Q1. You have a large amount of historical data in a flat file. Some analysts in your organization need to query this data in the file. The file is too large to load the data in it into your current database.
Which is the most effective method to access this data in your database?
A. Use the database link.
B. Use the SQL*Loader utility.
C. Use the Oracle Data Pump utility.
D. Create an external table and leave the data in the flat file.
Answer: D
Q2. Note the following functionalities of various background processes:
1. Record the checkpoint information in data file headers.
2. Perform recovery at instance startup.
3. Cleanup unused temporary segments.
4. Free the resources used by a user process when it fails.
5. Dynamically register database services with listeners.
6. Monitor sessions for idle session timeout.
Which option has the correct functionalities listed for a background process?
A. Archiver Process (ARCn): 1, 2, 5
B. System Monitor Process (SMON): 1, 4, 5
C. Process Monitor Process (PMON): 4, 5, 6
D. Database Writer Process (DBWn): 1, 3, 4
Answer: C
Q3. Which two statements are true regarding listeners? (Choose two.)
A. Listeners use only the TCP/IP protocol.
B. Multiple listener processes can run simultaneously on a host.
C. Multiple database instances can be registered with a single listener.
D. The listener-related errors can be traced only at the administrative level.
E. Only one database instance can be registered with a single listener at any time.
Answer: BC
Q4. Which three operations require undo data? (Choose three.)
A. Committing a transaction
B. Flashing back a transaction
C. Recovering a failed transaction
D. Running a read-consistent query
E. Changing a tablespace status from READ ONLY to READ WRITE
Answer: BCD
Q5. View the Exhibit and examine the privileges granted to the SL_REP user.
The EMP table is owned by the SCOTT user. The SL_REP user executes the following command:
SQL> GRANT SELECT ON scott.emp TO hr;
Which statement describes the outcome of the command?
A. The command executes successfully
B. The command produces an error because the EMP table is owned by SCOTT
C. The command produces an error because SL_REP has the GRANT ANY OBJECT PRIVILEGE without ADMIN_OPTION
D. The command produces an error because SL_REP does not have the SELECT privilege with GRANT_OPTION on the EMP table
Answer: A
Q6. The session of user SCOTT receives the following error after executing an UPDATE command on the EMP table:
ERROR at line 1:
ORA-00060: deadlock detected while waiting for resource
On investigation, you find that a session opened by user JIM has a transaction that caused the deadlock.
Which two statements are true regarding the session of SCOTT in this scenario? (Choose two.)
A. The session is terminated after receiving the error and JIM can continue with his transaction.
B. SCOTT should perform a COMMIT or ROLLBACK to allow JIM to continue with his transaction.
C. The session is rolled back after receiving the error and JIM can continue with his transaction.
D. SCOTT has to reexecute the last command in the transaction after he commits the transaction.
Answer: BD
Q7. Identify the two situations in which you use the alert log file in your database to check the details. (Choose two.)
A. Running a query on a table returns "ORA-600: Internal Error."
B. Inserting a value in a table returns "ORA-01722: invalid number."
C. Creating a table returns "ORA-00955: name is already used by an existing object."
D. Inserting a value in a table returns "ORA-00001: unique constraint (SYS.PK_TECHP) violated."
E. Inserting a row in a table returns "ORA-00060: deadlock detected while waiting for resource."
Answer: AE
Q8. You have issued a SHUTDOWN ABORT command to bring down your database instance.
Consider the steps that will be performed later when you open the database:
1. SGA is allocated.
2. Control file is read.
3. Redo log files are opened.
4. Instance recovery is started.
5. Background processes are started.
6. Data file headers are checked for consistency.
7. Server parameter file or the initialization parameter file is read.
Which option has the correct order in which these steps occur?
A. 7, 1, 5, 2, 3, 6, 4
B. 1, 2, 3, 7, 5, 6, 4
C. 7, 1, 4, 5, 2, 3, 6
D. 1, 7, 5, 4, 2, 3, 6
Answer: A
Q9. See the Exhibit to observe the roles assigned to the SL_REP user.
Which statement is true about the assignment of the SELECT_CATALOG_ROLE role to the SL_REP user?
A. The user must enable the role explicitly
B. The user can grant the role to other users
C. The user cannot user the role until the DBA enables it explicitly
D. The user can start using the role immediately without any changes
Answer: A
Q10. You want to create a role to meet these requirements:
1. The role is to be protected from unauthorized usage.
2. The password of the role is not to be embedded in the application source code or stored in a table.
Which method would you use to restrict enabling of such roles?
A. Create the role with external authentication. B.
Create the role as a secure application role. C.
Create the role as a password-protected role.
D. Create a role and use Fine-Grained Access Control (FGAC) to secure the role.
Answer: B