Oracle 1Z0-031 Real Exam Questions

Oracle9i Database: Fundamental

Exam Number: 1Z0-031

Associated Certifications: Oracle9i DBA OCA

Exam Price: £ 131

Exam Registration: Register

Duration: 120 minutes

Number of Questions: 60

Passing Score: 73%

1: Identify three components of an Oracle instance for which you can change the size dynamically. (Choose three.)
A.Java Pool
B.Large Pool
C.Shared Pool
D.Redo Log Buffer
E.Database Buffer Cache
Correct Answers: B C E

2: A table is stored in a data dictionary managed tablespace. Which two columns are required from DBA_TABLES to determine the size of the extent when it extends? (Choose two.)
A.BLOCKS
B.PCT_FREE
C.NEXT_EXTENT
D.PCT_INCREASE
E.INITIAL_EXTENT
Correct Answers: C D

3: Which two statements regarding the database writer (DBWn) background process are true? (Choose two.)
A.It is an optional background process.
B.It writes dirty buffers to the data files whenever a checkpoint occurs.
C.It writes dirty buffers to the data files whenever a transaction commits.
D.It writes dirty buffers to the data files before the log writer (LGWR) writes.
E.It is possible to have more than one database writer in an Oracle instance.
Correct Answers: B E

4: Consider the following statements:
1. ALTER SYSTEM SWITCH LOGFILE;
2. CREATE TABLE sales(bill NUMBER(3),bdt DATE,amt NUMBER(10,2));
3. ALTER SYSTEM SET CONTROL_FILES=’/remorse/control02.ctl’;
4. SHUTDOWN
Which of the commands always modifies the control file?
A.1 and 2
B.3 and 4
C.1 and 4
D.1, 2, and 3
E.1, 2, 3, and 4
Correct Answers: C

5: You want to use a profile to restrict the resources that the users are utilizing in your database. At which two levels can you enforce the resource limits using a profile? (Choose two.)
A.call
B.session
C.database
D.transaction
E.database object
Correct Answers: A B

6: You created a profile, PROF1, by executing the following command:
SQL> CREATE PROFILE   prof1
          LIMIT
          FAILED_LOGIN_ATTEMPTS   3
          PASSWORD_LOCK_TIME   5
          PASSWORD_LIFE_TIME   60
          PASSWORD_REUSE_TIME   30;
After creating the profile, you assigned it to a group of database users in the administration department. Which statements are true regarding the usage of the profile? (Choose all that apply.)
A.The users’ password must be unique during last 30 days.
B.The users must change the password at least every 60 days.
C.The users’ account is automatically unlocked after five days from the day the account was locked due to three consecutive failed log in attempts.
D.The users’ account remains locked, at least for five hours from the day the account was locked due to three consecutive failed log in attempts.
E.The database administrator cannot use the ALTER USER ACCOUNT UNLOCK command to unlock the account if the account was locked due to three consecutive failed log in attempts.
Correct Answers: A B C

7: While observing the index statistics, you find that the index is highly fragmented, thereby resulting in poor database performance. Which option would you use to reduce the fragmentation without affecting the users who are currently using the index?
A.validate the index structure
B.rebuild the index using ALTER INDEX..REBUILD ONLINE command
C.change the block space utilization parameters using ALTER INDEX command
D.deallocate the unused space in the index using ALTER INDEX..DEALLOCATE UNUSED command
Correct Answers: B

8: Under which condition does the Oracle server put a data block on the free list of a segment?
A.when the used space in the block exceeds the value set in PCTUSED
B.when the used space in the block exceeds the value set in PCTFREE
C.when the used space in the block falls below the value set in PCTUSED
D.when the used space in the block falls below the value set in PCTFREE
Correct Answers: C

9: Which two actions does the Checkpoint (CKPT) process initiate when a checkpoint occurs? (Choose two.)
A.updates the control file with the checkpoint information
B.removes all the blocks from the database buffer cache
C.updates the headers of data files if the checkpoint is caused by a log switch
D.signals log writer (LGWR) to write redo entries from the log buffer to the redo log files
Correct Answers: A C

10: You want to know if there are any default values assigned to the columns in the TECHDATA table. How could you find this information?
A.by describing the table
B.by querying DBA_TABLES
C.by querying USER_TABLES
D.by querying USER_TAB_COLUMNS
Correct Answers: D

Download  |  Password: ciscobibles.com

Oracle 1Z0-030 Real Exam Questions

Oracle9i New Features for Administrators™

Exam Number: 1Z0-030

Associated Certifications: Oracle8i DBA OCPs to Oracle9i DBA

Exam Price: £ 131

Exam Registration: Register

Duration: 105 minutes

Number of Questions: 60

Passing Score: 50%

1: When querying the v$sysstat, v$sesstat or v$mystat views, you notice the statistic "workarea executions – onepass". What is the meaning of this statistic?
A.It is the cumulative count of work areas running in more than one pass.
B.It is the total amount of PGA memory dedicated to the work areas using the one pass size.
C.It is the cumulative count of work areas using the one pass size, where large sorts have spilled to disk.
D.It is the cumulative count of work areas using the one pass size, which did not have to spill to disk.
Correct Answers: C

2: Which method would you consider while implementing automatic undo management in an Oracle9i Real Application Clusters (RAC) environment?
A.creating a single undo tablespace with a nondefault block size and placing the data file on the shared raw device
B.creating a single undo tablespace with the default block size for all instances participating in RAC and placing the data file on the primary node
C.creating a single undo tablespace with the default block size for all instances participating in RAC and placing the data file on the shared raw device
D.creating multiple undo tablespaces, one for each instance participating in RAC, and placing the data file on the respective nodes
E.creating multiple undo tablespaces, one for each instance participating in RAC, and placing the data files on the shared raw device
Correct Answers: E

3: You want to create a database with automatic undo management. Which two options would you consider for the undo tablespace that would hold the undo segments? (Choose two.)
A.It must not be in logging mode.
B.It can have nonstandard block size.
C.It must be a locally managed tablespace.
D.It must be a dictionary-managed tablespace.
E.It must be created along with database creation.
Correct Answers: B C

4: Which option would you use to enable automatic SQL execution memory management?
A.Set the SGA_TARGET parameter to a nonzero value.
B.Set the %_AREA_SIZE parameter to a nonzero value.
C.Set the WORKAREA_SIZE_POLICY parameter to Auto.
D.Set the PGA_AGGREGATE_TARGET parameter to a nonzero value.
Correct Answers: D

5: Consider the following statement:
    SQL> EXECUTE DBMS_STATS.GATHER_SCHEMA_STATS (-
        2> ownname  => ‘OE’, –
        3> estimate_percent =>  DBMS_STATS.AUTO_SAMPLE_SIZE, –
        4> method_opt  =>  ‘for all columns size AUTO’);
What is the effect of ‘for all columns size AUTO’ of the METHOD_OPT option?
A.The Oracle server creates a new histogram based on existing histogram definitions for all table, column, and index statistics for the OE schema.
B.The Oracle server creates a histogram based on data distribution regardless of how the application uses the column/s for all table, column, and index statistics for the OE schema.
C.The Oracle server creates a histogram based on data distribution and application usage of the column/s for all table, column, and index statistics for the OE schema.
D.The Oracle server creates a histogram based on application usage, regardless of data distribution, for all table, column, and index statistics for the OE schema.
Correct Answers: C

6: Which statement describes the use of the cached execution plans feature?
A.improves the performance of SQL statements
B.provides better diagnosis of query performance
C.avoids the need to set the CURSOR_SHARING parameter
D.helps maintain cached execution plans even after the SQL statement is aged out of the Library Cache
Correct Answers: B

7: You have a tablespace, APP_TBSP, with a non-OMF file. To ease file management, you set the following parameters in the server-persistent parameter file (SPFILE) of your database instance and restart the instance:
DB_CREATE_FILE_DEST = /u01/oradata/orcl
DB_CREATE_ONLINE_LOG_DEST_1 = /u02/oradata/orcl DB_CREATE_ONLINE_LOG_DEST_2 = /u03/oradata/orcl
Then, you execute the following command to add a new data file to the tablespace:
SQL> ALTER TABLESPACE app_tbsp ADD DATAFILE;
What would be the result of this command?
A.The command fails because there are no name and size specified for the data file.
B.The command fails because a tablespace cannot have both OMF and non-OMF files.
C.The command succeeds by adding a new data file with file size equal to that of the existing file.
D.The command succeeds by adding a new data file with OMF default used for the size and the OMF naming conventions used for the file
name.
Correct Answers: D

8: The backup retention policy is configured as RECOVERY WINDOW 2. You executed the following command in RMAN against your database:
RMAN> REPORT OBSOLETE;
What would you see in the output?
A.a list of all the expired backups and copies
B.a list of all those backups and copies that have been deleted within the last two days
C.a list of all those backups and copies that have been recovered within the last two days
D.a list of backups and copies that are no longer needed to perform recovery with the range covered by the current retention policy
Correct Answers: D

9: Identify the two steps that are performed during native PL/SQL compilation for the PL/SQL blocks other than the top-level anonymous PL/SQL blocks. (Choose two.)
A.compilation of program into C code
B.compilation of program into byte code
C.compilation of program into native code
D.compilation of program into binary code
Correct Answers: A C

10: Online index rebuild functionality can be used to rebuild all the indexes in the options below except _____.
A.b-tree indexes
B.bitmap indexes
C.reverse key indexes
D.function-based indexes
Correct Answers: B

Download  |  Password: ciscobibles.com

CCIE Security 350-018 Real Exam Questions

The CCIE Security Certification is the industry standard for recognition and rewards for Network Security Engineers who have demonstrated expert level performance in implementation, configuration and troubleshooting of Cisco network security solutions . Attaining and maintaining this performance-based, practical certification proves skills only achievable by distinct experts in the network security field and carries a prestige and honor that is envied by security professionals worldwide. Not only must a Security CCIE prove their theoretical knowledge of security best practices, they most perform them in a lab environment with real equipment using real-world scenarios. Therefore, the CCIE Security is considered one of the most advanced Network Security Certifications available and qualifies candidates to manage, lead, and design the most complex network security teams and projects available in the Industry.

» Read more

1 541 542 543 544 545 559