单选题You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table fo

题目
单选题
You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis.  How would you achieve this?()
A

by using triggers

B

by using external tables

C

by using anonymous PL/SQL blocks

D

by auditing all DML operations on the table


相似考题
更多“单选题You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table fo”相关问题
  • 第1题:

    You discover that the schema changes that were recently made to your SQL Server 2005 database have caused your Web site to stop functioning. It is unclear who made the changes. TestKing.com now mandates that all changes to the database schema be tracked. You need to implement a mechanism that will track schema changes in your database.  What should you do?()

    • A、Implement a stored procedure that writes data about schema changes to a log table.
    • B、Implement DDL AFTER triggers that write user and schema information to a log table.
    • C、Implement a DML INSTEAD OF trigger that writes data about schema changes to a log table.
    • D、Implement a DML AFTER trigger that writes data about schema changes to a log table.

    正确答案:B

  • 第2题:

    In which case would you use a FULL OUTER JOIN?()

    • A、Both tables have NULL values.
    • B、You want all unmatched data from one table.
    • C、You want all matched data from both tables.
    • D、You want all unmatched data from both tables.
    • E、One of the tables has more data than the other.
    • F、You want all matched and unmatched data from only one table.

    正确答案:D

  • 第3题:

    In your production database, data manipulation language (DML) operations are executed on the SALES table.You have noticed some dubious values in the SALES table during the last few days. You are able to track users, actions taken, and the time of the action for this particular period but the changes in data are not tracked.You decide to keep track of both the old data and new data in the table along with the user information.  Whataction would you take to achieve this task()

    • A、Apply fine-grained auditing.
    • B、Implement value-based auditing.
    • C、Impose standard database auditing to audit object privileges.
    • D、Impose standard database auditing to audit SQL statements.

    正确答案:B

  • 第4题:

    You added a PHONE_NUMBER column of NUMBER data type to an existing EMPLOYEES table. The EMPLOYEES table already contains records of 100 employees. Now, you want to enter the phone numbers of each of the 100 employees into the table. Some of the employees may not have a phone number available. Which data manipulation operation do you perform?()

    • A、MERGE
    • B、INSERT
    • C、UPDATE
    • D、ADD
    • E、ENTER
    • F、You cannot enter the phone numbers for the existing employee records.

    正确答案:C

  • 第5题:

    You observe that in your PROD database, customer information is being modified by some unauthorized users. You want to keep track of all of the transactions happening on the table using PL/SQL. Which type of PL/SQL subprogram or construct would you use to accomplish this task?()

    • A、functions
    • B、packages
    • C、procedures
    • D、database triggers
    • E、anonymous PL/SQL block

    正确答案:D

  • 第6题:

    You suspect unauthorized data manipulation language (DML) operations on a particular table. Youwant to track users who are performing the transactions and the values used in the transactions. You alsoplan to transfer these values to another table for analysis.  How would you achieve this()

    • A、by using triggers
    • B、by using Data Pump
    • C、by using external tables
    • D、by using anonymous PL/SQL blocks

    正确答案:A

  • 第7题:

    单选题
    In which case would you use a FULL OUTER JOIN?()
    A

    Both tables have NULL values.

    B

    You want all unmatched data from one table.

    C

    You want all matched data from both tables.

    D

    You want all unmatched data from both tables.

    E

    One of the tables has more data than the other.

    F

    You want all matched and unmatched data from only one table.


    正确答案: D
    解析: 暂无解析

  • 第8题:

    单选题
    You want to access employee details contained in flat files as part of the EMPLOYEE table. You plan to add anew column to the EMPLOYEE table to achieve this.  Which data type would you use for the new column()
    A

    CLOB

    B

    BLOB

    C

    BFILE

    D

    LONG RAW


    正确答案: B
    解析: 暂无解析

  • 第9题:

    单选题
    You need to base a data block on the EMP table, but you do not want to give the users of the application access privileges on the table. Which type of data source would you use to create the data block?()
    A

    table 

    B

    transactional trigger 

    C

    stored procedure 

    D

    FROM clause query


    正确答案: D
    解析: 暂无解析

  • 第10题:

    单选题
    You discover that the schema changes that were recently made to your SQL Server 2005 database have caused your Web site to stop functioning. It is unclear who made the changes. TestKing.com now mandates that all changes to the database schema be tracked. You need to implement a mechanism that will track schema changes in your database.  What should you do?()
    A

    Implement a stored procedure that writes data about schema changes to a log table.

    B

    Implement DDL AFTER triggers that write user and schema information to a log table.

    C

    Implement a DML INSTEAD OF trigger that writes data about schema changes to a log table.

    D

    Implement a DML AFTER trigger that writes data about schema changes to a log table.


    正确答案: B
    解析: 暂无解析

  • 第11题:

    单选题
    You suspect unauthorized data manipulation language (DML) operations on a particular table. Youwant to track users who are performing the transactions and the values used in the transactions. You alsoplan to transfer these values to another table for analysis.  How would you achieve this()
    A

    by using triggers

    B

    by using Data Pump

    C

    by using external tables

    D

    by using anonymous PL/SQL blocks


    正确答案: A
    解析: 暂无解析

  • 第12题:

    单选题
    In your production database, data manipulation language (DML) operations are executed on the SALES table.You have noticed some dubious values in the SALES table during the last few days. You are able to track users, actions taken, and the time of the action for this particular period but the changes in data are not tracked.You decide to keep track of both the old data and new data in the table along with the user information.  Whataction would you take to achieve this task()
    A

    Apply fine-grained auditing.

    B

    Implement value-based auditing.

    C

    Impose standard database auditing to audit object privileges.

    D

    Impose standard database auditing to audit SQL statements.


    正确答案: B
    解析: 暂无解析

  • 第13题:

    On Jan 11, 2005 at 2:30 P.M., an erroneous update operation modified all the values of column LASTNAME in the EMPLOYEE table in the Scott schema to an empty string. You are the system administrator, and you want to return the original values in the table. To do so, you decided to flash back the table. Which two options can you use to flash back a table?()

    • A、 by using Oracle Enterprise Manager
    • B、 by issuing the FLASHBACK TABLE statement at the RMAN prompt
    • C、 by issuing the FLASHBACK TABLE statement at the SQL prompt
    • D、 by issuing the FLASHBACK TABLE statement at the LSNRCTL prompt

    正确答案:A,C

  • 第14题:

    You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis.  How would you achieve this?()

    • A、by using triggers
    • B、by using external tables
    • C、by using anonymous PL/SQL blocks
    • D、by auditing all DML operations on the table

    正确答案:A

  • 第15题:

    36 You are creating a report wizard to create a matrix report. The query build, you select the patient_name column from the patient table; the doctor_name from the doctors table; and the doctor_ID, patient_ID and ID columns from the procedure table. In the report wizard you select patient_name as the row value, doctor_ID as the column values and the count as the cell values. You need to add a total for each doctors column. In the wizard report which tab will allow you to create the summary column?()

    • A、Rows 
    • B、Totals 
    • C、Columns 
    • D、Cells 
    • E、Data

    正确答案:B

  • 第16题:

    You want to access employee details contained in flat files as part of the EMPLOYEE table. You plan to add anew column to the EMPLOYEE table to achieve this.  Which data type would you use for the new column()

    • A、CLOB
    • B、BLOB
    • C、BFILE
    • D、LONG RAW

    正确答案:C

  • 第17题:

    In your production database, data manipulation language (DML) operations are executed on theSALES table. You have noticed some dubious values in the SALES table during the last few days. Youare able to track users, actions taken, and the time of the action for this particular period but the changesin data are not tracked. You decide to keep track of both the old data and new data in the table along withthe user information.  What action would you take to achieve this task()

    • A、Apply fine-grained auditing.
    • B、Implement value-based auditing.
    • C、Impose standard database auditing to auditobject privileges.
    • D、Impose standard databaseauditing to audit SQL statements.

    正确答案:B

  • 第18题:

    单选题
    You observe that in your PROD database, customer information is being modified by some unauthorized users. You want to keep track of all of the transactions happening on the table using PL/SQL. Which type of PL/SQL subprogram or construct would you use to accomplish this task?()
    A

    functions

    B

    packages

    C

    procedures

    D

    database triggers

    E

    anonymous PL/SQL block


    正确答案: C
    解析: 暂无解析

  • 第19题:

    多选题
    On Jan 11, 2005 at 2:30 P.M., an erroneous update operation modified all the values of column LASTNAME in the EMPLOYEE table in the Scott schema to an empty string. You are the system administrator, and you want to return the original values in the table. To do so, you decided to flash back the table. Which two options can you use to flash back a table?()
    A

    by using Oracle Enterprise Manager

    B

    by issuing the FLASHBACK TABLE statement at the RMAN prompt

    C

    by issuing the FLASHBACK TABLE statement at the SQL prompt

    D

    by issuing the FLASHBACK TABLE statement at the LSNRCTL prompt


    正确答案: A,B
    解析: 暂无解析

  • 第20题:

    单选题
    You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis.  How would you achieve this?()
    A

    by using triggers

    B

    by using external tables

    C

    by using anonymous PL/SQL blocks

    D

    by auditing all DML operations on the table


    正确答案: C
    解析: 暂无解析

  • 第21题:

    单选题
    In your test database, you have created the ORDERS table as an index-organized table (IOT). To facilitate faster querying, you have created a mapping table and a bitmap index on the ORDER_FILLED column. You observe that the query performance degrees when users perform a large volume of transactions. While investigating the reason, you find that the mapping table segment is fragmented, leading to poor performance. Which option would you use to defragment the mapping table without affecting the original table data?()
    A

     Export and import the mapping table.

    B

     Drop and re-create the mapping table.

    C

     Truncate the mapping table and reinsert the values.

    D

     Use the ALTER TABLE .. REBUILD command to defragment the mapping table.


    正确答案: B
    解析: 暂无解析

  • 第22题:

    单选题
    In your production database, data manipulation language (DML) operations are executed on theSALES table. You have noticed some dubious values in the SALES table during the last few days. Youare able to track users, actions taken, and the time of the action for this particular period but the changesin data are not tracked. You decide to keep track of both the old data and new data in the table along withthe user information.  What action would you take to achieve this task()
    A

    Apply fine-grained auditing.

    B

    Implement value-based auditing.

    C

    Impose standard database auditing to auditobject privileges.

    D

    Impose standard databaseauditing to audit SQL statements.


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    You added a PHONE_NUMBER column of NUMBER data type to an existing EMPLOYEES table. The EMPLOYEES table already contains records of 100 employees. Now, you want to enter the phone numbers of each of the 100 employees into the table. Some of the employees may not have a phone number available. Which data manipulation operation do you perform?()
    A

    MERGE

    B

    INSERT

    C

    UPDATE

    D

    ADD

    E

    ENTER

    F

    You cannot enter the phone numbers for the existing employee records.


    正确答案: A
    解析: 暂无解析

  • 第24题:

    单选题
    You added a PHONE_NUMBER column of NUMBER data type to an existing EMPLOYEES table. The EMPLOYEES table already contains records of 100 employees. Now, you want to enter the phone numbers of each of the 100 employees into the table. Some of the employees may not have a phone number available. Which data manipulation operation do you perform? ()
    A

    MERGE

    B

    INSERT

    C

    UPDATE

    D

    ADD

    E

    ENTER

    F

    You cannot enter the phone numbers for the existing employee records.


    正确答案: A
    解析: 暂无解析