-
Examine the following impdp command to import a database over the network from a pre-12c Oracledatabase (source): Which three are prerequisites for successful execution of the command?()
A . The import operation must be performed by a user on the target database with the DATAPUMP_IMP_FULL_DATABASE role, and the database link must connect to a user on the source database with the DATAPUMP_EXD_FULL_DATABASE role.
B . All the user-defined tablespaces must be in read-only mode on the source database.
C . The export dump file must be created before starting the import on the target database.
D . The source and target database must be running on the same platform with the same endianness.
E . The path of data files on the target database must be the same as that on the source database.
F . The impdp operation must be performed by the same user that performed the expdp operation.
-
Which two statements are true regarding the starting of the database instance using the following command?() SQL>STARTUP UPGRADE
A . It enables all system triggers.
B . It allows only SYSDBA connections.
C . It ensures that all job queues remain active during the upgrade process.
D . It sets system initialization parameters to specific values that are required to enable database upgrade scripts to be run.
-
Which of the following commands can be used to watch system errors as they are logged?()
A . smit errpt
B . smit errdemon
C . smit alog
D . smit syslogd
-
our database is in the MOUNT state and you execute the following command to open it: ALTER DATABASE OPEN What two actions are performed as a result of this command?()
A . All control files are opened.
B . All redo log files are opened
C . The password file is opened.
D . The parameter file is opened.
E . All online data files are opened.
-
You execute the following Recovery Manager (RMAN) commands in he following order: BACKUP VALIDATE DATABAE RECOVER CORRUPTION LIST; Which two tasks are performed by these commands?()
A . Repair the corrupted blocks. If any. In the backup created
B . Populate VSCOPV_CORRUPTION with names of files that have corrupted blocks
C . Back up the database after checking whether array of the files have corrupted blocks
D . Discover any corrupt blocks that are viewable with the VSDATABASE_BI-OCK_CORBUPTION view
E . Repair all corrupted blocks that have been logged in the VSDATABASE_BLOCK_ CORRUPTION
-
The following configuration command was issued on router TK1:ip route 172.16.3.0 255.255.255.0 192.168.2.1.Which of the following statements are true regarding this command?()
A . The command is used to establish a static route.
B . The default administrative distance is used.
C . The command is used to configure the default route.
D . The subnet mask for the source address is 255.255.255.0
E . The command is used to establish a stub network
-
The network administrator of the Oregon router adds the following command to the router configuration: ip route 192.168.12.0 255.255.255.0 172.16.12.1. What are the results of adding this command (Choose two.)()。
A . The command establishes a static route.
B . The command invokes a dynamic routing protocol for 192.168.12.0.
C . Traffic for network 192.168.12.0 is forwarded to 172.16.12.1.
D . Traffic for all networks is forwarded to 172.16.12.1.
E . This route is automatically propagated throughout the entire network.
F . Trafficfor network 172.16.12.0 is forwarded to the 192.168.12.0 network.
-
You are managing a single instance Oracle 10g database that utilizes the following parameters: Which of the following set of commands must you execute to enable Flashback Database?()
A . STARTUP MOUNT EXCLUSIVE ALTER DATABASE FLASHBACK ON; ALTER DATABASE OPEN;
B . STARTUP MOUNT ALTER DATABASE FLASHBACK ON; ALTER DATABASE OPEN RESETLOGS;
C . STARTUP MOUNT EXCLUSIVE ATLER DATABASE ARCHIVELOG; ALTER DATABASE FLASHBACK ON; ALTER DATABASE OPEN RESETLOGS;
D . STARTUP MOUNT ALTER DATABASE ARCHIVELOG; ALTER DATABASE FLASHBACK ON; ALTER DATABASE OPEN;
-
You executed the following command to drop a user: DROP USER scott CASCADE; Which two statements regarding the above command are correct?()
A . All the objects of scott are moved to the Recycle Bin.
B . Any objects in the Recycle Bin belonging to scott are purged.
C . All the objects owned by scott are permanently dropped from the database.
D . All the objects of scott in the Recycle Bin must be purged before executing the DROP command.
E . Any objects in the Recycle Bin belonging to scott will not be affected by the above DROP command.
-
Which of the following commands should be used to watch system errors as they are logged?()
A . errpt -c
B . tail -f /var/adm/ras/errlog
C . syslogd -d
D . /usr/lib/errdemon -s 8192
-
Which of the following are valid until command options when attempting point-in-time recovery in RMAN?()
A . until time
B . until change
C . until sequence
D . until SCN
E . until commit
-
You executed the following command to drop a user: DROP USER scott CASCADE; Which two statements regarding the above command are correct?()
A . All the objects of scott are moved to the Recycle Bin.
B . Any objects in the Recycle Bin belonging to scott are purged.
C . All the objects owned by scott are permanently dropped from the database.
D . All the objects of scott in the Recycle Bin must be purged before executing the DROP command.
E . Any objects in the Recycle Bin belonging to scott will not be affected by the above DROP command.
-
A site administrator is configuring Command-level access control. Which of the following statements about Command-level access control are true? Command level access control policies: ()
A . are mandatory
B . specify action group ExecuteCommandActionGroup for Controller commands
C . specify action group ViewCommandActionGroup for View commands
D . specify resource group ControllerCommandResourceGroup for Controller commands
E . specify resource group ViewCommandResourceGroup for View command
-
Which of the following commands can be used to obtain information about filesets on the system that are later than the current maintenance level?()
A . lslpp -I
B . uname -r
C . oslevel -g
D . rpcinfo -
-
The user SYS creates a job by using the following command:
https://assets.asklib.com/images/image2/2018080215180228159.jpg
Which two statements are true about the job that was created by the preceding command?()
A . The job is enabled by default after creationB . The job is automatically dropped after the end dateC . The job executes with the privileges of the user SYSD .https://assets.asklib.com/images/image2/2018080215181385239.jpg
-
Which of the following commands will show how many physical partitions are available on active hdisk1?()
A . lspv hdisk1
B . lsvg -p hdisk1
C . lsattr -p hdisk1
D . lsdev -E -l hdisk1
-
Examine the following RMAN command:
https://assets.asklib.com/images/image2/201808021135212163.jpg
Which two statements are true regarding the backup taken by using the above RMAN command?()
A . Only data files and the control file are backed up.
B . Archived redo logs are backed up only I f the database is open during the backup.
C . The backup is deleted after one day, regardless of the default retention policy settings.
D . The backup becomes obsolete after one day, regardless of the default retention policy settings.
-
The following configuration command was entered into a router:ip route 172.16.3.0 255.255.255.0 192.168.2.4 Which of the following statements are true regarding this configuration change?()
A . The default administrative distance is used.
B . The command is used to establish a static route.
C . The command is used to configure the router interfaces.
D . The command is used to establish a stub network.
E . The subnet mask for the source address is 255.255.255.0
-
Which two statements are true regarding the starting of the database instance using the following command?() SQL>STARTUP UPGRADE
A . It enables all system triggers.
B . It allows only SYSDBA connections.
C . It ensures that all job queues remain active during the upgrade process.
D . It sets system initialization parameters to specific values that are required to enable database upgrade scripts to be run.
-
Which of the following commands displays the number of system calls per second that are being executed?()
A . sar
B . pstat
C . iostat
D . filemo
-
Examine the following RMAN command: BACKUP DATABASE TAG TESTDB KEEP UNTIL ’SYSDATE+1’ RESTORE POINT TESTDB06; Which two statements are true regarding the backup taken by using the above RMAN command?()
A . Only data files and the control file are backed up.
B . Archived redo logs are backed up only if the database is open during the backup.
C . The backup is deleted after one day,regardless of the default retention policy settings.
D . The backup becomes obsolete after one day,regardless of the default retention policy settings.
-
Which are data-control command in the following statements? () ① UPDATE② GRANT ③ INSERT ④
Which are data-control command in the following statements? ()
① UPDATE
② GRANT
③ INSERT
④ SELECT
⑤ DROP
⑥ ALTER
⑦ REVOKE
⑧ CREATE
⑨ DELETE
A.②,⑦
B.①,③,④,⑨
C.⑤,⑥,⑧
D.②, ⑤,⑥,⑦,⑧
-
Examine the following commands for redefining a table with Virtual Private Database (VPD) policies:Which two statements are true about redefining the table?()
<img src='https://img2.soutiyun.com/shangxueba/ask/64224001-64227000/64224740/398a37009eba261eceebfd5a001edaba.png' />
<img src='https://img2.soutiyun.com/shangxueba/ask/64224001-64227000/64224740/a5add098aa6143b225044036df53c199.png' />
A. All the triggers for the table are disabled without changing any of the column names or column types in the table.
B. The primary key constraint on the EMPLOYEES table is disabled during redefinition.
C. VPD policies are copied from the original table to the new table during online redefinition.
D. You must copy the VPD policies manually from the original table to the new table during online redefinition.
-
You issued the following command:An index is then created on the ADMIN_WORK_AREA temporary table. Which two statements are true regarding the TBS_T1 tablespace in the above command? ()
<img src='https://img2.soutiyun.com/shangxueba/ask/64263001-64266000/64265568/67e67a73b604e73a7d1e2def2ff7dcea.jpg' />
A. It stores only the temporary table but not its indexes.
B. It stores both the temporary table as well as its indexes.
C. It must be a nondefault temporary tablespace for the database.
D. It can be a default or nondefault temporary tablespace for the database.
E. It must be the default temporary tablespace of the user who issues the command.
-
In ZTE's T-MPLS protection, which of the following external commands are supporte
A.A.nworking lock
B.B.nprotection lock
C.C.nforced switching
D.D.nmanual switching