Q1. Examine the commands executed in the following sequence:
Which statement is true about the above commands?
A. The commands execute successfully.
B. Command 6 produces an error because of circular role grant.
C. Command 5 produces an error because a role cannot be granted to another role.
D. Command 3 produces an error because the MGRROLE role already contains system privileges. The table created by HR remains and HR still has the CREATE TABLE system privilege.
E. The table created by HR remains and HR can grant the CREATE TABLE system privilege to other users.
Answer: B
Q2. Which two statements are true about standard database auditing? (Choose two.)
A. DDL statements can be audited.
B. Statements that refer to standalone procedure can be audited.
C. Operations by the users logged on as SYSDBA cannot be audited.
D. Only one audit record is ever created for a session per audited statement even though it is executed more than once.
Answer: AB
Q3. Automatic Shared Memory Management (ASMM) has been enabled for your database instance.
The initialization parameters for the components that are managed by ASMM are not set. After observing the effects of ASMM, you executed the following command:
SQL> ALTER SYSTEM SET DB_CACHE_SIZE = 100M;
Which statement is true in this scenario?
A. The minimum memory size for the database buffer cache is set to 100 MB.
B. The maximum memory size that can be obtained by the database buffer cache during ASMM is set to 100 MB.
C. The minimum memory size allocated for a server process in the database buffer cache in dedicated mode is set to 100 MB.
D. The maximum memory size from the database buffer cache that can be released for dynamic distribution during ASMM is set to 100 MB.
Answer: A
Q4. Which two operations can be performed on an external table? (Choose two.)
A. Create a view on the table
B. Create an index on the table
C. Create a synonym on the table
D. Add a virtual column to the table
E. Update the table using the UPDATE statement
F. Delete rows in the table using the DELETE command
Answer: AC
Q5. Note the functionalities of various background processes:
1: Perform recovery at instance startup.
2: Free the resources used by a user process when it fails.
3: Cleanup the database buffer cache when a process fails.
4: Dynamically register database services with listeners.
5: Monitor sessions for idle session timeout.
6: Cleanup unused temporary segments.
7: Record the checkpoint information in control file.
Which option has the correct functionalities listed for a background process?
A. Checkpoint (CKPT): 1, 2, 5
B. System Monitor (SMON): 1, 6
C. Process Monitor (PMON): 4, 6, 7
D. Database Writer (DBWR): 1, 3, 4
Answer: B
Q6. View the Exhibit to examine the output for the CROSSCHECK BACKUP command.
Which statement is true about the output of the command?
A. The backup piece is expired as the new backup is available
B. The backup piece is expired because the operating-system file was not found
C. The backup piece is expired because the retention period for the backup has expired
D. The backup piece is expired because the backup set to which it belongs is not complete
Answer: B
Q7. You executed the following command to create a tablespace called SALES_DATA:
SQL> CREATE TABLESPACE sales_data
DATAFILE SIZE 100M
SEGMENT SPACE MANAGEMENT AUTO;
Which two statements are true about the SALES_DATA tablespace? (Choose two)
A. The database automatically determines the extent-sizing policy for the tablespace.
B. The segments are automatically shrunk when the contents are removed from them.
C. The allocation of extents within the tablespace is managed through the dictionary tables.
D. The space utilization description of the data blocks in segments is recorded in bitmap blocks.
E. The space utilization description of the data blocks in segments is managed through free lists.
Answer: AD
Q8. Examine the following output:
Which two statements about the above index are true? (Choose two.)
A. It is ignored by the query optimizer.
B. It is not used while the index is being rebuilt.
C. The index cannot be rebuilt, and has to be re-created.
D. The index is automatically rebuilt when used the next time.
Answer: AB
Q9. You notice that the performance of the database has degraded because of frequent checkpoints.
Which two actions resolve the issue? (Choose two.)
A. Disable automatic checkpoint tuning
B. Check the size of the redo log file size and increase the size if it is small
C. Set the FAST_START_MTTR_TARGET parameter as per the advice given by the MTTR Advisor
D. Decrease the number of redo log members if there are more than one redo log members available in each redo log group
Answer: BC
Q10. You are using flat files as the data source for one of your data warehousing applications. To optimize the application performance, you plan to move the data from the flat files to clustered tables in an Oracle database. While migrating the data, you want to have minimal impact on the database performance and optimize the data load operation. Which method would you use to load data into the Oracle database?
A. Use the external table population.
B. Use the Oracle Data Pump export and import utility.
C. Use the conventional path data load of the SQL*Loader utility.
D. Use the INSERT INTO...SELECT command to load the data.
Answer: C
Q11. In a system, large online transaction processing (OLTP) jobs run during the daytime that require a large database buffer cache. In the night, the system supports batch jobs that require a higher value to be set for the large pool. You must simultaneously configure the memory components to accommodate the peak requirement.
What would you do to automate this configuration for the memory components with change in mode of working?
A. Set the SGA_TARGET initialization parameter to zero.
B. Set the PRE_PAGE_SGA initialization parameter to TRUE.
C. Set the MEMORY_MAX_TARGET initialization parameter to zero.
D. Set the SGA_TARGET initialization parameter to a nonzero value.
Answer: D
Q12. Which three descriptions are correct about the effects of the TRUNCATE command on a table?
(Choose three.)
A. The corresponding indexes for the table are also truncated.
B. Delete triggers on the table are fired during the execution of the TRUNCATE command.
C. The child table is truncated when the TRUNCATE command is applied on the parent table.
D. The highwater mark (HWM) is set to point to the first usable data block in the table segment.
E. No undo or very little undo data is generated during the execution of the TRUNCATE command.
Answer: ADE
Q13. You are managing an Oracle Database 11g database. You want to ensure the recovery of the database to the point of failure. Which configuration will you do to accomplish the task?
A. Multiplex all database files.
B. Configure the Flash Recovery Area.
C. Configure the database instance for ARCHIVELOG mode.
D. Configure the FAST_START_MTTR_TARGET initialization parameter.
Answer: C
Q14. You want to access employee details contained in flat files as part of the EMPLOYEE table. You plan to add a new column to the EMPLOYEE table to achieve this.
Which data types would you use for the new column?
A. CLOB
B. BLOB
C. BFILE
D. LONG RAW
Answer: C
Q15. Examine the values for the following initialization parameters:
FAST_START_MTTR_TARGET=0
LOG_CHECKPOINT_INTERVAL=0
Which two will be the implications of these values in your database? (Choose two.)
A. The SGA advisor will be disabled
B. The MTTR advisor will be disabled
C. Automatic checkpoint tuning will be disabled
D. Checkpoint information will not be written to the alert log file
Answer: BC