aiotestking uk

1Z0-062 Exam Questions - Online Test


1Z0-062 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. Which two are prerequisites for performing a flashback transaction? 

A. Flashback Database must be enabled. 

B. Undo retention guarantee for the database must be configured. 

C. EXECUTE privilege on the DBMS_FLASHBACK package must be granted to the user flashing back transaction. 

D. Supplemental logging must be enabled. 

E. Recycle bin must be enabled for the database. 

F. Block change tracking must be enabled tor the database. 

Answer: A,C 

Reference: Oracle Database Advanced Application Developer's Guide 11g, Using Oracle Flashback Technology 

Q2. Which statement is true about Enterprise Manager (EM) express in Oracle Database 12c? 

A. By default, EM express is available for a database after database creation. 

B. You can use EM express to manage multiple databases running on the same server. 

C. You can perform basic administrative tasks for pluggable databases by using the EM express interface. 

D. You cannot start up or shut down a database Instance by using EM express. 

E. You can create and configure pluggable databases by using EM express. 

Answer:

Explanation: EM Express is built inside the database. 

Note: Oracle Enterprise Manager Database Express (EM Express) is a web-based database management tool that is built inside the Oracle Database. It supports key performance management and basic database administration functions. From an architectural perspective, EM Express has no mid-tier or middleware components, ensuring that its overhead on the database server is negligible. 

Q3. In your multitenant container database (CDB) containing pluggable database (PDBs), the 

HR user executes the following commands to create and grant privileges on a procedure: 

CREATE OR REPLACE PROCEDURE create_test_v (v_emp_id NUMBER, v_ename VARCHAR2, v_SALARY NUMBER, v_dept_id NUMBER) 

BEGIN 

INSERT INTO hr.test VALUES (V_emp_id, V_ename, V_salary, V_dept_id); 

END; 

GRANT EXECUTE ON CREATE_TEST TO john, jim, smith, king; 

How can you prevent users having the EXECUTE privilege on the CREATE_TEST procedure from inserting values into tables on which they do not have any privileges? 

A. Create the CREATE_TEST procedure with definer’s rights. 

B. Grant the EXECUTE privilege to users with GRANT OPTION on the CREATE_TEST procedure. 

C. Create the CREATE_TEST procedure with invoker’s rights. 

D. Create the CREATE_TEST procedure as part of a package and grant users the EXECUTE privilege the package. 

Answer:

Explanation: If a program unit does not need to be executed with the escalated privileges of the definer, you should specify that the program unit executes with the privileges of the caller, also known as the invoker. Invoker's rights can mitigate the risk of SQL injection. 

Incorrect: 

Not A: By default, stored procedures and SQL methods execute with the privileges of their owner, not their current user. Such definer-rights subprograms are bound to the schema in which they reside. 

not B: Using the GRANT option, a user can grant an Object privilege to another user or to PUBLIC. 

Q4. You execute the following piece of code with appropriate privileges: 

User SCOTT has been granted the CREATE SESSION privilege and the MGR role. 

Which two statements are true when a session logged in as SCOTT queries the SAL column in the view and the table? 

A. Data is redacted for the EMP.SAL column only if the SCOTT session does not have the MGR role set. 

B. Data is redacted for EMP.SAL column only if the SCOTT session has the MGR role set. 

C. Data is never redacted for the EMP_V.SAL column. 

D. Data is redacted for the EMP_V.SAL column only if the SCOTT session has the MGR role set. 

E. Data is redacted for the EMP_V.SAL column only if the SCOTT session does not have the MGR role set. 

Answer: A,C 

Explanation: 

Note: 

* DBMS_REDACT.FULL completely redacts the column data. 

* DBMS_REDACT.NONE applies no redaction on the column data. Use this function for development testing purposes. LOB columns are not supported. 

* The DBMS_REDACT package provides an interface to Oracle Data Redaction, which enables you to mask (redact) data that is returned from queries issued by low-privileged users or an application. 

* If you create a view chain (that is, a view based on another view), then the Data Redaction policy also applies throughout this view chain. The policies remain in effect all of the way up through this view chain, but if another policy is created for one of these views, then for the columns affected in the subsequent views, this new policy takes precedence. 

Q5. You wish to enable an audit policy for all database users, except SYS, SYSTEM, and SCOTT. 

You issue the following statements: 

SQL> AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYS; 

SQL> AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYSTEM; 

SQL> AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SCOTT; 

For which database users is the audit policy now active? 

A. All users except SYS 

B. All users except SCOTT 

C. All users except sys and SCOTT 

D. All users except sys, system, and SCOTT 

Answer:

Explanation: If you run multiple AUDIT statements on the same unified audit policy but specify different EXCEPT users, then Oracle Database uses the last exception user list, not any of the users from the preceding lists. This means the effect of the earlier AUDIT POLICY ... EXCEPT statements are overridden by the latest AUDIT POLICY ... EXCEPT statement. 

Note: 

* The ORA_DATABASE_PARAMETER policy audits commonly used Oracle Database parameter settings. By default, this policy is not enabled. 

* You can use the keyword ALL to audit all actions. The following example shows how to audit all actions on the HR.EMPLOYEES table, except actions by user pmulligan. 

Example Auditing All Actions on a Table 

CREATE AUDIT POLICY all_actions_on_hr_emp_pol ACTIONS ALL ON HR.EMPLOYEES; 

AUDIT POLICY all_actions_on_hr_emp_pol EXCEPT pmulligan; 

Reference: Oracle Database Security Guide 12c, About Enabling Unified Audit Policies 

Q6. Examine the following impdp command to import a database over the network from a pre-12c Oracle database (source): 

Which three are prerequisites for successful execution of the command? 

A. The import operation must be performed by a user on the target database with the DATAPUMP_IMP_FULL_DATABASE role, and the database link must connect to a user on the source database with the DATAPUMP_EXD_FULL_DATABASE role. 

B. All the user-defined tablespaces must be in read-only mode on the source database. 

C. The export dump file must be created before starting the import on the target database. 

D. The source and target database must be running on the same platform with the same endianness. 

E. The path of data files on the target database must be the same as that on the source database. 

F. The impdp operation must be performed by the same user that performed the expdp operation. 

Answer: A,B,D 

Explanation: In this case we have run the impdp without performing any conversion if 

endian format is different then we have to first perform conversion. 

Q7. You upgraded your database from pre-12c to a multitenant container database (CDB) containing pluggable databases (PDBs). 

Examine the query and its output: 

Which two tasks must you perform to add users with SYSBACKUP, SYSDG, and SYSKM privilege to the password file? 

A. Assign the appropriate operating system groups to SYSBACKUP, SYSDG, SYSKM. 

B. Grant SYSBACKUP, SYSDG, and SYSKM privileges to the intended users. 

C. Re-create the password file with SYSBACKUP, SYSDG, and SYSKM privilege and the FORCE argument set to No. 

D. Re-create the password file with SYSBACKUP, SYSDG, and SYSKM privilege, and FORCE arguments set to Yes. 

E. Re-create the password file in the Oracle Database 12c format. 

Answer: B,D 

Explanation: 

* orapwd 

/ You can create a database password file using the password file creation utility, 

ORAPWD. 

The syntax of the ORAPWD command is as follows: 

orapwd FILE=filename [ENTRIES=numusers] [FORCE={y|n}] [ASM={y|n}] 

[DBUNIQUENAME=dbname] [FORMAT={12|legacy}] [SYSBACKUP={y|n}] [SYSDG={y|n}] 

[SYSKM={y|n}] [DELETE={y|n}] [INPUT_FILE=input-fname] 

force - whether to overwrite existing file (optional), 

* v$PWFILE_users / 12c: V$PWFILE_USERS lists all users in the password file, and indicates whether the user has been granted the SYSDBA, SYSOPER, SYSASM, SYSBACKUP, SYSDG, and SYSKM privileges. 

/ 10c: sts users who have been granted SYSDBA and SYSOPER privileges as derived from the password file. 

ColumnDatatypeDescription USERNAMEVARCHAR2(30)The name of the user that is contained in the password file SYSDBAVARCHAR2(5)If TRUE, the user can connect with SYSDBA privileges SYSOPERVARCHAR2(5)If TRUE, the user can connect with SYSOPER privileges 

Incorrect: 

not E: The format of the v$PWFILE_users file is already in 12c format. 

Q8. Examine the following command; 

ALTER SYSTEM SET enable_ddl_logging = TRUE; 

Which statement is true? 

A. Only the data definition language (DDL) commands that resulted in errors are logged in the alert log file. 

B. All DDL commands are logged in the alert log file. 

C. All DDL commands are logged in a different log file that contains DDL statements and their execution dates. 

D. Only DDL commands that resulted in the creation of new segments are logged. 

E. All DDL commands are logged in XML format in the alert directory under the Automatic Diagnostic Repository (ADR) home. 

Answer:

Explanation: Once DDL logging is turned on, every DDL command will be logged in the alert log file and also the log.xml file. 

Note: 

* By default Oracle database does not log any DDL operations performed by any user. The default settings for auditing only logs DML operations. 

* Oracle 12c DDL Logging – ENABLE_DDL_LOGGING 

The first method is by using the enabling a DDL logging feature built into the database. By default it is turned off and you can turn it on by setting the value of ENABLE_DDL_LOGGING initialization parameter to true. 

* We can turn it on using the following command. The parameter is dynamic and you can 

turn it on/off on the go. 

SQL> alter system set ENABLE_DDL_LOGGING=true; 

System altered. Elapsed: 00:00:00.05 SQL> 

Once it is turned on, every DDL command will be logged in the alert log file and also the log.xml file. 

Q9. Examine the query and its output executed In an RDBMS Instance: 

Which three statements are true about the users (other than sys) in the output? 

A. The C # # B_ADMIN user can perform all backup and recovery operations using RMAN only. 

B. The C # # C_ADMIN user can perform the data guard operation with Data Guard Broker. 

C. The C # # A_ADMIN user can perform wallet operations. 

D. The C # # D_ADMIN user can perform backup and recovery operations for Automatic Storage Management (ASM). 

E. The C # # B_ADMIN user can perform all backup and recovery operations using RMAN or SQL* Plus. 

Answer: B,D,E Explanation: 

B: SYSDG administrative privilege has ability to perform Data Guard operations (including startup and shutdown) using Data Guard Broker or dgmgrl. 

D: SYSASM The new (introduced in 11g) SYSASM role to manage the ASM instance, variable extent sizes to reduce shared pool usage, and the ability of an instance to read from a specific disk of a diskgroup 

E (Not A): SYSDBA is like a role in the sense that it is granted, but SYSDBA is a special built-in privilege to allow the DBA full control over the database 

Incorrect: 

Not C: SYSKM. SYSKM administrative privilege has ability to perform transparent data encryption wallet operations. 

Note: 

Use the V$PWFILE_USERS view to see the users who have been granted administrative privileges. 

Q10. A user establishes a connection to a database instance by using an Oracle Net connection. You want to ensure the following: 

1. The user account must be locked after five unsuccessful login attempts. 

2. Data read per session must be limited for the user. 

3- The user cannot have more than three simultaneous sessions. 

4. The user must have a maximum of 10 minutes session idle time before being logged off automatically. 

How would you accomplish this? 

A. by granting a secure application role to the user 

B. by implementing Database Resource Manager 

C. by using Oracle Label Security options 

D. by assigning a profile to the user 

Answer: