Q1. Examine these Data Pump commands to export and import objects from and to the same database.
The dba has not yet created users hr1 and oe1.
$expdp system/manager schemas = hr.oe directory = EXP_DIR dumpfile = export.dat include = table
$ impdpsysten/manager schemas = hr1,oe1 directory = EXP_DIR dumpfile = export.dat remap_schena=hr:hrl, oe:oe1
What will happen when running these commands?
A. expdp will fail because no path has been defined for the dumpfile.
B. expdp will succeed but impdp will fail because the users do not exist.
C. inpdp will create two users called hr1 and oe1 and import all objects to the new schemas.
D. impdp will create two users called hr1 and oe1 and import only the tables owned by hr and oe schemas to ht1 and oe1 schemas, respectively.
Answer: B
110. RMAN is connected to the target database prod1 and an auxiliary instance in nomount state. Examine the command to create a duplicate database:
RMAN> DUPLICATE TARGET DATABASE TO dup1
FROM ACTIVE DATABASE
NOFILENAMECHECK
PASSWORD FILE
SPFILE;
Which two statements are true about the execution of the duplicate command?
A. All archive redo log files are automatically copied to the duplicate database.
B. The duplicate database has the same directory structure as the source database.
C. The duplicate database is created by using the backups created during the execution of
D. the duplicate command.
E. The password file and SPFILE for theduplicate database dup1 are created in their respective default locations.
F. The duplicate database is created without using RMAN backups and prod: is allowed to remain open during duplication.
Q2. You are administering a multitenant container database (CDB) cdb1 that is running in
archivelog mode and contains pluggable databases (PDBs), pdb_i and pdb_2.
While opening pdb_1, you get an error:
SQL> alter pluggable database pdb_1 open;
ORA-011S7:cannotidentify/lockdatafile11-seeDBWRtracefile
ORA-01110:data file 11:'/u01/app/oracle/oradata/cdb1/pcb_1/example01.dbf'
To repair the failure, you open an RMAN session for the target database CDBSROOT. You
execute the following as the first command:
RMAN>REPAIRFAILURE;
Which statement describes the consequence of the command?
A. The command performs the recovery and closes the failure.
B. The command produces an error because RMAN is not connected to the target database pdb_1.
C. The command produces an errorbecause the advise failure command was not executed before the REPAIRFAILUER command.
D. The command executes successfully, performs recovery, and opens PDB_1.
Answer: D
Q3. For which three pieces of information can you use the RMAN list command?
A. stored scripts in the recovery catalog
B. available archived redo log files
C. backup sets and image copies that are obsolete
D. backups of tablespaces
E. backups that are marked obsolete according to the current retention policy
Answer: A,B,D
Reference:http://docs.oracle.com/cd/B19306_01/backup.102/b14192/bkup007.htm
http://docs.oracle.com/cd/B28359_01/backup.111/b28270/rcmreprt.htm#BRADV89585
The primary purpose of the LIST command is to list backup andcopies. For example, you can list:
–Backups and proxy copies of a database, tablespace, datafile, archived redo log, or control file
–Backups that have expired
–Backups restricted by time, path name, device type, tag, or recoverability
–Archived redolog files and disk copies
Q4. Examine the following steps of privilege analysis for checking and revoking excessive, unused privileges granted to users:
1.
Create a policy to capture the privileges used by a user for privilege analysis.
2.
Generate a report with the data captured for a specified privilege capture.
3.Start analyzing the data captured by the policy.
4.Revoke the unused privileges.
5.
Compare the used and unused privileges' lists.
6.
Stop analyzing the data.
Identify the correct sequence of steps.
A. 1, 3, 5, 6, 2, 4
B. 1, 3, 6, 2, 5, 4
C. 1, 3, 2, 5, 6, 4
D. 1, 3, 5, 2, 6, 4
Answer: B
Explanation: 1. Create a policy to capture the privilege used by a user for privilege analysis.
3. Start analyzing the data captured by the policy.
6. Stop analyzing the data.
2. Generate a report with the data captured for a specified privilege capture.
5. Compare the used and unused privileges’ lists.
4. Revoke the unused privileges.
Q5. You want to create a guaranteed restore point for your database by executing the command:
SQL> CREATE RESTORE POINT dbrsp1 GUARANTEE FLASHBACK DATABASE;
Identify two prerequisites for the successful execution of this command.
A. The database must be running in archivelog mode.
B. Flashback Database must be enabled.
C. Fast Recovery Area must be enabled.
D. The recyclebin must be enabled for the database.
E. Undo retention guarantee must be enabled.
F. A database backup must be taken.
Answer: A,C
Reference:http://docs.oracle.com/cd/B19306_01/backup.102/b14192/rpfbdb002.htm
Q6. Which two statements are true about a common user?
A. A common user connected to a pluggable database (PDB) can exercise privileges across other PDBs.
B. A common user with the create user privilege can createother common users, as well as local users.
C. A common user can be granted only a common role.
D. A common user can have a local schema in a PDB.
E. A common user always uses the global temporary tablespace that is defined at the CDB level as the default temporary tablespace.
Answer: C,D
Q7. Examine the command:
$expdp SYSTEM FULL=YES DUMPFILE=dpump_dir1:fulll%U.dmp, dpump_dir2:full2% U.dmp, dpump_dir3:full3%U.djnp FILESIZE=400M PARALLEL=3 JOB_NAME=expfull
Which statement is true about the execution of the command?
A. It fails because the log file parameter is not specified.
B. It fails because no absolutepath is specified for the log file and dump file.
C. It succeeds and exports the full database, simultaneously creating three copies of dump files at three different locations.
D. It succeeds and exports the full database, simultaneously creating three dump files at three different locations, but the total number of dump files can exceed three.
Answer: B
Q8. Your multitenant container database (CDB) cdb1 that is running in archivelog mode contains two pluggable databases (PDBs), pdb2_1 and pdb2_2, both of which are open. RMAN is connected to the target database pdb2_1.
RMAN> BACKUP DATABASE PLUS ARCHIVELOG DELETE INPUT;
Which statement is true about the execution of this command to back up the database?
A. All data files belonging to pdb2_1 are backed up and all archive log files are deleted.
B. All data files belonging to pdb2_1 are backed up along with the archive log files.
C. Only the data files belonging to pdb2_ are backed up.
D. This command gives an error because archive log files can be backed up only when RMAN is connected to the root database.
Answer: B
Q9. Your production database is running in archivelog mode. You use RMAN with a recovery catalog to back up your database to media and the database is uniquely identified in the recovery catalog.
You want to create a test database from the production database and allow the production database to remain open during the duplicate process. You restore the database backups to a new host with the same directory structure as the production database and want to use the recovery catalog for future backups after the database is successfully restored to the new host.
How would you achieve this?
A. by using the RMAN switch command to set the new location for the data files
B. by using the RMAN duplicate command with nofilenamecheck to recover the database to the new host
C. by using the RMAN duplicate command with dbid and set nekname for tablespace to recover the database to the new host
D. by creating a new database in the new host, and then using the RMAN recover command
Answer: D
Q10. Which two are prerequisites for creating a backup-based duplicate database?
A. connecting to the target database and a recovery catalog to execute the duplicate command
B. creating a password file for an auxiliary instance
C. connecting to an auxiliary instance
D. matching the database identifier (DBID) of the source database and the duplicate database
E. creating an SPFILE for the target database
Answer: A,B
Reference:http://docs.oracle.com/cd/E11882_01/backup.112/e10643/rcmsynta020.htm#CH DEDFFH
Q11. Examine the command to back up the ASM metadata:
ASMCMD>md_backup /backup/ASM_backup
In which three situations can you use the backup?
A. when one or more disks in an ASM disk group are lost
B. when the data file on an ASM disk group gets corrupted
C. when one of the disks in a disk group is accidentally unplugged
D. when one or more file directory paths are accidentally deleted from an ASM disk group
E. when all the ASM disk groups for the ASM instance are lost
Answer: B,C,D
Q12. The CATDB12C database contains an Oracle Database 12c catalog schema owned by the rci2c user.
The CATD3H database contains an Oracle Database Ug catalog schema owned by the rch user.
A database with dbid=H2324I is registered in the catdbII catalog. Both the recovery catalog databases are open.
In the CATD3i2c database, you execute the commands:
: r-ar.
RKAN> CONNECT CATALOG rci2c/passI2c@catdbi2c
RKAN> IMPORT CATALOG rcii/pwdcatUQcatdfoil DBI2=142324i;
What is the outcome of the import?
A. It fails because the target database and recovery catalog database are of different versions.
B. It succeeds and all global scripts in the rci: catalog that have the same name as existing global scripts in the RCI2C catalog are automatically renamed.
C. It succeeds but the database is not automatically registered in the rc:2c catalog.
D. It fails because RMAN is not connected to the target database with r3:T=:42324:.
Answer: B
Q13. Examine the initialization parameter that is set in the PFILE:
DB_CREATE_FILE_DEST ='/u01/app/oracle/oradata/'
You execute the following command to create theCDB1. container database (CDB):
SQL>CREATEDATABASECDB1
DEFAULTTABLESPACE users
DEFAULTTEMPORARY TABLESPACEtemp
UNDO TABLESPACEundotbsl
ENABLEPLUGGA3LEDATABASE
SEED
SYSTEMDATAFILESSIZE125M AUTOEXTEND ON NEXT10M MAXSIZEUNLIMITED
SYSAUXDATAFILESSIZE100M;
Which three statements are true?
A. It creates a multitenant container database with a root and a seed pluggable database (PDB) that are opened in read-write and read-only modes, respectively.
B. The files created for both the root and seed databases use Oracle Managed Files (OMF).
C. It creates a multitenant container database with the root and seed databases opened and one PDB mounted.
D. It sets the users tablespace as the default for both the root and seed databases.
E. undotbs1 is used as the undo tablespace for both the root and seed databases.
F. It creates a multitenant container database with the root database opened and the seed database mounted.
Answer: A,B,E
Q14. Which two statements are true about Resource Manager plans for individual pluggable databases (PDB plans) in a multitenant container database (CDB)?
A. If no PDB plan is enabled for a pluggable database, then all sessions for that PDB are treated to an equal degree of the resource share of that PDB.
B. In a PDB plan, subplans may be used with up to eight consumer groups.
C. If a PDB plan is enabled for a pluggable database, then resources are allocated to consumer groups across all PDBs in the CDB.
D. If no PDB plan is enabled for a pluggable database, then the PDB share in the CDB plan is dynamically calculated.
E. If a PDB plan is enabled for a pluggable database, then resources are allocated to consumer groups based on the shares provided to the PDB in the CDB plan and the shares provided to the consumer groups in the PDB plan.
Answer: A,E
Explanation: A: Setting a PDB resource plan is optional. If not specified, all sessions within the PDB are treated equally. In a non-CDB database, workloads within a database are managed with resource plans. In a PDB, workloads are also managed with resource plans,also called PDB resource plans. The functionality is similar except for the following differences: Non-CDB Database Multi-level resource plans Up to 32 consumer groups Subplans PDB Database Single-level resource plans only Up to 8 consumer groups (Not B) No subplans
Q15. Which three statements are true about a job chain?
A. It can contain a nested chain of jobs.
B. It can be used to implement dependency-based scheduling.
C. It cannot invoke the same program or nested chain in multiple steps in the chain.
D. It cannot have more than one dependency.
E. It can be executed using event-based or time-based schedules.
Answer: A,B,E
Reference:http://docs.oracle.com/cd/B28359_01/server.111/b28310/scheduse009.htm#AD
MIN12459
Q16. Examine the RMAN command:
RMAN> SET ENCRYPTION IDENTIFIEDBY <password> ON FOR ALL TABLESPACES; RMAN> BACKUP DATABASE PLUS ARCHIVELOG;
Which type of encryption is used for the backup performed by using this command?
A. password-mode encryption
B. dual-mode encryption
C. transparent encryption
D. default encryption
Answer: A
Reference:http://docs.oracle.com/cd/B28359_01/backup.111/b28270/rcmbckad.htm#CEGE JABH(to make password –encrypted backups)