admin管理员组

文章数量:1571328

184.You suspect unauthorized data manipulation language (DML) operations on a particular table. You
want to track users who are performing the transactions and the values used in the transactions. You also
plan to transfer these values to another table for analysis.
How would you achieve this?
A.by using triggers
B.by using Data Pump
C.by using external tables
D.by using anonymous PL/SQL blocks
答案:A
解析:这个是你要跟踪用户修改的值,并且将这些值插入另外一张表中,那这个只能是通过触发器来实现了

本文标签: unauthorizedDatasuspectmanipulationOperations