Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

1z0-083 Exam Dumps - Oracle Database Administration II

Go to page:
Question # 57

Which three methods can be used for heap table data migration after upgrading a database? (Choose three.)

A.

using Database Replay

B.

using SQL Developer

C.

using Oracle Data Pump

D.

using operating system file copy utilities

E.

using Database Upgrade Assistant

F.

using the CREATE TABLE AS SELECT SQL statement

Full Access
Question # 58

Oracle Data Redaction is active on the SCOTT.EMP table. You queried the table twice. SQL> SELECT ENAME, SAL, COMM, MGR, HIREDATE FROM EMP WHERE DEPTNO=30; SQL> SELECT ENAME, SAL, COMM, MGR, HIREDATE FROM EMP WHERE DEPTNO=30; Which is guaranteed to be true concerning the redaction policy?

A.

FULL redaction is active on the SAL column

B.

RANDOM redaction is active on the MGR column

C.

RANDOM redaction is active on the HIREDATE column

D.

PARTIAL redaction is active on the MGR column.

E.

PARTIAL redaction is active of the HIREDATE column.

Full Access
Question # 59

Choose three. Which three are true about corrupted data blocks and their recovery in an Oracle Database?

A.

If a row lock is held by a nonexistent transaction, the block containing the row is media corrupt.

B.

DB_BLOCK_CHECKING=TRUE causes a check sum to be added to each data block to help detect physical or media corruption.

C.

A media corrupt block is one where the block is not formatted correctly.

D.

The ANALYZE TABLE VALIDATE STRUCTURE CASCADE command verifies that each table row has an index entry pointing to it.

E.

If a row lock is held by a nonexistent transaction, the block containing the row is logically corrupt.

F.

DB_LOST_WRITE_PROTECT=TYPICAL causes extra logging overhead on the standby database.

Full Access
Question # 60

choose two Which two statements are true about encrypted backups performed by using RMAN?

A.

Transparent encryption of backups uses an encryption wallet.

B.

Image copy backups can be created by using password encryption.

C.

A password encryption of backups uses the password while creating and restoring backups.

D.

Encrypted backups can only be written to disk.

E.

A database uses the same encryption key for every encrypted backup.

Full Access
Question # 61

Choose two. You want to install Oracle Grid Infrastructure for a Standalone Server using Oracle Universal Installer (OUI). There is no existing Oracle installation on the server. Which two are prerequisites?

A.

an operating system user to own this installation

B.

the Oracle Inventory group oinstall

C.

an operating system account called grid

D.

a group called dba

E.

the installation of Oracle ASMLIB

Full Access
Question # 62

Which three statements are true about the keystore storage framework for transparent data encryption?

A.

It facilitates and helps to enforce keystore backup requirements.

B.

It handles encrypted data without modifying applications.

C.

It enables a keystore to be stored only in a file on a file system.

D.

It enables separation of duties between the database administrator and the security administrator.

E.

It transparently decrypts data for the database users and applications that access this data.

F.

It helps to track encryption keys and implement requirements such as keystore password rotation and master encryption key reset or re-key operations.

Full Access
Question # 63

choose two Which two are true about RMAN image copies?

A.

They can only be written to disk.

B.

They can be encrypted using Transparent Data Encryption (TDE).

C.

They can be used as a level 0 incremental backup.

D.

They can be used as a level 1 incremental backup.

E.

They are the only backup option available for databases in NOARCHIVELOG mode.

Full Access
Question # 64

Choose two. RMAN has just been connected to a target database and the recovery catalog database. In which two cases would an automatic full resynchronization occur between this target database's control file and the RMAN recovery catalog?

A.

when control file metadata for archive log backups or image copies has been overwritten in the target database's control file due to being older than CONTROL_FILE_RECORD_KEEP_TIME

B.

when a new tablespace is added to a registered target database

C.

when a backup of the current control file is created

D.

when control file metadata for data file backups or image copies has been overwritten in the target database's control file due to being older than CONTROL_FILE_RECORD_KEEP_TIME

E.

when the target is first registered

Full Access
Go to page: