单选题You observe that in your PROD database, customer information is being modified by some unauthorized users. You want to keep track of all of the transactions happening on the table using PL/SQL. Which type of PL/SQL subprogram or construct would you use

题目
单选题
You observe that in your PROD database, customer information is being modified by some unauthorized users. You want to keep track of all of the transactions happening on the table using PL/SQL. Which type of PL/SQL subprogram or construct would you use to accomplish this task?()
A

functions

B

packages

C

procedures

D

database triggers

E

anonymous PL/SQL block


相似考题
参考答案和解析
正确答案: B
解析: 暂无解析
更多“单选题You observe that in your PROD database, customer information is being modified by some unauthorized users. You want to keep track of all of the transactions happening on the table using PL/SQL. Which type of PL/SQL subprogram or construct would you use”相关问题
  • 第1题:

    You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis.  How would you achieve this?()

    • A、by using triggers
    • B、by using external tables
    • C、by using anonymous PL/SQL blocks
    • D、by auditing all DML operations on the table

    正确答案:A

  • 第2题:

    Which type of PL/SQL construct would you use to automatically correct the error resulting from a statement that was suspended due to a space-related problem?()

    • A、 functions
    • B、 package
    • C、 procedure
    • D、 database trigger
    • E、 anonymous PL/SQL block

    正确答案:D

  • 第3题:

    You are using flat files as the data source for one of your data warehousing applications. You plan to move the data from the flat file structures to an Oracle database to optimize the application performance. In your database you have clustered tables. While migrating the data, you want to have minimal impact on the database performance and optimize the data load operation. Which method would you use to load data into Oracle database?()

    • A、use the external table population
    • B、use the Oracle Data Pump export and import utility
    • C、use the conventional path data load of SQL*Loader utility
    • D、use the direct path data load of Oracle export and import utility

    正确答案:C

  • 第4题:

    You want to make use of the object features available in the database for the form module you are developing. Which three statements about object types are true? ()

    • A、An object type is a user-defined composite data type. 
    • B、The attributes of an object type can be those of other object types. 
    • C、A PL/SQL table of records is an example of a nested object type. 
    • D、An object type must be declared as a type before the actual object itself can be declared.

    正确答案:A,B,D

  • 第5题:

    You observe that in your PROD database, customer information is being modified by some unauthorized users. You want to keep track of all of the transactions happening on the table using PL/SQL. Which type of PL/SQL subprogram or construct would you use to accomplish this task?()

    • A、functions
    • B、packages
    • C、procedures
    • D、database triggers
    • E、anonymous PL/SQL block

    正确答案:D

  • 第6题:

    You have lost all your database control files. To recover them, you are going to use the results of the alter database backup controlfile to trace command. Your datafiles and your online redo logs are all intact.  Which of the following is true regarding your recovery?()  

    • A、 You will need to open the database with the resetlogs command.
    • B、 All you need to do is execute the trace file from SQL*Plus and it will perform the recovery for you.
    • C、 You will use the resetlogs version of the create controlfile command.
    • D、 You will use the noresetlogs version of the create controlfile command.
    • E、 You will use the trace file to create a backup control file, and then you will recover the database with the recover database using backup controlfile command

    正确答案:D

  • 第7题:

    单选题
    You work as a database administrator for Certkiller .com. You suspect that in one of your applications the customer table is being accessed by some unauthorized users. Which option would you use to monitor the queries being executed on the customer table?()
    A

    Monitor thealert.logfile

    B

    Enable server-side SQL tracing for user sessions

    C

    Enable fine-grained auditing for the customer table

    D

    Enable Fine-Grained Access Control (FGAC) for the customer table

    E

    Write a database trigger on the customer table on the SELECT event


    正确答案: E
    解析: 暂无解析

  • 第8题:

    多选题
    You want to make use of the object features available in the database for the form module you are developing. Which three statements about object types are true? ()
    A

    An object type is a user-defined composite data type.

    B

    The attributes of an object type can be those of other object types.

    C

    A PL/SQL table of records is an example of a nested object type.

    D

    An object type must be declared as a type before the actual object itself can be declared.


    正确答案: B,D
    解析: 暂无解析

  • 第9题:

    单选题
    In your production database, data manipulation language (DML) operations are executed on theSALES table. You have noticed some dubious values in the SALES table during the last few days. Youare able to track users, actions taken, and the time of the action for this particular period but the changesin data are not tracked. You decide to keep track of both the old data and new data in the table along withthe user information.  What action would you take to achieve this task()
    A

    Apply fine-grained auditing.

    B

    Implement value-based auditing.

    C

    Impose standard database auditing to auditobject privileges.

    D

    Impose standard databaseauditing to audit SQL statements.


    正确答案: D
    解析: 暂无解析

  • 第10题:

    多选题
    You work as a database administrator for Certkiller .com. In your development environmentenvironment, the developers are responsible for modifying the table structure according to the application requirements. However, you want to keep track of the ALTER TABLE commands being executed by developers, so you enable auditing to achieve this objective.  Which two views would you refer to find out the audit information?()
    A

    DBA_AUDIT_TRAIL

    B

    DBA_AUDIT_SESSION

    C

    DBA_FGA_AUDIT_TRAIL

    D

    DBA_COMMON_AUDIT_TRAIL


    正确答案: D,B
    解析: 暂无解析

  • 第11题:

    单选题
    While designing the database for one of your online transaction processing (OLTP) applications, you want to achieve the following:  a) high availability of data  b) faster primary key access to the table data  c) compact storage for the table  Which type of tables would you use to achieve these objectives?()
    A

    heap tables

    B

    object tables

    C

    partitioned tables

    D

    index-organized tables (IOTs)


    正确答案: D
    解析: 暂无解析

  • 第12题:

    单选题
    Which type of PL/SQL construct would you use to automatically correct the error resulting from a statement that was suspended due to a space-related problem?()
    A

     functions

    B

     package

    C

     procedure

    D

     database trigger

    E

     anonymous PL/SQL block


    正确答案: B
    解析: 暂无解析

  • 第13题:

    You want to administer your PROD database from a remote host machine using a Web-enabled interface. Which Oracle tool would you use to accomplish this task efficiently without using command-line interfaces?()

    • A、SQL*Plus
    • B、iSQL*Plus
    • C、Management Server
    • D、Management Repository
    • E、Oracle Enterprise Manager 10g Database Control

    正确答案:E

  • 第14题:

    You want to configure and schedule offline database backups to run automatically.  Which tool or utilitywould you use to achieve this()

    • A、the XML script
    • B、the PL/SQL script
    • C、the DBMS_SCHEDULER package
    • D、Enterprise Manager to schedule the backup

    正确答案:D

  • 第15题:

    You work as a database administrator for Supportcenter.cn. You suspect that in one of your applications the customer table is being accessed by some unauthorized users. Which option would you use to monitor the queries being executed on the customer table?()

    • A、Monitor thealert.logfile
    • B、Enable server-side SQL tracing for user sessions
    • C、Enable fine-grained auditing for the customer table
    • D、Enable Fine-Grained Access Control (FGAC) for the customer table
    • E、Write a database trigger on the customer table on the SELECT event

    正确答案:D

  • 第16题:

    You are using the backup scheduler in Enterprise Manager (EM) to schedule a backup of your database. Which type of script does the backup scheduler generate? ()

    • A、SQL script
    • B、PL/SQL script
    • C、Operating System (OS) script
    • D、Enterprise Manager (EM) script
    • E、Recovery Manager (RMAN) script

    正确答案:E

  • 第17题:

    You suspect unauthorized data manipulation language (DML) operations on a particular table. Youwant to track users who are performing the transactions and the values used in the transactions. You alsoplan to transfer these values to another table for analysis.  How would you achieve this()

    • A、by using triggers
    • B、by using Data Pump
    • C、by using external tables
    • D、by using anonymous PL/SQL blocks

    正确答案:A

  • 第18题:

    单选题
    You observe that in your PROD database, customer information is being modified by some unauthorized users. You want to keep track of all of the transactions happening on the table using PL/SQL. Which type of PL/SQL subprogram or construct would you use to accomplish this task?()
    A

    functions

    B

    packages

    C

    procedures

    D

    database triggers

    E

    anonymous PL/SQL block


    正确答案: C
    解析: 暂无解析

  • 第19题:

    单选题
    You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis.  How would you achieve this?()
    A

    by using triggers

    B

    by using external tables

    C

    by using anonymous PL/SQL blocks

    D

    by auditing all DML operations on the table


    正确答案: C
    解析: 暂无解析

  • 第20题:

    单选题
    You want to administer your PROD database from a remote host machine using a Web-enabled interface. Which Oracle tool would you use to accomplish this task efficiently without using command-line interfaces?()
    A

    SQL*Plus

    B

    iSQL*Plus

    C

    Management Server

    D

    Management Repository

    E

    Oracle Enterprise Manager 10g Database Control


    正确答案: D
    解析: 暂无解析

  • 第21题:

    单选题
    You suspect unauthorized data manipulation language (DML) operations on a particular table. Youwant to track users who are performing the transactions and the values used in the transactions. You alsoplan to transfer these values to another table for analysis.  How would you achieve this()
    A

    by using triggers

    B

    by using Data Pump

    C

    by using external tables

    D

    by using anonymous PL/SQL blocks


    正确答案: A
    解析: 暂无解析

  • 第22题:

    单选题
    Which type of PL/SQL construct would you use to automatically correct the error resulting from a statement that was suspended due to a space/x7frelated problem? ()
    A

    function

    B

    package

    C

    procedure

    D

    database trigger

    E

    anonymous PL/SQL block


    正确答案: A
    解析: 暂无解析

  • 第23题:

    单选题
    You want to configure and schedule offline database backups to run automatically.  Which tool or utilitywould you use to achieve this()
    A

    the XML script

    B

    the PL/SQL script

    C

    the DBMS_SCHEDULER package

    D

    Enterprise Manager to schedule the backup


    正确答案: A
    解析: 暂无解析

  • 第24题:

    单选题
    In your production database, data manipulation language (DML) operations are executed on the SALES table.You have noticed some dubious values in the SALES table during the last few days. You are able to track users, actions taken, and the time of the action for this particular period but the changes in data are not tracked.You decide to keep track of both the old data and new data in the table along with the user information.  Whataction would you take to achieve this task()
    A

    Apply fine-grained auditing.

    B

    Implement value-based auditing.

    C

    Impose standard database auditing to audit object privileges.

    D

    Impose standard database auditing to audit SQL statements.


    正确答案: B
    解析: 暂无解析