You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for 

题目

You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis.  How would you achieve this?()

  • A、by using triggers
  • B、by using external tables
  • C、by using anonymous PL/SQL blocks
  • D、by auditing all DML operations on the table

相似考题
更多“You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for a”相关问题
  • 第1题:

    You added a PHONE_NUMBER column of NUMBER data type to an existing EMPLOYEES table. The EMPLOYEES table already contains records of 100 employees. Now, you want to enter the phone numbers of each of the 100 employees into the table. Some of the employees may not have a phone number available. Which data manipulation operation do you perform?()

    • A、MERGE
    • B、INSERT
    • C、UPDATE
    • D、ADD
    • E、ENTER
    • F、You cannot enter the phone numbers for the existing employee records.

    正确答案:C

  • 第2题:

    On Jan 11, 2005 at 2:30 P.M., an erroneous update operation modified all the values of column LASTNAME in the EMPLOYEE table in the Scott schema to an empty string. You are the system administrator, and you want to return the original values in the table. To do so, you decided to flash back the table. Which two options can you use to flash back a table?()

    • A、 by using Oracle Enterprise Manager
    • B、 by issuing the FLASHBACK TABLE statement at the RMAN prompt
    • C、 by issuing the FLASHBACK TABLE statement at the SQL prompt
    • D、 by issuing the FLASHBACK TABLE statement at the LSNRCTL prompt

    正确答案:A,C

  • 第3题:

    In your production database, data manipulation language (DML) operations are executed on the SALES table.You have noticed some dubious values in the SALES table during the last few days. You are able to track users, actions taken, and the time of the action for this particular period but the changes in data are not tracked.You decide to keep track of both the old data and new data in the table along with the user information.  Whataction would you take to achieve this task()

    • A、Apply fine-grained auditing.
    • B、Implement value-based auditing.
    • C、Impose standard database auditing to audit object privileges.
    • D、Impose standard database auditing to audit SQL statements.

    正确答案:B

  • 第4题:

    You added a PHONE_NUMBER column of NUMBER data type to an existing EMPLOYEES table. The EMPLOYEES table already contains records of 100 employees. Now, you want to enter the phone numbers of each of the 100 employees into the table. Some of the employees may not have a phone number available. Which data manipulation operation do you perform?()

    • A、MERGE
    • B、INSERT
    • C、UPDATE
    • D、ADD
    • E、ENTER
    • F、You cannot enter the phone numbers for the existing employee records.

    正确答案:C

  • 第5题:

    You observe that in your PROD database, customer information is being modified by some unauthorized users. You want to keep track of all of the transactions happening on the table using PL/SQL. Which type of PL/SQL subprogram or construct would you use to accomplish this task?()

    • A、functions
    • B、packages
    • C、procedures
    • D、database triggers
    • E、anonymous PL/SQL block

    正确答案:D

  • 第6题:

    You suspect unauthorized data manipulation language (DML) operations on a particular table. Youwant to track users who are performing the transactions and the values used in the transactions. You alsoplan to transfer these values to another table for analysis.  How would you achieve this()

    • A、by using triggers
    • B、by using Data Pump
    • C、by using external tables
    • D、by using anonymous PL/SQL blocks

    正确答案:A

  • 第7题:

    You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005. You work as a database administrator for your company. The users report the slow performance of a SQL Server 2005 application. You are required to identify the queries which perform slowly because of blocking. Which action should you perform?()

    • A、In a SQL Trace log file, you should look for queries with low duration values and high read and write values.
    • B、In a query execution plan, you should look for queries with missing or out-of-date statistics.
    • C、In a SQL Trace log file, you should look for queries with high duration values and low read and write values.
    • D、In a query execution plan, you should look for queries with a large number of table scans.

    正确答案:C

  • 第8题:

    You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005. You work as a database administrator for your company. There is a database named Inventory on a SQL Server 2005 computer, and the computer is named SQL01. SQL01 is utilized to aggregate manufacturing part numbers from your company’s trading partners. And the company stores the manufacturing part numbers in the Product table in the Inventory database. The company requests the users to deliver data as text files from each trading partner to SQL1 every night. The data should be imported, and no duplicate manufacturing part numbers should exist in the data which is imported from the text files, and the text files are stored in the Inventory database on SQL01. You should cut the effect on your company’s trading partners and your IT department to the least.  Which action should you perform?()

    • A、First, you should import the data from each text file into a staging table. Second, you should write a query to have a HAVING clause contained so as to migrate replicate values before results are inserted into the Product table.
    • B、First, you should make sure that each text file is stored in an Extensible Markup Language (XML) file. Second, you should utilize Extensible Stylesheet Language Transformations (XSLT) to automatically migrate replicates before data is imported into the Product table.
    • C、First, you should make sure that the unique key values for manufacturing part numbers are utilized by each of your company’s trading partners utilizes. Second, you should import the text files into the Product table.
    • D、You should place a unique index on the PartNum column.

    正确答案:A

  • 第9题:

    多选题
    On Jan 11, 2005 at 2:30 P.M., an erroneous update operation modified all the values of column LASTNAME in the EMPLOYEE table in the Scott schema to an empty string. You are the system administrator, and you want to return the original values in the table. To do so, you decided to flash back the table. Which two options can you use to flash back a table?()
    A

    by using Oracle Enterprise Manager

    B

    by issuing the FLASHBACK TABLE statement at the RMAN prompt

    C

    by issuing the FLASHBACK TABLE statement at the SQL prompt

    D

    by issuing the FLASHBACK TABLE statement at the LSNRCTL prompt


    正确答案: A,B
    解析: 暂无解析

  • 第10题:

    单选题
    You need to base a data block on the EMP table, but you do not want to give the users of the application access privileges on the table. Which type of data source would you use to create the data block?()
    A

    table 

    B

    transactional trigger 

    C

    stored procedure 

    D

    FROM clause query


    正确答案: D
    解析: 暂无解析

  • 第11题:

    单选题
    You suspect unauthorized data manipulation language (DML) operations on a particular table. Youwant to track users who are performing the transactions and the values used in the transactions. You alsoplan to transfer these values to another table for analysis.  How would you achieve this()
    A

    by using triggers

    B

    by using Data Pump

    C

    by using external tables

    D

    by using anonymous PL/SQL blocks


    正确答案: A
    解析: 暂无解析

  • 第12题:

    单选题
    You added a PHONE_NUMBER column of NUMBER data type to an existing EMPLOYEES table. The EMPLOYEES table already contains records of 100 employees. Now, you want to enter the phone numbers of each of the 100 employees into the table. Some of the employees may not have a phone number available. Which data manipulation operation do you perform? ()
    A

    MERGE

    B

    INSERT

    C

    UPDATE

    D

    ADD

    E

    ENTER

    F

    You cannot enter the phone numbers for the existing employee records.


    正确答案: A
    解析: 暂无解析

  • 第13题:

    You discover that the schema changes that were recently made to your SQL Server 2005 database have caused your Web site to stop functioning. It is unclear who made the changes. TestKing.com now mandates that all changes to the database schema be tracked. You need to implement a mechanism that will track schema changes in your database.  What should you do?()

    • A、Implement a stored procedure that writes data about schema changes to a log table.
    • B、Implement DDL AFTER triggers that write user and schema information to a log table.
    • C、Implement a DML INSTEAD OF trigger that writes data about schema changes to a log table.
    • D、Implement a DML AFTER trigger that writes data about schema changes to a log table.

    正确答案:B

  • 第14题:

    In which case would you use a FULL OUTER JOIN?()

    • A、Both tables have NULL values.
    • B、You want all unmatched data from one table.
    • C、You want all matched data from both tables.
    • D、You want all unmatched data from both tables.
    • E、One of the tables has more data than the other.
    • F、You want all matched and unmatched data from only one table.

    正确答案:D

  • 第15题:

    36 You are creating a report wizard to create a matrix report. The query build, you select the patient_name column from the patient table; the doctor_name from the doctors table; and the doctor_ID, patient_ID and ID columns from the procedure table. In the report wizard you select patient_name as the row value, doctor_ID as the column values and the count as the cell values. You need to add a total for each doctors column. In the wizard report which tab will allow you to create the summary column?()

    • A、Rows 
    • B、Totals 
    • C、Columns 
    • D、Cells 
    • E、Data

    正确答案:B

  • 第16题:

    You want to access employee details contained in flat files as part of the EMPLOYEE table. You plan to add anew column to the EMPLOYEE table to achieve this.  Which data type would you use for the new column()

    • A、CLOB
    • B、BLOB
    • C、BFILE
    • D、LONG RAW

    正确答案:C

  • 第17题:

    In your production database, data manipulation language (DML) operations are executed on theSALES table. You have noticed some dubious values in the SALES table during the last few days. Youare able to track users, actions taken, and the time of the action for this particular period but the changesin data are not tracked. You decide to keep track of both the old data and new data in the table along withthe user information.  What action would you take to achieve this task()

    • A、Apply fine-grained auditing.
    • B、Implement value-based auditing.
    • C、Impose standard database auditing to auditobject privileges.
    • D、Impose standard databaseauditing to audit SQL statements.

    正确答案:B

  • 第18题:

    You want to access employee details contained in flat files as part of the EMPLOYEE table. You planto add a new column to the EMPLOYEE table to achieve this.  Which data type would you use for the new column()

    • A、CLOB
    • B、BLOB
    • C、BFILE
    • D、LONG RAW

    正确答案:C

  • 第19题:

    You design a Business Intelligence (BI) solution by using SQL Server 2008.  You plan to create a SQL Server 2008 Reporting Services (SSRS) solution that contains five sales dashboard reports.  Users must be able to manipulate the reports’ parameters to analyze data. You need to ensure that the following requirements are met: Users can manipulate the parameters for data analysis in a single trip to the data source.  Reports are automatically rendered as soon as they are accessed for the first time. Which two tasks should you perform?()

    • A、 Filter data by using expressions.
    • B、 Specify the default values for each parameter.
    • C、 Create an available values list for each parameter.
    • D、 Create report parameters by using query parameters to filter data at the data source.

    正确答案:A,B

  • 第20题:

    单选题
    In which case would you use a FULL OUTER JOIN?()
    A

    Both tables have NULL values.

    B

    You want all unmatched data from one table.

    C

    You want all matched data from both tables.

    D

    You want all unmatched data from both tables.

    E

    One of the tables has more data than the other.

    F

    You want all matched and unmatched data from only one table.


    正确答案: D
    解析: 暂无解析

  • 第21题:

    单选题
    You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis.  How would you achieve this?()
    A

    by using triggers

    B

    by using external tables

    C

    by using anonymous PL/SQL blocks

    D

    by auditing all DML operations on the table


    正确答案: C
    解析: 暂无解析

  • 第22题:

    单选题
    In your test database, you have created the ORDERS table as an index-organized table (IOT). To facilitate faster querying, you have created a mapping table and a bitmap index on the ORDER_FILLED column. You observe that the query performance degrees when users perform a large volume of transactions. While investigating the reason, you find that the mapping table segment is fragmented, leading to poor performance. Which option would you use to defragment the mapping table without affecting the original table data?()
    A

     Export and import the mapping table.

    B

     Drop and re-create the mapping table.

    C

     Truncate the mapping table and reinsert the values.

    D

     Use the ALTER TABLE .. REBUILD command to defragment the mapping table.


    正确答案: B
    解析: 暂无解析

  • 第23题:

    单选题
    You added a PHONE_NUMBER column of NUMBER data type to an existing EMPLOYEES table. The EMPLOYEES table already contains records of 100 employees. Now, you want to enter the phone numbers of each of the 100 employees into the table. Some of the employees may not have a phone number available. Which data manipulation operation do you perform?()
    A

    MERGE

    B

    INSERT

    C

    UPDATE

    D

    ADD

    E

    ENTER

    F

    You cannot enter the phone numbers for the existing employee records.


    正确答案: A
    解析: 暂无解析