he DBA is about to enable auditing on the Oracle database in an attempt to discover some suspicious activity. Audit trail information is stored in which of the following database object names?()
第1题:
A user reports that each day some files are deleted from the department share. The administrator needs to find who deleted these files. Which of the following actions should the administrator perform?()
第2题:
Identify three benefits of Unified Auditing.()
第3题:
You installed Oracle Database 11g afresh. Which statements are true regarding the default audit settings in this database?()
第4题:
You work as a database administrator for Certkiller .com. You enabled tracing while creating a listener to your database. What additional information is available to you when you enable tracing?()
第5题:
You are managing a single instance Oracle 10g database that utilizes the following parameters: Which of the following set of commands must you execute to enable Flashback Database?()
第6题:
In order to enable remote administration of users and tablespaces on an Oracle database, which of the following types of files must exist in the database?()
第7题:
You wish to enable an audit policy for all database users, except SYS, SYSTEM, and SCOTT.You issue the following statements: SQL> AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYS;SQL> AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYSTEM; SQL> AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SCOTT; For which database users is the audit policy now active?()
第8题:
Enable audit object access and specify files and folders to monitor using Task Manager.
Enable audit policy change and specify files and folders to monitor using Windows Explorer.
Enable audit object access and specify files and folders to monitor using Windows Explorer.
Open Performance Monitor and monitor folder activity.
第9题:
Library cache
Row cache
Dictionary cache
Large area
Buffer cache
第10题:
DBA_AUDIT_TRAIL
DBA_AUDIT_SESSION
DBA_FGA_AUDIT_TRAIL
DBA_COMMON_AUDIT_TRAIL
第11题:
SYS.SOURCE$
SYS.AUD$
DBA_SOURCE
DBA_AUDIT_TRAIL
第12题:
SYSTEM
OUTLN
INTERNAL
SYS
第13题:
You are performing backup and recovery operations by using RMAN. You are using a recovery catalog for the RMAN repository. You are planning to migrate to ASM disk storage to enable new disks to be added to the database without shutting down the database. Which information is NOT required during the migration process?()
第14题:
The SAVE_AMT column in the ACCOUNTS table contains the balance details of customers in a bank. As part of the year/x7fend tax and interest calculation process, all the rows in the table need to be accessed. The bank authorities want to track access to the rows containing balance amounts exceeding $200,000, and then send an alert message to the administrator. Which method would you suggest to the bank for achieving this task?()
第15题:
In your production database, data manipulation language (DML) operations are executed on the SALES table.You have noticed some dubious values in the SALES table during the last few days. You are able to track users, actions taken, and the time of the action for this particular period but the changes in data are not tracked.You decide to keep track of both the old data and new data in the table along with the user information. Whataction would you take to achieve this task()
第16题:
You are analyzing how Oracle processes user statements. SQL and PL/SQL parse information is stored in which of the following database memory areas? ()
第17题:
Records from the data dictionary information are stored in which of the following database memory areas?()
第18题:
You are identifying dictionary objects in the Oracle database. Which of the following is a view in the data dictionary?()
第19题:
You are about to create your Oracle data dictionary for use with the database. Which of the following users would you connect to the database as for this purpose in Oracle9i and later releases?()
第20题:
The audit trail is stored in an operating system file.
Auditing is disabled for all privileges.
The audit trail is stored in the database.
Auditing is enabled for all privileges.
Auditing is enabled for certain privileges related to database security.
第21题:
Clone
Copy
Template
Terminal
第22题:
Decreased use of storage to store audit trail rows in the database.
It improves overall auditing performance.
It guarantees zero-loss auditing.
The audit trail cannot be easily modified because it is read-only.
It automatically audits Recovery Manager (RMAN) events.
第23题:
Apply fine-grained auditing.
Implement value-based auditing.
Impose standard database auditing to audit object privileges.
Impose standard database auditing to audit SQL statements.