网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You suspect unauthorized data manipulation language (DML) operations on a particular table. Youwant to track users who are performing the transactions and the values used in the transactions. You alsoplan to transfer these values to another table for analysis.  How would you achieve this()
A

by using triggers

B

by using Data Pump

C

by using external tables

D

by using anonymous PL/SQL blocks


参考答案

参考解析
解析: 暂无解析
更多 “单选题You suspect unauthorized data manipulation language (DML) operations on a particular table. Youwant to track users who are performing the transactions and the values used in the transactions. You alsoplan to transfer these values to another table for analysis.  How would you achieve this()A by using triggersB by using Data PumpC by using external tablesD by using anonymous PL/SQL blocks” 相关考题
考题 Which two client requests are captured during database replay Capture?() A. Flashback queriesB. Shared server requestsC. Login and logoff activities of sessionsD. Direct path load of data from external files by using utilities such as SQL *loaderE. Data definition language (DDL) and data manipulation language (DML) operations

考题 You executed the following SQL statement to shrink the EMPLOYEES table segment stored in the EXAMPLE tablespace:ALTER TABLE employees SHRINK SPACE CASCADE;Which statement is correct in this scenario?()A. The EMPLOYEES table will be changed to read-only mode during the shrink operation.B. The indexes created on the EMPLOYEES table will need to be rebuilt after the shrink operation is over.C. The shrink behavior will be cascaded to all dependent segments of the table that support a shrink operation.D. Data manipulation language (DML) operations will not be possible on the EMPLOYEES table during the COMPACTION phase of the shrink operation.

考题 ENCRYPT_TS is an encrypted tablespace that contains tables with data. Which statement is true regarding the effect of queries and data manipulation language (DML) statements on the encrypted data in the tables?()A. The data is decrypted during SORT and JOIN operations.B. The data remains encrypted when it is read into memory.C. The data remains encrypted when it is stored in the redo logs.D. The data remains encrypted in the UNDO tablespace provided that the UNDO tablespace was created with the encryption option enabled.

考题 Which two client requests are captured during database replay Capture?() (Choose two) A. Flashback queriesB. Shared server requestsC. Login and logoff activities of sessionsD. Direct path load of data from external files by using utilities such as SQL *loaderE. Data definition language (DDL) and data manipulation language (DML) operations

考题 Which two client requests are captured during database replay Capture?()A、Flashback queriesB、Shared server requestsC、Login and logoff activities of sessionsD、Direct path load of data from external files by using utilities such as SQL *loaderE、Data definition language (DDL) and data manipulation language (DML) operations

考题 Which two statements are true regarding views?()A、A subquery that defines a view cannot include the GROUP BY clause B、A view that is created with the subquery having the DISTINCT keyword can be updated C、A view that is created with the subquery having the pseudo column ROWNUM keyword cannot be updated D、A data manipulation language (DML) operation can be performed on a view that is created with the subquery having all the NOT NULL columns of a table

考题 To increase the availability of an Advanced Replication environment, you can add a new master to a replication group without quiescing the group. This is achieved().A、Only when the new master site already has existing replication groups. B、By issuing a single command to create, populate, and activate the new master. C、When the master definition site is not the same for all of the master groups. D、Without impacting end users who are executing data manipulation language (DML) commands on the replicated tables.

考题 You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis.  How would you achieve this?()A、by using triggersB、by using external tablesC、by using anonymous PL/SQL blocksD、by auditing all DML operations on the table

考题 Which  statements are correct about temporary tables()A、Indexes and views can be created on temporary tables.B、Both the data and the structure of temporary tables can be exported.C、Temporary tables are always created in a user’s temporary tablespace.D、The data inserted into a temporary table in a session is available to other sessions.E、Data manipulation language (DML) locks are never acquired on the data of temporary tables

考题 Which two statements are true about simple views?()A、Views can be created as read only.B、Views are data segments like tables.C、Views can be created on the basis of more than one table.D、Data manipulation language (DML) operations cannot be performed on views.

考题 Which two client requests are captured during database replay Capture?() (Choose two)A、Flashback queriesB、Shared server requestsC、Login and logoff activities of sessionsD、Direct path load of data from external files by using utilities such as SQL *loaderE、Data definition language (DDL) and data manipulation language (DML) operations

考题 Which three statements are correct about temporary tables?()A、Indexes and views can be created on temporary tables.B、Both the data and the structure of temporary tables can be exported.C、Temporary tables are always created in a user’s temporary tablespace.D、The data inserted into a temporary table in a session is available to other sessions.E、Data manipulation language (DML) locks are never acquired on the data of temporary tables.

考题 You suspect unauthorized data manipulation language (DML) operations on a particular table. Youwant to track users who are performing the transactions and the values used in the transactions. You alsoplan to transfer these values to another table for analysis.  How would you achieve this()A、by using triggersB、by using Data PumpC、by using external tablesD、by using anonymous PL/SQL blocks

考题 What are three benefits of performing data definition language (DDL) statements against a partitioned table with the UPDATE GLOBAL INDEXES clause?()A、Global indexes are rebuilt automatically at the end of the DDL operation thereby avoiding problems with the UNUSABLE status. B、You do not have to search for invalid global indexes after the DDL command completes and rebuild them individually. C、Global indexes are maintained during the operation of the DDL command and therefore can be used by any concurrent query. D、Global indexes remain intact and available for use by data manipulation language (DML) statements even for sessions that have not enabled the skipping of unusable indexes.

考题 单选题You suspect unauthorized data manipulation language (DML) operations on a particular table. Youwant to track users who are performing the transactions and the values used in the transactions. You alsoplan to transfer these values to another table for analysis.  How would you achieve this()A by using triggersB by using Data PumpC by using external tablesD by using anonymous PL/SQL blocks

考题 多选题What are three benefits of performing data definition language (DDL) statements against a partitioned table with the UPDATE GLOBAL INDEXES clause?()AGlobal indexes are rebuilt automatically at the end of the DDL operation thereby avoiding problems with the UNUSABLE status.BYou do not have to search for invalid global indexes after the DDL command completes and rebuild them individually.CGlobal indexes are maintained during the operation of the DDL command and therefore can be used by any concurrent query.DGlobal indexes remain intact and available for use by data manipulation language (DML) statements even for sessions that have not enabled the skipping of unusable indexes.

考题 多选题Which two client requests are captured during database replay Capture?() (Choose two)AFlashback queriesBShared server requestsCLogin and logoff activities of sessionsDDirect path load of data from external files by using utilities such as SQL *loaderEData definition language (DDL) and data manipulation language (DML) operations

考题 多选题Which three statements are correct about temporary tables?()AIndexes and views can be created on temporary tables.BBoth the data and the structure of temporary tables can be exported.CTemporary tables are always created in a user’s temporary tablespace.DThe data inserted into a temporary table in a session is available to other sessions.EData manipulation language (DML) locks are never acquired on the data of temporary tables.

考题 单选题In your production database, data manipulation language (DML) operations are executed on the SALES table.You have noticed some dubious values in the SALES table during the last few days. You are able to track users, actions taken, and the time of the action for this particular period but the changes in data are not tracked.You decide to keep track of both the old data and new data in the table along with the user information.  Whataction would you take to achieve this task()A Apply fine-grained auditing.B Implement value-based auditing.C Impose standard database auditing to audit object privileges.D Impose standard database auditing to audit SQL statements.

考题 单选题In your production database, data manipulation language (DML) operations are executed on theSALES table. You have noticed some dubious values in the SALES table during the last few days. Youare able to track users, actions taken, and the time of the action for this particular period but the changesin data are not tracked. You decide to keep track of both the old data and new data in the table along withthe user information.  What action would you take to achieve this task()A Apply fine-grained auditing.B Implement value-based auditing.C Impose standard database auditing to auditobject privileges.D Impose standard databaseauditing to audit SQL statements.

考题 多选题Which  statements are correct about temporary tables()AIndexes and views can be created on temporary tables.BBoth the data and the structure of temporary tables can be exported.CTemporary tables are always created in a user’s temporary tablespace.DThe data inserted into a temporary table in a session is available to other sessions.EData manipulation language (DML) locks are never acquired on the data of temporary tables

考题 单选题You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis.  How would you achieve this?()A by using triggersB by using external tablesC by using anonymous PL/SQL blocksD by auditing all DML operations on the table

考题 多选题Which two statements regarding the Flashback Table feature are correct?()AFlashback Table can be performed on system tables.BFlashback Table operation does not shrink the segments.CFlashback Table uses log mining to extract SQL_REDO and SQL_UNDO statements.DFlashback Table operation acquires exclusive data manipulation language (DML) locks.

考题 多选题Which two statements are true about simple views?()AViews can be created as read only.BViews are data segments like tables.CViews can be created on the basis of more than one table.DData manipulation language (DML) operations cannot be performed on views.

考题 单选题To increase the availability of an Advanced Replication environment, you can add a new master to a replication group without quiescing the group. This is achieved().A Only when the new master site already has existing replication groups. B By issuing a single command to create, populate, and activate the new master. C When the master definition site is not the same for all of the master groups. D Without impacting end users who are executing data manipulation language (DML) commands on the replicated tables.

考题 多选题Which two client requests are captured during database replay Capture?()AFlashback queriesBShared server requestsCLogin and logoff activities of sessionsDDirect path load of data from external files by using utilities such as SQL *loaderEData definition language (DDL) and data manipulation language (DML) operations

考题 单选题ENCRYPT_TS is an encrypted tablespace that contains tables with data. Which statement is true regarding the effect of queries and data manipulation language (DML) statements on the encrypted data in the tables?()A The data is decrypted during SORT and JOIN operations.B The data remains encrypted when it is read into memory.C The data remains encrypted when it is stored in the redo logs.D The data remains encrypted in the UNDO tablespace provided that the UNDO tablespace was created with the encryption option enabled.

考题 单选题A data manipulation language statement ().A completes a transaction on a tableB modifies the structure and data in a tableC modifies the data but not the structure of a tableD modifies the structure but not the data of a table