单选题You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis. How would you achieve this?()Aby using triggersBby using external tablesCby using anonymous PL/SQL blocksDby auditing all DML operations on the table
单选题
You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis. How would you achieve this?()
A
by using triggers
B
by using external tables
C
by using anonymous PL/SQL blocks
D
by auditing all DML operations on the table
参考解析
解析:
暂无解析
相关考题:
Which two client requests are captured during database replay Capture?() A. Flashback queriesB. Shared server requestsC. Login and logoff activities of sessionsD. Direct path load of data from external files by using utilities such as SQL *loaderE. Data definition language (DDL) and data manipulation language (DML) operations
You executed the following SQL statement to shrink the EMPLOYEES table segment stored in the EXAMPLE tablespace:ALTER TABLE employees SHRINK SPACE CASCADE;Which statement is correct in this scenario?()A. The EMPLOYEES table will be changed to read-only mode during the shrink operation.B. The indexes created on the EMPLOYEES table will need to be rebuilt after the shrink operation is over.C. The shrink behavior will be cascaded to all dependent segments of the table that support a shrink operation.D. Data manipulation language (DML) operations will not be possible on the EMPLOYEES table during the COMPACTION phase of the shrink operation.
ENCRYPT_TS is an encrypted tablespace that contains tables with data. Which statement is true regarding the effect of queries and data manipulation language (DML) statements on the encrypted data in the tables?()A. The data is decrypted during SORT and JOIN operations.B. The data remains encrypted when it is read into memory.C. The data remains encrypted when it is stored in the redo logs.D. The data remains encrypted in the UNDO tablespace provided that the UNDO tablespace was created with the encryption option enabled.
Which two client requests are captured during database replay Capture?() (Choose two) A. Flashback queriesB. Shared server requestsC. Login and logoff activities of sessionsD. Direct path load of data from external files by using utilities such as SQL *loaderE. Data definition language (DDL) and data manipulation language (DML) operations
Which two client requests are captured during database replay Capture?()A、Flashback queriesB、Shared server requestsC、Login and logoff activities of sessionsD、Direct path load of data from external files by using utilities such as SQL *loaderE、Data definition language (DDL) and data manipulation language (DML) operations
Which two statements are true regarding views?()A、A subquery that defines a view cannot include the GROUP BY clause B、A view that is created with the subquery having the DISTINCT keyword can be updated C、A view that is created with the subquery having the pseudo column ROWNUM keyword cannot be updated D、A data manipulation language (DML) operation can be performed on a view that is created with the subquery having all the NOT NULL columns of a table
To increase the availability of an Advanced Replication environment, you can add a new master to a replication group without quiescing the group. This is achieved().A、Only when the new master site already has existing replication groups. B、By issuing a single command to create, populate, and activate the new master. C、When the master definition site is not the same for all of the master groups. D、Without impacting end users who are executing data manipulation language (DML) commands on the replicated tables.
You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis. How would you achieve this?()A、by using triggersB、by using external tablesC、by using anonymous PL/SQL blocksD、by auditing all DML operations on the table
Which statements are correct about temporary tables()A、Indexes and views can be created on temporary tables.B、Both the data and the structure of temporary tables can be exported.C、Temporary tables are always created in a user’s temporary tablespace.D、The data inserted into a temporary table in a session is available to other sessions.E、Data manipulation language (DML) locks are never acquired on the data of temporary tables
Which two statements are true about simple views?()A、Views can be created as read only.B、Views are data segments like tables.C、Views can be created on the basis of more than one table.D、Data manipulation language (DML) operations cannot be performed on views.
Which two client requests are captured during database replay Capture?() (Choose two)A、Flashback queriesB、Shared server requestsC、Login and logoff activities of sessionsD、Direct path load of data from external files by using utilities such as SQL *loaderE、Data definition language (DDL) and data manipulation language (DML) operations
Which three statements are correct about temporary tables?()A、Indexes and views can be created on temporary tables.B、Both the data and the structure of temporary tables can be exported.C、Temporary tables are always created in a user’s temporary tablespace.D、The data inserted into a temporary table in a session is available to other sessions.E、Data manipulation language (DML) locks are never acquired on the data of temporary tables.
You suspect unauthorized data manipulation language (DML) operations on a particular table. Youwant to track users who are performing the transactions and the values used in the transactions. You alsoplan to transfer these values to another table for analysis. How would you achieve this()A、by using triggersB、by using Data PumpC、by using external tablesD、by using anonymous PL/SQL blocks
What are three benefits of performing data definition language (DDL) statements against a partitioned table with the UPDATE GLOBAL INDEXES clause?()A、Global indexes are rebuilt automatically at the end of the DDL operation thereby avoiding problems with the UNUSABLE status. B、You do not have to search for invalid global indexes after the DDL command completes and rebuild them individually. C、Global indexes are maintained during the operation of the DDL command and therefore can be used by any concurrent query. D、Global indexes remain intact and available for use by data manipulation language (DML) statements even for sessions that have not enabled the skipping of unusable indexes.
单选题You suspect unauthorized data manipulation language (DML) operations on a particular table. Youwant to track users who are performing the transactions and the values used in the transactions. You alsoplan to transfer these values to another table for analysis. How would you achieve this()Aby using triggersBby using Data PumpCby using external tablesDby using anonymous PL/SQL blocks
多选题What are three benefits of performing data definition language (DDL) statements against a partitioned table with the UPDATE GLOBAL INDEXES clause?()AGlobal indexes are rebuilt automatically at the end of the DDL operation thereby avoiding problems with the UNUSABLE status.BYou do not have to search for invalid global indexes after the DDL command completes and rebuild them individually.CGlobal indexes are maintained during the operation of the DDL command and therefore can be used by any concurrent query.DGlobal indexes remain intact and available for use by data manipulation language (DML) statements even for sessions that have not enabled the skipping of unusable indexes.
多选题Which two client requests are captured during database replay Capture?() (Choose two)AFlashback queriesBShared server requestsCLogin and logoff activities of sessionsDDirect path load of data from external files by using utilities such as SQL *loaderEData definition language (DDL) and data manipulation language (DML) operations
多选题Which three statements are correct about temporary tables?()AIndexes and views can be created on temporary tables.BBoth the data and the structure of temporary tables can be exported.CTemporary tables are always created in a user’s temporary tablespace.DThe data inserted into a temporary table in a session is available to other sessions.EData manipulation language (DML) locks are never acquired on the data of temporary tables.
单选题In your production database, data manipulation language (DML) operations are executed on the SALES table.You have noticed some dubious values in the SALES table during the last few days. You are able to track users, actions taken, and the time of the action for this particular period but the changes in data are not tracked.You decide to keep track of both the old data and new data in the table along with the user information. Whataction would you take to achieve this task()AApply fine-grained auditing.BImplement value-based auditing.CImpose standard database auditing to audit object privileges.DImpose standard database auditing to audit SQL statements.
单选题In your production database, data manipulation language (DML) operations are executed on theSALES table. You have noticed some dubious values in the SALES table during the last few days. Youare able to track users, actions taken, and the time of the action for this particular period but the changesin data are not tracked. You decide to keep track of both the old data and new data in the table along withthe user information. What action would you take to achieve this task()AApply fine-grained auditing.BImplement value-based auditing.CImpose standard database auditing to auditobject privileges.DImpose standard databaseauditing to audit SQL statements.
多选题Which statements are correct about temporary tables()AIndexes and views can be created on temporary tables.BBoth the data and the structure of temporary tables can be exported.CTemporary tables are always created in a user’s temporary tablespace.DThe data inserted into a temporary table in a session is available to other sessions.EData manipulation language (DML) locks are never acquired on the data of temporary tables
多选题Which two statements regarding the Flashback Table feature are correct?()AFlashback Table can be performed on system tables.BFlashback Table operation does not shrink the segments.CFlashback Table uses log mining to extract SQL_REDO and SQL_UNDO statements.DFlashback Table operation acquires exclusive data manipulation language (DML) locks.
多选题Which two statements are true about simple views?()AViews can be created as read only.BViews are data segments like tables.CViews can be created on the basis of more than one table.DData manipulation language (DML) operations cannot be performed on views.
单选题To increase the availability of an Advanced Replication environment, you can add a new master to a replication group without quiescing the group. This is achieved().AOnly when the new master site already has existing replication groups. BBy issuing a single command to create, populate, and activate the new master. CWhen the master definition site is not the same for all of the master groups. DWithout impacting end users who are executing data manipulation language (DML) commands on the replicated tables.
多选题Which two client requests are captured during database replay Capture?()AFlashback queriesBShared server requestsCLogin and logoff activities of sessionsDDirect path load of data from external files by using utilities such as SQL *loaderEData definition language (DDL) and data manipulation language (DML) operations
单选题ENCRYPT_TS is an encrypted tablespace that contains tables with data. Which statement is true regarding the effect of queries and data manipulation language (DML) statements on the encrypted data in the tables?()AThe data is decrypted during SORT and JOIN operations.BThe data remains encrypted when it is read into memory.CThe data remains encrypted when it is stored in the redo logs.DThe data remains encrypted in the UNDO tablespace provided that the UNDO tablespace was created with the encryption option enabled.
单选题A data manipulation language statement ().Acompletes a transaction on a tableBmodifies the structure and data in a tableCmodifies the data but not the structure of a tableDmodifies the structure but not the data of a table