You suspect unauthorized data manipulation language (DML) op

题目
单选题
You suspect unauthorized data manipulation language (DML) operations on a particular table. Youwant to track users who are performing the transactions and the values used in the transactions. You alsoplan to transfer these values to another table for analysis.  How would you achieve this()
A

by using triggers

B

by using Data Pump

C

by using external tables

D

by using anonymous PL/SQL blocks

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

ENCRYPT_TS is an encrypted tablespace that contains tables with data. Which statement is true regarding the effect of queries and data manipulation language (DML) statements on the encrypted data in the tables?()

A. The data is decrypted during SORT and JOIN operations.

B. The data remains encrypted when it is read into memory.

C. The data remains encrypted when it is stored in the redo logs.

D. The data remains encrypted in the UNDO tablespace provided that the UNDO tablespace was created with the encryption option enabled.


参考答案:C

第2题:

Which two client requests are captured during database replay Capture?()

  • A、Flashback queries
  • B、Shared server requests
  • C、Login and logoff activities of sessions
  • D、Direct path load of data from external files by using utilities such as SQL *loader
  • E、Data definition language (DDL) and data manipulation language (DML) operations

正确答案:C,E

第3题:

Which two client requests are captured during database replay Capture?()

A. Flashback queries

B. Shared server requests

C. Login and logoff activities of sessions

D. Direct path load of data from external files by using utilities such as SQL *loader

E. Data definition language (DDL) and data manipulation language (DML) operations


参考答案:C, E

第4题:

Which  statements are correct about temporary tables()

  • A、Indexes and views can be created on temporary tables.
  • B、Both the data and the structure of temporary tables can be exported.
  • C、Temporary tables are always created in a user’s temporary tablespace.
  • D、The data inserted into a temporary table in a session is available to other sessions.
  • E、Data manipulation language (DML) locks are never acquired on the data of temporary tables

正确答案:A,C,E

第5题:

To increase the availability of an Advanced Replication environment, you can add a new master to a replication group without quiescing the group. This is achieved().

  • A、Only when the new master site already has existing replication groups. 
  • B、By issuing a single command to create, populate, and activate the new master. 
  • C、When the master definition site is not the same for all of the master groups. 
  • D、Without impacting end users who are executing data manipulation language (DML) commands on the replicated tables.

正确答案:D

第6题:

Which two client requests are captured during database replay Capture?() (Choose two)

A. Flashback queries

B. Shared server requests

C. Login and logoff activities of sessions

D. Direct path load of data from external files by using utilities such as SQL *loader

E. Data definition language (DDL) and data manipulation language (DML) operations


参考答案:C, E

第7题:

Which two statements are true regarding views?()

  • A、A subquery that defines a view cannot include the GROUP BY clause 
  • B、A view that is created with the subquery having the DISTINCT keyword can be updated 
  • C、A view that is created with the subquery having the pseudo column ROWNUM keyword cannot be updated 
  • D、A data manipulation language (DML) operation can be performed on a view that is created with the subquery having all the NOT NULL columns of a table

正确答案:C,D

第8题:

You executed the following SQL statement to shrink the EMPLOYEES table segment stored in the EXAMPLE tablespace:ALTER TABLE employees SHRINK SPACE CASCADE;Which statement is correct in this scenario?()

A. The EMPLOYEES table will be changed to read-only mode during the shrink operation.

B. The indexes created on the EMPLOYEES table will need to be rebuilt after the shrink operation is over.

C. The shrink behavior will be cascaded to all dependent segments of the table that support a shrink operation.

D. Data manipulation language (DML) operations will not be possible on the EMPLOYEES table during the COMPACTION phase of the shrink operation.


参考答案:C

第9题:

You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis.  How would you achieve this?()

  • A、by using triggers
  • B、by using external tables
  • C、by using anonymous PL/SQL blocks
  • D、by auditing all DML operations on the table

正确答案:A

第10题:

Which two statements are true about simple views?()

  • A、Views can be created as read only.
  • B、Views are data segments like tables.
  • C、Views can be created on the basis of more than one table.
  • D、Data manipulation language (DML) operations cannot be performed on views.

正确答案:A,C

更多相关问题