In your production database, data manipulation language (DML

题目
单选题
In your production database, data manipulation language (DML) operations are executed on the SALES table.You have noticed some dubious values in the SALES table during the last few days. You are able to track users, actions taken, and the time of the action for this particular period but the changes in data are not tracked.You decide to keep track of both the old data and new data in the table along with the user information.  Whataction would you take to achieve this task()
A

Apply fine-grained auditing.

B

Implement value-based auditing.

C

Impose standard database auditing to audit object privileges.

D

Impose standard database auditing to audit SQL statements.

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which two client requests are captured during database replay Capture?() (Choose two)

A. Flashback queries

B. Shared server requests

C. Login and logoff activities of sessions

D. Direct path load of data from external files by using utilities such as SQL *loader

E. Data definition language (DDL) and data manipulation language (DML) operations


参考答案:C, E

第2题:

Which statement correctly describes SQL and /SQL*Plus?()

  • A、Both SQL and /SQL*plus allow manipulation of values in the database.
  • B、/SQL* Plus recognizes SQL satement and sends them to the server; SQL is the Oracle proprietary interface for executing SQL statements.
  • C、/SQL* Plus language for communicating with the Oracle server to access data; SQL recognizes SQL statements and sends them to the server.
  • D、/SQL manipulates data and table definition in the database; /SQL* Plus does not allow manipulation of values in the database.

正确答案:A

第3题:

Which two client requests are captured during database replay Capture?()

A. Flashback queries

B. Shared server requests

C. Login and logoff activities of sessions

D. Direct path load of data from external files by using utilities such as SQL *loader

E. Data definition language (DDL) and data manipulation language (DML) operations


参考答案:C, E

第4题:

Which two client requests are captured during database replay Capture?() (Choose two)

  • A、Flashback queries
  • B、Shared server requests
  • C、Login and logoff activities of sessions
  • D、Direct path load of data from external files by using utilities such as SQL *loader
  • E、Data definition language (DDL) and data manipulation language (DML) operations

正确答案:C,E

第5题:

Which  statements are correct about temporary tables()

  • A、Indexes and views can be created on temporary tables.
  • B、Both the data and the structure of temporary tables can be exported.
  • C、Temporary tables are always created in a user’s temporary tablespace.
  • D、The data inserted into a temporary table in a session is available to other sessions.
  • E、Data manipulation language (DML) locks are never acquired on the data of temporary tables

正确答案:A,C,E

第6题:

Which two client requests are captured during database replay Capture?()

  • A、Flashback queries
  • B、Shared server requests
  • C、Login and logoff activities of sessions
  • D、Direct path load of data from external files by using utilities such as SQL *loader
  • E、Data definition language (DDL) and data manipulation language (DML) operations

正确答案:C,E

第7题:

You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis.  How would you achieve this?()

  • A、by using triggers
  • B、by using external tables
  • C、by using anonymous PL/SQL blocks
  • D、by auditing all DML operations on the table

正确答案:A

第8题:

ENCRYPT_TS is an encrypted tablespace that contains tables with data. Which statement is true regarding the effect of queries and data manipulation language (DML) statements on the encrypted data in the tables?()

A. The data is decrypted during SORT and JOIN operations.

B. The data remains encrypted when it is read into memory.

C. The data remains encrypted when it is stored in the redo logs.

D. The data remains encrypted in the UNDO tablespace provided that the UNDO tablespace was created with the encryption option enabled.


参考答案:C

第9题:

Which two statements are true about simple views?()

  • A、Views can be created as read only.
  • B、Views are data segments like tables.
  • C、Views can be created on the basis of more than one table.
  • D、Data manipulation language (DML) operations cannot be performed on views.

正确答案:A,C

第10题:

Your database is in ARCHIVELOG mode. You lost an index tablespace due to a disk failure while the database was open. You have neither a backup of the lost index tablespace nor the scripts containing the CREATE INDEX statements to recreate the indexes. Currently, several users are executing long-running queries on the database. What will happen to the ongoing activity in the database?()

  • A、 The queries that are currently executing will abort and an error message will be returned to the user.
  • B、 The queries that are currently executing will execute normally but future queries will not executed.
  • C、 Data Manipulation Language (DML) statements cannot be performed on the tables on which the indexes are based.
  • D、 The currently executing and future queries will execute normally, but will be slower

正确答案:D

更多相关问题