单选题he DBA is about to enable auditing on the Oracle database in an attempt to discover some suspicious activity. Audit trail information is stored in which of the following database object names?()ASYS.SOURCE$ BSYS.AUD$ CDBA_SOURCE DDBA_AUDIT_TRAIL

单选题
he DBA is about to enable auditing on the Oracle database in an attempt to discover some suspicious activity. Audit trail information is stored in which of the following database object names?()
A

SYS.SOURCE$ 

B

SYS.AUD$ 

C

DBA_SOURCE 

D

DBA_AUDIT_TRAIL


参考解析

解析: 暂无解析

相关考题:

Which Oracle Database component is audited by default if the unified Auditing option is enabled?()A、Oracle Data PumpB、Oracle Recovery Manager (RMAN)C、Oracle Label SecurityD、Oracle Database VaultE、Oracle Real Application Security

You are using the Database Configuration Assistant to configure your Oracle database. Which of the following terms pertains to the creation of an object from which creation of the other database can be based? ()A、Clone B、Copy C、Template D、Terminal

A user reports that each day some files are deleted from the department share. The administrator needs to find who deleted these files.  Which of the following actions should the administrator perform?()A、 Enable audit object access and specify files and folders to monitor using Task Manager.B、 Enable audit policy change and specify files and folders to monitor using Windows Explorer.C、 Enable audit object access and specify files and folders to monitor using Windows Explorer.D、 Open Performance Monitor and monitor folder activity.

Identify three benefits of Unified Auditing.()A、Decreased use of storage to store audit trail rows in the database.B、It improves overall auditing performance.C、It guarantees zero-loss auditing.D、The audit trail cannot be easily modified because it is read-only.E、It automatically audits Recovery Manager (RMAN) events.

The SAVE_AMT column in the ACCOUNTS table contains the balance details of customers in a bank. As part of the year/x7fend tax and interest calculation process, all the rows in the table need to be accessed. The bank authorities want to track access to the rows containing balance amounts exceeding $200,000, and then send an alert message to the administrator.  Which method would you suggest to the bank for achieving this task?()A、implementing value­based auditing by using triggersB、implementing fine­grained auditing with audit condition and event handlerC、performing standard database auditing to audit object privileges by setting the AUDIT_TRAIL parameter to EXTENDEDD、performing standard database auditing to audit SQL statements with granularity level set to ACCESS

You installed Oracle Database 11g afresh. Which statements are true regarding the default audit settings in this database?() A、 The audit trail is stored in an operating system file.B、 Auditing is disabled for all privileges.C、 The audit trail is stored in the database.D、 Auditing is enabled for all privileges.E、 Auditing is enabled for certain privileges related to database security.

In your production database, data manipulation language (DML) operations are executed on the SALES table.You have noticed some dubious values in the SALES table during the last few days. You are able to track users, actions taken, and the time of the action for this particular period but the changes in data are not tracked.You decide to keep track of both the old data and new data in the table along with the user information.  Whataction would you take to achieve this task()A、Apply fine-grained auditing.B、Implement value-based auditing.C、Impose standard database auditing to audit object privileges.D、Impose standard database auditing to audit SQL statements.

You work as a database administrator for Certkiller .com. You enabled tracing while creating a listener to your database.  What additional information is available to you when you enable tracing?()A、Information about each Oracle Net connection.B、Information about each entry in theLinstener.orafileC、Information about the changed done in the databaseD、Information about the different listeners in your systemE、Information about all thenondatabasefiles required to operate the database

You are analyzing how Oracle processes user statements. SQL and PL/SQL parse information is stored in which of the following database memory areas? ()A、Library cache B、Row cacheC、Dictionary cache D、Large area E、Buffer cache

You are identifying dictionary objects in the Oracle database. Which of the following is a view in the data dictionary?() A、V$DATABASE B、DBA_TABLES C、SYSAUD$ D、EMP

You wish to enable an audit policy for all database users, except SYS, SYSTEM, and SCOTT.You issue the following statements: SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYS;SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYSTEM; SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SCOTT; For which database users is the audit policy now active?()A、All users except SYSB、All users except SCOTTC、All users except sys and SCOTTD、All users except sys, system, and SCOTT

You are about to create your Oracle data dictionary for use with the database. Which of the following users would you connect to the database as for this purpose in Oracle9i and later releases?()A、SYSTEM B、OUTLN C、INTERNAL D、SYS

he DBA is about to enable auditing on the Oracle database in an attempt to discover some suspicious activity. Audit trail information is stored in which of the following database object names?()A、SYS.SOURCE$ B、SYS.AUD$ C、DBA_SOURCE D、DBA_AUDIT_TRAIL

单选题In order to enable remote administration of users and tablespaces on an Oracle database, which of the following types of files must exist in the database?()APassword file BInitialization file CDatafile DControl file ENothing - SYSDBA privileges are not required for these actions

单选题You are performing backup and recovery operations by using RMAN. You are using a recovery catalog for the RMAN repository. You are planning to migrate to ASM disk storage to enable new disks to be added to the database without shutting down the database.   Which information is NOT required during the migration process?()A Database Identifier (DBID)B names and location of datafilesC names and location of control filesD names and location of online redo log files

单选题A user reports that each day some files are deleted from the department share. The administrator needs to find who deleted these files.  Which of the following actions should the administrator perform?()A Enable audit object access and specify files and folders to monitor using Task Manager.B Enable audit policy change and specify files and folders to monitor using Windows Explorer.C Enable audit object access and specify files and folders to monitor using Windows Explorer.D Open Performance Monitor and monitor folder activity.

多选题You installed Oracle Database 11g afresh. Which statements are true regarding the default audit settings in this database?()AThe audit trail is stored in an operating system file.BAuditing is disabled for all privileges.CThe audit trail is stored in the database.DAuditing is enabled for all privileges.EAuditing is enabled for certain privileges related to database security.

单选题Records from the data dictionary information are stored in which of the following database memory areas?()ALibrary cache BRow cache CSession UGA DBuffer cache

单选题You are analyzing how Oracle processes user statements. SQL and PL/SQL parse information is stored in which of the following database memory areas? ()ALibrary cache BRow cacheCDictionary cache DLarge area EBuffer cache

单选题You are using the Database Configuration Assistant to configure your Oracle database. Which of the following terms pertains to the creation of an object from which creation of the other database can be based? ()AClone BCopy CTemplate DTerminal

单选题You wish to enable an audit policy for all database users, except SYS, SYSTEM, and SCOTT.You issue the following statements: SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYS;SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYSTEM; SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SCOTT; For which database users is the audit policy now active?()AAll users except SYSBAll users except SCOTTCAll users except sys and SCOTTDAll users except sys, system, and SCOTT

单选题The SAVE_AMT column in the ACCOUNTS table contains the balance details of customers in a bank. As part of the year-end tax and interest calculation process, all the rows in the table need to be accessed. The bank authorities want to track access to the rows containing balance amounts exceeding $200,000, and then send an alert message to the administrator. Which method would you suggest to the bank for achieving this task?()Aimplementing value-based auditing by using triggersBimplementing fine-grained auditing with audit condition and event handlerCperforming standard database auditing to audit object privileges by setting the AUDIT_TRAIL parameter to EXTENDEDDperforming standard database auditing to audit SQL statements with granularity level set to ACCESS

多选题You work as a database administrator for Certkiller .com. In your development environmentenvironment, the developers are responsible for modifying the table structure according to the application requirements. However, you want to keep track of the ALTER TABLE commands being executed by developers, so you enable auditing to achieve this objective.  Which two views would you refer to find out the audit information?()ADBA_AUDIT_TRAILBDBA_AUDIT_SESSIONCDBA_FGA_AUDIT_TRAILDDBA_COMMON_AUDIT_TRAIL

多选题Identify three benefits of Unified Auditing.()ADecreased use of storage to store audit trail rows in the database.BIt improves overall auditing performance.CIt guarantees zero-loss auditing.DThe audit trail cannot be easily modified because it is read-only.EIt automatically audits Recovery Manager (RMAN) events.

单选题he DBA is about to enable auditing on the Oracle database in an attempt to discover some suspicious activity. Audit trail information is stored in which of the following database object names?()ASYS.SOURCE$ BSYS.AUD$ CDBA_SOURCE DDBA_AUDIT_TRAIL

单选题In your production database, data manipulation language (DML) operations are executed on the SALES table.You have noticed some dubious values in the SALES table during the last few days. You are able to track users, actions taken, and the time of the action for this particular period but the changes in data are not tracked.You decide to keep track of both the old data and new data in the table along with the user information.  Whataction would you take to achieve this task()AApply fine-grained auditing.BImplement value-based auditing.CImpose standard database auditing to audit object privileges.DImpose standard database auditing to audit SQL statements.

单选题You are about to create your Oracle data dictionary for use with the database. Which of the following users would you connect to the database as for this purpose in Oracle9i and later releases?()ASYSTEM BOUTLN CINTERNAL DSYS

单选题You work as a database administrator for Certkiller .com. You enabled tracing while creating a listener to your database.  What additional information is available to you when you enable tracing?()AInformation about each Oracle Net connection.BInformation about each entry in theLinstener.orafileCInformation about the changed done in the databaseDInformation about the different listeners in your systemEInformation about all thenondatabasefiles required to operate the database