单选题In your production database, data manipulation language (DML) operations are executed on theSALES table. You have noticed some dubious values in the SALES table during the last few days. Youare able to track users, actions taken, and the time of the ac

题目
单选题
In your production database, data manipulation language (DML) operations are executed on theSALES table. You have noticed some dubious values in the SALES table during the last few days. Youare able to track users, actions taken, and the time of the action for this particular period but the changesin data are not tracked. You decide to keep track of both the old data and new data in the table along withthe user information.  What action would you take to achieve this task()
A

Apply fine-grained auditing.

B

Implement value-based auditing.

C

Impose standard database auditing to auditobject privileges.

D

Impose standard databaseauditing to audit SQL statements.

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which two client requests are captured during database replay Capture?() (Choose two)

A. Flashback queries

B. Shared server requests

C. Login and logoff activities of sessions

D. Direct path load of data from external files by using utilities such as SQL *loader

E. Data definition language (DDL) and data manipulation language (DML) operations


参考答案:C, E

第2题:

You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis.  How would you achieve this?()

  • A、by using triggers
  • B、by using external tables
  • C、by using anonymous PL/SQL blocks
  • D、by auditing all DML operations on the table

正确答案:A

第3题:

You are the database administrator for a retail company. The company owns 270 stores. Every month, each store submits approximately 2,000 sales records, which are loaded into a SQL Server 2000 database at the corporate headquarters.

A Data Transformation Services (DTS) package transforms the sales records, as they are loaded. The package writes the transformed sales records to the Sales table, which has a column for integer primary key values. The IDENTITY property automatically assigns a key value to each transformed sales record.

After loading this month's sales data, you discover that a portion of the data contains errors. You stop loading data, identify the problem records, and delete those records from the database.

You want to reuse the key values that were assigned to the records that you deleted. You want to assign the deleted key values to the next sales records you load. You also want to disrupt users' work as little as possible.

What should you do?

A.Export all records from the Sales table to a temporary table. Truncate the Sales table, and then reload the records from the temporary table.

B.Export all records from the Sales table to a text file. Drop the Sales table, and then reload the records from the text file.

C.Use the DBCC CHECKIDENT statement to reseed the Sales table's IDENTITY property.

D.Set the Sales table's IDENTITY_INSERT property to ON. Add new sales records that have the desired key values.


正确答案:C
解析:Explanation: DBCC CHECKIDENT is used to check the current identity value for the specified table. It can be set to correct the identity value by specifying the RESEED option with DBCC CHECKIDENT.

Note: Example:
Assume that we have a table called test with an identity column with seed (1,1) and 1000 rows and that we delete row 901 to 950. We could then issue the command
DBCC CHECKIDENT (test, reseed, 900)

And load the 50 missing rows. These rows would get the values 901, 902, …,950 in the identity column.
We should then set the identity value to 1000 again:
DBCC CHECKIDENT (test, reseed, 1000)

So that the next new row will have identity 1001.

Incorrect Answers:
A: Exporting the data from the Sales table and then reloading the data will not correct errors contained in the table as these errors will also be exported as they are part of the data already in the table.
B: Exporting the data from the Sales table and then reloading the data will not correct errors contained in the table as these errors will also be exported as they are part of the data already in the table.

D: The SET IDENTITY_INSERT command allows explicit values to be inserted into the identity column of a table. To reuse the old key values from the rows that was deleted would require manual commands and would be awkward. This is not the best solution.

第4题:

Your database is in ARCHIVELOG mode. You lost an index tablespace due to a disk failure while the database was open. You have neither a backup of the lost index tablespace nor the scripts containing the CREATE INDEX statements to recreate the indexes. Currently, several users are executing long-running queries on the database. What will happen to the ongoing activity in the database?()

  • A、 The queries that are currently executing will abort and an error message will be returned to the user.
  • B、 The queries that are currently executing will execute normally but future queries will not executed.
  • C、 Data Manipulation Language (DML) statements cannot be performed on the tables on which the indexes are based.
  • D、 The currently executing and future queries will execute normally, but will be slower

正确答案:D

第5题:

Which two client requests are captured during database replay Capture?()

  • A、 Flashback queries
  • B、 Shared server requests
  • C、 Login and logoff activities of sessions
  • D、 Direct path load of data from external files by using utilities such as SQL *loader
  • E、 Data definition language (DDL) and data manipulation language (DML) operations

正确答案:C,E

第6题:

You discover that the schema changes that were recently made to your SQL Server 2005 database have caused your Web site to stop functioning. It is unclear who made the changes. TestKing.com now mandates that all changes to the database schema be tracked. You need to implement a mechanism that will track schema changes in your database.  What should you do?()

  • A、Implement a stored procedure that writes data about schema changes to a log table.
  • B、Implement DDL AFTER triggers that write user and schema information to a log table.
  • C、Implement a DML INSTEAD OF trigger that writes data about schema changes to a log table.
  • D、Implement a DML AFTER trigger that writes data about schema changes to a log table.

正确答案:B

第7题:

In your production database, data manipulation language (DML) operations are executed on the SALES table.You have noticed some dubious values in the SALES table during the last few days. You are able to track users, actions taken, and the time of the action for this particular period but the changes in data are not tracked.You decide to keep track of both the old data and new data in the table along with the user information.  Whataction would you take to achieve this task()

  • A、Apply fine-grained auditing.
  • B、Implement value-based auditing.
  • C、Impose standard database auditing to audit object privileges.
  • D、Impose standard database auditing to audit SQL statements.

正确答案:B

第8题:

Which two client requests are captured during database replay Capture?()

A. Flashback queries

B. Shared server requests

C. Login and logoff activities of sessions

D. Direct path load of data from external files by using utilities such as SQL *loader

E. Data definition language (DDL) and data manipulation language (DML) operations


参考答案:C, E

第9题:

Which two client requests are captured during database replay Capture?() (Choose two)

  • A、Flashback queries
  • B、Shared server requests
  • C、Login and logoff activities of sessions
  • D、Direct path load of data from external files by using utilities such as SQL *loader
  • E、Data definition language (DDL) and data manipulation language (DML) operations

正确答案:C,E

第10题:

You executed the following query in your database:  FROM V$FLASHBACK_DATABASE_LOG;  What would you determine from the output?()

  • A、the time when the last flashback operation in your database was performed
  • B、the time when the first flashback operation in your database was performed
  • C、a list of flashback operations performed in your database using SCN and time
  • D、the approximate time and the lowest system change number (SCN) to which you can flash back your database

正确答案:D

更多相关问题