You suspect unauthorized data manipulation language (DML) operations on a particular table. You
want to track users who are performing the transactions and the values used in the transactions.
Also, you plan to transfer these values to another table for analysis. How would you achieve this?
A.
by using anonymous PL/SQL blocks
B.
by using triggers
C.
by auditing all DML operations on the table
D.
by using external tables