日韩欧美亚洲 _ 欧美亚洲一区 _ 日本亚洲欧美 _ 亚洲精品欧美 国产白袜脚足J棉袜在线观看_亚洲熟妇av一区二区三区_久久天天躁狠狠躁夜_精品众筹模特私拍在线

單項選擇題

You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis. 
How would you achieve this?()

A.by using triggers
B.by using external tables
C.by using anonymous PL/SQL blocks
D.by auditing all DML operations on the table

微信掃碼免費搜題