Download Oracle Database 12c: Installation and Administration.1z0-062.Test4Prep.2018-10-01.210q.vcex

Vendor: Oracle
Exam Code: 1z0-062
Exam Name: Oracle Database 12c: Installation and Administration
Date: Oct 01, 2018
File Size: 2 MB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Purchase
Coupon: EXAM_HUB

Discount: 20%

Demo Questions

Question 1
Which two statements are true concerning the Resource Manager plans for individual pluggable databases (PDB plans) in a multitenant container database (CDB)? (Choose two.)
  1. If no PDB plan is enabled for a pluggable database, then all sessions for that PDB are treated to an equal degree of the resource share of that PDB.
  2. In a PDB plan, subplans may be used with up to eight consumer groups.
  3. If a PDB plan is enabled for a pluggable database, then resources are allocated to consumer groups across all PDBs in the CDB.
  4. If no PDB plan is enabled for a pluggable database, then the PDB share in the CDB plan is dynamically calculated.
  5. If a PDB plan is enabled for a pluggable database, then resources are allocated to consumer groups based on the shares provided to the PDB in the CDB plan and the shares provided to the consumer groups in the PDB plan.
Correct answer: AE
Explanation:
A: Setting a PDB resource plan is optional. If not specified, all sessions within the PDB are treated equally.* In a non-CDB database, workloads within a database are managed with resource plans. In a PDB, workloads are also managed with resource plans, also called PDB resource plans. The functionality is similar except for the following differences:/ Non-CDB Database Multi-level resource plans Up to 32 consumer groups Subplans / PDB Database Single-level resource plans only Up to 8 consumer groups (not B) No subplans
A: Setting a PDB resource plan is optional. If not specified, all sessions within the PDB are treated equally.
In a non-CDB database, workloads within a database are managed with resource plans. 
In a PDB, workloads are also managed with resource plans, also called PDB resource plans. 
The functionality is similar except for the following differences:
/ Non-CDB Database 
Multi-level resource plans 
Up to 32 consumer groups 
Subplans 
/ PDB Database 
Single-level resource plans only 
Up to 8 consumer groups 
(not B) No subplans
Question 2
You use a recovery catalog for maintaining your database backups. 
You execute the following command:
$rman TARGET / CATALOG rman / cat@catdb 
RMAN > BACKUP VALIDATE DATABASE ARCHIVELOG ALL; 
Which two statements are true? (Choose two.)
  1. Corrupted blocks, if any, are repaired.
  2. Checks are performed for physical corruptions.
  3. Checks are performed for logical corruptions.
  4. Checks are performed to confirm whether all database files exist in correct locations
  5. Backup sets containing both data files and archive logs are created.
Correct answer: BD
Explanation:
B (not C): You can validate that all database files and archived redo logs can be backed up by running a command as follows:RMAN> BACKUP VALIDATE DATABASE ARCHIVELOG ALL; This form of the command would check for physical corruption. To check for logical corruption, RMAN> BACKUP VALIDATE CHECK LOGICAL DATABASE ARCHIVELOG ALL; D: You can use the VALIDATE keyword of the BACKUP command to do the following:Check datafiles for physical and logical corruption Confirm that all database files exist and are in the correct locations. Note:You can use the VALIDATE option of the BACKUP command to verify that database files exist and are in the correct locations (D), and have no physical or logical corruptions that would prevent RMAN from creating backups of them. When performing a BACKUP...VALIDATE, RMAN reads the files to be backed up in their entirety, as it would during a real backup. It does not, however, actually produce any backup sets or image copies (Not A, not E).
B (not C): You can validate that all database files and archived redo logs can be backed up by running a command as follows:
RMAN> BACKUP VALIDATE DATABASE ARCHIVELOG ALL; 
This form of the command would check for physical corruption. To check for logical corruption, 
RMAN> BACKUP VALIDATE CHECK LOGICAL DATABASE ARCHIVELOG ALL; 
D: You can use the VALIDATE keyword of the BACKUP command to do the following:
Check datafiles for physical and logical corruption 
Confirm that all database files exist and are in the correct locations. 
Note:
You can use the VALIDATE option of the BACKUP command to verify that database files exist and are in the correct locations (D), and have no physical or logical corruptions that would prevent RMAN from creating backups of them. When performing a BACKUP...VALIDATE, RMAN reads the files to be backed up in their entirety, as it would during a real backup. It does not, however, actually produce any backup sets or image copies (Not A, not E).
Question 3
Which three statements are true concerning the multitenant architecture? (Choose three.)
  1. Each pluggable database (PDB) has its own set of background processes.
  2. A PDB can have a private temp tablespace.
  3. PDBs can share the sysaux tablespace.
  4. Log switches occur only at the multitenant container database (CDB) level.
  5. Different PDBs can have different default block sizes.
  6. PDBs share a common system tablespace.
  7. Instance recovery is always performed at the CDB level.
Correct answer: BDG
Explanation:
B:A PDB would have its SYSTEM, SYSAUX, TEMP tablespaces. It can also contain other user created tablespaces in it. There is one default temporary tablespace for the entire CDB. However, you can create additional temporary tablespaces in individual PDBs. D:There is a single redo log and a single control file for an entire CDB  A log switch is the point at which the database stops writing to one redo log file and begins writing to another. Normally, a log switch occurs when the current redo log file is completely filled and writing must continue to the next redo log file. G: instance recoveryThe automatic application of redo log records to uncommitted data blocks when a database instance is restarted after a failure. Incorrect:Not A:There is one set of background processes shared by the root and all PDBs. High consolidation density. The many pluggable databases in a single container database share its memory and background processes, letting you operate many more pluggable databases on a particular platform than you can single databases that use the old architecture. Not C: There is a separate SYSAUX tablespace for the root and for each PDB.Not F: There is a separate SYSTEM tablespace for the root and for each PDB.
B:
  • A PDB would have its SYSTEM, SYSAUX, TEMP tablespaces. It can also contain other user created tablespaces in it. 
  • There is one default temporary tablespace for the entire CDB. However, you can create additional temporary tablespaces in individual PDBs. 
D:
  • There is a single redo log and a single control file for an entire CDB 
  • A log switch is the point at which the database stops writing to one redo log file and begins writing to another. Normally, a log switch occurs when the current redo log file is completely filled and writing must continue to the next redo log file. 
G: instance recovery
The automatic application of redo log records to uncommitted data blocks when a database instance is restarted after a failure. 
Incorrect:
Not A:
  • There is one set of background processes shared by the root and all PDBs. 
  • High consolidation density. The many pluggable databases in a single container database share its memory and background processes, letting you operate many more pluggable databases on a particular platform than you can single databases that use the old architecture. 
Not C: There is a separate SYSAUX tablespace for the root and for each PDB.
Not F: There is a separate SYSTEM tablespace for the root and for each PDB.
Question 4
You notice that the elapsed time for an important database scheduler Job is unacceptably long. 
The job belongs to a scheduler job class and window. 
Which two actions would reduce the job's elapsed time? (Choose two.)
  1. Increasing the priority of the job class to which the job belongs
  2. Increasing the job's relative priority within the Job class to which it belongs
  3. Increasing the resource allocation for the consumer group mapped to the scheduler job's job class within the plan mapped to the scheduler window
  4. Moving the job to an existing higher priority scheduler window with the same schedule and duration
  5. Increasing the value of the JOB_QUEUE_PROCESSES parameter
  6. Increasing the priority of the scheduler window to which the job belongs
Correct answer: BC
Explanation:
B: Job priorities are used only to prioritize among jobs in the same class.Note: Group jobs for prioritizationWithin the same job class, you can assign priority values of 1-5 to individual jobs so that if two jobs in the class are scheduled to start at the same time, the one with the higher priority takes precedence. This ensures that you do not have a less important job preventing the timely completion of a more important one. C: Set resource allocation for member jobsJob classes provide the link between the Database Resource Manager and the Scheduler, because each job class can specify a resource consumer group as an attribute. Member jobs then belong to the specified consumer group and are assigned resources according to settings in the current resource plan.
B: Job priorities are used only to prioritize among jobs in the same class.
Note: Group jobs for prioritization
Within the same job class, you can assign priority values of 1-5 to individual jobs so that if two jobs in the class are scheduled to start at the same time, the one with the higher priority takes precedence. This ensures that you do not have a less important job preventing the timely completion of a more important one. 
C: Set resource allocation for member jobs
Job classes provide the link between the Database Resource Manager and the Scheduler, because each job class can specify a resource consumer group as an attribute. Member jobs then belong to the specified consumer group and are assigned resources according to settings in the current resource plan.
Question 5
You plan to migrate your database from a File system to Automata Storage Management (ASM) on same platform. 
Which two methods or commands would you use to accomplish this task? (Choose two.)
  1. RMAN CONVERT command
  2. Data Pump Export and import
  3. Conventional Export and Import
  4. The BACKUP AS COPY DATABASE . . . command of RMAN
  5. DBMS_FILE_TRANSFER with transportable tablespace
Correct answer: AD
Explanation:
A:1. Get the list of all datafiles. Note: RMAN Backup of ASM StorageThere is often a need to move the files from the file system to the ASM storage and vice versa. This may come in handy when one of the file systems is corrupted by some means and then the file may need to be moved to the other file system. D: Migrating a Database into ASM* To take advantage of Automatic Storage Management with an existing database you must migrate that database into ASM. This migration is performed using Recovery Manager (RMAN) even if you are not using RMAN for your primary backup and recovery strategy. * Example:Back up your database files as copies to the ASM disk group. BACKUP AS COPY INCREMENTAL LEVEL 0 DATABASE FORMAT '+DISK' TAG 'ORA_ASM_MIGRATION'; References:
A:
1. Get the list of all datafiles. 
Note: RMAN Backup of ASM Storage
There is often a need to move the files from the file system to the ASM storage and vice versa. This may come in handy when one of the file systems is corrupted by some means and then the file may need to be moved to the other file system. 
D: Migrating a Database into ASM
* To take advantage of Automatic Storage Management with an existing database you must migrate that database into ASM. This migration is performed using Recovery Manager (RMAN) even if you are not using RMAN for your primary backup and recovery strategy. 
* Example:
Back up your database files as copies to the ASM disk group. 
BACKUP AS COPY INCREMENTAL LEVEL 0 DATABASE 
FORMAT '+DISK' TAG 'ORA_ASM_MIGRATION'; 
References:
Question 6
You run a script that completes successfully using SQL*Plus that performs these actions:
  1. Creates a multitenant container database (CDB) 
  2. Plugs in three pluggable databases (PDBs) 
  3. Shuts down the CDB instance 
  4. Starts up the CDB instance using STARTUP OPEN READ WRITE 
Which two statements are true about the outcome after running the script? (Choose two.)
  1. The seed will be in mount state.
  2. The seed will be opened read-only.
  3. The seed will be opened read/write.
  4. The other PDBs will be in mount state.
  5. The other PDBs will be opened read-only.
  6. The PDBs will be opened read/write.
Correct answer: BD
Explanation:
B: The seed is always read-only.D: Pluggable databases can be started and stopped using SQL*Plus commands or the ALTER PLUGGABLE DATABASE command.
B: The seed is always read-only.
D: Pluggable databases can be started and stopped using SQL*Plus commands or the ALTER PLUGGABLE DATABASE command.
Question 7
You execute the following piece of code with appropriate privileges:
  
User SCOTT has been granted the CREATE SESSION privilege and the MGR role. 
Which two statements are true when a session logged in as SCOTT queries the SAL column in the view and the table? (Choose two.)
  1. Data is redacted for the EMP.SAL column only if the SCOTT session does not have the MGR role set.
  2. Data is redacted for EMP.SAL column only if the SCOTT session has the MGR role set.
  3. Data is never redacted for the EMP_V.SAL column.
  4. Data is redacted for the EMP_V.SAL column only if the SCOTT session has the MGR role set.
  5. Data is redacted for the EMP_V.SAL column only if the SCOTT session does not have the MGR role set.
Correct answer: AC
Explanation:
Note:DBMS_REDACT.FULL completely redacts the column data. DBMS_REDACT.NONE applies no redaction on the column data. Use this function for development testing purposes. LOB columns are not supported. The DBMS_REDACT package provides an interface to Oracle Data Redaction, which enables you to mask (redact) data that is returned from queries issued by low-privileged users or an application. If you create a view chain (that is, a view based on another view), then the Data Redaction policy also applies throughout this view chain. The policies remain in effect all of the way up through this view chain, but if another policy is created for one of these views, then for the columns affected in the subsequent views, this new policy takes precedence.
Note:
  • DBMS_REDACT.FULL completely redacts the column data. 
  • DBMS_REDACT.NONE applies no redaction on the column data. Use this function for development testing purposes. LOB columns are not supported. 
  • The DBMS_REDACT package provides an interface to Oracle Data Redaction, which enables you to mask (redact) data that is returned from queries issued by low-privileged users or an application. 
  • If you create a view chain (that is, a view based on another view), then the Data Redaction policy also applies throughout this view chain. The policies remain in effect all of the way up through this view chain, but if another policy is created for one of these views, then for the columns affected in the subsequent views, this new policy takes precedence.
Question 8
Your database is open and the LISTENER listener running. You stopped the wrong listener LISTENER by issuing the following command:
1snrctl > STOP 
What happens to the sessions that are presently connected to the database Instance?
  1. They are able to perform only queries.
  2. They are not affected and continue to function normally.
  3. They are terminated and the active transactions are rolled back.
  4. They are not allowed to perform any operations until the listener LISTENER is started.
Correct answer: B
Explanation:
The listener is used when the connection is established. The immediate impact of stopping the listener will be that no new session can be established from a remote host. Existing sessions are not compromised.
The listener is used when the connection is established. The immediate impact of stopping the listener will be that no new session can be established from a remote host. Existing sessions are not compromised.
Question 9
Which three statements are true about using flashback database in a multitenant container database (CDB)? (Choose three.) (Choose three.)
  1. The root container can be flashed back without flashing back the pluggable databases (PDBs).
  2. To enable flashback database, the CDB must be mounted.
  3. Individual PDBs can be flashed back without flashing back the entire CDB.
  4. The DB_FLASHBACK RETENTION_TARGET parameter must be set to enable flashback of the CDB.
  5. A CDB can be flashed back specifying the desired target point in time or an SCN, but not a restore point.
Correct answer: ABD
Question 10
You execute the following PL/SQL:
  
Which two statements are true? (Choose two.)
  1. Fine-Grained Auditing (FGA) is enabled for the PRICE column in the PRODUCTS table for SELECT statements only when a row with PRICE > 10000 is accessed.
  2. FGA is enabled for the PRODUCTS.PRICE column and an audit record is written whenever a row with PRICE > 10000 is accessed.
  3. FGA is enabled for all DML operations by JIM on the PRODUCTS.PRICE column.
  4. FGA is enabled for the PRICE column of the PRODUCTS table and the SQL statements is captured in the FGA audit trial.
Correct answer: AB
Explanation:
DBMS_FGA.add_policy The DBMS_FGA package provides fine-grained security functions. ADD_POLICY Procedure This procedure creates an audit policy using the supplied predicate as the audit condition. Incorrect:Not C: object_schemaThe schema of the object to be audited. (If NULL, the current log-on user schema is assumed.)
DBMS_FGA.add_policy 
  • The DBMS_FGA package provides fine-grained security functions. 
  • ADD_POLICY Procedure 
This procedure creates an audit policy using the supplied predicate as the audit condition. 
Incorrect:
Not C: object_schema
The schema of the object to be audited. (If NULL, the current log-on user schema is assumed.)
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!