Q1. Examine the following statement that is used to modify the primary key constraint on the SALES table:
SQL> ALTER TABLE SALES MODIFY CONSTRAINT pk DISABLE VALIDATE;
Which three statements are true regarding the above command? (Choose three.)
A. The constraint remains valid.
B. The index on the constraint is dropped.
C. It allows the loading of data into the table using SQL *Loader.
D. New data conforms to the constraint, but existing data is not checked.
E. It allows the data manipulation on the table using INSERT/UPDATE/DELETE SQL statements.
Answer: ABC
Q2. You have an ORDERS table with the following structure:
The table has data in the ODATE column for all rows. Many orders are placed in a single day. You need to ensure that the ODATE column must contain data for every order in future.
Which method would serve the purpose?
A. Modify the column using the ALTER TABLE ... MODIFY command.
B. Add a UNIQUE constraint to the column using the ALTER TABLE ... ADD CONSTRAINT command.
C. Add a NOT NULL constraint to the column using the ALTER TABLE ... ADD CONSTRAINT command.
D. Add a PRIMARY KEY constraint to the column using the ALTER TABLE ... ADD CONSTRAINT command.
Answer: A
Q3. You are in the middle of a transaction updating a very important table. The machine on which a database was running reboots because of power outage. This caused a database instance failure.
Which statement is true in this situation?
A. The online redo log files and archived redo log files are required to accomplish the recovery
B. The uncommitted transaction will be committed at the next startup of the database instance
C. The uncommitted transaction is rolled back automatically at the next opening of the database
D. The DBA has to perform the recovery on the database to recover the uncommitted transaction
Answer: C
Q4. In which situation would you use static database registration for a listener?
A. When multiple databases are to be registered with the listener
B. When DBAs need to connect remotely to start up the database instance
C. When users need to connect the database instance using the host naming method
D. When the database instance that is to be registered with the listener is configured in shared server mode
Answer: B
Q5. Examine the command:
SQL>ALTER USR skd ACCOUNT LOCK;
Which two statements are true after the command is executed? (Choose two.)
A. The SKD user cannot log in to the database instance
B. The objects owned by the SKD user are not accessible to any user
C. The other users can access the objects owned by the SKD user, on which they have access
D. The password for the SKD user expires and the user is forced to change the password at the next log in
Answer: AC
Q6. The user SCOTT owns the CUST table that is placed in the SALES tablespace. The user SCOTT opens a session and executes commands as follows:
SQL> INSERT INTO cust VALUES(101, 'JACK');
1 row created.
SQL> INSERT INTO cust VALUES(102, 'SMITH');
1 row created.
As a DBA, you execute the following command from another session:
ALTER TABLESPACE sales READ ONLY;
Which statement is true regarding the effect of this command on the transaction in Scott's session?
A. The command fails as a transaction is still pending.
B. The transaction in Scott's session is rolled back and the tablespace becomes readonly.
C. The command waits and the user SCOTT can execute data manipulation language (DML) statements only as part of the current transaction.
D. The command hangs until all transactions on the objects in the tablespace commit or rollback, and then the tablespace is placed in readonly mode.
Answer: D
Q7. The database instance is currently using SPFILE. View the Exhibit and examine the error that you received while running the DB Structure Integrity check. Given below are the steps to recover from the error in random order:
1. Shut down the instance, if not already done.
2. Copy one of the remaining control files to a new location.
3. Change the value of the CONTROL_FILES initialization parameter to correspond to the new location of the control files.
4. Start up the database instance to the NOMOUNT stage.
5. Recover the database to the point of failure of the control file.
6. Open the database.
Identify the correct sequence of steps?
Exhibit:
A. 1, 2, 4, 3, 5, 6
B. 2, 4, 3, 5, 6; 1 not required
C. 4, 5, 6, 2, 3; 1 not required
D. 5, 2, 3, 4; 1 and 6 not required
Answer: A
Q8. You configured the Flash Recovery Area (FRA) for your database. The database instance is running in ARCHIVELOG mode. The default location for the archived redo log files is the Flash Recovery Area. Which two files are removed automatically if the space is required in the FRA as per the retention policy? (Choose two.)
A. Flashback log files
B. Backups that have become obsolete
C. User managed backups of the data files and control files
D. Archived redo log files that have multiple copies in a different archive location and not backed up
Answer: AB
Q9. You are using Enterprise Manager to schedule backups for your database.
Which type of script would be generated by the backup scheduler?
A. XML script
B. PL/SQL script
C. Operating system script
D. Recovery Manager (RMAN) script
Answer: D
Q10. A constraint in a table is defined with the INITIALLY IMMEDIATE clause. You executed the ALTER TABLE command with the ENABLE VALIDATE option to enable the constraint that was disabled.
What are the two effects of this command? (Choose two.)
A. It fails if any existing row violates the constraint.
B. It does not validate the existing data in the table.
C. It enables the constraint to be enforced at the end of each transaction.
D. It prevents insert, update, and delete operations on the table while the constraint is in the process of being enabled.
Answer: AD