You want to monitor how a large production table is accessed. Especially, you are interested to see how the access on that particular table leverages the benefits of the Exadata Platform.
Which two actions are NOT appropriate for that purpose?
A) changing the root password
E) configuring secure shell user equivalency for the cellmonitor user
Loreen
2 months agoPedro
2 months agoEdda
14 days agoGabriele
17 days agoDomonique
20 days agoLeonie
1 months agoLoreen
2 months agoShaquana
20 days agoCruz
24 days agoAntione
1 months agoKing
2 months agoEliz
17 days agoChau
1 months agoSoledad
1 months agoSimona
3 months agoElly
3 months agoDaisy
2 months agoZona
2 months agoGlenn
2 months agoWilford
2 months agoShenika
3 months agoLuis
3 months ago