网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
In your production database, data manipulation language (DML) operations are executed on the SALES table.You have noticed some dubious values in the SALES table during the last few days. You are able to track users, actions taken, and the time of the action for this particular period but the changes in data are not tracked.You decide to keep track of both the old data and new data in the table along with the user information.  Whataction would you take to achieve this task()
A

Apply fine-grained auditing.

B

Implement value-based auditing.

C

Impose standard database auditing to audit object privileges.

D

Impose standard database auditing to audit SQL statements.


参考答案

参考解析
解析: 暂无解析
更多 “单选题In your production database, data manipulation language (DML) operations are executed on the SALES table.You have noticed some dubious values in the SALES table during the last few days. You are able to track users, actions taken, and the time of the action for this particular period but the changes in data are not tracked.You decide to keep track of both the old data and new data in the table along with the user information.  Whataction would you take to achieve this task()A Apply fine-grained auditing.B Implement value-based auditing.C Impose standard database auditing to audit object privileges.D Impose standard database auditing to audit SQL statements.” 相关考题
考题 Which two client requests are captured during database replay Capture?() A. Flashback queriesB. Shared server requestsC. Login and logoff activities of sessionsD. Direct path load of data from external files by using utilities such as SQL *loaderE. Data definition language (DDL) and data manipulation language (DML) operations

考题 ENCRYPT_TS is an encrypted tablespace that contains tables with data. Which statement is true regarding the effect of queries and data manipulation language (DML) statements on the encrypted data in the tables?()A. The data is decrypted during SORT and JOIN operations.B. The data remains encrypted when it is read into memory.C. The data remains encrypted when it is stored in the redo logs.D. The data remains encrypted in the UNDO tablespace provided that the UNDO tablespace was created with the encryption option enabled.

考题 Which two client requests are captured during database replay Capture?() (Choose two) A. Flashback queriesB. Shared server requestsC. Login and logoff activities of sessionsD. Direct path load of data from external files by using utilities such as SQL *loaderE. Data definition language (DDL) and data manipulation language (DML) operations

考题 Which two client requests are captured during database replay Capture?()A、Flashback queriesB、Shared server requestsC、Login and logoff activities of sessionsD、Direct path load of data from external files by using utilities such as SQL *loaderE、Data definition language (DDL) and data manipulation language (DML) operations

考题 Which statement correctly describes SQL and /SQL*Plus?()A、Both SQL and /SQL*plus allow manipulation of values in the database.B、/SQL* Plus recognizes SQL satement and sends them to the server; SQL is the Oracle proprietary interface for executing SQL statements.C、/SQL* Plus language for communicating with the Oracle server to access data; SQL recognizes SQL statements and sends them to the server.D、/SQL manipulates data and table definition in the database; /SQL* Plus does not allow manipulation of values in the database.

考题 You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis.  How would you achieve this?()A、by using triggersB、by using external tablesC、by using anonymous PL/SQL blocksD、by auditing all DML operations on the table

考题 Which  statements are correct about temporary tables()A、Indexes and views can be created on temporary tables.B、Both the data and the structure of temporary tables can be exported.C、Temporary tables are always created in a user’s temporary tablespace.D、The data inserted into a temporary table in a session is available to other sessions.E、Data manipulation language (DML) locks are never acquired on the data of temporary tables

考题 Which two statements are true about simple views?()A、Views can be created as read only.B、Views are data segments like tables.C、Views can be created on the basis of more than one table.D、Data manipulation language (DML) operations cannot be performed on views.

考题 Which two client requests are captured during database replay Capture?() (Choose two)A、Flashback queriesB、Shared server requestsC、Login and logoff activities of sessionsD、Direct path load of data from external files by using utilities such as SQL *loaderE、Data definition language (DDL) and data manipulation language (DML) operations

考题 Your database is in ARCHIVELOG mode. You lost an index tablespace due to a disk failure while the database was open. You have neither a backup of the lost index tablespace nor the scripts containing the CREATE INDEX statements to recreate the indexes. Currently, several users are executing long-running queries on the database. What will happen to the ongoing activity in the database?()A、 The queries that are currently executing will abort and an error message will be returned to the user.B、 The queries that are currently executing will execute normally but future queries will not executed.C、 Data Manipulation Language (DML) statements cannot be performed on the tables on which the indexes are based.D、 The currently executing and future queries will execute normally, but will be slower

考题 Which three statements are correct about temporary tables?()A、Indexes and views can be created on temporary tables.B、Both the data and the structure of temporary tables can be exported.C、Temporary tables are always created in a user’s temporary tablespace.D、The data inserted into a temporary table in a session is available to other sessions.E、Data manipulation language (DML) locks are never acquired on the data of temporary tables.

考题 You suspect unauthorized data manipulation language (DML) operations on a particular table. Youwant to track users who are performing the transactions and the values used in the transactions. You alsoplan to transfer these values to another table for analysis.  How would you achieve this()A、by using triggersB、by using Data PumpC、by using external tablesD、by using anonymous PL/SQL blocks

考题 单选题You suspect unauthorized data manipulation language (DML) operations on a particular table. Youwant to track users who are performing the transactions and the values used in the transactions. You alsoplan to transfer these values to another table for analysis.  How would you achieve this()A by using triggersB by using Data PumpC by using external tablesD by using anonymous PL/SQL blocks

考题 单选题Your database is in ARCHIVELOG mode. You lost an index tablespace due to a disk failure while the database was open. You have neither a backup of the lost index tablespace nor the scripts containing the CREATE INDEX statements to recreate the indexes. Currently, several users are executing long-running queries on the database. What will happen to the ongoing activity in the database?()A  The queries that are currently executing will abort and an error message will be returned to the user.B  The queries that are currently executing will execute normally but future queries will not executed.C  Data Manipulation Language (DML) statements cannot be performed on the tables on which the indexes are based.D  The currently executing and future queries will execute normally, but will be slower

考题 多选题Which two client requests are captured during database replay Capture?() (Choose two)AFlashback queriesBShared server requestsCLogin and logoff activities of sessionsDDirect path load of data from external files by using utilities such as SQL *loaderEData definition language (DDL) and data manipulation language (DML) operations

考题 多选题Which three statements are correct about temporary tables?()AIndexes and views can be created on temporary tables.BBoth the data and the structure of temporary tables can be exported.CTemporary tables are always created in a user’s temporary tablespace.DThe data inserted into a temporary table in a session is available to other sessions.EData manipulation language (DML) locks are never acquired on the data of temporary tables.

考题 单选题In your production database, data manipulation language (DML) operations are executed on the SALES table.You have noticed some dubious values in the SALES table during the last few days. You are able to track users, actions taken, and the time of the action for this particular period but the changes in data are not tracked.You decide to keep track of both the old data and new data in the table along with the user information.  Whataction would you take to achieve this task()A Apply fine-grained auditing.B Implement value-based auditing.C Impose standard database auditing to audit object privileges.D Impose standard database auditing to audit SQL statements.

考题 单选题In your production database, data manipulation language (DML) operations are executed on theSALES table. You have noticed some dubious values in the SALES table during the last few days. Youare able to track users, actions taken, and the time of the action for this particular period but the changesin data are not tracked. You decide to keep track of both the old data and new data in the table along withthe user information.  What action would you take to achieve this task()A Apply fine-grained auditing.B Implement value-based auditing.C Impose standard database auditing to auditobject privileges.D Impose standard databaseauditing to audit SQL statements.

考题 多选题Which  statements are correct about temporary tables()AIndexes and views can be created on temporary tables.BBoth the data and the structure of temporary tables can be exported.CTemporary tables are always created in a user’s temporary tablespace.DThe data inserted into a temporary table in a session is available to other sessions.EData manipulation language (DML) locks are never acquired on the data of temporary tables

考题 单选题You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis.  How would you achieve this?()A by using triggersB by using external tablesC by using anonymous PL/SQL blocksD by auditing all DML operations on the table

考题 多选题Which two statements are true about simple views?()AViews can be created as read only.BViews are data segments like tables.CViews can be created on the basis of more than one table.DData manipulation language (DML) operations cannot be performed on views.

考题 单选题You discover that the schema changes that were recently made to your SQL Server 2005 database have caused your Web site to stop functioning. It is unclear who made the changes. TestKing.com now mandates that all changes to the database schema be tracked. You need to implement a mechanism that will track schema changes in your database.  What should you do?()A Implement a stored procedure that writes data about schema changes to a log table.B Implement DDL AFTER triggers that write user and schema information to a log table.C Implement a DML INSTEAD OF trigger that writes data about schema changes to a log table.D Implement a DML AFTER trigger that writes data about schema changes to a log table.

考题 单选题Which statement correctly describes SQL and /SQL*Plus?()A Both SQL and /SQL*plus allow manipulation of values in the database.B /SQL* Plus recognizes SQL satement and sends them to the server; SQL is the Oracle proprietary interface for executing SQL statements.C /SQL* Plus language for communicating with the Oracle server to access data; SQL recognizes SQL statements and sends them to the server.D /SQL manipulates data and table definition in the database; /SQL* Plus does not allow manipulation of values in the database.

考题 单选题These are points that describe the contents of different memory components:  1: Descriptive information or metadata about schema objects that are queried by using SQL statements  2: The run-time area for data manipulation language (DML) or data definition language (DDL) statements  3: Results of SQL queries and PL/SQL functions  4: Executable forms of SQL cursors, PL/SQL programs, and Java classes  5: The information necessary to reconstruct changes made to the database by a transaction  Which of these will be stored in theShared Poolif the necessary configurations are done()A 1 and 2B 2 and 5C 1,3,and 4D 3,4,and 5E 1,2,3,and 4

考题 多选题Which two client requests are captured during database replay Capture?()AFlashback queriesBShared server requestsCLogin and logoff activities of sessionsDDirect path load of data from external files by using utilities such as SQL *loaderEData definition language (DDL) and data manipulation language (DML) operations

考题 单选题ENCRYPT_TS is an encrypted tablespace that contains tables with data. Which statement is true regarding the effect of queries and data manipulation language (DML) statements on the encrypted data in the tables?()A The data is decrypted during SORT and JOIN operations.B The data remains encrypted when it is read into memory.C The data remains encrypted when it is stored in the redo logs.D The data remains encrypted in the UNDO tablespace provided that the UNDO tablespace was created with the encryption option enabled.

考题 单选题A data manipulation language statement ().A completes a transaction on a tableB modifies the structure and data in a tableC modifies the data but not the structure of a tableD modifies the structure but not the data of a table

考题 多选题You are using a recovery catalog to maintain Recovery Manager (RMAN) backup information for your production database. You have registered your production database and are performing regular backups. Because of a new requirement you have added a few new tablespaces to your production database and you want them to be included in backups.  Identify two options for completing this task.()AReregistering the target database in recovery catalogBTransporting the new tablespaces to the recovery catalog databaseCSyncronizing the recovery catalog with the target database control fileDPerforming a fresh backup of the target database to include the new data files in the catalog database