单选题You observe that in your PROD database, customer information is being modified by some unauthorized users. You want to keep track of all of the transactions happening on the table using PL/SQL. Which type of PL/SQL subprogram or construct would you use to accomplish this task?()AfunctionsBpackagesCproceduresDdatabase triggersEanonymous PL/SQL block

单选题
You observe that in your PROD database, customer information is being modified by some unauthorized users. You want to keep track of all of the transactions happening on the table using PL/SQL. Which type of PL/SQL subprogram or construct would you use to accomplish this task?()
A

functions

B

packages

C

procedures

D

database triggers

E

anonymous PL/SQL block


参考解析

解析: 暂无解析

相关考题:

You are using Enterprise Manager to schedule backups for your database.  Which type of script would begenerated by the backup scheduler()A、XML scriptB、PL/SQL scriptC、Operating system scriptThis document was downloaded from = http://www.amaderforum.comD、Recovery Manager (RMAN) script

You are using flat files as the data source for one of your data warehousing applications. To optimize the application performance, you plan to move the data from the flat files to clustered tables in an Oracle database.While migrating the data, you want to have minimal impact on the database performance and optimize the dataload operation.  Which method would you use to load data into the Oracle database()A、Use the external table population.B、Use the Oracle Data Pump export and import utility.C、Use the conventional path data load of the SQL*Loader utility.D、Use the INSERT INTO...SELECT command to load the data

The CALC function is used several times within the sales report. To simplify maintenance you want to store the function in one place and call it from within your PL/SQL trigger code. Which node would you use in object navigator to create a report level programme unit to store the function?()A、Programme units. B、PL/SQL libraries. C、Database object. D、Built in packages.

Which type of PL/SQL construct would you use to automatically correct the error resulting from a statement that was suspended due to a space/x7frelated problem? ()A、functionB、packageC、procedureD、database triggerE、anonymous PL/SQL block

You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis.  How would you achieve this?()A、by using triggersB、by using external tablesC、by using anonymous PL/SQL blocksD、by auditing all DML operations on the table

You want to administer your PROD database from a remote host machine using a Web-enabled interface. Which Oracle tool would you use to accomplish this task efficiently without using command-line interfaces?()A、SQL*PlusB、iSQL*PlusC、Management ServerD、Management RepositoryE、Oracle Enterprise Manager 10g Database Control

Which type of PL/SQL construct would you use to automatically correct the error resulting from a statement that was suspended due to a space-related problem?()A、 functionsB、 packageC、 procedureD、 database triggerE、 anonymous PL/SQL block

You want to configure and schedule offline database backups to run automatically.  Which tool or utilitywould you use to achieve this()A、the XML scriptB、the PL/SQL scriptC、the DBMS_SCHEDULER packageD、Enterprise Manager to schedule the backup

You are using flat files as the data source for one of your data warehousing applications. You plan to move the data from the flat file structures to an Oracle database to optimize the application performance. In your database you have clustered tables. While migrating the data, you want to have minimal impact on the database performance and optimize the data load operation. Which method would you use to load data into Oracle database?()A、use the external table populationB、use the Oracle Data Pump export and import utilityC、use the conventional path data load of SQL*Loader utilityD、use the direct path data load of Oracle export and import utility

You work as a database administrator for Supportcenter.cn. You suspect that in one of your applications the customer table is being accessed by some unauthorized users. Which option would you use to monitor the queries being executed on the customer table?()A、Monitor thealert.logfileB、Enable server-side SQL tracing for user sessionsC、Enable fine-grained auditing for the customer tableD、Enable Fine-Grained Access Control (FGAC) for the customer tableE、Write a database trigger on the customer table on the SELECT event

You want to make use of the object features available in the database for the form module you are developing. Which three statements about object types are true? ()A、An object type is a user-defined composite data type. B、The attributes of an object type can be those of other object types. C、A PL/SQL table of records is an example of a nested object type. D、An object type must be declared as a type before the actual object itself can be declared.

You are using the backup scheduler in Enterprise Manager (EM) to schedule a backup of your database. Which type of script does the backup scheduler generate? ()A、SQL scriptB、PL/SQL scriptC、Operating System (OS) scriptD、Enterprise Manager (EM) scriptE、Recovery Manager (RMAN) script

You observe that in your PROD database, customer information is being modified by some unauthorized users. You want to keep track of all of the transactions happening on the table using PL/SQL. Which type of PL/SQL subprogram or construct would you use to accomplish this task?()A、functionsB、packagesC、proceduresD、database triggersE、anonymous PL/SQL block

You suspect unauthorized data manipulation language (DML) operations on a particular table. Youwant to track users who are performing the transactions and the values used in the transactions. You alsoplan to transfer these values to another table for analysis.  How would you achieve this()A、by using triggersB、by using Data PumpC、by using external tablesD、by using anonymous PL/SQL blocks

You have lost all your database control files. To recover them, you are going to use the results of the alter database backup controlfile to trace command. Your datafiles and your online redo logs are all intact.  Which of the following is true regarding your recovery?()  A、 You will need to open the database with the resetlogs command.B、 All you need to do is execute the trace file from SQL*Plus and it will perform the recovery for you.C、 You will use the resetlogs version of the create controlfile command.D、 You will use the noresetlogs version of the create controlfile command.E、 You will use the trace file to create a backup control file, and then you will recover the database with the recover database using backup controlfile command

单选题You observe that in your PROD database, customer information is being modified by some unauthorized users. You want to keep track of all of the transactions happening on the table using PL/SQL. Which type of PL/SQL subprogram or construct would you use to accomplish this task?()AfunctionsBpackagesCproceduresDdatabase triggersEanonymous PL/SQL block

单选题You work as a database administrator for Certkiller .com. You suspect that in one of your applications the customer table is being accessed by some unauthorized users. Which option would you use to monitor the queries being executed on the customer table?()AMonitor thealert.logfileBEnable server-side SQL tracing for user sessionsCEnable fine-grained auditing for the customer tableDEnable Fine-Grained Access Control (FGAC) for the customer tableEWrite a database trigger on the customer table on the SELECT event

单选题You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis.  How would you achieve this?()Aby using triggersBby using external tablesCby using anonymous PL/SQL blocksDby auditing all DML operations on the table

多选题You want to make use of the object features available in the database for the form module you are developing. Which three statements about object types are true? ()AAn object type is a user-defined composite data type.BThe attributes of an object type can be those of other object types.CA PL/SQL table of records is an example of a nested object type.DAn object type must be declared as a type before the actual object itself can be declared.

单选题You want to administer your PROD database from a remote host machine using a Web-enabled interface. Which Oracle tool would you use to accomplish this task efficiently without using command-line interfaces?()ASQL*PlusBiSQL*PlusCManagement ServerDManagement RepositoryEOracle Enterprise Manager 10g Database Control

单选题In your production database, data manipulation language (DML) operations are executed on theSALES table. You have noticed some dubious values in the SALES table during the last few days. Youare able to track users, actions taken, and the time of the action for this particular period but the changesin data are not tracked. You decide to keep track of both the old data and new data in the table along withthe user information.  What action would you take to achieve this task()AApply fine-grained auditing.BImplement value-based auditing.CImpose standard database auditing to auditobject privileges.DImpose standard databaseauditing to audit SQL statements.

单选题You suspect unauthorized data manipulation language (DML) operations on a particular table. Youwant to track users who are performing the transactions and the values used in the transactions. You alsoplan to transfer these values to another table for analysis.  How would you achieve this()Aby using triggersBby using Data PumpCby using external tablesDby using anonymous PL/SQL blocks

多选题You work as a database administrator for Certkiller .com. In your development environmentenvironment, the developers are responsible for modifying the table structure according to the application requirements. However, you want to keep track of the ALTER TABLE commands being executed by developers, so you enable auditing to achieve this objective.  Which two views would you refer to find out the audit information?()ADBA_AUDIT_TRAILBDBA_AUDIT_SESSIONCDBA_FGA_AUDIT_TRAILDDBA_COMMON_AUDIT_TRAIL

单选题Which type of PL/SQL construct would you use to automatically correct the error resulting from a statement that was suspended due to a space/x7frelated problem? ()AfunctionBpackageCprocedureDdatabase triggerEanonymous PL/SQL block

单选题While designing the database for one of your online transaction processing (OLTP) applications, you want to achieve the following:  a) high availability of data  b) faster primary key access to the table data  c) compact storage for the table  Which type of tables would you use to achieve these objectives?()Aheap tablesBobject tablesCpartitioned tablesDindex-organized tables (IOTs)

单选题You want to configure and schedule offline database backups to run automatically.  Which tool or utilitywould you use to achieve this()Athe XML scriptBthe PL/SQL scriptCthe DBMS_SCHEDULER packageDEnterprise Manager to schedule the backup

单选题Which type of PL/SQL construct would you use to automatically correct the error resulting from a statement that was suspended due to a space-related problem?()A functionsB packageC procedureD database triggerE anonymous PL/SQL block

单选题In your production database, data manipulation language (DML) operations are executed on the SALES table.You have noticed some dubious values in the SALES table during the last few days. You are able to track users, actions taken, and the time of the action for this particular period but the changes in data are not tracked.You decide to keep track of both the old data and new data in the table along with the user information.  Whataction would you take to achieve this task()AApply fine-grained auditing.BImplement value-based auditing.CImpose standard database auditing to audit object privileges.DImpose standard database auditing to audit SQL statements.