
check password policies. To check password
<your_password> 2. Check
policies, you can use the SELECT statement
password policies: LIST USER
with the SYSIBM.SYSPASSWORDPOLICY
catalog table.
The command SELECT SERVICE_LEVEL is a
valid DB2 command that displays the
current service level of the database.
However, it is not a query and it does not
1. Connect to the database:
check the current DB2 version and fix pack.
CONNECT TO <your_database>
To check the current DB2 version and fix
USER <your_user> USING
pack, you can use the SELECT statement
<your_password> 2. Check the
No with the SYSIBMADM.ENV_INST_INFO
current DB2 version and fix pack:
administrative view. The command
SELECT SERVICE_LEVEL 3. Verify
DB2UPDATE is not a valid DB2 command. It
the latest patches from IBM:
is a CLP command that can be used to apply
DB2UPDATE
maintenance packages to the DB2
installation. To run CLP commands, you
need to use the db2 prefix or invoke the
CLP in interactive mode [2].
The command GET MONITOR SWITCHES is a
valid DB2 command that displays the
current settings of the monitor switches [4].
However, it is not a query and it does not
1. Connect to the database:
review monitoring configurations for
CONNECT TO <your_database>
privileged users. To review monitoring
USER <your_user> USING
configurations for privileged users, you can
<your_password> 2. Review
use the SELECT statement with the
monitoring configurations for No
SYSIBMADM.PRIVILEGED_ROLES and
privileged users: GET MONITOR
SYSIBMADM.PRIVILEGED_ROLE_AUTH
SWITCHES 3. Analyze logs for
administrative views. The statement
privileged user activities and assess
Analyze logs for privileged user activities
for anomalies.
and assess for anomalies is not a DB2
command or argument. It is a general step
for detecting and preventing unauthorized
access.
The command CONNECT TO
<your_database> USER <your_user> USING
1. Connect to the database: <your_password> is a valid DB2 command
CONNECT TO <your_database> that establishes a connection to the
USER <your_user> USING specified database with the specified user
<your_password> 2. Verify that ID and password. However, the statements
external communications use No Verify that external communications use
secure protocols. 3. Monitor secure protocols and Monitor network
network traffic for encrypted traffic for encrypted communication with
communication with external external systems are not DB2 commands or
systems. arguments. They are general steps for
ensuring the security of the data
transmission.
1. Connect to the database:
CONNECT TO <your_database>
USER <your_user> USING
<your_password>
Source: Conversation with Bing, 1/19/2024

1. Db2 12 - Commands - Db2 commands - IBM


2. Db2 12 - Commands - Commands in Db2 - IBM
3. Useful DB2 Commands | SAP Blogs
4. Db2 11 - Commands - Tutorial: Using the command line processor - IBM
5. Top 50 Most Important DB2 Commands for Database Administrator

You might also like