+ All Categories
Home > Documents > Ocp Oracle 9I Dba Fundamentals Ii Study Guide

Ocp Oracle 9I Dba Fundamentals Ii Study Guide

Date post: 08-Dec-2016
Category:
Upload: dinhkhue
View: 228 times
Download: 4 times
Share this document with a friend

If you can't read please download the document

Transcript

2881.rar

Ebook/Sybex - OCP Oracle 9i DBA Fundamentals II. Study Guide.pdf2882.rar

Ebook/Sybex - OCP Oracle 9i DBA Fundamentals II. Study Guide.pdfEdgeTests/4064.a4rEdgeTests/4064c1Review Questions1.All of the following are examples of networking architectures except:A.Client/serverB.N-tierC.Single-tierD.Two-tierE.All of the above are examples of network architectures.Answer: EAll of these are examples of network connectivity configurations. Networking can be as simple as a dumb terminal connected directly to a server via a serial connection. It can also be as complex as an n-tier architecture that may involve clients, middleware, the Internet, and database servers. Chapter: 12.You manage one non-Oracle database and several Oracle databases. An application needs to access the non-Oracle databases as if it were part of the Oracle databases. What tool will solve this business problem? Choose the best answer.A.Oracle Advanced SecurityB.Oracle Connection ManagerC.Heterogeneous ServicesD.Oracle NetE.None of the aboveAnswer: COracle Advanced Security would not solve this application problem because it addresses security and not accessibility to non-Oracle databases. Oracle Net would be part of the solution, but another Oracle Network component is necessary. Connection Manager would also not be able to accommodate this requirement on its own. Heterogeneous Services is the correct answer because these services provide cross-platform connectivity to non-Oracle databases.Chapter: 13.Which of the following is true about Oracle Net? A.It is not an option included in the Oracle Enterprise installation.B.It only works on TCP/IP platforms.C.It has an open API.D.It is never installed directly on a client workstation.Answer: COracle Net is included in the Oracle Enterprise installation and works with a variety of protocols. It also has a client and a server component. The only statement that is true about Oracle Net is that it has an open Applications Program Interface (API), which means that third-party software can write to these specifications to interact directly with Oracle Net.Chapter: 14.A DBA wants to centrally administer all of the Oracle network services in a large Oracle9i installation with many network services. Which facility would best provide this functionality at minimal cost?A.Advanced SecurityB.Heterogeneous ServicesC.Oracle Shared ServerD.Oracle Internet DirectoryAnswer: DAdvanced Security, Heterogeneous Services, and Oracle Shared Server would not provide a solution to this business need because none of these address the issue of centrally managing network services. The best solution to the problem is the Oracle Internet Directory because it would facilitate centralized naming.Chapter: 15.What are TCP/IP, DECnet, and LU6.2 all examples of?A.Computer programming languagesB.Oracle Net connection toolsC.Networking protocolsD.Network programming languagesAnswer: CTCP/IP, DECnet, and LU6.2 are all examples of network protocols.Chapter: 16.Which feature of Oracle Net best describes this statement: "Oracle Net supports TCP/IP and LU6.2."?A.GUI tools integrationB.Robust tracing and diagnostic toolsC.Zero configuration on the clientD.Network transport protocol supportAnswer: DOracle Net allows for support of multiple protocols. TCP/IP and LU6.2 are two examples of the protocols that Oracle Net supports.Chapter: 17.What is a solution that Oracle9i employs with Oracle Net that allows connectivity of Java Components such as Enterprise JavaBeans?A.LU6.2B.IPAC.GIOPD.Oracle Internet DirectoryAnswer: CThe General Inter-ORB Protocol is a protocol that supports connectivity of Java components.Chapter: 18.What is the standard that the Oracle Net communications stack is based on? A.OCIB.NPIC.OSID.APIAnswer: CThe Oracle Net communications stack is based on the Open Systems Interconnection (OSI) model. NPI and OCI are parts of the Oracle Net stack and API stands for Applications Program Interface.Chapter: 19."Responsible for moving bits across the wire" describes which of the following OSI layers?A.Application LayerB.Physical LayerC.Data Link LayerD.Network LayerAnswer: BThe Physical Layer is responsible for sending the actual data bits across the network. The other layers are all above this base layer.Chapter: 110.What is the default name of the process that is used to make external calls via Oracle Net?A.externalprocB.externalC.extprocD.procextAnswer: CThe default name of the external procedure process is extproc. lsnrctl is a utility used to manage the listener service. External and procext are not valid responses. Chapter: 111.IIOP is an example of which of the following?A.Tools to use for Oracle NetB.Oracle network integration utilitiesC.Internet network protocolD.Portions of the Oracle Net stackAnswer: CIIOP is an example of an Internet network protocol.Chapter: 112.Connection Manager provides which of the following?A.MultiplexingB.Cross protocol connectivityC.Network access controlD.All of the aboveAnswer: DConnection Manager is a middleware solution that provides for multiplexing of connections, cross protocol connectivity, and network access control. All of the answers describe Connection Manager.Chapter: 113.Which of the following is true about the OCI layer?A.It displays the graphical interface.B.Its datatype conversions are handled.C.It interfaces directly with the protocol adapters.D.It interfaces directly with the TTC layer.E.None of the above.Answer: DThe OCI layer is below the application layer and above the TTC layer. The call interface handles such things as cursor management and SQL execution. This information is passed on to the Two-Task Common layer.Chapter: 114.To which of the choices below does the following statement apply? "Prevents direct communication between a client and applications inside the corporate network."A.Proxy-based firewallsB.Filter-based firewallsC.Both types of firewallsD.Neither type of firewallAnswer: AProxy-based firewalls prevent any direct contact between a client and applications inside a corporate firewall. Filter-based firewalls inspect the packet headers but pass the packet on without modification to the destination application. Proxy-based firewalls act more as a relay between external clients and internal applications.Chapter: 115.When a connection is made via a Java applet, what type of driver is utilized?A.JDBC OCI driverB.JDBC Thin DriverC.ODBC driverD.OCI driver Answer: BThe JDBC Thin Driver would be utilized if a Java applet is used to communicate with an Oracle database through an application server.Chapter: 116.A client workstation connects to a transaction server, which passes on requests to the Oracle database. This is a description of which of the following?A.Single-tier architectureB.Client/server architectureC.N-tier architectureD.None of the aboveAnswer: CWhen you introduce middle tiers into the processing of a transaction, this is known as n-tier architecture.Chapter: 117.Which Oracle Net networking product can be best described as middleware?A.Oracle Internet DirectoryB.Oracle Connection ManagerC.Oracle Advanced NetworkingD.Oracle Shared ServerAnswer: BThe Connection Manager is a middle-tier option that provides multi-protocol interchange, connection concentration, and client access control.Chapter: 118.Which of the following are characteristics of complex networks?A.Multiple protocolsB.Diverse geographic locationsC.Multiple operating systemsD.Multiple hardware platformsE.All of the aboveAnswer: EAll of these are characteristics of complex networks.Chapter: 119.What is the preferred method of centralized naming in an Oracle9i environment?A.Oracle Names ServerB.Oracle Connection ManagerC.Oracle Shared ServerD.Directory Naming with Oracle Internet DirectoryAnswer: DOracle Internet Directory and Directory Naming are displacing the Oracle Names Server as the preferred method of centralized naming.Chapter: 120.Which of the following is an example of the ability to group connections together?A.Protocol InterchangeB.Network Access ControlC.MultiplexingD.Data Integrity checkingE.None of the aboveAnswer: CMultiplexing is a characteristic of the Oracle Connection Manager that allows several incoming requests to be handled and transmitted simultaneously over a single outgoing connection. This is a scalability feature provided by Connection Manager.Chapter: 1

EdgeTests/4064c10Review Questions1.Which of these failure situations best describe a media failure and will require recovery? (Choose all that apply.)A.A deleted data fileB.All control files deletedC.A failed disk controller with access to disks storing data filesD.A disk drive crash on a non-mirrored storage array containing data filesE.All of the aboveAnswer: EAll these failures will require media recovery. Each failure will make a database file unavailable, which will mean that a restoration and recovery is needed.Chapter: 102.In which of these modes must a database be in order for a complete database recovery up to the point of failure to be performed?A.NOARCHIVELOGB.ARCHIVELOGC.ExportD.LOGAnswer: BComplete recovery up to the point of failure can only be performed when the database is in ARCHIVELOG mode.Chapter: 103.What is the type of recovery being performed when transactions are not applied and the database is NOARCHIVELOG mode?A.Complete recoveryB.Partial recoveryC.Incomplete recoveryD.No recoveryAnswer: AComplete recovery in NOARCHIVELOG mode is the correct answer. Even though you are performing a complete recovery, not all transactions are being applied and there can be data missing. This is because the database is not in ARCHIVELOG mode or is not generating archived logs.Chapter: 104.What command is required to relocate files in a user-managed recovery?A.ALTER DATABASE RENAME FILEB.SET NEWNAMEC.ALTER DATABASE SET NEWNAMED.ALTER DATABASE NEWNAME FILEAnswer: AThe ALTER DATABASE RENAME FILE command is used for user-managed backups.Chapter: 105.You make cold database backups including a read-only tablespace and then you make the tablespace read-write. Before the next weekly backup, the tablespace is made read-write and you need to perform recovery on that tablespace. What option must be performed?A.No recovery is needed because the tablespace was backed up read-only.B.No recovery is needed because the tablespace did not have many changes made in it after it was made read-write.C.Recovery is needed because the tablespace was made read-write and the backup was read-only.D.Restoring the read-only tablespace is all that is needed.Answer: CRecovery is needed when a read-only tablespace is made read-write and the backup was taken when the tablespace was read-only. This means that the SCNs in the headers of the data files have changed and will need to be resynchronized with the rest of the database during the recovery process.Chapter: 106.What RMAN command is required to recover a database in NOARCHIVELOG mode?A.RESTOREB.RECOVERC.SET NEWNAMED.SWITCHAnswer: AThe RESTORE command is responsible for the recovery process when the database is in NOARCHIVELOG mode because no recovery is necessary.Chapter: 107.What RMAN command is responsible for applying incremental backups and archived logs?A.RESTOREB.RECOVERC.SET NEWNAMED.SWITCHAnswer: BThe RECOVER command applies incremental backups and archived logs to the recovery process.Chapter: 108.When using RMAN, what mode does the database need to be in to perform a database restore and recovery?A.OpenedB.NomountC.ClosedD.MountAnswer: DThe database should be mounted to perform a database restore and recovery so that the control file can be read and the target database can be connected.Chapter: 109.The SWITCH command is responsible for which of the following activities during the relocation process of database files? A.Renaming the locationB.Updating the control fileC.Moving the physical filesD.Updating the files in the data dictionaryAnswer: BThe SWITCH command is responsible for updating the control file with the new location of the files that have been moved.Chapter: 1010.Which of the following recoveries doesn't require you to recover the database?A.Read-only tablespace backup and tablespace was read-only when recoveredB.Read-only tablespace backup and tablespace was read-write when recoveredC.Read-write tablespace backup and tablespace was read-only when recoveredD.Read-write tablespace backup and tablespace was read-write when recoveredAnswer: AWhen the tablespace is read-only for the backup and read-only during the recovery, no recovery is needed. The data files of the read-only tablespace can be restored because there is no change to the SCN of data file headers.Chapter: 1011.What are the read-only tablespace recovery scenarios? (Choose all that apply.)A.Read-only backup to read-only recoveryB.Read-only backup to read-write recoveryC.Read-write backup to read-write recoveryD.Read-write backup to read-only recoveryAnswer: A, B, DThe scenarios for read-only tablespace recovery are read-only backup to read-only recovery, read-only backup to read-write recovery, and read-write backup to read-only recovery.Chapter: 1012.What type of read-only recovery could the DBA avoid if they are following recommended procedures?A.Read-only backup to read-only recoveryB.Read-only backup to read-write recoveryC.Read-write backup to read-write recoveryD.Read-write backup to read-only recoveryAnswer: DEvery time you make a tablespace read-only, you should conduct a backup shortly thereafter. This eliminates the need to conduct a recovery in the read-write backup to read-only recovery scenario.Chapter: 1013.What is unique about a RMAN image copy? A.It can only back up data files.B.It can only back up to tape.C.It can only back up to disk.D.It cannot back up control files.Answer: CThe RMAN image copy is similar to an OS copy. It can only be performed to disk.Chapter: 1014.Which of the following is a true statement about a backup set?A.It is not stored in a special RMAN format.B.It can contain multiple data files.C.It can contain multiple data files and archived logs.D.It can only contain one data file per backup set.Answer: BA backup set can contain multiple data files within the same backup set, but it cannot contain data files and archived logs in the same backup set. A backup set is stored in a special RMAN format, unlike an image copy.Chapter: 1015.Which RMAN command is responsible for copying files from the backup media?A.RESTOREB.RENAMEC.RECOVERD.SWITCHAnswer: AThe RESTORE command is responsible for copying files from the backup media to the desired location.Chapter: 10

EdgeTests/4064c11Review Questions1.What are the three types of incomplete recovery? (Choose all that apply.)A.Change-basedB.Time-basedC.Stop-basedD.Cancel-basedE.Quit-basedAnswer: A, B, DOptions A, B, and D all describe valid types of incomplete recovery. Options C and E are not incomplete recovery types.Chapter: 112.Which type of incomplete recovery can be performed in NOARCHIVELOG mode?A.Change-basedB.Time-basedC.Stop-basedD.Cancel-basedE.NoneAnswer: EIncomplete recovery cannot be performed in NOARCHIVELOG mode.Chapter: 113.You're a DBA and you have just performed an incomplete recovery. You neglected to perform a backup following the incomplete recovery. After a couple of hours of use, the database fails again due to the loss of a disk that stores some of your data files. What type of incomplete recovery can you perform? A.Change-basedB.Stop-basedC.Time-basedD.Cancel-basedE.NoneAnswer: EIncomplete recovery cannot be performed unless a new backup is taken after the first failure. All backups prior to an incomplete recovery are invalidated for use with any of the existing data files, control files, or redo logs.Chapter: 114.What does Oracle use to uniquely identify each committed transaction in the log files?A.Unique transaction IDB.Static transaction IDC.System change numberD.Serial change numberE.Transaction change numberAnswer: CThe system change number, or SCN, uniquely identifies each committed transaction in the log files.Chapter: 115.What type of recovery is necessary to execute the ALTER DATABASE OPEN RESETLOGS command? (Choose all that apply.)A.Complete recoveryB.Incomplete recoveryC.Cancel-based recoveryD.Time-based recoveryAnswer: B, C, DAll forms of incomplete recovery require the use of the RESETLOGS clause during the ALTER DATABASE OPEN command. All redo logs must be reset to a new sequence number. This invalidates all prior logs to that database.Chapter: 116.What should be performed after the ALTER DATABASE OPEN RESETLOGS command has been applied?A.A recovery of the databaseB.A backup of the databaseC.An import of the databaseD.NothingAnswer: BA backup of the database should be performed if the ALTER DATABASE OPEN RESETLOGS command has been applied.Chapter: 117.What type of incomplete recovery gives the DBA the most control?A.Cancel-basedB.Time-basedC.Change-basedD.All give equal control.Answer: CChange-based recovery gives the DBA the most control of the incomplete recovery process because it allows the stopping point to be specified by the SCN number.Chapter: 118.Which type of incomplete recovery gives the DBA the least control?A.Cancel-basedB.Time-basedC.Change-basedD.All give equal control.Answer: ACancel-based recovery applies the complete archived log before it cancels or stops the recovery process. Therefore, you cannot recover part of the transactions within the archived log as with change-based or time-based recovery.Chapter: 119.What command is used in an RMAN incomplete recovery?A.SET SEQUENCEB.SET UNTIL TIMEC.SET TIMED.SET CHANGEAnswer: BRMAN time-based recovery applies the changes in an archived log up to the point in time reference specified in the SET UNTIL TIME command. Chapter: 1110.A reset command should be performed after what action in the database?A.The database is opened with the RESETLOGS option.B.There is a physical change to the recovery catalog.C.There is a physical change to the target database.D.The database has been completely recovered.Answer: AAnytime the database is opened with the RESETLOGS options, you will need to reset the target database in the recovery catalog.Chapter: 1111.The RMAN change-based recovery has which of the following options? (Choose all that apply.)A.LOGSEQB.SEQLOGC.SEQUENCED.SCNAnswer: A, C, DThere are three RMAN change options: LOGSEQ, SEQUENCE, and SCN. These are used with the SET UNTIL command.Chapter: 1112.If you need to perform a user-managed recovery of a database and you stop the recovery before October 4th at 15:01:00, which command would be used? A.SET UNTIL TIME `OCT 04 2001 15:00:00'B.RECOVER UNTIL TIME `OCT 04 2001 15:00:00'C.RECOVER DATABASE UNTIL TIME `OCT 04 2001 15:00:00'D.RECOVER TABLESPACE UNTIL TIME `OCT 04 2001 15:00:00'Answer: CThe user-managed recovery of a database would be performed with the RECOVER DATABASE UNTIL TIME `OCT 04 2001 15:00:00' command.Chapter: 1113.Which of the following situations will force an incomplete recovery?A.Loss of data fileB.Corrupt data fileC.Loss of an online redo log that has been archivedD.Corrupt current online redo logAnswer: DA corrupt current online redo will force an incomplete recovery because the transactions in that log will not be applied to the recovery process, and the database will need to be stopped before complete recovery by time, change, or cancel commands.Chapter: 1114.Which of the following is a common command that must be performed with all incomplete recoveries and not with complete recoveries?A.RECOVER DATABASEB.RECOVER UNTIL CANCELC.ALTER DATABASE OPEN RESETLOGSD.RESTORE DATABASEAnswer: CThe ALTER DATABASE OPEN RESETLOGS command must be performed with all incomplete recoveries but it does not have to be performed with complete recoveries.Chapter: 1115.What information could be required in order for a change recovery to be performed? (Choose all that apply.)A.SEQUENCE#B.FIRST_CHANGE#C.NEXT_CHANGE#D.Information from V$LOG_HISTORYE.All of the aboveAnswer: EAll options are information from the V$LOG_HISTORY view, which contain the log sequence number and SCN information.Chapter: 11

EdgeTests/4064c12Review Questions1.The RMAN CROSSCHECK command requires the use of which of the following?A.Recovery catalogB.RMAN repository onlyC.Standard channel allocationD.Allocated channel for restoreAnswer: AThe CROSSCHECK command requires the use of a recovery catalog. This is the backup information that must be checked with the recovery catalog to compare to the tape or disk media where the actual backups are stored.Chapter: 122.What type of channel gets allocated for the CROSSCHECK command?A.c1B.t1C.MAINTENANCED.Only sbt_tapeAnswer: CThe channel that gets allocated for CROSSCHECK command is a special channel for maintenance only. c1 and t1 are simply names of the channel devices.Chapter: 123.The CROSSCHECK command can only be performed on what type of backups? (Choose all that apply.)A.Backup pieces onlyB.Backup setsC.CopiesD.Backup sets onlyAnswer: B, CThe CROSSCHECK command can perform both backup sets and copies.Chapter: 124.Which command is used to remove backup sets and copies from the recovery catalog?A.REMOVEB.UNAVAILBLEC.DELETED.MARK UNSUABLEAnswer: BThe DELETE command removes backup sets and copies for the catalog.Chapter: 12 5.What channel type is required for using the DELETE command?A.DELETEB.c1C.MAINTENANCED.t1Answer: AThe allocate channel for delete is necessary when using the DELETE command. c1 and t1 are names of the channel devices.Chapter: 12 6.The CHANGE AVAILABILITY command can be used on what type of backups? (Choose all that apply.)A.CopiesB.User-managed backupsC.Backup setsD.Cataloged backupsAnswer: A, C, DThe CHANGE AVAILABILITY command can be used on backup sets, copies, and cataloged backups that are file copies.Chapter: 127.What is the status of an unavailable backup?A.UnavailableB.DeletedC.UD.UAAnswer: CThe status of unavailable is seen in the list command output and is U.Chapter: 128.The RMAN retention policy is known as what?A.CommandB.ReportC.ListD.CONFIGURATION parameterAnswer: DThe retention policy is a parameter known as a CONFIGURATION parameter. There are many other configuration parameters.Chapter: 12 9.The retention policy can be bypassed by what command?A.EXTENDB.KEEPC.EXEMPTD.UNLIMITEDAnswer: BThe RMAN KEEP command causes backups to bypass or outlast a retention policy.Chapter: 1210.What is the term for recording non-RMAN backup in the RMAN repository?A.OS file copiesB.Backup setsC.Backup piecesD.Catalog backupsAnswer: DA catalog backup is a file that is backed up for an OS or a user-managed backup.Chapter: 12 11.When a backup set is made unavailable, what commands must be used?A.CHANGE and UNAVAILABLEB.SET and UNAVAILABLEC.MAKE and UNAVALIBLED.CHANGE and REMOVEAnswer: AThe command to make a backup set unavailable is CHANGE BACKUPSET UNAVAILBLE.Chapter: 1212.In order to delete a backup from disk, you must perform which of the following commands?A.ALLOCATE CHANNEL FOR REMOVE TYPE DISKB.ALLOCATE CHANNEL FOR DELETE TYPE DISKC.ALLOCATE CHANNEL FOR UNAVAILABLE TYPE DISKD.ALLOCATE CHANNEL TO DELETE TYPE DISKAnswer: BThe ALLOCATE CHANNEL FOR DELETE TYPE DISK command will allocate what is necessary before you can delete a backup within RMAN.Chapter: 1213.Which of the following commands will set the retention policy for 7 days within RMAN?A.CONFIGURE RETENTION POLICY TO RECOVERY PERIOD OF 7 DAYS;B.CONFIGURE RETENTION POLICY TO RECOVERY WINDOW OF 7 DAYS;C.CONFIGURE RETENTION POLICY TO RECOVERY TIME OF 7 DAYS;D.CONFIGURE RETENTION POLICY TO RECOVERY TIMEFRAME OF 7 DAYS;Answer: BThe correct command is CONFIGURE RETENTION POLICY TO RECOVERY WINDOW OF 7 DAYS. The other options are invalid syntax for the configuration parameters.Chapter: 1214.Which of the following commands will display the retention policy?A.show retention planB.display allC.show allD.display retention planAnswer: CThe show all command will display all configuration parameters in RMAN. One of these configuration parameters is the retention policy.Chapter: 1215.Which of the following commands will allow you to identify if the availability of a data file copy has changed?A.LIST COPY OF DATABASE AVAILABILITYB.LIST COPY OF DATABASEC.LIST COPY OF AVAILABILITYD.LIST BACKUP OF AVAILBILITYAnswer: BThe LIST COPY OF DATABASE command will show status of A for available and U for unavailable.Chapter: 12

EdgeTests/4064c13Review Questions1.The RMAN utility does not require the use of which of the following?A.Recovery catalogB.Server sessionsC.Allocated channel for backupD.Allocated channel for restoreAnswer: AThe recovery catalog is optional. The recovery catalog is used to store information about the backup and recovery process, in much the same way as the data dictionary stores information about the database. The other options are all required elements for RMAN to function normally.Chapter: 132.What are the features supported by the recovery catalog? (Choose all that apply.)A.Backup databases, tablespaces, data files, control files, and archived logsB.Compressed backupsC.Scripting capabilitiesD.Tests that determine whether backups can be restoredE.All of the aboveAnswer: EAll answers are capabilities of the RMAN utility.Chapter: 133.Where is the best place to store the database housing the recovery catalog?A.On the same server but in a different filesystem than the target database being backed up by the recovery catalogB.On the same server and in the same filesystem as the target database that is being backed up by the recovery catalogC.On a different server than the target databaseD.None of the aboveAnswer: CThe recovery catalog database should be on a different server than the target database to eliminate the potential of a failure on one server affecting the backup and restore capabilities of RMAN.Chapter: 134.Which privileges are required for the Recovery Manager catalog user account? (Choose all that apply.)A.DBA privilegeB.Connect privilegeC.Resource privilegeD.RECOVERY_CATALOG_OWNER privilegeAnswer: B, C, DThe DBA privilege is not required from the recovery catalog user account. This user must be able to connect to the database, create objects within the database, and have the RECOVERY_CATALOG_OWNER privilege.Chapter: 135.What command can be performed only once on a target database?A.CHANGE AVAILABILITY OF BACKUPSB.DELETE BACKUPSC.REGISTER THE DATABASED.RESYNCHRONIZING THE DATABASEAnswer: CRegistering the database can be performed only once for each database unless the database is unregistered.Chapter: 136.Which of the following statements best describes the target database?A.Any database designated for backup by RMANB.The database that stores the recovery catalogC.A database not targeted to be backed up by RMAND.A special repository database for the RMAN utilityAnswer: AThe target database is any database that is targeted for backup by the RMAN utility.Chapter: 137.What type of backups can be stored in the recovery catalog of RMAN? (Choose all that apply.)A.Non-RMAN backups based on OS commandsB.Full database backupsC.Tablespace backupsD.Control file backupsE.All of the aboveAnswer: ERMAN can catalog non-RMAN backups based on OS commands as well as full database backups, tablespace backups, and control file backups.Chapter: 138.Which of the following are instruments used to get information from the recovery catalog? (Choose all that apply.)A.REPORT commandB.A query in SQL*PlusC.LIST commandD.RETRIEVAL commandAnswer: A, B, CThe RMAN utility provides the REPORT and LIST commands to generate outputs from the recovery catalog. SQL*Plus can also be used to manually query the recovery catalog in certain instances.Chapter: 139.What must you do prior to running the REPORT or LIST commands?A.Determine the log file.B.Spool the output.C.Connect to the target.D.Connect to the target and recovery catalog.Answer: DBefore running any REPORT or LIST command, you must be connected to the target database and recovery catalog.Chapter: 1310.What is the main difference between reports and lists?A.Lists have more output than reports.B.Reports have more output than lists.C.Reports provide more detailed information than lists.D.Lists provide more detailed information than reports.Answer: CThe REPORT command provides more detailed information than the LIST command. The REPORT command is used to answer more "what if" or "what needs to be done" type questions than the LIST command.Chapter: 1311.What command stores scripts in the recovery catalog?A.CREATE SCRIPT B.STORE SCRIPT C.CREATE OR REPLACE D.Scripts cannot be stored in the recovery catalog.Answer: AThe CREATE SCRIPT command stores the associated script in the recovery catalog. This script can then be run at a later date.Chapter: 1312.What are the new Oracle9i list commands? (Choose all that apply.)A.LIST BACKUP BY FILEB.LIST BACKUP SETC.LIST BACKUP SUMMARY FILED.LIST BACKUP SUMMARYAnswer: A, DThe LIST BACKUP OF FILE and LIST BACKUP SUMMARY commands are both new list commands in Oracle9i.Chapter: 1313.If you add a new data file to a database, what should you do to the incarnation of that database in the recovery catalog? A.Execute a reset.B.Execute a resync.C.Execute a register.D.Execute a report.Answer: BA resync command should be run if the physical components of the target database change.Chapter: 1314.The code below is intended to launch a stored RMAN script. Find the line with the incorrect syntax.run { executeprogram complete_bac; }A.The first lineB.The second lineC.The third lineD.The fourth lineAnswer: CThe incorrect syntax is program. The correct syntax should be as follows:run { executescript complete_bac; }Chapter: 1315.The code below is intended to create a script that can be used to copy archived logs. Find the line with the incorrect syntax.Create scriptArch_bac_up {Allocate channel cl type disk;Backup archives all;}A.The first lineB.The second lineC.The third lineD.The fourth lineAnswer: DThe incorrect syntax is BACKUP ARCHIVES ALL;}. This should be BACKUP ARCHIVELOG ALL;}.Chapter: 13

EdgeTests/4064c14Review Questions1.What type of database utility performs a logical backup?A.ExportB.ImportC.Cold backupD.Hot backupAnswer: AThe Export utility performs the logical backup of the Oracle database.Chapter: 142.What type of database utility reads the dump file into the database?A.ExportB.ImportC.SQL*LoaderD.FormsAnswer: BThe Import utility is responsible for reading in the dump file.Chapter: 143.What is the default dump file named?A.export.dmpB.expdat.dmpC.expdata.dmpD.export_data.dmpAnswer: BThe expdat.dmp is the default dump filename.Chapter: 144.Review the following export command and determine the incorrect syntax.exp users=ar/trar2 conventional=falsetables=ra_customer_deductionsA.The first line is incorrect.B.The second line is incorrect.C.The third line is incorrect.D.The fourth line is incorrect.Answer: CConventional path export is the default. The line conventional=false is invalid syntax.Chapter: 145.What types of backup are required to use TSPITR? (Choose all that apply.)A.LogicalB.PhysicalC.ImportD.ExportAnswer: A, B, DBoth logical and physical database backups are performed with the TSPITR, and exports are logical backups. Import is not a backup; it is a recovery utility in this context.Chapter: 146.What is the name of the parameter that reads the parameter file?A.PARAMETER FILEB.PARFILEC.PARAFILED.PAR-FILEAnswer: BThe PARFILE parameter is the name of the parameter that specifies the parameter file.Chapter: 147.What is the name of the other database called when you are using TSPITR?A.Secondary databaseB.Recovery databaseC.Cloned databaseD.Backup databaseAnswer: CThe cloned database is the other database that is recovered when you are using TSPITR.Chapter: 148.What is the name of the parameter that is used specifically for TSPITR?A.DATABASEB.TRANSPORT_TABLESPACEC.CONTROLD.COMPRESSAnswer: BThe TRANSPORT_TABLESPACE parameter is used specifically for TSPITR. It is used to identify the tablespace that needs to be recovered.Chapter: 149.Which export type is the fastest?A.CompleteB.CumulativeC.Direct-pathD.Conventional-pathAnswer: CA direct-path export is the fastest. Complete and cumulative exports are data-volume dependent.Chapter: 1410.What is the complex recovery method that uses the Export and Import utilities designed for large database objects?A.Full ExportB.Full=YC.TPSTIRD.TSPITRAnswer: DThe tablespace point-in-time recovery (TSPITR) is an Export and Import recovery method that is designed for large database objects.Chapter: 1411.What is the export command that can be used in conjunction with database reorganization to improve performance?A.COMPRESS_EXTENT=YB.COMPRESS_EXT=YC.COMPRESS=YD.COMPEXT=YAnswer: CThe COMPRESS=Y command can be used to compress extents in a table when a table or database is reorganized for performance reasons.Chapter: 1412.Which of the following is a true statement about the Export and Import utilities?A.They cannot be used to upgrade a database.B.They can be used to upgrade a database.C.Only the Export utility can be used to upgrade the database.D.Only the Import utility can be used to upgrade the database.Answer: BWhen used together, both the Export and Import utilities can be used to upgrade databases to new versions.Chapter: 1413.Which of the following is a correct statement about how you would use the Export utility on a table without using any export keyword options?A.The Export utility loads data into a database.B.The Import utility extracts data from a database.C.The Export utility performs a full SELECT of a table and then dumps the data into a binary file.D.The Export utility performs a full SELECT of a table and then dumps the data into an ASCII file.Answer: CThe Export utility performs a full SELECT of a table and then dumps it to the export.dmp file, which is in binary format.Chapter: 1414.Which of the following export keyword options selects a subset of a table?A.SUBSETB.SELECTC.WHERED.QUERYAnswer: DThe QUERY keyword makes the Export utility perform a filtered SELECT of a table so that the complete table is not exported.Chapter: 1415.Which of the following export keyword options performs a complete database export?A.ALL=YB.COMPLETE=YC.TOTAL=YD.FULL=YAnswer: DThe FULL=Y keyword option causes the export to perform a complete database export including all objects and tablespaces.Chapter: 14

EdgeTests/4064c15Review Questions1.What insert statement will bypass the SQL buffer cache so that data may be loaded?A.SQL*Loader direct-path loadB.SQL*Loader conventional loadC.Direct-load insertD.SQL*Loader external tableAnswer: CThe direct-load insert statement will bypass the buffer cache while it performs an insert. SQL*Loader direct-path load will also bypass the buffer cache, but it is not an insert statement.Chapter: 152.Which of the following methods causes the target table to be in parallel mode when it is using the direct-path insert statement? (Choose all that apply.)A.Using the ALTER TABLE commandB.Using multiple direct-path load SQL*Loader statementsC.Using hints with the PARALLEL clauseD.Using one SQL*Loader direct-path load statementAnswer: A, CBoth the ALTER TABLE command and hints used with the PARALLEL clause will allow the table to be placed in parallel.Chapter: 153.Which of the following is the SQL*Loader file structure that is responsible for formatting the data to be loaded?A.Bad fileB.Format fileC.Control fileD.Discard fileAnswer: CThe control file is responsible for formatting the data to be loaded.Chapter: 154.Which log file contains cumulative information about the number of records loaded in a SQL*Loader run?A.Bad logB.General logC.Discard logD.Control fileAnswer: BThe general log contains cumulative information about the number of records that were loaded.Chapter: 155.What log file contains records that were rejected by the database?A.Bad logB.General logC.Discard logD.Control fileAnswer: AThe bad log contains records that were rejected by the database.Chapter: 156.What log file contains records that were filtered out of the load due to clauses in the control file?A.Bad logB.General logC.Discard logD.Control fileAnswer: CThe discard log contains data that was filtered out of the load as designed in the control file.Chapter: 157.Which file contains the data that gets loaded in the SQL*Loader run? (Choose all that apply.)A.Input fileB.Control fileC.Data fileD.Log fileAnswer: A, B, CThe input file, or data file, and the control file can contain data that is loaded in the SQL*Loader run.Chapter: 158.Which SQL*Loader load keyword deletes data in table before loading?A.APPENDB.DELETEC.REPLACED.INSERTAnswer: CThe REPLACE command deletes the current data in a table first before it inserts new data.Chapter: 159.What SQL*Loader technique allows parallel processing?A.Running multiple sqlldr command lines on the same table with different input filesB.Using the PARALLEL hintC.Using the ALTER TABLE command on the target tableD.Using the PARALLEL command on the sqlldr command lineAnswer: ARunning multiple sqlldr command line entries with multiple data files will cause parallel loads.Chapter: 1510.What SQL*Loader method cannot load into clustered tables?A.Conventional loadB.Direct-path loadC.Using the ALTER TABLE command on the target tableD.Parallel load hintsAnswer: BThe direct-path load cannot load data into a clustered table.Chapter: 1511.Which SQL*Loader method uses bind arrays?A.Direct-path loadB.Conventional loadC.Direct-path insertD.Parallel load hintsAnswer: BThe conventional load uses bind arrays to temporarily store the data before inserting into the database.Chapter: 1512.Which SQL*Loader method cannot have active transactions during the load process?A.Conventional loadB.Direct-path loadC.Data stored in the input file onlyD.Data stored in the control file onlyAnswer: BDirect-path load cannot have active transactions taking place on the table you are loading. This is because there is a lock placed on the table and the data is directly loaded into blocks.Chapter: 1513.What must you do to enable direct-path insert? (Choose all that apply.)A.Use the ALTER SESSION ENABLE PARALLEL DML; command.B.Use an INDEX hint.C.Use a PARALLEL hint.D.Run multiple direct-path inserts at the same time.Answer: A, CTo enable direct-path insert, the session you are performing parallel DML on must have PARALLEL DML enabled. Secondly, you must either use a PARALLEL hint or place the table being inserted into parallel.Chapter: 1514.Which of the following is a true statement regarding SQL functions and SQL*Loader?A.SQL functions cannot be used in a conventional load.B.SQL functions can be used in a direct-path load.C.SQL functions cannot be used in a direct-path load.D.SQL functions can be used in both conventional and direct-path loads.Answer: CNo SQL functions can be used in the control file when you are using a direct-path load. This is because a direct-path load bypasses standard SQL statement processing for performance reasons.Chapter: 1515.Which of the following is a true statement regarding active transactions or changes when you are using SQL*Loader?A.No active transactions or changes can be performed on a conventionally loaded table.B.No active transactions or changes can be performed on a direct-path loaded table.C.Active transactions or changes can be performed on a direct-path loaded table.D.Active transactions or changes cannot be performed on a direct-path loaded or a conventionally loaded table.Answer: BActive transactions or changes cannot be performed on a direct-path loaded table. Users are prevented from making changes.Chapter: 15

EdgeTests/4064c16Assessment Test

1.What type of incomplete recovery is based on each transaction?A.Time-basedB.Change-basedC.Cancel-basedD.Stop-basedAnswer: BChange-based recovery is based upon a unique SCN number that each transaction uniquely contains. See Chapter 11 for more information.Chapter: 1012.What statement best describes the recovery catalog?A.A mandatory feature of RMANB.An optional feature of RMAN that stores metadata about the backupsC.A mandatory feature of RMAN that stores metadata about the backupsD.An optional feature of RMANAnswer: BThe recovery catalog is an optional feature of RMAN. Though Oracle recommends that you use it, it isn't required. One major benefit of the recovery catalog is that it stores metadata about backups in a database that can be reported or queried. See Chapter 8 for more information.Chapter: 1013.What files can store load data when SQL*Loader is being used? (Choose all that apply.)A.General log filesB.Input filesC.Control filesD.Discard log filesAnswer: CThe data file or control file both can be used to store load data. The control file should only store small data loads for one-time use or test purposes. See Chapter 15 for more information.Chapter: 1014.Which of the following are physical structures of the Oracle database? (Choose all that apply.)A.Control filesB.Input filesC.Parameter filesD.Alert logsAnswer: A, CControl files and parameter files make up two of the physical structures of the Oracle database. Data files and redo logs make up the other physical structures. See Chapter 6 for more information.Chapter: 1015.Which of the following RMAN commands would you need to execute in order to store information in the recovery catalog and the actual data files that were backed up by OS commands?A.BACKUP DATAFILEB.BACKUPC.DATAFILE COPYD.CATALOG DATAFILECOPYAnswer: DThe command CATALOG DATAFILECOPY backs up data files that were copied or backed up by OS commands in user-managed backups. See Chapter 12 for more information.Chapter: 1016.Which of the following is the correct way(s) to perform control file backups? (Choose all that apply.)A.Alter the database backup control file to TRACE.B.Alter the database backup control file to `'.C.Alter the system backup control file to TRACE.D.Alter the system backup control file to `'.Answer: A, BThe control file can be backed up in two ways: in ASCII format, it can be backed up to a TRACE file, or in binary format, it can be backed up to a new location. The ALTER DATABASE BACKUP CONTROLFILE TO TRACE and ALTER DATABASE BACKUP CONTROLFILE TO `' commands perform backups of the control file to ASCII format and to binary format. See Chapter 9 for more information.Chapter: 1017.Which of these are roles of Oracle Net in the Oracle network architecture? (Choose all that apply.)A.Handles communications between the client and serverB.Handles server-to-server communicationsC.Used to establish an initial connection to an Oracle serverD.Acts as a messenger, which passes requests between clients and serversE.All of the aboveAnswer: EOracle Net is responsible for handling client-to-server and server-to-server communications in an Oracle environment. It manages the flow of information in the Oracle network infrastructure. Oracle Net is used to establish the initial connection to the Oracle server and then it acts as the messenger, which passes requests from the client back to the server or between two Oracle servers. See Chapter 1 for more information.Chapter: 1018.What are the roles that you must grant the RMAN schema owner of the recovery catalog? (Choose all that apply.)A.dbaB.connectC.resourceD.recovery_catalog_ownerAnswer: B, C, DThe roles that are required for the RMAN schema that owns the recovery catalog are connect, resource, and recovery_catalog_owner. See Chapter 13 for more information.Chapter: 1019.Which of the following are advantages of Shared Server? (Choose all that apply.)A.Fewer server processesB.Manages more connections with the same or less memoryC.Better client response timeD.All of the aboveAnswer: A, BOracle Shared Server allows Oracle servers to manage a greater number of connections utilizing the same amount or less memory and process resources. If an Oracle server is constrained by these resources, Oracle Shared Server can be an alternative configuration that can provide relief. See Chapter 4 for more information.Chapter: 10110.What type of failure requires an incomplete recovery? (Choose all that apply.)A.Any media failure involving the system tablespaceB.The loss of inactive or active online redo logsC.The loss of an archived log since the last current backupD.The loss of a control fileAnswer: B, CThe loss of inactive or active online redo logs will require an incomplete recovery because the backup will not have all the required logs to apply to the database. The loss of an archived log since the last current backup will also not allow a complete recovery for the same reason as a missing redo log. See Chapter 11 for more information.Chapter: 10111.Which of the following is true about dispatchers?A.They listen for client connection requests.B.They take the place of dedicated servers.C.They place client requests on a response queue.D.All of the above.Answer: BDispatchers take the place of the dedicated server processes. The dispatchers are responsible for responding to client requests by placing the requests on a request queue (not a response queue) in the SGA; they also retrieve completed requests that were placed on a response queue by the shared server and pass them back to the client. See Chapter 4 for more information.Chapter: 10112.Which command-line option of the Export utility groups commands together in a common file?A.config.oraB.PARFILEC.ifileD.commandfileAnswer: BThe PARFILE command option allows you to group export commands together in a file so that you don't have to interactively respond to the prompts when you are running the export. This also allows you to script exports more efficiently. See Chapter 14 for more information.Chapter: 10113.What type of incomplete recovery requires the DBA to manually stop the recovery at a certain point?A.Cancel-basedB.Time-basedC.Change-basedD.Sequence-basedAnswer: ACancel-based recovery requires the DBA to manually cancel the recovery process at the command line. See Chapter 11 for more information.Chapter: 10114.What is the new parameter file that has been introduced in Oracle9i?A.spfile.oraB.init.ora C.config.oraD.ifile.oraAnswer: AThe spfile.ora is new for Oracle9i. This is the binary initialization file that is the default when Oracle is started. This file contains persistent parameters. The init.ora file is searched only if there isn't a spfile.ora initialization file. See Chapter 6 for more information.Chapter: 10115.What utility can you use to verify corruption of both backup and online data files?A.DBMS_REPAIRB.DBVERIFYC.ANALYZED.DB_CHECKSUMAnswer: BThe DBVERIFY utility can verify both online data files and copies of online data files. See Chapter 9 for more information.Chapter: 10116.When you open a database with the ALTER DATABASE OPEN RESETLOGS, you need to perform which command in RMAN to the incarnation of the database?A.REGISTERB.UNREGISTERC.RESETD.UNSETAnswer: CThe RESET command must be used on the incarnation of the database within the recovery catalog if the target database has been opened with ALTER DATABASE OPEN RESETLOGS. See Chapter 13 for more information.Chapter: 10117.What is the primary configuration file of the localnaming option?A.sqlnet.oraB.tnsnames.oraC.listener.oraD.names.oraAnswer: BThe main characteristic of the localnaming method is that it uses the tnsnames.ora file to resolve service names. In fact, this method is sometimes called the tnsnames.ora method. The file contains information about the service name and connect descriptors for each service name that a client can contact. See Chapter 3 for more information.Chapter: 10118.What is the name of the manual allocation channel method that utilizes tape?A.ALLOCATE CHANNEL C1 TYPE `SBT_TAPE'B.ALLOCATE CHANNEL C1 TYPE DLT_TAPEC.CONFIGURE DEFAULT DEVICE TYPE SBT_TAPED.CONFIGURE DEFAULT DEVICE TYPE TAPEAnswer: ACONFIGURE DEFAULT DEVICE settings configure the allocation channel automatically. ALLOCATE CHANNEL TYPE methods are used to manually configure channels. The type `SBT_TAPE' configures the manual channel for tape. See Chapter 8 for more information.Chapter: 10119.What prerequisites are required to implement direct-load insert? (Choose all that apply.)A.Parallel DML must be enabled.B.Initialization parameters must be configured for parallel query.C.The SQL*Loader utility must be configured for parallel processing.D.There must be hints in DML statements.E.Multiple SQL*Loader control files and data files must be present.Answer: A, B, DThe database must be configured for parallel query or it must have the appropriate initialization parameters, such as PARALLEL_MIN_SERVERS and PARALLEL_MAX_SERVERS, set up. The session must be enabled to run parallel DML. And the appropriate hints must be entered in the DML statements to allow direct-load insert. See Chapter 15 for more information.Chapter: 10120.What does Dynamic Registration do?A.Allows a listener to automatically register with an Oracle serverB.Allows an Oracle server to automatically register with a listenerC.Allows clients to automatically register with an Oracle listenerD.None of the aboveAnswer: BDynamic Registration allows an Oracle server to automatically register with a listener. This reduces the amount of maintenance work the DBA has to do to maintain the listener.ora file in a localnaming environment. See Chapter 2 for more information.Chapter: 10121.An open backup can be performed when which of the following is true about the database? (Choose all that apply.)A.It is in NOARCHIVELOG mode.B.It is in ARCHIVELOG mode.C.When tablespaces are placed in BACKUP mode with the ALTER TABLESPACE BEGIN BACKUP command.D.The database is shut down.Answer: B, CAn open backup is also called a hot backup and it can be performed when the database is in ARCHIVELOG mode by executing the ALTER TABLESPACE BEGIN BACKUP command. See Chapter 9 for more information.Chapter: 10122.Which of the following backup and recovery parameters utilize their operations within the LARGE_POOL memory of the SGA? (Choose all that apply.)A.DBWR_IO_SLAVESB.ASYNC_IO_SLAVESC.BACKUP_TAPE_IO_SLAVESD.SYNCH_IO_SLAVESAnswer: A, CThe DBWR_IO_SLAVES and BACKUP_TAPE_IO_SLAVES are initialization parameters that can improve the performance of backup and recovery operations. These parameters use the LARGE_POOL memory to perform their operations. See Chapter 6 for more information.Chapter: 10123.Which statement best describes incomplete recovery?A.No data whatsoever is lost.B.Data is lost after the point of failure.C.Some data is lost because the recovery is prior to the point failure.D.Some data is lost because the data file recovery is incomplete.Answer: CThe statement that accurately describes incomplete recovery is "Some data is lost because the recovery is prior to the point of failure." See Chapter 11 for more information.Chapter: 10124.Which of the following best describes network access control?A.It allows clients and servers using different protocols to communicate.B.It sets up rules to allow or disallow connections to Oracle servers.C.It funnels client connections into a single outgoing connection to the Oracle server.D.None of the above.Answer: BClient access control is a feature of Connection Manager that makes Connection Manager function in a manner similar to that of a firewall. Connections can be accepted or rejected on the basis of the client location, the destination server, and the Oracle service that the client is attempting to connect to. This gives the DBA flexibility they need to configure access control to the Oracle environment. See Chapter 1 for more information.Chapter: 10125.Resynching the recovery catalog should be performed when you do what to the target database?A.Undo a database resynch.B.Remove a database reset.C.Undo the most recent database resynch only.D.Make a physical change to the target database.Answer: DThe resynch command should be used when you make physical changes to the target database, such as adding new data files or control files. See Chapter 13 for more information.Chapter: 10126.Which commands move data files in the RMAN recovery process? (Choose all that apply.)A.SET NEWFILEB.SET RENAMEC.SET NEWNAMED.SWITCHAnswer: C, DThe SET NEWNAME and SWITCH commands work together to restore RMAN backups to new locations. See Chapter 10 for more information.Chapter: 10127.The main difference between logging and tracing isA.Tracing cannot be disabled.B.Logging cannot be disabled.C.Logging records only significant events.D.Tracing records only significant events.Answer: CLogging records significant events, such as starting and stopping the listener, along with certain kinds of network errors. Tracing records all events that occur, even when an error does not happen. The trace file provides a great deal of information that logs do not. See Chapter 2 for more information.Chapter: 10128.Which of the following parameters ensures the number of successful archive destinations before the redo information can be written over?A.LOG_ARCHIVE_SUCCESSB.LOG_ARCHIVE_MIN_SUCCEED_DESTC.LOG_MIN_SUCCESSD.LOG_ARCHIVE_SUCCEEDAnswer: BThe LOG_ARCHIVE_MIN_SUCCEED_DEST parameter determines the number of successful archive destinations required before the redo logs can be overwritten. See Chapter 7 for more information.Chapter: 10129.What is the location of the trace file generated when the Oracle PMON process encounters an error?A.USER_DUMP_DESTB.BACKGROUND_DUMP_DESTC.CORE_DUMP_DESTD.ARCH_DUMP_DESTAnswer: BThe Oracle PMON process is a background process. All trace files generated from the background process go into the BACKGROUND_DUMP_DEST location. See Chapter 12 for more information.Chapter: 10130.Which of the following parameters is used to improve the performance of instance recovery operations?A.FAST_START_MTTR_TARGETB.FAST_STARTC.CHECKPOINT_INTERVALD.CHECKPOINTAnswer: AThe FAST_START_MTTR_TARGET parameter determines the number of seconds that instance recovery will require. This parameter is an integer value between 0 and 3600. See Chapter 6 for more information.Chapter: 10131.What utility can be used to check to see if a client can see an Oracle listener?A.netstatB.namesctlC.tnspingD.lsnrctlE.None of the aboveAnswer: CThe tnsping utility can be used to check to see if a client can contact a listener. The command format is tnsping . For example, tnsping DBA 3 would attempt to contact the DBA database three times. This utility also provides information on how long it takes to contact the listener. See Chapter 3 for more information.Chapter: 10132.Which of the following commands generate reports from the recovery catalog or target database control file? (Choose all that apply.)A.REPORTB.LISTC.SELECTD.PUTLINEAnswer: A, BThe REPORT and LIST commands generate report outputs in the RMAN utility. See Chapter 13 for more information.Chapter: 10133.Which of the following Oracle processes is not mandatory at startup?A.SMONB.PMONC.DBWRD.ARCHAnswer: DThe ARCH or ARCn process is not a mandatory process. Archive logging can be enabled and disabled. See Chapter 6 for more information.Chapter: 10134.Which of the following is a major difference between the RESTORE command in earlier versions of RMAN and in Oracle9i RMAN?A.Nothing has changed.B.The decision about whether files need to be restored or not.C.Only backup sets are restored.D.Only image copies are restored.Answer: BIn Oracle9i, the RESTORE command now makes the decision of whether or not files need to be restored. In earlier versions of RMAN, files were restored upon request even if it was unnecessary. See Chapter 10 for more information.Chapter: 10135.Which of the following is true about shared servers?A.They talk to dispatchers.B.They execute client requests.C.They talk directly to the listener.D.They talk directly to a client process.Answer: BThe shared server processes are responsible for executing the client requests. They retrieve the requests from a request queue and place the completed request in the appropriate dispatcher response queue. See Chapter 4 for more information.Chapter: 101

EdgeTests/4064c1736.Which init.ora parameter is responsible for setting multiple remote archive locations?A.LOG_ARCHIVE_DUPLEX_DESTB.LOG_ARCHIVE_DEST_nC.LOG_DEST_ARCHIVE_nD.LOG_ARCHIVE_DEST_DUPLEXAnswer: BLOG_ARCHIVE_DEST_n (n being integer value) is responsible for multiple remote archive locations. LOG_ARCHIVE_DUPLEX_DEST is also capable of multiple destinations but not ones that are remote. See Chapter 7 for more information.Chapter: 10137.Which of these is not a layer of the Oracle Net Stack?A.Two-Task CommonB.Oracle Net FoundationC.Oracle Call InterfaceD.ApplicationE.All of these are layers in the Oracle Net StackAnswer: EAll of these are part of the Oracle Net Stack. The stack consists of Application, OCI, Two-Task Common, Oracle Net Foundation, Oracle Protocol Adapters, and Network Protocol. See Chapter 1 for more information.Chapter: 10138.What special activity must be performed to execute a CROSSCHECK command?A.ALLOCATE CHANNELB.ALLOCATE CHANNEL FOR MAINTENANCE TYPE DISKC.AUTOMATIC CHANNEL ALLOCATIOND.ALLOCATE CHANNEL FOR UPGRADE TYPE DISKAnswer: BThe CROSSCHECK command requires the use of the ALLOCATE CHANNEL FOR MAINTENANCE TYPE DISK or SBT_TAPE to perform comparison activities on the disk/tape media and the recovery catalog contents. See Chapter 12 for more information.Chapter: 10139.Which of these is not a way to resolve a net service name?A.LocalnamingB.HostnamingC.Oracle Internet DirectoryD.Internal NamingAnswer: DInternal Naming is not one of the methods used to resolve a net service name, but localnaming, hostnaming, and Oracle Internet Directory are. See Chapter 3 for more information.Chapter: 10140.What is the correct command syntax you need to use to execute a script called complete_bac within the recovery catalog?A.start {execute script complete_bac;}B.RUN { EXECUTE SCRIPT complete_bac; }C.execute script complete_bac;D.run execute script complete_bac;Answer: BThe correct syntax to execute the script is RUN { EXECUTE SCRIPT ; }. For more information, see Chapter 13.Chapter: 10141.Which type of read-only tablespace recovery causes restoration and recovery of the tablespace and associated data files? (Choose all that apply.)A.Read-only backup and read-only recoveryB.Read-only backup and read-write recoveryC.Read-write backup and read-only recovery with backup taken immediately after it was made read onlyD.Read-write backup and read-only recoveryAnswer: B, DChoice B, read-only backup and read-write recovery, will require the restoration and recovery of the data files because changes have been made to the database since the backup. Choice D will also require restoration of the data file and recovery up to the point when the tablespace was made read-only. In choice A, no changes are made because the tablespace is read-only throughout. Choice C doesn't require restoration and recovery because the backup of the database was taken immediately after the tablespace was made read-only. See Chapter 10 for more information.Chapter: 10142.What new Oracle9i feature allows you to query old data even if the original data has been deleted?A.Flashback QueryB.Parallel queryC.Fast recoveryD.Undo queryAnswer: AFlashback Query allows you to query old deleted data by rebuilding the necessary data elements in the undo tablespaces. See Chapter 5 for more information.Chapter: 10143.Third-party tape hardware vendors require what aspect of RMAN to function properly?A.Recovery catalogB.Media management libraryC.RMAN in GUI through Enterprise ManagerD.RMAN in command line modeAnswer: BThe media management library (MML), or Media Management Layer, is a third-party vendor library, which is linked in with the Oracle kernel so that the server session generated by RMAN interfaces with the third-party vendor's hardware. See Chapter 8 for more information.Chapter: 10144.What are the two different technical methods of exporting data? (Choose all that apply.)A.ConventionalB.UserC.FullD.Direct exportAnswer: A, DThe two methods of exporting data are conventional and direct export. Conventional is the default method, which uses the standard SQL command processing, and direct export bypasses certain aspects of the SQL evaluation layer to improve performance. See Chapter 14 for more information.Chapter: 10145.A client is unable to connect to the PROD Oracle Server. Which of the following client-side checks could you NOT perform from the client workstation to troubleshoot the problem?A.Check the NAMES.DIRECTORY_PATH in the sqlnet.ora file on the client.B.Perform tnsping PROD from the client.C.Perform lsnrctl services from the client.D.Check the TNS_ADMIN Registry setting on the client.Answer: CThe listener would not be running on the client. This would be a server-side check that would be performed. See Chapter 2 for more information.Chapter: 10146.Which command is responsible for allowing you to move data files to a new location?A.ALTER DATABASE MOVEB.ALTER DATABASE RENAMEC.ALTER SYSTEM MOVE D.ALTER SYSTEM RENAMEAnswer: BThe ALTER DATABASE RENAME `' to `' is the command that allows you to move a data file to a new location. Remember that OS commands, such as cp in Unix, are necessary to copy the file to the new location. The ALTER DATABASE RENAME command just updates the control file and data dictionary. See Chapter 10 for more information.Chapter: 10147.Which of the following best describes the function of the Oracle Net Manager? A.It is a graphical tool used to configure critical Oracle network files.B.It is a tool used to configure the Oracle protocols.C.It is a graphical tool used to monitor Oracle connections.D.It is a tool used to troubleshoot Oracle connection problems.Answer: AThe Oracle Net Manager is a graphical tool that provides a way to configure most of the critical network files for the Oracle server. See Chapter 2 for more information.Chapter: 10148.What status determines that the tape is not available in the CROSSCHECK comparison?A.NOT AVAILABLEB.UNAVAILABLEC.EXPIREDD.INVALIDAnswer: CThe backup sets that are not on the media disk/tape but are in the recovery catalog return a status of EXPIRED. See Chapter 12 for more information.Chapter: 10149.What configuration file controls the listener?A.tnsnames.oraB.listener.oraC.sqlnet.oraD.names.oraAnswer: BThe listener.ora file contains the configuration information for the listener. This file contains information about the listening locations, the service names that the listener is listening for, and a section for optional listener parameters, such as logging and tracing parameters. There should be only one listener.ora file on a machine. If multiple listeners are used, each listener should have its own entry in the listener.ora file. See Chapter 2 for more information.Chapter: 10150.The RMAN repository best defines what? (Choose all that apply.)A.Recovery catalogB.Control fileC.Target databaseD.ATL databaseAnswer: A, BThe RMAN repository is the control file that stores the backup information if the recovery catalog is not used. The recovery catalog is a database that stores the RMAN repository information, otherwise the RMAN repository is the target database's control file. See Chapter 8 for more information.Chapter: 10151.Process failures and instance failures are both what types of failure?A.Media failureB.User failureC.Non-media failureD.Statement failureAnswer: CProcess failures and instance failures are both types of non-media failure. These types of failure are usually less critical. See Chapter 5 for more information.Chapter: 10152.Which init.ora parameter configures the database for automatic archiving?A.LOG_ARCHIVE_START=TRUEB.LOG_START_ARCHIVE=TRUEC.LOG_AUTO_ARCHIVE=TRUED.LOG_ARCHIVE_AUTO=TRUEAnswer: AThe correct parameter is LOG_ARCHIVE_START=TRUE. See Chapter 7 for more information.Chapter: 10153.Which command-line utility is used to start and stop the listener?A.listenerB.lsnrctlC.listenD.listen_ctlAnswer: BThe lsnrctl command-line utility is used to start and stop the listener. You can also use this utility to get information about the status of the listener and make modifications to the listener.ora file. See Chapter 2 for more information.Chapter: 10154.User-managed backup and recovery best defines which statement?A.Custom backup and recovery performed with OS commands and database commandsB.Non-automated RMAN-based backupsC.A new type of backup that uses RMAN but is performed by a userD.Automated RMAN-based backupAnswer: AUser-managed backup is the term used to describe the standard backups that have been used from the inception of Oracle. These backups are usually custom written through the use of OS and database commands. See Chapter 9 for more information.Chapter: 10155.What Oracle background process has the responsibility of performing the roll forward in instance recovery?A.PMONB.SMONC.RECOD.DBWRAnswer: BThe system monitor (SMON) process is responsible for applying all of the committed or uncommitted changes in the online redo logs. See Chapter 6 for more information.Chapter: 10156.Which of the following commands would you use to make a backup set unavailable?A.CHANGEB.MAKEC.FORCED.EXPIREAnswer: AThe CHANGE command makes the backup set either available or unavailable in the recovery catalog. See Chapter 12 for more information.Chapter: 10157.What are some of the issues of network complexity that the database administrator should consider? (Choose all that apply.)A.How much time it will take to configure a clientB.What type of work clients will be performingC.What type of protocols are being usedD.The size and number of transactions that will be doneE.All of the aboveAnswer: B, C, DThe DBA needs to consider such items as the number of clients the network will need to support, the type of work the clients will be doing, the locations of the clients in the network, and the size of transactions that will be done in the network. See Chapter 1 for more information.Chapter: 10158.Complete recovery is best defined by which of the following statements?A.Most transactions are recovered.B.All transactions are recovered except the last archived log.C.All committed transactions are recovered.D.There is no data lost whatsoever.Answer: DComplete recovery means that all transactions are recovered. No data is lost and none must be reentered when the database is recovered. See Chapter 10 for more information.Chapter: 10159.What are the different technical methods of loading data with the SQL*Loader utility? (Choose all that apply.)A.Direct-path loadB.Conventional loadC.Default-path loadD.External-path loadAnswer: A, B, DThe conventional load is the default load that performs normal SQL command processing. The direct-path load performs an expedited processing that bypasses the buffer and writes directly to data files. The external-path load is a load used for processing external files. See Chapter 15 for more information.Chapter: 10160.What are the three primary network configurations? A.N-tier architectureB.Single-tier architectureC.Multi-tier architectureD.Two-tier architectureAnswer: A, B, DThe three primary network configurations are single-tier, two-tier, and n-tier architecture. Single-tier was the predominant architecture for many years when the mainframe dominated the corporate environment. Two-tier architecture came into vogue with the introduction of the PC and has been a dominant architecture ever since. With the inception of the Internet, more organizations are turning towards n-tier architecture as a means to leverage many computers and enhance flexibility and performance of their applications. See Chapter 1 for more information.Chapter: 10161.Which of the following recoveries can be performed when the database is in ARCHIVELOG mode?A.Only incomplete recoveryB.Only complete recoveryC.Only partial recoveryD.Complete recovery and incomplete recoveryAnswer: DWhen the database is in ARCHIVELOG mode, both complete and incomplete recovery can be performed. See Chapter 7 for more information.Chapter: 10162.What is the primary purpose of using checkpoints?A.To decrease free memory buffers in the SGAB.To write non-modified database buffers to the database files and to synchronize the physical structures of the database accordinglyC.To record modified database buffers that are written to the database files and to synchronize the physical structures of the database accordinglyD.To increase free memory buffers in the SGA Answer: CThe main purpose of the database checkpoint is to record that the modified buffers have been written to the data files and to establish data consistency, which enables faster recovery in the event of a failure. See Chapter 6 for more information.Chapter: 10163.What command would you use to retain a backup past the retention date?A.HOLDB.RETAINC.KEEPD.STOREAnswer: CThe KEEP command causes a backup to be kept past the retention setting in the database. See Chapter 12 for more information.Chapter: 10164.Which view can be used to identify clean-up issues after a failed hot or online backup?A.V$BACKUPB.ALL_BACKUPC.USER_BACKUPD.DBA_BACKUPAnswer: AThe V$BACKUP view can be used to identify whether a database is actively being backed up or not. See Chapter 9 for more information.Chapter: 10165.How does Oracle Shared Server differ from a dedicated server? (Choose all that apply.)A.Clients use dispatchers instead of dedicated connections.B.The System Global Area contains request and response queues.C.Shared server processes execute client requests.D.All of the above.Answer: DOracle Shared Server uses a shared model. Clients share processes called dispatchers that handle their requests. Clients also share processes called shared servers that execute their requests. The sharing is done through modifications to the SGA. See Chapter 4 for more information.Chapter: 10166.What is the disadvantage of the hostnaming option?A.It cannot use bequeath connections.B.It cannot use Oracle Shared Server connections.C.It cannot use client load balancing.D.All of the above.Answer: CThe disadvantage is that certain functionality, such as client load balancing and failover, is not available when you use the hostnaming method. See Chapter 3 for more information.Chapter: 10167.Which of the following options is the RMAN BACKUP command capable of performing? (Choose all that apply.)A.Incremental backupB.Full backupC.Image copyD.Current control file backupE.Backup set creationAnswer: A, B, D, EThe RMAN BACKUP command is capable of performing all of the options with the exception of creating image copies. Image copies are created by the RMAN COPY command. See Chapter 9 for more information.Chapter: 10168.What does IIOP stand for?A.Internet Interactive Objects ProtocolB.Internet Instance Objects ProtocolC.Internet Inter-Orb ProtocolD.Internet Inter-Objects ProtocolE.None of the aboveAnswer: CThe Internet Inter-Orb Protocol is supported by Oracle Net to allow for support of Enterprise JavaBeans and CORBA. See Chapter 2 for more information.Chapter: 10169.What type of failure would require the DBA to issue the RECOVER DATABASE command?A.User processB.Media failureC.Instance failure D.Statement failureAnswer: BA media failure would most likely cause the DBA to get actively involved in the recovery of the database by entering recovery commands if this was a user-managed recovery. The other failures mentioned are usually handled by Oracle automatically. See Chapter 5 for more information.Chapter: 10170.What mode must that database be in to run the ALTER TABLESPACE BEGIN BACKUP command?A.NOARCHIVELOGB.startup nomountC.startup mountD.ARCHIVELOGAnswer: DThe database must be in ARCHIVELOG mode so that the tablespaces can be backed up online. See Chapter 7 for more information.Chapter: 101

EdgeTests/4064c18BONUS EXAM 11. You are the production and development DBA for a financial database and application. You have multiple development and testing environments to support your production database environment. One of the development environments is no longer necessary. How can you remove the incarnation of the database from recovery catalog?A. Perform a RESET on the development database incarnation.B. Perform a RESYNCH on the development database incarnation.C. Run the execute dbms_rcvcat.unregisterdatabase procedure for development database incarnation.D. Deleting the database from the filesystem is all that is necessary.Answer: CThe stored procedure execute dbms_rcvcat.unregisterdatabase will unregister a target database in the recovery catalog. This should be run as the recovery catalog owner for any database that you want to remove from the recovery catalog. See Chapter 13 for more information.Chapter: 1022. A client attempting to connect to an Oracle server received the following error:ORA-12198 "TNS: could not find path to destination"Which of the following explains why this error was received? A. The user entered an invalid user ID.B. The user entered an invalid net service name.C. The client found an entry for the service in the tnsnames.ora file but the service specified was not found.D. The Oracle listener process was not started.Answer: CThis error could be caused by a situation in which the service name in the tnsnames.ora file was invalid. See Chapter 3 for more information.Chapter: 1023. Study the RMAN script below. Choose the best answer to describe its function.RMAN> create script complete_bac{2> allocate channel c1 type disk;3> allocate channel c2 type disk;4> backup database;5> backup archivelog all;6> }A. This will create a RMAN script called complete_bac.B. This will create and store a RMAN script called complete_bac.C. This will create and execute a RMAN script called complete_bac.D. This will store a RMAN script called complete_bac.Answer: BThe create script will create and store a script in the recovery catalog for later use. See Chapter 13 for more information.Chapter: 1024. What type of failure scenarios is automatically performed by Oracle?A. User processB. Media failureC. Instance failure D. Statement failureAnswer: CInstance failure is automatically recovered by Oracle when the database instance is halted abruptly, such as it is during a power outage. Oracle handles this when the database gets started by reading the current online redo log and reapplying all the transactions in the redo log. This is sometimes known as the roll forward and rollback process because all the transactions are applied committed or uncommitted. Only the committed changes remain and the database is consistent from before the instance failure. See Chapter 5 for more information.Chapter: 1025. The Virtual Interface (VI) protocol support provided by Oracle Net is used specifically for which of the following? A. Wide area networksB. Local area networksC. System areas networksD. None of the aboveAnswer: CThe VI protocol is designed to support system area networks (SANs). SANs are configurations of multiple servers with high-speed interconnects between them. See Chapter 1 for more information.Chapter: 1026. What type of user-managed incomplete recovery might require the following query?select sequence#,first_change#,next_change#,first_timefrom v$log_history; A. Time-basedB. Change-basedC. Cancel-basedD. Stop-basedAnswer: BChange-based recovery is based upon a unique SCN number that each transaction uniquely contains. This could require you to determine which SCN ranges are in a redo log file. See Chapter 11 for more information.Chapter: 1027. When you first use a target database with RMAN, which command do you need to execute first to store information about the target database?A. REGISTERB. UNREGISTERC. RESETD. UNSETAnswer: AThe REGISTER command stores information about the target database. This command is run the first time a target database will be used within RMAN. See Chapter 13 for more information.Chapter: 1028. Which of the following memory structures temporarily stores the committed and uncommitted transactions before they are all written to disk?A. Data block buffersB. Redo log bufferC. Shared PoolD. Large PoolAnswer: BThe committed or uncommitted transactions, which consist of all transactions, are stored in the redo log buffers before they are written to the redo logs. See Chapter 6 for more information.Chapter: 1029. You have stopped the listener process on the Oracle Server. Which one of the following statements would be TRUE because the listener is no longer running?A. Connections established prior to the listener being stopped will be disconnected.B. Only bequeath connections will no longer be possible, but Shared Server connections will be possible.C. You will not be able to stop or start the Oracle server until the listener is restarted.D. If a client issued the following statement "sqlplus system/manager@prod," the command may fail with a "ORA-12541: TNS:no listener" error.Answer: DThe command issued from the client would need to contact the listener in order to establish a connection to the Oracle Server. The client would contact the server and discover that the listener is not active. See Chapter 2 for more information.Chapter: 10210. Which of the following processes can be performed when the database is in NOARCHIVELOG mode?A. Only incomplete recoveryB. Only complete recoveryC. Only partial recoveryD. Complete recovery and incomplete recoveryAnswer: AWhen the database is in NOARCHIVELOG mode, only incomplete recovery can be performed. However, there is one exception to this rule-if the online redo logs have not been written over since the last backup. See Chapter 7 for more information.Chapter: 10211. What action does the PL/SQL procedure sys.dbms_logmnr_d.build perform?A. Builds an external data dictionaryB. Builds a data extraction libraryC. Builds database procedures for LogMinerD. Builds database libraries for LogMinerAnswer: AThe sys.dbms_logmnr_d.build procedure builds the external data dictionary for LogMiner. See Chapter 5 for more information.Chapter: 10212. You must perform a complete database restore and then recover appropriately for the circumstances. The only thing you know about the recovery is that there is a bad transaction, which corrupted the database. What type of recovery should you perform?A. Time-based at the time just after the corrupt transactionB. Change-based just prior to a certain SCN that contained the corrupt transactionC. Cancel-based at a determined point in timeD. Complete recovery because not enough information is knownAnswer: BChange-based recovery is based upon a unique SCN number that each transaction contains. If you know there is a bad transaction that corrupted the database, you could identify the approximate SCN numbers and recover prior to the SCN of the bad transaction. See Chapter 11 for more information.Chapter: 10213. You are a DBA that has clients connecting from a Windows NT environment. You are using the localnaming method for names resolution. You want to place the Oracle Net client files in a non-default location. Which of the following would you do?A. Update the TNS_ADMIN entry in the Windows NT Registry to point to the new location of the Oracle Net files.B. Update the TNS_ADMIN entry in the tnsnames.ora file to point to the new location of the Oracle Net files.C. Update the NAMES.DIRECTORY_PATH in the sqlnet.ora file to point to the location of the Oracle Net files.D. Because you are using the localnaming method, there would be no Oracle Net files necessary on the clientAnswer: AThe TNS_ADMIN entry would have to be updated in the Windows NT Registry to point to the location of the files. Oracle will check for the existence of this entry when it is searching for the client-side Oracle Net files. See Chapter 3 for more information.Chapter: 10214. Which of the following actions modifies the RMAN repository so that it can store more information?A. Increasing the value of the CONTROL_FILE_RECORD_KEEP_TIME parameterB. Increasing the size of the default tablespace of RMAN schema ownerC. Increasing the size of the recovery catalogD. The RMAN repository cannot be increased.Answer: AThe RMAN repository is the control file of the target database when the recovery catalog is not being used. The size of the control file can be increased by increasing the value of the CONTROL_FILE_RECORD_KEEP_TIME parameter. This value can be anywhere from 1 to 365. See Chapter 8 for more information.Chapter: 10215. What type of connection is possible when the underlying operating system supports inheritance of endpoints?A. Shared serverB. Bequeath connectionC. Redirect connectionD. Dedicated serverE. None of the aboveAnswer: BBequeath connections are possible when the underlying operating system supports inheritance of endpoints. Otherwise, the system must perform a redirect. This requires additional communication between the client and listener. See Chapter 2 for more information.Chapter: 10216. When you are performing a backup, which of the following should be included?A. A copy of the data files onlyB. A copy of the data files and archived logsC. A copy of the data files, the archived logs, and the control filesD. A copy of the data files, the archived logs, the control files, and the parameter filesAnswer: DWhen you copy the data files, archived logs, control files, and parameter files, you are performing a whole or complete database backup. This is always a good idea if possible because it allows the whole database to be restored if necessary. See Chapter 9 for more information.Chapter: 10217. How many more log archive destinations does the LOG_ARCHIVE_DEST_n parameter support in Oracle9i than were previously supported in Oracle8i?A. 1B. 3C. 5D. 10Answer: CLOG_ARCHIVE_DEST_n (n being an integer value) is responsible for 10 archive locations in Oracle9i. In Oracle8i, only a maximum of 5 locations was supported. See Chapter 7 for more information.Chapter: 10218. Which of the following commands move data files in the RMAN recovery process? (Choose all that apply.)A. SET NEWFILEB. SET RENAMEC. SET NEWNAMED. SWITCHAnswer: C, DThe SET NEWNAME and SWITCH commands work together to restore RMAN backups to new locations. The SET NEWFILE and SET NEWNAME are not valid command syntax. See Chapter 10 for more information.Chapter: 10219. Oracle Connection Manager provides all of the following except:A. Centralized namingB. MultiplexingC. Network access controlD. Cross-protocol connectivityAnswer: AConnection Manager provides multiplexing, network access control, and cross-protocol connectivity. It does not provide a centralized naming solution. Centralized naming is provided by Oracle Internet Directory, or in previous version of Oracle, Oracle Names Server. See Chapter 1 for more information.Chapter: 10220. You are the DBA of a production database that does not run in ARCHIVELOG mode. The database cycles through all of the redo logs about two times a day. The backups for the database occur every Sunday. You experience a media failure on Wednesday. What is the best recovery you can perform?A. Complete recovery, if all of the redo logs are available.B. Incomplete recovery, losing all transactions that occurred after the backup.C. Complete recovery, losing all transactions that occurred after the backup.D. Incomplete recovery, only losing the redo logs after the time-based recovery.Answer: CYou can completely recover everything from the last full backup, but cannot apply transaction logs. Incomplete recovery in the Oracle world means UNTIL CANCEL, UNTIL TIME, or SCN. See Chapter 10 for more information.Chapter: 10221. Which statement best describes the recovery catalog?A. A mandatory feature of RMANB. An optional feature of RMAN that stores metadata about the backupsC. A mandatory feature of RMAN that stores metadata about the backupsD. An optional feature of RMANAnswer: BThe recovery catalog is an optional feature of RMAN. Though Oracle recommends that you use it, it isn't required. One major benefit of the recovery catalog is that it stores metadata about backups in a database that can be reported or queried. See Chapter 8 for more information.Chapter: 10222. What SQL*Loader command does not overwrite existing data?A. REPLACEB. APPENDC. REUSED. NEWAnswer: BThe APPEND command does not delete or overwrite existing table data. See Chapter 15 for more information.Chapter: 10223. Which of the following is another name for a bequeath connection?A. Indirect connectionB. Redirect connectionC. Direct hand-off connectionD. Shared connectionAnswer: CBequeath connections are also called direct hand-off connections because they pass control directly to a shared server or to a dedicated server process. See Chapter 2 for more information.Chapter: 10224. Which RMAN command would you use to make a backup set available?A. CHANGEB. MAKEC. FORCED. EXPIREAnswer: AThe CHANGE command makes the backup set either available or unavailable in the recovery catalog. The other commands are invalid. See Chapter 12 for more information.Chapter: 10225. Which RMAN command will show the availability status of a DATAFILECOPY command?A. LIST COPY OF DATABASEB. LIST COPY OF DATAFILEC. DATAFILE COPY D. CATALOG DATAFILEAnswer: AThe LIST COPY OF DATABASE will show the status of data file copies for a particular database. See Chapter 15 for more information.Chapter: 102

EdgeTests/4064c1926. User-managed backup and recovery best defines which of the following statements?A. Custom backup and recovery performed with OS commands and database commands B. Non-automated RMAN-based backupsC. A new type of backup that uses RMAN but is performed by a userD. Automated RMAN-based backupAnswer: AUser-managed backup is the term used to describe the standard backups that have been used from the inception of Oracle. These backups are usually custom written through the use of OS and database commands. See Chapter 9 for more information.Chapter: 10227. You receive an unusual request to restore a copy of the production financial database from the last year to compare financial numbers in some tables currently not available in the existing production database. How can you check if you still have the backup media from that timeframe?A. Perform a REPORT SCHEMA to check if the database and backup media are available.B. Perform a LIST BACKUP to check if the database and backup media are available.C. Perform a CROSSCHECK of the recovery catalog and backup media.D. Perform a CHANGE of the recovery catalog and the backup media.Answer: CThe CROSSCHECK command will compare the recovery catalog contents and associated media. If your tape rotation cycle is 30 days, you would have supporting backup media for only 30 days, even if your recovery catalog had data for over a year. See Chapter 12 for more information.Chapter: 10228. You have to perform a large DBA maintenance activity involving the partial loading of a temporary table from a very large table containing invoicing information for more than a year. What would be the quickest way to create the temporary table to perform this activity?A. Conventional load export and import.B. Create a table using direct-load insert.C. Conventional path SQL*Loader.D. Create Table as Select with logging turned on.Answer: BDirect-load insert is best used for batch loads of data or maintenance activities, such as rebuilding or unloading tables. This would be quicker to do than all of the other options. The conventional-load export would require you to build an export dump file and then import back into the database while in conventional mode. The SQL*Loader option would require setup to build the input, or data, file and control file, and then reload. The Create Table as Select (CTAS) option would require little setup, but because logging is turned on, the process would slow down. See Chapter 15 for more information.Chapter: 10229. All of the following would be network design considerations except:A. Network complexityB. Network securityC. Interfacing with new and existing systemsD. Backup and recovery issues for the Oracle serverAnswer: DBackup and recovery would not be considered a network design consideration. This is more of an Oracle server administration issue. See Chapter 1 for more information.Chapter: 10230. There was a complete disaster that forced you to rebuild a database environment from yesterday's backup. The most current 20 offline redo logs were lost when the complete disaster occurred. What components would you need to completely rebuild a database to a point as close as possible before the disaster?A. All data files, all control files, parameter files, and only online redo logsB. All data files, one control file, parameter files, and all redo logsC. All data files, one control file, parameter files, and some of the available offline redo logsD. All data files, parameter files, and all online redo logsAnswer: BThe type of recovery that would restore and recover a database to some point before a failure is best described as an incomplete recovery. Also, the most current 20 offline redo logs (archived logs) are unavailable. This means that you cannot perform a complete recovery. The components required to perform a complete recovery are all the necessary data files, at least one current control file, parameter files, and all of the available offline redo logs (archived logs). The online redo logs will not allow you to roll forward from the backup. Of the archived logs available, you will only be able to roll forward as far as you have archived logs. You will also need at least a control file or a backup control to recover the database. See Chapter 10 for more information.Chapter: 10231. Which of the following views can be used to identify cleanup issues after a failed hot or online backup?A. V$BACKUPB. ALL_BACKUPC. USER_BACKUPD. DBA_BACKUPAnswer: AThe V$BACKUP view can be used to identify whether a database is actively being backed up or not. See Chapter 9 for more information.Chapter: 10232. Which Oracle background process


Recommended