You observe that in your PROD database, customer information is being modified by some unauthorized users. You want to keep track of all of the transactions happening on the table using PL/SQL. Which type of PL/SQL subprogram or construct would you use to

题目

You observe that in your PROD database, customer information is being modified by some unauthorized users. You want to keep track of all of the transactions happening on the table using PL/SQL. Which type of PL/SQL subprogram or construct would you use to accomplish this task?()

  • A、functions
  • B、packages
  • C、procedures
  • D、database triggers
  • E、anonymous PL/SQL block

相似考题
更多“You observe that in your PROD database, customer information is being modified by some unauthorized users. You want to keep track of all of the transactions happening on the table using PL/SQL. Which type of PL/SQL subprogram or construct would you use to”相关问题
  • 第1题:

    You executed the following query:  SELECT operation, undo_sql, table_name FROM flashback_transaction_query; Which statement is correct regarding the query output?()

    • A、 It would return information regarding only the last committed transaction.
    • B、 It would return only the active transactions in all the undo segments in the database.
    • C、 It would return only the committed transactions in all the undo segments in the database.
    • D、 It would return both active and committed transactions in all the undo segments in the database.
    • E、 It would return information regarding the transactions that began and were committed in the last 30 minutes.

    正确答案:D

  • 第2题:

    In which scenario will you use the Flashback Transaction Query feature?()

    • A、 when you want to restore an important table that is dropped from the Recycle Bin
    • B、 when you want to obtain the SQL statements to undo the deletion of some important records from a table by a transaction
    • C、when you want to restore a dropped user’s schema
    • D、 when a row of a table is updated many times within a specific time period and you want all the versions of the row in the specified time period

    正确答案:B

  • 第3题:

    Which type of PL/SQL construct would you use to automatically correct the error resulting from a statement that was suspended due to a space-related problem?()

    • A、 functions
    • B、 package
    • C、 procedure
    • D、 database trigger
    • E、 anonymous PL/SQL block

    正确答案:D

  • 第4题:

    You want to configure and schedule offline database backups to run automatically.  Which tool or utilitywould you use to achieve this()

    • A、the XML script
    • B、the PL/SQL script
    • C、the DBMS_SCHEDULER package
    • D、Enterprise Manager to schedule the backup

    正确答案:D

  • 第5题:

    You work as a database administrator for Supportcenter.cn. You suspect that in one of your applications the customer table is being accessed by some unauthorized users. Which option would you use to monitor the queries being executed on the customer table?()

    • A、Monitor thealert.logfile
    • B、Enable server-side SQL tracing for user sessions
    • C、Enable fine-grained auditing for the customer table
    • D、Enable Fine-Grained Access Control (FGAC) for the customer table
    • E、Write a database trigger on the customer table on the SELECT event

    正确答案:D

  • 第6题:

    You are using the backup scheduler in Enterprise Manager (EM) to schedule a backup of your database. Which type of script does the backup scheduler generate? ()

    • A、SQL script
    • B、PL/SQL script
    • C、Operating System (OS) script
    • D、Enterprise Manager (EM) script
    • E、Recovery Manager (RMAN) script

    正确答案:E

  • 第7题:

    You suspect unauthorized data manipulation language (DML) operations on a particular table. Youwant to track users who are performing the transactions and the values used in the transactions. You alsoplan to transfer these values to another table for analysis.  How would you achieve this()

    • A、by using triggers
    • B、by using Data Pump
    • C、by using external tables
    • D、by using anonymous PL/SQL blocks

    正确答案:A

  • 第8题:

    单选题
    You observe that in your PROD database, customer information is being modified by some unauthorized users. You want to keep track of all of the transactions happening on the table using PL/SQL. Which type of PL/SQL subprogram or construct would you use to accomplish this task?()
    A

    functions

    B

    packages

    C

    procedures

    D

    database triggers

    E

    anonymous PL/SQL block


    正确答案: C
    解析: 暂无解析

  • 第9题:

    多选题
    You want to make use of the object features available in the database for the form module you are developing. Which three statements about object types are true? ()
    A

    An object type is a user-defined composite data type.

    B

    The attributes of an object type can be those of other object types.

    C

    A PL/SQL table of records is an example of a nested object type.

    D

    An object type must be declared as a type before the actual object itself can be declared.


    正确答案: B,D
    解析: 暂无解析

  • 第10题:

    单选题
    You suspect unauthorized data manipulation language (DML) operations on a particular table. Youwant to track users who are performing the transactions and the values used in the transactions. You alsoplan to transfer these values to another table for analysis.  How would you achieve this()
    A

    by using triggers

    B

    by using Data Pump

    C

    by using external tables

    D

    by using anonymous PL/SQL blocks


    正确答案: A
    解析: 暂无解析

  • 第11题:

    单选题
    Which type of PL/SQL construct would you use to automatically correct the error resulting from a statement that was suspended due to a space/x7frelated problem? ()
    A

    function

    B

    package

    C

    procedure

    D

    database trigger

    E

    anonymous PL/SQL block


    正确答案: A
    解析: 暂无解析

  • 第12题:

    单选题
    Which type of PL/SQL construct would you use to automatically correct the error resulting from a statement that was suspended due to a space-related problem?()
    A

     functions

    B

     package

    C

     procedure

    D

     database trigger

    E

     anonymous PL/SQL block


    正确答案: B
    解析: 暂无解析

  • 第13题:

    You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis.  How would you achieve this?()

    • A、by using triggers
    • B、by using external tables
    • C、by using anonymous PL/SQL blocks
    • D、by auditing all DML operations on the table

    正确答案:A

  • 第14题:

    You want to administer your PROD database from a remote host machine using a Web-enabled interface. Which Oracle tool would you use to accomplish this task efficiently without using command-line interfaces?()

    • A、SQL*Plus
    • B、iSQL*Plus
    • C、Management Server
    • D、Management Repository
    • E、Oracle Enterprise Manager 10g Database Control

    正确答案:E

  • 第15题:

    In your production database, data manipulation language (DML) operations are executed on the SALES table.You have noticed some dubious values in the SALES table during the last few days. You are able to track users, actions taken, and the time of the action for this particular period but the changes in data are not tracked.You decide to keep track of both the old data and new data in the table along with the user information.  Whataction would you take to achieve this task()

    • A、Apply fine-grained auditing.
    • B、Implement value-based auditing.
    • C、Impose standard database auditing to audit object privileges.
    • D、Impose standard database auditing to audit SQL statements.

    正确答案:B

  • 第16题:

    You are using flat files as the data source for one of your data warehousing applications. You plan to move the data from the flat file structures to an Oracle database to optimize the application performance. In your database you have clustered tables. While migrating the data, you want to have minimal impact on the database performance and optimize the data load operation. Which method would you use to load data into Oracle database?()

    • A、use the external table population
    • B、use the Oracle Data Pump export and import utility
    • C、use the conventional path data load of SQL*Loader utility
    • D、use the direct path data load of Oracle export and import utility

    正确答案:C

  • 第17题:

    You want to make use of the object features available in the database for the form module you are developing. Which three statements about object types are true? ()

    • A、An object type is a user-defined composite data type. 
    • B、The attributes of an object type can be those of other object types. 
    • C、A PL/SQL table of records is an example of a nested object type. 
    • D、An object type must be declared as a type before the actual object itself can be declared.

    正确答案:A,B,D

  • 第18题:

    In your production database, data manipulation language (DML) operations are executed on theSALES table. You have noticed some dubious values in the SALES table during the last few days. Youare able to track users, actions taken, and the time of the action for this particular period but the changesin data are not tracked. You decide to keep track of both the old data and new data in the table along withthe user information.  What action would you take to achieve this task()

    • A、Apply fine-grained auditing.
    • B、Implement value-based auditing.
    • C、Impose standard database auditing to auditobject privileges.
    • D、Impose standard databaseauditing to audit SQL statements.

    正确答案:B

  • 第19题:

    You have lost all your database control files. To recover them, you are going to use the results of the alter database backup controlfile to trace command. Your datafiles and your online redo logs are all intact.  Which of the following is true regarding your recovery?()  

    • A、 You will need to open the database with the resetlogs command.
    • B、 All you need to do is execute the trace file from SQL*Plus and it will perform the recovery for you.
    • C、 You will use the resetlogs version of the create controlfile command.
    • D、 You will use the noresetlogs version of the create controlfile command.
    • E、 You will use the trace file to create a backup control file, and then you will recover the database with the recover database using backup controlfile command

    正确答案:D

  • 第20题:

    单选题
    You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis.  How would you achieve this?()
    A

    by using triggers

    B

    by using external tables

    C

    by using anonymous PL/SQL blocks

    D

    by auditing all DML operations on the table


    正确答案: C
    解析: 暂无解析

  • 第21题:

    单选题
    You want to administer your PROD database from a remote host machine using a Web-enabled interface. Which Oracle tool would you use to accomplish this task efficiently without using command-line interfaces?()
    A

    SQL*Plus

    B

    iSQL*Plus

    C

    Management Server

    D

    Management Repository

    E

    Oracle Enterprise Manager 10g Database Control


    正确答案: D
    解析: 暂无解析

  • 第22题:

    多选题
    You work as a database administrator for Certkiller .com. In your development environmentenvironment, the developers are responsible for modifying the table structure according to the application requirements. However, you want to keep track of the ALTER TABLE commands being executed by developers, so you enable auditing to achieve this objective.  Which two views would you refer to find out the audit information?()
    A

    DBA_AUDIT_TRAIL

    B

    DBA_AUDIT_SESSION

    C

    DBA_FGA_AUDIT_TRAIL

    D

    DBA_COMMON_AUDIT_TRAIL


    正确答案: D,B
    解析: 暂无解析

  • 第23题:

    单选题
    You want to configure and schedule offline database backups to run automatically.  Which tool or utilitywould you use to achieve this()
    A

    the XML script

    B

    the PL/SQL script

    C

    the DBMS_SCHEDULER package

    D

    Enterprise Manager to schedule the backup


    正确答案: A
    解析: 暂无解析