网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

In your production database, data manipulation language (DML) operations are executed on the SALES table.You have noticed some dubious values in the SALES table during the last few days. You are able to track users, actions taken, and the time of the action for this particular period but the changes in data are not tracked.You decide to keep track of both the old data and new data in the table along with the user information.  Whataction would you take to achieve this task()

  • A、Apply fine-grained auditing.
  • B、Implement value-based auditing.
  • C、Impose standard database auditing to audit object privileges.
  • D、Impose standard database auditing to audit SQL statements.

参考答案

更多 “ In your production database, data manipulation language (DML) operations are executed on the SALES table.You have noticed some dubious values in the SALES table during the last few days. You are able to track users, actions taken, and the time of the action for this particular period but the changes in data are not tracked.You decide to keep track of both the old data and new data in the table along with the user information.  Whataction would you take to achieve this task()A、Apply fine-grained auditing.B、Implement value-based auditing.C、Impose standard database auditing to audit object privileges.D、Impose standard database auditing to audit SQL statements.” 相关考题
考题 You are the database administrator for a retail company. The company owns 270 stores. Every month, each store submits approximately 2,000 sales records, which are loaded into a SQL Server 2000 database at the corporate headquarters.A Data Transformation Services (DTS) package transforms the sales records, as they are loaded. The package writes the transformed sales records to the Sales table, which has a column for integer primary key values. The IDENTITY property automatically assigns a key value to each transformed sales record.After loading this month's sales data, you discover that a portion of the data contains errors. You stop loading data, identify the problem records, and delete those records from the database.You want to reuse the key values that were assigned to the records that you deleted. You want to assign the deleted key values to the next sales records you load. You also want to disrupt users' work as little as possible.What should you do?A.Export all records from the Sales table to a temporary table. Truncate the Sales table, and then reload the records from the temporary table.B.Export all records from the Sales table to a text file. Drop the Sales table, and then reload the records from the text file.C.Use the DBCC CHECKIDENT statement to reseed the Sales table's IDENTITY property.D.Set the Sales table's IDENTITY_INSERT property to ON. Add new sales records that have the desired key values.

考题 Which two client requests are captured during database replay Capture?() A. Flashback queriesB. Shared server requestsC. Login and logoff activities of sessionsD. Direct path load of data from external files by using utilities such as SQL *loaderE. Data definition language (DDL) and data manipulation language (DML) operations

考题 Which two client requests are captured during database replay Capture?() (Choose two) A. Flashback queriesB. Shared server requestsC. Login and logoff activities of sessionsD. Direct path load of data from external files by using utilities such as SQL *loaderE. Data definition language (DDL) and data manipulation language (DML) operations

考题 You are the administrator of a SQL Server 2000 computer. The server contains database named Sales. Users report that they cannot add new data to the database. You examine the properties of the database. The database is configured as shown in the Sales Properties exhibit.You examine drive E. The hard disk is configured as shown in the Local Disk Properties exhibit.You want the users to be able to add data, and you want to minimize administrative overhead. What should you do?A.Increase the maximum file size of Sales_Data to 1,500MB.B.Use the DBCC SHRINKDATABASE statement.C.Set automatic file growth to 10 percent.D.Create another data file named Sales_Data2 in a new SECONDARY filegroup.

考题 The production database has been functional for the last seven days. Because of application requirements, some of the initialization parameters were changed during run time without any comments. You have asked to find out the value of the parameters when the instance was started.Which source would you use to locate this information?()A、 Fixed viewsB、 The alert log fileC、 The parameter fileD、 The server parameter fileE、 Dynamic performance views

考题 You discover that the schema changes that were recently made to your SQL Server 2005 database have caused your Web site to stop functioning. It is unclear who made the changes. TestKing.com now mandates that all changes to the database schema be tracked. You need to implement a mechanism that will track schema changes in your database.  What should you do?()A、Implement a stored procedure that writes data about schema changes to a log table.B、Implement DDL AFTER triggers that write user and schema information to a log table.C、Implement a DML INSTEAD OF trigger that writes data about schema changes to a log table.D、Implement a DML AFTER trigger that writes data about schema changes to a log table.

考题 You have a range-partitioned table in your database. Each partition in the table contains the sales data for a quarter.  The partition related to the current quarter is modified frequently and other partitions undergo fewer data manipulations. The preferences for the table are set to their default values. You collect statistics for the table using the following command in regular intervals: SQL EXECUTE  DBMS_STATS.GATHER_TABLE_STATS(’SH’,’SALES’,GRANULARITY=’GLOBAL’);   You need statistics to be collected more quickly.  What can you do to achieve this?()A、 Set DYNAMIC_SAMPLING to level 4B、 Set the STATISTICS_LEVEL parameter to BASICC、 Set the INCREMENTAL value to TRUE for the partition tableD、 Increase the value of STALE_PERCENT for the partition table

考题 You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis.  How would you achieve this?()A、by using triggersB、by using external tablesC、by using anonymous PL/SQL blocksD、by auditing all DML operations on the table

考题 In your production database, users report that they are unable to generate reports on an important table because it does not contain any data. While investigating the reason, you realize that another user executed the TRUNCATE TABLE command, which accidentally caused the data to be lost. Now you want to recover the lost data of the table without affecting objects in other schemas. Which method must you use to recover the lost data?()A、Complete Recovery with online redo logB、Complete Recovery with archived redo logC、Tablespace Point-in-Time Recovery (TSPITR)D、Incomplete Recovery with system change number (SCN)

考题 Which two client requests are captured during database replay Capture?()A、 Flashback queriesB、 Shared server requestsC、 Login and logoff activities of sessionsD、 Direct path load of data from external files by using utilities such as SQL *loaderE、 Data definition language (DDL) and data manipulation language (DML) operations

考题 Which two client requests are captured during database replay Capture?() (Choose two)A、Flashback queriesB、Shared server requestsC、Login and logoff activities of sessionsD、Direct path load of data from external files by using utilities such as SQL *loaderE、Data definition language (DDL) and data manipulation language (DML) operations

考题 Your database is in ARCHIVELOG mode. You lost an index tablespace due to a disk failure while the database was open. You have neither a backup of the lost index tablespace nor the scripts containing the CREATE INDEX statements to recreate the indexes. Currently, several users are executing long-running queries on the database. What will happen to the ongoing activity in the database?()A、 The queries that are currently executing will abort and an error message will be returned to the user.B、 The queries that are currently executing will execute normally but future queries will not executed.C、 Data Manipulation Language (DML) statements cannot be performed on the tables on which the indexes are based.D、 The currently executing and future queries will execute normally, but will be slower

考题 You executed the following query in your database:  FROM V$FLASHBACK_DATABASE_LOG;  What would you determine from the output?()A、the time when the last flashback operation in your database was performedB、the time when the first flashback operation in your database was performedC、a list of flashback operations performed in your database using SCN and timeD、the approximate time and the lowest system change number (SCN) to which you can flash back your database

考题 There is a problem with one of the disks used for your database and your system administrator informs you that the disk needs to be replaced. The replacement disk will not be available until tomorrow.  There was only one data file on this disk; it belongs to the USERS tablespace in your PROD database. Your PROD database runs in ARCHIVELOG mode and nightly online backups are taken. The users need to be able to access the data in the USERS tablespace before the replacement disk arrives. You have already taken the USERS tablespace offline and have restored the data file from last night’s backup to a new disk. Which additional steps are required in order to make the USERS tablespace available?()A、Only bring the tablespace back online.B、Only recover the tablespace and then bring the tablespace back online.C、Shut down the database, recover the data file and then start up the database.D、Issue the ALTER DATABASE RENAME FILE command, recover the tablespace, and then bring the tablespace online.E、Recover the tablespace, issue the ALTER DATABASE RENAME FILE command, and then bring the tablespace online.

考题 In your production database, data manipulation language (DML) operations are executed on theSALES table. You have noticed some dubious values in the SALES table during the last few days. Youare able to track users, actions taken, and the time of the action for this particular period but the changesin data are not tracked. You decide to keep track of both the old data and new data in the table along withthe user information.  What action would you take to achieve this task()A、Apply fine-grained auditing.B、Implement value-based auditing.C、Impose standard database auditing to auditobject privileges.D、Impose standard databaseauditing to audit SQL statements.

考题 You suspect unauthorized data manipulation language (DML) operations on a particular table. Youwant to track users who are performing the transactions and the values used in the transactions. You alsoplan to transfer these values to another table for analysis.  How would you achieve this()A、by using triggersB、by using Data PumpC、by using external tablesD、by using anonymous PL/SQL blocks

考题 You executed the following SQL statement to shrink the EMPLOYEES table segment stored in the EXAMPLE tablespace: ALTER TABLE employees SHRINK SPACE CASCADE; Which statement is correct in this scenario?()A、The EMPLOYEES table will be changed to read-only mode during the shrink operation.B、The indexes created on the EMPLOYEES table will need to be rebuilt after the shrink operation is over.C、The shrink behavior will be cascaded to all dependent segments of the table that support a shrink operation.D、Data manipulation language (DML) operations will not be possible on the EMPLOYEES table during the COMPACTION phase of the shrink operation.

考题 A support engineer reports that inserting new sales transactions in a SQL Server 2005 database results in an error. You investigate the error. You discover that in one of the databases, a developer has accidentally deleted some data in a table that is critical for transaction processing. The database uses the full recovery model. You need to restore the table. You need to achieve this goal without affecting the availability of other data in the database. What should you do?()A、Back up the current transaction log. Restore the database with a different name and stop at the point just before the data loss. Copy the table back into the original database.B、Back up the current transaction log. Restore the database to the point just before the data loss.C、Restore the database from the existing backup files to a time just before the data loss.D、Restore the database to the point of the last full backup.

考题 多选题Which two client requests are captured during database replay Capture?()AFlashback queriesBShared server requestsCLogin and logoff activities of sessionsDDirect path load of data from external files by using utilities such as SQL *loaderEData definition language (DDL) and data manipulation language (DML) operations

考题 单选题Your database is in ARCHIVELOG mode. You lost an index tablespace due to a disk failure while the database was open. You have neither a backup of the lost index tablespace nor the scripts containing the CREATE INDEX statements to recreate the indexes. Currently, several users are executing long-running queries on the database. What will happen to the ongoing activity in the database?()A  The queries that are currently executing will abort and an error message will be returned to the user.B  The queries that are currently executing will execute normally but future queries will not executed.C  Data Manipulation Language (DML) statements cannot be performed on the tables on which the indexes are based.D  The currently executing and future queries will execute normally, but will be slower

考题 单选题You executed the following SQL statement to shrink the EMPLOYEES table segment stored in the EXAMPLE tablespace: ALTER TABLE employees SHRINK SPACE CASCADE; Which statement is correct in this scenario?()A The data in the segment will be compacted but the high water mark will not be adjusted B The EMPLOYEES table will be changed to read-only mode during the shrink operation C The indexes created on the EMPLOYEES table will need to be rebuilt after the shrink operation is overD The shrink behavior will be cascaded to all dependent segments of the table that support a shrink operation E Data manipulation language (DML) operations will not be possible on the EMPLOYEES table during the COMPACTION phase of the shrink operation

考题 单选题You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis.  How would you achieve this?()A by using triggersB by using external tablesC by using anonymous PL/SQL blocksD by auditing all DML operations on the table

考题 单选题You executed the following query in your database:  FROM V$FLASHBACK_DATABASE_LOG;  What would you determine from the output?()A the time when the last flashback operation in your database was performedB the time when the first flashback operation in your database was performedC a list of flashback operations performed in your database using SCN and timeD the approximate time and the lowest system change number (SCN) to which you can flash back your database

考题 单选题You suspect unauthorized data manipulation language (DML) operations on a particular table. Youwant to track users who are performing the transactions and the values used in the transactions. You alsoplan to transfer these values to another table for analysis.  How would you achieve this()A by using triggersB by using Data PumpC by using external tablesD by using anonymous PL/SQL blocks

考题 单选题There is a problem with one of the disks used for your database and your system administrator informs you that the disk needs to be replaced. The replacement disk will not be available until tomorrow.  There was only one data file on this disk; it belongs to the USERS tablespace in your PROD database. Your PROD database runs in ARCHIVELOG mode and nightly online backups are taken. The users need to be able to access the data in the USERS tablespace before the replacement disk arrives. You have already taken the USERS tablespace offline and have restored the data file from last night’s backup to a new disk. Which additional steps are required in order to make the USERS tablespace available?()A Only bring the tablespace back online.B Only recover the tablespace and then bring the tablespace back online.C Shut down the database, recover the data file and then start up the database.D Issue the ALTER DATABASE RENAME FILE command, recover the tablespace, and then bring the tablespace online.E Recover the tablespace, issue the ALTER DATABASE RENAME FILE command, and then bring the tablespace online.

考题 单选题You executed the following SQL statement to shrink the EMPLOYEES table segment stored in the EXAMPLE tablespace: ALTER TABLE employees SHRINK SPACE CASCADE; Which statement is correct in this scenario?()A The EMPLOYEES table will be changed to read-only mode during the shrink operation.B The indexes created on the EMPLOYEES table will need to be rebuilt after the shrink operation is over.C The shrink behavior will be cascaded to all dependent segments of the table that support a shrink operation.D Data manipulation language (DML) operations will not be possible on the EMPLOYEES table during the COMPACTION phase of the shrink operation.

考题 多选题Which two client requests are captured during database replay Capture?() (Choose two)AFlashback queriesBShared server requestsCLogin and logoff activities of sessionsDDirect path load of data from external files by using utilities such as SQL *loaderEData definition language (DDL) and data manipulation language (DML) operations