You want to monitor how a large production table is accessed. Especially, you are interested to see how the access on that particular table leverages the benefits of the Exadata Platform.
Which two actions are NOT appropriate for that purpose?
A) changing the root password
E) configuring secure shell user equivalency for the cellmonitor user
Loreen
1 months agoPedro
1 months agoEdda
4 days agoGabriele
7 days agoDomonique
10 days agoLeonie
22 days agoLoreen
1 months agoShaquana
10 days agoCruz
14 days agoAntione
23 days agoKing
2 months agoEliz
7 days agoChau
21 days agoSoledad
28 days agoSimona
2 months agoElly
2 months agoDaisy
1 months agoZona
2 months agoGlenn
2 months agoWilford
2 months agoShenika
3 months agoLuis
3 months ago