Ctrl + F is the shortcut in your browser or operating system that allows you to find words or questions quickly.
Ctrl + Tab to move to the next tab to the right and Ctrl + Shift + Tab to move to the next tab to the left.
On a phone or tablet, tap the menu icon in the upper-right corner of the window; Select "Find in Page" to search a question.
Share UsSharing is Caring
It's the biggest motivation to help us to make the site better by sharing this to your friends or classmates.
Explores advanced concepts and techniques in managing large-scale databases, including data modeling, security, and emerging trends in database technology.
Which of the following procedures will run a SQL Tuning Advisor job against a SQL Tuning Set?
What method does RMAN use to enable fast incremental backup?
backup is the default type of incremental backup that backs up all changed blocks since the last level 0 or level 1 incremental backup
Before running the first replay, you must perform some prerequisite checks:Remap connection strings to the replay system from the production system.
The types of user-managed backup you can perform are dependent on whether your database is running in ARCHIVELOG mode.
Is in charge of redo log buffer management. It is one of the most active processes in an instance with heavy DML activity.
holds the most recent changes to the data blocks in the datafiles.
It refers to one of the log file status in V$LOG described as The log is being cleared by ALTER DATABASE CLEAR LOGFILE. After being cleared, the status changes to UNUSED.
backups back up all changed blocks since the last level 0 incremental backup
Which two dynamic performance views can you use to identify files that need to be backed up, regardless of whether you are in ARCHIVELOG mode or NOARCHIVELOG mode?
After the capture operation is complete, the captured information must be preprocessed by transforming the captured data into replay files that can be easily replayed on the target system
If you lose all of the tempfiles from your temporary tablespace, what is the most likely result noticed by your users?
Which of the following background processes exist in both an ASM instance and an RDBMS instance, and also support ASM disk groups?
You will perform complete closed database recovery. Put the following steps in the correct order. 1. Open the database to users. 2. Identify files needed for recovery. 3. Start up the database in MOUNT mode. 4. Bring the datafiles online. 5. Apply archived and online redo log files to roll forward. 6. Oracle applies undo to roll back uncommitted changes. 7. Restore recovery-related files containing committed and uncommitted transactions
A distinct advantage to using ARCHIVELOG mode is that you can perform online backups (also known as hot backups), while the database is available to users.
It refers to one of the log file status in V$LOG described as the log group is not needed for instance recovery, may be in use for media recovery, and may or may not be archived
Which of the following two dynamic performance views can you use to identify the relationship between Oracle server sessions and RMAN channels?
Which of the following is not a valid status for an online redo log group?
If a user connection is dropped or a user process otherwise fails, ______ does the cleanup work
Which of the following CREATE RESTORE POINT commands will preserve the restore point past the time specified by the initialization parameter CONTROL_FILE_RECORD_KEEP_TIME?
What are the default characteristics of an ASM file created with no options?
What is the difference between coarse striping and fine striping for files in a disk group?
To use guaranteed restore points, you must also enable these prerequisites: You must have archived redo log files available starting from the time of the first guaranteed restore point.
You run the following command to create a whole database backup: RMAN< backup as copy database spfile plus archivelog delete input; What does the DELETE INPUT clause do?
Which of the following is the default substitution variable for the FORMAT clause of the BACKUP command?
The three possible states of a log file group are INACTIVE, ACTIVE, and CURRENT.
Recorded client request contains the information: SQL text
What is the value for INSTANCE_TYPE in the init.ora file or SPFILE for an ASM instance?
What happens to the rows in FLASHBACK_TRANSACTION_QUERY when part of the transaction is no longer available in the undo tablespace?
is a block of executable code designed to perform a specific task
You can use DELETE_REPLAY_INFO to delete a report in the replay directory.
You want to switch from AMM to ASMM. What is the correct statement you need to run?
Which of the following data dictionary views contains a list of the tables using a Flashback Data Archive?
key tuning parameters for the BACKUP command: ______________ The maximum size of a backup piece per channel.
You have configured backup optimization for your database using CONFIGURE BACKUP OPTIMIZATION ON. For which of the following commands will RMAN not skip a backup if the files are identical?
You have lost all online control files. Specify the correct order for the following tasks: · Restore the control file from backup or run CREATE CONTROLFILE. · Start database recovery and specify the keywords BACKUP CONTROLFILE. · Start up the database in MOUNT mode. · Open the database with RESETLOGS. · Shut down the database.
writes new or changed data blocks (known as dirty blocks) in the buffer cache to the datafiles.
DUPLICATE command: SKIP TABLESPACE Exclude specific tablespaces, except for SYSTEM and UNDO.
Identify the data dictionary view you can use to check for object dependencies between tablespaces.
Which of the following are not RMAN standalone commands?
You can use V$BACKUP_ASYNC_IO to monitor asynchronous RMAN I/O. What column or columns do you use to determine which file is the bottleneck during a backup?
The _____ is an area of memory allocating dynamic sections of itself, privately for one set of connection processes.
At which level does ASM perform mirroring?
When restoring a database to a new host, what is the first command you should run as part of the restoration process?
Which of the following roles should you grant to the recovery catalog owner?
To use guaranteed restore points, you must also enable these prerequisites: You must have a flash recovery area configured.
Structure Analysis Restructure the SQL statements to see if better execution plans are generated
The SQL Tuning Advisor performs all but which of the following analyses?
RMAN makes it easy to make a full copy or a subset of a target database.
DUPLICATE command: OPEN RESTRICTED When the destination database is ready, open it immediately with the RESTRICTED SESSION option.
Under what circumstances would you use the RMAN command UPGRADE CATALOG?
Identify the correct statement regarding duplicate databases created with RMAN.
Backing up the control file for a database running in ARCHIVELOG mode produces the same end result as the method you use in NOARCHIVELOG mode.
Which of the following initialization parameters is not required to configure Flashback Database operations?
backups involve copying the files that constitute the database. These backups are also referred to as file system backups because they involve using operating system file backup commands.
What is the maximum number of database writer processes (DBWn) in an Oracle database instance?
You can use two different methods to authenticate a database administrator: operating system (OS) authentication or password file authentication.
The four steps to create a set of recommendations are as follows: 1. Create a task 2. Define the workload 3. Generate the recommendations 4. Review and implement the recommendations
Which of the following columns is not in the data dictionary view FLASHBACK_TRANSACTION_QUERY?
You want to remap your database links so that they do not reference production database objects. Within which Database Replay step do you perform the remapping?
DUPLICATE command: NOFILENAMECHECK Don’t check for duplicate filenames between the source and destination databases.
What is the difference between an RMAN local script and an RMAN global script?
In the case of a system crash or instance failure, due to a power outage or CPU failure, the ______, performs crash recovery by applying the entries in the online redo log files to the datafiles.
Statistics Analysis Check for stale or missing statistics, and recommend refreshing or creating them
Which of the following initialization parameters is not valid?
Identify the true statement about Flashback Data Archives.
DUPLICATE command: SKIP READONLY Exclude read-only tablespaces from the copy operation.
You have created a virtual private catalog to separate your RMAN administration duties among several DBAs for 20 different databases. Which role must you grant to each virtual catalog owner to allow the person to access existing registered databases?
Identify the true statement about Automatic Memory Management (AMM).
Which is the best method for recovering a tempfile?
Which of the following commands does not back up the current control file?
Other datafiles required to recover the tablespace(s), such as the datafiles for the SYSTEM, UNDO, and TEMP tablespaces
backout options: NONCONFLICT_ONLY Back out changes to nonconflicting rows of the specified transaction only
To use guaranteed restore points, you must also enable these prerequisites: The database must be running in ARCHIVELOG mode
If you are recovering one or more tablespaces or the entire database from backups that have different passwords, you can conveniently specify all the passwords at once with _______
If you do not use a recovery catalog, what data dictionary or dynamic performance views must you query to retrieve RMAN backup information?
backout options: NOCASCADE Back out only the specified transaction, if possible.
Place the following commands in the correct order for restoring a control file from an RMAN autobackup: 1. RECOVER DATABASE 2. ALTER DATABASE OPEN RESETLOGS 3. STARTUP NOMOUNT 4. ALTER DATABASE MOUNT 5. RESTORE CONTROLFILE FROM AUTOBACKUP
Recorded client request contains the information: Transaction information
Which of the following clauses is not valid for the RMAN DUPLICATE command?
Recorded client request contains the information: Bind values
You have just received a pager alert indicating that the flash recovery area is below 3 percent free space. Which view and column can you query for a possible corrective action for this space condition?
The _______is the next level of logical grouping in the database
To create a duplicate database, put the following steps in the correct order: 1. Start the auxiliary instance as NOMOUNT. 2. Allocate auxiliary channels if necessary. 3. Run the RMAN DUPLICATE command. 4. Create a password file for the auxiliary instance. 5. Ensure network connectivity to the auxiliary instance. 6. Open the auxiliary instance. 7. Start the source database in MOUNT or OPEN mode. 8. Create an initialization parameter file for the auxiliary instance. 9. Create backups or copy existing backups and archived log files to a common location accessible by the auxiliary instance.
When using the VERSIONS BETWEEN clause for Flashback Version Query, what can’t you use to restrict the number of rows returned by the query?
Which of the following procedures will run a SQL Access Advisor job against a single SQL statement?
Before running the first replay, you must perform some prerequisite checks:Remap references to other production systems via database links, external .tables, directory objects, URLs, and E-mail notifications.
What is the difference between the V$LOG and V$LOGFILE views?
Performance tuning is the final step in a four-step process: planning, implementing, and monitoring must precede it.
A default installation of the Oracle database using the Oracle Universal Installer with a seed database, or using the Database Creation Assistant, will automatically create a password file.
You set the initialization parameter BACKUP_TAPE_IO_SLAVES to TRUE. What effect does this have on the type of I/O that the server processes perform for RMAN if you are using tape?
The RMAN SWITCH command is equivalent to what SQL command?
contains two major subcaches: the library cache and the data dictionary cache.
Which of the following statement is not true regarding database backups?
backup of a database involves reading a set of database rows and writing them to a file
key tuning parameters for the BACKUP command: ____________ The maximum number of files per backupset.
Your database is running in NOARCHIVELOG mode, and you perform occasional incremental level 1 backups in MOUNT mode. To what point in time can you recover the database if you lose a datafile for the USERS tablespace?
The group of datafiles containing the tablespace(s) to be recovered
When you want to create a duplexed backupset, what is the maximum number of copies of each backup piece you can create with one BACKUP command?
Access Paths Analyze the impact of creating new indexes, materialized views, and partitioning.
Which tablespaces contain critical datafiles that must be recovered when the database is offline?
To enable password encryption for a specific backup, use the ______ command
What is the difference between a full backup and a whole database backup?
Identify the correct statement regarding TSPITR terminology.
When you want to restore backup, either to the same database or to a different database, you must specify the decryption password with ________
The phrase “closed databaserecovery” is somewhat of a misnomer if you consider that the database instance may still be available when one or more datafiles become unavailable.
To use guaranteed restore points, you must also enable these prerequisites: The COMPATIBLE initialization parameter must be 10.2 or higher.
Which of the following methods can you use to retrieve the current System Change Number (SCN)?
What happens to the state of an ASM instance when a connected RDBMS instance fails?
The point in time or SCN to which the tablespace will be recovered.
is an optional area of the SGA. It is used for transactions that interact with more than one database, message buffers for processes performing parallel queries, and RMAN parallel backup and restore operations.
backout options: NOCASCADE_FORCE Back out the specified transactions, ignoring dependent transactions.
SCN-based incomplete recovery works well if your applications save the SCN at critical points in a process flow, or the alert or trace logs indicate a serious error as of a particular SCN.
The database buffer cache holds blocks of data from disk that have been recently read to satisfy a SELECT statement or that contain modified blocks that have been changed or added from a Data Manipulation Language (DML) statement.
It refers to one of the log file status in V$LOG described as the log group has not been used yet.
You have lost the most recent archived redo log files from the recovery catalog database as well as the tablespace containing the RMAN catalog. You can do an incomplete restore of the recovery catalog database to a point in time after the target databases were registered with the recovery catalog. What commands can you use to resynchronize the target database’s metadata and backup information with the recovery catalog database?
Question text The SGA is a group of memory structures for an Oracle instance that are shared by the users of the database instance
Which of the following initialization parameters control Automatic Shared Memory Management (ASSM)?
The SQL Tuning Advisor analyzes one or more SQL statements sequentially, examining statistics, and potentially recommends creating a SQL profile, new indexes, materialized views, or a revised SQL statement.
If you specify the initialization parameter DB_RECOVERY_FILE_DEST, what other initialization parameter must be set?
Before running the first replay, you must perform some prerequisite checks: Ensure that the target system has access to the replay directory
Using Database Replay consists of four main steps: 1. Workload capture 2. Workload preprocessing 3. Workload replay 4. Analysis and reporting
When you run the RMAN RESTORE CONTROLFILE command, where does RMAN put the previous version of the control file?
Choose the four best commands from the following list that you would use to enable ARCHIVELOG mode, and put them in the correct order: 1. STARUP MOUNT 2. SHUTDOWN ABORT 3. ALTER DATABASE ARCHIVELOG; 4. STARTUP FORCE 5. ALTER DATABASE ENABLE ARCHIVELOG; 6. ALTER SYSTEM SWITCH LOGFILE; 7. SHUTDOWN NORMAL 8. ALTER DATABASE OPEN; 9. SHUTDOWN IMMEDIATE
is a group of extents that form a database object that Oracle treats as a unit, such as a table or index.
Identify the true statement regarding incremental and differential backups.
The net service name of your target database is DW and the net service name of your recovery catalog database is RCAT. The environment variable ORACLE_SID has a value of RCAT. Which of the following sets of commands will successfully create a recovery catalog?
Your server’s physical memory is 8GB and no other applications or Oracle instances are running on the server. For a new Oracle instance running a decision support system, what is a good starting point for setting PGA_AGGREGATE_TARGET?
backout options: CASCADE Back out all transactions and their dependent transactions.
Which of the following does not occur when you register a target database with the recovery catalog database using the REGISTER DATABASE command?
Which of the following parameters are required for an ASM instance?
key tuning parameters for the BACKUP command: _________ The maximum number of input files that a channel can have open at a given time.
The group of datafiles containing the tablespace(s) to be recovered.
a database ______ is the smallest unit of storage in Oracle.
SQL Profiling Collect auxiliary statistics on a SQL statement along with partial execution statistics and store them in a SQL Profile.
What is the difference between a critical and a noncritical datafile in a recovery scenario?
If you are interested in recovering only a small set of logically isolated tables to a previous point in time, you may be able to perform recovery using Oracle’s Flashback Table features.
is used by the Oracle JVM (Java Virtual Machine) for all Java code and data within a user session.
To use guaranteed restore points, you must also enable these prerequisites:The database must be running in ARCHIVELOG mode.
Recovery falls into one of two general categories: complete and incomplete.
If you want to use two-way mirroring (normal redundancy) for a new disk group, how many failure groups do you need?
To keep up this site, we need your assistance. A little gift will help us alot.
Donate- The more you give the more you receive.
Related SubjectWeb Application Development
Web Systems Technologies
Web Development
Geographic Information Systems
Computer Information Systems
Relational Database Systems
Introduction to Multimedia
Database Management System
The Supply Chain
Diabetes Education Month
Configuration Management
Medical Office Administration
Hospitality Management
Inventory Production Control
Food Service Management
Emergency and Disaster Management
Business Administration
Strategy Management and Acquisition
Risk Management
Real Estate Appraisal and Property Management
Investment and Portfolio Management
Credit and Collection
Animation Project
Massage Machines
Knowledge Management
Electronics Engineering Technology
Modeling and Simulation
Database Management System 2
Social Media Specialist
Engineering
Quantitative Methods
Numerical Methods
Mobile Application Design and Development 2
Calculus
Algorithms and Complexity
Fundamental Qualitative Characteristics of Accounting Information
Environmental Marketing
Venture Capital
System Analysis Design and Development
Cloud Computing and the Internet of Things
TikTok Ban Debate
Huawei Smartphone Innovation
Social Security Fairness Act
Intrusion Detection System
Operating System Functions
Network Administration
Health Information Technology
Computer Support Technician
Risk Management Applied to Safety Security and Sanitation
Property Management System
Information Assurance and Security 2
Information Management
Information Assurance and Security 3
Information Security and Management
Fundamentals of Investigation and Intelligence
Fundamentals of Database System
Cyber Security: Theories and Practice
Shopee Cashback Voucher
Temu $0 Shipping Fee
Amazon 75% Off Discounts