Apply fine-grained auditing.
Implement value-based auditing.
Impose standard database auditing to auditobject privileges.
Impose standard databaseauditing to audit SQL statements.
第1题:
You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis. How would you achieve this?()
第2题:
Which two client requests are captured during database replay Capture?()
第3题:
Your database is in ARCHIVELOG mode. You lost an index tablespace due to a disk failure while the database was open. You have neither a backup of the lost index tablespace nor the scripts containing the CREATE INDEX statements to recreate the indexes. Currently, several users are executing long-running queries on the database. What will happen to the ongoing activity in the database?()
第4题:
In your production database, data manipulation language (DML) operations are executed on theSALES table. You have noticed some dubious values in the SALES table during the last few days. Youare able to track users, actions taken, and the time of the action for this particular period but the changesin data are not tracked. You decide to keep track of both the old data and new data in the table along withthe user information. What action would you take to achieve this task()
第5题:
You executed the following SQL statement to shrink the EMPLOYEES table segment stored in the EXAMPLE tablespace: ALTER TABLE employees SHRINK SPACE CASCADE; Which statement is correct in this scenario?()
第6题:
Flashback queries
Shared server requests
Login and logoff activities of sessions
Direct path load of data from external files by using utilities such as SQL *loader
Data definition language (DDL) and data manipulation language (DML) operations
第7题:
The data in the segment will be compacted but the high water mark will not be adjusted
The EMPLOYEES table will be changed to read-only mode during the shrink operation
The indexes created on the EMPLOYEES table will need to be rebuilt after the shrink operation is over
The shrink behavior will be cascaded to all dependent segments of the table that support a shrink operation
Data manipulation language (DML) operations will not be possible on the EMPLOYEES table during the COMPACTION phase of the shrink operation
第8题:
Complete Recovery with online redo log
Complete Recovery with archived redo log
Tablespace Point-in-Time Recovery (TSPITR)
Incomplete Recovery with system change number (SCN)
第9题:
Implement a stored procedure that writes data about schema changes to a log table.
Implement DDL AFTER triggers that write user and schema information to a log table.
Implement a DML INSTEAD OF trigger that writes data about schema changes to a log table.
Implement a DML AFTER trigger that writes data about schema changes to a log table.
第10题:
Apply fine-grained auditing.
Implement value-based auditing.
Impose standard database auditing to auditobject privileges.
Impose standard databaseauditing to audit SQL statements.
第11题:
Only bring the tablespace back online.
Only recover the tablespace and then bring the tablespace back online.
Shut down the database, recover the data file and then start up the database.
Issue the ALTER DATABASE RENAME FILE command, recover the tablespace, and then bring the tablespace online.
Recover the tablespace, issue the ALTER DATABASE RENAME FILE command, and then bring the tablespace online.
第12题:
Flashback queries
Shared server requests
Login and logoff activities of sessions
Direct path load of data from external files by using utilities such as SQL *loader
Data definition language (DDL) and data manipulation language (DML) operations
第13题:
In your production database, data manipulation language (DML) operations are executed on the SALES table.You have noticed some dubious values in the SALES table during the last few days. You are able to track users, actions taken, and the time of the action for this particular period but the changes in data are not tracked.You decide to keep track of both the old data and new data in the table along with the user information. Whataction would you take to achieve this task()
第14题:
Which two client requests are captured during database replay Capture?() (Choose two)
第15题:
You executed the following query in your database: FROM V$FLASHBACK_DATABASE_LOG; What would you determine from the output?()
第16题:
You suspect unauthorized data manipulation language (DML) operations on a particular table. Youwant to track users who are performing the transactions and the values used in the transactions. You alsoplan to transfer these values to another table for analysis. How would you achieve this()
第17题:
You need to ensure the Order Control team is able to track the number of orders that reach the production department. What should you do?()
第18题:
Create a new Time dimension based on the Holiday table. Use derived columns for the month and the year.
Create a Server Time dimension. Within this dimension, enable the time periods year, month, and date. Select the Additional Manufacturing calendar option.
Create a new Time dimension based on the date values within the ProductOrderStatus table. Flag those days on which no orders were received as Holiday.
Create a new Time dimension based on a data source view named query. Derive the data for this data source view from unique dates within the ProductOrderStatus table. Use a subquery to identify the holidays and derived columns for the month and the year.
第19题:
by using triggers
by using external tables
by using anonymous PL/SQL blocks
by auditing all DML operations on the table
第20题:
the time when the last flashback operation in your database was performed
the time when the first flashback operation in your database was performed
a list of flashback operations performed in your database using SCN and time
the approximate time and the lowest system change number (SCN) to which you can flash back your database
第21题:
Back up the current transaction log. Restore the database with a different name and stop at the point just before the data loss. Copy the table back into the original database.
Back up the current transaction log. Restore the database to the point just before the data loss.
Restore the database from the existing backup files to a time just before the data loss.
Restore the database to the point of the last full backup.
第22题:
by using triggers
by using Data Pump
by using external tables
by using anonymous PL/SQL blocks
第23题:
The EMPLOYEES table will be changed to read-only mode during the shrink operation.
The indexes created on the EMPLOYEES table will need to be rebuilt after the shrink operation is over.
The shrink behavior will be cascaded to all dependent segments of the table that support a shrink operation.
Data manipulation language (DML) operations will not be possible on the EMPLOYEES table during the COMPACTION phase of the shrink operation.
第24题:
Apply fine-grained auditing.
Implement value-based auditing.
Impose standard database auditing to audit object privileges.
Impose standard database auditing to audit SQL statements.