You want to monitor how a large production table is accessed. Especially, you are interested to see how the access on that particular table leverages the benefits of the Exadata Platform.
Which two actions are NOT appropriate for that purpose?
A) changing the root password
E) configuring secure shell user equivalency for the cellmonitor user
Simona
18 days agoElly
19 days agoWilford
Shenika
23 days agoLuis
26 days ago