单选题In your production database, data manipulation language (DML) operations are executed on theSALES table. You have noticed some dubious values in the SALES table during the last few days. Youare able to track users, actions taken, and the time of the ac

题目
单选题
In your production database, data manipulation language (DML) operations are executed on theSALES table. You have noticed some dubious values in the SALES table during the last few days. Youare able to track users, actions taken, and the time of the action for this particular period but the changesin data are not tracked. You decide to keep track of both the old data and new data in the table along withthe user information.  What action would you take to achieve this task()
A

Apply fine-grained auditing.

B

Implement value-based auditing.

C

Impose standard database auditing to auditobject privileges.

D

Impose standard databaseauditing to audit SQL statements.


相似考题
更多“单选题In your production database, data manipulation language (DML) operations are executed on theSALES table. You have noticed some dubious values in the SALES table during the last few days. Youare able to track users, actions taken, and the time of the ac”相关问题
  • 第1题:

    You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis.  How would you achieve this?()

    • A、by using triggers
    • B、by using external tables
    • C、by using anonymous PL/SQL blocks
    • D、by auditing all DML operations on the table

    正确答案:A

  • 第2题:

    Which two client requests are captured during database replay Capture?()

    • A、 Flashback queries
    • B、 Shared server requests
    • C、 Login and logoff activities of sessions
    • D、 Direct path load of data from external files by using utilities such as SQL *loader
    • E、 Data definition language (DDL) and data manipulation language (DML) operations

    正确答案:C,E

  • 第3题:

    Your database is in ARCHIVELOG mode. You lost an index tablespace due to a disk failure while the database was open. You have neither a backup of the lost index tablespace nor the scripts containing the CREATE INDEX statements to recreate the indexes. Currently, several users are executing long-running queries on the database. What will happen to the ongoing activity in the database?()

    • A、 The queries that are currently executing will abort and an error message will be returned to the user.
    • B、 The queries that are currently executing will execute normally but future queries will not executed.
    • C、 Data Manipulation Language (DML) statements cannot be performed on the tables on which the indexes are based.
    • D、 The currently executing and future queries will execute normally, but will be slower

    正确答案:D

  • 第4题:

    In your production database, data manipulation language (DML) operations are executed on theSALES table. You have noticed some dubious values in the SALES table during the last few days. Youare able to track users, actions taken, and the time of the action for this particular period but the changesin data are not tracked. You decide to keep track of both the old data and new data in the table along withthe user information.  What action would you take to achieve this task()

    • A、Apply fine-grained auditing.
    • B、Implement value-based auditing.
    • C、Impose standard database auditing to auditobject privileges.
    • D、Impose standard databaseauditing to audit SQL statements.

    正确答案:B

  • 第5题:

    You executed the following SQL statement to shrink the EMPLOYEES table segment stored in the EXAMPLE tablespace: ALTER TABLE employees SHRINK SPACE CASCADE; Which statement is correct in this scenario?()

    • A、The EMPLOYEES table will be changed to read-only mode during the shrink operation.
    • B、The indexes created on the EMPLOYEES table will need to be rebuilt after the shrink operation is over.
    • C、The shrink behavior will be cascaded to all dependent segments of the table that support a shrink operation.
    • D、Data manipulation language (DML) operations will not be possible on the EMPLOYEES table during the COMPACTION phase of the shrink operation.

    正确答案:C

  • 第6题:

    多选题
    Which two client requests are captured during database replay Capture?()
    A

    Flashback queries

    B

    Shared server requests

    C

    Login and logoff activities of sessions

    D

    Direct path load of data from external files by using utilities such as SQL *loader

    E

    Data definition language (DDL) and data manipulation language (DML) operations


    正确答案: D,A
    解析: 暂无解析

  • 第7题:

    单选题
    You executed the following SQL statement to shrink the EMPLOYEES table segment stored in the EXAMPLE tablespace: ALTER TABLE employees SHRINK SPACE CASCADE; Which statement is correct in this scenario?()
    A

    The data in the segment will be compacted but the high water mark will not be adjusted 

    B

    The EMPLOYEES table will be changed to read-only mode during the shrink operation 

    C

    The indexes created on the EMPLOYEES table will need to be rebuilt after the shrink operation is over

    D

    The shrink behavior will be cascaded to all dependent segments of the table that support a shrink operation 

    E

    Data manipulation language (DML) operations will not be possible on the EMPLOYEES table during the COMPACTION phase of the shrink operation


    正确答案: E
    解析: 暂无解析

  • 第8题:

    单选题
    In your production database, users report that they are unable to generate reports on an important table because it does not contain any data. While investigating the reason, you realize that another user executed the TRUNCATE TABLE command, which accidentally caused the data to be lost. Now you want to recover the lost data of the table without affecting objects in other schemas. Which method must you use to recover the lost data?()
    A

    Complete Recovery with online redo log

    B

    Complete Recovery with archived redo log

    C

    Tablespace Point-in-Time Recovery (TSPITR)

    D

    Incomplete Recovery with system change number (SCN)


    正确答案: C
    解析: 暂无解析

  • 第9题:

    单选题
    You discover that the schema changes that were recently made to your SQL Server 2005 database have caused your Web site to stop functioning. It is unclear who made the changes. TestKing.com now mandates that all changes to the database schema be tracked. You need to implement a mechanism that will track schema changes in your database.  What should you do?()
    A

    Implement a stored procedure that writes data about schema changes to a log table.

    B

    Implement DDL AFTER triggers that write user and schema information to a log table.

    C

    Implement a DML INSTEAD OF trigger that writes data about schema changes to a log table.

    D

    Implement a DML AFTER trigger that writes data about schema changes to a log table.


    正确答案: B
    解析: 暂无解析

  • 第10题:

    单选题
    In your production database, data manipulation language (DML) operations are executed on theSALES table. You have noticed some dubious values in the SALES table during the last few days. Youare able to track users, actions taken, and the time of the action for this particular period but the changesin data are not tracked. You decide to keep track of both the old data and new data in the table along withthe user information.  What action would you take to achieve this task()
    A

    Apply fine-grained auditing.

    B

    Implement value-based auditing.

    C

    Impose standard database auditing to auditobject privileges.

    D

    Impose standard databaseauditing to audit SQL statements.


    正确答案: D
    解析: 暂无解析

  • 第11题:

    单选题
    There is a problem with one of the disks used for your database and your system administrator informs you that the disk needs to be replaced. The replacement disk will not be available until tomorrow.  There was only one data file on this disk; it belongs to the USERS tablespace in your PROD database. Your PROD database runs in ARCHIVELOG mode and nightly online backups are taken. The users need to be able to access the data in the USERS tablespace before the replacement disk arrives. You have already taken the USERS tablespace offline and have restored the data file from last night’s backup to a new disk. Which additional steps are required in order to make the USERS tablespace available?()
    A

    Only bring the tablespace back online.

    B

    Only recover the tablespace and then bring the tablespace back online.

    C

    Shut down the database, recover the data file and then start up the database.

    D

    Issue the ALTER DATABASE RENAME FILE command, recover the tablespace, and then bring the tablespace online.

    E

    Recover the tablespace, issue the ALTER DATABASE RENAME FILE command, and then bring the tablespace online.


    正确答案: B
    解析: 暂无解析

  • 第12题:

    多选题
    Which two client requests are captured during database replay Capture?() (Choose two)
    A

    Flashback queries

    B

    Shared server requests

    C

    Login and logoff activities of sessions

    D

    Direct path load of data from external files by using utilities such as SQL *loader

    E

    Data definition language (DDL) and data manipulation language (DML) operations


    正确答案: C,E
    解析: 暂无解析

  • 第13题:

    In your production database, data manipulation language (DML) operations are executed on the SALES table.You have noticed some dubious values in the SALES table during the last few days. You are able to track users, actions taken, and the time of the action for this particular period but the changes in data are not tracked.You decide to keep track of both the old data and new data in the table along with the user information.  Whataction would you take to achieve this task()

    • A、Apply fine-grained auditing.
    • B、Implement value-based auditing.
    • C、Impose standard database auditing to audit object privileges.
    • D、Impose standard database auditing to audit SQL statements.

    正确答案:B

  • 第14题:

    Which two client requests are captured during database replay Capture?() (Choose two)

    • A、Flashback queries
    • B、Shared server requests
    • C、Login and logoff activities of sessions
    • D、Direct path load of data from external files by using utilities such as SQL *loader
    • E、Data definition language (DDL) and data manipulation language (DML) operations

    正确答案:C,E

  • 第15题:

    You executed the following query in your database:  FROM V$FLASHBACK_DATABASE_LOG;  What would you determine from the output?()

    • A、the time when the last flashback operation in your database was performed
    • B、the time when the first flashback operation in your database was performed
    • C、a list of flashback operations performed in your database using SCN and time
    • D、the approximate time and the lowest system change number (SCN) to which you can flash back your database

    正确答案:D

  • 第16题:

    You suspect unauthorized data manipulation language (DML) operations on a particular table. Youwant to track users who are performing the transactions and the values used in the transactions. You alsoplan to transfer these values to another table for analysis.  How would you achieve this()

    • A、by using triggers
    • B、by using Data Pump
    • C、by using external tables
    • D、by using anonymous PL/SQL blocks

    正确答案:A

  • 第17题:

    You need to ensure the Order Control team is able to track the number of orders that reach the production department. What should you do?()

    • A、Create a new Time dimension based on the Holiday table. Use derived columns for the month and the year.
    • B、Create a Server Time dimension. Within this dimension, enable the time periods year, month, and date. Select the Additional Manufacturing calendar option.
    • C、Create a new Time dimension based on the date values within the ProductOrderStatus table. Flag those days on which no orders were received as Holiday.
    • D、Create a new Time dimension based on a data source view named query. Derive the data for this data source view from unique dates within the ProductOrderStatus table. Use a subquery to identify the holidays and derived columns for the month and the year.

    正确答案:D

  • 第18题:

    单选题
    You need to ensure the Order Control team is able to track the number of orders that reach the production department. What should you do?()
    A

    Create a new Time dimension based on the Holiday table. Use derived columns for the month and the year.

    B

    Create a Server Time dimension. Within this dimension, enable the time periods year, month, and date. Select the Additional Manufacturing calendar option.

    C

    Create a new Time dimension based on the date values within the ProductOrderStatus table. Flag those days on which no orders were received as Holiday.

    D

    Create a new Time dimension based on a data source view named query. Derive the data for this data source view from unique dates within the ProductOrderStatus table. Use a subquery to identify the holidays and derived columns for the month and the year.


    正确答案: B
    解析: 暂无解析

  • 第19题:

    单选题
    You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis.  How would you achieve this?()
    A

    by using triggers

    B

    by using external tables

    C

    by using anonymous PL/SQL blocks

    D

    by auditing all DML operations on the table


    正确答案: C
    解析: 暂无解析

  • 第20题:

    单选题
    You executed the following query in your database:  FROM V$FLASHBACK_DATABASE_LOG;  What would you determine from the output?()
    A

    the time when the last flashback operation in your database was performed

    B

    the time when the first flashback operation in your database was performed

    C

    a list of flashback operations performed in your database using SCN and time

    D

    the approximate time and the lowest system change number (SCN) to which you can flash back your database


    正确答案: D
    解析: 暂无解析

  • 第21题:

    单选题
    A support engineer reports that inserting new sales transactions in a SQL Server 2005 database results in an error. You investigate the error. You discover that in one of the databases, a developer has accidentally deleted some data in a table that is critical for transaction processing. The database uses the full recovery model. You need to restore the table. You need to achieve this goal without affecting the availability of other data in the database. What should you do?()
    A

    Back up the current transaction log. Restore the database with a different name and stop at the point just before the data loss. Copy the table back into the original database.

    B

    Back up the current transaction log. Restore the database to the point just before the data loss.

    C

    Restore the database from the existing backup files to a time just before the data loss.

    D

    Restore the database to the point of the last full backup.


    正确答案: A
    解析: 暂无解析

  • 第22题:

    单选题
    You suspect unauthorized data manipulation language (DML) operations on a particular table. Youwant to track users who are performing the transactions and the values used in the transactions. You alsoplan to transfer these values to another table for analysis.  How would you achieve this()
    A

    by using triggers

    B

    by using Data Pump

    C

    by using external tables

    D

    by using anonymous PL/SQL blocks


    正确答案: A
    解析: 暂无解析

  • 第23题:

    单选题
    You executed the following SQL statement to shrink the EMPLOYEES table segment stored in the EXAMPLE tablespace: ALTER TABLE employees SHRINK SPACE CASCADE; Which statement is correct in this scenario?()
    A

    The EMPLOYEES table will be changed to read-only mode during the shrink operation.

    B

    The indexes created on the EMPLOYEES table will need to be rebuilt after the shrink operation is over.

    C

    The shrink behavior will be cascaded to all dependent segments of the table that support a shrink operation.

    D

    Data manipulation language (DML) operations will not be possible on the EMPLOYEES table during the COMPACTION phase of the shrink operation.


    正确答案: C
    解析: 暂无解析

  • 第24题:

    单选题
    In your production database, data manipulation language (DML) operations are executed on the SALES table.You have noticed some dubious values in the SALES table during the last few days. You are able to track users, actions taken, and the time of the action for this particular period but the changes in data are not tracked.You decide to keep track of both the old data and new data in the table along with the user information.  Whataction would you take to achieve this task()
    A

    Apply fine-grained auditing.

    B

    Implement value-based auditing.

    C

    Impose standard database auditing to audit object privileges.

    D

    Impose standard database auditing to audit SQL statements.


    正确答案: B
    解析: 暂无解析