Apply fine-grained auditing.
Implement value-based auditing.
Impose standard database auditing to auditobject privileges.
Impose standard databaseauditing to audit SQL statements.
第1题:
A. Flashback queries
B. Shared server requests
C. Login and logoff activities of sessions
D. Direct path load of data from external files by using utilities such as SQL *loader
E. Data definition language (DDL) and data manipulation language (DML) operations
第2题:
You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis. How would you achieve this?()
第3题:
You are the database administrator for a retail company. The company owns 270 stores. Every month, each store submits approximately 2,000 sales records, which are loaded into a SQL Server 2000 database at the corporate headquarters.
A Data Transformation Services (DTS) package transforms the sales records, as they are loaded. The package writes the transformed sales records to the Sales table, which has a column for integer primary key values. The IDENTITY property automatically assigns a key value to each transformed sales record.
After loading this month's sales data, you discover that a portion of the data contains errors. You stop loading data, identify the problem records, and delete those records from the database.
You want to reuse the key values that were assigned to the records that you deleted. You want to assign the deleted key values to the next sales records you load. You also want to disrupt users' work as little as possible.
What should you do?
A.Export all records from the Sales table to a temporary table. Truncate the Sales table, and then reload the records from the temporary table.
B.Export all records from the Sales table to a text file. Drop the Sales table, and then reload the records from the text file.
C.Use the DBCC CHECKIDENT statement to reseed the Sales table's IDENTITY property.
D.Set the Sales table's IDENTITY_INSERT property to ON. Add new sales records that have the desired key values.
第4题:
Your database is in ARCHIVELOG mode. You lost an index tablespace due to a disk failure while the database was open. You have neither a backup of the lost index tablespace nor the scripts containing the CREATE INDEX statements to recreate the indexes. Currently, several users are executing long-running queries on the database. What will happen to the ongoing activity in the database?()
第5题:
Which two client requests are captured during database replay Capture?()
第6题:
You discover that the schema changes that were recently made to your SQL Server 2005 database have caused your Web site to stop functioning. It is unclear who made the changes. TestKing.com now mandates that all changes to the database schema be tracked. You need to implement a mechanism that will track schema changes in your database. What should you do?()
第7题:
In your production database, data manipulation language (DML) operations are executed on the SALES table.You have noticed some dubious values in the SALES table during the last few days. You are able to track users, actions taken, and the time of the action for this particular period but the changes in data are not tracked.You decide to keep track of both the old data and new data in the table along with the user information. Whataction would you take to achieve this task()
第8题:
A. Flashback queries
B. Shared server requests
C. Login and logoff activities of sessions
D. Direct path load of data from external files by using utilities such as SQL *loader
E. Data definition language (DDL) and data manipulation language (DML) operations
第9题:
Which two client requests are captured during database replay Capture?() (Choose two)
第10题:
You executed the following query in your database: FROM V$FLASHBACK_DATABASE_LOG; What would you determine from the output?()