问题:单选题You work as a database administrator for Certkiller .com. You suspect that in one of your applications the customer table is being accessed by some unauthorized users. Which option would you use to monitor the queries being executed on the customer table?()A Monitor thealert.logfileB Enable server-side SQL tracing for user sessionsC Enable fine-grained auditing for the customer tableD Enable Fine-Grained Access Control (FGAC) for the customer tableE Write a database trigger on the customer table on the SELECT event
查看答案
问题:单选题Which statement is true about the loss of system-critical data files in ARCHIVELOG mode?()A The data files can be recovered till the last committed transaction.B The data files can be recovered without shutting down the database.C The data file is taken offline automatically; the database remains open.D The data files can be recovered to the time of the most recent backup.
问题:单选题A user complains that he gets the following error message repeatedly after executing some SQL statements.The error message forces the user to log off from and log onto the database to continue his work. ORA-02392:exceeded session limit on CPU usage,you are being logged off Which action would you take to increase the session limit on CPU usage?()A Modify the profile assigned to the user.B Modify the roles assigned to the users.C Modify the object privileges assigned to the user.D Modify the system privileges assigned to the users.E Modify the value for the RESOURCE_LIMIT parameter in the parameter file.
问题:单选题You work as a database administrator for Certkiller .com. In your database server, the parameter PLSQL_OPTIMIZE_LEVEL has been set to 2. What would this setting achieve?()A It degrades the run time and compiler performance.B It provides better run time and compiler performance.C It provides better optimization of the statement during parse time.D It forces the rule based optimizer to be used for statement optimization.E It provides better run time performance but slightly degraded compiler performance. F It provides better run time performance but slightly degraded run time performance.
问题:单选题You find that the database performance degrades while you backup the PROD database using Recovery Manager (RMAN). The PROD database is running in shared server mode. The database instance is currently using 60% of total operating system memory. You suspect the shared pool fragmentation to be the reason. Which action would you consider to overcome the performance degradation?()A Configure Java Pool to cache the java objects.B Configure Streams Pool to enable parallel processing.C Increase Shared Pool size to cache more PL/SQL objects.D Increase Database Buffer Cache size to increase cache hits.E Configure Large Pool to be used by RMAN and shared server.F Increase the total System Global Area (SGA) size to increase memory hits.
问题:单选题Where do you find information about a missing redo log file?()A trace fileB audit trailC control fileD alert log fileE event viewer
问题:多选题Which two statements about bigfile tablespaces are true? ()AThe bigfile tablespace have only one data file.BThe segment space management is automatic.CThe extent management is dictionary managed.DThe database can have only one bigfile tablespace.EThe bigfile tablespace can be converted to a smallfile tablespace.
问题:单选题The ST_INFO master table has millions of rows that are updated very rarely. It has a STATE_CODE column that contains the value for 25 states. The table is frequently queried on the STATE_CODE column. Which type of index would you suggest to improve the query performance?()A B-treeB bitmapC reverse keyD function based
问题:单选题You define an alert to be raised when the USERS tablespace usage has reached 80%of the total space. Which area would you refer to, in order to confirm that the alert has been raised due the event?()A the alert.log fileB the DBA_ALERTS viewC the Database Control Home pageD the Database Control performance pageE the Database Control Maintenance page
问题:多选题Your database is configured in NOARCHIVELOG mode. All the control files have been lost due to a hard disk failure but the data files are not lost. You have the closed whole database backup available to you. Which two statements are true in this scenario?()AThe instance aborts.BThe database cannot be recovered.CThe database can be recovered by restoring the control files from the backup.DThe database remains opened and you have to shut it down with the ABORT option.EThe database can be restored till the point of the last closed whole database backup.
问题:多选题You work as a database administrator for Supportcenter.cn. Your database is in the MOUNT state and you execute the following command to open it ALTER DATABASE OPEN; What two actions are performed as a result of this command?()AAll control files are openedBAll redo files are openedCThe password file is openedDThe parameter file is openedEAll online data files are opened
问题:单选题In your database, UNDO_RETENTION has been set to 600 sec and UNDO tablespace is configured for RETENTION GUARANTEE. Which statement regarding RETENTION GUARANTEE is true? ()A Undo data is retained until the next full database backup.B No committed undo data will be overwritten for 10 minutes.C Committed undo data will be kept forever if not overwritten within 600 seconds.D Guarantees that requested undo information are available until the instance is shut down.
问题:单选题In the instance of the PROD database, the checkpoint (CKPT) process runs after every minute. A database user updates the rows of the ORDERS table. Because of the configuration, the CKPT process gets initiated before the user commits the transaction. What would happen to the modified blocks when the CKPT process is started?()A The modified blocks would be written to the data files.B The modified blocks would be written to the temp files.C The modified blocks would be written to the control file.D The modified blocks would be written to the redo log files.E The modified blocks would be written to the archived redo log files.F The modified blocks would be retained in the database buffer cache.
问题:多选题In which two cases would you perform only consistent backup?()AYou are working on a database where downtime is not tolerated.BYou are working on a database where downtime can be tolerated.CYou are working on a database that operates in ARCHIVELOG mode.DYou are working on a database that operates in NOARCHIVELOG mode.EYou are working on a database where all the tablespaces are locally managed.FYou are working on a database where control files and redo log files are multiplexed.GYou are working on a database where control files and redo log files are not multiplexed.
问题:单选题Your Certkiller .com database is in ARCHIVELOG mode. The data file that belongs to the SYSTEMtablespacehas become corrupted. Up to what point can you recover the database?()A Until last commitB Until the time you perform recoveryC Until the time the date file got corruptedD Until the point where the last transaction begunE You cannot recover the SYSTEMtablespaceand must re-create the database.
问题:单选题The SAVE_AMT column in the ACCOUNTS table contains the balance details of customers in a bank. As part of the year/x7fend tax and interest calculation process, all the rows in the table need to be accessed. The bank authorities want to track access to the rows containing balance amounts exceeding $200,000, and then send an alert message to the administrator. Which method would you suggest to the bank for achieving this task?()A implementing valuebased auditing by using triggersB implementing finegrained auditing with audit condition and event handlerC performing standard database auditing to audit object privileges by setting the AUDIT_TRAIL parameter to EXTENDEDD performing standard database auditing to audit SQL statements with granularity level set to ACCESS
问题:单选题You want to administer your PROD database from a remote host machine using a Web-enabled interface. Which Oracle tool would you use to accomplish this task efficiently without using command-line interfaces?()A SQL*PlusB iSQL*PlusC Management ServerD Management RepositoryE Oracle Enterprise Manager 10g Database Control
问题:单选题You observe that in your PROD database, customer information is being modified by some unauthorized users. You want to keep track of all of the transactions happening on the table using PL/SQL. Which type of PL/SQL subprogram or construct would you use to accomplish this task?()A functionsB packagesC proceduresD database triggersE anonymous PL/SQL block
问题:单选题You work as a database administrator for Supportcenter.cn. You determine that archiving was not successful in one of thedestinators. You want to check the alert log file for more information on this.Which initialization parameter gives you the location of the alert log file?()A USER_DUMP_DESTB CORE_DUMP_DESTC ALERT_LOG_DESTD ALERT_DUMP_DESTE TRACE_DUMP_DESTF BACKGROUND_DUMP_DEST
问题:单选题It is a holiday and no transactions are being performed on the database. You took a consistent backup of your database without using Recovery Manager (RMAN). How would you make use of this consistent backup in RMAN?()A cannot be used in RMANB by starting up the database againC by using the CATALOG command of RMAND by using the RECOVER CATALOG command in RMANE by re-creating the target control file to rebuild the RMAN repository