-
In which of the following scenarios is a tablespace recovery required?()
A . when recovering a lost read-only tablespace from a read-only tablespace backup
B . when recovering a lost read-only tablespace from a read-write tablespace backup when the database is running in ARCHIVELOG mode
C . when recovering a lost read-only tablespace from a read-write tablespace backup when the database is running in NOARCHIVELOG mode and the changes in the online redo log files have been overwritten
D . when recovering a lost read-only tablespace from a read-only tablespace backup using the backup of the control file, the control file was created using the ALTER DATABASE BACKUP CONTROLFILE TO TRACE statement, and this statement was issued when the tablespace was read-only
-
In which scenarios would you rebuild an index?()
A . when you need to disable the index usage
B . when you need to change storage options
C . when you need to enable index monitoring
D . when you need to move the index to another tablespace
-
In which scenario do you use the Flashback Database feature?()
A . when a table is dropped and you restore it from the Recycle Bin
B . when a user’s schema is dropped and you recover the user’s schema
C . when some incorrect data is inserted in the table and you retrieve the table to a state that was at a certain timestamp
D . when a row of a table is updated frequently and committed, and you view all the versions of the row within a specific duratio
-
Which of the following scenarios are likely reasons for an EtherChannel to fail?()
A . Mismatched EtherChannel protocol
B . Mismatched EtherChannel port selection
C . Mismatched EtherChannel distribution algorithm
D . Mismatched trunk mode
E . Mismatched native VLAN
F . Mismatched link speed
-
Which two scenarios are NOT safe to replace a StringBuffer object with a StringBuilder object?()
A . When using versions of Java technology earlier than 5.0.
B . When sharing a StringBuffer among multiple threads.
C . When using the java.io class StringBufferInputStream.
D . When you plan to reuse the StringBuffer to build more than one string.
-
Which is a valid Cisco CRS 4.0 deployment scenario? ()
A . redundant Cisco CRS Engines and a simplex database server
B . redundant Cisco CRS Engines with five simplex VoIP monitoring servers
C . redundant Cisco CRS Engines and databases running on two different nodes outside of the Cisco CRS cluster
D . redundant Cisco CRS Engines and databases with two VoIP monitoring servers and three recording server
-
In which scenario would index be most useful? ()
A . The indexed column is declared as NOT NULL.
B . The indexed columns are used in the FROM clause.
C . The indexed columns are part of an expression.
D . The indexed column contains a wide range of values.
-
In which scenario would TOP N analysis be the best solution? ()
A . You want to identify the most senior employee in the company.
B . You want to find the manager supervising the largest number of employees.
C . You want to identify the person who makes the highest salary for all employees.
D . You want to rank the top three sales representatives who have sold the maximum number of products.
-
Which two of the following are valid CRS deployment scenarios?()
A . IPCC Express communicating with the ICM via a standalone IPCC Gateway PG running on an expansion server
B . IPCC Express communicating with the ICM via a co-resident IPCC Gateway PG
C . IPCC Express using the IPCC Enterprise Outbound option
D . IPCC Express using the IPCC Enterprise CTI-OS Toolkit
E . IP IVR integrating with IPCC Enterprise to function as queue point and self-service platform
-
In which scenario will you perform an incomplete recovery?()
A . when a table is dropped and stored in the Recycle Bin
B . when all the control files are deleted
C . when a member of a multiplexed redo log group is dropped
D . when you are required to recover a table to its previous state
-
Which three of the following are valid CRS deployment scenarios? ()
A . High Availability CRS Engines running on hardware from different server classes
B . High Availability CRS Engines running on similar hardware from the same server class but from different vendors
C . High Availability CRS Engines and database and a simplex Recording Server
D . High Availability CRS Engines and four simplex VoIP Monitoring Servers
E . CCM co-resident deployment on an MCS 7815
-
In which scenario will you perform a cancel-based recovery?()
A . when a tablespace is dropped and you have only RMAN-based backup of the database
B . when a table is dropped and stored in the Recycle Bin
C . when you are required to recover an existing table to its previous state
D . when a tablespace is dropped and you have only a user-managed full backup of the database
-
Which scenario describes an appropriate use for opening a form in a new session?()
A . The data entered into the called form is logically independent of the data entered in the calling form.
B . The called form requires different privileges than the calling form.
C . The called form must execute as a different user than the calling form.
D . The calling form must be able to query data in the called form before it is saved.
-
Which three scenarios are true about Domains?()
A . Domains can be created using the Configuration Wizard.
B . Domains can be created using WLST.
C . Domain configuration files are located in the WebLogic home directory.
D . Domains can be created based on a domain template.
-
Which of the following is a valid CRS deployment scenario?()
A . CRS 4.0 running with Cisco Unified CallManager 4.0
B . CRS 4.1 running with Cisco Unified CallManager 4.1
C . CRS 4.0 running with Cisco Unified CallManager 4.1
D . CRS 3.5 running with Cisco Unified CallManager 3.3
-
Which two scenarios are NOT safe to replace a StringBuffer object with a StringBuilder object?()
A . When using versions of Java technology earlier than 5.0.
B . When sharing a StringBuffer among multiple threads.
C . When using the java.io class StringBufferInputStream.
D . When you plan to reuse the StringBuffer to build more than one string.
-
In which scenario will you use the Flashback Transaction Query feature?()
A . when you want to restore an important table that is dropped from the Recycle Bin
B . when you want to obtain the SQL statements to undo the deletion of some important records from a table by a transaction
C . when you want to restore a dropped user’s schema
D . when a row of a table is updated many times within a specific time period and you want all the versions of the row in the specified time period
-
In which scenario is a Database Administrator NOT required to perform an incomplete recovery?()
A . when all the online redo log groups are multiplexed and one of the members of a group is missing
B . when all the online redo log groups are not multiplexed and one log group is missing
C . when all the control files are missing
D . when some important tables are deleted from the database and purged from the Recycle Bi
-
In which scenario, will you issue the following command?() RMAN> REPORT NEED BACKUP DAYS 7;
A . to configure RMAN to maintain backup information in the RMAN repository for seven days
B . to configure RMAN to maintain backup information in the control file for at least seven days
C . to display the list of files that have not been backed up for the last seven days
D . to display the list of files that must be backed up within seven day
-
In which scenario will you use the Flashback Version Query feature?()
A . when you want to restore a table that has been dropped from the Recycle Bin
B . when you want to identify the transaction ID of the transaction that deleted some important records from a table
C . when you want to recover the schema of a dropped user
D . when you want to restore a dropped tablespace
-
In which of the scenarios will the DBA perform recovery()
A . The alert log file is corrupted.
B . A tablespace is accidentally dropped.
C . One of the redo log members is corrupted.
D . A database user terminates the session abnormally.
E . The hard disk on which the data file is stored is corrupted.
-
In which of the following scenarios would the "show cdp neighbors detail"command be an appropriate troubleshooting tool?()
A . Two switches are connected via a trunk. Both switches have been assigned an IP address, subnet mask, and default gateway. A ping is successful between the two switches. However, VLAN information is not passed from one switch to the other switch.
B . A router and a switch have been assigned an IP address, a subnet mask, and a default gateway. They are directly connected, but a ping between the two devices fails.
C . A router connects to another router through a serial interface. Both routers have been assigned an IP address, subnet mask, and default gateway. The routers are running RIP and the networks directly connected to the first router do not pass to the second router. However, a ping from one router to the serial interface of the directly connected neighboring router is successful.
D . A router connects to another router via a switch. Both routers and the switch have been assigned an IP address, subnet mask, and default gateway. Neither the routers nor the switch are able to ping one of the hosts that is directly to the switch.
-
Which of the following business scenarios is the LEAST appropriate for Web services?()
A . Expanding the reach of your company information.
B . Providing transactional services such as credit card payment processing.
C . Making existing services available to a business process to orchestrate services.
D . Enabling interoperability between heterogeneous services to create time-critical solutions.
-
Identify three scenarios in which you would recommend the use of SQL Performance Analyzer to analyzeimpact on the performance of SQL statements.()
A . Change in the Oracle Database version
B . Change in your network infrastructure
C . Change in the hardware configuration of the database server
D . Migration of database storage from non-ASM to ASM storage
E . Database and operating system upgrade