单项选择题
A.implementing value-based auditing by using triggers
B.implementing fine-grained auditing with audit condition and event handler
C.performing standard database auditing to audit object privileges by setting the AUDIT_TRAIL parameter to EXTENDED
D.performing standard database auditing to audit SQL statements with granularity level set to ACCESS
单项选择题 YouareusingthebackupschedulerinEnterpriseManager(EM)toscheduleabackupofyourdatabase.Whichtypeofscriptdoesthebackupschedulergenerate?()
单项选择题 You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis. How would you achieve this?()
单项选择题 Asaresultofperformanceanalysis,youcreatedanindexontheprod_namecolumnoftheprod_dettable,whichcontainsabouttenthousandrows.Later,youupdatedaproductnameinthetable.Howdoesthischangeaffecttheindex?()