单项选择题
You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis.
How would you achieve this?()
A.by using triggers
B.by using external tables
C.by using anonymous PL/SQL blocks
D.by auditing all DML operations on the table
相关考题
-
单项选择题
Asaresultofperformanceanalysis,youcreatedanindexontheprod_namecolumnoftheprod_dettable,whichcontainsabouttenthousandrows.Later,youupdatedaproductnameinthetable.Howdoesthischangeaffecttheindex?()
A.A leaf will be marked as invalid.
B.An update in a leaf row takes place.
C.The index will be updated automatically at commit.
D.A leaf row in the index will be deleted and inserted.
E.The index becomes invalid when you make any updates. -
多项选择题
WhichtwostatementsaboutFlashbackQueryaretrue?()
A.It is generated by using the redo log files.
B.It helps in row-level recovery from user errors.
C.It can be performed to recover ALTER TABLE statements
D.It fails when undo data pertaining to the transaction is overwritten.
E.The database has to be opened with the resetlogs option after performing Flashback Query. -
单项选择题
WhilesettingupanOracledatabaseforoneofyourcriticalapplications,youwanttoensurethatthedatabaseisbackedupatregularintervalswithoutyourintervention.Whatshouldyoudotoachievetheobjective?()
A.configure the database to run in ARCHIVELOG mode
B.configure the Flash Recovery Area to enable automatic database backup
C.schedule the database backup using DBMS_JOB package after creating the database
D.schedule the database backup using Recovery Manager (RMAN)commands after creating the database
E.schedule the database backup using Database Configuration Assistant (DBCA)while creating the database
