单选题You work as a database administrator for Supportcenter.cn. You suspect that in one of your applications the customer table is being accessed by some unauthorized users. Which option would you use to monitor the queries being executed on the customer ta

题目
单选题
You work as a database administrator for Supportcenter.cn. You suspect that in one of your applications the customer table is being accessed by some unauthorized users. Which option would you use to monitor the queries being executed on the customer table?()
A

Monitor thealert.logfile

B

Enable server-side SQL tracing for user sessions

C

Enable fine-grained auditing for the customer table

D

Enable Fine-Grained Access Control (FGAC) for the customer table

E

Write a database trigger on the customer table on the SELECT event


相似考题
参考答案和解析
正确答案: D
解析: 暂无解析
更多“单选题You work as a database administrator for Supportcenter.cn. You suspect that in one of your applications the customer table is being accessed by some unauthorized users. Which option would you use to monitor the queries being executed on the customer ta”相关问题
  • 第1题:

    Your database is functioning in NOARCHIVELOG mode. Your database contains 15 tablespaces. You want to use Recovery Manager (RMAN) to perform backups.  Which two backups would you be able to perform when the database is being accessed by users?()

    • A、backup of offline tablespaces
    • B、backup of read­only tablespaces
    • C、backup of system­critical tablespaces
    • D、backup of online, locally managed tablespaces
    • E、backup of read/write dictionary­managed tablespaces

    正确答案:A,B

  • 第2题:

    In one of your online transaction processing (OLTP) applications, users are manipulating and querying a database table simultaneously. From the Segment Advisor, you find that one of the tables is highly fragmented and you want to shrink the table immediately without affecting the currently active queries.  Which option would you use with the ALTER TABLE command to achieve this objective?()

    • A、REBUILD
    • B、CASCADE
    • C、TRUNCATE
    • D、ROW MOVEMENT
    • E、SHRINK SPACE COMPACT
    • F、SHRINK SPACE CASCADE

    正确答案:E

  • 第3题:

    You work as a database administrator for Supportcenter.cn. You suspect that in one of your applications the customer table is being accessed by some unauthorized users. Which option would you use to monitor the queries being executed on the customer table?()

    • A、Monitor thealert.logfile
    • B、Enable server-side SQL tracing for user sessions
    • C、Enable fine-grained auditing for the customer table
    • D、Enable Fine-Grained Access Control (FGAC) for the customer table
    • E、Write a database trigger on the customer table on the SELECT event

    正确答案:D

  • 第4题:

    You observe that in your PROD database, customer information is being modified by some unauthorized users. You want to keep track of all of the transactions happening on the table using PL/SQL. Which type of PL/SQL subprogram or construct would you use to accomplish this task?()

    • A、functions
    • B、packages
    • C、procedures
    • D、database triggers
    • E、anonymous PL/SQL block

    正确答案:D

  • 第5题:

    You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005. You work as a database administrator for your company. You utilize the SP:Recompile event class to run SQL Server Profiler. You find that a great amount of recompiles occurring. The possible causes of the large number of recompiles should be identified.  From the flowing four options, which one is the most possible cause of the problem?()

    • A、The sp_executesql batches are not being recovered from the procedure cache.
    • B、A database administrator executed UPDATE STATISTICS statements on all tables, and the most common stored procedures reference all the tables.
    • C、One new stored procedure is created by a database administrator.
    • D、Ad hoc batches are not being recovered from the procedure cache.

    正确答案:B

  • 第6题:

    单选题
    You observe that in your PROD database, customer information is being modified by some unauthorized users. You want to keep track of all of the transactions happening on the table using PL/SQL. Which type of PL/SQL subprogram or construct would you use to accomplish this task?()
    A

    functions

    B

    packages

    C

    procedures

    D

    database triggers

    E

    anonymous PL/SQL block


    正确答案: C
    解析: 暂无解析

  • 第7题:

    单选题
    You work as a database administrator for Supportcenter.cn. You have been asked to use a centralized administrative tool to administer your database servers and application servers. In order to achieve the objective, which component would you configure on each database server?()
    A

    Database Control

    B

    Management Server

    C

    Management Repository

    D

    Application Server Control

    E

    Oracle Management Agent


    正确答案: E
    解析: 暂无解析

  • 第8题:

    单选题
    You work as a database administrator for Certkiller .com. You find that reports are running for a long time in your data warehousing applications. You suspect a lack of indexes is the reason for the performance degradation.  Which advisory component would you refer to, in order to determine the appropriate indexes?()
    A

    Memory Advisors

    B

    Segment Advisors

    C

    SQL Tuning and Access Advisors

    D

    Automated Workload Repository (AWR)

    E

    Automatic Database Diagnostic Monitor (ADDM)


    正确答案: C
    解析: 暂无解析

  • 第9题:

    单选题
    You work as a database administrator for Certkiller .com. You suspect that in one of your applications the customer table is being accessed by some unauthorized users. Which option would you use to monitor the queries being executed on the customer table?()
    A

    Monitor thealert.logfile

    B

    Enable server-side SQL tracing for user sessions

    C

    Enable fine-grained auditing for the customer table

    D

    Enable Fine-Grained Access Control (FGAC) for the customer table

    E

    Write a database trigger on the customer table on the SELECT event


    正确答案: E
    解析: 暂无解析

  • 第10题:

    单选题
    You work as a database administrator for Supportcenter.cn. Your database is in NOARCHIVELOG mode and you want to perform a backup. Which type of backup would be appropriate in this case?()
    A

    Hot backup

    B

    Online backup

    C

    consistent backup

    D

    incremental backup

    E

    inconsistent backup


    正确答案: C
    解析: 暂无解析

  • 第11题:

    多选题
    You work as a database administrator for Certkiller .com. In your development environmentenvironment, the developers are responsible for modifying the table structure according to the application requirements. However, you want to keep track of the ALTER TABLE commands being executed by developers, so you enable auditing to achieve this objective.  Which two views would you refer to find out the audit information?()
    A

    DBA_AUDIT_TRAIL

    B

    DBA_AUDIT_SESSION

    C

    DBA_FGA_AUDIT_TRAIL

    D

    DBA_COMMON_AUDIT_TRAIL


    正确答案: D,B
    解析: 暂无解析

  • 第12题:

    单选题
    In one of your online transaction processing (OLTP) applications, users are manipulating and querying a database table simultaneously. From the Segment Advisor, you find that one of the tables is highly fragmented and you want to shrink the table immediately without affecting the currently active queries.  Which option would you use with the ALTER TABLE command to achieve this objective?()
    A

    REBUILD

    B

    CASCADE

    C

    TRUNCATE

    D

    ROW MOVEMENT

    E

    SHRINK SPACE COMPACT

    F

    SHRINK SPACE CASCADE


    正确答案: B
    解析: 暂无解析

  • 第13题:

    You work as a database administrator for Supportcenter.cn. One of the database users accidentally deleted all the rows of a critical table and committed the delete at 1:30 p.m. You senior database administrator, SupportCenter, asks you to retrieve the lost data. Which two actions would you use to ensure that there is no impact on other connected users while retrieving the deleted rows?()

    • A、Use a flashback query to retrieve the rows that were deleted
    • B、Useconventialincremental export and then import the affected object
    • C、Shutdown the database inNORMALmode and restart the database instance
    • D、Use DBMS_META package to reconstruct the object using undo segments
    • E、UseTablespacePoint in Time Recovery (TSPITR) method to recover the table and the data
    • F、Use Oracle DataPumptwithflashback_timeoption toentableflashback export and then import the affected object.

    正确答案:B,E

  • 第14题:

    You work as a database administrator for Supportcenter.cn. Your database is in NOARCHIVELOG mode and you want to perform a backup. Which type of backup would be appropriate in this case?()

    • A、Hot backup
    • B、Online backup
    • C、consistent backup
    • D、incremental backup
    • E、inconsistent backup

    正确答案:C

  • 第15题:

    You work as a database administrator for Supportcenter.cn. Your database is in NOARCHIVELOG mode. The database has been configured with three redo logs groups, and there have been five log switches. You lost one non-system-critical data file from your database. Which method would you use to recover the data file?()

    • A、Restore all the data files and open the database
    • B、Create the data file and perform tablespace recovery
    • C、No need to restore any file, just recover the database
    • D、Restore only the system data file and recover the database
    • E、Restore only lost date file and performtablespacerecovery

    正确答案:A

  • 第16题:

    You are a database administrator for your company. The company’s financial forecasting application uses a SQL Server 2005 database that enables business users to run both ad hoc and predefined queries. You suspect that some queries consume an excessive amount of server resources. You need to identify which queries consume the most resources. You want to achieve this goal as quickly as possible. What should you do?()

    • A、Use the DBCC INPUTBUFFER command.
    • B、Use the sys.dm_exec_query_stats dynamic management view (DMV).
    • C、Use the sqldiag utility.
    • D、Use the SHOWPLAN session option.

    正确答案:B

  • 第17题:

    单选题
    You work as a database administrator for Supportcenter.cn. You are using three database, SupportCenter DB01, SupportCenter DB02, and SupportCenter DB03, on different host machines in your development environment. The database server configuration, such as IP address and listener port number, change frequently due to development requirements, and you have the task of notifying the developers of the changes. Which connection method would you use to overcome this overhead?()
    A

    Host naming

    B

    Local naming

    C

    Easy Connect

    D

    External naming

    E

    directory naming


    正确答案: C
    解析: 暂无解析

  • 第18题:

    单选题
    You work as a database administrator for Supportcenter.cn. You find that reports are running for a long time in your data warehousing applications. You suspect a lack of indexes is the reason for the performance degradation. Which advisory component would you refer to, in order to determine the appropriate indexes?()
    A

    Memory Advisors

    B

    Segment Advisors

    C

    SQL Tuning and Access Advisors

    D

    Automated Workload Repository (AWR)

    E

    Automatic Database Diagnostic Monitor (ADDM)


    正确答案: C
    解析: 暂无解析

  • 第19题:

    单选题
    You are a database administrator for your company. The company’s financial forecasting application uses a SQL Server 2005 database that enables business users to run both ad hoc and predefined queries. You suspect that some queries consume an excessive amount of server resources. You need to identify which queries consume the most resources. You want to achieve this goal as quickly as possible. What should you do?()
    A

    Use the DBCC INPUTBUFFER command.

    B

    Use the sys.dm_exec_query_stats dynamic management view (DMV).

    C

    Use the sqldiag utility.

    D

    Use the SHOWPLAN session option.


    正确答案: B
    解析: 暂无解析

  • 第20题:

    单选题
    In one of your online transaction processing (OLTP) applications, users are manipulating and querying a database table simultaneously. From the Segment Advisor, you find that one of the tables is highly fragmented and you want to shrink the table immediately without affecting the currently active queries. Which option would you use with the ALTER TABLE command to achieve this objective?()
    A

     REBUILD

    B

     CASCADE

    C

     TRUNCATE

    D

     ROW MOVEMENT

    E

     SHRINK SPACE COMPACT

    F

     SHRINK SPACE CASCADE


    正确答案: B
    解析: 暂无解析

  • 第21题:

    多选题
    You work as a database administrator for Supportcenter.cn. One of the database users accidentally deleted all the rows of a critical table and committed the delete at 1:30 p.m. You senior database administrator, SupportCenter, asks you to retrieve the lost data. Which two actions would you use to ensure that there is no impact on other connected users while retrieving the deleted rows?()
    A

    Use a flashback query to retrieve the rows that were deleted

    B

    Useconventialincremental export and then import the affected object

    C

    Shutdown the database inNORMALmode and restart the database instance

    D

    Use DBMS_META package to reconstruct the object using undo segments

    E

    UseTablespacePoint in Time Recovery (TSPITR) method to recover the table and the data

    F

    Use Oracle DataPumptwithflashback_timeoption toentableflashback export and then import the affected object.


    正确答案: C,A
    解析: 暂无解析

  • 第22题:

    单选题
    You work as a database administrator for Supportcenter.cn. Your database is in NOARCHIVELOG mode. The database has been configured with three redo logs groups, and there have been five log switches. You lost one non-system-critical data file from your database. Which method would you use to recover the data file?()
    A

    Restore all the data files and open the database

    B

    Create the data file and perform tablespace recovery

    C

    No need to restore any file, just recover the database

    D

    Restore only the system data file and recover the database

    E

    Restore only lost date file and performtablespacerecovery


    正确答案: A
    解析: 暂无解析

  • 第23题:

    单选题
    While designing the database for one of your online transaction processing (OLTP) applications, you want to achieve the following:  a) high availability of data  b) faster primary key access to the table data  c) compact storage for the table  Which type of tables would you use to achieve these objectives?()
    A

    heap tables

    B

    object tables

    C

    partitioned tables

    D

    index-organized tables (IOTs)


    正确答案: D
    解析: 暂无解析