niusouti.com

单选题In your production database, data manipulation language (DML) operations are executed on the SALES table.You have noticed some dubious values in the SALES table during the last few days. You are able to track users, actions taken, and the time of the a

题目
单选题
In your production database, data manipulation language (DML) operations are executed on the SALES table.You have noticed some dubious values in the SALES table during the last few days. You are able to track users, actions taken, and the time of the action for this particular period but the changes in data are not tracked.You decide to keep track of both the old data and new data in the table along with the user information.  Whataction would you take to achieve this task()
A

Apply fine-grained auditing.

B

Implement value-based auditing.

C

Impose standard database auditing to audit object privileges.

D

Impose standard database auditing to audit SQL statements.


相似考题
更多“单选题In your production database, data manipulation language (DML) operations are executed on the SALES table.You have noticed some dubious values in the SALES table during the last few days. You are able to track users, actions taken, and the time of the a”相关问题
  • 第1题:

    You discover that the schema changes that were recently made to your SQL Server 2005 database have caused your Web site to stop functioning. It is unclear who made the changes. TestKing.com now mandates that all changes to the database schema be tracked. You need to implement a mechanism that will track schema changes in your database.  What should you do?()

    • A、Implement a stored procedure that writes data about schema changes to a log table.
    • B、Implement DDL AFTER triggers that write user and schema information to a log table.
    • C、Implement a DML INSTEAD OF trigger that writes data about schema changes to a log table.
    • D、Implement a DML AFTER trigger that writes data about schema changes to a log table.

    正确答案:B

  • 第2题:

    You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis.  How would you achieve this?()

    • A、by using triggers
    • B、by using external tables
    • C、by using anonymous PL/SQL blocks
    • D、by auditing all DML operations on the table

    正确答案:A

  • 第3题:

    Which two client requests are captured during database replay Capture?()

    • A、 Flashback queries
    • B、 Shared server requests
    • C、 Login and logoff activities of sessions
    • D、 Direct path load of data from external files by using utilities such as SQL *loader
    • E、 Data definition language (DDL) and data manipulation language (DML) operations

    正确答案:C,E

  • 第4题:

    Your database is in ARCHIVELOG mode. You lost an index tablespace due to a disk failure while the database was open. You have neither a backup of the lost index tablespace nor the scripts containing the CREATE INDEX statements to recreate the indexes. Currently, several users are executing long-running queries on the database. What will happen to the ongoing activity in the database?()

    • A、 The queries that are currently executing will abort and an error message will be returned to the user.
    • B、 The queries that are currently executing will execute normally but future queries will not executed.
    • C、 Data Manipulation Language (DML) statements cannot be performed on the tables on which the indexes are based.
    • D、 The currently executing and future queries will execute normally, but will be slower

    正确答案:D

  • 第5题:

    In your production database, data manipulation language (DML) operations are executed on theSALES table. You have noticed some dubious values in the SALES table during the last few days. Youare able to track users, actions taken, and the time of the action for this particular period but the changesin data are not tracked. You decide to keep track of both the old data and new data in the table along withthe user information.  What action would you take to achieve this task()

    • A、Apply fine-grained auditing.
    • B、Implement value-based auditing.
    • C、Impose standard database auditing to auditobject privileges.
    • D、Impose standard databaseauditing to audit SQL statements.

    正确答案:B

  • 第6题:

    You executed the following SQL statement to shrink the EMPLOYEES table segment stored in the EXAMPLE tablespace: ALTER TABLE employees SHRINK SPACE CASCADE; Which statement is correct in this scenario?()

    • A、The EMPLOYEES table will be changed to read-only mode during the shrink operation.
    • B、The indexes created on the EMPLOYEES table will need to be rebuilt after the shrink operation is over.
    • C、The shrink behavior will be cascaded to all dependent segments of the table that support a shrink operation.
    • D、Data manipulation language (DML) operations will not be possible on the EMPLOYEES table during the COMPACTION phase of the shrink operation.

    正确答案:C

  • 第7题:

    单选题
    You executed the following SQL statement to shrink the EMPLOYEES table segment stored in the EXAMPLE tablespace: ALTER TABLE employees SHRINK SPACE CASCADE; Which statement is correct in this scenario?()
    A

    The data in the segment will be compacted but the high water mark will not be adjusted 

    B

    The EMPLOYEES table will be changed to read-only mode during the shrink operation 

    C

    The indexes created on the EMPLOYEES table will need to be rebuilt after the shrink operation is over

    D

    The shrink behavior will be cascaded to all dependent segments of the table that support a shrink operation 

    E

    Data manipulation language (DML) operations will not be possible on the EMPLOYEES table during the COMPACTION phase of the shrink operation


    正确答案: E
    解析: 暂无解析

  • 第8题:

    单选题
    In your production database, users report that they are unable to generate reports on an important table because it does not contain any data. While investigating the reason, you realize that another user executed the TRUNCATE TABLE command, which accidentally caused the data to be lost. Now you want to recover the lost data of the table without affecting objects in other schemas. Which method must you use to recover the lost data?()
    A

    Complete Recovery with online redo log

    B

    Complete Recovery with archived redo log

    C

    Tablespace Point-in-Time Recovery (TSPITR)

    D

    Incomplete Recovery with system change number (SCN)


    正确答案: C
    解析: 暂无解析

  • 第9题:

    单选题
    You discover that the schema changes that were recently made to your SQL Server 2005 database have caused your Web site to stop functioning. It is unclear who made the changes. TestKing.com now mandates that all changes to the database schema be tracked. You need to implement a mechanism that will track schema changes in your database.  What should you do?()
    A

    Implement a stored procedure that writes data about schema changes to a log table.

    B

    Implement DDL AFTER triggers that write user and schema information to a log table.

    C

    Implement a DML INSTEAD OF trigger that writes data about schema changes to a log table.

    D

    Implement a DML AFTER trigger that writes data about schema changes to a log table.


    正确答案: B
    解析: 暂无解析

  • 第10题:

    单选题
    You suspect unauthorized data manipulation language (DML) operations on a particular table. Youwant to track users who are performing the transactions and the values used in the transactions. You alsoplan to transfer these values to another table for analysis.  How would you achieve this()
    A

    by using triggers

    B

    by using Data Pump

    C

    by using external tables

    D

    by using anonymous PL/SQL blocks


    正确答案: A
    解析: 暂无解析

  • 第11题:

    单选题
    You executed the following SQL statement to shrink the EMPLOYEES table segment stored in the EXAMPLE tablespace: ALTER TABLE employees SHRINK SPACE CASCADE; Which statement is correct in this scenario?()
    A

    The EMPLOYEES table will be changed to read-only mode during the shrink operation.

    B

    The indexes created on the EMPLOYEES table will need to be rebuilt after the shrink operation is over.

    C

    The shrink behavior will be cascaded to all dependent segments of the table that support a shrink operation.

    D

    Data manipulation language (DML) operations will not be possible on the EMPLOYEES table during the COMPACTION phase of the shrink operation.


    正确答案: C
    解析: 暂无解析

  • 第12题:

    多选题
    Which two client requests are captured during database replay Capture?() (Choose two)
    A

    Flashback queries

    B

    Shared server requests

    C

    Login and logoff activities of sessions

    D

    Direct path load of data from external files by using utilities such as SQL *loader

    E

    Data definition language (DDL) and data manipulation language (DML) operations


    正确答案: C,E
    解析: 暂无解析

  • 第13题:

    You have a range-partitioned table in your database. Each partition in the table contains the sales data for a quarter.  The partition related to the current quarter is modified frequently and other partitions undergo fewer data manipulations. The preferences for the table are set to their default values. You collect statistics for the table using the following command in regular intervals: SQL> EXECUTE  DBMS_STATS.GATHER_TABLE_STATS(’SH’,’SALES’,GRANULARITY=>’GLOBAL’);   You need statistics to be collected more quickly.  What can you do to achieve this?()

    • A、 Set DYNAMIC_SAMPLING to level 4
    • B、 Set the STATISTICS_LEVEL parameter to BASIC
    • C、 Set the INCREMENTAL value to TRUE for the partition table
    • D、 Increase the value of STALE_PERCENT for the partition table

    正确答案:C

  • 第14题:

    In your production database, data manipulation language (DML) operations are executed on the SALES table.You have noticed some dubious values in the SALES table during the last few days. You are able to track users, actions taken, and the time of the action for this particular period but the changes in data are not tracked.You decide to keep track of both the old data and new data in the table along with the user information.  Whataction would you take to achieve this task()

    • A、Apply fine-grained auditing.
    • B、Implement value-based auditing.
    • C、Impose standard database auditing to audit object privileges.
    • D、Impose standard database auditing to audit SQL statements.

    正确答案:B

  • 第15题:

    Which two client requests are captured during database replay Capture?() (Choose two)

    • A、Flashback queries
    • B、Shared server requests
    • C、Login and logoff activities of sessions
    • D、Direct path load of data from external files by using utilities such as SQL *loader
    • E、Data definition language (DDL) and data manipulation language (DML) operations

    正确答案:C,E

  • 第16题:

    You executed the following query in your database:  FROM V$FLASHBACK_DATABASE_LOG;  What would you determine from the output?()

    • A、the time when the last flashback operation in your database was performed
    • B、the time when the first flashback operation in your database was performed
    • C、a list of flashback operations performed in your database using SCN and time
    • D、the approximate time and the lowest system change number (SCN) to which you can flash back your database

    正确答案:D

  • 第17题:

    You suspect unauthorized data manipulation language (DML) operations on a particular table. Youwant to track users who are performing the transactions and the values used in the transactions. You alsoplan to transfer these values to another table for analysis.  How would you achieve this()

    • A、by using triggers
    • B、by using Data Pump
    • C、by using external tables
    • D、by using anonymous PL/SQL blocks

    正确答案:A

  • 第18题:

    多选题
    Which two client requests are captured during database replay Capture?()
    A

    Flashback queries

    B

    Shared server requests

    C

    Login and logoff activities of sessions

    D

    Direct path load of data from external files by using utilities such as SQL *loader

    E

    Data definition language (DDL) and data manipulation language (DML) operations


    正确答案: D,A
    解析: 暂无解析

  • 第19题:

    单选题
    You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis.  How would you achieve this?()
    A

    by using triggers

    B

    by using external tables

    C

    by using anonymous PL/SQL blocks

    D

    by auditing all DML operations on the table


    正确答案: C
    解析: 暂无解析

  • 第20题:

    单选题
    You executed the following query in your database:  FROM V$FLASHBACK_DATABASE_LOG;  What would you determine from the output?()
    A

    the time when the last flashback operation in your database was performed

    B

    the time when the first flashback operation in your database was performed

    C

    a list of flashback operations performed in your database using SCN and time

    D

    the approximate time and the lowest system change number (SCN) to which you can flash back your database


    正确答案: D
    解析: 暂无解析

  • 第21题:

    单选题
    In your production database, data manipulation language (DML) operations are executed on theSALES table. You have noticed some dubious values in the SALES table during the last few days. Youare able to track users, actions taken, and the time of the action for this particular period but the changesin data are not tracked. You decide to keep track of both the old data and new data in the table along withthe user information.  What action would you take to achieve this task()
    A

    Apply fine-grained auditing.

    B

    Implement value-based auditing.

    C

    Impose standard database auditing to auditobject privileges.

    D

    Impose standard databaseauditing to audit SQL statements.


    正确答案: D
    解析: 暂无解析

  • 第22题:

    单选题
    There is a problem with one of the disks used for your database and your system administrator informs you that the disk needs to be replaced. The replacement disk will not be available until tomorrow.  There was only one data file on this disk; it belongs to the USERS tablespace in your PROD database. Your PROD database runs in ARCHIVELOG mode and nightly online backups are taken. The users need to be able to access the data in the USERS tablespace before the replacement disk arrives. You have already taken the USERS tablespace offline and have restored the data file from last night’s backup to a new disk. Which additional steps are required in order to make the USERS tablespace available?()
    A

    Only bring the tablespace back online.

    B

    Only recover the tablespace and then bring the tablespace back online.

    C

    Shut down the database, recover the data file and then start up the database.

    D

    Issue the ALTER DATABASE RENAME FILE command, recover the tablespace, and then bring the tablespace online.

    E

    Recover the tablespace, issue the ALTER DATABASE RENAME FILE command, and then bring the tablespace online.


    正确答案: B
    解析: 暂无解析

  • 第23题:

    单选题
    You have a range-partitioned table in your database. Each partition in the table contains the sales data for a quarter.  The partition related to the current quarter is modified frequently and other partitions undergo fewer data manipulations. The preferences for the table are set to their default values. You collect statistics for the table using the following command in regular intervals: SQL> EXECUTE  DBMS_STATS.GATHER_TABLE_STATS(’SH’,’SALES’,GRANULARITY=>’GLOBAL’);   You need statistics to be collected more quickly.  What can you do to achieve this?()
    A

     Set DYNAMIC_SAMPLING to level 4

    B

     Set the STATISTICS_LEVEL parameter to BASIC

    C

     Set the INCREMENTAL value to TRUE for the partition table

    D

     Increase the value of STALE_PERCENT for the partition table


    正确答案: D
    解析: 暂无解析

  • 第24题:

    单选题
    In your production database, data manipulation language (DML) operations are executed on the SALES table.You have noticed some dubious values in the SALES table during the last few days. You are able to track users, actions taken, and the time of the action for this particular period but the changes in data are not tracked.You decide to keep track of both the old data and new data in the table along with the user information.  Whataction would you take to achieve this task()
    A

    Apply fine-grained auditing.

    B

    Implement value-based auditing.

    C

    Impose standard database auditing to audit object privileges.

    D

    Impose standard database auditing to audit SQL statements.


    正确答案: B
    解析: 暂无解析