找考题网-背景图
单项选择题

A.by using triggersB.by using Data PumpC.by using exter……

You suspect unauthorized data manipulation language (DML) operations on a particular table. Youwant to track users who are performing the transactions and the values used in the transactions. You alsoplan to transfer these values to another table for analysis. 
How would you achieve this()



A.by using triggers
B.by using Data Pump
C.by using external tables
D.by using anonymous PL/SQL blocks

热门试题