Q1. Which three statements are true about the working of system privileges in a multitenant control database (CDB) that has pluggable databases (PDBs)?
A. System privileges apply only to the PDB in which they are used.
B. Local users cannot use local system privileges on the schema of a common user.
C. The granter of system privileges must possess the set container privilege.
D. Common users connected to a PDB can exercise privileges across other PDBs.
E. System privileges with the with grant option container all clause must be granted to a common user before the common user can grant privileges to other users.
Answer: A,C,E
Explanation: A, Not D: In a CDB, PUBLIC is a common role. In a PDB, privileges granted locally to PUBLIC enable all local and common users to exercise these privileges in this
PDB only.
C: A user can only perform common operations on a common role, for example, granting privileges commonly to the role, when the following criteria are met:
The user is a common user whose current container is root.
The user has the SET CONTAINER privilege granted commonly, which means that the
privilege applies in all containers.
The user has privilege controlling the ability to perform the specified operation, and this
privilege has been granted commonly
Incorrect:
Note:
* Every privilege and role granted to Oracle-supplied users and roles is granted commonly except for system privileges granted to PUBLIC, which are granted locally.
Q2. Which action takes place when a file checkpoint occurs?
A. The checkpoint position is advanced in the checkpoint queue.
B. All buffers for a checkpointed file that were modified before a specific SCN are written to disk by DBWn and the SCN is stored in the control file.
C. The Database Writer process (DBWn) writes all dirty buffers in the buffer cache to data files.
D. The Log Writer process (LGWR) writes all redo entries in the log buffer to online redo log files.
Answer: C
Q3. The ORCL database is configured to support shared server mode. You want to ensure that a user connecting remotely to the database instance has a one-to-one ratio between client and server processes.
Which connection method guarantees that this requirement is met?
A. connecting by using an external naming method
B. connecting by using the easy connect method
C. creating a service in the database by using the dbms_service.create_service procedure and using this service for creating a local naming service"
D. connecting by using the local naming method with the server = dedicated parameter set in the tnsnames.ora file for the net service
E. connecting by using a directory naming method
Answer: C,E
Q4. You execute the commands:
SQL>CREATE USER sidney
IDENTIFIED BY out_standing1
DEFAULT TABLESPACE users
QUOTA 10M ON users
TEMPORARY TABLESPACE temp
ACCOUNT UNLOCK;
SQL> GRANT CREATE SESSION TO Sidney;
Which two statements are true?
A. The create user command fails if any role with the name Sidney exists in the database.
B. The user sidney can connect to the database instance but cannot perform sort operations because no space quota is specified for the temp tablespace.
C. The user sidney is created but cannot connect to the database instance because no profile is
D. The user sidney can connect to the database instance but requires relevant privileges to create objects in the users tablespace.
E. The user sidney is created and authenticated by the operating system.
Answer: A,E
Q5. You use the segment advisor to help determine objects for which space may be reclaimed.
Which three statements are true about the advisor given by the segment advisor?
A. It may advise the use of online table redefinition for tables in dictionary managed tablespace.
B. It may advise the use of segment shrink for tables in dictionary managed tablespaces it the no chained rows.
C. It may advise the use of online table redefinition for tables in locally managed tablespaces
D. It will detect and advise about chained rows.
E. It may advise the use of segment shrink for free list managed tables.
Answer: B,C,D
Explanation: The Segment Advisor generates the following types of advice:
* If the Segment Advisor determines that an object has a significant amount of free space, it recommends online segment shrink. If the object is a table that is not eligible for shrinking, as in the case of a table in a tablespace without automatic segment space management, the Segment Advisor recommends online table redefinition (C).
* (D) If the Segment Advisor encounters a table with row chaining above a certain threshold, it records that fact that the table has an excess of chained rows.
Q6. You run a script that completes successfully using SQL*Plus that performs these actions:
1. Creates a multitenant container database (CDB)
2. Plugs in three pluggable databases (PDBs)
3. Shuts down the CDB instance
4. Starts up the CDB instance using STARTUP OPEN READ WRITE
Which two statements are true about the outcome after running the script?
A. The seed will be in mount state.
B. The seed will be opened read-only.
C. The seed will be opened read/write.
D. The other PDBs will be in mount state.
E. The other PDBs will be opened read-only.
F. The PDBs will be opened read/write.
Answer: B,D
Explanation: B: The seed is always read-only.
D: Pluggable databases can be started and stopped using SQL*Plus commands or the ALTER PLUGGABLE DATABASE command.
Q7. Identify three scenarios in which you would recommend the use of SQL Performance Analyzer to analyze impact on the performance of SQL statements.
A. Change in the Oracle Database version
B. Change in your network infrastructure
C. Change in the hardware configuration of the database server
D. Migration of database storage from non-ASM to ASM storage
E. Database and operating system upgrade
Answer: A,C,E
Explanation: Oracle 11g/12c makes further use of SQL tuning sets with the SQL Performance Analyzer, which compares the performance of the statements in a tuning set before and after a database change. The database change can be as major or minor as you like, such as:
* (E) Database, operating system, or hardware upgrades.
* (A,C) Database, operating system, or hardware configuration changes.
* Database initialization parameter changes.
* Schema changes, such as adding indexes or materialized views.
* Refreshing optimizer statistics.
* Creating or changing SQL profiles.
Q8. Which two statements are true about extents?
A. Blocks belonging to an extent can be spread across multiple data files.
B. Data blocks in an extent are logically contiguous but can be non-contiguous on disk.
C. The blocks of a newly allocated extent, although free, may have been used before.
D. Data blocks in an extent are automatically reclaimed for use by other objects in a tablespaee when all the rows in a table are deleted.
Answer: B,C
Q9. Your are the DBA supporting an Oracle 11g Release 2 database and wish to move a table containing several DATE, CHAR, VARCHAR2, and NUMBER data types, and the table’s indexes, to another tablespace.
The table does not have a primary key and is used by an OLTP application.
Which technique will move the table and indexes while maintaining the highest level of availability to the application?
A. Oracle Data Pump.
B. An ALTER TABLE MOVE to move the table and ALTER INDEX REBUILD to move the indexes.
C. An ALTER TABLE MOVE to move the table and ALTER INDEX REBUILD ONLINE to move the indexes.
D. Online Table Redefinition.
E. Edition-Based Table Redefinition.
Answer: D
Explanation: * Oracle Database provides a mechanism to make table structure modifications without significantly affecting the availability of the table. The mechanism is called online table redefinition. Redefining tables online provides a substantial increase in availability compared to traditional methods of redefining tables.
* To redefine a table online:
Choose the redefinition method: by key or by rowid
* By key—Select a primary key or pseudo-primary key to use for the redefinition. Pseudo-primary keys are unique keys with all component columns having NOT NULL constraints. For this method, the versions of the tables before and after redefinition should have the same primary key columns. This is the preferred and default method of redefinition.
* By rowid—Use this method if no key is available. In this method, a hidden column named M_ROW$$ is added to the post-redefined version of the table. It is recommended that this column be dropped or marked as unused after the redefinition is complete. If COMPATIBLE is set to 10.2.0 or higher, the final phase of redefinition automatically sets this column unused. You can then use the ALTER TABLE ... DROP UNUSED COLUMNS statement to drop it.
You cannot use this method on index-organized tables.
Note:
* When you rebuild an index, you use an existing index as the data source. Creating an index in this manner enables you to change storage characteristics or move to a new tablespace. Rebuilding an index based on an existing data source removes intra-block fragmentation. Compared to dropping the index and using the CREATE INDEX statement, re-creating an existing index offers better performance.
Incorrect:
Not E: Edition-based redefinition enables you to upgrade the database component of an application while it is in use, thereby minimizing or eliminating down time.
Q10. To enable the Database Smart Flash Cache, you configure the following parameters:
DB_FLASH_CACHE_FILE = ‘/dev/flash_device_1’ , ‘/dev/flash_device_2’
DB_FLASH_CACHE_SIZE=64G
What is the result when you start up the database instance?
A. It results in an error because these parameter settings are invalid.
B. One 64G flash cache file will be used.
C. Two 64G flash cache files will be used.
D. Two 32G flash cache files will be used.
Answer: A