无码高清视频|成人自拍视频|欧美成人午夜无码A片秀色直播|草美女视频网站|美女被操网站在线观看

單項(xiàng)選擇題

You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis. 
How would you achieve this?()

A.by using triggers
B.by using external tables
C.by using anonymous PL/SQL blocks
D.by auditing all DML operations on the table

微信掃碼免費(fèi)搜題