Which of the following is NOT part of the process of creating a database audit?
A. create an audit user and assign the AUDIT DB permission
B. define an audit object
C. create the server audit specification
D. enable the audit to begin capturing events
Answer: A
You might also like to view...
Which of the following DSL services operates in a higher speed in one direction than the other?
a. HDSL b. HDSL2 c. ADSL d. SDSL
Which attribute below defines a fragment identifier in a page?
a. id b. identifier c. fragment d. bookmark
DIMMs used in servers can provide additional reliability by checking for and correcting errors if they use what specific technology?
A. Parity B. Quad channel C. ECC D. EDB
In ____, valid packets exploit poorly configured DNS servers to inject false information to corrupt the servers' answers to routine DNS queries from other systems on the network.
A. DNS cache poisoning B. Tiny Fragment Packet attacks C. denial-of-service (DoS) attacks D. man-in-the-middle attacks