单选题In your production database, data manipulation language (DML) operations are executed on the SALES table.You have noticed some dubious values in the SALES table during the last few days. You are able to track users, actions taken, and the time of the action for this particular period but the changes in data are not tracked.You decide to keep track of both the old data and new data in the table along with the user information. Whataction would you take to achieve this task()AApply fine-grained auditing.BImplement value-based auditing.CImpose standard database auditing to audit object privileges.DImpose standard database auditing to audit SQL statements.
单选题
In your production database, data manipulation language (DML) operations are executed on the SALES table.You have noticed some dubious values in the SALES table during the last few days. You are able to track users, actions taken, and the time of the action for this particular period but the changes in data are not tracked.You decide to keep track of both the old data and new data in the table along with the user information. Whataction would you take to achieve this task()
A
Apply fine-grained auditing.
B
Implement value-based auditing.
C
Impose standard database auditing to audit object privileges.
D
Impose standard database auditing to audit SQL statements.
参考解析
解析:
暂无解析
相关考题:
Which two client requests are captured during database replay Capture?() A. Flashback queriesB. Shared server requestsC. Login and logoff activities of sessionsD. Direct path load of data from external files by using utilities such as SQL *loaderE. Data definition language (DDL) and data manipulation language (DML) operations
ENCRYPT_TS is an encrypted tablespace that contains tables with data. Which statement is true regarding the effect of queries and data manipulation language (DML) statements on the encrypted data in the tables?()A. The data is decrypted during SORT and JOIN operations.B. The data remains encrypted when it is read into memory.C. The data remains encrypted when it is stored in the redo logs.D. The data remains encrypted in the UNDO tablespace provided that the UNDO tablespace was created with the encryption option enabled.
Which two client requests are captured during database replay Capture?() (Choose two) A. Flashback queriesB. Shared server requestsC. Login and logoff activities of sessionsD. Direct path load of data from external files by using utilities such as SQL *loaderE. Data definition language (DDL) and data manipulation language (DML) operations
Which two client requests are captured during database replay Capture?()A、Flashback queriesB、Shared server requestsC、Login and logoff activities of sessionsD、Direct path load of data from external files by using utilities such as SQL *loaderE、Data definition language (DDL) and data manipulation language (DML) operations
Which statement correctly describes SQL and /SQL*Plus?()A、Both SQL and /SQL*plus allow manipulation of values in the database.B、/SQL* Plus recognizes SQL satement and sends them to the server; SQL is the Oracle proprietary interface for executing SQL statements.C、/SQL* Plus language for communicating with the Oracle server to access data; SQL recognizes SQL statements and sends them to the server.D、/SQL manipulates data and table definition in the database; /SQL* Plus does not allow manipulation of values in the database.
You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis. How would you achieve this?()A、by using triggersB、by using external tablesC、by using anonymous PL/SQL blocksD、by auditing all DML operations on the table
Which statements are correct about temporary tables()A、Indexes and views can be created on temporary tables.B、Both the data and the structure of temporary tables can be exported.C、Temporary tables are always created in a user’s temporary tablespace.D、The data inserted into a temporary table in a session is available to other sessions.E、Data manipulation language (DML) locks are never acquired on the data of temporary tables
Which two statements are true about simple views?()A、Views can be created as read only.B、Views are data segments like tables.C、Views can be created on the basis of more than one table.D、Data manipulation language (DML) operations cannot be performed on views.
Which two client requests are captured during database replay Capture?() (Choose two)A、Flashback queriesB、Shared server requestsC、Login and logoff activities of sessionsD、Direct path load of data from external files by using utilities such as SQL *loaderE、Data definition language (DDL) and data manipulation language (DML) operations
Your database is in ARCHIVELOG mode. You lost an index tablespace due to a disk failure while the database was open. You have neither a backup of the lost index tablespace nor the scripts containing the CREATE INDEX statements to recreate the indexes. Currently, several users are executing long-running queries on the database. What will happen to the ongoing activity in the database?()A、 The queries that are currently executing will abort and an error message will be returned to the user.B、 The queries that are currently executing will execute normally but future queries will not executed.C、 Data Manipulation Language (DML) statements cannot be performed on the tables on which the indexes are based.D、 The currently executing and future queries will execute normally, but will be slower
Which three statements are correct about temporary tables?()A、Indexes and views can be created on temporary tables.B、Both the data and the structure of temporary tables can be exported.C、Temporary tables are always created in a user’s temporary tablespace.D、The data inserted into a temporary table in a session is available to other sessions.E、Data manipulation language (DML) locks are never acquired on the data of temporary tables.
You suspect unauthorized data manipulation language (DML) operations on a particular table. Youwant to track users who are performing the transactions and the values used in the transactions. You alsoplan to transfer these values to another table for analysis. How would you achieve this()A、by using triggersB、by using Data PumpC、by using external tablesD、by using anonymous PL/SQL blocks
单选题You suspect unauthorized data manipulation language (DML) operations on a particular table. Youwant to track users who are performing the transactions and the values used in the transactions. You alsoplan to transfer these values to another table for analysis. How would you achieve this()Aby using triggersBby using Data PumpCby using external tablesDby using anonymous PL/SQL blocks
单选题Your database is in ARCHIVELOG mode. You lost an index tablespace due to a disk failure while the database was open. You have neither a backup of the lost index tablespace nor the scripts containing the CREATE INDEX statements to recreate the indexes. Currently, several users are executing long-running queries on the database. What will happen to the ongoing activity in the database?()A The queries that are currently executing will abort and an error message will be returned to the user.B The queries that are currently executing will execute normally but future queries will not executed.C Data Manipulation Language (DML) statements cannot be performed on the tables on which the indexes are based.D The currently executing and future queries will execute normally, but will be slower
多选题Which two client requests are captured during database replay Capture?() (Choose two)AFlashback queriesBShared server requestsCLogin and logoff activities of sessionsDDirect path load of data from external files by using utilities such as SQL *loaderEData definition language (DDL) and data manipulation language (DML) operations
多选题Which three statements are correct about temporary tables?()AIndexes and views can be created on temporary tables.BBoth the data and the structure of temporary tables can be exported.CTemporary tables are always created in a user’s temporary tablespace.DThe data inserted into a temporary table in a session is available to other sessions.EData manipulation language (DML) locks are never acquired on the data of temporary tables.
单选题In your production database, data manipulation language (DML) operations are executed on the SALES table.You have noticed some dubious values in the SALES table during the last few days. You are able to track users, actions taken, and the time of the action for this particular period but the changes in data are not tracked.You decide to keep track of both the old data and new data in the table along with the user information. Whataction would you take to achieve this task()AApply fine-grained auditing.BImplement value-based auditing.CImpose standard database auditing to audit object privileges.DImpose standard database auditing to audit SQL statements.
单选题In your production database, data manipulation language (DML) operations are executed on theSALES table. You have noticed some dubious values in the SALES table during the last few days. Youare able to track users, actions taken, and the time of the action for this particular period but the changesin data are not tracked. You decide to keep track of both the old data and new data in the table along withthe user information. What action would you take to achieve this task()AApply fine-grained auditing.BImplement value-based auditing.CImpose standard database auditing to auditobject privileges.DImpose standard databaseauditing to audit SQL statements.
多选题Which statements are correct about temporary tables()AIndexes and views can be created on temporary tables.BBoth the data and the structure of temporary tables can be exported.CTemporary tables are always created in a user’s temporary tablespace.DThe data inserted into a temporary table in a session is available to other sessions.EData manipulation language (DML) locks are never acquired on the data of temporary tables
单选题You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis. How would you achieve this?()Aby using triggersBby using external tablesCby using anonymous PL/SQL blocksDby auditing all DML operations on the table
多选题Which two statements are true about simple views?()AViews can be created as read only.BViews are data segments like tables.CViews can be created on the basis of more than one table.DData manipulation language (DML) operations cannot be performed on views.
单选题You discover that the schema changes that were recently made to your SQL Server 2005 database have caused your Web site to stop functioning. It is unclear who made the changes. TestKing.com now mandates that all changes to the database schema be tracked. You need to implement a mechanism that will track schema changes in your database. What should you do?()AImplement a stored procedure that writes data about schema changes to a log table.BImplement DDL AFTER triggers that write user and schema information to a log table.CImplement a DML INSTEAD OF trigger that writes data about schema changes to a log table.DImplement a DML AFTER trigger that writes data about schema changes to a log table.
单选题Which statement correctly describes SQL and /SQL*Plus?()ABoth SQL and /SQL*plus allow manipulation of values in the database.B/SQL* Plus recognizes SQL satement and sends them to the server; SQL is the Oracle proprietary interface for executing SQL statements.C/SQL* Plus language for communicating with the Oracle server to access data; SQL recognizes SQL statements and sends them to the server.D/SQL manipulates data and table definition in the database; /SQL* Plus does not allow manipulation of values in the database.
单选题These are points that describe the contents of different memory components: 1: Descriptive information or metadata about schema objects that are queried by using SQL statements 2: The run-time area for data manipulation language (DML) or data definition language (DDL) statements 3: Results of SQL queries and PL/SQL functions 4: Executable forms of SQL cursors, PL/SQL programs, and Java classes 5: The information necessary to reconstruct changes made to the database by a transaction Which of these will be stored in theShared Poolif the necessary configurations are done()A1 and 2B2 and 5C1,3,and 4D3,4,and 5E1,2,3,and 4
多选题Which two client requests are captured during database replay Capture?()AFlashback queriesBShared server requestsCLogin and logoff activities of sessionsDDirect path load of data from external files by using utilities such as SQL *loaderEData definition language (DDL) and data manipulation language (DML) operations
单选题ENCRYPT_TS is an encrypted tablespace that contains tables with data. Which statement is true regarding the effect of queries and data manipulation language (DML) statements on the encrypted data in the tables?()AThe data is decrypted during SORT and JOIN operations.BThe data remains encrypted when it is read into memory.CThe data remains encrypted when it is stored in the redo logs.DThe data remains encrypted in the UNDO tablespace provided that the UNDO tablespace was created with the encryption option enabled.
单选题A data manipulation language statement ().Acompletes a transaction on a tableBmodifies the structure and data in a tableCmodifies the data but not the structure of a tableDmodifies the structure but not the data of a table
多选题You are using a recovery catalog to maintain Recovery Manager (RMAN) backup information for your production database. You have registered your production database and are performing regular backups. Because of a new requirement you have added a few new tablespaces to your production database and you want them to be included in backups. Identify two options for completing this task.()AReregistering the target database in recovery catalogBTransporting the new tablespaces to the recovery catalog databaseCSyncronizing the recovery catalog with the target database control fileDPerforming a fresh backup of the target database to include the new data files in the catalog database