Ctrl + F is the shortcut in your browser or operating system that allows you to find words or questions quickly.
Ctrl + Tab to move to the next tab to the right and Ctrl + Shift + Tab to move to the next tab to the left.
On a phone or tablet, tap the menu icon in the upper-right corner of the window; Select "Find in Page" to search a question.
Share UsSharing is Caring
It's the biggest motivation to help us to make the site better by sharing this to your friends or classmates.
Explores advanced concepts and techniques in managing large-scale databases, including data modeling, security, and emerging trends in database technology.
The point in time or SCN to which the tablespace will be recovered.
Using Database Replay consists of four main steps: 1. Workload capture 2. Workload preprocessing 3. Workload replay 4. Analysis and reporting
Which of the following is the default substitution variable for the FORMAT clause of the BACKUP command?
DUPLICATE command: SKIP READONLY Exclude read-only tablespaces from the copy operation.
A default installation of the Oracle database using the Oracle Universal Installer with a seed database, or using the Database Creation Assistant, will automatically create a password file.
Which of the following data dictionary views contains a list of the tables using a Flashback Data Archive?
The net service name of your target database is DW and the net service name of your recovery catalog database is RCAT. The environment variable ORACLE_SID has a value of RCAT. Which of the following sets of commands will successfully create a recovery catalog?
You will perform complete closed database recovery. Put the following steps in the correct order. 1. Open the database to users. 2. Identify files needed for recovery. 3. Start up the database in MOUNT mode. 4. Bring the datafiles online. 5. Apply archived and online redo log files to roll forward. 6. Oracle applies undo to roll back uncommitted changes. 7. Restore recovery-related files containing committed and uncommitted transactions
It refers to one of the log file status in V$LOG described as the log group has not been used yet.
Identify the data dictionary view you can use to check for object dependencies between tablespaces.
Question text The SGA is a group of memory structures for an Oracle instance that are shared by the users of the database instance
Your server’s physical memory is 8GB and no other applications or Oracle instances are running on the server. For a new Oracle instance running a decision support system, what is a good starting point for setting PGA_AGGREGATE_TARGET?
The types of user-managed backup you can perform are dependent on whether your database is running in ARCHIVELOG mode.
What happens to the rows in FLASHBACK_TRANSACTION_QUERY when part of the transaction is no longer available in the undo tablespace?
writes new or changed data blocks (known as dirty blocks) in the buffer cache to the datafiles.
DUPLICATE command: SKIP TABLESPACE Exclude specific tablespaces, except for SYSTEM and UNDO.
To use guaranteed restore points, you must also enable these prerequisites: The database must be running in ARCHIVELOG mode
A distinct advantage to using ARCHIVELOG mode is that you can perform online backups (also known as hot backups), while the database is available to users.
You have lost the most recent archived redo log files from the recovery catalog database as well as the tablespace containing the RMAN catalog. You can do an incomplete restore of the recovery catalog database to a point in time after the target databases were registered with the recovery catalog. What commands can you use to resynchronize the target database’s metadata and backup information with the recovery catalog database?
You have configured backup optimization for your database using CONFIGURE BACKUP OPTIMIZATION ON. For which of the following commands will RMAN not skip a backup if the files are identical?
Under what circumstances would you use the RMAN command UPGRADE CATALOG?
DUPLICATE command: NOFILENAMECHECK Don’t check for duplicate filenames between the source and destination databases.
Identify the true statement about Automatic Memory Management (AMM).
backout options: NOCASCADE Back out only the specified transaction, if possible.
Structure Analysis Restructure the SQL statements to see if better execution plans are generated
Which of the following procedures will run a SQL Tuning Advisor job against a SQL Tuning Set?
Which of the following initialization parameters is not required to configure Flashback Database operations?
Which of the following CREATE RESTORE POINT commands will preserve the restore point past the time specified by the initialization parameter CONTROL_FILE_RECORD_KEEP_TIME?
What method does RMAN use to enable fast incremental backup?
At which level does ASM perform mirroring?
You can use DELETE_REPLAY_INFO to delete a report in the replay directory.
You set the initialization parameter BACKUP_TAPE_IO_SLAVES to TRUE. What effect does this have on the type of I/O that the server processes perform for RMAN if you are using tape?
If you do not use a recovery catalog, what data dictionary or dynamic performance views must you query to retrieve RMAN backup information?
Is in charge of redo log buffer management. It is one of the most active processes in an instance with heavy DML activity.
When you want to create a duplexed backupset, what is the maximum number of copies of each backup piece you can create with one BACKUP command?
backups involve copying the files that constitute the database. These backups are also referred to as file system backups because they involve using operating system file backup commands.
If you are interested in recovering only a small set of logically isolated tables to a previous point in time, you may be able to perform recovery using Oracle’s Flashback Table features.
Which of the following initialization parameters is not valid?
Which of the following columns is not in the data dictionary view FLASHBACK_TRANSACTION_QUERY?
You want to remap your database links so that they do not reference production database objects. Within which Database Replay step do you perform the remapping?
Which of the following statement is not true regarding database backups?
Which of the following initialization parameters control Automatic Shared Memory Management (ASSM)?
To enable password encryption for a specific backup, use the ______ command
To use guaranteed restore points, you must also enable these prerequisites:The database must be running in ARCHIVELOG mode.
It refers to one of the log file status in V$LOG described as The log is being cleared by ALTER DATABASE CLEAR LOGFILE. After being cleared, the status changes to UNUSED.
SCN-based incomplete recovery works well if your applications save the SCN at critical points in a process flow, or the alert or trace logs indicate a serious error as of a particular SCN.
What is the difference between an RMAN local script and an RMAN global script?
It refers to one of the log file status in V$LOG described as the log group is not needed for instance recovery, may be in use for media recovery, and may or may not be archived
You have just received a pager alert indicating that the flash recovery area is below 3 percent free space. Which view and column can you query for a possible corrective action for this space condition?
To create a duplicate database, put the following steps in the correct order: 1. Start the auxiliary instance as NOMOUNT. 2. Allocate auxiliary channels if necessary. 3. Run the RMAN DUPLICATE command. 4. Create a password file for the auxiliary instance. 5. Ensure network connectivity to the auxiliary instance. 6. Open the auxiliary instance. 7. Start the source database in MOUNT or OPEN mode. 8. Create an initialization parameter file for the auxiliary instance. 9. Create backups or copy existing backups and archived log files to a common location accessible by the auxiliary instance.
Which of the following procedures will run a SQL Access Advisor job against a single SQL statement?
is used by the Oracle JVM (Java Virtual Machine) for all Java code and data within a user session.
Which of the following two dynamic performance views can you use to identify the relationship between Oracle server sessions and RMAN channels?
The group of datafiles containing the tablespace(s) to be recovered
a database ______ is the smallest unit of storage in Oracle.
If you are recovering one or more tablespaces or the entire database from backups that have different passwords, you can conveniently specify all the passwords at once with _______
The three possible states of a log file group are INACTIVE, ACTIVE, and CURRENT.
After the capture operation is complete, the captured information must be preprocessed by transforming the captured data into replay files that can be easily replayed on the target system
contains two major subcaches: the library cache and the data dictionary cache.
What is the difference between the V$LOG and V$LOGFILE views?
To use guaranteed restore points, you must also enable these prerequisites: The COMPATIBLE initialization parameter must be 10.2 or higher.
Identify the correct statement regarding TSPITR terminology.
Before running the first replay, you must perform some prerequisite checks:Remap references to other production systems via database links, external .tables, directory objects, URLs, and E-mail notifications.
backup of a database involves reading a set of database rows and writing them to a file
Which is the best method for recovering a tempfile?
Recorded client request contains the information: Transaction information
To use guaranteed restore points, you must also enable these prerequisites: You must have archived redo log files available starting from the time of the first guaranteed restore point.
The _____ is an area of memory allocating dynamic sections of itself, privately for one set of connection processes.
The _______is the next level of logical grouping in the database
What is the difference between coarse striping and fine striping for files in a disk group?
Which of the following background processes exist in both an ASM instance and an RDBMS instance, and also support ASM disk groups?
holds the most recent changes to the data blocks in the datafiles.
SQL Profiling Collect auxiliary statistics on a SQL statement along with partial execution statistics and store them in a SQL Profile.
backups back up all changed blocks since the last level 0 incremental backup
key tuning parameters for the BACKUP command: _________ The maximum number of input files that a channel can have open at a given time.
key tuning parameters for the BACKUP command: ______________ The maximum size of a backup piece per channel.
backup is the default type of incremental backup that backs up all changed blocks since the last level 0 or level 1 incremental backup
Statistics Analysis Check for stale or missing statistics, and recommend refreshing or creating them
Which of the following are not RMAN standalone commands?
When using the VERSIONS BETWEEN clause for Flashback Version Query, what can’t you use to restrict the number of rows returned by the query?
What is the difference between a critical and a noncritical datafile in a recovery scenario?
Which of the following is not a valid status for an online redo log group?
You want to switch from AMM to ASMM. What is the correct statement you need to run?
Access Paths Analyze the impact of creating new indexes, materialized views, and partitioning.
What happens to the state of an ASM instance when a connected RDBMS instance fails?
To use guaranteed restore points, you must also enable these prerequisites: You must have a flash recovery area configured.
is an optional area of the SGA. It is used for transactions that interact with more than one database, message buffers for processes performing parallel queries, and RMAN parallel backup and restore operations.
key tuning parameters for the BACKUP command: ____________ The maximum number of files per backupset.
What is the maximum number of database writer processes (DBWn) in an Oracle database instance?
The RMAN SWITCH command is equivalent to what SQL command?
Which of the following methods can you use to retrieve the current System Change Number (SCN)?
The SQL Tuning Advisor performs all but which of the following analyses?
You have lost all online control files. Specify the correct order for the following tasks: · Restore the control file from backup or run CREATE CONTROLFILE. · Start database recovery and specify the keywords BACKUP CONTROLFILE. · Start up the database in MOUNT mode. · Open the database with RESETLOGS. · Shut down the database.
You can use V$BACKUP_ASYNC_IO to monitor asynchronous RMAN I/O. What column or columns do you use to determine which file is the bottleneck during a backup?
When restoring a database to a new host, what is the first command you should run as part of the restoration process?
RMAN makes it easy to make a full copy or a subset of a target database.
What are the default characteristics of an ASM file created with no options?
You can use two different methods to authenticate a database administrator: operating system (OS) authentication or password file authentication.
backout options: NOCASCADE_FORCE Back out the specified transactions, ignoring dependent transactions.
Your database is running in NOARCHIVELOG mode, and you perform occasional incremental level 1 backups in MOUNT mode. To what point in time can you recover the database if you lose a datafile for the USERS tablespace?
Identify the true statement about Flashback Data Archives.
Recorded client request contains the information: SQL text
Before running the first replay, you must perform some prerequisite checks: Ensure that the target system has access to the replay directory
Before running the first replay, you must perform some prerequisite checks:Remap connection strings to the replay system from the production system.
Which of the following does not occur when you register a target database with the recovery catalog database using the REGISTER DATABASE command?
backout options: NONCONFLICT_ONLY Back out changes to nonconflicting rows of the specified transaction only
Other datafiles required to recover the tablespace(s), such as the datafiles for the SYSTEM, UNDO, and TEMP tablespaces
DUPLICATE command: OPEN RESTRICTED When the destination database is ready, open it immediately with the RESTRICTED SESSION option.
Which of the following clauses is not valid for the RMAN DUPLICATE command?
When you run the RMAN RESTORE CONTROLFILE command, where does RMAN put the previous version of the control file?
backout options: CASCADE Back out all transactions and their dependent transactions.
Identify the true statement regarding incremental and differential backups.
What is the value for INSTANCE_TYPE in the init.ora file or SPFILE for an ASM instance?
Place the following commands in the correct order for restoring a control file from an RMAN autobackup: 1. RECOVER DATABASE 2. ALTER DATABASE OPEN RESETLOGS 3. STARTUP NOMOUNT 4. ALTER DATABASE MOUNT 5. RESTORE CONTROLFILE FROM AUTOBACKUP
Which two dynamic performance views can you use to identify files that need to be backed up, regardless of whether you are in ARCHIVELOG mode or NOARCHIVELOG mode?
When you want to restore backup, either to the same database or to a different database, you must specify the decryption password with ________
The group of datafiles containing the tablespace(s) to be recovered.
Which of the following parameters are required for an ASM instance?
The database buffer cache holds blocks of data from disk that have been recently read to satisfy a SELECT statement or that contain modified blocks that have been changed or added from a Data Manipulation Language (DML) statement.
The phrase “closed databaserecovery” is somewhat of a misnomer if you consider that the database instance may still be available when one or more datafiles become unavailable.
The SQL Tuning Advisor analyzes one or more SQL statements sequentially, examining statistics, and potentially recommends creating a SQL profile, new indexes, materialized views, or a revised SQL statement.
Backing up the control file for a database running in ARCHIVELOG mode produces the same end result as the method you use in NOARCHIVELOG mode.
is a group of extents that form a database object that Oracle treats as a unit, such as a table or index.
Choose the four best commands from the following list that you would use to enable ARCHIVELOG mode, and put them in the correct order: 1. STARUP MOUNT 2. SHUTDOWN ABORT 3. ALTER DATABASE ARCHIVELOG; 4. STARTUP FORCE 5. ALTER DATABASE ENABLE ARCHIVELOG; 6. ALTER SYSTEM SWITCH LOGFILE; 7. SHUTDOWN NORMAL 8. ALTER DATABASE OPEN; 9. SHUTDOWN IMMEDIATE
If a user connection is dropped or a user process otherwise fails, ______ does the cleanup work
If you lose all of the tempfiles from your temporary tablespace, what is the most likely result noticed by your users?
You run the following command to create a whole database backup: RMAN< backup as copy database spfile plus archivelog delete input; What does the DELETE INPUT clause do?
If you specify the initialization parameter DB_RECOVERY_FILE_DEST, what other initialization parameter must be set?
If you want to use two-way mirroring (normal redundancy) for a new disk group, how many failure groups do you need?
is a block of executable code designed to perform a specific task
You have created a virtual private catalog to separate your RMAN administration duties among several DBAs for 20 different databases. Which role must you grant to each virtual catalog owner to allow the person to access existing registered databases?
Identify the correct statement regarding duplicate databases created with RMAN.
Recovery falls into one of two general categories: complete and incomplete.
Which of the following roles should you grant to the recovery catalog owner?
In the case of a system crash or instance failure, due to a power outage or CPU failure, the ______, performs crash recovery by applying the entries in the online redo log files to the datafiles.
Which tablespaces contain critical datafiles that must be recovered when the database is offline?
The four steps to create a set of recommendations are as follows: 1. Create a task 2. Define the workload 3. Generate the recommendations 4. Review and implement the recommendations
Performance tuning is the final step in a four-step process: planning, implementing, and monitoring must precede it.
What is the difference between a full backup and a whole database backup?
Which of the following commands does not back up the current control file?
Recorded client request contains the information: Bind values
To keep up this site, we need your assistance. A little gift will help us alot.
Donate- The more you give the more you receive.
Related SubjectWeb Application Development
Web Systems Technologies
Web Development
Geographic Information Systems
Computer Information Systems
Relational Database Systems
Introduction to Multimedia
Database Management System
The Supply Chain
Diabetes Education Month
Configuration Management
Medical Office Administration
Hospitality Management
Inventory Production Control
Food Service Management
Emergency and Disaster Management
Business Administration
Strategy Management and Acquisition
Risk Management
Real Estate Appraisal and Property Management
Investment and Portfolio Management
Credit and Collection
Animation Project
Massage Machines
Knowledge Management
Electronics Engineering Technology
Modeling and Simulation
Database Management System 2
Social Media Specialist
Engineering
Quantitative Methods
Numerical Methods
Mobile Application Design and Development 2
Algorithms and Complexity
Calculus
Fundamental Qualitative Characteristics of Accounting Information
Environmental Marketing
Venture Capital
System Analysis Design and Development
Cloud Computing and the Internet of Things
Texas Border Wall
Houthi, Missile, and Israel in Modern Conflicts
TikTok Ban Debate
Huawei Smartphone Innovation
Social Security Fairness Act
Intrusion Detection System
Operating System Functions
Network Administration
Health Information Technology
Computer Support Technician
Risk Management Applied to Safety Security and Sanitation
Property Management System
Information Assurance and Security 2
Information Assurance and Security 3
Information Security and Management
Information Management
Fundamentals of Investigation and Intelligence
Fundamentals of Database System
Cyber Security: Theories and Practice
Shopee Cashback Voucher
Temu $0 Shipping Fee
Amazon 75% Off Discounts