|
Question 1. Identify two situations in which you can use Data Recovery Advisor for recovery. (Choose two.) A. The user has dropped an important table that needs to be recovered. B. The database files are corrupted when the database is open. C. You are not able to start up the database instance because the required database files are missing. D. The archived log files are missing for which backup is not available. Answer: B, C Question 2. In your database, the LDAP_DIRECTORY_SYSAUTH initialization parameter has been set to YES and the users who need to access the database as DBAs have been granted SYSDBA enterprise role in Oracle Internet Directory (OID). SSL and the password file have been configured. A user SCOTT with the SYSDBA privilege tries to connect to the database instance from a remote machine using the command: $ SQLPLUS scott/tiger@DB01 AS SYSDBA where DB01 is the net service name. Which authentication method would be used first? A. authentication by using the local OS of the database server B. authentication by using the Oracle Internet Directory C. authentication by password file D. authentication by using certificates over SSL Answer: C Question 3. Examine the following values of the initialization parameters in the database having the SID ORCL: BACKGROUND_DUMP_DEST=/u01/app/oracle/product/11.1.0/db_1/bdump USER_DUMP_DEST=/u01/app/oracle/product/11.1.0/db_1/udump CORE_DUMP_DEST=/u01/app/oracle/product/11.1.0/db_1/cdump DIAGNOSTIC_DEST= The environment variables have the following value: ORACLE_BASE=/u01/app/oracle ORACLE_HOME=/u01/app/oracle/product/11.1.0/db_1 What is the location of the Automatic Diagnostic Repository (ADR) home? A. /u01/app/oracle/product/11.1.0/db_1 B. /u01/app/oracle C. $ORACLE_HOME/bdump D. $ORACLE_HOME/log Answer: B Question 4. Observe the following PL/SQL block: BEGIN dbms_spm.configure('SPACE_BUDGET_PERCENT', 30); END; Which statement is correct regarding the above PL/SQL block? A. It automatically purges the SQL management objects when SMB occupies more than 30% of the SYSAUX tablespace. B. It reserves 30% of the space in the SYSAUX tablespace for SQL Management Base (SMB). C. It reserves 30% of the space in the SYSTEM tablespace for SMB. D. It generates a weekly warning in the alert log file when SMB occupies more than 30% of the SYSAUX tablespace. Answer: D Question 5. Exhibit: View the Exhibit to examine the output produced by the following query at three different times since the database instance started and has undergone workloads of different capacities: SQL> SELECT substr(component, 0, 10) COMP, current_size CS, user_specified_size US FROM v$memory_dynamic_components WHERE current_size!=0; What do you infer from this? A. All sessions are connected to the database instance in dedicated mode, and no RMAN or parallel query operations have been performed. B. The database instance is running with manual shared memory management. C. The database instance is running with manual PGA management. D. The database instance has the MEMORY_TARGET value set to a nonzero value. Answer: D Question 6. You are managing an Oracle Database 11g ASM instance having three disks in a disk group with ASM compatibility attribute set to 11.1.0 and redundancy set to high. One of the disks in the disk group becomes unavailable because of power failure. Which statements will be true in this scenario? (Choose all that apply.) A. The disk is immediately dropped from the disk group. B. The ASM tracks the extents that are modified during the outage. C. The ASM migrates the extents from the unavailable disk to the remaining disks. D. The disk automatically goes offline. Answer: B, D Question 7. The SQL Tuning Advisor has been configured with default configurations in your database instance. Which recommendation is automatically implemented without the DBA's intervention after the SQL Tuning Advisor is run as part of the AUTOTASK framework? A. statistics recommendations B. SQL profile recommendations C. restructuring of SQL recommendations D. index-related recommendations Answer: B Question 8. Exhibit: View the Exhibit to examine the Automatic Database Diagnostic Monitor (ADDM) tasks. You executed the following commands: SQL> VAR tname VARCHAR2(60); SQL> BEGIN :tname := 'my_instance_analysis_mode_task'; DBMS_ADDM.INSERT_SEGMENT_DIRECTIVE(:tname,'Sg_directive','SCOTT'); END; Which statement describes the consequence? A. All subsequent ADDM tasks including my_instance_analysis_mode_task are filtered to suppress the Segment Advisor suggestions for the SCOTT schema. B. The ADDM task is filtered to produce the Segment Advisor suggestions for the SCOTT schema only. C. The ADDM task is filtered to suppress the Segment Advisor suggestions for the SCOTT schema. D. The PL/SQL block produces an error because the my_instance_analysis_mode_task task has not been reset to its initial state. Answer: D Question 9. Which statements are true regarding table compression? (Choose all that apply.) A. It saves disk space and reduces memory usage. B. It saves disk space but has no effect on memory usage. C. It incurs extra CPU overhead during DML as well as direct loading operations. D. It incurs extra CPU overhead during DML but not direct loading operations. E. It requires uncompress operation during I/O. Answer: A, C Question 10. You are working as a DBA on the decision support system. There is a business requirement to track and store all transactions for at least three years for a few tables in the database. Automatic undo management is enabled in the database. Which configuration should you use to accomplish this task? A. Enable Flashback Data Archive for the tables. B. Specify undo retention guarantee for the database. C. Enable supplemental logging for the database. D. Query V$UNDOSTAT to determine the amount of undo that will be generated and create an undo tablespace for that size. E. Create Flashback Data Archive on the tablespace on which the tables are stored. Answer: A
|
Question 1. On an NIS client, the following is a portion of the output of cat /etc/passwd: +Joe:::::::: +Sam:::::::: +:*::::::::/bin/false Which of the following is true for all users other than Joe and Sam? A. They have full access. B. They are denied access. C. They are granted limited access. D. They gain access after being prompted for a shell. Answer: B Explanation: login denied users are displayed with + symbol at the starting of line. Question 2. How can a user view an X Window from a remote system on their local system? A. from the local system: export DISPLAY=local:0.0 B. from the remote system: export DISPLAY=local:0.0 C. from the local system: export DISPLAY=remote:0.0 D. from the remote system: export DISPLAY=remote:0.0 Answer: D Explanation: First Local host should give the permission to display the X Terminal on local host using xhost command. Then user can export the display from remote host. See the example Suppose you want to run application on ITCertKeys B from ITCertKeys A. ITCertKeys B in GUI Terminal:# xhost +192.168.0.1 ITCertKeys A in GUI Terminal:# export DISPLAY=192.168.0.2:0 # xterm & Now Terminal of ITCertKeys A will display on ITCertKeys B Question 3. Which of the following commands can be used to confirm that the FTP server is listening? A. netstat -a ftp B. netstat | grep ftp C. netstat -u | grep ftp D. netstat -a | grep ftp Answer: D Explanation: netstat is the multipurpose command, it can list active network connections, routing tables, interface statistics and other vital network information. Syntax: netstat [options] Options are -a à List listening and connected sockets -t à List TCP connection -u à List UDP Connection -p à Show PID and name of the program. Question 4. When a RAID 5 array is configured with a hot-spare disk under Linux, which of the following is the minimum number of drives required? A. 2 B. 3 C. 4 D. 5 Answer: C Explanation: RAID 5 is the most common type of RAID. By distributing parity information across some or all of an array's member disk drives, RAID 5 eliminates the write bottleneck of using one parity disk. The minimum requirements for RAID 5 is 3 disks. According to questions, 3 disks for RAID Level 5 and one spare disk so total 4. Question 5. A system administrator wants to see if an RPM package is installed on a user workstation. Which of the following commands should be used? A. rpm -queryB. rpmfind C. rpm -qa | grep D. find -name rpm | grep Answer: C Explanation: RPM format packages can manage using rpm command. to query the package either installed or not, rpm -q packagename To list all installed package: rpm -qa packagename Question 6. Which of the following can be used to determine who has scheduled a job? A. who B. whodo C. at -d D. at -l Answer: B Question 7. Which of the following encryption schemes is the LEAST secure? A. DES B. MD5 C. AES D. Blowfish Answer: A The Data Encryption Standard, a block cipher with 64-bit blocks and a 56-bit key Like MD4, it produces a 128-bit hash. For details see RFC 1321 AES ciphers use a 128-bit block and 128, 192 or 256-bit keys A block cipher using 64-bit blocks and keys of up to 448 bits Question 8. A Linux machine has a local address of 192.168.1.1 with subnet mask of 255.255.255.0. All services are currently denied. Which of the following lines should be appended to hosts.allow file to permit access to the Web service on the local subnet. A. httpd: 192.168.1.0/24 B. ALL: 192.168.1.255/24 C. ALL except httpd: 192.168.1.1/24 D. 192.168.1.255/255.255.255.0:httpd Answer: A Explanation: The /etc/hosts.allow and /etc/hosts.deny each have two or more colon-separated fields. The first filed specifies the comma separated list of executable name . The second field contains a comma-separated list of client specifications, using IP address or host name or network name. httpd: 192.168.1.0/24 à specified the network vsftpd: .example.com à specified the domain. Question 9. A Linux administrator is about to install a Linux server. The server has 256MB of RAM. Which of the following sizes of the swap partition is generally recommended? A. 128MB B. 256MB C. 512MB D. 1024MB Answer: C Explanation: Swap space in Linux is used when the amount of physical memory (RAM) is full. If the system needs more memory resources and the RAM is full, inactive pages in memory are moved to the swap space. While swap space can help machines with a small amount of RAM, it should not be considered a replacement for more RAM. Swap space is located on hard drives, which have a slower access time than physical memory. Swap space can be a dedicated swap partition (recommended), a swap file, or a combination of swap partitions and swap files. The size of your swap should be equal to twice your computer's physical RAM for up to 2 GB of physical RAM. For physical RAM above 2 GB, the size of your swap should be equal to the amount of physical RAM above 2 GB. The size of your swap should never less than 32 MB. Using this basic formula, a system with 2 GB of physical RAM would have 4 GB of swap, while one with 3 GB of physical RAM would have 5 GB of swap. Question 10. Which driver, if any, is required to support L3 cache on the system processor? A. msr.o B. mtrr.o C. cache.o D. No driver is required. Answer: D Explanation: To Support L3 cache on the system processor, no any driver is required.
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.