单选题You work as a database administrator for Certkiller .com. You suspect that in one of your applications the customer table is being accessed by some unauthorized users. Which option would you use to monitor the queries being executed on the customer tab

题目
单选题
You work as a database administrator for Certkiller .com. You suspect that in one of your applications the customer table is being accessed by some unauthorized users. Which option would you use to monitor the queries being executed on the customer table?()
A

Monitor thealert.logfile

B

Enable server-side SQL tracing for user sessions

C

Enable fine-grained auditing for the customer table

D

Enable Fine-Grained Access Control (FGAC) for the customer table

E

Write a database trigger on the customer table on the SELECT event

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

You work as a database administrator for Certkiller .com. Your database is in NOARCHIVELOG mode and you want to perform a backup. Which type of backup would be appropriate in this case? ()

  • A、Hot backup
  • B、Online backup
  • C、consistent backup
  • D、incremental backup
  • E、inconsistent backup

正确答案:C

第2题:

You work as a database administrator for Certkiller .com. In your transaction application, you have scheduled a job to update the optimizer statistics at05:00 pm every Friday. The job has successfully completed. Which three pieces of information would you check to confirm that the statistics have been collected?()

  • A、Average row size
  • B、Last analyzed date
  • C、Size of table in bytes
  • D、Size of table in database blocks
  • E、Number of free blocks in the free list
  • F、Number of extents present in the table.

正确答案:A,B,D

第3题:

You work as a database administrator for Supportcenter.cn. You find that reports are running for a long time in your data warehousing applications. You suspect a lack of indexes is the reason for the performance degradation. Which advisory component would you refer to, in order to determine the appropriate indexes?()

  • A、Memory Advisors
  • B、Segment Advisors
  • C、SQL Tuning and Access Advisors
  • D、Automated Workload Repository (AWR)
  • E、Automatic Database Diagnostic Monitor (ADDM)

正确答案:C

第4题:

You work as a database administrator for Supportcenter.cn. You suspect that in one of your applications the customer table is being accessed by some unauthorized users. Which option would you use to monitor the queries being executed on the customer table?()

  • A、Monitor thealert.logfile
  • B、Enable server-side SQL tracing for user sessions
  • C、Enable fine-grained auditing for the customer table
  • D、Enable Fine-Grained Access Control (FGAC) for the customer table
  • E、Write a database trigger on the customer table on the SELECT event

正确答案:D

第5题:

In one of your online transaction processing (OLTP) applications, users are manipulating and querying a database table simultaneously. From the Segment Advisor, you find that one of the tables is highly fragmented and you want to shrink the table immediately without affecting the currently active queries.  Which option would you use with the ALTER TABLE command to achieve this objective?()

  • A、REBUILD
  • B、CASCADE
  • C、TRUNCATE
  • D、ROW MOVEMENT
  • E、SHRINK SPACE COMPACT
  • F、SHRINK SPACE CASCADE

正确答案:E

第6题:

You work as a database administrator for Certkiller .com. You find that reports are running for a long time in your data warehousing applications. You suspect a lack of indexes is the reason for the performance degradation.  Which advisory component would you refer to, in order to determine the appropriate indexes?()

  • A、Memory Advisors
  • B、Segment Advisors
  • C、SQL Tuning and Access Advisors
  • D、Automated Workload Repository (AWR)
  • E、Automatic Database Diagnostic Monitor (ADDM)

正确答案:C

第7题:

You work as a database administrator for Certkiller .com. Your database is in NOARCHIVELOG mode. The database has been configured with three redo logs groups, and there have been five log switches. You lost one non-system-critical data file from your database.  Which method would you use to recover the data file?()

  • A、Restore all the data files and open the database
  • B、Create the data file and performtablespacerecovery
  • C、No need to restore any file, just recover the database
  • D、Restore only the system data file and recover the database
  • E、Restore only lost date file and performtablespacerecovery

正确答案:A

第8题:

You work as a database administrator for Certkiller .com. You are using three database, Certkiller DB01, Certkiller DB02, and Certkiller DB03, on different host machines in your development environment. The database serverconfiguration, such as IP address and listener port number, change frequently due to development requirements, and you havethe task of notifying the developers of the changes. Which connection method would you use to overcome this overhead?()

  • A、Host naming
  • B、Local naming
  • C、Easy Connect
  • D、External naming
  • E、directory naming

正确答案:E

第9题:

You work as a database administrator for Certkiller .com. While loading data into the Certkiller STAFF table using Oracle Enterprise Manager 10g Database Control, you find the status of the job as failed. On further investigation, you find the following error message in the output log: ORA-01653 unable to extend table HR. Certkiller STAFF by 8 intablespaceUSERS Which task would you perform to load the data successfully without affecting the users who are accessing the table?()

  • A、Restart the database instance and run the job
  • B、Truncate the Certkiller STAFF table and run the job
  • C、Delete all rows from the Certkiller STAFF table and run the job
  • D、Increase the size of the USERStablespacethe and run the job
  • E、Increase the size of the database default permanenttablespaceand run the job

正确答案:D

第10题:

You observe that in your PROD database, customer information is being modified by some unauthorized users. You want to keep track of all of the transactions happening on the table using PL/SQL. Which type of PL/SQL subprogram or construct would you use to accomplish this task?()

  • A、functions
  • B、packages
  • C、procedures
  • D、database triggers
  • E、anonymous PL/SQL block

正确答案:D

更多相关问题