试题详情
- 单项选择题 You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis. How would you achieve this?()
A、by using triggers
B、by using external tables
C、by using anonymous PL/SQL blocks
D、by auditing all DML operations on the table
- A
关注下方微信公众号,在线模考后查看
热门试题
- Which two statements
- On your Oracle 12c
- Which two statements
- Given: IfclassDonke
- Evaluatethefollowing
- Which three statemen
- Which is a valid CRE
- 想在另一个模式中创建表,用户最少应该具有
- 每个运行的Oracle数据库都与Orac
- Click the
- You are working in
- Which two are true a
- You have
- Which two statements
- You want
- Examine the&en
- Top N analysis requi
- ()是Oracle维护数据库中其他文件的
- Which one̳
- Click the Exhibit bu