Which of the following is NOT part of the process of creating a database audit?

A. create an audit user and assign the AUDIT DB permission
B. define an audit object
C. create the server audit specification
D. enable the audit to begin capturing events


Answer: A

Computer Science & Information Technology

You might also like to view...

Which of the following DSL services operates in a higher speed in one direction than the other?

a. HDSL b. HDSL2 c. ADSL d. SDSL

Computer Science & Information Technology

Which attribute below defines a fragment identifier in a page?

a. id b. identifier c. fragment d. bookmark

Computer Science & Information Technology

DIMMs used in servers can provide additional reliability by checking for and correcting errors if they use what specific technology?

A. Parity B. Quad channel C. ECC D. EDB

Computer Science & Information Technology

In ____, valid packets exploit poorly configured DNS servers to inject false information to corrupt the servers' answers to routine DNS queries from other systems on the network.

A. DNS cache poisoning B. Tiny Fragment Packet attacks C. denial-of-service (DoS) attacks D. man-in-the-middle attacks

Computer Science & Information Technology